Hackers
prev.
play.
mark.
next.

:31:03
Joey! Joey! Thank you!
:31:06
Freeze!
:31:07
- What?
- Get out of there!

:31:08
Out!
:31:09
- Joey!
- Get in there!

:31:13
Sit down!
:31:14
Lucy!
:31:16
Where are you taking her?
:31:19
Joey!
:31:29
- How's it going, Ray?
- Looks good, sir.

:31:31
We got an uncorrupted hard drive.
:31:33
ln English, please.
:31:35
l didn't protect the President
for ten years

:31:37
to finish my career
feeling like an idiot.

:31:39
l'm sorry, sir. He didn't have time
to erase his computer files.

:31:43
Good. Let's finish up here.
Take him in for interrogation.

:31:47
Agent Gill, can you spare a moment?
:31:49
Why, of course, Jennifer.
:31:51
- Joey!
- How dangerous are hackers?

:31:56
Hackers penetrate and ravage public
and private computer systems,

:32:01
infecting them with viruses
and stealing sensitive materials.

:32:04
These people are terrorists.
:32:23
Morning, gentlemen.
:32:24
Please, be seated.
:32:26
l see we're still dressing
in the dark, Eugene.

:32:29
Once again, don't call me Eugene.
:32:33
Our recent intruder
:32:35
penetrated using a superuser account,
giving him access to our whole system.

:32:41
Precisely what you're paid to prevent.
:32:44
Someone didn't bother reading my memo
on commonly used passwords.

:32:48
As l meticulously pointed out,
the foremost used passwords are...

:32:52
'Love', 'Sex', 'Secret' and 'God'.
:32:57
So would Your Holiness
care to change her password?


prev.
next.