Revision as of 23:54, 24 January 2024 view sourceThe Wordsmith (talk | contribs)Edit filter managers, Autopatrolled, Administrators15,541 editsm Reverted edit by 50.233.252.66 (talk) to last version by MrOllieTag: Rollback← Previous edit | Revision as of 16:23, 28 January 2024 view source Kathan3009 (talk | contribs)1 edit →Semi-protected edit request on 28 January 2024: new sectionNext edit → | ||
Line 91: | Line 91: | ||
https://www.facebook.com/Black.Eagle.Analytics.Data/posts/pfbid02rir3gQ2cd5zwcPKjmsR8dMD3zgrriXaeCWTp1jzB5jfSYcMYy2iEgkrznM8HPkVbl?__cft__=AZU1eGAhz_dwg9pboKK7kJ8CmGmh1C3ZhrpqkmtxDCX_IWLfhMS0CKRQCnFL92kvVZBiTvzG_LijBICMEL8UAnzHtG3A4u41RcOumoW_0gXrKigt98nsd3wesXonLUmi3pF5fthkXjX7z_AoVjhBVdku&__tn__=%2CO%2CP-R ] (]) 19:28, 20 May 2023 (UTC) | https://www.facebook.com/Black.Eagle.Analytics.Data/posts/pfbid02rir3gQ2cd5zwcPKjmsR8dMD3zgrriXaeCWTp1jzB5jfSYcMYy2iEgkrznM8HPkVbl?__cft__=AZU1eGAhz_dwg9pboKK7kJ8CmGmh1C3ZhrpqkmtxDCX_IWLfhMS0CKRQCnFL92kvVZBiTvzG_LijBICMEL8UAnzHtG3A4u41RcOumoW_0gXrKigt98nsd3wesXonLUmi3pF5fthkXjX7z_AoVjhBVdku&__tn__=%2CO%2CP-R ] (]) 19:28, 20 May 2023 (UTC) | ||
== Semi-protected edit request on 28 January 2024 == | |||
{{edit semi-protected|Hacker|answered=no}} | |||
'''Role of White-hat hackers in securing organizations from outside: | |||
''' | |||
White-hat hackers, play a crucial role in enhancing cybersecurity through their participation in bug bounty programs. These programs are initiatives where organizations invite hackers to identify and report vulnerabilities in their systems in exchange for rewards. This collaborative approach turns potential adversaries into allies, leveraging their skills to preemptively discover and rectify security flaws before malicious attackers can exploit them. By simulating real-world attacks, ethical hackers expose weaknesses in security systems, allowing companies to strengthen their defenses. This proactive defense strategy not only bolsters the security of the company but also contributes to the overall safety of the digital ecosystem. Through bug bounty programs, ethical hackers provide invaluable insights into security vulnerabilities, helping companies to stay one step ahead of cyber threats. | |||
Companies like Google and Microsoft actively encourage white-hat hackers to participate in their bug bounty programs, recognizing the invaluable role these ethical hackers play in fortifying their cybersecurity. These tech giants offer substantial financial rewards for the discovery of vulnerabilities in their systems, creating a strong incentive for skilled hackers to seek out and report potential security issues. The rewards are often scaled based on the severity and complexity of the discovered bug, encouraging thorough and innovative exploration. | |||
Additionally, these companies foster a community of ethical hacking by providing clear guidelines and resources, ensuring that participants can test and report safely and legally. They often host conferences and workshops, offering platforms for knowledge sharing and collaboration among cybersecurity professionals. Recognizing the contributors not only with monetary rewards but also with public acknowledgments and hall of fame listings, these companies build a positive relationship with the white-hat hacker community. This approach not only improves their own security posture but also advances the field of cybersecurity as a whole, promoting a safer digital environment for all users. | |||
<ref>https://bugbase.in/products/bug-bounty</ref> | |||
<ref>https://www.forbes.com/sites/johanmoreno/2023/10/31/google-expands-bug-bounty-program-to-include-generative-ai-vulnerabilities/?sh=579d3a9a369b</ref> | |||
<ref>https://builtin.com/software-engineering-perspectives/bug-bounty-hunting</ref> | |||
<ref>https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/</ref> ] (]) 16:23, 28 January 2024 (UTC) |
Revision as of 16:23, 28 January 2024
This is the talk page for discussing improvements to the Hacker article. This is not a forum for general discussion of the article's subject. |
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1, 2, 3, 4, 5, 6 |
This article has not yet been rated on Misplaced Pages's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
{{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
|
Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 25 August 2020 and 10 December 2020. Further details are available on the course page. Student editor(s): Cbk5351. Peer reviewers: Apple1223.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 22:05, 17 January 2022 (UTC)
Wiki Education Foundation-supported course assignment
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s): Nlombardo97.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 22:57, 16 January 2022 (UTC)
Semi-protected edit request on 10 February 2021
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
62.20.62.209 (talk) 13:39, 10 February 2021 (UTC)
Gustav Vasa hade en stor påverkan på den Sverige vi nu lever i
Translation: Gustav I of Sweden had a large impact on the Sweden we live in today
- Not done: this is the talk page for discussing improvements to the page Hacker. If possible, please make your request at the talk page for the article concerned. If you cannot edit the article's talk page, you can instead make your request at Misplaced Pages:Requests for page protection#Current requests for edits to a protected page. Gaioa (T C L) 13:49, 10 February 2021 (UTC)
Semi-protected edit request on 3 March 2021
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
First sentence grammer error can you please change their to his/her Sugarface127 (talk) 16:21, 3 March 2021 (UTC)
- It is fine to use the Singular they in prose. ScottishFinnishRadish (talk) 16:49, 3 March 2021 (UTC)
Semi-protected edit request on 30 April 2022
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
I believe another paragraph on motivation needs to be added for a minor reason. One significant trend in the hacking community is not necessarily to gain appreciation from fellow hackers for the skill, but to test limits for the sake of curiosity. There have been many cases prosecutored recently in the United States that shows curiosity was the primary motivation. I believe this needs to be reflected. Crownthescholar (talk) 02:18, 30 April 2022 (UTC)
- Not done: it's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate. ScottishFinnishRadish (talk) 02:22, 30 April 2022 (UTC)
Semi-protected edit request on 15 December 2022
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Change the first image from:
] at ] 2011|alt=see caption]]
To:
]
Why:
- The proposed image better shows people actually doing hacking.
- It also avoids any confusion about the ethics or legality of hacking by avoiding the term jailbreaking.
- It contains descriptive alt text.
-- 71.227.138.128 (talk) 22:22, 15 December 2022 (UTC)
Hackers & Painters
Hackers are both people who circumventing controls and and people who building things in creative or unorthodox ways. At different times and in different contexts either definition can be more predominant. Should this article be rewritten to present a more balanced description of hackers, with appropriate citations of course? -- 71.227.138.128 (talk) 16:45, 22 December 2022 (UTC)
|To disabuse Hacker
being an etymology article, instead of a bunch of buzzwords such as VPN or whether it's authorized by government, or which should be separate articles of 'cracking' not 'hacking' but it was reverted.
Seems any reversion should include whatever the reviewer is 'feeling', and some type of appeal mechanism. And as far as mechanisms, that citations automatically refer to other Misplaced Pages, told on English help chat that would be self-referring that the producers' programmers of Misplaced Pages are wrong?!!
Is it that you writers don't want to be automatically called criminals as computer programmers seem to be by the offensive article? Then my revisions should be considered as disabusing. Here's a hint, capable ready people aren't going to help if having to go through months of attempting to correct something, we'll simply stop donating.
I did make three revisions, to review. Despite modern 'feelings' it's better to be called a cheap horse working tirelessly, that to be congratulated as a criminal simply because we happen to write. The article is personally offensive.
Perhaps a better infrastructure, where the reviewers ideas are reviewed by a larger voting panel? Up votes or down votes like Stack Exchange? What I just experienced of reviewers saying every wiki article is wrong and can't be referenced as 'service'.. insane.
Take the 'new' reference, a DARPA tech-transfer officer from Army ComSec, it's not a legal/illegal term, it's a methodology, hack, hammer build, versus crack, fool, scam, break. The Crackers talk about/follow/troll about Hackers, Security talks about Hackers. they are not synonyms. Sometimes it looks like instead of reviewers got some confused crackers, attacking the principles of the created site. One does wonder if they come from a disinformation campaign. "Crackers" predates Alan Turing and WWII, goes back to encryption, not a "Response to Media", please deliver contributors from those who think it's all response to mass media (those hacks).
https://www.facebook.com/Black.Eagle.Analytics.Data/posts/pfbid02rir3gQ2cd5zwcPKjmsR8dMD3zgrriXaeCWTp1jzB5jfSYcMYy2iEgkrznM8HPkVbl?__cft__=AZU1eGAhz_dwg9pboKK7kJ8CmGmh1C3ZhrpqkmtxDCX_IWLfhMS0CKRQCnFL92kvVZBiTvzG_LijBICMEL8UAnzHtG3A4u41RcOumoW_0gXrKigt98nsd3wesXonLUmi3pF5fthkXjX7z_AoVjhBVdku&__tn__=%2CO%2CP-R ShaneMaddoxBruce (talk) 19:28, 20 May 2023 (UTC)
Semi-protected edit request on 28 January 2024
It is requested that an edit be made to the semi-protected article at Hacker. (edit · history · last · links · protection log)
This template must be followed by a complete and specific description of the request, that is, specify what text should be removed and a verbatim copy of the text that should replace it. "Please change X" is not acceptable and will be rejected; the request must be of the form "please change X to Y".
The edit may be made by any autoconfirmed user. Remember to change the |
Role of White-hat hackers in securing organizations from outside:
White-hat hackers, play a crucial role in enhancing cybersecurity through their participation in bug bounty programs. These programs are initiatives where organizations invite hackers to identify and report vulnerabilities in their systems in exchange for rewards. This collaborative approach turns potential adversaries into allies, leveraging their skills to preemptively discover and rectify security flaws before malicious attackers can exploit them. By simulating real-world attacks, ethical hackers expose weaknesses in security systems, allowing companies to strengthen their defenses. This proactive defense strategy not only bolsters the security of the company but also contributes to the overall safety of the digital ecosystem. Through bug bounty programs, ethical hackers provide invaluable insights into security vulnerabilities, helping companies to stay one step ahead of cyber threats.
Companies like Google and Microsoft actively encourage white-hat hackers to participate in their bug bounty programs, recognizing the invaluable role these ethical hackers play in fortifying their cybersecurity. These tech giants offer substantial financial rewards for the discovery of vulnerabilities in their systems, creating a strong incentive for skilled hackers to seek out and report potential security issues. The rewards are often scaled based on the severity and complexity of the discovered bug, encouraging thorough and innovative exploration.
Additionally, these companies foster a community of ethical hacking by providing clear guidelines and resources, ensuring that participants can test and report safely and legally. They often host conferences and workshops, offering platforms for knowledge sharing and collaboration among cybersecurity professionals. Recognizing the contributors not only with monetary rewards but also with public acknowledgments and hall of fame listings, these companies build a positive relationship with the white-hat hacker community. This approach not only improves their own security posture but also advances the field of cybersecurity as a whole, promoting a safer digital environment for all users.
Kathan3009 (talk) 16:23, 28 January 2024 (UTC)
- https://bugbase.in/products/bug-bounty
- https://www.forbes.com/sites/johanmoreno/2023/10/31/google-expands-bug-bounty-program-to-include-generative-ai-vulnerabilities/?sh=579d3a9a369b
- https://builtin.com/software-engineering-perspectives/bug-bounty-hunting
- https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/
- All unassessed articles
- C-Class Computing articles
- High-importance Computing articles
- C-Class software articles
- High-importance software articles
- C-Class software articles of High-importance
- All Software articles
- C-Class Computer hardware articles
- Mid-importance Computer hardware articles
- C-Class Computer hardware articles of Mid-importance
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles
- C-Class Internet culture articles
- High-importance Internet culture articles
- WikiProject Internet culture articles
- Misplaced Pages semi-protected edit requests