Mission Impossible: Bypassing Authentication

Ethan gains unauthorized access to a computer using a clever trick with the print dialog.

Public Discussion Questions

  1. How are Ethan's actions considered hacking?

Please sign in to add a discussion question.


No standards

Please sign in to add standards to this clip.

Public Pause Prompts

No pause prompts


Please sign in to write a comment.

Related Clips

Computer Science → String Comparison → String Metrics
Computer Science → Programming Languages → BASIC
Computer Science → Units of Information → Bits and Bytes
Computer Science → Network Security → Hacking
Computer Science → Computer Security → Firewall
Computer Science → Computer Security → Authentication
Computer Science → Computer Security → Locking Your Computer