Question 1: Why might the makers of
the movie hackers pretend their site was hacked? What evidence do they
provide to show this is not true?
ANS: I think they might have done it for promotion and advertisement. Evidence I think is that it would catch a lot of attention of real hackers.
Question 2: What are three changes
the hacker made compared to the original?
ANS: Different color, they added “Not” above Hackers and they drew over the actors faces.
Question 3: Did the hacker like the movie “Hackers”? Why or why not?
ANS: The hacker didn’t like the movie because he said the movie was cheesy and he originally wrote the movie.
Question 4: What is DefCon?
ANS: DefCon
is the premier hacker’s conference held in
Question 5: Look at the handout “Part One, The Basics, name three rules of “ethical hackers” he violated.
IV. Be careful who you share information with. Feds are getting trickier.
Generally, if you don't know their voice phone number, name, and
occupation or haven't spoken with them voice on non-info trading
conversations, be wary.
III. Do not leave your (or anyone else's) real name, real handle, or real
phone number on any system that you access illegally. They *can* and
will track you down from your handle!
II. Do not alter any system files other than ones needed to ensure your
escape from detection and your future access (Trojan Horses, Altering
Logs, and the like are all necessary to your survival for as long as
possible.)
Question 6: What are two reasons the hacker gives for hacking the site? Can you think of another possibility?
Question 7: The hacker apologizes for the hack. What does he say were his true reasons for the hack?
Question 8: Did he have help or work alone?
Question 9: How does he try to make up for his hack?
Question 10: Is the tone of the letter what one would expect from a hacker? How does it compare to the other language he uses?
Question 11: What does he say real hackers are?
Question 12: How does he show he is the real hacker?
Question 13: What does he fear might happen to him as a result of his hack?
Question 16: According to this page, what sort of person is a typical Cracker?
Question 17: What is a hacker, according to this page?
Question 18: What sorts of things can a hacker do to a site?
Question 19: What sorts of things are against “Hacker Ethics”?
Question 20: Why do they do it, according to this page.
Question 21: Who is the author? Is he a “Gray hat” or “Black Hat” hacker?
Question 22: The links to “Other Hacker Sites” such as Phrack Magazine, and 2600 are blocked. Why are the blocked?
Question 23: Are any of the hacking activities described on this page legal?
Question 24: What potential harm can be caused to a company by a hacker altering their web page?
Question 25: Should “Gray Hat” hacking be illegal?
Question 26: Was the site really hacked, in your opinion, or is it a publicity stunt by MGM?