Misplaced Pages

Talk:Hacker

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

This is an old revision of this page, as edited by The Wordsmith (talk | contribs) at 21:31, 8 February 2024 (Protected "Talk:Hacker": Persistent vandalism and disruptive editing. If you have questions about editing Misplaced Pages, please seek guidance at the Teahouse. ( (expires 21:31, 8 February 2025 (UTC)))). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Revision as of 21:31, 8 February 2024 by The Wordsmith (talk | contribs) (Protected "Talk:Hacker": Persistent vandalism and disruptive editing. If you have questions about editing Misplaced Pages, please seek guidance at the Teahouse. ( (expires 21:31, 8 February 2025 (UTC))))(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)
This is the talk page for discussing improvements to the Hacker article.
This is not a forum for general discussion of the article's subject.
Article policies
Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL
Archives: 1, 2, 3, 4, 5, 6
This article has not yet been rated on Misplaced Pages's content assessment scale.
It is of interest to the following WikiProjects:
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
WikiProject iconComputing: Software / Security High‑importance
WikiProject iconThis article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing
HighThis article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Software (assessed as High-importance).
Taskforce icon
This article is supported by Computer hardware task force (assessed as Mid-importance).
Taskforce icon
This article is supported by WikiProject Computer Security (assessed as High-importance).
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconPopular culture (inactive)
WikiProject iconThis article is within the scope of WikiProject Popular culture, a project which is currently considered to be inactive.Popular cultureWikipedia:WikiProject Popular cultureTemplate:WikiProject Popular culturePopular culture
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
WikiProject iconInternet culture High‑importance
WikiProject iconThis article is within the scope of WikiProject Internet culture, a collaborative effort to improve the coverage of internet culture on Misplaced Pages. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Internet cultureWikipedia:WikiProject Internet cultureTemplate:WikiProject Internet cultureInternet culture
HighThis article has been rated as High-importance on the project's importance scale.
WikiProject Internet culture To-do:

Here are some tasks awaiting attention:


Wiki Education Foundation-supported course assignment

This article was the subject of a Wiki Education Foundation-supported course assignment, between 25 August 2020 and 10 December 2020. Further details are available on the course page. Student editor(s): Cbk5351. Peer reviewers: Apple1223.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 22:05, 17 January 2022 (UTC)

Wiki Education Foundation-supported course assignment

This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s): Nlombardo97.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 22:57, 16 January 2022 (UTC)

Semi-protected edit request on 10 February 2021

This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.
62.20.62.209 (talk) 13:39, 10 February 2021 (UTC)

Gustav Vasa hade en stor påverkan på den Sverige vi nu lever i

Translation: Gustav I of Sweden had a large impact on the Sweden we live in today

 Not done: this is the talk page for discussing improvements to the page Hacker. If possible, please make your request at the talk page for the article concerned. If you cannot edit the article's talk page, you can instead make your request at Misplaced Pages:Requests for page protection#Current requests for edits to a protected page. Gaioa (T C L) 13:49, 10 February 2021 (UTC)

Semi-protected edit request on 3 March 2021

This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.

First sentence grammer error can you please change their to his/her Sugarface127 (talk) 16:21, 3 March 2021 (UTC)

It is fine to use the Singular they in prose. ScottishFinnishRadish (talk) 16:49, 3 March 2021 (UTC)

Semi-protected edit request on 30 April 2022

This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.

I believe another paragraph on motivation needs to be added for a minor reason. One significant trend in the hacking community is not necessarily to gain appreciation from fellow hackers for the skill, but to test limits for the sake of curiosity. There have been many cases prosecutored recently in the United States that shows curiosity was the primary motivation. I believe this needs to be reflected. Crownthescholar (talk) 02:18, 30 April 2022 (UTC)

 Not done: it's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate. ScottishFinnishRadish (talk) 02:22, 30 April 2022 (UTC)

Semi-protected edit request on 15 December 2022

This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.

Change the first image from:

] at ] 2011|alt=see caption]]

To:

]

Why:

  • The proposed image better shows people actually doing hacking.
  • It also avoids any confusion about the ethics or legality of hacking by avoiding the term jailbreaking.
  • It contains descriptive alt text.

-- 71.227.138.128 (talk) 22:22, 15 December 2022 (UTC)

 Done RealAspects (talk) 13:20, 20 December 2022 (UTC)

Hackers & Painters

Hackers are both people who circumventing controls and and people who building things in creative or unorthodox ways. At different times and in different contexts either definition can be more predominant. Should this article be rewritten to present a more balanced description of hackers, with appropriate citations of course? -- 71.227.138.128 (talk) 16:45, 22 December 2022 (UTC)

|To disabuse Hacker

being an etymology article, instead of a bunch of buzzwords such as VPN or whether it's authorized by government, or which should be separate articles of 'cracking' not 'hacking' but it was reverted.

Seems any reversion should include whatever the reviewer is 'feeling', and some type of appeal mechanism. And as far as mechanisms, that citations automatically refer to other Misplaced Pages, told on English help chat that would be self-referring that the producers' programmers of Misplaced Pages are wrong?!!


Is it that you writers don't want to be automatically called criminals as computer programmers seem to be by the offensive article? Then my revisions should be considered as disabusing. Here's a hint, capable ready people aren't going to help if having to go through months of attempting to correct something, we'll simply stop donating.


I did make three revisions, to review. Despite modern 'feelings' it's better to be called a cheap horse working tirelessly, that to be congratulated as a criminal simply because we happen to write. The article is personally offensive.

Perhaps a better infrastructure, where the reviewers ideas are reviewed by a larger voting panel? Up votes or down votes like Stack Exchange? What I just experienced of reviewers saying every wiki article is wrong and can't be referenced as 'service'.. insane.

Take the 'new' reference, a DARPA tech-transfer officer from Army ComSec, it's not a legal/illegal term, it's a methodology, hack, hammer build, versus crack, fool, scam, break. The Crackers talk about/follow/troll about Hackers, Security talks about Hackers. they are not synonyms. Sometimes it looks like instead of reviewers got some confused crackers, attacking the principles of the created site. One does wonder if they come from a disinformation campaign. "Crackers" predates Alan Turing and WWII, goes back to encryption, not a "Response to Media", please deliver contributors from those who think it's all response to mass media (those hacks).

https://www.facebook.com/Black.Eagle.Analytics.Data/posts/pfbid02rir3gQ2cd5zwcPKjmsR8dMD3zgrriXaeCWTp1jzB5jfSYcMYy2iEgkrznM8HPkVbl?__cft__=AZU1eGAhz_dwg9pboKK7kJ8CmGmh1C3ZhrpqkmtxDCX_IWLfhMS0CKRQCnFL92kvVZBiTvzG_LijBICMEL8UAnzHtG3A4u41RcOumoW_0gXrKigt98nsd3wesXonLUmi3pF5fthkXjX7z_AoVjhBVdku&__tn__=%2CO%2CP-R ShaneMaddoxBruce (talk) 19:28, 20 May 2023 (UTC)

Semi-protected edit request on 28 January 2024

This edit request has been answered. Set the |answered= or |ans= parameter to no to reactivate your request.

Role of White-hat hackers in securing organizations from outside:

White-hat hackers, play a crucial role in enhancing cybersecurity through their participation in bug bounty programs. These programs are initiatives where organizations invite hackers to identify and report vulnerabilities in their systems in exchange for rewards. This collaborative approach turns potential adversaries into allies, leveraging their skills to preemptively discover and rectify security flaws before malicious attackers can exploit them. By simulating real-world attacks, ethical hackers expose weaknesses in security systems, allowing companies to strengthen their defenses. This proactive defense strategy not only bolsters the security of the company but also contributes to the overall safety of the digital ecosystem. Through bug bounty programs, ethical hackers provide invaluable insights into security vulnerabilities, helping companies to stay one step ahead of cyber threats.

Companies like Google and Microsoft actively encourage white-hat hackers to participate in their bug bounty programs, recognizing the invaluable role these ethical hackers play in fortifying their cybersecurity. These tech giants offer substantial financial rewards for the discovery of vulnerabilities in their systems, creating a strong incentive for skilled hackers to seek out and report potential security issues. The rewards are often scaled based on the severity and complexity of the discovered bug, encouraging thorough and innovative exploration.

Additionally, these companies foster a community of ethical hacking by providing clear guidelines and resources, ensuring that participants can test and report safely and legally. They often host conferences and workshops, offering platforms for knowledge sharing and collaboration among cybersecurity professionals. Recognizing the contributors not only with monetary rewards but also with public acknowledgments and hall of fame listings, these companies build a positive relationship with the white-hat hacker community. This approach not only improves their own security posture but also advances the field of cybersecurity as a whole, promoting a safer digital environment for all users.

Kathan3009 (talk) 16:23, 28 January 2024 (UTC)

Not done for now: It's not clear what changes you want to be made. Please mention the specific changes in a "change X to Y" format and provide a reliable source if appropriate.
This is all good information, but where in the article does it belong? Also, if you could organize or add more to your references to align with individual claims, this would be great.
Urro 15:06, 29 January 2024 (UTC)
  1. https://bugbase.in/products/bug-bounty
  2. https://www.forbes.com/sites/johanmoreno/2023/10/31/google-expands-bug-bounty-program-to-include-generative-ai-vulnerabilities/?sh=579d3a9a369b
  3. https://builtin.com/software-engineering-perspectives/bug-bounty-hunting
  4. https://www.infosecurity-magazine.com/news/microsoft-defender-bug-bounty/
Categories: