Talk:Hacker culture: Difference between revisions
FlightTime (talk | contribs) OneClickArchived "Semi-protected edit request on 5 November 2022" to Talk:Hacker culture/Archive 1 |
FlightTime (talk | contribs) OneClickArchived "Wiki Education assignment: IFS213-Hacking and Open Source Culture" to Talk:Hacker culture/Archive 1 |
||
Line 18: | Line 18: | ||
* <nowiki>[[palindrome#Music|palindromic]]</nowiki> The anchor (#Music) has been [[Special:Diff/567855311|deleted by other users]] before. <!-- {"title":"Music","appear":{"revid":156151905,"parentid":156151125,"timestamp":"2007-09-06T22:56:42Z","removed_section_titles":["Types of palindrome","Symmetry by characters","Symmetry by words","Symmetry by both words and characters","Symmetry by lines","In music","Names"],"added_section_titles":["Types","Characters","Words","Both words and characters","Lines","Music"]},"disappear":{"revid":567855311,"parentid":567416593,"timestamp":"2013-08-09T19:10:36Z","removed_section_titles":["Music"],"added_section_titles":[]}} --> |
* <nowiki>[[palindrome#Music|palindromic]]</nowiki> The anchor (#Music) has been [[Special:Diff/567855311|deleted by other users]] before. <!-- {"title":"Music","appear":{"revid":156151905,"parentid":156151125,"timestamp":"2007-09-06T22:56:42Z","removed_section_titles":["Types of palindrome","Symmetry by characters","Symmetry by words","Symmetry by both words and characters","Symmetry by lines","In music","Names"],"added_section_titles":["Types","Characters","Words","Both words and characters","Lines","Music"]},"disappear":{"revid":567855311,"parentid":567416593,"timestamp":"2013-08-09T19:10:36Z","removed_section_titles":["Music"],"added_section_titles":[]}} --> |
||
}} |
}} |
||
==Wiki Education assignment: IFS213-Hacking and Open Source Culture== |
|||
{{dashboard.wikiedu.org assignment | course = Wikipedia:Wiki_Ed/Mesa_Community_College/IFS213-Hacking_and_Open_Source_Culture_(Fall) | assignments = [[User:UndercoverSwitch|UndercoverSwitch]] | reviewers = [[User:Bashi12|Bashi12]] | start_date = 2023-09-05 | end_date = 2023-12-19 }} |
|||
<span class="wikied-assignment" style="font-size:85%;">— Assignment last updated by [[User:KAN2035117|KAN2035117]] ([[User talk:KAN2035117|talk]]) 19:06, 22 October 2023 (UTC)</span> |
|||
== Semi-protected edit request on 26 December 2023 == |
== Semi-protected edit request on 26 December 2023 == |
Revision as of 14:37, 9 September 2024
This is the talk page for discussing improvements to the Hacker culture article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1Auto-archiving period: 3 months |
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||
|
This article links to one or more target anchors that no longer exist.
Please help fix the broken anchors. You can remove this template after fixing the problems. | Reporting errors |
Semi-protected edit request on 26 December 2023
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Remove "defined ethical hacking as going into devices and computer systems belonging to an organization, with its explicit permissions, to assess and test the efficacy of the organization's cybersecurity defenses. Generally, organizations engage the services of ethical hackers either through third-party cybersecurity firms or under contract. Their main job is to identify and fix security gaps before threat-actors find them and exploit them. This proactive approach to cybersecurity testing leads to significant cost savings for organizations." in the Uses section, preceeding the Ethical Hacking subsection. This was meant for the Ethical hacking section but got duplicated somehow. 67.173.111.243 (talk) 19:16, 26 December 2023 (UTC)
Error in comparison with "crackers"
Shouldn't this be:
those who are generally referred to by media and members of the general public using the term "hacker", and whose primary focus —- be it for benign or for malevolent purposes -— lies in exploiting weaknesses in computer security." 147.188.245.177 (talk) 15:15, 10 April 2024 (UTC)
- C-Class Computing articles
- Low-importance Computing articles
- C-Class software articles
- Unknown-importance software articles
- C-Class software articles of Unknown-importance
- All Software articles
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- All Computer Security articles
- C-Class Free and open-source software articles
- Low-importance Free and open-source software articles
- C-Class Free and open-source software articles of Low-importance
- All Free and open-source software articles
- All Computing articles
- C-Class sociology articles
- High-importance sociology articles
- C-Class culture articles
- Unknown-importance culture articles
- WikiProject Culture articles