Revision as of 01:20, 20 December 2023 view sourceQcomp (talk | contribs)Extended confirmed users1,019 edits does not contribute to discussion or article; Undid revision 1190816749 by 106.217.139.64 (talk)Tag: Undo← Previous edit | Latest revision as of 08:26, 24 March 2024 view source GreenC bot (talk | contribs)Bots2,555,764 edits Add {{reflist-talk}} to #Semi-protected edit request on 28 January 2024 (via reftalk bot) | ||
(43 intermediate revisions by 24 users not shown) | |||
Line 1: | Line 1: | ||
{{pp-semi-indef|small=yes}} | |||
{{Talk header}} | {{Talk header}} | ||
{{WikiProject banner shell|1= | {{WikiProject banner shell|class=C|1= | ||
{{WikiProject Computing |
{{WikiProject Computing |importance=high |software=yes |software-importance=high |security=yes |security-importance=high |hardware=yes |hardware-importance=mid}} | ||
{{WikiProject Popular Culture |
{{WikiProject Popular Culture|importance=high}} | ||
{{WikiProject Internet culture |
{{WikiProject Internet culture|importance=high}} | ||
}} | }} | ||
<!--- Archive basics needs ]. Configured by ] ---> | <!--- Archive basics needs ]. Configured by ] ---> | ||
Line 15: | Line 15: | ||
}} | }} | ||
⚫ | == Semi-protected edit request on 28 January 2024 == | ||
==Wiki Education Foundation-supported course assignment== | |||
] This article was the subject of a Wiki Education Foundation-supported course assignment, between <span class="mw-formatted-date" title="2020-08-25">25 August 2020</span> and <span class="mw-formatted-date" title="2020-12-10">10 December 2020</span>. Further details are available ]. Student editor(s): ]. Peer reviewers: ]. | |||
{{small|Above undated message substituted from ] by ] (]) 22:05, 17 January 2022 (UTC)}} | |||
==Wiki Education Foundation-supported course assignment== | |||
] This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available ]. Student editor(s): ]. | |||
{{small|Above undated message substituted from ] by ] (]) 22:57, 16 January 2022 (UTC)}} | |||
== Semi-protected edit request on 10 February 2021 == | |||
{{edit semi-protected|Hacker|answered=yes}} | {{edit semi-protected|Hacker|answered=yes}} | ||
'''Role of White-hat hackers in securing organizations from outside: | |||
] (]) 13:39, 10 February 2021 (UTC) | |||
''' | |||
Gustav Vasa hade en stor påverkan på den Sverige vi nu lever i | |||
<small>Translation: ''Gustav I of Sweden had a large impact on the Sweden we live in today''</small> | |||
:] '''Not done:''' this is the ] for discussing improvements to the page ]. If possible, please make your request at the talk page for the article concerned. If you cannot edit the article's talk page, you can instead make your request at ].<!-- Template:ESp --> ] (] ] ]) 13:49, 10 February 2021 (UTC) | |||
⚫ | == Semi-protected edit request on |
||
{{edit semi-protected|Hacker|answered=yes}} | |||
First sentence grammer error can you please change their to his/her ] (]) 16:21, 3 March 2021 (UTC) | |||
:It is fine to use the ] in prose. ] (]) 16:49, 3 March 2021 (UTC) | |||
== Semi-protected edit request on 30 April 2022 == | |||
{{edit semi-protected|Hacker|answered=yes}} | |||
I believe another paragraph on motivation needs to be added for a minor reason. One significant trend in the hacking community is not necessarily to gain appreciation from fellow hackers for the skill, but to test limits for the sake of curiosity. There have been many cases prosecutored recently in the United States that shows curiosity was the primary motivation. I believe this needs to be reflected. ] (]) 02:18, 30 April 2022 (UTC) | |||
⚫ | : |
||
== Semi-protected edit request on 15 December 2022 == | |||
{{Edit semi-protected|Hacker|answered=yes}} | |||
Change the first image from: | |||
<nowiki> | |||
] at ] 2011|alt=see caption]] | |||
</nowiki> | |||
To: | |||
<nowiki> | |||
] | |||
</nowiki> | |||
Why: | |||
* The proposed image better shows people actually doing hacking. | |||
* It also avoids any confusion about the ethics or legality of hacking by avoiding the term jailbreaking. | |||
* It contains descriptive alt text. | |||
-- ] (]) 22:22, 15 December 2022 (UTC) | |||
:{{done}}<!-- Template:ESp --> ] (]) 13:20, 20 December 2022 (UTC) | |||
== Hackers & Painters == | |||
Hackers are both people who circumventing controls and and people who building things in creative or unorthodox ways. At different times and in different contexts either definition can be more predominant. Should this article be rewritten to present a more balanced description of hackers, with appropriate citations of course? | |||
-- ] (]) 16:45, 22 December 2022 (UTC) | |||
== |To disabuse Hacker == | |||
being an etymology article, instead of a bunch of buzzwords such as VPN or whether it's authorized by government, or which should be separate articles of 'cracking' not 'hacking' but it was reverted. | |||
Seems any reversion should include whatever the reviewer is 'feeling', and some type of appeal mechanism. And as far as mechanisms, that citations automatically refer to other Misplaced Pages, told on English help chat that would be self-referring that the producers' programmers of Misplaced Pages are wrong?!! | |||
Is it that you writers don't want to be automatically called criminals as computer programmers seem to be by the offensive article? Then my revisions should be considered as disabusing. Here's a hint, capable ready people aren't going to help if having to go through months of attempting to correct something, we'll simply stop donating. | |||
White-hat hackers, play a crucial role in enhancing cybersecurity through their participation in bug bounty programs. These programs are initiatives where organizations invite hackers to identify and report vulnerabilities in their systems in exchange for rewards. This collaborative approach turns potential adversaries into allies, leveraging their skills to preemptively discover and rectify security flaws before malicious attackers can exploit them. By simulating real-world attacks, ethical hackers expose weaknesses in security systems, allowing companies to strengthen their defenses. This proactive defense strategy not only bolsters the security of the company but also contributes to the overall safety of the digital ecosystem. Through bug bounty programs, ethical hackers provide invaluable insights into security vulnerabilities, helping companies to stay one step ahead of cyber threats. | |||
Companies like Google and Microsoft actively encourage white-hat hackers to participate in their bug bounty programs, recognizing the invaluable role these ethical hackers play in fortifying their cybersecurity. These tech giants offer substantial financial rewards for the discovery of vulnerabilities in their systems, creating a strong incentive for skilled hackers to seek out and report potential security issues. The rewards are often scaled based on the severity and complexity of the discovered bug, encouraging thorough and innovative exploration. | |||
I did make three revisions, to review. Despite modern 'feelings' it's better to be called a cheap horse working tirelessly, that to be congratulated as a criminal simply because we happen to write. The article is personally offensive. | |||
Additionally, these companies foster a community of ethical hacking by providing clear guidelines and resources, ensuring that participants can test and report safely and legally. They often host conferences and workshops, offering platforms for knowledge sharing and collaboration among cybersecurity professionals. Recognizing the contributors not only with monetary rewards but also with public acknowledgments and hall of fame listings, these companies build a positive relationship with the white-hat hacker community. This approach not only improves their own security posture but also advances the field of cybersecurity as a whole, promoting a safer digital environment for all users. | |||
Perhaps a better infrastructure, where the reviewers ideas are reviewed by a larger voting panel? Up votes or down votes like Stack Exchange? What I just experienced of reviewers saying every wiki article is wrong and can't be referenced as 'service'.. insane. | |||
<ref>https://bugbase.in/products/bug-bounty</ref> | |||
Take the 'new' reference, a DARPA tech-transfer officer from Army ComSec, it's not a legal/illegal term, it's a methodology, hack, hammer build, versus crack, fool, scam, break. The Crackers talk about/follow/troll about Hackers, Security talks about Hackers. they are not synonyms. Sometimes it looks like instead of reviewers got some confused crackers, attacking the principles of the created site. One does wonder if they come from a disinformation campaign. "Crackers" predates Alan Turing and WWII, goes back to encryption, not a "Response to Media", please deliver contributors from those who think it's all response to mass media (those hacks). | |||
<ref>https://www.forbes.com/sites/johanmoreno/2023/10/31/google-expands-bug-bounty-program-to-include-generative-ai-vulnerabilities/?sh=579d3a9a369b</ref> | |||
<ref>https://builtin.com/software-engineering-perspectives/bug-bounty-hunting</ref> | |||
<ref>https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/</ref> ] (]) 16:23, 28 January 2024 (UTC) | |||
⚫ | :{{Not done for now}}: It's not clear what changes you want to be made. Please mention the specific changes in a ] and provide a ] if appropriate.<!-- Template:ESp --> | ||
:This is all good information, but where in the article does it belong? Also, if you could organize or add more to your references to align with individual claims, this would be great. <br /><span style="float:right">— ]<sup></nowiki>]]</nowiki>]]</sup></span> 15:06, 29 January 2024 (UTC) | |||
{{reflist-talk}} | |||
https://www.facebook.com/Black.Eagle.Analytics.Data/posts/pfbid02rir3gQ2cd5zwcPKjmsR8dMD3zgrriXaeCWTp1jzB5jfSYcMYy2iEgkrznM8HPkVbl?__cft__=AZU1eGAhz_dwg9pboKK7kJ8CmGmh1C3ZhrpqkmtxDCX_IWLfhMS0CKRQCnFL92kvVZBiTvzG_LijBICMEL8UAnzHtG3A4u41RcOumoW_0gXrKigt98nsd3wesXonLUmi3pF5fthkXjX7z_AoVjhBVdku&__tn__=%2CO%2CP-R ] (]) 19:28, 20 May 2023 (UTC) |
Latest revision as of 08:26, 24 March 2024
This is the talk page for discussing improvements to the Hacker article. This is not a forum for general discussion of the article's subject. |
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1, 2, 3, 4, 5, 6 |
This article is rated C-class on Misplaced Pages's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||
|
Semi-protected edit request on 28 January 2024
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Role of White-hat hackers in securing organizations from outside:
White-hat hackers, play a crucial role in enhancing cybersecurity through their participation in bug bounty programs. These programs are initiatives where organizations invite hackers to identify and report vulnerabilities in their systems in exchange for rewards. This collaborative approach turns potential adversaries into allies, leveraging their skills to preemptively discover and rectify security flaws before malicious attackers can exploit them. By simulating real-world attacks, ethical hackers expose weaknesses in security systems, allowing companies to strengthen their defenses. This proactive defense strategy not only bolsters the security of the company but also contributes to the overall safety of the digital ecosystem. Through bug bounty programs, ethical hackers provide invaluable insights into security vulnerabilities, helping companies to stay one step ahead of cyber threats.
Companies like Google and Microsoft actively encourage white-hat hackers to participate in their bug bounty programs, recognizing the invaluable role these ethical hackers play in fortifying their cybersecurity. These tech giants offer substantial financial rewards for the discovery of vulnerabilities in their systems, creating a strong incentive for skilled hackers to seek out and report potential security issues. The rewards are often scaled based on the severity and complexity of the discovered bug, encouraging thorough and innovative exploration.
Additionally, these companies foster a community of ethical hacking by providing clear guidelines and resources, ensuring that participants can test and report safely and legally. They often host conferences and workshops, offering platforms for knowledge sharing and collaboration among cybersecurity professionals. Recognizing the contributors not only with monetary rewards but also with public acknowledgments and hall of fame listings, these companies build a positive relationship with the white-hat hacker community. This approach not only improves their own security posture but also advances the field of cybersecurity as a whole, promoting a safer digital environment for all users.
Kathan3009 (talk) 16:23, 28 January 2024 (UTC)
- Not done for now: It's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate.
- This is all good information, but where in the article does it belong? Also, if you could organize or add more to your references to align with individual claims, this would be great.
— Urro 15:06, 29 January 2024 (UTC)
References
- https://bugbase.in/products/bug-bounty
- https://www.forbes.com/sites/johanmoreno/2023/10/31/google-expands-bug-bounty-program-to-include-generative-ai-vulnerabilities/?sh=579d3a9a369b
- https://builtin.com/software-engineering-perspectives/bug-bounty-hunting
- https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/
- C-Class Computing articles
- High-importance Computing articles
- C-Class software articles
- High-importance software articles
- C-Class software articles of High-importance
- All Software articles
- C-Class Computer hardware articles
- Mid-importance Computer hardware articles
- C-Class Computer hardware articles of Mid-importance
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles
- C-Class Internet culture articles
- High-importance Internet culture articles
- WikiProject Internet culture articles