Your link has to be original, unique, not one of already posted by other students or used in lectures.
No. | Student's Name | URL | Video title | Comment | Why you think so |
1 | Dario Kurecki | https://www.youtube.com/watch?v=gOrkA_XJ4FU | 5 Stupid Things Movies Believe About Hacking | It's funny what they are using in movies. Speed of typing and number of open windows is not measurement of hacking skills. | The problem is, Hollywood keeps trying to make Hacker movies Action movies, but there isn't really that much action when it comes to real world hacking, usually in the real world, there is a lot of planning, and when it finally gets to the actual hacking part is just waiting and waiting |
2 | Philipp Harb | https://www.youtube.com/watch?v=4MEplwMQVss | Mission Impossible 5 - “Can You Open the Door?” | I am not complaining about them depicting interfaces for opening doors and such for planes via software and I do not even question that this will work remotely - I believe all of us saw such 'horror stories' with moving cars being hacked into through entertainment systems remotely and being controlled that way. However, the most unrealistic part here again is the timing. They hack a Russian satellite within minutes and by that they can hijack the door controls of the plane during a single takeoff. Secondly, the user interface of the tablet is incredibly beautiful. The IMF (secret agency in the movie) development staff must have incredible project managers to let developers put that much love into designing hacking tools that rich in animation. There is more (and I won't even start with the broken physics since this is not asked here), but at least the hacking attack itself did not trigger an alarm in the cockpit (only when the door actually opens, the crew is notified). | |
3 | Szymon Tarasiński | https://www.youtube.com/watch?v=2efhrCxI4J0 | Zero Cool hacks into TV station | This video contains both realistic and non-realistic aspects of hacking. The first part of hacking process is the realistic one and the second part looks like some kind of video game and is not realistic at all. | The first part is realistic because of the method that has been used. Social engineering is one of the most popular and actually really efficient hacking methods. “Zero Cool”, the hacker, persuades TV station worker, that doesn't have any idea about computers, to give him a modem serial number which can be useful in the next part of “hacking process”. This looks realistic since even nowadays people could be (and actually are) fooled with this kind of talks. The second part, on the other hand, looks totally non-realistic. After “hacking” into TV station using just modem serial number, some kind of panel appears on hacker's screen that makes him able to control machine that switches video tapes at TV station. I don't think that controlling this kind of machines is really comfortable using this kind of control panels (unless TV operators like arcade games). |
4 | Matija Alanović | https://www.youtube.com/watch?v=20elMaVZ9lg | Golden Eye: Boris - I am invincible! | It's all there - one-hand typing, overdesigned animated GUIs on multiple screens (containing world maps, of course) and rushed hacking. | These scenes are typical of James Bond movies. They are unrealistic in many ways, but that's why they are fun to watch, just as a dangerous car chase is. I don't have a problem with that, and all the other details suggest that it's intentionally exaggerated. The fact that the pen is actually a bomb and the “was it good for you too?” part are just an added bonus. |
5 | Marin Vidas | https://www.youtube.com/watch?v=Q1CzCQ4eT0g | best hacking scene | Unrealistic programs, typing and environment. And above all, unrealistically fast. | Well, it's kind of obvious. Numerous windows opening at random, some weird data showing up from nowhere, too fast and of course totally gibberish typing… need more? |
6 | Dario Huzjak | https://www.youtube.com/watch?v=8wXBe2jTdx4 | Hackers (8/13) Movie CLIP - Hack the Gibson (1995) HD | Hacking is like a video game. | Its just funny how they act so serious about things that they are doing so wrong. Searching files on the network is adventurous 3D game and when computer virus affects you, it wants to play Pacman like game with you. |
7 | Luka Ruklić | http://www.youtube.com/watch?v=Vxq9yj2pVWk | Let's Enhance | This is a compilation of many videos that use digital forensics to enhance videos/images. With the exception of Star Trek and BSG (which happen in purely fictional/futuristic world and could be plausible), other have very unrealistic methods of enhancing/zooming image content. | It is not possible to create image with high details from image with low details, bits that contain details are simply not there. One commenter on Youtube gave a good explanation of why these clips are unrealistic: “Why not just enhance the image to the suspect's hair and zoom in until their individual DNA strands are visible, enhance it some more, then cross reference it with with the DNA found on the scene. Bam all crime is solved.” |
8 | Mato Poslon | https://www.youtube.com/watch?v=bq_TocRgxMw | Super 90s Hacker Mash-up | Compilation of some of the hacking scenes from 90s movies. | Hacking is depicted as traveling through electronic circuits, which is unrealistic. When hackers are hacking, their monitors show a lot of windows constantly opened and closed, which is also unrealistic |
9 | Mislav Mucko | https://www.youtube.com/watch?v=pa3aUcNWdfw | Uplink: Hacking Banks | Based on 90's hacking movies, this video game is rather unrealistic. All programs needed for hacking are easy to aquire, if you can afford to buy them. There are some simple programs that can bypass network monitors and firewalls. Player can use a lot of proxies to connect to a victims site, using more of them slows down what appears to be real time tracking of the hackers activities. Logs are deleted/modified in one place that cover your tracks, once that is done, you cannot be traced back, even if you steal a lot of money from the bank as in the video example. Assumes more or less that the systems attacked are all the same and critical files can be easily accessed online. | Writing a program for breaking into a secured system would take a long time, much more time for multiple programs for different things. Iit's hard to assume you could just find them on the Internet. Some things like bypassing firewalls are just fictional. Although a hacker could possibly use proxies, the real time tracking part is also fictional. In game it is assumed that all the critical parts can be accesed and modified online, for example logs, which also have no backup. Stealing large amount of money from bank, even if it is possible to remove all computer traces, would still leave traces in real life. Some things that are a bit realistic are the posibillity of modifying logs, use of proxies, and the fact that there is no “You have been hacked” message as has be shown in the movies. |
10 | Igor Novkovic | https://www.youtube.com/watch?v=Cz1M5i5Y4Qc | Iron Man2 Hacking Scene | They make hacking look like a child's play, just point hacking device at the device which you want to hack, press the button and in a nanosecond you'll have godlike abilities over device. | Public watching tv shows and movies isn't really interested in how stuff work, they just want to see something “cool” and hollywood gives them that. On the one side, that is okay, because movies and tv shows are for entertainment, but on the other side they are diminishing the skills and knowledge required to do things. I think that word “hacker” is being misused by media and public, for me hacking isn't about breaking into devices and computers, it's about knowing how they work and being able to break them is the consequence of that knowledge. |
11 | Przemysław Marciniak | https://www.youtube.com/watch?v=vO_O4AD1MhI | Weekend Software Development: Coding The Worm | The clip from film Swordfish (2001). This shows that coding a worm to hack is a lot of fun. You can drink a wine and dance during typing some program on a keyboard. There is also a lot of screens but the most important is this in which we see filling cube what shows us steps of programming | This isn't actually a pure hacking scene but shows us only coding the worm. Maybe there are some hackers who use 5 screens at once, but this looked like you know much program do you completed by this 'cube'. I think also that this movie is really bad. It is about genius hacker but in fact he looks stupid. There are also more hacking scenes from this film, and they are also unreal. I think is common in most of movies to show that hacking is kind of fun but in real it takes a lot more time and requires focus not just random typing to keybord |
12 | Roni Puž | https://www.youtube.com/watch?v=g6gG-6Co_v4 | Mr. Robot: 'Elliot Hacks His Hospital' from 103 | The actor is connected to hospital's file system and changes his medical data. It is little bit to easy. | I believe that medical institutions actually defend themselves and their data little better than this nowdays. |
13 | Valerija Šimić | https://www.youtube.com/watch?v=E1b8yN4Tq-Q | Felicity 1.04 Part 10 “When it comes to hacking, I'm the fastest woman alive” | When it comes to hacking, Felicity is the fastest woman alive. She can hack the city networks in 6 seconds. | |
14 | Maciej Pikulicki | https://www.youtube.com/watch?v=3EwZQddc3kY | Enemy of the state - Freeze,Rotate,Zoom,Focus,Enhance! | This hackig scene is hardly real. The detectives took used footage from only one security camera which was in the shop. They rotated and moved all around the store already recorded video which is not possible. What is more they extracted one little thing (man's bag) and cut everything else in 2 seconds (it can be done nowadays but it takes much more time). But the most unrealizable scene was when detectives somehow looked inside the bag by typing some short command. They also started rotating the bag evet though a part of it was shadowed by the bag's owner. In my opinion this is the most unreal video about using computer and security camera footage to find something important. Of course video was also quite funny I have to say. | This video shows us that in most of movies, directors don't bother focusing on real aspect of hacking and computer forensics. They may belive that people don't care about such things. But I think that they are wrong. Sometimes (just like in my video example) using a computer looks so unreal (and even stupid) even though the rest of the movie may look realistic. All in all it is quite confusing. For me it would be much better if directors began to focus on real methods of computer forensics because it is really interesting topic and what is more if such scences stop to be so irrational, all of the movies would be much more intriguing. |
15 | |||||
16 | |||||
17 | |||||
18 | |||||
19 |
https://www.youtube.com/watch?v=bbOEHcA-71I
interesting parts:
https://www.youtube.com/watch?v=msX4oAXpvUE
(<font inherit/inherit;;inherit;;inherit>i</font> )<font inherit/inherit;;inherit;;inherit>:</font> administer, also, and, as, ought, plus, too
https://www.youtube.com/watch?v=3uoM5kfZIQ0
https://www.youtube.com/watch?v=WU-HSd3IdDA
https://www.youtube.com/watch?v=1rV0SWx6MXw
https://www.youtube.com/watch?v=efy5bBMlD8Q
https://www.youtube.com/watch?v=NCqdO7nesIg&index=5&list=PL6EFA584173772343