Hackers
prev.
play.
mark.
next.

:30:04
- What's going on?
- Four,

:30:05
three, two, one...
:30:11
WeIcome to our show!
:30:12
Hack the PIanet!
:30:13
Hack the Planet!
:30:16
For Iate night hacks, JoIt CoIa,
soft drink ofthe eIite hacker.

:30:19
- Who are these guys?
- That's Razor and Blade.

:30:23
Razor and Blade?
:30:24
That's right. This is a pay-phone.
:30:27
Don't ask.
:30:28
As you can see, this isjust a simpIe
micro-cassette recorder.

:30:32
Hook it up to the phone,
and drop in five bucks in quarters.

:30:35
Record the tone the coins make,
hang up, get your money back.

:30:39
Never again pay for a service
that wouId be cheap,

:30:42
if it weren't run
by profiteering gIuttons.

:30:44
Remember, hacking is more than
just a crime. It's a survivaI trait.

:30:50
l'm a real wild child,
l'm a wild one

:30:54
l'm a wild one
:30:57
Thank you! Thank you very much!
:31:03
Joey! Joey! Thank you!
:31:06
Freeze!
:31:07
- What?
- Get out of there!

:31:08
Out!
:31:09
- Joey!
- Get in there!

:31:13
Sit down!
:31:14
Lucy!
:31:16
Where are you taking her?
:31:19
Joey!
:31:29
- How's it going, Ray?
- Looks good, sir.

:31:31
We got an uncorrupted hard drive.
:31:33
ln English, please.
:31:35
l didn't protect the President
for ten years

:31:37
to finish my career
feeling like an idiot.

:31:39
l'm sorry, sir. He didn't have time
to erase his computer files.

:31:43
Good. Let's finish up here.
Take him in for interrogation.

:31:47
Agent Gill, can you spare a moment?
:31:49
Why, of course, Jennifer.
:31:51
- Joey!
- How dangerous are hackers?

:31:56
Hackers penetrate and ravage public
and private computer systems,


prev.
next.