1 00:00:00,000 --> 00:00:00,090 2 00:00:00,090 --> 00:00:00,330 [VIDEO PLAYBACK] 3 00:00:00,330 --> 00:00:01,880 - --doesn't really mean anything at all. 4 00:00:01,880 --> 00:00:04,500 And, in fact, if you look at popular media today or various television 5 00:00:04,500 --> 00:00:05,100 shows, you'll see-- 6 00:00:05,100 --> 00:00:06,690 DAVID MALAN: One of my favorite things to play-- 7 00:00:06,690 --> 00:00:08,940 if only because it kind of switches things up, 8 00:00:08,940 --> 00:00:11,399 it gives a fun interlude in the middle of class, 9 00:00:11,399 --> 00:00:14,190 but that's nonetheless relevant-- is playing some of these excerpts 10 00:00:14,190 --> 00:00:19,200 from popular TV shows or movies wherein technology is just completely abused. 11 00:00:19,200 --> 00:00:25,200 And I think it's representative of how Hollywood and studios don't necessarily 12 00:00:25,200 --> 00:00:27,870 expect their audience to understand certain things. 13 00:00:27,870 --> 00:00:29,620 And there's absolutely no reason for that. 14 00:00:29,620 --> 00:00:32,159 It's not all that hard to uplift folks to understanding 15 00:00:32,159 --> 00:00:35,409 these kinds of fundamentals so you don't have to pull the wool over their eyes 16 00:00:35,409 --> 00:00:39,362 by printing a graphical crayon program as though it's attack code. 17 00:00:39,362 --> 00:00:40,070 DOUG LLOYD: Yeah. 18 00:00:40,070 --> 00:00:42,420 That is actually an excerpt of what appears 19 00:00:42,420 --> 00:00:45,300 to be some drawing-based software. 20 00:00:45,300 --> 00:00:48,300 And the IP address that was punched in at the top, 21 00:00:48,300 --> 00:00:51,624 in the URL there, was not a legit IP address, 22 00:00:51,624 --> 00:00:52,290 DAVID MALAN: No. 23 00:00:52,290 --> 00:00:54,270 But at least that one I'm more OK with because maybe they're 24 00:00:54,270 --> 00:00:57,520 just trying to prevent someone from visiting some real IP address. 25 00:00:57,520 --> 00:00:59,460 But even then, I don't know. 26 00:00:59,460 --> 00:01:01,710 DOUG LLOYD: They could've done something else, though, 27 00:01:01,710 --> 00:01:04,154 as opposed to something just completely wrong. 28 00:01:04,154 --> 00:01:05,570 DAVID MALAN: There's another clip. 29 00:01:05,570 --> 00:01:06,917 Actually, what some shows do-- 30 00:01:06,917 --> 00:01:09,750 I think The Simpsons do this-- is they'll actually use domain names. 31 00:01:09,750 --> 00:01:12,090 But they'll actually buy the domain names, which is brilliant. 32 00:01:12,090 --> 00:01:14,807 Because invariably, I'm one of those people who pauses the show, 33 00:01:14,807 --> 00:01:16,140 pulls up my laptop, and checks-- 34 00:01:16,140 --> 00:01:16,820 DOUG LLOYD: See where it goes? 35 00:01:16,820 --> 00:01:18,420 DAVID MALAN: --to see if they bought that domain name. 36 00:01:18,420 --> 00:01:20,920 And the only thing is, they're kind of committing themselves 37 00:01:20,920 --> 00:01:24,710 because of syndication to owning that domain name in perpetuity. 38 00:01:24,710 --> 00:01:27,000 Anyhow, Computer Science 50-- 39 00:01:27,000 --> 00:01:27,650 DOUG LLOYD: No. 40 00:01:27,650 --> 00:01:33,150 It gives us a chance to, again, educate students 41 00:01:33,150 --> 00:01:39,300 about protocols and IP addresses and expose the flawed way in which they're 42 00:01:39,300 --> 00:01:41,250 presented. 43 00:01:41,250 --> 00:01:43,250 DAVID MALAN: And it's not arcane, this material. 44 00:01:43,250 --> 00:01:43,750 Right? 45 00:01:43,750 --> 00:01:47,126 Even though you might think that this is really 46 00:01:47,126 --> 00:01:50,250 just the domain of computer scientists, this stuff really is all around us. 47 00:01:50,250 --> 00:01:51,660 And there's no reason why you shouldn't be 48 00:01:51,660 --> 00:01:53,190 able to now spot these things in the media 49 00:01:53,190 --> 00:01:56,440 and realize just how interconnected some of these ideas and these technologies 50 00:01:56,440 --> 00:01:57,450 actually are. 51 00:01:57,450 --> 00:01:58,870 But some of them are just completely over the top. 52 00:01:58,870 --> 00:02:00,630 There's a clip we occasionally show where 53 00:02:00,630 --> 00:02:04,980 twp people are trying to either secure or hack into a system 54 00:02:04,980 --> 00:02:07,950 by both typing on the same keyboard at the same time. 55 00:02:07,950 --> 00:02:09,304 It's just moronic. 56 00:02:09,304 --> 00:02:10,470 DOUG LLOYD: But they get it. 57 00:02:10,470 --> 00:02:11,011 They succeed. 58 00:02:11,011 --> 00:02:11,930 DAVID MALAN: Oh, yeah. 59 00:02:11,930 --> 00:02:12,430 They-- 60 00:02:12,430 --> 00:02:13,130 DOUG LLOYD: They're really coordinated. 61 00:02:13,130 --> 00:02:15,150 DAVID MALAN: --hack into the mainframe or defend 62 00:02:15,150 --> 00:02:17,810 the mainframe or whatever it was.