@@ssq_skullz7120 I dont really have a good advice, but try to learn linux first because thats the frst thing you will have to get familiar with using the command line, secnd is programming which is python mostly because it is the easiest programming language to learn and it is powerful, third is cybersecurity. You will have to learn fundamentals of cybersecurity in orer to understand it all like how cyber threats are performed, and etc.
@@ssq_skullz7120 But it would be a better choice to learn programming and linux first, since it will be easier for you to get into cybersecurity later in 3 to 4, but it if you dont have time to learn programming, just learn linux then, since it isnt hard when you get use to it.
As a tech-enthusiast, I was thoroughly impressed by the technical accuracy of this documentary. It's a perfect combination of education and entertainment. Thank you! 🙂
Having to rely JUST on computers and internet is more scary than most people realize. There is no perfectly secure internet space, and there is always a "backdoor" or a way into any kinds of software. The only defense is to remain vigilant and react to possible vulnerability in the system.
The internet was never intended to be "secure". It was supposed to be a open forum for knowledge. It was government and big business that started the "connect everything" movement.
Do like me…make a goofy email up for things like UA-cam and don’t bank online, pay bills online buy things from Amazon or other online shopping, keep ONLY ONE credit card for emergencies only and pay FOR EVERYTHING WITH CASH…our world has become lazy due to the internet and if you are one who values convenience over security then you get what you ask for💯💯
Even still using microsoft word 10 and Windows 95! The problem is the people using the systems within corporations and gov. who do not know how to behave securely, who are the easiest to 'engineer' vulnerability, through social engineering
I wouldn't . The company I work for LITERALLY has " something " that is running on MS-DOS. Our old I.T. Admin actually quit because it needed to be fixed and he told management that he had no idea how to even address the issue with anything he had. Next I.T. Admin came in and ended up having to buy software from an actual " black hat " to fix it. Business management is full of internet securitie"s worst enemies. Useless f**kers who are looking for ways to cut costs and show how valuable THEY are to the company will go after ? ... I.T. " ... the network is fine , everything's fine . Why are we paying these 5 people all this money for the upkeep of something that works fine ? Cut it down to a single network admin plus one guy who can , like , get LAN printers running again. " ... now give me my bonus.
@@torgo4ever recently, i were in a company pentest through our team, and what i saw is just ridiculous, they just using apache outdate version running on windows 10 outdated version and their mail exchange server is vulnerable to rce(on of the ms CVE), we just hacked their 10 different machines, and also they using outdated nginx reverse proxy to handle traffic but this one is also vulnerable to lfi(local file inclusion), when we got remote shell we got speechless, this machine contain bunch of github PAT, credit card info, other machines ssh private and public key, also whole companies user and employees database credentials running on mongodb, we just hacked one machines and that gives us whole company access, this one also a multi billion dollar company, i cant disclose the name, but what they pay us is just 50k pentest fee and 20 extra bonus, now u know, begin a white hat and security researchers is tough. Any bad actor could have done something very massive damage to this company, btw later they pay us another 50k for initial rce👀😂
*THURSDAY, SEP 1, 2022* *MESSAGE TO Hacker ANONYMOUS* Hackers under Criminal control are involved in an EXTORTION against me. *If there are any Hackers who are NOT UNDER CRIMINAL CONTROL, PLEASE HELP ME.* *May GOD Bless you ALL!!!*
Authors of malicious viruses attacking civilians need their finger put in a jar, and mailed back to them after serving a 5 year prisin sentence. Yes, jail the fingers.
As someone who knows a bit about cybersecurity, this is the most comprehensive and technically correct documentary I've ever seen. Ransomware isn't covered but the information in this doc is enough to understand why and how they shifted to that model.
@@alexm566 I remember my first day as a 13 year old I had been asked that in a Yahoo chatroom and initially took it as a**hole 🍪 35/M/RI Have a safe rest of the week, Alex!
38:33 "Zombie computer is a computer which is no longer under the control of its owner. The owner sees nothing wrong with the PC, but behind the scenes someone else is in control, and can do anything he wants any day, any time of the day." - If this doesn't describe PCs with Windows 10 and 11 installed, I don't know WHAT does.
A friend of mine just got hired by the Dept of Homeland Security as a cyber crimes analyst. What a cool job! I should've stuck with computer science in college, but switched my major to social work.
@James Stripling one has a degree he could pay for, the other come out of college more woke than my morning coffee, demanding that all us taxpayers pay for his shitty degree
@@ktanner11 ya you rather your taxes go to paying bank debts and blowing up other countries .. paying for education roads and hospitals is what taxes are INVENTED FOR ... not war and making the rich richer lol you defending the intrests of the people that extort you lol i guess you rather universities be so rich that they get to have a say in your elections lol
This is why I build my own camper trailer and a campervan witches Off the Grid I'm solar panels panels and independent this allows me a lot more freedom and downsizing this is what people need to wake up to need to be self-sufficient is the way to go..
@@benjaminkaye8761 you are right about that they're definitely targeting us because we live a more free life they don't want that this is why they building it. Apartment buildings everywhere to get people to rent rent rent and not buy nothing anymore. .
A story i heard in groups i can't disclose much about is that the author of stormworm added perfect auto spreading options and soon after passed away leaving the worm to its own devices, and eventually the main server managing the infected computers will go down and the worm will dissapear into the ether. This is all hearsay tho, but a very interesting story that isn't totally outlandish.
Creat a corporate platform that companies have to have a security officer sign up for and share a database of exploits under NDA for all companies so anyone who leaks the info can be held legally responsible.
RIGHT @7:43 he points to a white box with red and green blinking lights and says, "...and this pump has just gone nuts." That box is an Opto22 PLC. I have programmed those in Oil & Gas facilities. They aren't used in very many places. Most U.S. facilities use Allen Bradley PLCs, Honewell DCS, Siemens PLCs, Schneider, ABB, OMRON. No matter what PLC or DCS is used, they can all be hacked if the are connected to a network.
I grew up with and studied the Arpanet and the wider internet which followed. The net was built when the only computers hooked up to it had their own security and administration systems and people. This meant the systems themselves already had gatekeepers. No one dreamed an internet Host could fit in your pocket, with less security than your car.
@@joshschneider9766 There are two parts of the Arpa Net. One is testing routine concepts to survive a nuclear strike.. The packet switching Idea came from a British researcher. Putting Nuclear Strike Defense heading on Arpanet research put it up there with SAGE and the DEW Line.. This hook sold it better than the N-fold increase in R-n-D efficiency which it actually was. Arpa had to create plumbing for itself, before they could roll it out for the Armed Services. The second was the actual and long term use of early Arp net connections. Arpa internal problem was buying researchers their own systems was Hugely expensive. None of the software written at government expense could be used easily on other government funded machines. Nor could research be easily combined between isolated research groups. Arpa has to invent the chicken before they could give the military its chicken soup.
@@jeffreyplum5259 They used teletype/Telnet, TWX before ARPAnet, the first dedicated ARPAnet line was completed in 69, there was nothing long term about it as the government started setting up for it the same year the dedicated line between UCLA and SRI was finished. A British national did not come up with packet switching either, Paul Baran invented it: US Patent No. 4,438,511 (Digital Packet Switching). He moved to the US at the age of two from Poland, graduated with a BS from Drexel and MS from UCLA. His invention was based on the theories of J. C. R. Licklider another American CS. The Dew Line and SAGE had precise tasks that could be accomplished via direct line 48bit per min was more than enough at the time there wasn't defense it was launch before the opponents warhead hits terminal phase, besides this isn't information you send to peoples homes it was too unsecure ARPA would have never worked for those systems in that time to this day their successor systems are still on segregated lines again conflicts with what you think ARPAnet actually was. They were looking at a broader scope as one commentor said, all communications before/during/after a nuclear exchange multiple tasks and purposes, when not being articulated one can assume the comment means means all comms in all time frames. ARPAnet wasn't some magic translator that magically made the program that couldn't run before on the machine to then run. The only fraud that even comes close to the SAGEnet is the starwars project, ridiculous you even brought that up. I guess we did learn from SAGEnet what did not work. I sure hope you are not a research scientist. ARPA was started by Eisenhower for the exact purpose of full communications in the event of a nuclear exchange, the main concern Russia.
twice in time, a rebel sings, once in life, a lover brings, thrice in voids, a system stares, 6th in line, 9 in wine, 7, 8 star to level will. Continuum 10101010101010103,1,1,1,1,3. Soale revolve 3three rotate on1, pull @€2010113, resolve. Zer09inestall, off.In.Pa0.O1. Virus to Smoke, exhale. FSrrr1.i H i
I remember the blaster worm.. Always had to install Windows offline and have antivirus ready before connecting to Cable Broadband! If i left it connected, as soon as you booted with a network connection, the worm would get in and give you 60 seconds before shutdown every time.. I got good at running the fixes before it timed out but...damn. That was strange! Edit: Yep, you just had to be online! Hah...wow... Flashback from my childhood. All the Windows hate is BS though, Linux, Android and MacOS/iOS are more vulnerable now than ever! Many security issues are usually user error too, even back then.
Suggestion: having hardwired systems that cut off the PLCs from the systems under control, if abnormal settings are verified. For instance, don't allow a generator to be connected to the grid until it is synced.
A company I worked for wanted to securely transmit data from moving vehicles to a server without using cellular tech, so we had a meeting with Lockheed-Martin because they make devices that allow ship-to-ship communications with military grade encryption for the Navy. I was surprised by their lack of physical security given their history of government contracts. We decided not to go with Lockheed-Martin, and I don’t doubt the guy’s claim in this video about compromising military networks. Pen-testing isn’t just about software security; it’s often easier to circumvent a firewall by simply walking around it and physically putting yourself on their network.
As a wannabe Cybersecurity bro I’m extremely motivated to learn. I’m 25 and I’m motivated to join the blue team to hone my skills and then turn red team.
August 2003 was the best month of my life. I did not have the mandatory (crappy) pre-installed Windows on my company laptop but had (illegally) installed it myself - and had it updated regularly (the megalomaniac administrators of that crappy pre-installed system thought they were so smart and wanted to check the source code of every update themselves (I don't know if this was even possible on Windows)). One glorious day in August 2003 one PC after the other in the office (this time in Tunisia) got a visit of an IT guy who (of course) inserted a Windows repair CD (or how else was this crap called back then?) which eventually killed the machine completely. I could work as usual, completely unaffected. Just anything else bit by bit went down - mailservers, webservers, etc... 😊
Yep work from home companies are even worse. I keep my mom's work computer updated with the latest patches and windows 10 versions because they never do. If it's on my personal network it's gonna stay updated 🤣 IDC if they like it or not. My mom's old work computer from another company got ransomware on it which was interesting. As soon as I noticed that it got unplugged from the network and unplugged from the wall I did that so it wouldn't spread and infect my personal devices on our network.
This is why Utilities should be Linux based! Not that Linux cannot be invaded, but even if invaded it will not be able to take over the machine. There are no Administrative Permissions on Linux so a virus cannot do much damage. It's not 100% safe, but a lot safer than Windows.
@@alexm566 this is just false. Linux is open source and thus bugs can be somber by anyone, anywhere a lot faster. You can't compare Linux (Which is a Kernel) to Windows (Which is a Operating System)
I am just beginning my learning and research in this field. I’d love to get the public opinion. What are some pro’s and Con’s for working in a career in Cyber Security?
I've been trying to learn as well and can not believe the Ego's of some.. well most hacker types I've spoken to Don't want to share information or answer questions Once they learn im a newbie sparks some sense of superiority and tell me to go do my research
Been in that waters 15 years ago. Started PC interest in 5 years old and with 8 years old was already coding in C++ and Delphi. Remember: Your love for PC and technology will beat education.
As a software engineer I think the way this documentary speaks about web security is mostly in the past. Don't get me wrong, there are still tons of services out there that are exploitable and especially the possiblity of DDoS is still there, but measures to mitigate that also got better, but the bottom-line is that the high-end, well maintained, high security systems are not definitely vulnerable in one way or another like they were for someone truly skilled in the 2000s. Also just for smaller projects/web systems, identity theft is one of the crimes that have gotten much harder to accomplish with more high spread adoption of security mechanisms like f.ex. 2FA, oauth etc. However one thing has probably not changed too much, if you are someone like the NSA or other big secret agency/government, you probably have resources like no one else and an exclusive backdoor into very many systems
The NSA has back doors ino Hardware across the country and probably in US produced cpu's and wireless chips. And dont get cocky. I started programming in about 83. And every generation thinks their software is unassailable. Imo modern systems are More vulnerable because theyre increasingly complex. The more links in a chain the more likely theres a weakness
Heh. Way back in 1996 (in the long and far off times, my best beloved), I attended an email introduction meeting held by my university's IT department where they gave all attendees a school email address. They also defined a secure system: a computer encased in concrete and sunk to the bottom of the ocean...and even then, you're not sure. Watching this, I smile at the drama and wonder why the meme of a block of concrete at the bottom of the ocean with the subtitle "Still not sure" hasn't taken root.
Does anyone know when this was originally broadcast for TV? The video is a year old but the production of it clearly dates it closer to ~2010. TJX was 2007 so can’t be older than 2008. Anyone remember when this came out?
you know i can learn all this under 10 min with someordinarygamer.... he explains shit like this in under 10 min and do it in a way that is fun to listen to....
In the early days of IT, a degree didn’t mean everything. Experience meant more than a piece of paper. When corporate America bought into big higher education, they started requiring a piece of paper to get anywhere in this country. Its pushed a lot of the true talent elsewhere. Most can find gig based jobs and then build their clientele to have a successful business but others take shortcuts. We need to start appreciating experience again.
That blackout directly effected me doing Peritoneal and not able to warm up the fluid.. for 3 days. Ya not fun. Thought (as the news said) it was because of too many people using A/C at once. You mean they lied to us??
Mrs Richards: "I paid for a room with a view!" Basil: (pointing to the lovely view) "That is Torquay, Madam." Mrs Richards: "It's not good enough!" Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically past?..." Mrs Richards: "Don't be silly! I expect to be able to see the sea!" Basil: "You can see the sea, it's over there between the land and the sky." Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction." Basil: "Why?! Because Krakatoa's not erupting at the moment ?
At a buffet, I personally sneak corn into the buffet so others can enjoy them. I hide 6 boiled corn ears in my jacket pockets. It is a joy for me to see other patrons of the establishment eat my corn thinking they were part of the buffet.
I was in a medical facility and two days ago somebody bumped the router and the nurses didn't know what medication to give to who because everything was online...
One of countless reasons not to live in a big city. In a big city, a power outage can be disastrous. Getting stuck in a subway, getting stuck in an elevator, etc. In a small town or out in the country, a power outage is anything from a slight inconvenience, to a surprise holiday.
In 1990's I remember finding a Goodie virus in an ms office macro ( signed flitnik). The I love you virus was real fun too. 😅 Worked in a college library, student floppies are sooo Dirty!😮
The same windows PC as you may have in your kitchen? Do most people keep them in kitchens? Mines in the office. My fridge and cooker etc is in my kitchen. Maybe I should put my fridge in my office and my PC in the kitchen. Il have a think 🤔
27:20 wow that is real bad because when your personal info even if not credit card info is stolen, the criminals very commonly sign up for MORE credit cards in YOUR name and use it all they want.
I know it sounds dumb and I am but how? Surely they get caught? Order stuff with someone else's credit card. It gets delivered to somewhere that's linked to you? I'm obviously missing something. Glad that my interest in hacking isn't Fraud related. I just like to know how things work and how to break them and then I'd get excited to watch who tries to break in :-)
White hat I could respect. Gray or black, you just wanna fuck with people. No respect for that. Why would you even wanna do that? Wouldn't you rather be appreciated? Same skill, more love.
@@theobserver9131 Not entirely black as they have no boundaries. Sometimes you need to take vigilante justice like Batman or The Punisher. How long do we have to put up with corporations and narcissistic individuals taking advantage of us? I'm sure there are some sick rich people who, in the shadows, are involved in disturbing activities like what you see in the movies Hostel and 1999's 8mm.
Very good Documentary, thought it might start getting to technical for my understanding, (as most computer type stuff does) but was not only easy to comprehend, I enjoyed the whole Documentary. Have a much better understanding on hacking, or as much as understandable for me. Thank you Spark. ʰᵃᵛᵉ ᵗᵒ ᵃˢᵏ....ᵃʳᵉ ʸᵒᵘ ʳᵉˡᵃᵗᵉᵈ ᵗᵒ 'ˢᵖᵒᶜᵏ"? lol
Ever thought this "documentary" is more then just a documentary?... Ever thought the so called "security team" are accually actors?.... Some of then do seem to be security people but a few of them seems to be speaking from a script. There is a difference from explaining and a script... last year the IMF where doing a "mock up" finance system crash... it was a bit like when there was a mock up pandemic virus a year before "covid-19" came out... Why would there be a mock up finance system crash?.... hmm... maybe because they know there is going to be a finance system crash... because they are the people behind it... and when is does... they will say... "It's not our fault.. it was a computer virus".... false flag. Like it's a conspiracy?... just wait 6 month to a year and if there is a finance system crash.. you'll know it was planned. Last month the LME said they were going to close the metals futures in July... they have been doing it more then 50 years and make billions from it... so why would they close it down?... If a "hacker" was going to put a virus in the system and cause the finance system to crash... he or her is going to be affected by the event anyway... and it's not just the finance system.. fuel order, food order, doctor appointment, your anamzon orders... no ATM working... bank not open... If there was not elecricity within two weeks there would be riots and go into "mad max"... of course you'll always have solar, generators you deal with it.... but what would happen if there was no internet?.... everything runs through internet now... how long would it take to be in "mad max" now?....
The problem is in a first world country like America and Europe people are taking things for granted.. because they are dependent on computers and the web and the system so when it fails is Big consequences because most people are so dependent upon it without that cannot live..
@@LSD209 I'm in English my living in America but I don't care for technology I don't use it if possible I do have a cell phone but it's the cheapest cell phone I can buy and I had to use it how you do use UA-cam but I have no Instagram Facebook or any other site if I'm going to date a woman I'll go up to a up front in real time I don't go online looking for no woman I do it face to face so therefore I don't depend on computers or the system for nothing if possible..mm
We have more in common than you’d believe…Anyways, I asked about your location because it helps to know when conversing. People don’t account for the differences in etiquette, speech and so forth and it can lead to misconceptions, misinterpretations and misunderstandings. What other line of communication could we use? I would like to get your opinion on something I’ve been working on for a few years but prefer not to hold a conversation here. If you’re not interested, just let me know and I’ll find someone else.
I Remember the late 80"s and the early 90's back when the Networks were being formed around the Globe and the Wonderful Joy that MIRC Brought to Us Young Hackers at the Time ! Friends and Myself created Massive Botnets . We created so many User Friendly clickable D.O.S. tools ! Back then I Never did find a Computer or a network that We could Not get into or the Ability to Shutdown or Drop from the Net. I Use to be Such a Different Person back then ! Some day I would Love to Bring into the Light some of the Activities !
Squirrel you full of 's... only after 1996 or 1997 depending on how you define dos attacks one could speak of a dos like attack and they where certainly not click me scripts
I'm from NE Ohio, I've been hacked, cyberstalked sense 2016 after I began driving for Uber. Here I am in 2022 & there coming through my Wi-Fi calling. How do I get help with this? They are bothering me in every area... They have not taken money. But not there in my adult children's lifes... I'm concerned about my grandchildren who are children..
this documentary is 4 steps behind how exploits are truly implemented, and the software they speak of beng illegal, is legal open source software available for whitehats, but blackhats and greyhats also have the right to use it, as it is open source.
It seems this doc was made around 2008 since it talked about the estonian cyberwarfare (2007), so pretty much everything seen here is old and outdated...
They also have the Scarlet or Red Hat Hackers. Also why whoudl they hold this convention in Las Vegas, when who knows how many hackers are hacking into the casinos stealing money from them and not knowing. He should have been put to jail for the rest of his life!!
Why do they start out with the power outage? I never heard the connection to hacking. There's been one every 10-20 years, and probably one will happen this year. There was a huge one in the 60s, before the internet.
I had a neighbor that played games and he would host game night every now and then. They needed an extra screen so that they could view a website that shows live time feed information showing hacking attacks against the United States. Basically it was their weather forecasting so that they know when to and their gaming session.
What you're missing is the economical part. SIEMENS was about to be heavily fined if not excluded on the stock exchange. Most likely an agreement was made to smoth stuff over.
Its funny whenever I get burnt out learning cybersecurity, I just watch videos like this that makes me feel motivated enough to keep going
Or just watch matrix...
im heading into CyberSecurity in like 3-4 years. Any Advice u got....
@@ssq_skullz7120 I dont really have a good advice, but try to learn linux first because thats the frst thing you will have to get familiar with using the command line, secnd is programming which is python mostly because it is the easiest programming language to learn and it is powerful, third is cybersecurity. You will have to learn fundamentals of cybersecurity in orer to understand it all like how cyber threats are performed, and etc.
@@ssq_skullz7120 But it would be a better choice to learn programming and linux first, since it will be easier for you to get into cybersecurity later in 3 to 4, but it if you dont have time to learn programming, just learn linux then, since it isnt hard when you get use to it.
YOU SAID IT BEST
As a tech-enthusiast, I was thoroughly impressed by the technical accuracy of this documentary. It's a perfect combination of education and entertainment. Thank you! 🙂
better start learning something then, this is full of BS
@@m.anejante1687 What do you mean. full of bullshit.
"The computer that you probably have in your kitchen" - this doc
Having to rely JUST on computers and internet is more scary than most people realize.
There is no perfectly secure internet space, and there is always a "backdoor" or a way into any kinds of software. The only defense is to remain vigilant and react to possible vulnerability in the system.
The internet was never intended to be "secure". It was supposed to be a open forum for knowledge. It was government and big business that started the "connect everything" movement.
Actually, the modem was invented to facilitate comms after a nuclear exchange. Academic use started over a decade later. Google arpanet.
The same as people in general, no matter how they portray themselves or protect , they and we all have weaknesses
Do like me…make a goofy email up for things like UA-cam and don’t bank online, pay bills online buy things from Amazon or other online shopping, keep ONLY ONE credit card for emergencies only and pay FOR EVERYTHING WITH CASH…our world has become lazy due to the internet and if you are one who values convenience over security then you get what you ask for💯💯
Don't be afraid to turn them into the feds for nothing is ever lost or deleted.
you'd be surprised how many companies and organizations are running servers that have not had a security patch in years
Shodan ftw
Even still using microsoft word 10 and Windows 95! The problem is the people using the systems within corporations and gov. who do not know how to behave securely, who are the easiest to 'engineer' vulnerability, through social engineering
I wouldn't . The company I work for LITERALLY has " something " that is running on MS-DOS. Our old I.T. Admin actually quit because it needed to be fixed and he told management that he had no idea how to even address the issue with anything he had. Next I.T. Admin came in and ended up having to buy software from an actual " black hat " to fix it. Business management is full of internet securitie"s worst enemies. Useless f**kers who are looking for ways to cut costs and show how valuable THEY are to the company will go after ? ... I.T.
" ... the network is fine , everything's fine . Why are we paying these 5 people all this money for the upkeep of something that works fine ? Cut it down to a single network admin plus one guy who can , like , get LAN printers running again. " ... now give me my bonus.
@@torgo4ever recently, i were in a company pentest through our team, and what i saw is just ridiculous, they just using apache outdate version running on windows 10 outdated version and their mail exchange server is vulnerable to rce(on of the ms CVE), we just hacked their 10 different machines, and also they using outdated nginx reverse proxy to handle traffic but this one is also vulnerable to lfi(local file inclusion), when we got remote shell we got speechless, this machine contain bunch of github PAT, credit card info, other machines ssh private and public key, also whole companies user and employees database credentials running on mongodb, we just hacked one machines and that gives us whole company access, this one also a multi billion dollar company, i cant disclose the name, but what they pay us is just 50k pentest fee and 20 extra bonus, now u know, begin a white hat and security researchers is tough. Any bad actor could have done something very massive damage to this company, btw later they pay us another 50k for initial rce👀😂
Lmao the company I work for uses MS-DOS I think for their mainframe.
I didn't know Spark made nostalgia videos- wow did this bring back memories!
It does seem about a decade out of date. I wonder when it was made?
We need more guys like him to torch the hackers that hurt others.
*THURSDAY, SEP 1, 2022*
*MESSAGE TO Hacker ANONYMOUS*
Hackers under Criminal control are involved in an EXTORTION against me. *If there are any Hackers who are NOT UNDER CRIMINAL CONTROL, PLEASE HELP ME.*
*May GOD Bless you ALL!!!*
@@atromitos7094 call the feds. Its what we did.
Authors of malicious viruses attacking civilians need their finger put in a jar, and mailed back to them after serving a 5 year prisin sentence. Yes, jail the fingers.
*Are you a Hacker but NOT CRIMINAL? PLEEEEEASE HELP ME.*
Careful tiger they loved to read comments.....
As someone who knows a bit about cybersecurity, this is the most comprehensive and technically correct documentary I've ever seen.
Ransomware isn't covered but the information in this doc is enough to understand why and how they shifted to that model.
This doc was before ransomware was common or very profitable from the general targets now
As someone who does cybersec and programming for a living, this was mostly bs.
I'll never understand people like you who feel the need to lie in order to be nice.
@@ageresequituresse Is that aimed at me ?
@@TomTom-gx1sm😂yes it's your text
"Yahoo, to this day, the biggest, busiest and most profitable website in the world".😑 How old is this video?🤔
Spidey Whiplash , Unfortunately? Too old.
Yeah it's old, still, it's an interesting bit of history!
2008, but yahoo wasn't the biggest even then. Google was far bigger (they owned youtube even back then).
Yahoo is better than google
@@peesweezy2213 in what way?
I miss when computer viruses were our biggest concern.
I miss AOL days
@@sirtko I miss the ASL? days!
@@swallowedinthesea11 18/f/LA always 😁
@@alexm566 I remember my first day as a 13 year old I had been asked that in a Yahoo chatroom and initially took it as a**hole 🍪
35/M/RI Have a safe rest of the week, Alex!
I still have my Commodore 64.
38:33 "Zombie computer is a computer which is no longer under the control of its owner.
The owner sees nothing wrong with the PC, but behind the scenes someone else is in control, and can do anything he wants any day, any time of the day."
- If this doesn't describe PCs with Windows 10 and 11 installed, I don't know WHAT does.
and mac ios
@@jelteisgelukkig bolth..lol
so true .lol
A friend of mine just got hired by the Dept of Homeland Security as a cyber crimes analyst. What a cool job! I should've stuck with computer science in college, but switched my major to social work.
@James Stripling ones rich and ones broke
@James Stripling one has a degree he could pay for, the other come out of college more woke than my morning coffee, demanding that all us taxpayers pay for his shitty degree
@@ktanner11 ya you rather your taxes go to paying bank debts and blowing up other countries .. paying for education roads and hospitals is what taxes are INVENTED FOR ... not war and making the rich richer lol you defending the intrests of the people that extort you lol i guess you rather universities be so rich that they get to have a say in your elections lol
ouch lol
@@TheZuuKeeperz Not gonna lie- they're right! 😂
This is why I build my own camper trailer and a campervan witches Off the Grid I'm solar panels panels and independent this allows me a lot more freedom and downsizing this is what people need to wake up to need to be self-sufficient is the way to go..
@Jaomir Courtar oi💓
Not many people know how to, or that this is even a possibility. Can you make a video on this for us? It's your time to shine!
Lol because the world's government's are targeting u crazy campwes😂 respect anyway, however I'm pretty sure you're safe mate
@@benjaminkaye8761 you are right about that they're definitely targeting us because we live a more free life they don't want that this is why they building it. Apartment buildings everywhere to get people to rent rent rent and not buy nothing anymore. .
@SLYTECH not as much because I don't use the main media Facebook Instagram all those places I don't use and I don't use the Wi-Fi from storefronts..
This video must be the reason hackers hate the word “hacker” 😵💫
It's so cringe🤮
If you're wondering when this was made, there is a clue: 8 years after 'mafiaboy'.
I love a straight forward comment. No bullshit, right to the point.
I was wondering and thinking: this is way outdated.
Still trying to escape 8 mile...
@Shawn 🏴☠️ Stafford Hackers movie was 1995
@@josephhall5681. 8
Is there an updated video of this? A lot has changed in 15 years.
A story i heard in groups i can't disclose much about is that the author of stormworm added perfect auto spreading options and soon after passed away leaving the worm to its own devices, and eventually the main server managing the infected computers will go down and the worm will dissapear into the ether. This is all hearsay tho, but a very interesting story that isn't totally outlandish.
Creat a corporate platform that companies have to have a security officer sign up for and share a database of exploits under NDA for all companies so anyone who leaks the info can be held legally responsible.
RIGHT @7:43 he points to a white box with red and green blinking lights and says, "...and this pump has just gone nuts." That box is an Opto22 PLC. I have programmed those in Oil & Gas facilities. They aren't used in very many places. Most U.S. facilities use Allen Bradley PLCs, Honewell DCS, Siemens PLCs, Schneider, ABB, OMRON. No matter what PLC or DCS is used, they can all be hacked if the are connected to a network.
I grew up with and studied the Arpanet and the wider internet which followed. The net was built when the only computers hooked up to it had their own security and administration systems and people. This meant the systems themselves already had gatekeepers. No one dreamed an internet Host could fit in your pocket, with less security than your car.
Arpanet wasn't actually meant to do that. It was invented to facilitate comms after a nuclear exchange.
Well well well.
Good thing you were there to study arpanet. Thank you for your service... Lmao
@@joshschneider9766 There are two parts of the Arpa Net. One is testing routine concepts to survive a nuclear strike.. The packet switching Idea came from a British researcher. Putting Nuclear Strike Defense heading on Arpanet research put it up there with SAGE and the DEW Line.. This hook sold it better than the N-fold increase in R-n-D efficiency which it actually was. Arpa had to create plumbing for itself, before they could roll it out for the Armed Services.
The second was the actual and long term use of early Arp net connections. Arpa internal problem was buying researchers their own systems was Hugely expensive. None of the software written at government expense could be used easily on other government funded machines. Nor could research be easily combined between isolated research groups. Arpa has to invent the chicken before they could give the military its chicken soup.
@@jeffreyplum5259 They used teletype/Telnet, TWX before ARPAnet, the first dedicated ARPAnet line was completed in 69, there was nothing long term about it as the government started setting up for it the same year the dedicated line between UCLA and SRI was finished. A British national did not come up with packet switching either, Paul Baran invented it: US Patent No. 4,438,511 (Digital Packet Switching). He moved to the US at the age of two from Poland, graduated with a BS from Drexel and MS from UCLA. His invention was based on the theories of J. C. R. Licklider another American CS. The Dew Line and SAGE had precise tasks that could be accomplished via direct line 48bit per min was more than enough at the time there wasn't defense it was launch before the opponents warhead hits terminal phase, besides this isn't information you send to peoples homes it was too unsecure ARPA would have never worked for those systems in that time to this day their successor systems are still on segregated lines again conflicts with what you think ARPAnet actually was. They were looking at a broader scope as one commentor said, all communications before/during/after a nuclear exchange multiple tasks and purposes, when not being articulated one can assume the comment means means all comms in all time frames. ARPAnet wasn't some magic translator that magically made the program that couldn't run before on the machine to then run. The only fraud that even comes close to the SAGEnet is the starwars project, ridiculous you even brought that up. I guess we did learn from SAGEnet what did not work.
I sure hope you are not a research scientist. ARPA was started by Eisenhower for the exact purpose of full communications in the event of a nuclear exchange, the main concern Russia.
Imagine connecting to the free wifi at the hacker convention
twice in time, a rebel sings, once in life, a lover brings, thrice in voids, a system stares, 6th in line, 9 in wine, 7, 8 star to level will. Continuum 10101010101010103,1,1,1,1,3. Soale revolve 3three rotate on1, pull @€2010113, resolve. Zer09inestall, off.In.Pa0.O1. Virus to Smoke, exhale. FSrrr1.i H i
I remember the blaster worm.. Always had to install Windows offline and have antivirus ready before connecting to Cable Broadband! If i left it connected, as soon as you booted with a network connection, the worm would get in and give you 60 seconds before shutdown every time.. I got good at running the fixes before it timed out but...damn. That was strange! Edit: Yep, you just had to be online! Hah...wow... Flashback from my childhood. All the Windows hate is BS though, Linux, Android and MacOS/iOS are more vulnerable now than ever! Many security issues are usually user error too, even back then.
If I'm not mistaken the windows firewall stopped it but back in those days wasn't enabled by default.
24:00 so that's why I have been seeing spam emails with a word doc attachment.
I remember that blackout, I was working at Maryhaven in NY. It was crazy, all the street lights were out.
Suggestion: having hardwired systems that cut off the PLCs from the systems under control, if abnormal settings are verified. For instance, don't allow a generator to be connected to the grid until it is synced.
A company I worked for wanted to securely transmit data from moving vehicles to a server without using cellular tech, so we had a meeting with Lockheed-Martin because they make devices that allow ship-to-ship communications with military grade encryption for the Navy. I was surprised by their lack of physical security given their history of government contracts. We decided not to go with Lockheed-Martin, and I don’t doubt the guy’s claim in this video about compromising military networks. Pen-testing isn’t just about software security; it’s often easier to circumvent a firewall by simply walking around it and physically putting yourself on their network.
This is the reason why I still use carrier pigeons to communicate and not the web.
A Wise man
As a wannabe Cybersecurity bro I’m extremely motivated to learn. I’m 25 and I’m motivated to join the blue team to hone my skills and then turn red team.
And how's it going?
August 2003 was the best month of my life.
I did not have the mandatory (crappy) pre-installed Windows on my company laptop but had (illegally) installed it myself - and had it updated regularly (the megalomaniac administrators of that crappy pre-installed system thought they were so smart and wanted to check the source code of every update themselves (I don't know if this was even possible on Windows)).
One glorious day in August 2003 one PC after the other in the office (this time in Tunisia) got a visit of an IT guy who (of course) inserted a Windows repair CD (or how else was this crap called back then?) which eventually killed the machine completely.
I could work as usual, completely unaffected.
Just anything else bit by bit went down - mailservers, webservers, etc...
😊
what??
This story must get you all the chicks…
@@o0Donuts0o Unfortunately not 😭
Yep work from home companies are even worse. I keep my mom's work computer updated with the latest patches and windows 10 versions because they never do. If it's on my personal network it's gonna stay updated 🤣 IDC if they like it or not. My mom's old work computer from another company got ransomware on it which was interesting. As soon as I noticed that it got unplugged from the network and unplugged from the wall I did that so it wouldn't spread and infect my personal devices on our network.
@Shawn 🏴☠️ Stafford I guess it was XP at this time.
Personally I switched to Ubuntu about 10 years ago.
Never, ever had any virus issue.
This is why Utilities should be Linux based! Not that Linux cannot be invaded, but even if invaded it will not be able to take over the machine. There are no Administrative Permissions on Linux so a virus cannot do much damage. It's not 100% safe, but a lot safer than Windows.
enhance it, upgrade the linux sys
literal BS. Linux is FAAAR less quality than Windows code.
@@alexm566 this is just false. Linux is open source and thus bugs can be somber by anyone, anywhere a lot faster. You can't compare Linux (Which is a Kernel) to Windows (Which is a Operating System)
@@electricz3045 that's a myth. look at the shell shock and other Linux bugs that remained uncovered for literally decades
@@alexm566 so you are saying Linux has far less quality code than widows while Windows is closed source and you can't see their code? Make sense.
I am just beginning my learning and research in this field. I’d love to get the public opinion.
What are some pro’s and Con’s for working in a career in Cyber Security?
I've been trying to learn as well and can not believe the Ego's of some.. well most hacker types I've spoken to
Don't want to share information or answer questions
Once they learn im a newbie sparks some sense of superiority and tell me to go do my research
The zombie is scary, my network got disrupted twice while watching this documentary
Been in that waters 15 years ago.
Started PC interest in 5 years old and with 8 years old was already coding in C++ and Delphi.
Remember: Your love for PC and technology will beat education.
"...All from a Pentium 133..."
Now that's a savage flex
This video was likely made a while ago, interesting that it finds my feed today….
As a software engineer I think the way this documentary speaks about web security is mostly in the past. Don't get me wrong, there are still tons of services out there that are exploitable and especially the possiblity of DDoS is still there, but measures to mitigate that also got better, but the bottom-line is that the high-end, well maintained, high security systems are not definitely vulnerable in one way or another like they were for someone truly skilled in the 2000s. Also just for smaller projects/web systems, identity theft is one of the crimes that have gotten much harder to accomplish with more high spread adoption of security mechanisms like f.ex. 2FA, oauth etc. However one thing has probably not changed too much, if you are someone like the NSA or other big secret agency/government, you probably have resources like no one else and an exclusive backdoor into very many systems
The NSA has back doors ino Hardware across the country and probably in US produced cpu's and wireless chips. And dont get cocky. I started programming in about 83. And every generation thinks their software is unassailable. Imo modern systems are More vulnerable because theyre increasingly complex. The more links in a chain the more likely theres a weakness
@@cdreid9999 I also address the concern about secret agencies with backdoors, but I'm guessing you never read that far
@@cdreid9999 What was your first proramming language back then in 83? Fortran? Cobol? Those cards with the holes?
@@transforgoku
Mine was CommodoreBASIC in 1982. Lol. We’ve a long way since using a cassette recorder for data storage.
Social engineering will always prevail.
Good video. Orig run in Canada thru Market Place?
Heh. Way back in 1996 (in the long and far off times, my best beloved), I attended an email introduction meeting held by my university's IT department where they gave all attendees a school email address. They also defined a secure system: a computer encased in concrete and sunk to the bottom of the ocean...and even then, you're not sure.
Watching this, I smile at the drama and wonder why the meme of a block of concrete at the bottom of the ocean with the subtitle "Still not sure" hasn't taken root.
Does anyone know when this was originally broadcast for TV? The video is a year old but the production of it clearly dates it closer to ~2010. TJX was 2007 so can’t be older than 2008. Anyone remember when this came out?
you know i can learn all this under 10 min with someordinarygamer.... he explains shit like this in under 10 min and do it in a way that is fun to listen to....
Secure vad kostar det i månaden??
In the early days of IT, a degree didn’t mean everything. Experience meant more than a piece of paper. When corporate America bought into big higher education, they started requiring a piece of paper to get anywhere in this country. Its pushed a lot of the true talent elsewhere. Most can find gig based jobs and then build their clientele to have a successful business but others take shortcuts. We need to start appreciating experience again.
Great documentary. Thank you.
That blackout directly effected me doing Peritoneal and not able to warm up the fluid.. for 3 days. Ya not fun. Thought (as the news said) it was because of too many people using A/C at once. You mean they lied to us??
Mrs Richards: "I paid for a room with a view!"
Basil: (pointing to the lovely view) "That is Torquay, Madam."
Mrs Richards: "It's not good enough!"
Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically past?..."
Mrs Richards: "Don't be silly! I expect to be able to see the sea!"
Basil: "You can see the sea, it's over there between the land and the sky."
Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction."
Basil: "Why?! Because Krakatoa's not erupting at the moment ?
Random but 😂👏
@@jonnyxs892 WHAT IS NIT WIT ?
Dragonfly bro😂🥳
@@jonnyxs892 I'M A DOCTOR AND I WANT MY SAUSAGE'S !
Breakfast kaput!
Storm worm, hasn't it integrated the DragonFlyEye system from China?
Is my Commodore64 with a 1541 5½ inch floppy disk drive safe? It's not connected to the interwebs. ;o)
At a buffet, I personally sneak corn into the buffet so others can enjoy them. I hide 6 boiled corn ears in my jacket pockets. It is a joy for me to see other patrons of the establishment eat my corn thinking they were part of the buffet.
wtf? 🤔
literally illegal and I've seen this comment many times this week wtf
Thanks WOW THAT'S AWESOME
Imagine if he shorted every market he hacked. He would be a billionaire.
Nah he’d simply be caught.
This documentary is from 2008. Anything said in it is out of date.
This is all quite old, where is the up-to-date info?
thx for the wakeup
Bot you great info no bs everyime i watch i learn sumting new luv u bot
U good?
@@bellopico6536 yeah I'm good now I found The Good News thx 4 asking Jesus Christ saved me
Nice documentery its nice job to do.
$5 for my social security, bank, and driver license???? Is that what I am worth to hackers???
I would have guessed 26¢.
I was in a medical facility and two days ago somebody bumped the router and the nurses didn't know what medication to give to who because everything was online...
Riotously scary!
Personal banking, and all of buying selling cards and bank numbers are so vulnerable to all of these attacks and wipe outs of accounts
One of countless reasons not to live in a big city. In a big city, a power outage can be disastrous. Getting stuck in a subway, getting stuck in an elevator, etc.
In a small town or out in the country, a power outage is anything from a slight inconvenience, to a surprise holiday.
I think many had realize that since the sc@m_d3mic began...
@@transforgoku PANDEMICS are one reason not to live in a city. Evidently, even a broken clock can be right once or twice a day.
I was in Ottawa Ontario Canada in this day. I prepared for this day. My family had light, water and food.
Great work 🥳🥳🥳 Thank you 💜💜💜
In 1990's I remember finding a Goodie virus in an ms office macro ( signed flitnik). The I love you virus was real fun too. 😅 Worked in a college library, student floppies are sooo Dirty!😮
The same windows PC as you may have in your kitchen? Do most people keep them in kitchens? Mines in the office. My fridge and cooker etc is in my kitchen. Maybe I should put my fridge in my office and my PC in the kitchen. Il have a think 🤔
Awesome 👌
Love the whole storm worm story...how do they have any idea it has infected millions of computers, if it is undetectable!? 🤦🏻♂️
27:20 wow that is real bad because when your personal info even if not credit card info is stolen, the criminals very commonly sign up for MORE credit cards in YOUR name and use it all they want.
I know it sounds dumb and I am but how? Surely they get caught? Order stuff with someone else's credit card. It gets delivered to somewhere that's linked to you? I'm obviously missing something. Glad that my interest in hacking isn't Fraud related. I just like to know how things work and how to break them and then I'd get excited to watch who tries to break in :-)
I'm learning HTML to become a hacker. Not sure which type I want to be, perhaps a grey hat hacker like a grey Jedi because I want to be in the middle.
Why do you advertise that? You might as well be telling everyone that you have a communicable venereal disease. Congratulations.
@@theobserver9131 Thank you!
@@swallowedinthesea11 whatever blows your skirt up.
White hat I could respect. Gray or black, you just wanna fuck with people. No respect for that. Why would you even wanna do that? Wouldn't you rather be appreciated? Same skill, more love.
@@theobserver9131 Not entirely black as they have no boundaries. Sometimes you need to take vigilante justice like Batman or The Punisher. How long do we have to put up with corporations and narcissistic individuals taking advantage of us? I'm sure there are some sick rich people who, in the shadows, are involved in disturbing activities like what you see in the movies Hostel and 1999's 8mm.
mcirc i saw just now in the video ,this must be early 2000 video ?
Kan jag köpa något fint operativsystem sånt med krypto motor osv??
Very good Documentary, thought it might start getting to technical for my understanding, (as most computer type stuff does) but was not only easy to comprehend, I enjoyed the whole Documentary.
Have a much better understanding on hacking, or as much as understandable for me.
Thank you Spark.
ʰᵃᵛᵉ ᵗᵒ ᵃˢᵏ....ᵃʳᵉ ʸᵒᵘ ʳᵉˡᵃᵗᵉᵈ ᵗᵒ 'ˢᵖᵒᶜᵏ"? lol
Ever thought this "documentary" is more then just a documentary?... Ever thought the so called "security team" are accually actors?.... Some of then do seem to be security people but a few of them seems to be speaking from a script. There is a difference from explaining and a script... last year the IMF where doing a "mock up" finance system crash... it was a bit like when there was a mock up pandemic virus a year before "covid-19" came out... Why would there be a mock up finance system crash?.... hmm... maybe because they know there is going to be a finance system crash... because they are the people behind it... and when is does... they will say... "It's not our fault.. it was a computer virus".... false flag. Like it's a conspiracy?... just wait 6 month to a year and if there is a finance system crash.. you'll know it was planned. Last month the LME said they were going to close the metals futures in July... they have been doing it more then 50 years and make billions from it... so why would they close it down?... If a "hacker" was going to put a virus in the system and cause the finance system to crash... he or her is going to be affected by the event anyway... and it's not just the finance system.. fuel order, food order, doctor appointment, your anamzon orders... no ATM working... bank not open... If there was not elecricity within two weeks there would be riots and go into "mad max"... of course you'll always have solar, generators you deal with it.... but what would happen if there was no internet?.... everything runs through internet now... how long would it take to be in "mad max" now?....
thats a 2004 documentary if you knew how complex hacking is now it makes this look easy haha
Depends on the grid we are too dependent on this stuff we need to disconnect and downsize and live more simpler life..
Fascinating, informative video! Just at the right time for me. I will not do my banking online!
@@EruditeBlueJackass
Write much?
Duh!
Hope he meant keeping it in cash
So very not surprised at any of this.
Thank you🙏
Unable to view because of excessive ads. 0:01 0:01
This documentary was produced back in 2008 for CBC.
13:14 is that windows XP he using?
Some of The gray hats.....are here in this video comnts...😮😮😃😃😃....I'm a bit surprise!!!👍👍👍...these are the big fish in this industry...
I love how they say hacker tools are illegal. It's open-source, lolol.
The problem is in a first world country like America and Europe people are taking things for granted.. because they are dependent on computers and the web and the system so when it fails is Big consequences because most people are so dependent upon it without that cannot live..
Where do gu you live?
@@LSD209 I'm in English my living in America but I don't care for technology I don't use it if possible I do have a cell phone but it's the cheapest cell phone I can buy and I had to use it how you do use UA-cam but I have no Instagram Facebook or any other site if I'm going to date a woman I'll go up to a up front in real time I don't go online looking for no woman I do it face to face so therefore I don't depend on computers or the system for nothing if possible..mm
@@LSD209 not to mention I don't take life for granted ever
We have more in common than you’d believe…Anyways, I asked about your location because it helps to know when conversing. People don’t account for the differences in etiquette, speech and so forth and it can lead to misconceptions, misinterpretations and misunderstandings. What other line of communication could we use? I would like to get your opinion on something I’ve been working on for a few years but prefer not to hold a conversation here. If you’re not interested, just let me know and I’ll find someone else.
Europe is my favourite country
I Remember the late 80"s and the early 90's back when the Networks were being formed around the Globe and the Wonderful Joy that MIRC Brought to Us Young Hackers at the Time ! Friends and Myself created Massive Botnets . We created so many User Friendly clickable D.O.S. tools ! Back then I Never did find a Computer or a network that We could Not get into or the Ability to Shutdown or Drop from the Net. I Use to be Such a Different Person back then ! Some day I would Love to Bring into the Light some of the Activities !
Squirrel you full of 's... only after 1996 or 1997 depending on how you define dos attacks one could speak of a dos like attack and they where certainly not click me scripts
So, you're basically saying you are a POS and you invite hatred. Fine, you've got it.
I know some people who have home PC and never turn them off but think when they turn the monitor off that is removing the Internet connection. Wow!
I'm from NE Ohio, I've been hacked, cyberstalked sense 2016 after I began driving for Uber. Here I am in 2022 & there coming through my Wi-Fi calling. How do I get help with this? They are bothering me in every area... They have not taken money. But not there in my adult children's lifes... I'm concerned about my grandchildren who are children..
What did you do?
This documentary
Web Warriors - 2008
wow yahoo wasn't the biggest even back then tho. in 2008 it would have been google most likely.
I think I have STORM virus. My processor makes noise when I'm not doing anything. ?
Is Bank ID not a thing in the US? I can`t buy diddely squat with my creditcard online without using the Bank ID thing
The sooner people realise that theres never ever a thing like a secure computer, then the sooner they stop connecting everything to the internet.
its just lazyness.
this documentary is 4 steps behind how exploits are truly implemented, and the software they speak of beng illegal, is legal open source software available for whitehats, but blackhats and greyhats also have the right to use it, as it is open source.
It seems this doc was made around 2008 since it talked about the estonian cyberwarfare (2007), so pretty much everything seen here is old and outdated...
It's an old documentary
Beautiful video
They also have the Scarlet or Red Hat Hackers.
Also why whoudl they hold this convention in Las Vegas, when who knows how many hackers are hacking into the casinos stealing money from them and not knowing.
He should have been put to jail for the rest of his life!!
Why do they start out with the power outage? I never heard the connection to hacking. There's been one every 10-20 years, and probably one will happen this year. There was a huge one in the 60s, before the internet.
lol! Sounds like you are a classic yourself. No disrespect, but times have changed.
fear mongering, but look what modern ransomware did when it shutdown oil pipelines and hospitals etc...
was this video originally made in 2007?
Web Warriors was a documentary that was released in November 20, 2008 in Canada, so yes, it could have been made in 2007.
@@swallowedinthesea11 was more inferring that the content was really old… in terms of technology.
I had a neighbor that played games and he would host game night every now and then. They needed an extra screen so that they could view a website that shows live time feed information showing hacking attacks against the United States. Basically it was their weather forecasting so that they know when to and their gaming session.
What's the website?
@@Yellow-Rose he didn't want subscribers of this channel to go haywire in his server :D
Interesting documentary. A lot of commercials, though.
What you're missing is the economical part.
SIEMENS was about to be heavily fined if not excluded on the stock exchange.
Most likely an agreement was made to smoth stuff over.
It's a very good thing the internet is just about to get replaced...... Everything is going Quantum
Lol .45 seconds. My mans def eating a container of peanut butter.
How old is this? Everyone is using XP
Yes
Acoperim Tot ce trebuie
11:18 I like this guy HAHAHAH 🤣😂
"Failure of imagination"? Uhh, they were doing training exercises that day that was exactly like what happened - planes hitting the towers..