Hacking Rhetoric

Hack Response

1 Comment

This was a very interesting experiment for class. At first, I wanted to make my password a bit more complicated to guess so I decided to use the answer to my favorite superhero which was storm from X-Men. I liked the X-men pages on Facebook to give my hacker, Tania, a clue about it. However, several days later, I realized that the password would be really hard to guess based on how many X-Men there are. So, I changed my password to my high school mascot and added the year I graduated at the end of it. At one point, I thought I made it too hard to find out because I have not seen any hacks on my blog posts. Since no one approached me near the end of the hack deadline, I assumed the password was discovered awhile back.

Because this experiment was controlled from the instructor and ourselves, I was looking forward to how my blog would be hacked. However, from a reality viewpoint, if I was hacked without notification and it was not within my control, I would have been very upset and blank out on what to do next. This had actually happened several times with my email accounts, and a false alarm on my bank account. I would be asking myself how much personal information did they take from me, information on my family and friends, would my contacts be the next victim of the hackers, or did they take all of my money from the bank. Currently, I try to make passwords that do not make sense to anyone even myself hoping it would be harder to crack. I believe UT did a good job on this because they require students to have passwords that do not have words from the dictionary. This is my way to tighten up security online.

Tania did a really nice job on my blog post when I hacked the article about a 15 year old infiltrating the Pentagon and NASA. I had decided to make a video about the article to show how incompetent NASA was in terms of security. She had completely revamped the ABC News article with Hackasaurus X-Ray Goggles tool that was introduced in class and my blog post into a different story that the original one. She had decided to incorporate my comparison between Jonathan James and Curious George even more by saying that Curious George was behind the hack on the U.S. government. According to her, Curious George was an adorable little monkey who fell victim to his own curiousity so he hacked NASA. When I saw her version of the article, I was laughing very hard at the time. She had changed the pictures of different stories on the side of the article. Each story had something to do with a cartoon character. Apparently, George was the first monkey to be incarcerated for computer crimes, and will serve 6 months at a monkey detention facility. It was a very effective hack and hilarious to read through. If I did not know I was going to be hacked though, I might have found this to be demeaning and would have been angry about it. In the real world, I think that people would be anxious about their personal things being hacked without a trace.

Advertisements

One thought on “Hack Response

  1. Thanks Lauren! Glad you liked it!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s