Misplaced Pages

Talk:Hacker: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editContent deleted Content addedVisualWikitext
Revision as of 20:28, 1 January 2024 view sourceMrOllie (talk | contribs)Extended confirmed users, Pending changes reviewers, Rollbackers237,381 editsm Reverted 1 edit by 38.137.32.23 (talk) to last revision by JohnuniqTags: Twinkle Undo← Previous edit Latest revision as of 08:26, 24 March 2024 view source GreenC bot (talk | contribs)Bots2,555,764 edits Add {{reflist-talk}} to #Semi-protected edit request on 28 January 2024 (via reftalk bot) 
(37 intermediate revisions by 21 users not shown)
Line 1: Line 1:
{{pp-semi-indef|small=yes}}
{{Talk header}} {{Talk header}}
{{WikiProject banner shell|1= {{WikiProject banner shell|class=C|1=
{{WikiProject Computing |class=C |importance=high |software=yes |software-importance=high |security=yes |security-importance=high |hardware=yes |hardware-importance=mid}} {{WikiProject Computing |importance=high |software=yes |software-importance=high |security=yes |security-importance=high |hardware=yes |hardware-importance=mid}}
{{WikiProject Popular Culture|class=C |importance=high}} {{WikiProject Popular Culture|importance=high}}
{{WikiProject Internet culture|class=c |importance=high}} {{WikiProject Internet culture|importance=high}}

}} }}
<!--- Archive basics needs ]. Configured by ] ---> <!--- Archive basics needs ]. Configured by ] --->
Line 15: Line 15:
}} }}


== Semi-protected edit request on 28 January 2024 ==
==Wiki Education Foundation-supported course assignment==
] This article was the subject of a Wiki Education Foundation-supported course assignment, between <span class="mw-formatted-date" title="2020-08-25">25 August 2020</span> and <span class="mw-formatted-date" title="2020-12-10">10 December 2020</span>. Further details are available ]. Student editor(s): ]. Peer reviewers: ].

{{small|Above undated message substituted from ] by ] (]) 22:05, 17 January 2022 (UTC)}}

==Wiki Education Foundation-supported course assignment==
] This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available ]. Student editor(s): ].

{{small|Above undated message substituted from ] by ] (]) 22:57, 16 January 2022 (UTC)}}
== Semi-protected edit request on 10 February 2021 ==


{{edit semi-protected|Hacker|answered=yes}} {{edit semi-protected|Hacker|answered=yes}}
'''Role of White-hat hackers in securing organizations from outside:
] (]) 13:39, 10 February 2021 (UTC)
'''
Gustav Vasa hade en stor påverkan på den Sverige vi nu lever i

<small>Translation: ''Gustav I of Sweden had a large impact on the Sweden we live in today''</small>
:] '''Not done:''' this is the ] for discussing improvements to the page ]. If possible, please make your request at the talk page for the article concerned. If you cannot edit the article's talk page, you can instead make your request at ].<!-- Template:ESp --> ] (] ] ]) 13:49, 10 February 2021 (UTC)

== Semi-protected edit request on 3 March 2021 ==

{{edit semi-protected|Hacker|answered=yes}}
First sentence grammer error can you please change their to his/her ] (]) 16:21, 3 March 2021 (UTC)
:It is fine to use the ] in prose. ] (]) 16:49, 3 March 2021 (UTC)

== Semi-protected edit request on 30 April 2022 ==

{{edit semi-protected|Hacker|answered=yes}}
I believe another paragraph on motivation needs to be added for a minor reason. One significant trend in the hacking community is not necessarily to gain appreciation from fellow hackers for the skill, but to test limits for the sake of curiosity. There have been many cases prosecutored recently in the United States that shows curiosity was the primary motivation. I believe this needs to be reflected. ] (]) 02:18, 30 April 2022 (UTC)
:] '''Not done:''' it's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a ] if appropriate.<!-- Template:ESp --> ] (]) 02:22, 30 April 2022 (UTC)

== Semi-protected edit request on 15 December 2022 ==

{{Edit semi-protected|Hacker|answered=yes}}

Change the first image from:

<nowiki>
] at ] 2011|alt=see caption]]
</nowiki>

To:

<nowiki>
]
</nowiki>

Why:
* The proposed image better shows people actually doing hacking.
* It also avoids any confusion about the ethics or legality of hacking by avoiding the term jailbreaking.
* It contains descriptive alt text.

-- ] (]) 22:22, 15 December 2022 (UTC)
:{{done}}<!-- Template:ESp --> ] (]) 13:20, 20 December 2022 (UTC)

== Hackers & Painters ==

Hackers are both people who circumventing controls and and people who building things in creative or unorthodox ways. At different times and in different contexts either definition can be more predominant. Should this article be rewritten to present a more balanced description of hackers, with appropriate citations of course?
-- ] (]) 16:45, 22 December 2022 (UTC)

== |To disabuse Hacker ==

being an etymology article, instead of a bunch of buzzwords such as VPN or whether it's authorized by government, or which should be separate articles of 'cracking' not 'hacking' but it was reverted.

Seems any reversion should include whatever the reviewer is 'feeling', and some type of appeal mechanism. And as far as mechanisms, that citations automatically refer to other Misplaced Pages, told on English help chat that would be self-referring that the producers' programmers of Misplaced Pages are wrong?!!


Is it that you writers don't want to be automatically called criminals as computer programmers seem to be by the offensive article? Then my revisions should be considered as disabusing. Here's a hint, capable ready people aren't going to help if having to go through months of attempting to correct something, we'll simply stop donating.


White-hat hackers, play a crucial role in enhancing cybersecurity through their participation in bug bounty programs. These programs are initiatives where organizations invite hackers to identify and report vulnerabilities in their systems in exchange for rewards. This collaborative approach turns potential adversaries into allies, leveraging their skills to preemptively discover and rectify security flaws before malicious attackers can exploit them. By simulating real-world attacks, ethical hackers expose weaknesses in security systems, allowing companies to strengthen their defenses. This proactive defense strategy not only bolsters the security of the company but also contributes to the overall safety of the digital ecosystem. Through bug bounty programs, ethical hackers provide invaluable insights into security vulnerabilities, helping companies to stay one step ahead of cyber threats.


Companies like Google and Microsoft actively encourage white-hat hackers to participate in their bug bounty programs, recognizing the invaluable role these ethical hackers play in fortifying their cybersecurity. These tech giants offer substantial financial rewards for the discovery of vulnerabilities in their systems, creating a strong incentive for skilled hackers to seek out and report potential security issues. The rewards are often scaled based on the severity and complexity of the discovered bug, encouraging thorough and innovative exploration.
I did make three revisions, to review. Despite modern 'feelings' it's better to be called a cheap horse working tirelessly, that to be congratulated as a criminal simply because we happen to write. The article is personally offensive.


Additionally, these companies foster a community of ethical hacking by providing clear guidelines and resources, ensuring that participants can test and report safely and legally. They often host conferences and workshops, offering platforms for knowledge sharing and collaboration among cybersecurity professionals. Recognizing the contributors not only with monetary rewards but also with public acknowledgments and hall of fame listings, these companies build a positive relationship with the white-hat hacker community. This approach not only improves their own security posture but also advances the field of cybersecurity as a whole, promoting a safer digital environment for all users.
Perhaps a better infrastructure, where the reviewers ideas are reviewed by a larger voting panel? Up votes or down votes like Stack Exchange? What I just experienced of reviewers saying every wiki article is wrong and can't be referenced as 'service'.. insane.


<ref>https://bugbase.in/products/bug-bounty</ref>
Take the 'new' reference, a DARPA tech-transfer officer from Army ComSec, it's not a legal/illegal term, it's a methodology, hack, hammer build, versus crack, fool, scam, break. The Crackers talk about/follow/troll about Hackers, Security talks about Hackers. they are not synonyms. Sometimes it looks like instead of reviewers got some confused crackers, attacking the principles of the created site. One does wonder if they come from a disinformation campaign. "Crackers" predates Alan Turing and WWII, goes back to encryption, not a "Response to Media", please deliver contributors from those who think it's all response to mass media (those hacks).
<ref>https://www.forbes.com/sites/johanmoreno/2023/10/31/google-expands-bug-bounty-program-to-include-generative-ai-vulnerabilities/?sh=579d3a9a369b</ref>
<ref>https://builtin.com/software-engineering-perspectives/bug-bounty-hunting</ref>
<ref>https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/</ref> ] (]) 16:23, 28 January 2024 (UTC)
:{{Not done for now}}: It's not clear what changes you want to be made. Please mention the specific changes in a ] and provide a ] if appropriate.<!-- Template:ESp -->
:This is all good information, but where in the article does it belong? Also, if you could organize or add more to your references to align with individual claims, this would be great. <br /><span style="float:right">— ]<sup></nowiki>]]</nowiki>]]</sup></span> 15:06, 29 January 2024 (UTC)


{{reflist-talk}}
https://www.facebook.com/Black.Eagle.Analytics.Data/posts/pfbid02rir3gQ2cd5zwcPKjmsR8dMD3zgrriXaeCWTp1jzB5jfSYcMYy2iEgkrznM8HPkVbl?__cft__=AZU1eGAhz_dwg9pboKK7kJ8CmGmh1C3ZhrpqkmtxDCX_IWLfhMS0CKRQCnFL92kvVZBiTvzG_LijBICMEL8UAnzHtG3A4u41RcOumoW_0gXrKigt98nsd3wesXonLUmi3pF5fthkXjX7z_AoVjhBVdku&__tn__=%2CO%2CP-R ] (]) 19:28, 20 May 2023 (UTC)

Latest revision as of 08:26, 24 March 2024

This is the talk page for discussing improvements to the Hacker article.
This is not a forum for general discussion of the article's subject.
Article policies
Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL
Archives: 1, 2, 3, 4, 5, 6
This article is rated C-class on Misplaced Pages's content assessment scale.
It is of interest to the following WikiProjects:
WikiProject iconComputing: Software / Security High‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
HighThis article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Software (assessed as High-importance).
Taskforce icon
This article is supported by Computer hardware task force (assessed as Mid-importance).
Taskforce icon
This article is supported by WikiProject Computer Security (assessed as High-importance).
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconPopular culture (inactive)
WikiProject iconThis article is within the scope of WikiProject Popular culture, a project which is currently considered to be inactive.Popular cultureWikipedia:WikiProject Popular cultureTemplate:WikiProject Popular culturePopular culture
WikiProject iconInternet culture High‑importance
WikiProject iconThis article is within the scope of WikiProject Internet culture, a collaborative effort to improve the coverage of internet culture on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Internet cultureWikipedia:WikiProject Internet cultureTemplate:WikiProject Internet cultureInternet culture
HighThis article has been rated as High-importance on the project's importance scale.
WikiProject Internet culture To-do:

Here are some tasks awaiting attention:


Semi-protected edit request on 28 January 2024

This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.

Role of White-hat hackers in securing organizations from outside:

White-hat hackers, play a crucial role in enhancing cybersecurity through their participation in bug bounty programs. These programs are initiatives where organizations invite hackers to identify and report vulnerabilities in their systems in exchange for rewards. This collaborative approach turns potential adversaries into allies, leveraging their skills to preemptively discover and rectify security flaws before malicious attackers can exploit them. By simulating real-world attacks, ethical hackers expose weaknesses in security systems, allowing companies to strengthen their defenses. This proactive defense strategy not only bolsters the security of the company but also contributes to the overall safety of the digital ecosystem. Through bug bounty programs, ethical hackers provide invaluable insights into security vulnerabilities, helping companies to stay one step ahead of cyber threats.

Companies like Google and Microsoft actively encourage white-hat hackers to participate in their bug bounty programs, recognizing the invaluable role these ethical hackers play in fortifying their cybersecurity. These tech giants offer substantial financial rewards for the discovery of vulnerabilities in their systems, creating a strong incentive for skilled hackers to seek out and report potential security issues. The rewards are often scaled based on the severity and complexity of the discovered bug, encouraging thorough and innovative exploration.

Additionally, these companies foster a community of ethical hacking by providing clear guidelines and resources, ensuring that participants can test and report safely and legally. They often host conferences and workshops, offering platforms for knowledge sharing and collaboration among cybersecurity professionals. Recognizing the contributors not only with monetary rewards but also with public acknowledgments and hall of fame listings, these companies build a positive relationship with the white-hat hacker community. This approach not only improves their own security posture but also advances the field of cybersecurity as a whole, promoting a safer digital environment for all users.

Kathan3009 (talk) 16:23, 28 January 2024 (UTC)

Not done for now: It's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate.
This is all good information, but where in the article does it belong? Also, if you could organize or add more to your references to align with individual claims, this would be great.
Urro 15:06, 29 January 2024 (UTC)

References

  1. https://bugbase.in/products/bug-bounty
  2. https://www.forbes.com/sites/johanmoreno/2023/10/31/google-expands-bug-bounty-program-to-include-generative-ai-vulnerabilities/?sh=579d3a9a369b
  3. https://builtin.com/software-engineering-perspectives/bug-bounty-hunting
  4. https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/
Categories: