:31:03
Joey! Joey! Thank you!
:31:06
Freeze!
:31:07
- What?
- Get out of there!
:31:08
Out!
:31:09
- Joey!
- Get in there!
:31:13
Sit down!
:31:14
Lucy!
:31:16
Where are you taking her?
:31:19
Joey!
:31:29
- How's it going, Ray?
- Looks good, sir.
:31:31
We got an uncorrupted hard drive.
:31:33
ln English, please.
:31:35
l didn't protect the President
for ten years
:31:37
to finish my career
feeling like an idiot.
:31:39
l'm sorry, sir. He didn't have time
to erase his computer files.
:31:43
Good. Let's finish up here.
Take him in for interrogation.
:31:47
Agent Gill, can you spare a moment?
:31:49
Why, of course, Jennifer.
:31:51
- Joey!
- How dangerous are hackers?
:31:56
Hackers penetrate and ravage public
and private computer systems,
:32:01
infecting them with viruses
and stealing sensitive materials.
:32:04
These people are terrorists.
:32:23
Morning, gentlemen.
:32:24
Please, be seated.
:32:26
l see we're still dressing
in the dark, Eugene.
:32:29
Once again, don't call me Eugene.
:32:33
Our recent intruder
:32:35
penetrated using a superuser account,
giving him access to our whole system.
:32:41
Precisely what you're paid to prevent.
:32:44
Someone didn't bother reading my memo
on commonly used passwords.
:32:48
As l meticulously pointed out,
the foremost used passwords are...
:32:52
'Love', 'Sex', 'Secret' and 'God'.
:32:57
So would Your Holiness
care to change her password?