geniuswithasmartphone (
geniuswithasmartphone) wrote in
fandomhigh2016-01-13 10:00 am
Entry tags:
Jack of All Trades, Wednesday, Per 1
Today's class wasn't in the Danger Shop, sadly enough. It was in the second best classroom in the school: the computer lab. Honestly, it might have just been easier to program the sim into the Danger Shop than set up each electronic safe manually in the classroom, but Hardison never begrudged time spent with tech. If he hadn't been worried about accidentally interfering with Kitty's class, he probably would have spent the rest of the morning making sure the computers were upgraded to a degree that bordered on ridiculous.
"Hey, y'all," he said. "Today we're learnin' how to hack. Just a little bit," he added, before anyone could get their hopes up. "An', obviously, I'm trustin' you not to use this stuff against your fellow students. Or teachers." And then, obviously as an afterthought, he added, "Or do anythin' illegal with it. While you're on the island."
He couldn't in good conscience try to tell them not to do anything illegal with it ever; that would be the purest kind of hypocrisy. But putting some limits on where and who they could use this information against was the best he could do.
"These hacks are pretty much brute force hacks: they're useful an' they're efficient, but there's no subtlety or artistry to 'em. The very best hacks have both. A good hacker can get into a system an' get out, leaving no trace that anyone was ever even there. These hacks ain't that. They'll not only leave signs of what you did, but a skilled enough hacker'll be able to follow those signs back to the computer you did the hackin' on. Dependin' how good they are an' what's around you, that could be enough to lead 'em to you, directly. Once they got your IP, they'll know where the hack issued from an' gettin' access to other electronics nearby--like CCTV cameras--is pretty much childplay. So don't be stupid is what I'm sayin'."
And Hardison hoped that would be enough of a warning for his class. They were bright enough students. "So, we're learnin' two of the most basic kinda hacks today. If you're ever in a situation where you need to hack somethin', these will most likely get you through, so long as you ain't up against nothin' incredibly sophisticated. Now, of the two hacks, the one you'd use in a situation is the one that best fits what you're tryna do. The first hack ain't really for personal computers. This is the kinda hack you'd use at a terminal when you're lookin' to gain control of outside systems: electronic locks, gun turrets, security systems, automated vendin' machines, that kinda stuff. If you're lookin' to hack into someone's personal computer an' gain access to their files, you'd use the second. Everybody follow? A'ight, let's get hackin'."
[OCD up, thanks for everyone's patience.]
"Hey, y'all," he said. "Today we're learnin' how to hack. Just a little bit," he added, before anyone could get their hopes up. "An', obviously, I'm trustin' you not to use this stuff against your fellow students. Or teachers." And then, obviously as an afterthought, he added, "Or do anythin' illegal with it. While you're on the island."
He couldn't in good conscience try to tell them not to do anything illegal with it ever; that would be the purest kind of hypocrisy. But putting some limits on where and who they could use this information against was the best he could do.
"These hacks are pretty much brute force hacks: they're useful an' they're efficient, but there's no subtlety or artistry to 'em. The very best hacks have both. A good hacker can get into a system an' get out, leaving no trace that anyone was ever even there. These hacks ain't that. They'll not only leave signs of what you did, but a skilled enough hacker'll be able to follow those signs back to the computer you did the hackin' on. Dependin' how good they are an' what's around you, that could be enough to lead 'em to you, directly. Once they got your IP, they'll know where the hack issued from an' gettin' access to other electronics nearby--like CCTV cameras--is pretty much childplay. So don't be stupid is what I'm sayin'."
And Hardison hoped that would be enough of a warning for his class. They were bright enough students. "So, we're learnin' two of the most basic kinda hacks today. If you're ever in a situation where you need to hack somethin', these will most likely get you through, so long as you ain't up against nothin' incredibly sophisticated. Now, of the two hacks, the one you'd use in a situation is the one that best fits what you're tryna do. The first hack ain't really for personal computers. This is the kinda hack you'd use at a terminal when you're lookin' to gain control of outside systems: electronic locks, gun turrets, security systems, automated vendin' machines, that kinda stuff. If you're lookin' to hack into someone's personal computer an' gain access to their files, you'd use the second. Everybody follow? A'ight, let's get hackin'."
[OCD up, thanks for everyone's patience.]

Re: Sign In Week 2
Re: Sign In Week 2
Re: Sign In Week 2
Re: Sign In Week 2
Re: Sign In Week 2
Re: Sign In Week 2
Re: Sign In Week 2
Re: Sign In Week 2
Re: Sign In Week 2
Re: Sign In Week 2