WebApp Sec mailing list archives

Re: Hacking/security in main-stream media


From: Stephen de Vries <stephen () corsaire com>
Date: Fri, 1 Oct 2004 12:05:31 +0100


"Swordfish"

Washed out hacker writes a hydra in 20 seconds (including 3D graphics) which allows him to gain access to US gov systems while being given oral "attention" by a hot woman ;)

I've been doing security work for some years now, but still can't seem to land jobs like that ;)


On 30 Sep 2004, at 09:58, Damon Leung wrote:

How about "Takedown" - the movie about Kevin Mitnick?

Mike Andrews wrote:

A bit off the wall, but as good a place to post this as any :)

I'm writing a tutorial/courseware on security (both basic topics and
programming) and I'm looking for clips from movies or tv to introduce
subjects - I've found that videos work well with introductions and short
breaks to getting the audience in the right frame of mind (as well as
getting them relaxed).  So far I have the following....

Jurassic Park - insider threat (the programmer gets the system to bypass
security while he steals the DNA/embryos)

Sneakers - Cryptography (when the team discovers it's a crypto box they
have)

The Net - Personally identifiable information (main characters personal
information is deleted)

War Games - [Not sure yet, not managed to pickup the film]

Hackers - [Not sure yet, not managed to pickup the film]

Any other suggestions? I'm only wanting short (5min) sections, but I'm
willing to edit bit's out if needed.

Cheers,
Mike.


----
Mike Andrews
Florida Institute of Technology








 ----------------------------------------------------------------------
 CONFIDENTIALITY: This e-mail and any files transmitted with it are
 confidential and intended solely for the use of the recipient(s) only.
 Any review, retransmission, dissemination or other use of, or taking
 any action in reliance upon this information by persons or entities
 other than the intended recipient(s) is prohibited. If you have
 received this e-mail in error please notify the sender immediately
 and destroy the material whether stored on a computer or otherwise.
 ----------------------------------------------------------------------
 DISCLAIMER: Any views or opinions presented within this e-mail are
 solely those of the author and do not necessarily represent those
 of Corsaire Limited, unless otherwise specifically stated.
 ----------------------------------------------------------------------


Current thread: