MR ROBOT
Hii guys this is TECHWIKI again with a very
interesting topic. This topic is for every one, means that for the people
interested in CYBER SECURITY.
As from the title you
all must have understood the purpose and the use of this article.
Also read: -
1. What is Ethical Hacking and Types of Hacker
2. How to install windows subsystem for Linux on windows in 2022
3. Is shopping from Dark Web Safe or Not in 2022
4. Go-Daddy E-mail hacked today Data Breach 2021 GoDaddy
5. Top 8 Apps infected by Joker Malware, remove them right now
So, without any further delay let’s get started---
MR ROBOT
source-vice.com |
Friends many of
you must be knowing about this movie.
Yes, friends this is a Hollywood movie. The one who
wants to be expert in cyber security. In this movie there are many things that an
expert should know. There are many hacking attacks done in this movie.
First of all I want to say that it is not completely
right to say it a movie. It is a series, that is divided into four season.
The first three season’s episodes are dubbed in hindi,
but the last on is not dubbed. Now lets come back to our topic.
In this movie there are more hacking methodologies
done practically then all of yours
expectations.
Let me explain you some of them----
1. Firstly I want to say you all that I
have watched this series in the recent days only. And I was totally inspired
and in the mood to Hack everything that I see in my surroundings. Means that
whatever the thing that I saw connected to Internet I tried to find the way to
get control over it.
2. Now just come to the topic – at first
there was an attack on the company for which the HERO that is ELLIOT and his
company was giving security. And the company name is Ecorp, it was attacked by
some one. Then Elliot saved them. He found the thing from which it was hacked
that is “ROOTKIT”.
source-vice.com |
Rootkit is a type of coding or we can
say a script that, if installed in the system takes over control on it.
3. I want to say sorry that I have not
told the very first hacking from were it
was started that is ELLIOT hacked the coffee owner by taking control over the
exit node of the TOR browser, from which the owner was operating.
source-gifer.com |
Now you will say that what is the “EXIT
NODE”. I want to say that we all thing, if we use the TOR browser then we
are totally safe. But its not if anyone takes control over the exit node of it
then they can hack us. And the result that we get on the TOR comes form the
distributed part but when they give us the result that we search for in the
bunch.
Means that before giving us it is
fragmented but when it reaches us it is all together in the form of bunch from the exit node. That’s why it
can be hacked.
I hope so you all have understood it.
4. Further their comes a term that is “MALWARE CODER”. Friends this is the very important thing because it is very popular in the world of hacking.
It means that the person who codes
the malwares are known as MALWARE CODERS. There were three main malware coders
– MOBELY, DARLENE and TRENTON. These are the characters in this series who
played the very important role.
source-pinterest.com |
5. Now I want to say that it is not
possible to explain all the hacking
attacks of this.
So, my recommendation is to watch the
series you will understand better. There are many more things that you should
know if you want o become the best hacker in the world.
I want to become the best ETHICAL HACKER in the world and I want you all too become that’s why I will upload the very first episode of its first season so that you can understand these things much better.
FACTS RELATED
TO MR ROBOT
source-pinterest.com |
1. Every one wants to know that who is MR ROBOT in this series? Then I want to say that there is no one a particular person MR ROBOT in this series. Its just ELLIOT’S illusion of his passed father. Actually, his father died, dressed in a jacket written with MR ROBOT on his pocket. This is the very important fact regarding this whole series.
And I want to say that their must be many people who
after seeing this series haven’t understood this fact.
2. The second one is that what did
ELLIOT’S father did with him in his childhood?
The answer is that his father sexually molested him in his childhood.
I know that it sounds very bad but when you will come in its last season
that is fourth season. In this season
these all things are cleared.
So, friend these were the very main facts of this vigilante HACKING series. I would highly recommend you all to see this series, but it will of no use if you don’t have interest in HACKING or ETHICAL HACKING.
So, be aware of it.
3. Now comes the last and the very most
effective fact or we can say the myth.
After seeing this series people were waiting for the fifth season, as in the last season’s last episode that is S4 E13. A kind of suspence was left to be completed in the upcoming seasons.
But the US government has officially stopped its season five creation. So, now there is no any further season rather than SEASON4. But we should hope that it comes very sooner.
MR ROBOT
CASTS
Now this is also very important to know the characters
of this series. I am not going to talk about the every one but about the main
casts.
1. First comes the very main character that is ELLIOT ALDERSON on him only the whole series is based. Its real name is RAMI MALEK. In this series he plays a role of a vigilante hacker. Means the very fast and the pro level that can hack anything.
source-medium.com |
2. Second comes the character playing
role of his father- CHRISTIAN SLATER. In the series his name is MR ROBOT.
source-rottentomatoes.com |
3. Third comes the character playing
role of his sister- CARLY CHAIKIN. In the series her name was DARLENE.
source-wikipedia.org |
4. Fourth comes the character playing
role of his friend- PORTIA DOUBLEDAY. In the series her name was ANGELA MOSS.
source-wikipedia.org |
And there are many more character small but very much important. These were the names of its main characters.
FOR MORE POST PLEASE VISIT THE GIVEN LINKS:-
- Anonymous
- Kali linux
- Further posts are here
CLICK HERE FOR OUR LATEST POST, ON MBR VS GPT.
Related Articles: -
1. What is Ethical Hacking and Types of Hacker
2. How to install windows subsystem for Linux on windows in 2022
3. Is shopping from Dark Web Safe or Not in 2022
4. Go-Daddy E-mail hacked today Data Breach 2021 GoDaddy
5. Top 8 Apps infected by Joker Malware, remove them right now
PLEASE SUPPORT OUR BLOG AND BE WITH US.https://www.smmshop.com/ptc-sites-pay-per-click?jobs_ref=75d160367890b1913fadc8a880f5df6
0 Comments
Please do not enter any spam link in the comment box