Knowledge (XXG)

Talk:Hacker culture

Source 📝

436: 583: 562: 412: 324: 289: 392: 804: 593: 227: 685: 667: 258: 498: 755: 816: 445: 307: 915: 177: 910: 895: 450: 529: 875: 905: 920: 890: 426: 218: 171: 870: 649: 382: 103: 945: 725: 935: 885: 639: 731: 860: 372: 463: 421: 303: 109: 900: 615: 348: 68: 950: 701: 54: 824: 930: 855: 865: 606: 567: 331: 294: 123: 940: 401: 299: 128: 44: 692: 672: 98: 925: 269: 880: 192: 89: 159: 214: 512: 226: 209: 538:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
133: 435: 237: 153: 275: 149: 807:
This article is currently the subject of a Wiki Education Foundation-supported course assignment, between
780: 344: 79: 700:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
614:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
347:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
94: 199: 836: 257: 788: 185: 17: 242: 820: 787:
Please help fix the broken anchors. You can remove this template after fixing the problems. |
582: 561: 507: 75: 767: 239: 165: 832: 598: 48: 541:
Find editors who have shown interest in this subject and ask them to take a look here.
849: 411: 803: 391: 323: 288: 592: 588: 798:
Wiki Education assignment: IFS213-Hacking and Open Source Culture, Fall 2024
611: 340: 241: 336: 840: 775:
This article links to one or more target anchors that no longer exist.
697: 684: 666: 497: 916:
C-Class Free and open-source software articles of Low-importance
749: 251: 243: 39: 26: 496: 434: 410: 390: 489: 484: 479: 474: 184: 911:
Low-importance Free and open-source software articles
896:
C-Class Computer Security articles of High-importance
696:, a collaborative effort to improve the coverage of 610:, a collaborative effort to improve the coverage of 335:, a collaborative effort to improve the coverage of 198: 730:This article has not yet received a rating on the 519:Review importance and quality of existing articles 522:Identify categories related to Computer Security 57:for general discussion of the article's subject. 876:C-Class software articles of Unknown-importance 906:C-Class Free and open-source software articles 8: 921:All Free and open-source software articles 891:High-importance Computer Security articles 661: 556: 528:Identify articles for creation (see also: 458: 283: 510:. Please allow some days for processing. 663: 558: 285: 255: 624:Knowledge (XXG):WikiProject Sociology 357:Knowledge (XXG):WikiProject Computing 7: 871:Unknown-importance software articles 690:This article is within the scope of 604:This article is within the scope of 329:This article is within the scope of 946:Unknown-importance culture articles 710:Knowledge (XXG):WikiProject Culture 274:It is of interest to the following 47:for discussing improvements to the 18:Talk:Hacker (programmer subculture) 936:High-importance sociology articles 886:C-Class Computer Security articles 812: 808: 25: 861:Low-importance Computing articles 535:Identify articles for improvement 74:New to Knowledge (XXG)? Welcome! 815:. Further details are available 802: 779:] The anchor (#Music) has been 753: 683: 665: 591: 581: 560: 322: 287: 256: 225: 69:Click here to start a new topic. 644:This article has been rated as 377:This article has been rated as 901:All Computer Security articles 841:19:39, 15 September 2024 (UTC) 627:Template:WikiProject Sociology 360:Template:WikiProject Computing 1: 831:— Assignment last updated by 704:and see a list of open tasks. 618:and see a list of open tasks. 506:will be generated shortly by 464:WikiProject Computer Security 446:Free and open-source software 443:This article is supported by 422:WikiProject Computer Security 419:This article is supported by 399:This article is supported by 351:and see a list of open tasks. 308:Free and open-source software 66:Put new text under old text. 951:WikiProject Culture articles 713:Template:WikiProject Culture 967: 931:C-Class sociology articles 856:C-Class Computing articles 732:project's importance scale 650:project's importance scale 383:project's importance scale 866:C-Class software articles 729: 678: 643: 576: 457: 442: 418: 398: 376: 317: 282: 104:Be welcoming to newcomers 33:Skip to table of contents 941:C-Class culture articles 32: 926:All Computing articles 781:deleted by other users 501: 439: 415: 395: 345:information technology 264:This article is rated 99:avoid personal attacks 881:All Software articles 819:. Student editor(s): 607:WikiProject Sociology 500: 438: 414: 394: 332:WikiProject Computing 268:on Knowledge (XXG)'s 219:Auto-archiving period 124:Neutral point of view 525:Tag related articles 462:Things you can help 402:WikiProject Software 129:No original research 693:WikiProject Culture 513:More information... 817:on the course page 630:sociology articles 502: 440: 416: 396: 363:Computing articles 270:content assessment 110:dispute resolution 71: 795: 794: 770:in most browsers. 746: 745: 742: 741: 738: 737: 660: 659: 656: 655: 555: 554: 551: 550: 547: 546: 250: 249: 90:Assume good faith 67: 38: 37: 16:(Redirected from 958: 843: 825:article contribs 814: 813:13 December 2024 810: 809:3 September 2024 806: 789:Reporting errors 757: 756: 750: 718: 717: 716:culture articles 714: 711: 708: 687: 680: 679: 669: 662: 632: 631: 628: 625: 622: 601: 596: 595: 585: 578: 577: 572: 564: 557: 530:Article requests 515: 459: 365: 364: 361: 358: 355: 326: 319: 318: 313: 310: 291: 284: 267: 261: 260: 252: 244: 230: 229: 220: 203: 202: 188: 119:Article policies 40: 27: 21: 966: 965: 961: 960: 959: 957: 956: 955: 846: 845: 830: 800: 791: 773: 772: 771: 754: 715: 712: 709: 706: 705: 646:High-importance 629: 626: 623: 620: 619: 597: 590: 571:High‑importance 570: 516: 511: 494: 427:High-importance 362: 359: 356: 353: 352: 311: 297: 265: 246: 245: 240: 217: 145: 140: 139: 138: 115: 85: 23: 22: 15: 12: 11: 5: 964: 962: 954: 953: 948: 943: 938: 933: 928: 923: 918: 913: 908: 903: 898: 893: 888: 883: 878: 873: 868: 863: 858: 848: 847: 799: 796: 793: 792: 786: 785: 784: 768:case-sensitive 762: 761: 760: 758: 744: 743: 740: 739: 736: 735: 728: 722: 721: 719: 702:the discussion 688: 676: 675: 670: 658: 657: 654: 653: 642: 636: 635: 633: 616:the discussion 603: 602: 599:Society portal 586: 574: 573: 565: 553: 552: 549: 548: 545: 544: 543: 542: 539: 536: 533: 526: 523: 520: 504:Article alerts 495: 493: 492: 487: 482: 477: 471: 468: 467: 455: 454: 451:Low-importance 441: 431: 430: 417: 407: 406: 397: 387: 386: 379:Low-importance 375: 369: 368: 366: 349:the discussion 327: 315: 314: 312:Low‑importance 292: 280: 279: 273: 262: 248: 247: 238: 236: 235: 232: 231: 205: 204: 142: 141: 137: 136: 131: 126: 117: 116: 114: 113: 106: 101: 92: 86: 84: 83: 72: 63: 62: 59: 58: 52: 49:Hacker culture 36: 35: 30: 24: 14: 13: 10: 9: 6: 4: 3: 2: 963: 952: 949: 947: 944: 942: 939: 937: 934: 932: 929: 927: 924: 922: 919: 917: 914: 912: 909: 907: 904: 902: 899: 897: 894: 892: 889: 887: 884: 882: 879: 877: 874: 872: 869: 867: 864: 862: 859: 857: 854: 853: 851: 844: 842: 838: 834: 828: 826: 822: 818: 805: 797: 790: 782: 778: 777: 776: 769: 765: 759: 752: 751: 748: 733: 727: 724: 723: 720: 703: 699: 695: 694: 689: 686: 682: 681: 677: 674: 671: 668: 664: 651: 647: 641: 638: 637: 634: 617: 613: 609: 608: 600: 594: 589: 587: 584: 580: 579: 575: 569: 566: 563: 559: 540: 537: 534: 531: 527: 524: 521: 518: 517: 514: 509: 505: 499: 491: 488: 486: 483: 481: 478: 476: 473: 472: 470: 469: 465: 461: 460: 456: 452: 449:(assessed as 448: 447: 437: 433: 432: 428: 425:(assessed as 424: 423: 413: 409: 408: 404: 403: 393: 389: 388: 384: 380: 374: 371: 370: 367: 350: 346: 342: 338: 334: 333: 328: 325: 321: 320: 316: 309: 305: 301: 296: 293: 290: 286: 281: 277: 271: 263: 259: 254: 253: 234: 233: 228: 224: 216: 213: 211: 207: 206: 201: 197: 194: 191: 187: 183: 179: 176: 173: 170: 167: 164: 161: 158: 155: 151: 148: 147:Find sources: 144: 143: 135: 134:Verifiability 132: 130: 127: 125: 122: 121: 120: 111: 107: 105: 102: 100: 96: 93: 91: 88: 87: 81: 77: 76:Learn to edit 73: 70: 65: 64: 61: 60: 56: 50: 46: 42: 41: 34: 31: 29: 28: 19: 829: 821:AdamBarnette 801: 774: 766:Anchors are 763: 747: 691: 645: 605: 503: 444: 420: 400: 378: 330: 276:WikiProjects 222: 208: 195: 189: 181: 174: 168: 162: 156: 146: 118: 43:This is the 172:free images 55:not a forum 850:Categories 833:KAN2035117 621:Sociology 612:sociology 568:Sociology 508:AAlertBot 354:Computing 341:computing 337:computers 295:Computing 112:if needed 95:Be polite 45:talk page 304:Security 300:Software 210:Archives 80:get help 53:This is 51:article. 783:before. 707:Culture 698:culture 673:Culture 648:on the 480:history 381:on the 266:C-class 223:90 days 178:WP refs 166:scholar 343:, and 272:scale. 150:Google 490:purge 485:watch 466:with: 193:JSTOR 154:books 108:Seek 837:talk 811:and 764:Tip: 640:High 475:edit 186:FENS 160:news 97:and 827:). 726:??? 373:Low 200:TWL 852:: 839:) 453:). 429:). 339:, 306:/ 302:/ 298:: 221:: 180:) 78:; 835:( 823:( 734:. 652:. 532:) 405:. 385:. 278:: 215:1 212:: 196:· 190:· 182:· 175:· 169:· 163:· 157:· 152:( 82:. 20:)

Index

Talk:Hacker (programmer subculture)
Skip to table of contents
talk page
Hacker culture
not a forum
Click here to start a new topic.
Learn to edit
get help
Assume good faith
Be polite
avoid personal attacks
Be welcoming to newcomers
dispute resolution
Neutral point of view
No original research
Verifiability
Google
books
news
scholar
free images
WP refs
FENS
JSTOR
TWL
Archives
1


content assessment

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.