Hirne Hacken
Formal Metadata
Title |
| |
Subtitle |
| |
Title of Series | ||
Number of Parts | 254 | |
Author | ||
License | CC Attribution 4.0 International: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/53089 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
| |
Keywords |
00:00
Hacker (term)Computer animationJSONLecture/Conference
01:24
Hacker (term)Computer fileComputer animation
02:06
Server (computing)Beta functionHacker (term)CodeExploit (computer security)Computer animation
03:18
AuthenticationZugriffMail ServerPasswordEmailOperating systemInternetIP addressTypDownloadSoftwareDistribution (mathematics)Particle detectorGame theoryInternetWeb pagePasswordWebsiteComputer animation
04:52
LINUXACCESS <Programm>Kernel (computing)PasswordInternetWebsiteNeWSSoftwareCodeTOUR <Programm>Computer virusMoment (mathematics)EmailInternetdienstUpdateHacker (term)Cellular automatonAuthenticationEmailElectronic mailing listPhysical quantityAuthenticationLINUXSpam-MailPasswordTransmitterAbsolute valueIP addressWeb pageCoin <Programmiersprache>Web portalListe <Informatik>Software developerMeeting/Interview
08:04
PasswordPerimeterZugriffNeumann boundary conditionInternetEmailLoginGooglePasswordZugriffEmailServer (computing)UpdateSource codeWeb serviceGooglePayPalDatabaseIP addressDomain nameWebsiteLoginComputer animation
12:07
Neumann boundary conditionOutlookZahlEmailPasswordCryptanalysisWeb pageDomain nameLoginMultitier architectureXML
13:41
SoftwareComputer virusUpdateWeb pageMail ServerPlug-in (computing)Device driverEstimatorExploit (computer security)Computer animation
15:31
SoftwareDownloadField extensionInternetERNA <Programm>Web pageWORD <Programm>EmailLecture/ConferenceXML
16:39
WORD <Programm>Programmer (hardware)Computer fileVersion <Informatik>InternetMAKROSPayPalPhishingEmailEckeComputer animation
18:12
ENABLE <Programm>WORD <Programm>Computer fileContent (media)DesktopMAKROSMacro (computer science)Data recoveryHard disk driveWeb pageComputer animation
19:21
Computer virusTOUR <Programm>SoftwareBackupMultiplicationMenu (computing)CASTCellular automatonOnline chatComputer fileData recoveryRoundingWeb pageOnline chatSpeciesWind waveCladeEmailMach's principleWordWeb serviceWindows <Zweiunddreißig Bit>
23:11
Online chat9 (number)InformationHacker (term)InfinityTime zoneSystems <München>CryptanalysisCoroutineInternetMAKROS
24:39
Patch (Unix)Social engineering (security)Mathematical analysisSample (statistics)PhishingSound effectZahlPhysical quantityMacro (computer science)Uniformer RaumHausdorff spaceEmailFirewall (computing)VersuchsplanSound effectPasswordSystems <München>MAKROSPayPalCryptanalysisInformation technology consultingFactorizationMathematical optimizationPauli exclusion principleSystem administratorASIA <Programm>InternetOLEProcess (computing)MetreMobile appUML
33:48
Sample (statistics)Sound effectUSB-StickCryptanalysisEmailPasswordSocial engineering (security)Computer animation
35:59
PasswordTOUR <Programm>Sound effectEmailUser interfaceProcess (computing)Sound effectPasswordFunction (mathematics)WORD <Programm>LeakLocal ringWEBWeb pageComputer animation
39:44
Web browserCodeSoftwareWORD <Programm>FactorizationUser interfaceAbbildung <Physik>Haar measureEmailPressureInternetAuthenticationWeb browserPasswordMAKROSPlot (narrative)Public key certificateMobile appComputer hardwareSeries (mathematics)CodeRollbewegungSpring (hydrology)Process (computing)Switch <Kommunikationstechnik>GruppenrichtlinienComputer animation
42:48
PasswordLecture/Conference
43:23
openSUSEComputer animation
Transcript: German(auto-generated)