Starije izmjene na obje strane
Starija izmjena
Novija izmjena
|
Starija izmjena
|
homeworks:videos [2015/10/22 22:59] pmarciniak [Homeworks] |
homeworks:videos [2024/12/05 12:24] (trenutno) |
| 7 | Luka Ruklić | [[http://www.youtube.com/watch?v=Vxq9yj2pVWk|http://www.youtube.com/watch?v=Vxq9yj2pVWk]] | Let's Enhance | This is a compilation of many videos that use digital forensics to enhance videos/images. With the exception of Star Trek and BSG (which happen in purely fictional/futuristic world and could be plausible), other have very unrealistic methods of enhancing/zooming image content. |It is not possible to create image with high details from image with low details, bits that contain details are simply not there. \\ One commenter on Youtube gave a good explanation of why these clips are unrealistic: "//Why not just enhance the image to the suspect's hair and zoom in until their individual DNA strands are visible, enhance it some more, then cross reference it with with the DNA found on the scene. Bam all crime is solved.//" | | | 7 | Luka Ruklić | [[http://www.youtube.com/watch?v=Vxq9yj2pVWk|http://www.youtube.com/watch?v=Vxq9yj2pVWk]] | Let's Enhance | This is a compilation of many videos that use digital forensics to enhance videos/images. With the exception of Star Trek and BSG (which happen in purely fictional/futuristic world and could be plausible), other have very unrealistic methods of enhancing/zooming image content. |It is not possible to create image with high details from image with low details, bits that contain details are simply not there. \\ One commenter on Youtube gave a good explanation of why these clips are unrealistic: "//Why not just enhance the image to the suspect's hair and zoom in until their individual DNA strands are visible, enhance it some more, then cross reference it with with the DNA found on the scene. Bam all crime is solved.//" | |
|8 |Mato Poslon |[[https://www.youtube.com/watch?v=bq_TocRgxMw|https://www.youtube.com/watch?v=bq_TocRgxMw]] | \\ Super 90s Hacker Mash-up | Compilation of some of the hacking scenes from 90s movies. | Hacking is depicted as traveling through electronic circuits, which is unrealistic. When hackers are hacking, their monitors show a lot of windows constantly opened and closed, which is also unrealistic | | |8 |Mato Poslon |[[https://www.youtube.com/watch?v=bq_TocRgxMw|https://www.youtube.com/watch?v=bq_TocRgxMw]] | \\ Super 90s Hacker Mash-up | Compilation of some of the hacking scenes from 90s movies. | Hacking is depicted as traveling through electronic circuits, which is unrealistic. When hackers are hacking, their monitors show a lot of windows constantly opened and closed, which is also unrealistic | |
| 9 | Mislav Mucko | [[https://www.youtube.com/watch?v=pa3aUcNWdfw|https://www.youtube.com/watch?v=pa3aUcNWdfw]] | Uplink: Hacking Banks | \\ Based on 90's hacking movies, this video game is rather unrealistic. \\ \\ All programs needed for hacking are easy to aquire, if you can afford to buy them. There are some simple programs that can bypass network monitors and firewalls. \\ \\ Player can use a lot of proxies to connect to a victims site, using more of them slows down what appears to be real time tracking of the hackers activities. \\ \\ Logs are deleted/modified in one place that cover your tracks, once that is done, you cannot be traced back, even if you steal a lot of money from the bank as in the video example. \\ \\ Assumes more or less that the systems attacked are all the same and critical files can be easily accessed online. \\ \\ \\ \\ \\ | \\ Writing a program for breaking into a secured system would take a long time, \\ much more time for multiple programs for different things. Iit's hard to assume \\ you could just find them on the Internet. Some things like bypassing firewalls are just fictional. \\ \\ Although a hacker could possibly use proxies, the real time tracking part is \\ also fictional. \\ \\ In game it is assumed that all the critical parts can be accesed and modified online, for example logs, which also have no backup. \\ \\ Stealing large amount of money from bank, even if it is possible to remove all computer traces, would still leave traces in real life. \\ \\ Some things that are a bit realistic are the posibillity of modifying logs, use of proxies, and the fact that there is no "You have been hacked" message as has be shown in the movies. | | | 9 | Mislav Mucko | [[https://www.youtube.com/watch?v=pa3aUcNWdfw|https://www.youtube.com/watch?v=pa3aUcNWdfw]] | Uplink: Hacking Banks | \\ Based on 90's hacking movies, this video game is rather unrealistic. \\ \\ All programs needed for hacking are easy to aquire, if you can afford to buy them. There are some simple programs that can bypass network monitors and firewalls. \\ \\ Player can use a lot of proxies to connect to a victims site, using more of them slows down what appears to be real time tracking of the hackers activities. \\ \\ Logs are deleted/modified in one place that cover your tracks, once that is done, you cannot be traced back, even if you steal a lot of money from the bank as in the video example. \\ \\ Assumes more or less that the systems attacked are all the same and critical files can be easily accessed online. | \\ Writing a program for breaking into a secured system would take a long time, \\ much more time for multiple programs for different things. Iit's hard to assume \\ you could just find them on the Internet. Some things like bypassing firewalls are just fictional. \\ \\ Although a hacker could possibly use proxies, the real time tracking part is \\ also fictional. \\ \\ In game it is assumed that all the critical parts can be accesed and modified online, for example logs, which also have no backup. \\ \\ Stealing large amount of money from bank, even if it is possible to remove all computer traces, would still leave traces in real life. \\ \\ Some things that are a bit realistic are the posibillity of modifying logs, use of proxies, and the fact that there is no "You have been hacked" message as has be shown in the movies. | |
| 10 | Igor Novkovic | [[https://www.youtube.com/watch?v=Cz1M5i5Y4Qc|https://www.youtube.com/watch?v=Cz1M5i5Y4Qc]] | Iron Man2 Hacking Scene | They make hacking look like a child's play, just point hacking device at the device which you want to hack, press the button and in a nanosecond you'll have godlike abilities over device. | Public watching tv shows and movies isn't really interested in how stuff work, they just want to see something "cool" and hollywood gives them that. On the one side, that is okay, because movies and tv shows are for entertainment, but on the other side they are diminishing the skills and knowledge required to do things. I think that word "hacker" is being misused by media and public, for me hacking isn't about breaking into devices and computers, it's about knowing how they work and being able to break them is the consequence of that knowledge. | | | 10 | Igor Novkovic | [[https://www.youtube.com/watch?v=Cz1M5i5Y4Qc|https://www.youtube.com/watch?v=Cz1M5i5Y4Qc]] | Iron Man2 Hacking Scene | They make hacking look like a child's play, just point hacking device at the device which you want to hack, press the button and in a nanosecond you'll have godlike abilities over device. | Public watching tv shows and movies isn't really interested in how stuff work, they just want to see something "cool" and hollywood gives them that. On the one side, that is okay, because movies and tv shows are for entertainment, but on the other side they are diminishing the skills and knowledge required to do things. I think that word "hacker" is being misused by media and public, for me hacking isn't about breaking into devices and computers, it's about knowing how they work and being able to break them is the consequence of that knowledge. | |
| 11 |Przemysław Marciniak |[[https://www.youtube.com/watch?v=vO_O4AD1MhI|https://www.youtube.com/watch?v=vO_O4AD1MhI]] | \\ | | 11 | Przemysław Marciniak | [[https://www.youtube.com/watch?v=vO_O4AD1MhI|https://www.youtube.com/watch?v=vO_O4AD1MhI]] | Weekend Software Development: Coding The Worm | The clip from film Swordfish (2001). This shows that coding a worm to hack is a lot of fun. You can drink a wine and dance during typing some program on a keyboard. There is also a lot of screens but the most important is this in which we see filling cube what shows us steps of programming | This isn't actually a pure hacking scene but shows us only coding the worm. Maybe there are some hackers who use 5 screens at once, but this looked like you know much program do you completed by this 'cube'. I think also that this movie is really bad. It is about genius hacker but in fact he looks stupid. There are also more hacking scenes from this film, and they are also unreal. I think is common in most of movies to show that hacking is kind of fun but in real it takes a lot more time and requires focus not just random typing to keybord | |
Weekend Software Development: Coding The Worm \\ |The clip from film Swordfish (2001). This shows that coding a worm to hack is a lot of fun. You can drink a wine and dance during typing some program on a keyboard. There is also a lot of screens but the most important is this in which we see filling cube what shows us steps of programming |This isn't actually a pure hacking scene but shows us only coding the worm. Maybe there are some hackers who use 5 screens at once, but this looked like you know much program do you completed by this 'cube'. I think also that this movie is really bad. It is about genius hacker but in fact he looks stupid. There are also more hacking scenes from this film, and they are also unreal. I think is common in most of movies to show that hacking is kind of fun but in real it takes a lot more time and requires focus not just random typing to keybord | | | 12 | Roni Puž | [[https://www.youtube.com/watch?v=g6gG-6Co_v4|https://www.youtube.com/watch?v=g6gG-6Co_v4]] | Mr. Robot: 'Elliot Hacks His Hospital' from 103 | The actor is connected to hospital's file system and changes his medical data. It is little bit to easy. | I believe that medical institutions actually defend themselves and their data little better than this nowdays. | |
|12 | | | | | | | | 13 | Valerija Šimić | [[https://www.youtube.com/watch?v=E1b8yN4Tq-Q|https://www.youtube.com/watch?v=E1b8yN4Tq-Q]] | Felicity 1.04 Part 10 "When it comes to hacking, I'm the fastest woman alive" | When it comes to hacking, Felicity is the fastest woman alive. She can hack the city networks in 6 seconds. | | |
|13 | | | | | | | |14 | \\ Maciej Pikulicki \\ | \\ [[https://www.youtube.com/watch?v=3EwZQddc3kY|https://www.youtube.com/watch?v=3EwZQddc3kY]] \\ |Enemy of the state - Freeze,Rotate,Zoom,Focus,Enhance! |This hackig scene is hardly real. The detectives took used footage from only one security camera which was in the shop. They rotated and moved all around the store already recorded video which is not possible. What is more they extracted one little thing (man's bag) and cut everything else in 2 seconds (it can be done nowadays but it takes much more time). But the most unrealizable scene was when detectives somehow looked inside the bag by typing some short command. They also started rotating the bag evet though a part of it was shadowed by the bag's owner. In my opinion this is the most unreal video about using computer and security camera footage to find something important. Of course video was also quite funny I have to say. |This video shows us that in most of movies, directors don't bother focusing on real aspect of hacking and computer forensics. They may belive that people don't care about such things. But I think that they are wrong. Sometimes (just like in my video example) using a computer looks so unreal (and even stupid) even though the rest of the movie may look realistic. All in all it is quite confusing. For me it would be much better if directors began to focus on real methods of computer forensics because it is really interesting topic and what is more if such scences stop to be so irrational, all of the movies would be much more intriguing. | |
|14 | | | | | | | |
|15 | | | | | | | |15 | | | | | | |
|16 | | | | | | | |16 | | | | | | |