homewho are hackers?the riskswho's responsibleprotecting yourselfinterviews

video: excerpts from FRONTLINE's hackers

photo of mari frank
Hacking into an ordinary home computer
Showing what can happen and why it's easy. One person was the victim of the Back Orifice software program which allows the hacker to remotely view and control any computer running Windows 95 or later. The hacker used Back Orifice to observe what web sites the victim was visiting. Mari Frank was another hacking victim--this time it was "identity theft." Her personal files on her computer were accessed and a woman assumed Frank's identity and rang up over $50,000 in credit card debt.

we own your system
The most underreported hacking attacks
Sensational hacker attacks on large e-commerce and corporate sites get a lot of media attention. But computer security analysts discuss in this videoclip why these break-ins are probably only the tip of the iceberg and corporate America is turning to their own private intelligence expencies to protect itself.
video (hi)video (low) video (hi)video (low)

home · who are hackers? · risks of the internet · who's responsible · how to be vigilant · interviews
discussion · video excerpts · synopsis · press · tapes · credits
FRONTLINE · wgbh · pbs online

some photos copyright ©2001 photodisc
web site copyright 1995-2014 WGBH educational foundation