Mission Impossible: Bypassing Authentication

Ethan gains unauthorized access to a computer using a clever trick with the print dialog.

Public Discussion Questions


  1. How are Ethan's actions considered hacking?

Please sign in to add a discussion question.

Standards


No standards

Please sign in to add standards to this clip.

Public Pause Prompts


No pause prompts

Comments


Please sign in to write a comment.

Related Clips


Computer Science → String Comparison → String Metrics
Computer Science → Programming Languages → BASIC
Computer Science → Units of Information → Bits and Bytes
Computer Science → Network Security → Hacking
Computer Science → Computer Security → Firewall
Computer Science → Computer Security → Authentication
Computer Science → Computer Security → Locking Your Computer