Talk:Hacker culture
This is the talk page for discussing improvements to the Hacker culture article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1Auto-archiving period: 3 months |
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||
|
|
|
This page has archives. Sections older than 90 days may be automatically archived by Lowercase sigmabot III when more than 5 sections are present. |
This article links to one or more target anchors that no longer exist.
Please help fix the broken anchors. You can remove this template after fixing the problems. | Reporting errors |
Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 24 August 2020 and 14 December 2020. Further details are available on the course page. Student editor(s): Loneflash.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 22:57, 16 January 2022 (UTC)
Semi-protected edit request on 5 November 2022
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Add
Part of a series on |
Computer hacking |
---|
to the side of the article. (Near the top in lead section) 2601:183:4A80:E570:CF1:48D8:46E5:9CDA (talk) 20:29, 5 November 2022 (UTC)
Wiki Education assignment: IFS213-Hacking and Open Source Culture
This article was the subject of a Wiki Education Foundation-supported course assignment, between 5 September 2023 and 19 December 2023. Further details are available on the course page. Student editor(s): UndercoverSwitch (article contribs). Peer reviewers: Bashi12.
— Assignment last updated by KAN2035117 (talk) 19:06, 22 October 2023 (UTC)
Semi-protected edit request on 26 December 2023
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Remove "defined ethical hacking as going into devices and computer systems belonging to an organization, with its explicit permissions, to assess and test the efficacy of the organization's cybersecurity defenses. Generally, organizations engage the services of ethical hackers either through third-party cybersecurity firms or under contract. Their main job is to identify and fix security gaps before threat-actors find them and exploit them. This proactive approach to cybersecurity testing leads to significant cost savings for organizations." in the Uses section, preceeding the Ethical Hacking subsection. This was meant for the Ethical hacking section but got duplicated somehow. 67.173.111.243 (talk) 19:16, 26 December 2023 (UTC)
- C-Class Computing articles
- Low-importance Computing articles
- C-Class software articles
- Unknown-importance software articles
- C-Class software articles of Unknown-importance
- All Software articles
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- All Computer Security articles
- C-Class Free and open-source software articles
- Low-importance Free and open-source software articles
- C-Class Free and open-source software articles of Low-importance
- All Free and open-source software articles
- All Computing articles
- C-Class sociology articles
- High-importance sociology articles
- C-Class culture articles
- Unknown-importance culture articles
- WikiProject Culture articles