Talk:Hacker culture
This is the talk page for discussing improvements to the Hacker culture article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1Auto-archiving period: 90 days |
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||
|
|
|
This page has archives. Sections older than 90 days may be automatically archived by Lowercase sigmabot III when more than 5 sections are present. |
This article links to one or more target anchors that no longer exist.
Please help fix the broken anchors. You can remove this template after fixing the problems. | Reporting errors |
Wiki Education Foundation-supported course assignment
editThis article was the subject of a Wiki Education Foundation-supported course assignment, between 24 August 2020 and 14 December 2020. Further details are available on the course page. Student editor(s): Loneflash.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 22:57, 16 January 2022 (UTC)
Semi-protected edit request on 5 November 2022
editThis edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Add
Part of a series on |
Computer hacking |
---|
to the side of the article. (Near the top in lead section) 2601:183:4A80:E570:CF1:48D8:46E5:9CDA (talk) 20:29, 5 November 2022 (UTC)
Wiki Education assignment: IFS213-Hacking and Open Source Culture
editThis article was the subject of a Wiki Education Foundation-supported course assignment, between 5 September 2023 and 19 December 2023. Further details are available on the course page. Student editor(s): UndercoverSwitch (article contribs). Peer reviewers: Bashi12.
— Assignment last updated by KAN2035117 (talk) 19:06, 22 October 2023 (UTC)
Semi-protected edit request on 26 December 2023
editThis edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Remove "defined ethical hacking as going into devices and computer systems belonging to an organization, with its explicit permissions, to assess and test the efficacy of the organization's cybersecurity defenses. Generally, organizations engage the services of ethical hackers either through third-party cybersecurity firms or under contract. Their main job is to identify and fix security gaps before threat-actors find them and exploit them. This proactive approach to cybersecurity testing leads to significant cost savings for organizations." in the Uses section, preceeding the Ethical Hacking subsection. This was meant for the Ethical hacking section but got duplicated somehow. 67.173.111.243 (talk) 19:16, 26 December 2023 (UTC)
Error in comparison with "crackers"
editShouldn't this be:
those who are generally referred to by media and members of the general public using the term "hacker", and whose primary focus —- be it for benign or for malevolent purposes -— lies in exploiting weaknesses in computer security." 147.188.245.177 (talk) 15:15, 10 April 2024 (UTC)