Hackers
prev.
play.
mark.
next.

:21:01
Don't worry,
:21:02
it's only the rest of your life.
:21:05
Anything else?
Want me to mow the lawn?

:21:09
Oops, l forgot. New York, no grass.
:21:12
And unpack.
:21:36
You can sit at home
and do absolutely nothing

:21:40
and your name goes through
17 computers a day.

:21:43
'1984'? Yeah, right. That's a typo.
:21:46
Orwell's here and living large.
We have no names, man. No names!

:21:52
Can l score a fry?
:21:54
Meet Cereal Killer.
:21:56
As in Fruit Loops.
:21:58
But he does know things.
:22:00
Anyway, guys, listen.
:22:02
l'm in this computer, right?
l'm looking around...

:22:04
You got those Crayola books?
:22:06
Yeah, technicolour rainbow.
:22:10
Green one.
:22:10
What is that? Let me see?
:22:13
- What are these?
- lnternational UNlX environments.

:22:16
Luscious orange.
:22:18
Computer security criteria...
DOD standards.

:22:22
The pink-shirt book... guide to lBM PCs.
:22:25
So-called due to the nasty pink shirt
the guy wears on the cover.

:22:28
Devil book, the UNlX bible.
:22:30
- What's that?
- Dragon book, compiler design.

:22:34
- What's that?
- The Red book.

:22:36
NSA-trusted networks.
:22:39
Otherwise known as 'The Ugly Red Book
That Won't Fit On A Shelf'.

:22:43
Anyway, guys. Come on.
l'm in this computer, right.

:22:47
l'm looking around, throwing commands.
l don't know what it does or anything.

:22:52
lt's choice.
:22:54
lt's beautiful. Four hours
just messing around in there.

:22:57
Finally, l figure out...

prev.
next.