797:
security measures. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. White hat is the name given to ethical computer hackers, who utilize hacking in a helpful way. White hats are becoming a necessary part of the information security field. They operate under a code, which acknowledges that breaking into other people's computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally. Accordingly, the term bears strong connotations that are favorable or pejorative, depending on the context.
5319:
2064:
5623:
4704:
5635:
5647:
1216:
4552:
980:) is an unskilled hacker who breaks into computer systems by using automated tools written by others (usually by other black hat hackers), hence the term script (i.e. a computer script that automates the hacking) kiddie (i.e. kid, child an individual lacking knowledge and experience, immature), usually with little understanding of the underlying concept.
609:
1399:
is for the hacker to pose as an angry supervisor, and when his/her authority is questioned, threaten to fire the help-desk worker. Social engineering is very effective, because users are the most vulnerable part of an organization. No security devices or programs can keep an organization safe if an employee reveals a password to an unauthorized person.
818:, advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as a wider hacker culture, a view that Raymond has harshly rejected. Instead of a hacker/cracker dichotomy, they emphasize a spectrum of different categories, such as
926:
correct the defect for a fee. Grey hat hackers sometimes find the defect in a system and publish the facts to the world instead of a group of people. Even though grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical.
1393:, when protagonist Dade "Zero Cool" Murphy calls a somewhat clueless employee in charge of security at a television network. Posing as an accountant working for the same company, Dade tricks the employee into giving him the phone number of a modem so he can gain access to the company's computer system.
1369:
is a program that uses low-level, hard-to-detect methods to subvert control of an operating system from its legitimate operators. Rootkits usually obscure their installation and attempt to prevent their removal through a subversion of standard system security. They may include replacements for system
1421:
The opposite of intimidation, helpfulness exploits many people's natural instinct to help others solve problems. Rather than acting angry, the hacker acts distressed and concerned. The help desk is the most vulnerable to this type of social engineering, as (a.) its general purpose is to help people;
1398:
Hackers who use this technique must be familiar with their target's security practices in order to trick the system administrator into giving them information. In some cases, a help-desk employee with limited security experience will answer the phone and be relatively easy to trick. Another approach
925:
A grey hat hacker lies between a black hat and a white hat hacker, hacking for ideological reasons. A grey hat hacker may surf the
Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to
1327:
is the process of recovering passwords from data that has been stored in or transmitted by a computer system. Common approaches include repeatedly trying guesses for the password, trying the most common passwords by hand, and repeatedly trying passwords from a "dictionary", or a text file with many
1890:
Local
Hackfest groups organize and compete to develop their skills to send a team to a prominent convention to compete in group pentesting, exploit and forensics on a larger scale. Hacker groups became popular in the early 1980s, providing access to hacking information and resources and a place to
2027:
A computer exclusively for the use of a financial institution or the United States
Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the
1527:
are defined as series of repeatable steps that can be applied to simulate an attack against the security of a system. They can be used for testing purposes or locating potential vulnerabilities. They also provide, either physically or in reference, a common solution pattern for preventing a given
1511:
is a tool designed to record ("log") every keystroke on an affected machine for later retrieval, usually to allow the user of this tool to gain access to confidential information typed on the affected machine. Some keyloggers use virus-, trojan-, and rootkit-like methods to conceal themselves.
796:
In computer security, a hacker is someone who focuses on the security mechanisms of computer and network systems. Hackers can include someone who endeavors to strengthen security mechanisms by exploring their weaknesses and also those who seek to access secure, unauthorized information despite
1498:
is also a self-replicating program. It differs from a virus in that (a.) it propagates through computer networks without user intervention; and (b.) does not need to attach itself to an existing program. Nonetheless, many people use the terms "virus" and "worm" interchangeably to describe any
1430:
The hacker uses names of authorized users to convince the person who answers the phone that the hacker is a legitimate user him or herself. Some of these names, such as those of webpage owners or company officers, can easily be obtained online. Hackers have also been known to obtain names by
1443:
Using technology is also a way to get information. A hacker can send a fax or email to a legitimate user, seeking a response that contains vital information. The hacker may claim that he or she is involved in law enforcement and needs certain data for an investigation, or for record-keeping
1356:
involves one program, system or website that successfully masquerades as another by falsifying data and is thereby treated as a trusted system by a user or another program β usually to fool programs, systems or users into revealing confidential information, such as user names and
910:
who performs hacking duties to identify places to repair or as a means of legitimate employment. Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal".
1412:
As in the "angry supervisor" technique above, the hacker convinces the person who answers the phone that their job is in danger unless they help them. At this point, many people accept that the hacker is a supervisor and give them the information they
2031:
A computer which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United
4169:
4038:
800:
Subgroups of the computer underground with different attitudes and motives use different terms to demarcate themselves from each other. These classifications are also used to exclude specific groups with whom they do not agree.
565:. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.
3300:
Okpa, John
Thompson; Ugwuoke, Christopher Uchechukwu; Ajah, Benjamin Okorie; Eshioste, Emmanuel; Igbe, Joseph Egidi; Ajor, Ogar James; Okoi, Ofem, Nnana; Eteng, Mary Juachi; Nnamani, Rebecca Ginikanwa (September 5, 2022).
849:
is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system." These subgroups may also be defined by the legal status of their activities.
676:
he uses for this. By 1983, hacking in the sense of breaking computer security had already been in use as computer jargon, but there was no public awareness about such activities. However, the release of the film
742:
on
September 26, 1983, about the dangers of computer hacking, and six bills concerning computer crime were introduced in the House that year. As a result of these laws against computer criminality, white hat,
1386:
tactics to get enough information to access the network. They may contact the system administrator and pose as a user who cannot get access to his or her system. This technique is portrayed in the 1995 film
1288:. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (
3990:
4234:
1130:
Hackers can usually be sorted into two types of attacks: mass attacks and targeted attacks. They are sorted into the groups in terms of how they choose their victims and how they act on the attacks.
687:, raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. This concern became real when, in the same year, a gang of teenage hackers in
4014:
4161:
1596:. In 1995, he was arrested and charged with possession of technology that could be used for fraudulent purposes, and set legal precedents after being denied both a bail hearing and a speedy trial.
594:). A 2014 article noted that "the black-hat meaning still prevails among the general public". The subculture that has evolved around hackers is often referred to as the "computer underground".
4035:
1316:
are used to quickly check all short password variations. For longer passwords, other methods such as the dictionary attack are used, because of the amount of time a brute-force search takes.
2819:
2931:
1300:
Hackers may also attempt to find vulnerabilities manually. A common approach is to search for possible vulnerabilities in the code of the computer system then test them, sometimes
1088:
of by-gone days. These criminals hold computer systems hostage, demanding large payments from victims to restore access to their own computer systems and data. Furthermore, recent
3609:
662:) used the term "hacker" in its title: "The Hacker Papers." It was an excerpt from a Stanford Bulletin Board discussion on the addictive nature of computer use. In the 1982 film
4143:
4123:
3908:
1582:
expert who exposed multiple flaws in the protocol and investigated Sony's rootkit security issues in 2005. He spoke in front of the United States Senate on technology issues.
1928:β Intentional concealment, destruction or alteration of source code when the computer source code is required to be kept or maintained by law for the time being in force
3418:
2892:
Although
Lifehacker and other neutral or positive applications of the word are increasingly prominent, the black-hat meaning still prevails among the general public.
1895:(BBSs), such as the Utopias, provided platforms for information-sharing via dial-up modem. Hackers could also gain credibility by being affiliated with elite groups.
1512:
However, some of them are used for legitimate purposes, even to enhance computer security. For example, a business may maintain a keylogger on a computer used at a
3629:
3987:
3497:
1010:
hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch, looking for exploits so they can be closed.
4226:
4011:
3589:
1482:
is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. By doing this, it behaves similarly to a
747:
and black hat hackers try to distinguish themselves from each other, depending on the legality of their activities. These moral conflicts are expressed in
629:
The subculture around such hackers is termed network hacker subculture, hacker scene, or computer underground. It initially developed in the context of
3527:
3463:
256:
1962:, which is defined as intruding an automated work or a part thereof with intention and against the law. Intrusion is defined as access by means of:
4300:
3350:
3256:
1679:
3041:
2576:
992:", or "noob") is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.
4598:
898:
is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). The term was coined by
4036:
Kane Gamble: Teenager with autism on
Leicestershire housing estate took classified information by fooling people into thinking he was FBI boss
1803:, sentenced to 2 years in youth detention, who is autistic, gained access to highly sensitive information and "cyber-terrorised" high-profile
3848:
2957:
1800:
2879:
4556:
4203:
2816:
603:
2927:
1840:. The computer underground is frequently compared to the Wild West. It is common for hackers to use aliases to conceal their identities.
1622:(also known as Susan Thunder), was an American hacker active during the late 1970s and early 1980s widely respected for her expertise in
1702:
project. He speaks internationally for usage of Tor by human rights groups and others concerned about
Internet anonymity and censorship.
715:. The case quickly grew media attention, and 17-year-old Neal Patrick emerged as the spokesman for the gang, including a cover story in
4394:
3606:
3103:
2910:
2546:
536:
17:
5142:
4140:
1486:, which spreads by inserting itself into living cells. While some viruses are harmless or mere hoaxes, most are considered malicious.
5188:
4120:
3687:
3930:
3900:
3746:
Weir, Matt, Sudhir
Aggarwal, Breno de Medeiros, Bill Glodek. 2009. "Password Cracking Using Probabilistic Context-Free Grammars".
2102:
was often outdated by the time they were published, they enhanced their contributors' reputations by documenting their successes.
1182:
which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through
1156:
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.
880:, and certifications, courseware, classes, and online training covering the diverse arena of ethical hacking have been developed.
2795:
5650:
5530:
3813:
1170:
A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are
3549:
708:
1646:, but later framed them for erasing the system files at US Leasing after a falling out, leading to Mitnick's first conviction.
1304:
the software if the code is not provided. Experienced hackers can easily find patterns in code to find common vulnerabilities.
5119:
4534:
4515:
4473:
4431:
4357:
4338:
4105:
4074:
3377:
3284:
3240:
3189:
3089:
672:) describes his intentions to break into ENCOM's computer system, saying "I've been doing a little hacking here." CLU is the
366:
5535:
5673:
1804:
3569:
2702:
Gao, Xing (2015). "Information security investment for competitive firms with hacker behavior and security requirements".
876:
for a client, or while working for a security company that makes security software. The term is generally synonymous with
764:
Use of the term hacker meaning computer criminal was also advanced by the title "Stalking the Wily Hacker", an article by
5150:
2599:
5318:
4389:
2845:
5580:
4591:
3934:
3789:
3161:
2015:
2002:
580:, arguing that it refers simply to someone with an advanced understanding of computers and computer networks, and that
60:
3626:
3426:
2738:
Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and
Criminals You Don't Even Know You Encounter Every Day.
1538:
A thorough examination of hacker tools and procedures may be found in Cengage Learning's E|CSA certification workbook.
1059: β Making information that is not public, or is public in non-machine-readable formats, accessible to the public.
5082:
4496:
4452:
4378:
4317:
3971:
3489:
3402:
3214:
2775:
2745:
1263:
1032:
A hacktivist is a hacker who utilizes technology to publicize a social, ideological, religious or political message.
3878:
3303:"Cyberspace, Black-Hat Hacking and Economic Sustainability of Corporate Organizations in Cross-River State, Nigeria"
1245:
4878:
2466:
1237:
738:
called for an investigation and began work on new laws against computer hacking. Neal Patrick testified before the
5540:
3705:
1340:("packet sniffer") is an application that captures data packets, which can be used to capture passwords and other
5132:
2249:
2192:
1470:, with the conceptually similar function of deceiving defenders into bringing an intruder into a protected area.)
77:
5570:
3586:
1152:: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.
1778:
1660:
to face criminal charges. Many people in the UK called on the authorities to be lenient with McKinnon, who has
1241:
1116:
of huge ransoms from large companies, hospitals and city governments with little or no chance of being caught.
704:
573:
529:
5560:
5555:
4562:
1292:
defend computers from intruders by limiting access to ports and machines, but they can still be circumvented.)
5678:
5545:
4945:
4584:
2617:
1689:
1623:
1383:
889:
859:
819:
739:
591:
469:
266:
149:
139:
5550:
3523:
3455:
1955:
5688:
5181:
2473:
2010:
1883:
1422:
and (b.) it usually has the authority to change or reset passwords, which is exactly what the hacker wants.
176:
164:
5137:
5058:
4858:
2332:
2013:, prohibits unauthorized access or damage of "protected computers". "Protected computers" are defined in
1187:
1165:
1149:
943:
902:, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration in
554:
251:
3931:"Kevin Mitnick sentenced to nearly four years in prison; computer hacker ordered to pay restitution ..."
3004:
1458:
is a program that seems to be doing one thing but is actually doing another. It can be used to set up a
5698:
5693:
5565:
5253:
5114:
5072:
4728:
3033:
2403:
2094:
1608:
1548:
1284:
is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use
1179:
639:
488:
226:
4263:
4975:
4693:
2682:
2375:
2318:
2111:
2077:
1143:
775:
770:
522:
271:
3762:
Thompson, Samuel T. C. "Helping The Hacker? Library Information, Security, And Social Engineering."
4960:
4838:
4733:
2568:
1631:
1455:
1226:
1050:
873:
447:
406:
376:
326:
3836:
2967:
5683:
5626:
5174:
5048:
5000:
4663:
2871:
2584:
2459:
2176:
1734:
1699:
1613:
1230:
186:
4563:
CNN Tech PCWorld Staff (November 2001). Timeline: A 40-year history of hacking from 1960 to 2001
4191:
4066:
4060:
1892:
1760:
1183:
1056:
441:
3961:
2063:
5447:
5089:
4823:
4571:
4294:
4199:
3344:
2677:
2346:
1756:
1743:
was a computer security consultant and author, formerly the most wanted computer criminal in
1281:
1093:
868:
breaks security for non-malicious reasons, either to test their own security system, perform
712:
634:
586:
is the more appropriate term for those who break into computers, whether computer criminals (
4328:
3556:, Chapter 14, George Perkovich and Ariel E. Levite, Eds., Georgetown University Press, 2017.
3071:
2904:
2040:
depends on the severity of the violation and the offender's history of violations under the
1832:. Writing software and performing other activities to support these views is referred to as
5575:
5109:
5021:
4970:
4915:
4783:
4756:
4738:
4636:
4607:
3706:"The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security"
2766:
2627:
2557:
2513:
2502:
2452:
2410:
2389:
2204:
2184:, is a young immortal hacker-mage prince who has the ability to traverse shadow dimensions.
1879:
1709:
1459:
1289:
1175:
951:
752:
617:
459:
401:
321:
5646:
4703:
3988:
British teenager who 'cyber-terrorised' US intelligence officials gets two years detention
1462:
in a computer system, enabling the intruder to gain access later. (The name refers to the
8:
5404:
4893:
4668:
4626:
4162:"Data leaked by Anonymous appears to reveal Bank of America's hacker profiling operation"
4141:
Feds recover more than $ 2 million in ransomware payments from Colonial Pipeline hackers.
2662:
2524:
2361:
2232:
2222:
1371:
1313:
1301:
1137:
784:
436:
261:
171:
4012:
British teen Kane Gamble accessed accounts of top US intelligence and security officials
3938:
3684:
2067:
In film and news media, hackers are often depicted as hooded figures typing in the dark.
5243:
5077:
5005:
4910:
3332:
3250:
3095:
2991:
2982:
2719:
2667:
2637:
2535:
2368:
1975:
1837:
1836:. Some consider illegal cracking ethically justified for these goals; a common form is
1774:
1603:
1579:
1565:
1092:
attacks on industries, including energy, food, and transportation, have been blamed on
1046:
788:, published one year later, further entrenched the term in the public's consciousness.
3138:
2791:
2019:
1784:
1080:
Groups of hackers that carry out organized criminal activities for profit. Modern-day
5634:
5608:
5442:
5432:
5399:
5125:
4883:
4818:
4768:
4715:
4673:
4621:
4530:
4511:
4492:
4485:
4469:
4448:
4427:
4374:
4368:
4353:
4334:
4313:
4275:
4101:
4070:
3967:
3805:
3785:
3666:
3398:
3373:
3336:
3324:
3280:
3236:
3210:
3185:
3157:
3085:
2771:
2741:
2723:
2352:
1966:
1859:
1849:
1674:
as well as many network security books and web sites. He is a founding member of the
1661:
1508:
1324:
1125:
431:
394:
361:
3366:
3099:
5437:
5218:
5094:
5034:
4798:
4788:
4683:
4403:
3658:
3314:
3134:
3077:
2711:
2672:
2652:
2604:
2593:
2396:
2290:
2216:
2187:
1981:
1794:
1753:
was a Belgian computer programmer and technologist who was also a privacy advocate.
1730:
1705:
1675:
1109:
1081:
907:
899:
895:
869:
865:
748:
654:
562:
411:
112:
3154:
Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime
2006:
1777:(known as Gigabyte) is a Belgian hacker recognized for writing the first virus in
1616:(HOPE) conferences. He has been part of the hacker community since the late 1970s.
553:
or security researcher is someone who explores methods for breaching defenses and
5638:
4985:
4965:
4863:
4688:
4678:
4463:
4147:
4127:
4042:
4018:
3994:
3691:
3633:
3613:
3593:
3573:
2962:
2914:
2823:
2647:
2325:
2297:
2276:
2227:
2211:
2171:
1812:
1695:
1569:
1559:
1524:
1432:
1353:
1341:
1337:
935:
809:
659:
191:
82:
3439:
A security professional invited by Microsoft to find vulnerabilities in Windows.
1725:(known as St. Jude) was an American hacker and activist, founding member of the
1568:, sentenced to three years in prison, is a grey hat hacker whose security group
1104:
and ransomware attacks are now the fastest-growing crimes in the United States.
782:
provoked the popular media to spread this usage. The popularity of Stoll's book
721:
entitled "Beware: Hackers at play", with Patrick's photograph on the cover. The
5308:
5293:
5197:
5155:
5053:
4903:
4853:
4828:
4793:
4773:
4653:
4641:
4022:
3963:
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
3566:
3125:
Caldwell, Tracey (July 22, 2011). "Ethical hackers: putting on the white hat".
3067:
2761:
2642:
2562:
2529:
2339:
2265:
2243:
2153:
2149:
2052:
1790:
1479:
1389:
1042:
903:
765:
612:
500:
331:
284:
214:
95:
72:
35:
4442:
4261:
3319:
3302:
2715:
1858:
The computer underground is supported by regular real-world gatherings called
1202:
and some Web pages. These are very common in Web site and Web domain hacking.
5667:
5522:
5477:
5362:
5283:
5228:
5223:
5065:
5026:
4995:
4990:
4843:
4833:
4803:
4279:
3670:
3328:
2841:
2589:
2540:
2518:
2507:
2304:
2254:
2197:
2181:
1816:
1744:
1740:
1657:
1649:
1639:
1619:
1513:
1495:
1370:
binaries, making it virtually impossible for them to be detected by checking
1171:
969:
963:
831:
696:
336:
231:
128:
4407:
3524:"7 Levels of Hackers: Applying An Ancient Chinese Lesson: Know Your Enemies"
2858:
Coined ca. 1985 by hackers in defense against journalistic misuse of hacker.
5507:
5389:
5099:
4955:
4658:
3729:
Kerner, Sean Michael. "Sentry MBA Uses Credential Stuffing To Hack Sites."
3485:
2622:
2431:
2121:
1853:
1768:
1764:
1750:
1685:
1575:
1463:
1285:
1195:
1069:
947:
877:
735:
669:
624:
424:
291:
244:
99:
3650:
3081:
5585:
5487:
5367:
5288:
5263:
5039:
4873:
4848:
4813:
4648:
4567:
3870:
3662:
2551:
2438:
2260:
1828:
The computer underground has produced its own specialized slang, such as
1722:
1667:
1653:
1643:
1599:
1101:
1097:
814:
779:
494:
381:
118:
4390:"Dot.Con: The Dangers of Cyber Crime and a Call for Proactive Solutions"
5419:
5273:
5104:
4920:
4868:
4751:
4631:
4576:
2632:
2417:
2271:
1833:
1726:
1627:
1467:
1089:
1035:
1027:
351:
346:
123:
3068:"Attacks on Computers: Congressional Hearings and Pending Legislation"
5452:
5327:
5258:
4980:
4935:
4930:
4778:
4746:
4264:"Hacker types, motivations and strategies: A comprehensive framework"
3683:
Gupta, Ajay; Klavinsky, Thomas and Laliberte, Scott (March 15, 2002)
3587:
What you need to know about ransomware and the future of cyberattacks
3451:
2488:
2311:
2239:
2145:
2128:
2125:
2117:
1863:
1635:
1113:
1085:
1011:
688:
630:
371:
221:
201:
106:
67:
3651:"Hacker Behavior, Network Effects, and the Security Software Market"
1942:
Imprisonment up to three years, or/and with fine up to 50000 rupees
1931:
Imprisonment up to three years, or/and with fine up to 20000 rupees
1215:
5502:
5482:
5335:
5298:
5278:
5238:
4940:
4898:
4761:
4370:
At Large: The Strange Case of the World's Biggest Internet Invasion
2536:
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
2445:
2132:
1994:
Maximum imprisonment is one year or a fine of the fourth category.
1985:
1887:
1875:
1716:
1589:
1585:
920:
823:
744:
723:
717:
692:
679:
673:
645:
558:
465:
196:
144:
5497:
5492:
5472:
5409:
5268:
5248:
5166:
4950:
4925:
4888:
2657:
2382:
1871:
1867:
1712:
1366:
1133:
A typical approach in an attack on Internet-connected system is:
1105:
1007:
1001:
453:
341:
316:
309:
181:
4310:
Hackers: The Hunt for Australia's Most Infamous Computer Cracker
3937:, Central District of California. August 9, 1999. Archived from
1382:
In the second stage of the targeting process, hackers often use
5600:
5467:
5462:
5457:
5303:
5233:
5213:
4808:
4723:
4551:
2084:
1199:
989:
757:
700:
569:
507:
356:
296:
134:
31:
4247:
Mr. Gibson's novels and short stories are worshiped by hackers
5590:
5427:
5347:
5205:
4262:
Samuel Chng, Han Yu Lu, Ayush Kumar, David Yau (March 2022).
4081:
Wild West imagery has permeated discussions of cybercultures.
2164:
2159:
2099:
1483:
684:
3901:"Community Memory: Precedents in Social Media and Movements"
3392:
1404:
Social engineering can be broken down into four sub-groups:
568:
Longstanding controversy surrounds the meaning of the term "
5512:
5382:
5357:
5352:
2928:"Computer hacking: Where did it begin and how did it grow?"
2424:
1829:
1708:
is a Polish computer security researcher who developed the
1698:
is an advocate, security researcher, and developer for the
1671:
664:
4058:
3685:
Security Through Penetration Testing: Internet Penetration
2098:. While the information contained in hacker magazines and
608:
27:
Computer security term; someone who hacks computer systems
5394:
5377:
5372:
5340:
4227:"A Prince of Cyberpunk Fiction Moves Into the Mainstream"
2048:
1808:
1542:
1191:
3607:
Protect against the Fastest-Growing Crime: Cyber Attacks
3456:"Blue Hat summit meant to reveal ways of the other side"
3277:
Cybercrime: Investigating High-Technology Computer Crime
3207:
Cybercrime: Investigating High Technology Computer Crime
2082:
The most notable hacker-oriented print publications are
2051:
has demonstrated its ability to recover ransoms paid in
834:. In contrast to Raymond, they usually reserve the term
625:
Birth of subculture and entering mainstream: 1960sβ1980s
4487:
Hacking Exposed: Network Security Secrets and Solutions
4483:
McClure, Stuart; Scambray, Joel; Kurtz, George (1999).
4444:
Cyberpunk: Outlaws and Hackers on the Computer Frontier
3299:
3279:(1st ed.). Cincinnati, Ohio: Anderson Publishing.
2036:
The maximum imprisonment or fine for violations of the
942:
is used to describe the most skilled. Newly discovered
3649:
Dey, Debabrata; Lahiri, Atanu; Zhang, Guoying (2011).
3235:. New York, NY: McGraw-Hill/ Irwin. pp. 536β537.
1771:
at many international security and hacker conferences.
1100:β possibly with the country's knowledge and approval.
4350:
Code Hacking: A Developer's Guide to Network Security
1898:
4482:
4462:
Harper, Allen; Harris, Shon; Ness, Jonathan (2011).
3871:"Gary McKinnon extradition ruling due by 16 October"
3567:
Ransomware: Should paying hacker ransoms be illegal?
3230:
1140:: Discovering information about the intended target.
3782:
Penetration Testing: Procedures & Methodologies
3156:. Durham, North Carolina: Carolina Academic Press.
3061:
3059:
1018:to represent a series of security briefing events.
4484:
3960:Holt, Thomas J.; Schel, Bernadette Hlubik (2010).
3365:
954:conferred a kind of credibility on their members.
3748:2009 30th IEEE Symposium on Security and Privacy:
3490:"At Microsoft, Interlopers Sound Off on Security"
3034:"Timeline: The U.S. Government and Cybersecurity"
2770:. McLean, Virginia: IndyPublish.com. p. 61.
731:by the mainstream media in the pejorative sense.
5665:
4461:
4347:
3554:Understanding Cyber Conflict: Fourteen Analogies
3393:Andress, Mandy; Cox, Phil; Tittel, Ed β (2001).
3056:
2156: – are very popular with hackers.
1843:
1680:Computer Professionals for Social Responsibility
727:article appears to be the first use of the word
4465:Gray Hat Hacking: The Ethical Hacker's Handbook
2577:Hacking: The Art of Exploitation Second Edition
683:that year, featuring a computer intrusion into
3806:"DEF CON III Archives - Susan Thunder Keynote"
3648:
3175:
3173:
5182:
4592:
4440:
4100:. University of Minnesota Press. p. 90.
3703:
3521:
3209:. Matthew Bender & Company. p. 258.
2817:Political notes from 2012: SeptemberβDecember
1787:(lcamtuf) is a prominent security researcher.
695:, broke into computer systems throughout the
530:
4508:Stealing the Network: How to Own a Continent
4367:Freeman, David H.; Mann, Charles C. (1997).
4348:Conway, Richard; Cordingley, Julian (2004).
4299:: CS1 maint: multiple names: authors list (
4192:"Hackers and Viruses: Questions and Answers"
3349:: CS1 maint: multiple names: authors list (
3270:
3268:
3266:
3255:: CS1 maint: multiple names: authors list (
3076:. Oakland, CA, USA: IEEE. pp. 180β186.
2955:
2116:Hackers often show an interest in fictional
604:Timeline of computer security hacker history
4366:
4307:
4130:. Wetboek van Strafrecht, December 27, 2012
3170:
3073:1984 IEEE Symposium on Security and Privacy
2756:
2754:
1670:, known by the handle Fyodor, authored the
1572:exposed a flaw in AT&T's iPad security.
1553:
1244:. Unsourced material may be challenged and
1075:
652:In 1980, an article in the August issue of
5189:
5175:
4599:
4585:
4395:Australian Journal of Politics and History
3863:
3773:
3627:How Bitcoin Has Fueled Ransomware Attacks.
3550:Cybersecurity and the Age of Privateering.
3386:
3357:
2547:Hackers: Heroes of the Computer Revolution
2174:, the protagonist of the second series in
537:
523:
5143:Security information and event management
4387:
4218:
4091:
4089:
3959:
3697:
3318:
3263:
3198:
2951:
2949:
1735:public computerized bulletin board system
1264:Learn how and when to remove this message
734:Pressured by media coverage, congressman
4606:
4426:. Indianapolis, Ind: Que Certification.
3517:
3515:
3231:O'Brien, Marakas, James, George (2011).
3151:
3124:
3022:. September 5, 1983. pp. 42β46, 48.
2956:Elmer-DeWitt, Philip (August 29, 1983).
2930:. WindowSecurity.com. October 16, 2002.
2760:
2751:
2062:
2058:
2028:financial institution or the Government.
1926:Tampering with computer source documents
607:
4505:
4468:(3rd ed.). New York: McGraw-Hill.
4224:
3484:
3179:
2124:literature and movies. The adoption of
1862:or "hacker cons". These events include
1793:is the pseudonym of the founder of the
1664:. The extradition has now been dropped.
1146:: Identifying potential ways of attack.
633:during the 1960s and the microcomputer
14:
5666:
4524:
4352:. Hingham, Mass: Charles River Media.
4326:
4159:
4095:
4086:
3834:
3764:Information Technology & Libraries
3530:from the original on December 31, 2018
3500:from the original on December 19, 2014
3363:
3065:
3044:from the original on November 16, 2018
3011:
2946:
2882:from the original on November 10, 2015
2869:
1688:, who claimed that he hacked into the
1543:Notable intruders and criminal hackers
5170:
5120:Host-based intrusion detection system
4580:
4527:Hackers: Crime in the Digital Sublime
4441:Hafner, Katie; Markoff, John (1991).
4421:
4237:from the original on October 13, 2016
4059:Jordan, Tim; Taylor, Paul A. (2004).
3779:
3704:Rodriguez, Chris; Martinez, Richard.
3644:
3642:
3512:
3466:from the original on December 3, 2013
3450:
3274:
3204:
2934:from the original on January 16, 2013
2798:from the original on November 8, 2020
2740:John Wiley & Sons. 2005. pg. 92.
2105:
1815:or Director of National Intelligence
1729:movement, and one of the creators of
1516:to detect evidence of employee fraud.
1038:can be divided into two main groups:
946:circulate among these hackers. Elite
4308:Apro, Bill; Hammond, Graeme (2005).
3953:
3397:. New York, NY: Wiley. p. 638.
2495:
1652:is a Scottish hacker who was facing
1242:adding citations to reliable sources
1209:
1159:
637:of the 1980s. It is implicated with
5151:Runtime application self-protection
4268:Computers in Human Behavior Reports
4172:from the original on April 19, 2016
3881:from the original on August 7, 2019
3816:from the original on April 20, 2019
3522:Chabrow, Eric (February 25, 2012).
2839:
2701:
2467:Who Am I β No System Is Safe (film)
2071:
1891:learn from other members. Computer
1606:) is the longstanding publisher of
257:forensics-focused operating systems
24:
5196:
4702:
4510:. Rockland, Mass: Syngress Media.
4447:. New York: Simon & Schuster.
4388:Granville, Johanna (Winter 2003).
4373:. New York: Simon & Schuster.
4312:. Rowville, Vic: Five Mile Press.
4255:
4206:from the original on June 10, 2016
4160:Swabey, Pete (February 27, 2013).
3639:
3106:from the original on June 24, 2024
2848:from the original on June 29, 2011
1899:Consequences for malicious hacking
841:According to Ralph D. Clifford, a
791:
774:. Later that year, the release by
25:
5710:
5083:Security-focused operating system
4544:
3911:from the original on July 3, 2019
3851:from the original on May 15, 2019
3784:. Clifton, NY: CENGAGE Learning.
3372:. University of Minnesota Press.
2152: – especially the
2135:from these works is very common.
1759:is a well-known technologist and
1634:. She became heavily involved in
5645:
5633:
5622:
5621:
5317:
4879:Insecure direct object reference
4550:
4491:. Berkeley, Calif: Mcgraw-Hill.
3182:Professional Penetration Testing
1997:
1763:who has presented research with
1612:. He is also the founder of the
1214:
957:
590:) or computer security experts (
5133:Information security management
4225:Staples, Brent (May 11, 2003).
4184:
4153:
4133:
4114:
4052:
4028:
4004:
3980:
3935:United States Attorney's Office
3923:
3893:
3828:
3798:
3756:
3740:
3723:
3677:
3619:
3599:
3579:
3559:
3542:
3478:
3444:
3411:
3293:
3224:
3184:. Syngress Press. p. 503.
3145:
3118:
3026:
2974:
2917:, entry "hacker", last meaning.
2572:by Hugo Cornwall (Peter Sommer)
2193:The Girl with the Dragon Tattoo
1592:) is a longstanding writer for
1431:examining discarded documents (
1063:
929:
78:Hacking of consumer electronics
4150:Washington Post, June 7, 2021.
3233:Management Information Systems
3180:Wilhelm, Douglas (2010). "2".
2920:
2897:
2863:
2833:
2810:
2784:
2730:
2695:
1948:
827:
705:Los Alamos National Laboratory
587:
13:
1:
3835:Hafner, Katie (August 1995).
3139:10.1016/s1353-4858(11)70075-7
2870:Yagoda, Ben (March 6, 2014).
2704:Annals of Operations Research
2689:
2618:Cracking of wireless networks
2009:, more commonly known as the
1886:, AthCon, Hacker Halted, and
1844:Hacker groups and conventions
1690:Democratic National Committee
1205:
1072:operatives of nation states.
1045: β Activities involving
1021:
890:Black hat (computer security)
860:White hat (computer security)
838:for more malicious activity.
768:in the May 1988 issue of the
740:U.S. House of Representatives
709:Sloan-Kettering Cancer Center
3419:"Blue hat hacker Definition"
3066:Bailey, David (April 1984).
2966:. p. 75. Archived from
2958:"The 414 Gang Strikes Again"
2481:
2474:Johnny English Strikes Again
2038:Computer Fraud and Abuse Act
2011:Computer Fraud and Abuse Act
1974:By false signals or a false
1884:Chaos Communication Congress
883:
853:
177:Chaos Communication Congress
7:
5674:Hacking (computer security)
5138:Information risk management
5059:Multi-factor authentication
4615:Related security categories
4557:Hacking (computer security)
3966:. IGI Global. p. 146.
3460:Microsoft meets the hackers
3018:"Beware: Hackers at play".
2872:"A Short History of 'Hack'"
2610:
2333:Girl With The Dragon Tattoo
1188:Hypertext Transfer Protocol
1166:Exploit (computer security)
995:
983:
914:
815:The New Hacker's Dictionary
10:
5715:
5115:Intrusion detection system
5073:Computer security software
4729:Advanced persistent threat
4333:. Hoboken, NJ: Wiley Pub.
3837:"Kevin Mitnick, unplugged"
3780:Press, EC-Council (2011).
2404:Terminator 2: Judgment Day
2109:
2095:2600: The Hacker Quarterly
2075:
2055:by victims of cybertheft.
1847:
1823:
1609:2600: The Hacker Quarterly
1594:2600: The Hacker Quarterly
1557:
1549:List of computer criminals
1546:
1349:Spoofing attack (phishing)
1180:cross-site request forgery
1163:
1123:
1119:
1084:have been compared to the
1068:Intelligence agencies and
1025:
999:
961:
918:
887:
857:
804:
640:2600: The Hacker Quarterly
601:
597:
489:2600: The Hacker Quarterly
227:List of computer criminals
29:
18:Hacker (computer security)
5617:
5599:
5521:
5418:
5326:
5315:
5204:
5014:
4714:
4700:
4694:Digital rights management
4614:
4126:February 2, 2015, at the
3395:CIW Security Professional
3320:10.1177/21582440221122739
2822:December 9, 2012, at the
2792:"The Hacker's Dictionary"
2716:10.1007/s10479-015-1925-2
2683:Vulnerability (computing)
2376:Pirates of Silicon Valley
2112:List of fictional hackers
1499:self-propagating program.
1051:denial-of-service attacks
874:vulnerability assessments
776:Robert Tappan Morris, Jr.
771:Communications of the ACM
5531:Advertising and products
4839:Denial-of-service attack
4734:Arbitrary code execution
4525:Taylor, Paul A. (1999).
4424:Certified Ethical Hacker
4096:Thomas, Douglas (2003).
4062:Hacktivism and Cyberwars
3768:Academic Search Complete
3735:Academic Search Complete
3423:PC Magazine Encyclopedia
3364:Thomas, Douglas (2002).
2282:
2138:
1903:
1632:psychological subversion
1554:Notable security hackers
1076:Organized criminal gangs
572:". In this controversy,
407:Cloud computing security
30:Not to be confused with
5049:Computer access control
5001:Rogue security software
4664:Electromagnetic warfare
4422:Gregg, Michael (2006).
4408:10.1111/1467-8497.00284
3905:Computer History Museum
3655:SSRN Electronic Journal
3616:, CNBC (July 25, 2017).
2585:Out of the Inner Circle
2177:The Chronicles of Amber
1807:officials such as then
1614:Hackers on Planet Earth
1297:Finding vulnerabilities
187:Hackers on Planet Earth
5095:Obfuscation (software)
4824:Browser Helper Objects
4708:
4568:Can Hackers Be Heroes?
4506:Russell, Ryan (2004).
4327:Beaver, Kevin (2010).
4146:June 19, 2021, at the
4065:. Routledge. pp.
4041:July 19, 2019, at the
4017:June 21, 2018, at the
3993:June 14, 2018, at the
3766:25.4 (2006): 222-225.
3711:. Frost & Sullivan
3632:June 19, 2021, at the
3612:June 23, 2021, at the
3592:June 19, 2021, at the
3313:(3): 215824402211227.
3275:Moore, Robert (2006).
3205:Moore, Robert (2005).
2913:April 2, 2018, at the
2842:"Jargon File: Cracker"
2168:manga and anime series
2131:, symbols, values and
2068:
1956:Wetboek van Strafrecht
1893:bulletin board systems
1692:(DNC) computer network
1678:and Vice President of
1642:and Lewis de Payne in
1184:File Transfer Protocol
1144:Vulnerability analysis
1094:criminal organizations
1057:Freedom of information
906:, or the ethos of the
621:
442:Homebrew Computer Club
5090:Data-centric security
4971:Remote access trojans
4706:
4572:Off Book (web series)
4529:. London: Routledge.
4202:. November 12, 2012.
4200:University of Bologna
3941:on September 26, 2009
3907:. February 23, 2016.
3877:. September 6, 2012.
3690:July 3, 2019, at the
3605:Abigail Summerville,
3572:May 21, 2021, at the
3152:Clifford, D. (2011).
3082:10.1109/SP.1984.10012
2986:. September 27, 1983.
2764:(1993). "Part 2(d)".
2678:Technology assessment
2569:The Hacker's Handbook
2347:Live Free or Die Hard
2066:
2059:Hacking and the media
1980:By the use of stolen
1757:Meredith L. Patterson
1672:Nmap Security Scanner
1282:vulnerability scanner
1277:Vulnerability scanner
755:", published 1986 in
713:Security Pacific Bank
703:, including those of
611:
602:Further information:
5679:Computer occupations
5536:Animation and comics
5022:Application security
4916:Privilege escalation
4784:Cross-site scripting
4637:Cybersex trafficking
4608:Information security
4559:at Wikimedia Commons
3663:10.2139/ssrn.1838656
3596:. Vox, Jun 16, 2021.
3526:. GovInfo Security.
3488:(October 17, 2005).
2970:on December 2, 2007.
2905:1981 version of the
2767:The Hacker Crackdown
2628:Cyber Storm Exercise
2558:The Hacker Crackdown
2514:The Art of Intrusion
2503:The Art of Deception
2411:Terminator Salvation
1880:Black Hat Conference
1533:Tools and Procedures
1238:improve this section
1176:cross-site scripting
952:Masters of Deception
753:The Hacker Manifesto
689:Milwaukee, Wisconsin
658:(with commentary by
618:The Hacker Crackdown
574:computer programmers
460:Masters of Deception
402:Application security
5689:Illegal occupations
5405:Padonkaffsky jargon
4669:Information warfare
4627:Automotive security
4330:Hacking for Dummies
3770:. Web. 7 Feb. 2017.
3737:. Web. 7 Feb. 2017.
3636:NPR, June 10, 2021.
2663:Mathematical beauty
1314:Brute-force attacks
1312:Password guessing.
1302:reverse engineering
1138:Network enumeration
1096:based in or near a
1014:also uses the term
437:Chaos Computer Club
172:Black Hat Briefings
46:Part of a series on
5078:Antivirus software
4946:Social engineering
4911:Polymorphic engine
4864:Fraudulent dialers
4769:Hardware backdoors
4709:
4570:Video produced by
4231:The New York Times
4139:Nakashima, Ellen.
4025:. 21 January 2018.
3494:The New York Times
2983:Detroit Free Press
2668:Metasploit Project
2638:Government hacking
2319:Enemy of the State
2106:Hackers in fiction
2069:
1971:By technical means
1960:computervredebreuk
1860:hacker conventions
1838:website defacement
1775:Kimberley Vanvaeck
1624:social engineering
1604:Emmanuel Goldstein
1566:Andrew Auernheimer
1384:social engineering
1379:Social engineering
1309:Brute-force attack
1047:website defacement
622:
267:Social engineering
5699:Security breaches
5694:Computer security
5661:
5660:
5609:Eternal September
5164:
5163:
5126:Anomaly detection
5031:Secure by default
4884:Keystroke loggers
4819:Drive-by download
4707:vectorial version
4674:Internet security
4622:Computer security
4555:Media related to
4536:978-0-415-18072-6
4517:978-1-931836-05-0
4475:978-0-07-174255-9
4433:978-0-7897-3531-7
4359:978-1-58450-314-9
4340:978-0-7645-5784-2
4107:978-0-8166-3346-3
4076:978-0-415-26003-9
3933:(Press release).
3548:Egloff, Florian.
3454:(June 15, 2005).
3379:978-0-8166-3346-3
3286:978-1-59345-303-9
3242:978-0-07-752217-9
3191:978-1-59749-425-0
3091:978-0-8186-0532-1
2999:Missing or empty
2840:Raymond, Eric S.
2496:Non-fiction books
2205:Heaven's Memo Pad
2020:Β§ 1030(e)(2)
1976:cryptographic key
1967:security measures
1954:Article 138ab of
1946:
1945:
1850:Hacker conference
1805:U.S. intelligence
1662:Asperger syndrome
1504:Keystroke logging
1433:"dumpster diving"
1344:over the network.
1325:Password cracking
1321:Password cracking
1274:
1273:
1266:
1160:Security exploits
1126:Computer security
972:(also known as a
870:penetration tests
778:of the so-called
576:reclaim the term
547:
546:
395:Computer security
362:Keystroke logging
16:(Redirected from
5706:
5649:
5637:
5625:
5624:
5321:
5219:Creepy treehouse
5191:
5184:
5177:
5168:
5167:
5035:Secure by design
4966:Hardware Trojans
4799:History sniffing
4789:Cross-site leaks
4684:Network security
4601:
4594:
4587:
4578:
4577:
4554:
4540:
4521:
4502:
4490:
4479:
4458:
4437:
4418:
4416:
4414:
4384:
4363:
4344:
4323:
4304:
4298:
4290:
4288:
4286:
4250:
4249:
4244:
4242:
4222:
4216:
4215:
4213:
4211:
4188:
4182:
4181:
4179:
4177:
4157:
4151:
4137:
4131:
4118:
4112:
4111:
4093:
4084:
4083:
4056:
4050:
4049:21 January 2018.
4047:The Independent.
4032:
4026:
4008:
4002:
3999:The Independent.
3984:
3978:
3977:
3957:
3951:
3950:
3948:
3946:
3927:
3921:
3920:
3918:
3916:
3897:
3891:
3890:
3888:
3886:
3867:
3861:
3860:
3858:
3856:
3832:
3826:
3825:
3823:
3821:
3802:
3796:
3795:
3777:
3771:
3760:
3754:
3744:
3738:
3727:
3721:
3720:
3718:
3716:
3710:
3701:
3695:
3681:
3675:
3674:
3646:
3637:
3623:
3617:
3603:
3597:
3585:Morrison, Sara.
3583:
3577:
3576:BBC 20 May 2021.
3563:
3557:
3546:
3540:
3539:
3537:
3535:
3519:
3510:
3509:
3507:
3505:
3482:
3476:
3475:
3473:
3471:
3448:
3442:
3441:
3436:
3434:
3429:on March 8, 2013
3425:. Archived from
3415:
3409:
3408:
3390:
3384:
3383:
3371:
3361:
3355:
3354:
3348:
3340:
3322:
3297:
3291:
3290:
3272:
3261:
3260:
3254:
3246:
3228:
3222:
3220:
3202:
3196:
3195:
3177:
3168:
3167:
3149:
3143:
3142:
3127:Network Security
3122:
3116:
3115:
3113:
3111:
3063:
3054:
3053:
3051:
3049:
3040:. May 16, 2003.
3030:
3024:
3023:
3015:
3009:
3008:
3002:
2997:
2995:
2987:
2978:
2972:
2971:
2953:
2944:
2943:
2941:
2939:
2924:
2918:
2901:
2895:
2894:
2889:
2887:
2867:
2861:
2860:
2855:
2853:
2837:
2831:
2814:
2808:
2807:
2805:
2803:
2788:
2782:
2781:
2758:
2749:
2734:
2728:
2727:
2699:
2673:Penetration test
2653:Hacker Manifesto
2605:Suelette Dreyfus
2594:Howard Rheingold
2525:The Cuckoo's Egg
2460:The Fifth Estate
2217:Orson Scott Card
2188:Lisbeth Salander
2078:Hacker magazines
2072:Hacker magazines
2022:
1908:
1907:
1795:Openwall Project
1731:Community Memory
1706:Joanna Rutkowska
1676:Honeynet Project
1494:Like a virus, a
1484:biological virus
1269:
1262:
1258:
1255:
1249:
1218:
1210:
1110:cryptocurrencies
1082:computer hackers
908:white hat hacker
900:Richard Stallman
896:black hat hacker
866:white hat hacker
785:The Cuckoo's Egg
655:Psychology Today
557:weaknesses in a
539:
532:
525:
412:Network security
113:Hacker Manifesto
52:Computer hacking
43:
42:
21:
5714:
5713:
5709:
5708:
5707:
5705:
5704:
5703:
5664:
5663:
5662:
5657:
5613:
5595:
5517:
5414:
5322:
5313:
5200:
5195:
5165:
5160:
5010:
4710:
4698:
4689:Copy protection
4679:Mobile security
4610:
4605:
4547:
4537:
4518:
4499:
4476:
4455:
4434:
4412:
4410:
4381:
4360:
4341:
4320:
4292:
4291:
4284:
4282:
4258:
4256:Further reading
4253:
4240:
4238:
4223:
4219:
4209:
4207:
4190:
4189:
4185:
4175:
4173:
4166:Information Age
4158:
4154:
4148:Wayback Machine
4138:
4134:
4128:Wayback Machine
4119:
4115:
4108:
4094:
4087:
4077:
4057:
4053:
4043:Wayback Machine
4033:
4029:
4019:Wayback Machine
4009:
4005:
3995:Wayback Machine
3985:
3981:
3974:
3958:
3954:
3944:
3942:
3929:
3928:
3924:
3914:
3912:
3899:
3898:
3894:
3884:
3882:
3869:
3868:
3864:
3854:
3852:
3833:
3829:
3819:
3817:
3804:
3803:
3799:
3792:
3778:
3774:
3761:
3757:
3745:
3741:
3728:
3724:
3714:
3712:
3708:
3702:
3698:
3692:Wayback Machine
3682:
3678:
3647:
3640:
3634:Wayback Machine
3624:
3620:
3614:Wayback Machine
3604:
3600:
3594:Wayback Machine
3584:
3580:
3574:Wayback Machine
3564:
3560:
3547:
3543:
3533:
3531:
3520:
3513:
3503:
3501:
3483:
3479:
3469:
3467:
3449:
3445:
3432:
3430:
3417:
3416:
3412:
3405:
3391:
3387:
3380:
3362:
3358:
3342:
3341:
3298:
3294:
3287:
3273:
3264:
3248:
3247:
3243:
3229:
3225:
3217:
3203:
3199:
3192:
3178:
3171:
3164:
3150:
3146:
3123:
3119:
3109:
3107:
3092:
3064:
3057:
3047:
3045:
3038:Washington Post
3032:
3031:
3027:
3017:
3016:
3012:
3000:
2998:
2989:
2988:
2980:
2979:
2975:
2954:
2947:
2937:
2935:
2926:
2925:
2921:
2915:Wayback Machine
2902:
2898:
2885:
2883:
2868:
2864:
2851:
2849:
2838:
2834:
2824:Wayback Machine
2815:
2811:
2801:
2799:
2790:
2789:
2785:
2778:
2762:Sterling, Bruce
2759:
2752:
2735:
2731:
2700:
2696:
2692:
2687:
2648:Hacker (expert)
2613:
2580:by Jon Erickson
2498:
2484:
2479:
2285:
2277:Neal Stephenson
2228:Catherine Jinks
2172:Merlin of Amber
2141:
2114:
2108:
2080:
2076:Main category:
2074:
2061:
2014:
2000:
1951:
1906:
1901:
1856:
1848:Main articles:
1846:
1826:
1785:MichaΕ Zalewski
1696:Jacob Appelbaum
1602:(also known as
1588:(also known as
1570:Goatse Security
1562:
1560:List of hackers
1556:
1551:
1545:
1525:Attack patterns
1521:Attack patterns
1354:spoofing attack
1342:data in transit
1338:packet analyzer
1333:Packet analyzer
1270:
1259:
1253:
1250:
1235:
1219:
1208:
1168:
1162:
1128:
1122:
1112:facilitate the
1078:
1066:
1030:
1024:
1004:
998:
986:
966:
960:
938:among hackers,
932:
923:
917:
892:
886:
862:
856:
810:Eric S. Raymond
807:
794:
792:Classifications
668:, Kevin Flynn (
660:Philip Zimbardo
627:
606:
600:
559:computer system
551:security hacker
543:
514:
513:
483:
475:
474:
427:
417:
416:
397:
387:
386:
312:
302:
301:
287:
277:
276:
247:
237:
236:
217:
207:
206:
192:Security BSides
167:
157:
156:
102:
88:
87:
83:List of hackers
63:
39:
28:
23:
22:
15:
12:
11:
5:
5712:
5702:
5701:
5696:
5691:
5686:
5684:Identity theft
5681:
5676:
5659:
5658:
5656:
5655:
5643:
5631:
5618:
5615:
5614:
5612:
5611:
5605:
5603:
5597:
5596:
5594:
5593:
5588:
5583:
5578:
5573:
5568:
5563:
5558:
5553:
5548:
5543:
5538:
5533:
5527:
5525:
5519:
5518:
5516:
5515:
5510:
5505:
5500:
5495:
5490:
5485:
5480:
5475:
5470:
5465:
5460:
5455:
5450:
5445:
5440:
5435:
5430:
5424:
5422:
5416:
5415:
5413:
5412:
5407:
5402:
5397:
5392:
5387:
5386:
5385:
5380:
5375:
5370:
5365:
5355:
5350:
5345:
5344:
5343:
5332:
5330:
5324:
5323:
5316:
5314:
5312:
5311:
5306:
5301:
5296:
5294:Shadow banning
5291:
5286:
5281:
5276:
5271:
5266:
5261:
5256:
5251:
5246:
5241:
5236:
5231:
5226:
5221:
5216:
5210:
5208:
5202:
5201:
5198:Internet slang
5194:
5193:
5186:
5179:
5171:
5162:
5161:
5159:
5158:
5156:Site isolation
5153:
5148:
5147:
5146:
5140:
5130:
5129:
5128:
5123:
5112:
5107:
5102:
5097:
5092:
5087:
5086:
5085:
5080:
5070:
5069:
5068:
5063:
5062:
5061:
5054:Authentication
5046:
5045:
5044:
5043:
5042:
5032:
5029:
5018:
5016:
5012:
5011:
5009:
5008:
5003:
4998:
4993:
4988:
4983:
4978:
4973:
4968:
4963:
4958:
4953:
4948:
4943:
4938:
4933:
4928:
4923:
4918:
4913:
4908:
4907:
4906:
4896:
4891:
4886:
4881:
4876:
4871:
4866:
4861:
4856:
4854:Email spoofing
4851:
4846:
4841:
4836:
4831:
4826:
4821:
4816:
4811:
4806:
4801:
4796:
4794:DOM clobbering
4791:
4786:
4781:
4776:
4774:Code injection
4771:
4766:
4765:
4764:
4759:
4754:
4749:
4741:
4736:
4731:
4726:
4720:
4718:
4712:
4711:
4701:
4699:
4697:
4696:
4691:
4686:
4681:
4676:
4671:
4666:
4661:
4656:
4654:Cyberterrorism
4651:
4646:
4645:
4644:
4642:Computer fraud
4639:
4629:
4624:
4618:
4616:
4612:
4611:
4604:
4603:
4596:
4589:
4581:
4575:
4574:
4565:
4560:
4546:
4545:External links
4543:
4542:
4541:
4535:
4522:
4516:
4503:
4497:
4480:
4474:
4459:
4453:
4438:
4432:
4419:
4402:(1): 102β109.
4385:
4379:
4364:
4358:
4345:
4339:
4324:
4318:
4305:
4257:
4254:
4252:
4251:
4217:
4196:Scienzagiovane
4183:
4152:
4132:
4113:
4106:
4098:Hacker Culture
4085:
4075:
4051:
4027:
4023:Deutsche Welle
4003:
4001:21 April 2018.
3979:
3972:
3952:
3922:
3892:
3862:
3827:
3797:
3791:978-1435483675
3790:
3772:
3755:
3739:
3722:
3696:
3694:. informit.com
3676:
3638:
3618:
3598:
3578:
3558:
3541:
3511:
3477:
3443:
3410:
3403:
3385:
3378:
3368:Hacker Culture
3356:
3292:
3285:
3262:
3241:
3223:
3215:
3197:
3190:
3169:
3163:978-1594608537
3162:
3144:
3117:
3090:
3055:
3025:
3010:
2973:
2945:
2919:
2896:
2876:The New Yorker
2862:
2832:
2809:
2783:
2776:
2750:
2736:Winkler, Ira.
2729:
2693:
2691:
2688:
2686:
2685:
2680:
2675:
2670:
2665:
2660:
2655:
2650:
2645:
2643:Hacker culture
2640:
2635:
2630:
2625:
2620:
2614:
2612:
2609:
2608:
2607:
2596:
2581:
2573:
2565:
2563:Bruce Sterling
2554:
2543:
2532:
2530:Clifford Stoll
2521:
2510:
2497:
2494:
2493:
2492:
2483:
2480:
2478:
2477:
2470:
2463:
2456:
2449:
2442:
2435:
2428:
2421:
2414:
2407:
2400:
2393:
2386:
2379:
2372:
2365:
2358:
2350:
2343:
2336:
2329:
2322:
2315:
2308:
2301:
2294:
2286:
2284:
2281:
2280:
2279:
2268:
2266:William Gibson
2257:
2250:Little Brother
2246:
2244:Gardner Dozois
2230:
2219:
2208:
2200:
2185:
2169:
2157:
2154:Sprawl trilogy
2150:William Gibson
2140:
2137:
2107:
2104:
2073:
2070:
2060:
2057:
2053:cryptocurrency
2034:
2033:
2029:
2003:18 U.S.C.
1999:
1996:
1992:
1991:
1990:
1989:
1978:
1972:
1969:
1950:
1947:
1944:
1943:
1940:
1937:
1933:
1932:
1929:
1923:
1919:
1918:
1915:
1912:
1905:
1902:
1900:
1897:
1845:
1842:
1825:
1822:
1821:
1820:
1798:
1791:Solar Designer
1788:
1782:
1772:
1754:
1748:
1738:
1720:
1703:
1693:
1683:
1665:
1647:
1617:
1597:
1583:
1573:
1558:Main article:
1555:
1552:
1547:Main article:
1544:
1541:
1540:
1539:
1530:
1529:
1522:
1518:
1517:
1505:
1501:
1500:
1492:
1488:
1487:
1476:
1475:Computer virus
1472:
1471:
1452:
1448:
1447:
1446:
1445:
1436:
1423:
1414:
1401:
1400:
1395:
1394:
1380:
1376:
1375:
1372:process tables
1363:
1359:
1358:
1350:
1346:
1345:
1334:
1330:
1329:
1322:
1318:
1317:
1310:
1306:
1305:
1298:
1294:
1293:
1278:
1272:
1271:
1222:
1220:
1213:
1207:
1204:
1164:Main article:
1161:
1158:
1154:
1153:
1147:
1141:
1124:Main article:
1121:
1118:
1077:
1074:
1065:
1062:
1061:
1060:
1054:
1043:Cyberterrorism
1026:Main article:
1023:
1020:
1000:Main article:
997:
994:
985:
982:
962:Main article:
959:
956:
931:
928:
919:Main article:
916:
913:
904:hacker culture
888:Main article:
885:
882:
878:ethical hacker
858:Main article:
855:
852:
806:
803:
793:
790:
766:Clifford Stoll
626:
623:
613:Bruce Sterling
599:
596:
545:
544:
542:
541:
534:
527:
519:
516:
515:
512:
511:
504:
501:Nuts and Volts
497:
492:
484:
481:
480:
477:
476:
473:
472:
463:
457:
451:
448:Legion of Doom
445:
439:
434:
428:
423:
422:
419:
418:
415:
414:
409:
404:
398:
393:
392:
389:
388:
385:
384:
379:
374:
369:
364:
359:
354:
349:
344:
339:
334:
329:
324:
319:
313:
308:
307:
304:
303:
300:
299:
294:
288:
285:Practice sites
283:
282:
279:
278:
275:
274:
269:
264:
259:
254:
248:
243:
242:
239:
238:
235:
234:
229:
224:
218:
215:Computer crime
213:
212:
209:
208:
205:
204:
199:
194:
189:
184:
179:
174:
168:
163:
162:
159:
158:
155:
154:
153:
152:
147:
142:
131:
126:
121:
116:
109:
103:
96:Hacker culture
94:
93:
90:
89:
86:
85:
80:
75:
73:Cryptovirology
70:
64:
59:
58:
55:
54:
48:
47:
36:Hacker culture
26:
9:
6:
4:
3:
2:
5711:
5700:
5697:
5695:
5692:
5690:
5687:
5685:
5682:
5680:
5677:
5675:
5672:
5671:
5669:
5654:
5653:
5648:
5644:
5642:
5641:
5636:
5632:
5630:
5629:
5620:
5619:
5616:
5610:
5607:
5606:
5604:
5602:
5598:
5592:
5589:
5587:
5584:
5582:
5581:Miscellaneous
5579:
5577:
5574:
5572:
5569:
5567:
5564:
5562:
5559:
5557:
5554:
5552:
5549:
5547:
5544:
5542:
5539:
5537:
5534:
5532:
5529:
5528:
5526:
5524:
5520:
5514:
5511:
5509:
5506:
5504:
5501:
5499:
5496:
5494:
5491:
5489:
5486:
5484:
5481:
5479:
5476:
5474:
5471:
5469:
5466:
5464:
5461:
5459:
5456:
5454:
5451:
5449:
5446:
5444:
5441:
5439:
5436:
5434:
5431:
5429:
5426:
5425:
5423:
5421:
5417:
5411:
5408:
5406:
5403:
5401:
5398:
5396:
5393:
5391:
5388:
5384:
5381:
5379:
5376:
5374:
5371:
5369:
5366:
5364:
5361:
5360:
5359:
5356:
5354:
5351:
5349:
5346:
5342:
5339:
5338:
5337:
5334:
5333:
5331:
5329:
5325:
5320:
5310:
5307:
5305:
5302:
5300:
5297:
5295:
5292:
5290:
5287:
5285:
5284:Script kiddie
5282:
5280:
5277:
5275:
5272:
5270:
5267:
5265:
5262:
5260:
5257:
5255:
5252:
5250:
5247:
5245:
5242:
5240:
5237:
5235:
5232:
5230:
5229:Cyberstalking
5227:
5225:
5224:Cyberbullying
5222:
5220:
5217:
5215:
5212:
5211:
5209:
5207:
5203:
5199:
5192:
5187:
5185:
5180:
5178:
5173:
5172:
5169:
5157:
5154:
5152:
5149:
5144:
5141:
5139:
5136:
5135:
5134:
5131:
5127:
5124:
5121:
5118:
5117:
5116:
5113:
5111:
5108:
5106:
5103:
5101:
5098:
5096:
5093:
5091:
5088:
5084:
5081:
5079:
5076:
5075:
5074:
5071:
5067:
5066:Authorization
5064:
5060:
5057:
5056:
5055:
5052:
5051:
5050:
5047:
5041:
5038:
5037:
5036:
5033:
5030:
5028:
5027:Secure coding
5025:
5024:
5023:
5020:
5019:
5017:
5013:
5007:
5004:
5002:
4999:
4997:
4996:SQL injection
4994:
4992:
4989:
4987:
4984:
4982:
4979:
4977:
4976:Vulnerability
4974:
4972:
4969:
4967:
4964:
4962:
4961:Trojan horses
4959:
4957:
4956:Software bugs
4954:
4952:
4949:
4947:
4944:
4942:
4939:
4937:
4934:
4932:
4929:
4927:
4924:
4922:
4919:
4917:
4914:
4912:
4909:
4905:
4902:
4901:
4900:
4897:
4895:
4892:
4890:
4887:
4885:
4882:
4880:
4877:
4875:
4872:
4870:
4867:
4865:
4862:
4860:
4857:
4855:
4852:
4850:
4847:
4845:
4844:Eavesdropping
4842:
4840:
4837:
4835:
4834:Data scraping
4832:
4830:
4827:
4825:
4822:
4820:
4817:
4815:
4812:
4810:
4807:
4805:
4804:Cryptojacking
4802:
4800:
4797:
4795:
4792:
4790:
4787:
4785:
4782:
4780:
4777:
4775:
4772:
4770:
4767:
4763:
4760:
4758:
4755:
4753:
4750:
4748:
4745:
4744:
4742:
4740:
4737:
4735:
4732:
4730:
4727:
4725:
4722:
4721:
4719:
4717:
4713:
4705:
4695:
4692:
4690:
4687:
4685:
4682:
4680:
4677:
4675:
4672:
4670:
4667:
4665:
4662:
4660:
4657:
4655:
4652:
4650:
4647:
4643:
4640:
4638:
4635:
4634:
4633:
4630:
4628:
4625:
4623:
4620:
4619:
4617:
4613:
4609:
4602:
4597:
4595:
4590:
4588:
4583:
4582:
4579:
4573:
4569:
4566:
4564:
4561:
4558:
4553:
4549:
4548:
4538:
4532:
4528:
4523:
4519:
4513:
4509:
4504:
4500:
4498:0-07-212127-0
4494:
4489:
4488:
4481:
4477:
4471:
4467:
4466:
4460:
4456:
4454:0-671-68322-5
4450:
4446:
4445:
4439:
4435:
4429:
4425:
4420:
4409:
4405:
4401:
4397:
4396:
4391:
4386:
4382:
4380:0-684-82464-7
4376:
4372:
4371:
4365:
4361:
4355:
4351:
4346:
4342:
4336:
4332:
4331:
4325:
4321:
4319:1-74124-722-5
4315:
4311:
4306:
4302:
4296:
4281:
4277:
4273:
4269:
4265:
4260:
4259:
4248:
4236:
4232:
4228:
4221:
4205:
4201:
4197:
4193:
4187:
4171:
4167:
4163:
4156:
4149:
4145:
4142:
4136:
4129:
4125:
4122:
4121:Artikel 138ab
4117:
4109:
4103:
4099:
4092:
4090:
4082:
4078:
4072:
4068:
4064:
4063:
4055:
4048:
4044:
4040:
4037:
4031:
4024:
4020:
4016:
4013:
4007:
4000:
3996:
3992:
3989:
3983:
3975:
3973:9781616928056
3969:
3965:
3964:
3956:
3940:
3936:
3932:
3926:
3910:
3906:
3902:
3896:
3885:September 25,
3880:
3876:
3872:
3866:
3850:
3846:
3842:
3838:
3831:
3815:
3811:
3807:
3801:
3793:
3787:
3783:
3776:
3769:
3765:
3759:
3753:
3749:
3743:
3736:
3732:
3726:
3707:
3700:
3693:
3689:
3686:
3680:
3672:
3668:
3664:
3660:
3656:
3652:
3645:
3643:
3635:
3631:
3628:
3622:
3615:
3611:
3608:
3602:
3595:
3591:
3588:
3582:
3575:
3571:
3568:
3562:
3555:
3551:
3545:
3529:
3525:
3518:
3516:
3499:
3495:
3491:
3487:
3486:Markoff, John
3481:
3465:
3462:. CNET News.
3461:
3457:
3453:
3447:
3440:
3428:
3424:
3420:
3414:
3406:
3404:0-7645-4822-0
3400:
3396:
3389:
3381:
3375:
3370:
3369:
3360:
3352:
3346:
3338:
3334:
3330:
3326:
3321:
3316:
3312:
3308:
3304:
3296:
3288:
3282:
3278:
3271:
3269:
3267:
3258:
3252:
3244:
3238:
3234:
3227:
3218:
3216:1-59345-303-5
3212:
3208:
3201:
3193:
3187:
3183:
3176:
3174:
3165:
3159:
3155:
3148:
3140:
3136:
3132:
3128:
3121:
3105:
3101:
3097:
3093:
3087:
3083:
3079:
3075:
3074:
3069:
3062:
3060:
3043:
3039:
3035:
3029:
3021:
3014:
3006:
2993:
2985:
2984:
2977:
2969:
2965:
2964:
2959:
2952:
2950:
2933:
2929:
2923:
2916:
2912:
2909:
2908:
2900:
2893:
2881:
2877:
2873:
2866:
2859:
2847:
2843:
2836:
2829:
2825:
2821:
2818:
2813:
2797:
2793:
2787:
2779:
2777:1-4043-0641-2
2773:
2769:
2768:
2763:
2757:
2755:
2747:
2746:9780764589904
2743:
2739:
2733:
2725:
2721:
2717:
2713:
2709:
2705:
2698:
2694:
2684:
2681:
2679:
2676:
2674:
2671:
2669:
2666:
2664:
2661:
2659:
2656:
2654:
2651:
2649:
2646:
2644:
2641:
2639:
2636:
2634:
2631:
2629:
2626:
2624:
2621:
2619:
2616:
2615:
2606:
2602:
2601:
2597:
2595:
2591:
2590:Bill Landreth
2587:
2586:
2582:
2579:
2578:
2574:
2571:
2570:
2566:
2564:
2560:
2559:
2555:
2553:
2549:
2548:
2544:
2542:
2541:Kevin Mitnick
2538:
2537:
2533:
2531:
2527:
2526:
2522:
2520:
2519:Kevin Mitnick
2516:
2515:
2511:
2509:
2508:Kevin Mitnick
2505:
2504:
2500:
2499:
2491:
2490:
2486:
2485:
2475:
2471:
2469:
2468:
2464:
2462:
2461:
2457:
2455:
2454:
2453:Weird Science
2450:
2448:
2447:
2443:
2441:
2440:
2436:
2434:
2433:
2429:
2427:
2426:
2422:
2420:
2419:
2415:
2413:
2412:
2408:
2406:
2405:
2401:
2399:
2398:
2394:
2392:
2391:
2387:
2385:
2384:
2380:
2378:
2377:
2373:
2371:
2370:
2366:
2364:
2363:
2359:
2357:
2355:
2351:
2349:
2348:
2344:
2342:
2341:
2337:
2335:
2334:
2330:
2328:
2327:
2323:
2321:
2320:
2316:
2314:
2313:
2309:
2307:
2306:
2302:
2300:
2299:
2295:
2293:
2292:
2288:
2287:
2278:
2274:
2273:
2269:
2267:
2263:
2262:
2258:
2256:
2255:Cory Doctorow
2252:
2251:
2247:
2245:
2241:
2237:
2235:
2231:
2229:
2225:
2224:
2220:
2218:
2214:
2213:
2209:
2207:
2206:
2201:
2199:
2198:Stieg Larsson
2195:
2194:
2189:
2186:
2183:
2182:Roger Zelazny
2179:
2178:
2173:
2170:
2167:
2166:
2161:
2158:
2155:
2151:
2147:
2143:
2142:
2136:
2134:
2130:
2127:
2123:
2119:
2113:
2103:
2101:
2097:
2096:
2091:
2087:
2086:
2079:
2065:
2056:
2054:
2050:
2045:
2043:
2039:
2030:
2026:
2025:
2024:
2021:
2017:
2012:
2008:
2004:
1998:United States
1995:
1987:
1983:
1979:
1977:
1973:
1970:
1968:
1964:
1963:
1961:
1957:
1953:
1952:
1941:
1938:
1935:
1934:
1930:
1927:
1924:
1921:
1920:
1916:
1913:
1910:
1909:
1896:
1894:
1889:
1885:
1881:
1877:
1874:(Christmas),
1873:
1869:
1865:
1861:
1855:
1851:
1841:
1839:
1835:
1831:
1818:
1817:James Clapper
1814:
1810:
1806:
1802:
1799:
1796:
1792:
1789:
1786:
1783:
1780:
1776:
1773:
1770:
1766:
1762:
1758:
1755:
1752:
1749:
1746:
1745:United States
1742:
1741:Kevin Mitnick
1739:
1736:
1732:
1728:
1724:
1721:
1718:
1714:
1711:
1707:
1704:
1701:
1697:
1694:
1691:
1687:
1684:
1681:
1677:
1673:
1669:
1666:
1663:
1659:
1658:United States
1655:
1651:
1650:Gary McKinnon
1648:
1645:
1641:
1640:Kevin Mitnick
1637:
1633:
1629:
1625:
1621:
1620:Susan Headley
1618:
1615:
1611:
1610:
1605:
1601:
1598:
1595:
1591:
1587:
1584:
1581:
1577:
1574:
1571:
1567:
1564:
1563:
1561:
1550:
1537:
1536:
1535:
1534:
1526:
1523:
1520:
1519:
1515:
1514:point of sale
1510:
1506:
1503:
1502:
1497:
1493:
1491:Computer worm
1490:
1489:
1485:
1481:
1477:
1474:
1473:
1469:
1465:
1461:
1457:
1453:
1451:Trojan horses
1450:
1449:
1442:
1441:
1437:
1434:
1429:
1428:
1427:Name-dropping
1424:
1420:
1419:
1415:
1411:
1410:
1406:
1405:
1403:
1402:
1397:
1396:
1392:
1391:
1385:
1381:
1378:
1377:
1373:
1368:
1364:
1361:
1360:
1355:
1351:
1348:
1347:
1343:
1339:
1335:
1332:
1331:
1326:
1323:
1320:
1319:
1315:
1311:
1308:
1307:
1303:
1299:
1296:
1295:
1291:
1287:
1286:port scanners
1283:
1279:
1276:
1275:
1268:
1265:
1257:
1247:
1243:
1239:
1233:
1232:
1228:
1223:This section
1221:
1217:
1212:
1211:
1203:
1201:
1197:
1193:
1189:
1185:
1181:
1177:
1173:
1172:SQL injection
1167:
1157:
1151:
1148:
1145:
1142:
1139:
1136:
1135:
1134:
1131:
1127:
1117:
1115:
1111:
1107:
1103:
1099:
1095:
1091:
1087:
1083:
1073:
1071:
1058:
1055:
1052:
1048:
1044:
1041:
1040:
1039:
1037:
1033:
1029:
1019:
1017:
1013:
1009:
1003:
993:
991:
988:A neophyte ("
981:
979:
975:
971:
970:script kiddie
965:
964:Script kiddie
958:Script kiddie
955:
953:
949:
945:
941:
937:
936:social status
927:
922:
912:
909:
905:
901:
897:
891:
881:
879:
875:
871:
867:
861:
851:
848:
844:
839:
837:
833:
832:script kiddie
829:
825:
821:
817:
816:
811:
802:
798:
789:
787:
786:
781:
777:
773:
772:
767:
762:
760:
759:
754:
750:
746:
741:
737:
732:
730:
726:
725:
720:
719:
714:
710:
706:
702:
698:
697:United States
694:
690:
686:
682:
681:
675:
671:
667:
666:
661:
657:
656:
650:
648:
647:
642:
641:
636:
632:
620:
619:
614:
610:
605:
595:
593:
589:
585:
584:
579:
575:
571:
566:
564:
560:
556:
552:
540:
535:
533:
528:
526:
521:
520:
518:
517:
510:
509:
505:
503:
502:
498:
496:
493:
491:
490:
486:
485:
479:
478:
471:
467:
464:
461:
458:
455:
452:
449:
446:
443:
440:
438:
435:
433:
430:
429:
426:
421:
420:
413:
410:
408:
405:
403:
400:
399:
396:
391:
390:
383:
380:
378:
375:
373:
370:
368:
365:
363:
360:
358:
355:
353:
350:
348:
345:
343:
340:
338:
335:
333:
330:
328:
325:
323:
320:
318:
315:
314:
311:
306:
305:
298:
295:
293:
290:
289:
286:
281:
280:
273:
272:Vulnerability
270:
268:
265:
263:
260:
258:
255:
253:
250:
249:
246:
245:Hacking tools
241:
240:
233:
232:Script kiddie
230:
228:
225:
223:
220:
219:
216:
211:
210:
203:
200:
198:
195:
193:
190:
188:
185:
183:
180:
178:
175:
173:
170:
169:
166:
161:
160:
151:
148:
146:
143:
141:
138:
137:
136:
132:
130:
129:Maker culture
127:
125:
122:
120:
117:
115:
114:
110:
108:
105:
104:
101:
97:
92:
91:
84:
81:
79:
76:
74:
71:
69:
66:
65:
62:
57:
56:
53:
50:
49:
45:
44:
41:
37:
33:
19:
5651:
5639:
5627:
5100:Data masking
4659:Cyberwarfare
4526:
4507:
4486:
4464:
4443:
4423:
4413:February 20,
4411:. Retrieved
4399:
4393:
4369:
4349:
4329:
4309:
4295:cite journal
4283:. Retrieved
4271:
4267:
4246:
4241:February 20,
4239:. Retrieved
4230:
4220:
4210:February 21,
4208:. Retrieved
4195:
4186:
4176:February 21,
4174:. Retrieved
4165:
4155:
4135:
4116:
4097:
4080:
4061:
4054:
4046:
4030:
4006:
3998:
3982:
3962:
3955:
3943:. Retrieved
3939:the original
3925:
3913:. Retrieved
3904:
3895:
3883:. Retrieved
3874:
3865:
3853:. Retrieved
3844:
3840:
3830:
3818:. Retrieved
3809:
3800:
3781:
3775:
3767:
3763:
3758:
3751:
3747:
3742:
3734:
3730:
3725:
3713:. Retrieved
3699:
3679:
3654:
3625:Myre, Greg.
3621:
3601:
3581:
3561:
3553:
3544:
3534:February 27,
3532:. Retrieved
3502:. Retrieved
3493:
3480:
3468:. Retrieved
3459:
3446:
3438:
3431:. Retrieved
3427:the original
3422:
3413:
3394:
3388:
3367:
3359:
3345:cite journal
3310:
3306:
3295:
3276:
3232:
3226:
3221:Robert Moore
3206:
3200:
3181:
3153:
3147:
3133:(7): 10β13.
3130:
3126:
3120:
3108:. Retrieved
3072:
3046:. Retrieved
3037:
3028:
3019:
3013:
3001:|title=
2981:
2976:
2968:the original
2961:
2938:September 6,
2936:. Retrieved
2922:
2906:
2899:
2891:
2884:. Retrieved
2875:
2865:
2857:
2850:. Retrieved
2835:
2828:stallman.org
2827:
2812:
2800:. Retrieved
2786:
2765:
2737:
2732:
2707:
2703:
2697:
2623:Cyber spying
2598:
2583:
2575:
2567:
2556:
2545:
2534:
2523:
2512:
2501:
2487:
2465:
2458:
2451:
2444:
2437:
2432:Tron: Legacy
2430:
2423:
2416:
2409:
2402:
2395:
2388:
2381:
2374:
2367:
2360:
2353:
2345:
2338:
2331:
2324:
2317:
2310:
2303:
2296:
2289:
2270:
2259:
2248:
2233:
2221:
2212:Ender's Game
2210:
2203:
2191:
2175:
2163:
2122:cyberculture
2115:
2093:
2089:
2083:
2081:
2046:
2041:
2037:
2035:
2001:
1993:
1959:
1925:
1878:(February),
1857:
1854:Hacker group
1827:
1813:John Brennan
1769:Len Sassaman
1765:Dan Kaminsky
1751:Len Sassaman
1733:, the first
1686:Guccifer 2.0
1607:
1593:
1576:Dan Kaminsky
1532:
1531:
1456:Trojan horse
1439:
1438:
1426:
1425:
1417:
1416:
1409:Intimidation
1408:
1407:
1388:
1260:
1251:
1236:Please help
1224:
1169:
1155:
1150:Exploitation
1132:
1129:
1079:
1070:cyberwarfare
1067:
1064:Nation state
1034:
1031:
1015:
1005:
987:
977:
973:
967:
939:
933:
930:Elite hacker
924:
893:
863:
846:
842:
840:
835:
813:
812:, author of
808:
799:
795:
783:
769:
763:
756:
736:Dan Glickman
733:
728:
722:
716:
678:
670:Jeff Bridges
663:
653:
651:
644:
638:
628:
616:
615:, author of
582:
581:
577:
567:
550:
548:
506:
499:
487:
482:Publications
327:Trojan horse
292:HackThisSite
111:
51:
40:
5488:Rickrolling
5289:Shitposting
5264:Little Pink
5040:Misuse case
4874:Infostealer
4849:Email fraud
4814:Data breach
4649:Cybergeddon
4285:January 27,
3733:(2016): 8.
3565:Tidy, Joe.
2907:Jargon File
2710:: 277β300.
2600:Underground
2552:Steven Levy
2439:Untraceable
2369:The Net 2.0
2261:Neuromancer
2236:(anthology)
2223:Evil Genius
2202:Alice from
2007:Β§ 1030
1949:Netherlands
1917:Punishment
1801:Kane Gamble
1723:Jude Milhon
1668:Gordon Lyon
1654:extradition
1644:Los Angeles
1600:Eric Corley
1586:Ed Cummings
1418:Helpfulness
1254:August 2011
1102:Cyber theft
1098:state actor
780:Morris worm
691:, known as
649:newsgroup.
495:Hacker News
382:Infostealer
165:Conferences
119:Hackerspace
5668:Categories
5652:Wiktionary
5541:Challenges
5420:Imageboard
5274:Sealioning
5105:Encryption
4981:Web shells
4921:Ransomware
4869:Hacktivism
4632:Cybercrime
3915:August 13,
3855:August 13,
3820:August 12,
3715:August 13,
3452:Fried, Ina
2690:References
2633:Cybercrime
2354:The Matrix
2272:Snow Crash
2148:novels of
2129:pseudonyms
2110:See also:
1965:Defeating
1958:prohibits
1866:(Summer),
1834:hacktivism
1727:cypherpunk
1628:pretexting
1468:Trojan War
1357:passwords.
1328:passwords.
1206:Techniques
1108:and other
1090:ransomware
1086:privateers
1036:Hacktivism
1028:Hacktivist
1022:Hacktivist
749:The Mentor
592:white hats
588:black hats
555:exploiting
352:Logic bomb
347:Ransomware
124:Hacktivism
5453:goatse.cx
5433:Anonymous
5328:Chatspeak
5259:Keylogger
4936:Shellcode
4931:Scareware
4779:Crimeware
4739:Backdoors
4280:2451-9588
3945:April 10,
3847:(2): 80.
3671:1556-5068
3337:252096635
3329:2158-2440
3307:SAGE Open
3251:cite book
3048:April 14,
2992:cite news
2724:207085416
2489:Mr. Robot
2482:TV series
2418:Take Down
2397:Swordfish
2312:Eagle Eye
2291:Antitrust
2240:Jack Dann
2162:from the
2146:cyberpunk
2133:metaphors
2126:fictional
2118:cyberpunk
2016:18 U.S.C.
1986:passwords
1982:usernames
1864:SummerCon
1830:1337speak
1761:biohacker
1710:Blue Pill
1636:phreaking
1509:keylogger
1466:from the
1460:back door
1444:purposes.
1440:Technical
1290:Firewalls
1225:does not
1114:extortion
1012:Microsoft
884:Black hat
854:White hat
828:black hat
820:white hat
635:BBS scene
631:phreaking
470:Blue team
462:(defunct)
456:(defunct)
450:(defunct)
444:(defunct)
432:Anonymous
372:Web shell
222:Crimeware
202:Summercon
150:White hat
140:Black hat
133:Types of
107:Hackathon
68:Phreaking
5628:Category
5571:Politics
5503:Tripcode
5483:Pedobear
5336:Emoticon
5299:Spamming
5279:Phishing
5239:Edgelord
5110:Firewall
5015:Defenses
4941:Spamming
4926:Rootkits
4899:Phishing
4859:Exploits
4235:Archived
4204:Archived
4170:Archived
4144:Archived
4124:Archived
4039:Archived
4015:Archived
3991:Archived
3909:Archived
3879:Archived
3875:BBC News
3849:Archived
3814:Archived
3688:Archived
3630:Archived
3610:Archived
3590:Archived
3570:Archived
3528:Archived
3498:Archived
3464:Archived
3110:July 21,
3104:Archived
3100:15187375
3042:Archived
3020:Newsweek
2932:Archived
2911:Archived
2903:See the
2886:June 21,
2880:Archived
2846:Archived
2820:Archived
2796:Archived
2611:See also
2446:WarGames
2390:Sneakers
2326:Firewall
2298:Blackhat
1888:H.O.P.E.
1876:ShmooCon
1747:history.
1717:Qubes OS
1590:Bernie S
1190:(HTTP),
1008:blue hat
996:Blue hat
984:Neophyte
950:such as
944:exploits
921:Grey hat
915:Grey hat
847:cracking
824:grey hat
745:grey hat
724:Newsweek
718:Newsweek
693:The 414s
680:WarGames
674:software
646:alt.2600
643:and the
466:Red team
322:Backdoor
197:ShmooCon
145:Grey hat
5508:Weeaboo
5498:Rule 63
5493:Rule 34
5410:Sexting
5269:Malware
5249:Griefer
5244:Flaming
4951:Spyware
4894:Payload
4889:Malware
4829:Viruses
4809:Botnets
4716:Threats
4067:133β134
3841:Esquire
3810:DEF CON
3750:391-405
3504:May 31,
3470:May 31,
3433:May 31,
2802:May 23,
2658:IT risk
2383:Skyfall
2362:The Net
2340:Hackers
2234:Hackers
2032:States;
1939:Hacking
1914:Offence
1911:Section
1872:HoHoCon
1868:DEF CON
1824:Customs
1713:rootkit
1656:to the
1528:attack.
1390:Hackers
1367:rootkit
1362:Rootkit
1246:removed
1231:sources
1186:(FTP),
1120:Attacks
1106:Bitcoin
1016:BlueHat
1002:BlueHat
978:skiddie
843:cracker
836:cracker
805:Cracker
598:History
583:cracker
563:network
454:LulzSec
342:Spyware
317:Rootkit
310:Malware
262:Payload
252:Exploit
182:DEF CON
135:hackers
61:History
5640:Portal
5601:Usenet
5576:Videos
5561:Images
5556:Gaming
5473:O RLY?
5468:Newbie
5458:Lolcat
5304:Tankie
5254:Hacker
5234:Doxing
5214:Baizuo
5145:(SIEM)
5122:(HIDS)
5006:Zombie
4743:Bombs
4724:Adware
4533:
4514:
4495:
4472:
4451:
4430:
4377:
4356:
4337:
4316:
4278:
4104:
4073:
3970:
3788:
3669:
3401:
3376:
3335:
3327:
3283:
3239:
3213:
3188:
3160:
3098:
3088:
2852:May 8,
2774:
2744:
2722:
2356:series
2305:Cypher
2100:ezines
2090:Hakin9
2085:Phrack
2018:
2005:
1811:chief
1630:, and
1578:was a
1200:Telnet
1053:; and,
990:newbie
948:groups
758:Phrack
729:hacker
701:Canada
578:hacker
570:hacker
508:Phrack
425:Groups
357:Botnet
297:Zone-H
32:Hacker
5591:TL;DR
5566:Music
5546:Email
5523:Memes
5438:-chan
5428:4chan
5363:Owned
5348:Emoji
5309:Troll
5206:Abuse
4991:Worms
4986:Wiper
4904:Voice
4752:Logic
3731:Eweek
3709:(PDF)
3333:S2CID
3096:S2CID
2720:S2CID
2283:Films
2165:.hack
2160:Helba
2139:Books
1904:India
1638:with
1480:virus
1464:horse
1413:seek.
940:elite
685:NORAD
332:Virus
100:ethic
5586:Doge
5551:Film
5513:Yiff
5463:Lurk
5448:Clop
5400:NSFW
5383:w00t
5368:Pr0n
5358:Leet
5353:Hodl
4757:Time
4747:Fork
4531:ISBN
4512:ISBN
4493:ISBN
4470:ISBN
4449:ISBN
4428:ISBN
4415:2014
4375:ISBN
4354:ISBN
4335:ISBN
4314:ISBN
4301:link
4287:2022
4276:ISSN
4243:2017
4212:2014
4178:2014
4102:ISBN
4071:ISBN
3968:ISBN
3947:2010
3917:2017
3887:2012
3857:2017
3822:2017
3786:ISBN
3717:2013
3667:ISSN
3552:In:
3536:2012
3506:2010
3472:2010
3435:2010
3399:ISBN
3374:ISBN
3351:link
3325:ISSN
3281:ISBN
3257:link
3237:ISBN
3211:ISBN
3186:ISBN
3158:ISBN
3131:2011
3112:2023
3086:ISBN
3050:2006
3005:help
2963:Time
2940:2015
2888:2019
2854:2010
2804:2013
2772:ISBN
2742:ISBN
2592:and
2425:Tron
2242:and
2144:The
2120:and
2092:and
2047:The
2023:as:
1984:and
1852:and
1767:and
1715:and
1496:worm
1229:any
1227:cite
1178:and
974:skid
830:and
751:'s "
711:and
699:and
665:Tron
367:HIDS
337:Worm
98:and
5395:LOL
5390:Fap
5378:Teh
5373:Pwn
5341:uwu
4762:Zip
4404:doi
4045:".
4021:".
3997:".
3845:124
3659:doi
3315:doi
3135:doi
3078:doi
2712:doi
2708:235
2603:by
2588:by
2561:by
2550:by
2539:by
2528:by
2517:by
2506:by
2275:by
2264:by
2253:by
2238:by
2226:by
2215:by
2196:by
2190:in
2180:by
2049:FBI
2042:Act
1809:CIA
1700:Tor
1580:DNS
1240:by
1196:SSH
1192:PHP
1049:or
976:or
872:or
845:or
561:or
377:RCE
34:or
5670::
5478:OP
5443:CP
4400:49
4398:.
4392:.
4297:}}
4293:{{
4274:.
4270:.
4266:.
4245:.
4233:.
4229:.
4198:.
4194:.
4168:.
4164:.
4088:^
4079:.
4069:.
3903:.
3873:.
3843:.
3839:.
3812:.
3808:.
3665:.
3657:.
3653:.
3641:^
3514:^
3496:.
3492:.
3458:.
3437:.
3421:.
3347:}}
3343:{{
3331:.
3323:.
3311:12
3309:.
3305:.
3265:^
3253:}}
3249:{{
3172:^
3129:.
3102:.
3094:.
3084:.
3070:.
3058:^
3036:.
2996::
2994:}}
2990:{{
2960:.
2948:^
2890:.
2878:.
2874:.
2856:.
2844:.
2826:.
2794:.
2753:^
2718:.
2706:.
2088:,
2044:.
1936:66
1922:65
1882:,
1870:,
1779:C#
1626:,
1507:A
1478:A
1454:A
1435:).
1365:A
1352:A
1336:A
1280:A
1198:,
1194:,
1174:,
1006:A
968:A
934:A
894:A
864:A
826:,
822:,
761:.
707:,
549:A
468:/
5190:e
5183:t
5176:v
4600:e
4593:t
4586:v
4539:.
4520:.
4501:.
4478:.
4457:.
4436:.
4417:.
4406::
4383:.
4362:.
4343:.
4322:.
4303:)
4289:.
4272:5
4214:.
4180:.
4110:.
4034:"
4010:"
3986:"
3976:.
3949:.
3919:.
3889:.
3859:.
3824:.
3794:.
3752:.
3719:.
3673:.
3661::
3538:.
3508:.
3474:.
3407:.
3382:.
3353:)
3339:.
3317::
3289:.
3259:)
3245:.
3219:.
3194:.
3166:.
3141:.
3137::
3114:.
3080::
3052:.
3007:)
3003:(
2942:.
2830:.
2806:.
2780:.
2748:.
2726:.
2714::
2476:"
2472:"
1988:.
1819:.
1797:.
1781:.
1737:.
1719:.
1682:.
1374:.
1267:)
1261:(
1256:)
1252:(
1248:.
1234:.
538:e
531:t
524:v
38:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.