HACKERLAR FİLMLERDEKİ HACK SAHNELERİNİ İZLİYOR! - Summary

Summary

The speaker discusses various aspects of cybersecurity, including the use of tools like Network Metro and the importance of understanding the Linux operating system. They mention a tool called Emmet leep average and how it's used to access a system through a port. The speaker also talks about the Hollywood effect, where a scene is produced to look good, and how it's common in movies.

The speaker discusses the vulnerability of systems, especially when a username and password are left as default. They mention that in Turkey, pressing enter doesn't just close a street, it goes to that neighborhood. The speaker also talks about the use of algorithms for traffic light control and how it's not a situation they've observed.

The speaker discusses the concept of malicious software that follows all the characters typed on a computer and notifies the hacker. They mention that such a story is very active nowadays and is a common occurrence. They also talk about the concept of physical penetration tests where you physically access a place and then turn the work into a digital dimension.

The speaker talks about the concept of a domain admin in a server environment, who can do everything in the e-system. They also mention the concept of a domain area and how it's called by evogroup. The speaker discusses the concept of a system being safe and how it's depicted in movies.

The speaker talks about the concept of a 16-bit system and how it shouldn't have anything to do with it. They also mention the concept of a malware that works as soon as you plug it into the computer. The speaker discusses the concept of a scenario where a laptop is seized and how it's depicted in movies.

The speaker concludes by saying that some of the scenes in movies are realistic, while others are completely fictional. They also mention the importance of not believing every email and to make sure to click on it before clicking on the contents.

Facts

Here are the key facts extracted from the text:

1. The text is a transcript of a video where some people comment on scenes from movies and TV series that involve hacking or cyber security.
2. The text mentions several movies and TV series, such as Skyfall, Iron Man, Ensi verse, and Mr. Robot.
3. The text also mentions some tools and concepts related to hacking or cyber security, such as Network Metro, Linux operating system, ransomware, metasploit, buffer overflow, and domain admin.
4. The text contains opinions and evaluations of the realism and accuracy of the hacking scenes, as well as some anecdotes and jokes from the commentators.
5. The text ends with a warning to not believe every email and to check the contents before clicking on them.

Is this what you were looking for?