Knowledge (XXG)

Security hacker

Source ๐Ÿ“

797:
security measures. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. White hat is the name given to ethical computer hackers, who utilize hacking in a helpful way. White hats are becoming a necessary part of the information security field. They operate under a code, which acknowledges that breaking into other people's computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally. Accordingly, the term bears strong connotations that are favorable or pejorative, depending on the context.
2064: 5319: 5623: 4704: 5635: 5647: 1216: 4552: 980:) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script (i.e. a computer script that automates the hacking) kiddie (i.e. kid, child an individual lacking knowledge and experience, immature), usually with little understanding of the underlying concept. 1399:
is for the hacker to pose as an angry supervisor, and when his/her authority is questioned, threaten to fire the help-desk worker. Social engineering is very effective, because users are the most vulnerable part of an organization. No security devices or programs can keep an organization safe if an employee reveals a password to an unauthorized person.
818:, advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as a wider hacker culture, a view that Raymond has harshly rejected. Instead of a hacker/cracker dichotomy, they emphasize a spectrum of different categories, such as 926:
correct the defect for a fee. Grey hat hackers sometimes find the defect in a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical.
609: 1393:, when protagonist Dade "Zero Cool" Murphy calls a somewhat clueless employee in charge of security at a television network. Posing as an accountant working for the same company, Dade tricks the employee into giving him the phone number of a modem so he can gain access to the company's computer system. 1369:
is a program that uses low-level, hard-to-detect methods to subvert control of an operating system from its legitimate operators. Rootkits usually obscure their installation and attempt to prevent their removal through a subversion of standard system security. They may include replacements for system
1421:
The opposite of intimidation, helpfulness exploits many people's natural instinct to help others solve problems. Rather than acting angry, the hacker acts distressed and concerned. The help desk is the most vulnerable to this type of social engineering, as (a.) its general purpose is to help people;
1398:
Hackers who use this technique must be familiar with their target's security practices in order to trick the system administrator into giving them information. In some cases, a help-desk employee with limited security experience will answer the phone and be relatively easy to trick. Another approach
925:
A grey hat hacker lies between a black hat and a white hat hacker, hacking for ideological reasons. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to
1327:
is the process of recovering passwords from data that has been stored in or transmitted by a computer system. Common approaches include repeatedly trying guesses for the password, trying the most common passwords by hand, and repeatedly trying passwords from a "dictionary", or a text file with many
1890:
Local Hackfest groups organize and compete to develop their skills to send a team to a prominent convention to compete in group pentesting, exploit and forensics on a larger scale. Hacker groups became popular in the early 1980s, providing access to hacking information and resources and a place to
2027:
A computer exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the
1527:
are defined as series of repeatable steps that can be applied to simulate an attack against the security of a system. They can be used for testing purposes or locating potential vulnerabilities. They also provide, either physically or in reference, a common solution pattern for preventing a given
1511:
is a tool designed to record ("log") every keystroke on an affected machine for later retrieval, usually to allow the user of this tool to gain access to confidential information typed on the affected machine. Some keyloggers use virus-, trojan-, and rootkit-like methods to conceal themselves.
796:
In computer security, a hacker is someone who focuses on the security mechanisms of computer and network systems. Hackers can include someone who endeavors to strengthen security mechanisms by exploring their weaknesses and also those who seek to access secure, unauthorized information despite
1498:
is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any
1430:
The hacker uses names of authorized users to convince the person who answers the phone that the hacker is a legitimate user him or herself. Some of these names, such as those of webpage owners or company officers, can easily be obtained online. Hackers have also been known to obtain names by
1443:
Using technology is also a way to get information. A hacker can send a fax or email to a legitimate user, seeking a response that contains vital information. The hacker may claim that he or she is involved in law enforcement and needs certain data for an investigation, or for record-keeping
1356:
involves one program, system or website that successfully masquerades as another by falsifying data and is thereby treated as a trusted system by a user or another program โ€“ usually to fool programs, systems or users into revealing confidential information, such as user names and
910:
who performs hacking duties to identify places to repair or as a means of legitimate employment. Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".
1412:
As in the "angry supervisor" technique above, the hacker convinces the person who answers the phone that their job is in danger unless they help them. At this point, many people accept that the hacker is a supervisor and give them the information they
2031:
A computer which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United
4169: 4038: 800:
Subgroups of the computer underground with different attitudes and motives use different terms to demarcate themselves from each other. These classifications are also used to exclude specific groups with whom they do not agree.
565:. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. 3300:
Okpa, John Thompson; Ugwuoke, Christopher Uchechukwu; Ajah, Benjamin Okorie; Eshioste, Emmanuel; Igbe, Joseph Egidi; Ajor, Ogar James; Okoi, Ofem, Nnana; Eteng, Mary Juachi; Nnamani, Rebecca Ginikanwa (September 5, 2022).
849:
is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system." These subgroups may also be defined by the legal status of their activities.
676:
he uses for this. By 1983, hacking in the sense of breaking computer security had already been in use as computer jargon, but there was no public awareness about such activities. However, the release of the film
742:
on September 26, 1983, about the dangers of computer hacking, and six bills concerning computer crime were introduced in the House that year. As a result of these laws against computer criminality, white hat,
1386:
tactics to get enough information to access the network. They may contact the system administrator and pose as a user who cannot get access to his or her system. This technique is portrayed in the 1995 film
1288:. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. ( 3990: 4234: 1130:
Hackers can usually be sorted into two types of attacks: mass attacks and targeted attacks. They are sorted into the groups in terms of how they choose their victims and how they act on the attacks.
687:, raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. This concern became real when, in the same year, a gang of teenage hackers in 4014: 4161: 1596:. In 1995, he was arrested and charged with possession of technology that could be used for fraudulent purposes, and set legal precedents after being denied both a bail hearing and a speedy trial. 594:). A 2014 article noted that "the black-hat meaning still prevails among the general public". The subculture that has evolved around hackers is often referred to as the "computer underground". 4035: 1316:
are used to quickly check all short password variations. For longer passwords, other methods such as the dictionary attack are used, because of the amount of time a brute-force search takes.
2819: 2931: 1300:
Hackers may also attempt to find vulnerabilities manually. A common approach is to search for possible vulnerabilities in the code of the computer system then test them, sometimes
1088:
of by-gone days. These criminals hold computer systems hostage, demanding large payments from victims to restore access to their own computer systems and data. Furthermore, recent
3609: 662:) used the term "hacker" in its title: "The Hacker Papers." It was an excerpt from a Stanford Bulletin Board discussion on the addictive nature of computer use. In the 1982 film 4143: 4123: 3908: 1582:
expert who exposed multiple flaws in the protocol and investigated Sony's rootkit security issues in 2005. He spoke in front of the United States Senate on technology issues.
1928:โ€“ Intentional concealment, destruction or alteration of source code when the computer source code is required to be kept or maintained by law for the time being in force 3418: 4300: 3350: 3256: 1679: 2892:
Although Lifehacker and other neutral or positive applications of the word are increasingly prominent, the black-hat meaning still prevails among the general public.
1895:(BBSs), such as the Utopias, provided platforms for information-sharing via dial-up modem. Hackers could also gain credibility by being affiliated with elite groups. 2576: 1512:
However, some of them are used for legitimate purposes, even to enhance computer security. For example, a business may maintain a keylogger on a computer used at a
4598: 3629: 3987: 3497: 1010:
hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed.
4226: 603: 4011: 3589: 1482:
is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. By doing this, it behaves similarly to a
747:
and black hat hackers try to distinguish themselves from each other, depending on the legality of their activities. These moral conflicts are expressed in
4394: 2546: 536: 629:
The subculture around such hackers is termed network hacker subculture, hacker scene, or computer underground. It initially developed in the context of
3527: 3463: 5142: 5188: 1962:, which is defined as intruding an automated work or a part thereof with intention and against the law. Intrusion is defined as access by means of: 3041: 992:", or "noob") is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking. 898:
is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). The term was coined by
708: 4036:
Kane Gamble: Teenager with autism on Leicestershire housing estate took classified information by fooling people into thinking he was FBI boss
1803:, sentenced to 2 years in youth detention, who is autistic, gained access to highly sensitive information and "cyber-terrorised" high-profile 5119: 4534: 4515: 4473: 4431: 4357: 4338: 4105: 4074: 3848: 3377: 3284: 3240: 3189: 3089: 2957: 366: 5318: 2879: 5673: 4556: 4203: 2816: 1804: 2927: 1840:. The computer underground is frequently compared to the Wild West. It is common for hackers to use aliases to conceal their identities. 1622:(also known as Susan Thunder), was an American hacker active during the late 1970s and early 1980s widely respected for her expertise in 5150: 2599: 1702:
project. He speaks internationally for usage of Tor by human rights groups and others concerned about Internet anonymity and censorship.
715:. The case quickly grew media attention, and 17-year-old Neal Patrick emerged as the spokesman for the gang, including a cover story in 3606: 3103: 2910: 4591: 3934: 3789: 3161: 2015: 2002: 60: 4140: 1486:, which spreads by inserting itself into living cells. While some viruses are harmless or mere hoaxes, most are considered malicious. 5082: 4496: 4452: 4378: 4317: 3971: 3402: 3214: 2775: 2745: 1263: 4120: 3687: 2466: 3930: 3900: 3746:
Weir, Matt, Sudhir Aggarwal, Breno de Medeiros, Bill Glodek. 2009. "Password Cracking Using Probabilistic Context-Free Grammars".
2102:
was often outdated by the time they were published, they enhanced their contributors' reputations by documenting their successes.
1182:
which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through
1156:
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
880:, and certifications, courseware, classes, and online training covering the diverse arena of ethical hacking have been developed. 4878: 2795: 1237: 5650: 3813: 1170:
A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are
5132: 3549: 2249: 2192: 256: 77: 1646:, but later framed them for erasing the system files at US Leasing after a falling out, leading to Mitnick's first conviction. 1304:
the software if the code is not provided. Experienced hackers can easily find patterns in code to find common vulnerabilities.
1778: 1241: 704: 672:) describes his intentions to break into ENCOM's computer system, saying "I've been doing a little hacking here." CLU is the 573: 529: 5678: 4945: 4584: 3569: 2702:
Gao, Xing (2015). "Information security investment for competitive firms with hacker behavior and security requirements".
2617: 1689: 1623: 1383: 889: 876:
for a client, or while working for a security company that makes security software. The term is generally synonymous with
859: 819: 764:
Use of the term hacker meaning computer criminal was also advanced by the title "Stalking the Wily Hacker", an article by
739: 591: 469: 266: 149: 139: 5688: 5181: 4389: 2845: 2473: 2010: 1883: 176: 164: 580:, arguing that it refers simply to someone with an advanced understanding of computers and computer networks, and that 5137: 5058: 4858: 3626: 3426: 2738:
Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day.
2332: 1538:
A thorough examination of hacker tools and procedures may be found in Cengage Learning's E|CSA certification workbook.
1187: 1165: 1149: 1059: โ€“ Making information that is not public, or is public in non-machine-readable formats, accessible to the public. 943: 554: 251: 3489: 1226: 1032:
A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.
3878: 3303:"Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria" 5698: 5693: 5580: 5570: 5565: 5560: 5555: 5550: 5545: 5540: 5535: 5530: 5253: 5114: 5072: 4728: 2403: 2094: 2063: 1608: 1548: 1179: 738:
called for an investigation and began work on new laws against computer hacking. Neal Patrick testified before the
639: 488: 226: 3705: 1340:("packet sniffer") is an application that captures data packets, which can be used to capture passwords and other 1245: 1230: 4975: 4693: 2682: 2375: 2318: 2111: 2077: 1470:, with the conceptually similar function of deceiving defenders into bringing an intruder into a protected area.) 1143: 775: 770: 522: 271: 3586: 1152:: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis. 4960: 4838: 4733: 1660:
to face criminal charges. Many people in the UK called on the authorities to be lenient with McKinnon, who has
1631: 1455: 1116:
of huge ransoms from large companies, hospitals and city governments with little or no chance of being caught.
1050: 873: 447: 406: 376: 326: 4562: 2568: 1292:
defend computers from intruders by limiting access to ports and machines, but they can still be circumvented.)
5683: 5626: 5174: 5048: 5000: 4663: 3523: 3455: 2584: 2459: 2176: 1734: 1699: 1613: 186: 1422:
and (b.) it usually has the authority to change or reset passwords, which is exactly what the hacker wants.
1955: 1892: 1760: 1183: 1056: 441: 2013:, prohibits unauthorized access or damage of "protected computers". "Protected computers" are defined in 902:, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration in 5447: 5089: 4823: 4571: 4294: 4199: 3931:"Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution ..." 3344: 2677: 2346: 1756: 1458:
is a program that seems to be doing one thing but is actually doing another. It can be used to set up a
1281: 1093: 712: 634: 3033: 1284:
is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use
5646: 4263: 5575: 5109: 5021: 4970: 4915: 4783: 4756: 4738: 4703: 4636: 4607: 2766: 2627: 2557: 2513: 2502: 2452: 2410: 2389: 2204: 1879: 1709: 1459: 1289: 1175: 951: 752: 617: 459: 401: 321: 3762:
Thompson, Samuel T. C. "Helping The Hacker? Library Information, Security, And Social Engineering."
5404: 4893: 4668: 4626: 2662: 2524: 2361: 2232: 2222: 1371: 1313: 1301: 1137: 784: 436: 261: 171: 5634: 3836: 2967: 5243: 5077: 5005: 4910: 3332: 3250: 3095: 2991: 2982: 2871: 2719: 2667: 2637: 2535: 2368: 1975: 1837: 1800: 1774: 1603: 1579: 1565: 1046: 4563:
CNN Tech PCWorld Staff (November 2001). Timeline: A 40-year history of hacking from 1960 to 2001
4191: 4066: 4060: 1784: 5608: 5442: 5432: 5399: 5125: 4883: 4818: 4768: 4715: 4673: 4621: 4530: 4511: 4492: 4469: 4448: 4427: 4374: 4353: 4334: 4313: 4275: 4101: 4070: 3967: 3961: 3785: 3666: 3398: 3373: 3324: 3280: 3236: 3210: 3185: 3157: 3085: 2771: 2741: 2352: 1966: 1859: 1849: 1661: 1508: 1324: 1125: 431: 394: 361: 1743:
was a computer security consultant and author, formerly the most wanted computer criminal in
868:
breaks security for non-malicious reasons, either to test their own security system, perform
586:
is the more appropriate term for those who break into computers, whether computer criminals (
5218: 5094: 5034: 4798: 4788: 4683: 4403: 4328: 3658: 3556:, Chapter 14, George Perkovich and Ariel E. Levite, Eds., Georgetown University Press, 2017. 3314: 3134: 3077: 3071: 2904: 2711: 2672: 2652: 2604: 2593: 2396: 2290: 2216: 2187: 2040:
depends on the severity of the violation and the offender's history of violations under the
1981: 1832:. Writing software and performing other activities to support these views is referred to as 1794: 1730: 1705: 1675: 1109: 1081: 907: 899: 895: 869: 865: 748: 654: 562: 411: 112: 3706:"The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security" 2184:, is a young immortal hacker-mage prince who has the ability to traverse shadow dimensions. 5638: 4985: 4965: 4688: 4678: 4147: 4127: 4042: 4018: 3994: 3988:
British teenager who 'cyber-terrorised' US intelligence officials gets two years detention
3691: 3633: 3613: 3593: 3573: 3004: 2962: 2914: 2823: 2647: 2325: 2297: 2276: 2227: 2171: 1812: 1695: 1569: 1559: 1524: 1462:
in a computer system, enabling the intruder to gain access later. (The name refers to the
1432: 1353: 1341: 1337: 935: 809: 659: 191: 82: 4162:"Data leaked by Anonymous appears to reveal Bank of America's hacker profiling operation" 4141:
Feds recover more than $ 2 million in ransomware payments from Colonial Pipeline hackers.
2211: 4012:
British teen Kane Gamble accessed accounts of top US intelligence and security officials
3938: 3684: 2067:
In film and news media, hackers are often depicted as hooded figures typing in the dark.
5308: 5293: 5197: 5155: 5053: 4903: 4853: 4828: 4793: 4773: 4653: 4641: 4022: 2761: 2642: 2562: 2529: 2339: 2265: 2243: 2153: 2149: 2052: 1836:. Some consider illegal cracking ethically justified for these goals; a common form is 1790: 1479: 1389: 1092:
attacks on industries, including energy, food, and transportation, have been blamed on
1042: 903: 788:, published one year later, further entrenched the term in the public's consciousness. 765: 612: 500: 331: 284: 214: 95: 72: 35: 3138: 2791: 2019: 1080:
Groups of hackers that carry out organized criminal activities for profit. Modern-day
5667: 5522: 5477: 5362: 5283: 5228: 5223: 5065: 5026: 4995: 4990: 4843: 4833: 4803: 4485: 4368: 3805: 3336: 2723: 2589: 2540: 2518: 2507: 2304: 2254: 2197: 2181: 1816: 1744: 1740: 1674:
as well as many network security books and web sites. He is a founding member of the
1657: 1649: 1639: 1619: 1513: 1495: 1171: 969: 963: 831: 696: 336: 231: 128: 3366: 3099: 5507: 5389: 5099: 4955: 4658: 3485: 2622: 2431: 2121: 1853: 1768: 1764: 1753:
was a Belgian computer programmer and technologist who was also a privacy advocate.
1750: 1685: 1575: 1463: 1285: 1195: 1069: 947: 877: 735: 669: 424: 291: 244: 99: 3154:
Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime
2006: 1777:(known as Gigabyte) is a Belgian hacker recognized for writing the first virus in 1616:(HOPE) conferences. He has been part of the hacker community since the late 1970s. 553:
or security researcher is someone who explores methods for breaching defenses and
17: 4463: 5585: 5487: 5367: 5288: 5263: 5039: 4873: 4848: 4813: 4648: 3439:
A security professional invited by Microsoft to find vulnerabilities in Windows.
2551: 2438: 2260: 1725:(known as St. Jude) was an American hacker and activist, founding member of the 1722: 1667: 1653: 1643: 1599: 1568:, sentenced to three years in prison, is a grey hat hacker whose security group 1215: 1104:
and ransomware attacks are now the fastest-growing crimes in the United States.
1101: 1097: 814: 782:
provoked the popular media to spread this usage. The popularity of Stoll's book
779: 721:
entitled "Beware: Hackers at play", with Patrick's photograph on the cover. The
494: 381: 118: 3963:
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
3566: 3125:
Caldwell, Tracey (July 22, 2011). "Ethical hackers: putting on the white hat".
3067: 5437: 5419: 5273: 5104: 4920: 4868: 4751: 4631: 4442: 3319: 3302: 2715: 2632: 2417: 2271: 1858:
The computer underground is supported by regular real-world gatherings called
1833: 1726: 1627: 1467: 1202:
and some Web pages. These are very common in Web site and Web domain hacking.
1089: 1035: 1027: 351: 346: 123: 4279: 3670: 3328: 2841: 1370:
binaries, making it virtually impossible for them to be detected by checking
5452: 5327: 5258: 4980: 4935: 4930: 4778: 4746: 4407: 3524:"7 Levels of Hackers: Applying An Ancient Chinese Lesson: Know Your Enemies" 3451: 2858:
Coined ca. 1985 by hackers in defense against journalistic misuse of hacker.
2488: 2311: 2239: 2145: 2128: 2125: 2117: 1863: 1635: 1113: 1085: 1011: 688: 630: 371: 221: 201: 106: 67: 3729:
Kerner, Sean Michael. "Sentry MBA Uses Credential Stuffing To Hack Sites."
4551: 3650: 3081: 5502: 5482: 5335: 5298: 5278: 5238: 4940: 4898: 4761: 4567: 3870: 3662: 2445: 2132: 1985: 1887: 1875: 1828:
The computer underground has produced its own specialized slang, such as
1716: 1589: 1585: 920: 823: 744: 723: 717: 692: 679: 673: 645: 558: 465: 196: 144: 4390:"Dot.Con: The Dangers of Cyber Crime and a Call for Proactive Solutions" 5497: 5492: 5472: 5409: 5268: 5248: 4950: 4925: 4888: 4576: 2657: 2382: 1871: 1867: 1712: 1366: 1105: 1007: 1001: 453: 341: 316: 309: 181: 3068:"Attacks on Computers: Congressional Hearings and Pending Legislation" 5600: 5467: 5462: 5457: 5303: 5233: 5213: 4863: 4808: 4723: 4264:"Hacker types, motivations and strategies: A comprehensive framework" 3683:
Gupta, Ajay; Klavinsky, Thomas and Laliberte, Scott (March 15, 2002)
3587:
What you need to know about ransomware and the future of cyberattacks
2084: 1199: 989: 757: 700: 569: 507: 356: 296: 134: 31: 3651:"Hacker Behavior, Network Effects, and the Security Software Market" 1942:
Imprisonment up to three years, or/and with fine up to 50000 rupees
1931:
Imprisonment up to three years, or/and with fine up to 20000 rupees
4370:
At Large: The Strange Case of the World's Biggest Internet Invasion
2536:
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
1994:
Maximum imprisonment is one year or a fine of the fourth category.
608: 5590: 5427: 5347: 5205: 2164: 2159: 2099: 2062: 1483: 684: 607: 5166: 1133:
A typical approach in an attack on Internet-connected system is:
5512: 5382: 5357: 5352: 4310:
Hackers: The Hunt for Australia's Most Infamous Computer Cracker
3937:, Central District of California. August 9, 1999. Archived from 2424: 1829: 1671: 1382:
In the second stage of the targeting process, hackers often use
664: 5170: 4580: 5394: 5377: 5372: 5340: 4247:
Mr. Gibson's novels and short stories are worshiped by hackers
2048: 1808: 1209: 1191: 4262:
Samuel Chng, Han Yu Lu, Ayush Kumar, David Yau (March 2022).
4081:
Wild West imagery has permeated discussions of cybercultures.
4702: 3901:"Community Memory: Precedents in Social Media and Movements" 1404:
Social engineering can be broken down into four sub-groups:
568:
Longstanding controversy surrounds the meaning of the term "
2928:"Computer hacking: Where did it begin and how did it grow?" 1708:
is a Polish computer security researcher who developed the
1698:
is an advocate, security researcher, and developer for the
3685:
Security Through Penetration Testing: Internet Penetration
2098:. While the information contained in hacker magazines and 27:
Computer security term; someone who hacks computer systems
4227:"A Prince of Cyberpunk Fiction Moves Into the Mainstream" 3607:
Protect against the Fastest-Growing Crime: Cyber Attacks
3456:"Blue Hat summit meant to reveal ways of the other side" 3277:
Cybercrime: Investigating High-Technology Computer Crime
3207:
Cybercrime: Investigating High Technology Computer Crime
2082:
The most notable hacker-oriented print publications are
2051:
has demonstrated its ability to recover ransoms paid in
834:. In contrast to Raymond, they usually reserve the term 625:
Birth of subculture and entering mainstream: 1960sโ€“1980s
4487:
Hacking Exposed: Network Security Secrets and Solutions
4483:
McClure, Stuart; Scambray, Joel; Kurtz, George (1999).
4444:
Cyberpunk: Outlaws and Hackers on the Computer Frontier
3279:(1st ed.). Cincinnati, Ohio: Anderson Publishing. 2036:
The maximum imprisonment or fine for violations of the
942:
is used to describe the most skilled. Newly discovered
3649:
Dey, Debabrata; Lahiri, Atanu; Zhang, Guoying (2011).
3235:. New York, NY: McGraw-Hill/ Irwin. pp. 536โ€“537. 1771:
at many international security and hacker conferences.
1100:โ€“ possibly with the country's knowledge and approval. 4350:
Code Hacking: A Developer's Guide to Network Security
4462:
Harper, Allen; Harris, Shon; Ness, Jonathan (2011).
3871:"Gary McKinnon extradition ruling due by 16 October" 3567:
Ransomware: Should paying hacker ransoms be illegal?
1140:: Discovering information about the intended target. 5599: 5521: 5418: 5326: 5204: 5014: 4714: 4614: 3782:
Penetration Testing: Procedures & Methodologies
3156:. Durham, North Carolina: Carolina Academic Press. 3061: 3059: 1018:to represent a series of security briefing events. 4484: 3960:Holt, Thomas J.; Schel, Bernadette Hlubik (2010). 3365: 954:conferred a kind of credibility on their members. 3748:2009 30th IEEE Symposium on Security and Privacy: 3490:"At Microsoft, Interlopers Sound Off on Security" 3034:"Timeline: The U.S. Government and Cybersecurity" 2770:. McLean, Virginia: IndyPublish.com. p. 61. 731:by the mainstream media in the pejorative sense. 3554:Understanding Cyber Conflict: Fourteen Analogies 3393:Andress, Mandy; Cox, Phil; Tittel, Ed โ€“ (2001). 2156: – are very popular with hackers. 1680:Computer Professionals for Social Responsibility 727:article appears to be the first use of the word 4465:Gray Hat Hacking: The Ethical Hacker's Handbook 2577:Hacking: The Art of Exploitation Second Edition 683:that year, featuring a computer intrusion into 3806:"DEF CON III Archives - Susan Thunder Keynote" 3175: 3173: 5182: 4592: 4100:. University of Minnesota Press. p. 90. 3209:. Matthew Bender & Company. p. 258. 2817:Political notes from 2012: Septemberโ€“December 1787:(lcamtuf) is a prominent security researcher. 695:, broke into computer systems throughout the 530: 8: 4508:Stealing the Network: How to Own a Continent 4367:Freeman, David H.; Mann, Charles C. (1997). 4348:Conway, Richard; Cordingley, Julian (2004). 4299:: CS1 maint: multiple names: authors list ( 4192:"Hackers and Viruses: Questions and Answers" 3349:: CS1 maint: multiple names: authors list ( 3270: 3268: 3266: 3255:: CS1 maint: multiple names: authors list ( 3076:. Oakland, CA, USA: IEEE. pp. 180โ€“186. 2116:Hackers often show an interest in fictional 604:Timeline of computer security hacker history 4130:. Wetboek van Strafrecht, December 27, 2012 3073:1984 IEEE Symposium on Security and Privacy 2756: 2754: 1670:, known by the handle Fyodor, authored the 1572:exposed a flaw in AT&T's iPad security. 1244:. Unsourced material may be challenged and 652:In 1980, an article in the August issue of 5189: 5175: 5167: 4599: 4585: 4577: 4395:Australian Journal of Politics and History 3627:How Bitcoin Has Fueled Ransomware Attacks. 3550:Cybersecurity and the Age of Privateering. 2547:Hackers: Heroes of the Computer Revolution 2174:, the protagonist of the second series in 537: 523: 42: 5143:Security information and event management 4091: 4089: 3318: 2951: 2949: 1735:public computerized bulletin board system 1264:Learn how and when to remove this message 734:Pressured by media coverage, congressman 4426:. Indianapolis, Ind: Que Certification. 3517: 3515: 3231:O'Brien, Marakas, James, George (2011). 3022:. September 5, 1983. pp. 42โ€“46, 48. 2956:Elmer-DeWitt, Philip (August 29, 1983). 2930:. WindowSecurity.com. October 16, 2002. 2028:financial institution or the Government. 1926:Tampering with computer source documents 1907: 4468:(3rd ed.). New York: McGraw-Hill. 2694: 2124:literature and movies. The adoption of 1862:or "hacker cons". These events include 1793:is the pseudonym of the founder of the 1664:. The extradition has now been dropped. 1146:: Identifying potential ways of attack. 633:during the 1960s and the microcomputer 50: 4352:. Hingham, Mass: Charles River Media. 4292: 3764:Information Technology & Libraries 3530:from the original on December 31, 2018 3500:from the original on December 19, 2014 3342: 3248: 3044:from the original on November 16, 2018 3000: 2989: 2882:from the original on November 10, 2015 1688:, who claimed that he hacked into the 1543:Notable intruders and criminal hackers 5120:Host-based intrusion detection system 4527:Hackers: Crime in the Digital Sublime 4441:Hafner, Katie; Markoff, John (1991). 4237:from the original on October 13, 2016 4059:Jordan, Tim; Taylor, Paul A. (2004). 3704:Rodriguez, Chris; Martinez, Richard. 3644: 3642: 3466:from the original on December 3, 2013 2934:from the original on January 16, 2013 2798:from the original on November 8, 2020 2740:John Wiley & Sons. 2005. pg. 92. 1815:or Director of National Intelligence 1729:movement, and one of the creators of 1516:to detect evidence of employee fraud. 1038:can be divided into two main groups: 946:circulate among these hackers. Elite 7: 4308:Apro, Bill; Hammond, Graeme (2005). 3397:. New York, NY: Wiley. p. 638. 1652:is a Scottish hacker who was facing 1242:adding citations to reliable sources 637:of the 1980s. It is implicated with 5151:Runtime application self-protection 4268:Computers in Human Behavior Reports 4172:from the original on April 19, 2016 3881:from the original on August 7, 2019 3816:from the original on April 20, 2019 3522:Chabrow, Eric (February 25, 2012). 2467:Who Am I โ€“ No System Is Safe (film) 1891:learn from other members. Computer 1606:) is the longstanding publisher of 257:forensics-focused operating systems 4510:. Rockland, Mass: Syngress Media. 4447:. New York: Simon & Schuster. 4388:Granville, Johanna (Winter 2003). 4373:. New York: Simon & Schuster. 4312:. Rowville, Vic: Five Mile Press. 4206:from the original on June 10, 2016 4160:Swabey, Pete (February 27, 2013). 3106:from the original on June 24, 2024 2848:from the original on June 29, 2011 1899:Consequences for malicious hacking 841:According to Ralph D. Clifford, a 774:. Later that year, the release by 25: 5083:Security-focused operating system 3911:from the original on July 3, 2019 3851:from the original on May 15, 2019 3784:. Clifton, NY: CENGAGE Learning. 3372:. University of Minnesota Press. 2152: – especially the 2135:from these works is very common. 1759:is a well-known technologist and 1634:. She became heavily involved in 5645: 5633: 5622: 5621: 5317: 4879:Insecure direct object reference 4550: 4491:. Berkeley, Calif: Mcgraw-Hill. 3182:Professional Penetration Testing 1763:who has presented research with 1612:. He is also the founder of the 1214: 590:) or computer security experts ( 5133:Information security management 4225:Staples, Brent (May 11, 2003). 3935:United States Attorney's Office 3184:. Syngress Press. p. 503. 2917:, entry "hacker", last meaning. 2572:by Hugo Cornwall (Peter Sommer) 2193:The Girl with the Dragon Tattoo 1592:) is a longstanding writer for 1431:examining discarded documents ( 78:Hacking of consumer electronics 4150:Washington Post, June 7, 2021. 3233:Management Information Systems 3180:Wilhelm, Douglas (2010). "2". 827: 705:Los Alamos National Laboratory 587: 1: 3835:Hafner, Katie (August 1995). 3139:10.1016/s1353-4858(11)70075-7 2870:Yagoda, Ben (March 6, 2014). 2704:Annals of Operations Research 2618:Cracking of wireless networks 2009:, more commonly known as the 1886:, AthCon, Hacker Halted, and 1844:Hacker groups and conventions 1690:Democratic National Committee 1072:operatives of nation states. 1045: โ€“ Activities involving 890:Black hat (computer security) 860:White hat (computer security) 838:for more malicious activity. 768:in the May 1988 issue of the 740:U.S. House of Representatives 709:Sloan-Kettering Cancer Center 3419:"Blue hat hacker Definition" 3066:Bailey, David (April 1984). 2966:. p. 75. Archived from 2958:"The 414 Gang Strikes Again" 2474:Johnny English Strikes Again 2038:Computer Fraud and Abuse Act 2011:Computer Fraud and Abuse Act 1974:By false signals or a false 1884:Chaos Communication Congress 177:Chaos Communication Congress 5674:Hacking (computer security) 5138:Information risk management 5059:Multi-factor authentication 4615:Related security categories 4557:Hacking (computer security) 3966:. IGI Global. p. 146. 3460:Microsoft meets the hackers 3018:"Beware: Hackers at play". 2872:"A Short History of 'Hack'" 2333:Girl With The Dragon Tattoo 1188:Hypertext Transfer Protocol 1166:Exploit (computer security) 815:The New Hacker's Dictionary 5715: 5115:Intrusion detection system 5073:Computer security software 4729:Advanced persistent threat 4333:. Hoboken, NJ: Wiley Pub. 3837:"Kevin Mitnick, unplugged" 3780:Press, EC-Council (2011). 2404:Terminator 2: Judgment Day 2109: 2095:2600: The Hacker Quarterly 2075: 2055:by victims of cybertheft. 1847: 1609:2600: The Hacker Quarterly 1594:2600: The Hacker Quarterly 1557: 1549:List of computer criminals 1546: 1349:Spoofing attack (phishing) 1180:cross-site request forgery 1163: 1123: 1084:have been compared to the 1068:Intelligence agencies and 1025: 999: 961: 918: 887: 857: 640:2600: The Hacker Quarterly 601: 489:2600: The Hacker Quarterly 227:List of computer criminals 29: 5617: 5315: 4700: 4694:Digital rights management 4126:February 2, 2015, at the 3395:CIW Security Professional 3320:10.1177/21582440221122739 2822:December 9, 2012, at the 2792:"The Hacker's Dictionary" 2716:10.1007/s10479-015-1925-2 2683:Vulnerability (computing) 2376:Pirates of Silicon Valley 2112:List of fictional hackers 1499:self-propagating program. 1051:denial-of-service attacks 874:vulnerability assessments 776:Robert Tappan Morris, Jr. 771:Communications of the ACM 5531:Advertising and products 4839:Denial-of-service attack 4734:Arbitrary code execution 4525:Taylor, Paul A. (1999). 4424:Certified Ethical Hacker 4096:Thomas, Douglas (2003). 4062:Hacktivism and Cyberwars 3768:Academic Search Complete 3735:Academic Search Complete 3423:PC Magazine Encyclopedia 3364:Thomas, Douglas (2002). 1632:psychological subversion 1554:Notable security hackers 1076:Organized criminal gangs 572:". In this controversy, 407:Cloud computing security 30:Not to be confused with 5049:Computer access control 5001:Rogue security software 4664:Electromagnetic warfare 4422:Gregg, Michael (2006). 4408:10.1111/1467-8497.00284 3905:Computer History Museum 3655:SSRN Electronic Journal 3616:, CNBC (July 25, 2017). 2585:Out of the Inner Circle 2177:The Chronicles of Amber 1807:officials such as then 1614:Hackers on Planet Earth 1297:Finding vulnerabilities 187:Hackers on Planet Earth 5095:Obfuscation (software) 4824:Browser Helper Objects 4708: 4568:Can Hackers Be Heroes? 4506:Russell, Ryan (2004). 4327:Beaver, Kevin (2010). 4146:June 19, 2021, at the 4065:. Routledge. pp.  4041:July 19, 2019, at the 4017:June 21, 2018, at the 3993:June 14, 2018, at the 3766:25.4 (2006): 222-225. 3711:. Frost & Sullivan 3632:June 19, 2021, at the 3612:June 23, 2021, at the 3592:June 19, 2021, at the 3313:(3): 215824402211227. 3275:Moore, Robert (2006). 3205:Moore, Robert (2005). 2913:April 2, 2018, at the 2842:"Jargon File: Cracker" 2168:manga and anime series 2131:, symbols, values and 2068: 1956:Wetboek van Strafrecht 1893:bulletin board systems 1692:(DNC) computer network 1678:and Vice President of 1642:and Lewis de Payne in 1184:File Transfer Protocol 1144:Vulnerability analysis 1094:criminal organizations 1057:Freedom of information 906:, or the ethos of the 621: 442:Homebrew Computer Club 5090:Data-centric security 4971:Remote access trojans 4706: 4572:Off Book (web series) 4529:. London: Routledge. 4202:. November 12, 2012. 4200:University of Bologna 3941:on September 26, 2009 3907:. February 23, 2016. 3877:. September 6, 2012. 3690:July 3, 2019, at the 3605:Abigail Summerville, 3572:May 21, 2021, at the 3152:Clifford, D. (2011). 3082:10.1109/SP.1984.10012 2986:. September 27, 1983. 2764:(1993). "Part 2(d)". 2678:Technology assessment 2569:The Hacker's Handbook 2347:Live Free or Die Hard 2066: 2059:Hacking and the media 1980:By the use of stolen 1757:Meredith L. Patterson 1672:Nmap Security Scanner 1282:vulnerability scanner 1277:Vulnerability scanner 755:", published 1986 in 713:Security Pacific Bank 703:, including those of 611: 602:Further information: 5679:Computer occupations 5536:Animation and comics 5022:Application security 4916:Privilege escalation 4784:Cross-site scripting 4637:Cybersex trafficking 4608:Information security 4559:at Wikimedia Commons 3663:10.2139/ssrn.1838656 3596:. Vox, Jun 16, 2021. 3526:. GovInfo Security. 3488:(October 17, 2005). 2970:on December 2, 2007. 2905:1981 version of the 2767:The Hacker Crackdown 2628:Cyber Storm Exercise 2558:The Hacker Crackdown 2514:The Art of Intrusion 2503:The Art of Deception 2411:Terminator Salvation 1880:Black Hat Conference 1533:Tools and Procedures 1238:improve this section 1176:cross-site scripting 952:Masters of Deception 753:The Hacker Manifesto 689:Milwaukee, Wisconsin 658:(with commentary by 618:The Hacker Crackdown 574:computer programmers 460:Masters of Deception 402:Application security 5689:Illegal occupations 5405:Padonkaffsky jargon 4669:Information warfare 4627:Automotive security 4330:Hacking for Dummies 3770:. Web. 7 Feb. 2017. 3737:. Web. 7 Feb. 2017. 3636:NPR, June 10, 2021. 2663:Mathematical beauty 1314:Brute-force attacks 1312:Password guessing. 1302:reverse engineering 1138:Network enumeration 1096:based in or near a 1014:also uses the term 437:Chaos Computer Club 172:Black Hat Briefings 46:Part of a series on 5078:Antivirus software 4946:Social engineering 4911:Polymorphic engine 4864:Fraudulent dialers 4769:Hardware backdoors 4709: 4570:Video produced by 4231:The New York Times 4139:Nakashima, Ellen. 4025:. 21 January 2018. 3494:The New York Times 2983:Detroit Free Press 2668:Metasploit Project 2638:Government hacking 2319:Enemy of the State 2106:Hackers in fiction 2069: 1971:By technical means 1960:computervredebreuk 1860:hacker conventions 1838:website defacement 1775:Kimberley Vanvaeck 1624:social engineering 1604:Emmanuel Goldstein 1566:Andrew Auernheimer 1384:social engineering 1379:Social engineering 1309:Brute-force attack 1047:website defacement 622: 267:Social engineering 18:Computer intrusion 5699:Security breaches 5694:Computer security 5661: 5660: 5609:Eternal September 5164: 5163: 5126:Anomaly detection 5031:Secure by default 4884:Keystroke loggers 4819:Drive-by download 4707:vectorial version 4674:Internet security 4622:Computer security 4555:Media related to 4536:978-0-415-18072-6 4517:978-1-931836-05-0 4475:978-0-07-174255-9 4433:978-0-7897-3531-7 4359:978-1-58450-314-9 4340:978-0-7645-5784-2 4107:978-0-8166-3346-3 4076:978-0-415-26003-9 3933:(Press release). 3548:Egloff, Florian. 3454:(June 15, 2005). 3379:978-0-8166-3346-3 3286:978-1-59345-303-9 3242:978-0-07-752217-9 3191:978-1-59749-425-0 3091:978-0-8186-0532-1 2999:Missing or empty 2840:Raymond, Eric S. 2496:Non-fiction books 2205:Heaven's Memo Pad 2020:ยง 1030(e)(2) 1976:cryptographic key 1967:security measures 1954:Article 138ab of 1946: 1945: 1850:Hacker conference 1805:U.S. intelligence 1662:Asperger syndrome 1504:Keystroke logging 1433:"dumpster diving" 1344:over the network. 1325:Password cracking 1321:Password cracking 1274: 1273: 1266: 1160:Security exploits 1126:Computer security 972:(also known as a 870:penetration tests 778:of the so-called 576:reclaim the term 547: 546: 395:Computer security 362:Keystroke logging 16:(Redirected from 5706: 5649: 5637: 5625: 5624: 5321: 5219:Creepy treehouse 5191: 5184: 5177: 5168: 5035:Secure by design 4966:Hardware Trojans 4799:History sniffing 4789:Cross-site leaks 4684:Network security 4601: 4594: 4587: 4578: 4554: 4540: 4521: 4502: 4490: 4479: 4458: 4437: 4418: 4416: 4414: 4384: 4363: 4344: 4323: 4304: 4298: 4290: 4288: 4286: 4250: 4249: 4244: 4242: 4222: 4216: 4215: 4213: 4211: 4188: 4182: 4181: 4179: 4177: 4157: 4151: 4137: 4131: 4118: 4112: 4111: 4093: 4084: 4083: 4056: 4050: 4049:21 January 2018. 4047:The Independent. 4032: 4026: 4008: 4002: 3999:The Independent. 3984: 3978: 3977: 3957: 3951: 3950: 3948: 3946: 3927: 3921: 3920: 3918: 3916: 3897: 3891: 3890: 3888: 3886: 3867: 3861: 3860: 3858: 3856: 3832: 3826: 3825: 3823: 3821: 3802: 3796: 3795: 3777: 3771: 3760: 3754: 3744: 3738: 3727: 3721: 3720: 3718: 3716: 3710: 3701: 3695: 3681: 3675: 3674: 3646: 3637: 3623: 3617: 3603: 3597: 3585:Morrison, Sara. 3583: 3577: 3576:BBC 20 May 2021. 3563: 3557: 3546: 3540: 3539: 3537: 3535: 3519: 3510: 3509: 3507: 3505: 3482: 3476: 3475: 3473: 3471: 3448: 3442: 3441: 3436: 3434: 3429:on March 8, 2013 3425:. Archived from 3415: 3409: 3408: 3390: 3384: 3383: 3371: 3361: 3355: 3354: 3348: 3340: 3322: 3297: 3291: 3290: 3272: 3261: 3260: 3254: 3246: 3228: 3222: 3220: 3202: 3196: 3195: 3177: 3168: 3167: 3149: 3143: 3142: 3127:Network Security 3122: 3116: 3115: 3113: 3111: 3063: 3054: 3053: 3051: 3049: 3040:. May 16, 2003. 3030: 3024: 3023: 3015: 3009: 3008: 3002: 2997: 2995: 2987: 2978: 2972: 2971: 2953: 2944: 2943: 2941: 2939: 2924: 2918: 2901: 2895: 2894: 2889: 2887: 2867: 2861: 2860: 2855: 2853: 2837: 2831: 2814: 2808: 2807: 2805: 2803: 2788: 2782: 2781: 2758: 2749: 2734: 2728: 2727: 2699: 2673:Penetration test 2653:Hacker Manifesto 2605:Suelette Dreyfus 2594:Howard Rheingold 2525:The Cuckoo's Egg 2460:The Fifth Estate 2217:Orson Scott Card 2188:Lisbeth Salander 2078:Hacker magazines 2072:Hacker magazines 2022: 1908: 1795:Openwall Project 1731:Community Memory 1706:Joanna Rutkowska 1676:Honeynet Project 1494:Like a virus, a 1484:biological virus 1269: 1262: 1258: 1255: 1249: 1218: 1210: 1110:cryptocurrencies 1082:computer hackers 908:white hat hacker 900:Richard Stallman 896:black hat hacker 866:white hat hacker 785:The Cuckoo's Egg 655:Psychology Today 557:weaknesses in a 539: 532: 525: 412:Network security 113:Hacker Manifesto 52:Computer hacking 43: 21: 5714: 5713: 5709: 5708: 5707: 5705: 5704: 5703: 5664: 5663: 5662: 5657: 5613: 5595: 5517: 5414: 5322: 5313: 5200: 5195: 5165: 5160: 5010: 4710: 4698: 4689:Copy protection 4679:Mobile security 4610: 4605: 4547: 4537: 4524: 4518: 4505: 4499: 4482: 4476: 4461: 4455: 4440: 4434: 4421: 4412: 4410: 4387: 4381: 4366: 4360: 4347: 4341: 4326: 4320: 4307: 4291: 4284: 4282: 4261: 4258: 4256:Further reading 4253: 4240: 4238: 4224: 4223: 4219: 4209: 4207: 4190: 4189: 4185: 4175: 4173: 4166:Information Age 4159: 4158: 4154: 4148:Wayback Machine 4138: 4134: 4128:Wayback Machine 4119: 4115: 4108: 4095: 4094: 4087: 4077: 4058: 4057: 4053: 4043:Wayback Machine 4033: 4029: 4019:Wayback Machine 4009: 4005: 3995:Wayback Machine 3985: 3981: 3974: 3959: 3958: 3954: 3944: 3942: 3929: 3928: 3924: 3914: 3912: 3899: 3898: 3894: 3884: 3882: 3869: 3868: 3864: 3854: 3852: 3834: 3833: 3829: 3819: 3817: 3804: 3803: 3799: 3792: 3779: 3778: 3774: 3761: 3757: 3745: 3741: 3728: 3724: 3714: 3712: 3708: 3703: 3702: 3698: 3692:Wayback Machine 3682: 3678: 3648: 3647: 3640: 3634:Wayback Machine 3624: 3620: 3614:Wayback Machine 3604: 3600: 3594:Wayback Machine 3584: 3580: 3574:Wayback Machine 3564: 3560: 3547: 3543: 3533: 3531: 3521: 3520: 3513: 3503: 3501: 3484: 3483: 3479: 3469: 3467: 3450: 3449: 3445: 3432: 3430: 3417: 3416: 3412: 3405: 3392: 3391: 3387: 3380: 3363: 3362: 3358: 3341: 3299: 3298: 3294: 3287: 3274: 3273: 3264: 3247: 3243: 3230: 3229: 3225: 3217: 3204: 3203: 3199: 3192: 3179: 3178: 3171: 3164: 3151: 3150: 3146: 3124: 3123: 3119: 3109: 3107: 3092: 3065: 3064: 3057: 3047: 3045: 3038:Washington Post 3032: 3031: 3027: 3017: 3016: 3012: 2998: 2988: 2980: 2979: 2975: 2955: 2954: 2947: 2937: 2935: 2926: 2925: 2921: 2915:Wayback Machine 2902: 2898: 2885: 2883: 2869: 2868: 2864: 2851: 2849: 2839: 2838: 2834: 2824:Wayback Machine 2815: 2811: 2801: 2799: 2790: 2789: 2785: 2778: 2762:Sterling, Bruce 2760: 2759: 2752: 2735: 2731: 2701: 2700: 2696: 2692: 2687: 2648:Hacker (expert) 2613: 2580:by Jon Erickson 2498: 2484: 2479: 2285: 2277:Neal Stephenson 2228:Catherine Jinks 2172:Merlin of Amber 2141: 2114: 2108: 2080: 2076:Main category: 2074: 2061: 2014: 2000: 1951: 1906: 1901: 1856: 1848:Main articles: 1846: 1826: 1785:Michaล‚ Zalewski 1696:Jacob Appelbaum 1602:(also known as 1588:(also known as 1570:Goatse Security 1562: 1560:List of hackers 1556: 1551: 1545: 1525:Attack patterns 1521:Attack patterns 1354:spoofing attack 1342:data in transit 1338:packet analyzer 1333:Packet analyzer 1270: 1259: 1253: 1250: 1235: 1219: 1208: 1168: 1162: 1128: 1122: 1112:facilitate the 1078: 1066: 1030: 1024: 1004: 998: 986: 966: 960: 938:among hackers, 932: 923: 917: 892: 886: 862: 856: 810:Eric S. Raymond 807: 794: 792:Classifications 668:, Kevin Flynn ( 660:Philip Zimbardo 627: 606: 600: 559:computer system 551:security hacker 543: 514: 513: 483: 475: 474: 427: 417: 416: 397: 387: 386: 312: 302: 301: 287: 277: 276: 247: 237: 236: 217: 207: 206: 192:Security BSides 167: 157: 156: 102: 88: 87: 83:List of hackers 63: 39: 28: 23: 22: 15: 12: 11: 5: 5712: 5710: 5702: 5701: 5696: 5691: 5686: 5684:Identity theft 5681: 5676: 5666: 5665: 5659: 5658: 5656: 5655: 5643: 5631: 5618: 5615: 5614: 5612: 5611: 5605: 5603: 5597: 5596: 5594: 5593: 5588: 5583: 5578: 5573: 5568: 5563: 5558: 5553: 5548: 5543: 5538: 5533: 5527: 5525: 5519: 5518: 5516: 5515: 5510: 5505: 5500: 5495: 5490: 5485: 5480: 5475: 5470: 5465: 5460: 5455: 5450: 5445: 5440: 5435: 5430: 5424: 5422: 5416: 5415: 5413: 5412: 5407: 5402: 5397: 5392: 5387: 5386: 5385: 5380: 5375: 5370: 5365: 5355: 5350: 5345: 5344: 5343: 5332: 5330: 5324: 5323: 5316: 5314: 5312: 5311: 5306: 5301: 5296: 5294:Shadow banning 5291: 5286: 5281: 5276: 5271: 5266: 5261: 5256: 5251: 5246: 5241: 5236: 5231: 5226: 5221: 5216: 5210: 5208: 5202: 5201: 5198:Internet slang 5196: 5194: 5193: 5186: 5179: 5171: 5162: 5161: 5159: 5158: 5156:Site isolation 5153: 5148: 5147: 5146: 5140: 5130: 5129: 5128: 5123: 5112: 5107: 5102: 5097: 5092: 5087: 5086: 5085: 5080: 5070: 5069: 5068: 5063: 5062: 5061: 5054:Authentication 5046: 5045: 5044: 5043: 5042: 5032: 5029: 5018: 5016: 5012: 5011: 5009: 5008: 5003: 4998: 4993: 4988: 4983: 4978: 4973: 4968: 4963: 4958: 4953: 4948: 4943: 4938: 4933: 4928: 4923: 4918: 4913: 4908: 4907: 4906: 4896: 4891: 4886: 4881: 4876: 4871: 4866: 4861: 4856: 4854:Email spoofing 4851: 4846: 4841: 4836: 4831: 4826: 4821: 4816: 4811: 4806: 4801: 4796: 4794:DOM clobbering 4791: 4786: 4781: 4776: 4774:Code injection 4771: 4766: 4765: 4764: 4759: 4754: 4749: 4741: 4736: 4731: 4726: 4720: 4718: 4712: 4711: 4701: 4699: 4697: 4696: 4691: 4686: 4681: 4676: 4671: 4666: 4661: 4656: 4654:Cyberterrorism 4651: 4646: 4645: 4644: 4642:Computer fraud 4639: 4629: 4624: 4618: 4616: 4612: 4611: 4606: 4604: 4603: 4596: 4589: 4581: 4575: 4574: 4565: 4560: 4546: 4545:External links 4543: 4542: 4541: 4535: 4522: 4516: 4503: 4497: 4480: 4474: 4459: 4453: 4438: 4432: 4419: 4402:(1): 102โ€“109. 4385: 4379: 4364: 4358: 4345: 4339: 4324: 4318: 4305: 4257: 4254: 4252: 4251: 4217: 4196:Scienzagiovane 4183: 4152: 4132: 4113: 4106: 4098:Hacker Culture 4085: 4075: 4051: 4027: 4023:Deutsche Welle 4003: 4001:21 April 2018. 3979: 3972: 3952: 3922: 3892: 3862: 3827: 3797: 3791:978-1435483675 3790: 3772: 3755: 3739: 3722: 3696: 3694:. informit.com 3676: 3638: 3618: 3598: 3578: 3558: 3541: 3511: 3477: 3443: 3410: 3403: 3385: 3378: 3368:Hacker Culture 3356: 3292: 3285: 3262: 3241: 3223: 3215: 3197: 3190: 3169: 3163:978-1594608537 3162: 3144: 3117: 3090: 3055: 3025: 3010: 2973: 2945: 2919: 2896: 2876:The New Yorker 2862: 2832: 2809: 2783: 2776: 2750: 2736:Winkler, Ira. 2729: 2693: 2691: 2688: 2686: 2685: 2680: 2675: 2670: 2665: 2660: 2655: 2650: 2645: 2643:Hacker culture 2640: 2635: 2630: 2625: 2620: 2614: 2612: 2609: 2608: 2607: 2596: 2581: 2573: 2565: 2563:Bruce Sterling 2554: 2543: 2532: 2530:Clifford Stoll 2521: 2510: 2497: 2494: 2493: 2492: 2483: 2480: 2478: 2477: 2470: 2463: 2456: 2449: 2442: 2435: 2428: 2421: 2414: 2407: 2400: 2393: 2386: 2379: 2372: 2365: 2358: 2350: 2343: 2336: 2329: 2322: 2315: 2308: 2301: 2294: 2286: 2284: 2281: 2280: 2279: 2268: 2266:William Gibson 2257: 2250:Little Brother 2246: 2244:Gardner Dozois 2230: 2219: 2208: 2200: 2185: 2169: 2157: 2154:Sprawl trilogy 2150:William Gibson 2140: 2137: 2107: 2104: 2073: 2070: 2060: 2057: 2053:cryptocurrency 2034: 2033: 2029: 2003:18 U.S.C. 1999: 1996: 1992: 1991: 1990: 1989: 1978: 1972: 1969: 1950: 1947: 1944: 1943: 1940: 1937: 1933: 1932: 1929: 1923: 1919: 1918: 1915: 1912: 1905: 1902: 1900: 1897: 1845: 1842: 1825: 1822: 1821: 1820: 1798: 1791:Solar Designer 1788: 1782: 1772: 1754: 1748: 1738: 1720: 1703: 1693: 1683: 1665: 1647: 1617: 1597: 1583: 1573: 1558:Main article: 1555: 1552: 1547:Main article: 1544: 1541: 1540: 1539: 1530: 1529: 1522: 1518: 1517: 1505: 1501: 1500: 1492: 1488: 1487: 1476: 1475:Computer virus 1472: 1471: 1452: 1448: 1447: 1446: 1445: 1436: 1423: 1414: 1401: 1400: 1395: 1394: 1380: 1376: 1375: 1372:process tables 1363: 1359: 1358: 1350: 1346: 1345: 1334: 1330: 1329: 1322: 1318: 1317: 1310: 1306: 1305: 1298: 1294: 1293: 1278: 1272: 1271: 1222: 1220: 1213: 1207: 1204: 1164:Main article: 1161: 1158: 1154: 1153: 1147: 1141: 1124:Main article: 1121: 1118: 1077: 1074: 1065: 1062: 1061: 1060: 1054: 1043:Cyberterrorism 1026:Main article: 1023: 1020: 1000:Main article: 997: 994: 985: 982: 962:Main article: 959: 956: 931: 928: 919:Main article: 916: 913: 904:hacker culture 888:Main article: 885: 882: 878:ethical hacker 858:Main article: 855: 852: 806: 803: 793: 790: 766:Clifford Stoll 626: 623: 613:Bruce Sterling 599: 596: 545: 544: 542: 541: 534: 527: 519: 516: 515: 512: 511: 504: 501:Nuts and Volts 497: 492: 484: 481: 480: 477: 476: 473: 472: 463: 457: 451: 448:Legion of Doom 445: 439: 434: 428: 423: 422: 419: 418: 415: 414: 409: 404: 398: 393: 392: 389: 388: 385: 384: 379: 374: 369: 364: 359: 354: 349: 344: 339: 334: 329: 324: 319: 313: 308: 307: 304: 303: 300: 299: 294: 288: 285:Practice sites 283: 282: 279: 278: 275: 274: 269: 264: 259: 254: 248: 243: 242: 239: 238: 235: 234: 229: 224: 218: 215:Computer crime 213: 212: 209: 208: 205: 204: 199: 194: 189: 184: 179: 174: 168: 163: 162: 159: 158: 155: 154: 153: 152: 147: 142: 131: 126: 121: 116: 109: 103: 96:Hacker culture 94: 93: 90: 89: 86: 85: 80: 75: 73:Cryptovirology 70: 64: 59: 58: 55: 54: 48: 47: 36:Hacker culture 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 5711: 5700: 5697: 5695: 5692: 5690: 5687: 5685: 5682: 5680: 5677: 5675: 5672: 5671: 5669: 5654: 5653: 5648: 5644: 5642: 5641: 5636: 5632: 5630: 5629: 5620: 5619: 5616: 5610: 5607: 5606: 5604: 5602: 5598: 5592: 5589: 5587: 5584: 5582: 5581:Miscellaneous 5579: 5577: 5574: 5572: 5569: 5567: 5564: 5562: 5559: 5557: 5554: 5552: 5549: 5547: 5544: 5542: 5539: 5537: 5534: 5532: 5529: 5528: 5526: 5524: 5520: 5514: 5511: 5509: 5506: 5504: 5501: 5499: 5496: 5494: 5491: 5489: 5486: 5484: 5481: 5479: 5476: 5474: 5471: 5469: 5466: 5464: 5461: 5459: 5456: 5454: 5451: 5449: 5446: 5444: 5441: 5439: 5436: 5434: 5431: 5429: 5426: 5425: 5423: 5421: 5417: 5411: 5408: 5406: 5403: 5401: 5398: 5396: 5393: 5391: 5388: 5384: 5381: 5379: 5376: 5374: 5371: 5369: 5366: 5364: 5361: 5360: 5359: 5356: 5354: 5351: 5349: 5346: 5342: 5339: 5338: 5337: 5334: 5333: 5331: 5329: 5325: 5320: 5310: 5307: 5305: 5302: 5300: 5297: 5295: 5292: 5290: 5287: 5285: 5284:Script kiddie 5282: 5280: 5277: 5275: 5272: 5270: 5267: 5265: 5262: 5260: 5257: 5255: 5252: 5250: 5247: 5245: 5242: 5240: 5237: 5235: 5232: 5230: 5229:Cyberstalking 5227: 5225: 5224:Cyberbullying 5222: 5220: 5217: 5215: 5212: 5211: 5209: 5207: 5203: 5199: 5192: 5187: 5185: 5180: 5178: 5173: 5172: 5169: 5157: 5154: 5152: 5149: 5144: 5141: 5139: 5136: 5135: 5134: 5131: 5127: 5124: 5121: 5118: 5117: 5116: 5113: 5111: 5108: 5106: 5103: 5101: 5098: 5096: 5093: 5091: 5088: 5084: 5081: 5079: 5076: 5075: 5074: 5071: 5067: 5066:Authorization 5064: 5060: 5057: 5056: 5055: 5052: 5051: 5050: 5047: 5041: 5038: 5037: 5036: 5033: 5030: 5028: 5027:Secure coding 5025: 5024: 5023: 5020: 5019: 5017: 5013: 5007: 5004: 5002: 4999: 4997: 4996:SQL injection 4994: 4992: 4989: 4987: 4984: 4982: 4979: 4977: 4976:Vulnerability 4974: 4972: 4969: 4967: 4964: 4962: 4961:Trojan horses 4959: 4957: 4956:Software bugs 4954: 4952: 4949: 4947: 4944: 4942: 4939: 4937: 4934: 4932: 4929: 4927: 4924: 4922: 4919: 4917: 4914: 4912: 4909: 4905: 4902: 4901: 4900: 4897: 4895: 4892: 4890: 4887: 4885: 4882: 4880: 4877: 4875: 4872: 4870: 4867: 4865: 4862: 4860: 4857: 4855: 4852: 4850: 4847: 4845: 4844:Eavesdropping 4842: 4840: 4837: 4835: 4834:Data scraping 4832: 4830: 4827: 4825: 4822: 4820: 4817: 4815: 4812: 4810: 4807: 4805: 4804:Cryptojacking 4802: 4800: 4797: 4795: 4792: 4790: 4787: 4785: 4782: 4780: 4777: 4775: 4772: 4770: 4767: 4763: 4760: 4758: 4755: 4753: 4750: 4748: 4745: 4744: 4742: 4740: 4737: 4735: 4732: 4730: 4727: 4725: 4722: 4721: 4719: 4717: 4713: 4705: 4695: 4692: 4690: 4687: 4685: 4682: 4680: 4677: 4675: 4672: 4670: 4667: 4665: 4662: 4660: 4657: 4655: 4652: 4650: 4647: 4643: 4640: 4638: 4635: 4634: 4633: 4630: 4628: 4625: 4623: 4620: 4619: 4617: 4613: 4609: 4602: 4597: 4595: 4590: 4588: 4583: 4582: 4579: 4573: 4569: 4566: 4564: 4561: 4558: 4553: 4549: 4548: 4544: 4538: 4532: 4528: 4523: 4519: 4513: 4509: 4504: 4500: 4498:0-07-212127-0 4494: 4489: 4488: 4481: 4477: 4471: 4467: 4466: 4460: 4456: 4454:0-671-68322-5 4450: 4446: 4445: 4439: 4435: 4429: 4425: 4420: 4409: 4405: 4401: 4397: 4396: 4391: 4386: 4382: 4380:0-684-82464-7 4376: 4372: 4371: 4365: 4361: 4355: 4351: 4346: 4342: 4336: 4332: 4331: 4325: 4321: 4319:1-74124-722-5 4315: 4311: 4306: 4302: 4296: 4281: 4277: 4273: 4269: 4265: 4260: 4259: 4255: 4248: 4236: 4232: 4228: 4221: 4218: 4205: 4201: 4197: 4193: 4187: 4184: 4171: 4167: 4163: 4156: 4153: 4149: 4145: 4142: 4136: 4133: 4129: 4125: 4122: 4121:Artikel 138ab 4117: 4114: 4109: 4103: 4099: 4092: 4090: 4086: 4082: 4078: 4072: 4068: 4064: 4063: 4055: 4052: 4048: 4044: 4040: 4037: 4031: 4028: 4024: 4020: 4016: 4013: 4007: 4004: 4000: 3996: 3992: 3989: 3983: 3980: 3975: 3973:9781616928056 3969: 3965: 3964: 3956: 3953: 3940: 3936: 3932: 3926: 3923: 3910: 3906: 3902: 3896: 3893: 3885:September 25, 3880: 3876: 3872: 3866: 3863: 3850: 3846: 3842: 3838: 3831: 3828: 3815: 3811: 3807: 3801: 3798: 3793: 3787: 3783: 3776: 3773: 3769: 3765: 3759: 3756: 3753: 3749: 3743: 3740: 3736: 3732: 3726: 3723: 3707: 3700: 3697: 3693: 3689: 3686: 3680: 3677: 3672: 3668: 3664: 3660: 3656: 3652: 3645: 3643: 3639: 3635: 3631: 3628: 3622: 3619: 3615: 3611: 3608: 3602: 3599: 3595: 3591: 3588: 3582: 3579: 3575: 3571: 3568: 3562: 3559: 3555: 3551: 3545: 3542: 3529: 3525: 3518: 3516: 3512: 3499: 3495: 3491: 3487: 3486:Markoff, John 3481: 3478: 3465: 3462:. CNET News. 3461: 3457: 3453: 3447: 3444: 3440: 3428: 3424: 3420: 3414: 3411: 3406: 3404:0-7645-4822-0 3400: 3396: 3389: 3386: 3381: 3375: 3370: 3369: 3360: 3357: 3352: 3346: 3338: 3334: 3330: 3326: 3321: 3316: 3312: 3308: 3304: 3296: 3293: 3288: 3282: 3278: 3271: 3269: 3267: 3263: 3258: 3252: 3244: 3238: 3234: 3227: 3224: 3218: 3216:1-59345-303-5 3212: 3208: 3201: 3198: 3193: 3187: 3183: 3176: 3174: 3170: 3165: 3159: 3155: 3148: 3145: 3140: 3136: 3132: 3128: 3121: 3118: 3105: 3101: 3097: 3093: 3087: 3083: 3079: 3075: 3074: 3069: 3062: 3060: 3056: 3043: 3039: 3035: 3029: 3026: 3021: 3014: 3011: 3006: 2993: 2985: 2984: 2977: 2974: 2969: 2965: 2964: 2959: 2952: 2950: 2946: 2933: 2929: 2923: 2920: 2916: 2912: 2909: 2908: 2900: 2897: 2893: 2881: 2877: 2873: 2866: 2863: 2859: 2847: 2843: 2836: 2833: 2829: 2825: 2821: 2818: 2813: 2810: 2797: 2793: 2787: 2784: 2779: 2777:1-4043-0641-2 2773: 2769: 2768: 2763: 2757: 2755: 2751: 2747: 2746:9780764589904 2743: 2739: 2733: 2730: 2725: 2721: 2717: 2713: 2709: 2705: 2698: 2695: 2689: 2684: 2681: 2679: 2676: 2674: 2671: 2669: 2666: 2664: 2661: 2659: 2656: 2654: 2651: 2649: 2646: 2644: 2641: 2639: 2636: 2634: 2631: 2629: 2626: 2624: 2621: 2619: 2616: 2615: 2610: 2606: 2602: 2601: 2597: 2595: 2591: 2590:Bill Landreth 2587: 2586: 2582: 2579: 2578: 2574: 2571: 2570: 2566: 2564: 2560: 2559: 2555: 2553: 2549: 2548: 2544: 2542: 2541:Kevin Mitnick 2538: 2537: 2533: 2531: 2527: 2526: 2522: 2520: 2519:Kevin Mitnick 2516: 2515: 2511: 2509: 2508:Kevin Mitnick 2505: 2504: 2500: 2499: 2495: 2491: 2490: 2486: 2485: 2481: 2475: 2471: 2469: 2468: 2464: 2462: 2461: 2457: 2455: 2454: 2453:Weird Science 2450: 2448: 2447: 2443: 2441: 2440: 2436: 2434: 2433: 2429: 2427: 2426: 2422: 2420: 2419: 2415: 2413: 2412: 2408: 2406: 2405: 2401: 2399: 2398: 2394: 2392: 2391: 2387: 2385: 2384: 2380: 2378: 2377: 2373: 2371: 2370: 2366: 2364: 2363: 2359: 2357: 2355: 2351: 2349: 2348: 2344: 2342: 2341: 2337: 2335: 2334: 2330: 2328: 2327: 2323: 2321: 2320: 2316: 2314: 2313: 2309: 2307: 2306: 2302: 2300: 2299: 2295: 2293: 2292: 2288: 2287: 2282: 2278: 2274: 2273: 2269: 2267: 2263: 2262: 2258: 2256: 2255:Cory Doctorow 2252: 2251: 2247: 2245: 2241: 2237: 2235: 2231: 2229: 2225: 2224: 2220: 2218: 2214: 2213: 2209: 2207: 2206: 2201: 2199: 2198:Stieg Larsson 2195: 2194: 2189: 2186: 2183: 2182:Roger Zelazny 2179: 2178: 2173: 2170: 2167: 2166: 2161: 2158: 2155: 2151: 2147: 2143: 2142: 2138: 2136: 2134: 2130: 2127: 2123: 2119: 2113: 2105: 2103: 2101: 2097: 2096: 2091: 2087: 2086: 2079: 2071: 2065: 2058: 2056: 2054: 2050: 2045: 2043: 2039: 2030: 2026: 2025: 2024: 2021: 2017: 2012: 2008: 2004: 1998:United States 1997: 1995: 1987: 1983: 1979: 1977: 1973: 1970: 1968: 1964: 1963: 1961: 1957: 1953: 1952: 1948: 1941: 1938: 1935: 1934: 1930: 1927: 1924: 1921: 1920: 1916: 1913: 1910: 1909: 1903: 1898: 1896: 1894: 1889: 1885: 1881: 1877: 1874:(Christmas), 1873: 1869: 1865: 1861: 1855: 1851: 1843: 1841: 1839: 1835: 1831: 1823: 1818: 1817:James Clapper 1814: 1810: 1806: 1802: 1799: 1796: 1792: 1789: 1786: 1783: 1780: 1776: 1773: 1770: 1766: 1762: 1758: 1755: 1752: 1749: 1746: 1745:United States 1742: 1741:Kevin Mitnick 1739: 1736: 1732: 1728: 1724: 1721: 1718: 1714: 1711: 1707: 1704: 1701: 1697: 1694: 1691: 1687: 1684: 1681: 1677: 1673: 1669: 1666: 1663: 1659: 1658:United States 1655: 1651: 1650:Gary McKinnon 1648: 1645: 1641: 1640:Kevin Mitnick 1637: 1633: 1629: 1625: 1621: 1620:Susan Headley 1618: 1615: 1611: 1610: 1605: 1601: 1598: 1595: 1591: 1587: 1584: 1581: 1577: 1574: 1571: 1567: 1564: 1563: 1561: 1553: 1550: 1542: 1537: 1536: 1535: 1534: 1526: 1523: 1520: 1519: 1515: 1514:point of sale 1510: 1506: 1503: 1502: 1497: 1493: 1491:Computer worm 1490: 1489: 1485: 1481: 1477: 1474: 1473: 1469: 1465: 1461: 1457: 1453: 1451:Trojan horses 1450: 1449: 1442: 1441: 1437: 1434: 1429: 1428: 1427:Name-dropping 1424: 1420: 1419: 1415: 1411: 1410: 1406: 1405: 1403: 1402: 1397: 1396: 1392: 1391: 1385: 1381: 1378: 1377: 1373: 1368: 1364: 1361: 1360: 1355: 1351: 1348: 1347: 1343: 1339: 1335: 1332: 1331: 1326: 1323: 1320: 1319: 1315: 1311: 1308: 1307: 1303: 1299: 1296: 1295: 1291: 1287: 1286:port scanners 1283: 1279: 1276: 1275: 1268: 1265: 1257: 1247: 1243: 1239: 1233: 1232: 1228: 1223:This section 1221: 1217: 1212: 1211: 1205: 1203: 1201: 1197: 1193: 1189: 1185: 1181: 1177: 1173: 1172:SQL injection 1167: 1159: 1157: 1151: 1148: 1145: 1142: 1139: 1136: 1135: 1134: 1131: 1127: 1119: 1117: 1115: 1111: 1107: 1103: 1099: 1095: 1091: 1087: 1083: 1075: 1073: 1071: 1063: 1058: 1055: 1052: 1048: 1044: 1041: 1040: 1039: 1037: 1033: 1029: 1021: 1019: 1017: 1013: 1009: 1003: 995: 993: 991: 988:A neophyte (" 983: 981: 979: 975: 971: 970:script kiddie 965: 964:Script kiddie 958:Script kiddie 957: 955: 953: 949: 945: 941: 937: 936:social status 929: 927: 922: 914: 912: 909: 905: 901: 897: 891: 883: 881: 879: 875: 871: 867: 861: 853: 851: 848: 844: 839: 837: 833: 832:script kiddie 829: 825: 821: 817: 816: 811: 804: 802: 798: 791: 789: 787: 786: 781: 777: 773: 772: 767: 762: 760: 759: 754: 750: 746: 741: 737: 732: 730: 726: 725: 720: 719: 714: 710: 706: 702: 698: 697:United States 694: 690: 686: 682: 681: 675: 671: 667: 666: 661: 657: 656: 650: 648: 647: 642: 641: 636: 632: 624: 620: 619: 614: 610: 605: 597: 595: 593: 589: 585: 584: 579: 575: 571: 566: 564: 560: 556: 552: 540: 535: 533: 528: 526: 521: 520: 518: 517: 510: 509: 505: 503: 502: 498: 496: 493: 491: 490: 486: 485: 479: 478: 471: 467: 464: 461: 458: 455: 452: 449: 446: 443: 440: 438: 435: 433: 430: 429: 426: 421: 420: 413: 410: 408: 405: 403: 400: 399: 396: 391: 390: 383: 380: 378: 375: 373: 370: 368: 365: 363: 360: 358: 355: 353: 350: 348: 345: 343: 340: 338: 335: 333: 330: 328: 325: 323: 320: 318: 315: 314: 311: 306: 305: 298: 295: 293: 290: 289: 286: 281: 280: 273: 272:Vulnerability 270: 268: 265: 263: 260: 258: 255: 253: 250: 249: 246: 245:Hacking tools 241: 240: 233: 232:Script kiddie 230: 228: 225: 223: 220: 219: 216: 211: 210: 203: 200: 198: 195: 193: 190: 188: 185: 183: 180: 178: 175: 173: 170: 169: 166: 161: 160: 151: 148: 146: 143: 141: 138: 137: 136: 132: 130: 129:Maker culture 127: 125: 122: 120: 117: 115: 114: 110: 108: 105: 104: 101: 97: 92: 91: 84: 81: 79: 76: 74: 71: 69: 66: 65: 62: 57: 56: 53: 49: 45: 44: 41: 37: 33: 19: 5651: 5639: 5627: 5100:Data masking 4659:Cyberwarfare 4526: 4507: 4486: 4464: 4443: 4423: 4413:February 20, 4411:. Retrieved 4399: 4393: 4369: 4349: 4329: 4309: 4295:cite journal 4283:. Retrieved 4271: 4267: 4246: 4241:February 20, 4239:. Retrieved 4230: 4220: 4210:February 21, 4208:. Retrieved 4195: 4186: 4176:February 21, 4174:. Retrieved 4165: 4155: 4135: 4116: 4097: 4080: 4061: 4054: 4046: 4030: 4006: 3998: 3982: 3962: 3955: 3943:. Retrieved 3939:the original 3925: 3913:. Retrieved 3904: 3895: 3883:. Retrieved 3874: 3865: 3853:. Retrieved 3844: 3840: 3830: 3818:. Retrieved 3809: 3800: 3781: 3775: 3767: 3763: 3758: 3751: 3747: 3742: 3734: 3730: 3725: 3713:. Retrieved 3699: 3679: 3654: 3625:Myre, Greg. 3621: 3601: 3581: 3561: 3553: 3544: 3534:February 27, 3532:. Retrieved 3502:. Retrieved 3493: 3480: 3468:. Retrieved 3459: 3446: 3438: 3431:. Retrieved 3427:the original 3422: 3413: 3394: 3388: 3367: 3359: 3345:cite journal 3310: 3306: 3295: 3276: 3232: 3226: 3221:Robert Moore 3206: 3200: 3181: 3153: 3147: 3133:(7): 10โ€“13. 3130: 3126: 3120: 3108:. Retrieved 3072: 3046:. Retrieved 3037: 3028: 3019: 3013: 3001:|title= 2981: 2976: 2968:the original 2961: 2938:September 6, 2936:. Retrieved 2922: 2906: 2899: 2891: 2884:. Retrieved 2875: 2865: 2857: 2850:. Retrieved 2835: 2828:stallman.org 2827: 2812: 2800:. Retrieved 2786: 2765: 2737: 2732: 2707: 2703: 2697: 2623:Cyber spying 2598: 2583: 2575: 2567: 2556: 2545: 2534: 2523: 2512: 2501: 2487: 2465: 2458: 2451: 2444: 2437: 2432:Tron: Legacy 2430: 2423: 2416: 2409: 2402: 2395: 2388: 2381: 2374: 2367: 2360: 2353: 2345: 2338: 2331: 2324: 2317: 2310: 2303: 2296: 2289: 2270: 2259: 2248: 2233: 2221: 2212:Ender's Game 2210: 2203: 2191: 2175: 2163: 2122:cyberculture 2115: 2093: 2089: 2083: 2081: 2046: 2041: 2037: 2035: 2001: 1993: 1959: 1925: 1878:(February), 1857: 1854:Hacker group 1827: 1813:John Brennan 1769:Len Sassaman 1765:Dan Kaminsky 1751:Len Sassaman 1733:, the first 1686:Guccifer 2.0 1607: 1593: 1576:Dan Kaminsky 1532: 1531: 1456:Trojan horse 1439: 1438: 1426: 1425: 1417: 1416: 1409:Intimidation 1408: 1407: 1388: 1260: 1251: 1236:Please help 1224: 1169: 1155: 1150:Exploitation 1132: 1129: 1079: 1070:cyberwarfare 1067: 1064:Nation state 1034: 1031: 1015: 1005: 987: 977: 973: 967: 939: 933: 930:Elite hacker 924: 893: 863: 846: 842: 840: 835: 813: 812:, author of 808: 799: 795: 783: 769: 763: 756: 736:Dan Glickman 733: 728: 722: 716: 678: 670:Jeff Bridges 663: 653: 651: 644: 638: 628: 616: 615:, author of 582: 581: 577: 567: 550: 548: 506: 499: 487: 482:Publications 327:Trojan horse 292:HackThisSite 111: 51: 40: 5488:Rickrolling 5289:Shitposting 5264:Little Pink 5040:Misuse case 4874:Infostealer 4849:Email fraud 4814:Data breach 4649:Cybergeddon 4285:January 27, 3733:(2016): 8. 3565:Tidy, Joe. 2907:Jargon File 2710:: 277โ€“300. 2600:Underground 2552:Steven Levy 2439:Untraceable 2369:The Net 2.0 2261:Neuromancer 2236:(anthology) 2223:Evil Genius 2202:Alice from 2007:ยง 1030 1949:Netherlands 1917:Punishment 1801:Kane Gamble 1723:Jude Milhon 1668:Gordon Lyon 1654:extradition 1644:Los Angeles 1600:Eric Corley 1586:Ed Cummings 1418:Helpfulness 1254:August 2011 1102:Cyber theft 1098:state actor 780:Morris worm 691:, known as 649:newsgroup. 495:Hacker News 382:Infostealer 165:Conferences 119:Hackerspace 5668:Categories 5652:Wiktionary 5541:Challenges 5420:Imageboard 5274:Sealioning 5105:Encryption 4981:Web shells 4921:Ransomware 4869:Hacktivism 4632:Cybercrime 3915:August 13, 3855:August 13, 3820:August 12, 3715:August 13, 3452:Fried, Ina 2690:References 2633:Cybercrime 2354:The Matrix 2272:Snow Crash 2148:novels of 2129:pseudonyms 2110:See also: 1965:Defeating 1958:prohibits 1866:(Summer), 1834:hacktivism 1727:cypherpunk 1628:pretexting 1468:Trojan War 1357:passwords. 1328:passwords. 1206:Techniques 1108:and other 1090:ransomware 1086:privateers 1036:Hacktivism 1028:Hacktivist 1022:Hacktivist 749:The Mentor 592:white hats 588:black hats 555:exploiting 352:Logic bomb 347:Ransomware 124:Hacktivism 5453:goatse.cx 5433:Anonymous 5328:Chatspeak 5259:Keylogger 4936:Shellcode 4931:Scareware 4779:Crimeware 4739:Backdoors 4280:2451-9588 3945:April 10, 3847:(2): 80. 3671:1556-5068 3337:252096635 3329:2158-2440 3307:SAGE Open 3251:cite book 3048:April 14, 2992:cite news 2724:207085416 2489:Mr. Robot 2482:TV series 2418:Take Down 2397:Swordfish 2312:Eagle Eye 2291:Antitrust 2240:Jack Dann 2162:from the 2146:cyberpunk 2133:metaphors 2126:fictional 2118:cyberpunk 2016:18 U.S.C. 1986:passwords 1982:usernames 1864:SummerCon 1830:1337speak 1761:biohacker 1710:Blue Pill 1636:phreaking 1509:keylogger 1466:from the 1460:back door 1444:purposes. 1440:Technical 1290:Firewalls 1225:does not 1114:extortion 1012:Microsoft 884:Black hat 854:White hat 828:black hat 820:white hat 635:BBS scene 631:phreaking 470:Blue team 462:(defunct) 456:(defunct) 450:(defunct) 444:(defunct) 432:Anonymous 372:Web shell 222:Crimeware 202:Summercon 150:White hat 140:Black hat 133:Types of 107:Hackathon 68:Phreaking 5628:Category 5571:Politics 5503:Tripcode 5483:Pedobear 5336:Emoticon 5299:Spamming 5279:Phishing 5239:Edgelord 5110:Firewall 5015:Defenses 4941:Spamming 4926:Rootkits 4899:Phishing 4859:Exploits 4235:Archived 4204:Archived 4170:Archived 4144:Archived 4124:Archived 4039:Archived 4015:Archived 3991:Archived 3909:Archived 3879:Archived 3875:BBC News 3849:Archived 3814:Archived 3688:Archived 3630:Archived 3610:Archived 3590:Archived 3570:Archived 3528:Archived 3498:Archived 3464:Archived 3110:July 21, 3104:Archived 3100:15187375 3042:Archived 3020:Newsweek 2932:Archived 2911:Archived 2903:See the 2886:June 21, 2880:Archived 2846:Archived 2820:Archived 2796:Archived 2611:See also 2446:WarGames 2390:Sneakers 2326:Firewall 2298:Blackhat 1888:H.O.P.E. 1876:ShmooCon 1747:history. 1717:Qubes OS 1590:Bernie S 1190:(HTTP), 1008:blue hat 996:Blue hat 984:Neophyte 950:such as 944:exploits 921:Grey hat 915:Grey hat 847:cracking 824:grey hat 745:grey hat 724:Newsweek 718:Newsweek 693:The 414s 680:WarGames 674:software 646:alt.2600 643:and the 466:Red team 322:Backdoor 197:ShmooCon 145:Grey hat 5508:Weeaboo 5498:Rule 63 5493:Rule 34 5410:Sexting 5269:Malware 5249:Griefer 5244:Flaming 4951:Spyware 4894:Payload 4889:Malware 4829:Viruses 4809:Botnets 4716:Threats 4067:133โ€“134 3841:Esquire 3810:DEF CON 3750:391-405 3504:May 31, 3470:May 31, 3433:May 31, 2802:May 23, 2658:IT risk 2383:Skyfall 2362:The Net 2340:Hackers 2234:Hackers 2032:States; 1939:Hacking 1914:Offence 1911:Section 1872:HoHoCon 1868:DEF CON 1824:Customs 1713:rootkit 1656:to the 1528:attack. 1390:Hackers 1367:rootkit 1362:Rootkit 1246:removed 1231:sources 1186:(FTP), 1120:Attacks 1106:Bitcoin 1016:BlueHat 1002:BlueHat 978:skiddie 843:cracker 836:cracker 805:Cracker 598:History 583:cracker 563:network 454:LulzSec 342:Spyware 317:Rootkit 310:Malware 262:Payload 252:Exploit 182:DEF CON 135:hackers 61:History 5640:Portal 5601:Usenet 5576:Videos 5561:Images 5556:Gaming 5473:O RLY? 5468:Newbie 5458:Lolcat 5304:Tankie 5254:Hacker 5234:Doxing 5214:Baizuo 5145:(SIEM) 5122:(HIDS) 5006:Zombie 4743:Bombs 4724:Adware 4533:  4514:  4495:  4472:  4451:  4430:  4377:  4356:  4337:  4316:  4278:  4104:  4073:  3970:  3788:  3669:  3401:  3376:  3335:  3327:  3283:  3239:  3213:  3188:  3160:  3098:  3088:  2852:May 8, 2774:  2744:  2722:  2356:series 2305:Cypher 2100:ezines 2090:Hakin9 2085:Phrack 2018:  2005:  1811:chief 1630:, and 1578:was a 1200:Telnet 1053:; and, 990:newbie 948:groups 758:Phrack 729:hacker 701:Canada 578:hacker 570:hacker 508:Phrack 425:Groups 357:Botnet 297:Zone-H 32:Hacker 5591:TL;DR 5566:Music 5546:Email 5523:Memes 5438:-chan 5428:4chan 5363:Owned 5348:Emoji 5309:Troll 5206:Abuse 4991:Worms 4986:Wiper 4904:Voice 4752:Logic 3731:Eweek 3709:(PDF) 3333:S2CID 3096:S2CID 2720:S2CID 2283:Films 2165:.hack 2160:Helba 2139:Books 1904:India 1638:with 1480:virus 1464:horse 1413:seek. 940:elite 685:NORAD 332:Virus 100:ethic 5586:Doge 5551:Film 5513:Yiff 5463:Lurk 5448:Clop 5400:NSFW 5383:w00t 5368:Pr0n 5358:Leet 5353:Hodl 4757:Time 4747:Fork 4531:ISBN 4512:ISBN 4493:ISBN 4470:ISBN 4449:ISBN 4428:ISBN 4415:2014 4375:ISBN 4354:ISBN 4335:ISBN 4314:ISBN 4301:link 4287:2022 4276:ISSN 4243:2017 4212:2014 4178:2014 4102:ISBN 4071:ISBN 3968:ISBN 3947:2010 3917:2017 3887:2012 3857:2017 3822:2017 3786:ISBN 3717:2013 3667:ISSN 3552:In: 3536:2012 3506:2010 3472:2010 3435:2010 3399:ISBN 3374:ISBN 3351:link 3325:ISSN 3281:ISBN 3257:link 3237:ISBN 3211:ISBN 3186:ISBN 3158:ISBN 3131:2011 3112:2023 3086:ISBN 3050:2006 3005:help 2963:Time 2940:2015 2888:2019 2854:2010 2804:2013 2772:ISBN 2742:ISBN 2592:and 2425:Tron 2242:and 2144:The 2120:and 2092:and 2047:The 2023:as: 1984:and 1852:and 1767:and 1715:and 1496:worm 1229:any 1227:cite 1178:and 974:skid 830:and 751:'s " 711:and 699:and 665:Tron 367:HIDS 337:Worm 98:and 5395:LOL 5390:Fap 5378:Teh 5373:Pwn 5341:uwu 4762:Zip 4404:doi 4045:". 4021:". 3997:". 3845:124 3659:doi 3315:doi 3135:doi 3078:doi 2712:doi 2708:235 2603:by 2588:by 2561:by 2550:by 2539:by 2528:by 2517:by 2506:by 2275:by 2264:by 2253:by 2238:by 2226:by 2215:by 2196:by 2190:in 2180:by 2049:FBI 2042:Act 1809:CIA 1700:Tor 1580:DNS 1240:by 1196:SSH 1192:PHP 1049:or 976:or 872:or 845:or 561:or 377:RCE 34:or 5670:: 5478:OP 5443:CP 4400:49 4398:. 4392:. 4297:}} 4293:{{ 4274:. 4270:. 4266:. 4245:. 4233:. 4229:. 4198:. 4194:. 4168:. 4164:. 4088:^ 4079:. 4069:. 3903:. 3873:. 3843:. 3839:. 3812:. 3808:. 3665:. 3657:. 3653:. 3641:^ 3514:^ 3496:. 3492:. 3458:. 3437:. 3421:. 3347:}} 3343:{{ 3331:. 3323:. 3311:12 3309:. 3305:. 3265:^ 3253:}} 3249:{{ 3172:^ 3129:. 3102:. 3094:. 3084:. 3070:. 3058:^ 3036:. 2996:: 2994:}} 2990:{{ 2960:. 2948:^ 2890:. 2878:. 2874:. 2856:. 2844:. 2826:. 2794:. 2753:^ 2718:. 2706:. 2088:, 2044:. 1936:66 1922:65 1882:, 1870:, 1779:C# 1626:, 1507:A 1478:A 1454:A 1435:). 1365:A 1352:A 1336:A 1280:A 1198:, 1194:, 1174:, 1006:A 968:A 934:A 894:A 864:A 826:, 822:, 761:. 707:, 549:A 468:/ 5190:e 5183:t 5176:v 4600:e 4593:t 4586:v 4539:. 4520:. 4501:. 4478:. 4457:. 4436:. 4417:. 4406:: 4383:. 4362:. 4343:. 4322:. 4303:) 4289:. 4272:5 4214:. 4180:. 4110:. 4034:" 4010:" 3986:" 3976:. 3949:. 3919:. 3889:. 3859:. 3824:. 3794:. 3752:. 3719:. 3673:. 3661:: 3538:. 3508:. 3474:. 3407:. 3382:. 3353:) 3339:. 3317:: 3289:. 3259:) 3245:. 3219:. 3194:. 3166:. 3141:. 3137:: 3114:. 3080:: 3052:. 3007:) 3003:( 2942:. 2830:. 2806:. 2780:. 2748:. 2726:. 2714:: 2476:" 2472:" 1988:. 1819:. 1797:. 1781:. 1737:. 1719:. 1682:. 1374:. 1267:) 1261:( 1256:) 1252:( 1248:. 1234:. 538:e 531:t 524:v 38:. 20:)

Index

Computer intrusion
Hacker
Hacker culture
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture
ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON
Hackers on Planet Earth
Security BSides
ShmooCon
Summercon
Computer crime
Crimeware

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘