This is an old revision of this page, as edited by 2409:40e1:10:a10e:c478:1aff:fedb:a3c2 (talk) at 05:44, 8 February 2024 (→WhatsApp hacking: new section). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Revision as of 05:44, 8 February 2024 by 2409:40e1:10:a10e:c478:1aff:fedb:a3c2 (talk) (→WhatsApp hacking: new section)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)This is the talk page for discussing improvements to the Hacker article. This is not a forum for general discussion of the article's subject. |
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1, 2, 3, 4, 5, 6 |
This article has not yet been rated on Misplaced Pages's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
{{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
|
Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 25 August 2020 and 10 December 2020. Further details are available on the course page. Student editor(s): Cbk5351. Peer reviewers: Apple1223.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 22:05, 17 January 2022 (UTC)
Wiki Education Foundation-supported course assignment
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s): Nlombardo97.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 22:57, 16 January 2022 (UTC)
Semi-protected edit request on 10 February 2021
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
62.20.62.209 (talk) 13:39, 10 February 2021 (UTC)
Gustav Vasa hade en stor påverkan på den Sverige vi nu lever i
Translation: Gustav I of Sweden had a large impact on the Sweden we live in today
- Not done: this is the talk page for discussing improvements to the page Hacker. If possible, please make your request at the talk page for the article concerned. If you cannot edit the article's talk page, you can instead make your request at Misplaced Pages:Requests for page protection#Current requests for edits to a protected page. Gaioa (T C L) 13:49, 10 February 2021 (UTC)
Semi-protected edit request on 3 March 2021
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
First sentence grammer error can you please change their to his/her Sugarface127 (talk) 16:21, 3 March 2021 (UTC)
- It is fine to use the Singular they in prose. ScottishFinnishRadish (talk) 16:49, 3 March 2021 (UTC)
Semi-protected edit request on 30 April 2022
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
I believe another paragraph on motivation needs to be added for a minor reason. One significant trend in the hacking community is not necessarily to gain appreciation from fellow hackers for the skill, but to test limits for the sake of curiosity. There have been many cases prosecutored recently in the United States that shows curiosity was the primary motivation. I believe this needs to be reflected. Crownthescholar (talk) 02:18, 30 April 2022 (UTC)
- Not done: it's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate. ScottishFinnishRadish (talk) 02:22, 30 April 2022 (UTC)
Semi-protected edit request on 15 December 2022
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Change the first image from:
] at ] 2011|alt=see caption]]
To:
]
Why:
- The proposed image better shows people actually doing hacking.
- It also avoids any confusion about the ethics or legality of hacking by avoiding the term jailbreaking.
- It contains descriptive alt text.
-- 71.227.138.128 (talk) 22:22, 15 December 2022 (UTC)
Hackers & Painters
Hackers are both people who circumventing controls and and people who building things in creative or unorthodox ways. At different times and in different contexts either definition can be more predominant. Should this article be rewritten to present a more balanced description of hackers, with appropriate citations of course? -- 71.227.138.128 (talk) 16:45, 22 December 2022 (UTC)
|To disabuse Hacker
being an etymology article, instead of a bunch of buzzwords such as VPN or whether it's authorized by government, or which should be separate articles of 'cracking' not 'hacking' but it was reverted.
Seems any reversion should include whatever the reviewer is 'feeling', and some type of appeal mechanism. And as far as mechanisms, that citations automatically refer to other Misplaced Pages, told on English help chat that would be self-referring that the producers' programmers of Misplaced Pages are wrong?!!
Is it that you writers don't want to be automatically called criminals as computer programmers seem to be by the offensive article? Then my revisions should be considered as disabusing. Here's a hint, capable ready people aren't going to help if having to go through months of attempting to correct something, we'll simply stop donating.
I did make three revisions, to review. Despite modern 'feelings' it's better to be called a cheap horse working tirelessly, that to be congratulated as a criminal simply because we happen to write. The article is personally offensive.
Perhaps a better infrastructure, where the reviewers ideas are reviewed by a larger voting panel? Up votes or down votes like Stack Exchange? What I just experienced of reviewers saying every wiki article is wrong and can't be referenced as 'service'.. insane.
Take the 'new' reference, a DARPA tech-transfer officer from Army ComSec, it's not a legal/illegal term, it's a methodology, hack, hammer build, versus crack, fool, scam, break. The Crackers talk about/follow/troll about Hackers, Security talks about Hackers. they are not synonyms. Sometimes it looks like instead of reviewers got some confused crackers, attacking the principles of the created site. One does wonder if they come from a disinformation campaign. "Crackers" predates Alan Turing and WWII, goes back to encryption, not a "Response to Media", please deliver contributors from those who think it's all response to mass media (those hacks).
https://www.facebook.com/Black.Eagle.Analytics.Data/posts/pfbid02rir3gQ2cd5zwcPKjmsR8dMD3zgrriXaeCWTp1jzB5jfSYcMYy2iEgkrznM8HPkVbl?__cft__=AZU1eGAhz_dwg9pboKK7kJ8CmGmh1C3ZhrpqkmtxDCX_IWLfhMS0CKRQCnFL92kvVZBiTvzG_LijBICMEL8UAnzHtG3A4u41RcOumoW_0gXrKigt98nsd3wesXonLUmi3pF5fthkXjX7z_AoVjhBVdku&__tn__=%2CO%2CP-R ShaneMaddoxBruce (talk) 19:28, 20 May 2023 (UTC)
Semi-protected edit request on 28 January 2024
This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request. |
Role of White-hat hackers in securing organizations from outside:
White-hat hackers, play a crucial role in enhancing cybersecurity through their participation in bug bounty programs. These programs are initiatives where organizations invite hackers to identify and report vulnerabilities in their systems in exchange for rewards. This collaborative approach turns potential adversaries into allies, leveraging their skills to preemptively discover and rectify security flaws before malicious attackers can exploit them. By simulating real-world attacks, ethical hackers expose weaknesses in security systems, allowing companies to strengthen their defenses. This proactive defense strategy not only bolsters the security of the company but also contributes to the overall safety of the digital ecosystem. Through bug bounty programs, ethical hackers provide invaluable insights into security vulnerabilities, helping companies to stay one step ahead of cyber threats.
Companies like Google and Microsoft actively encourage white-hat hackers to participate in their bug bounty programs, recognizing the invaluable role these ethical hackers play in fortifying their cybersecurity. These tech giants offer substantial financial rewards for the discovery of vulnerabilities in their systems, creating a strong incentive for skilled hackers to seek out and report potential security issues. The rewards are often scaled based on the severity and complexity of the discovered bug, encouraging thorough and innovative exploration.
Additionally, these companies foster a community of ethical hacking by providing clear guidelines and resources, ensuring that participants can test and report safely and legally. They often host conferences and workshops, offering platforms for knowledge sharing and collaboration among cybersecurity professionals. Recognizing the contributors not only with monetary rewards but also with public acknowledgments and hall of fame listings, these companies build a positive relationship with the white-hat hacker community. This approach not only improves their own security posture but also advances the field of cybersecurity as a whole, promoting a safer digital environment for all users.
Kathan3009 (talk) 16:23, 28 January 2024 (UTC)
- Not done for now: It's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate.
- This is all good information, but where in the article does it belong? Also, if you could organize or add more to your references to align with individual claims, this would be great.
— Urro 15:06, 29 January 2024 (UTC)
WhatsApp hacking
Whatsapp hacking coding 2409:40E1:10:A10E:C478:1AFF:FEDB:A3C2 (talk) 05:44, 8 February 2024 (UTC)
- https://bugbase.in/products/bug-bounty
- https://www.forbes.com/sites/johanmoreno/2023/10/31/google-expands-bug-bounty-program-to-include-generative-ai-vulnerabilities/?sh=579d3a9a369b
- https://builtin.com/software-engineering-perspectives/bug-bounty-hunting
- https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/
- All unassessed articles
- C-Class Computing articles
- High-importance Computing articles
- C-Class software articles
- High-importance software articles
- C-Class software articles of High-importance
- All Software articles
- C-Class Computer hardware articles
- Mid-importance Computer hardware articles
- C-Class Computer hardware articles of Mid-importance
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles
- C-Class Internet culture articles
- High-importance Internet culture articles
- WikiProject Internet culture articles