Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Hacker

Index Hacker

A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. [1]

61 relations: Alan Kay, Bank, Black hat, Blue box, Case modding, Chaos Computer Club, Clifford Stoll, Compiler, Computer, Computer security, Cyberspace, Demoscene, Exploit (computer security), Grey hat, Hacker culture, Hacker Culture, Hackers & Painters, Hackers: Heroes of the Computer Revolution, Homebrew Computer Club, Incompatible Timesharing System, Internet troll, Jargon, Jargon File, Life hack, Linus Torvalds, Linux kernel, Lock (security device), Mainstream media, Massachusetts Institute of Technology, Masters of Deception, MIT Computer Science and Artificial Intelligence Laboratory, Morris worm, Password, Payment card number, Phreaking, Popular culture, Programmer, Request for Comments, Rolling Stone, Script kiddie, Security hacker, Shibboleth, Simon & Schuster, Software bug, Software cracking, Steve Wozniak, Stewart Brand, Systems design, Tech Model Railroad Club, The 414s, ..., The Art of Unix Programming, The Cuckoo's Egg, The Tech (newspaper), Trojan horse (computing), Turing Award, Underground (Dreyfus book), Unix, Video game, Vulnerability (computing), White hat (computer security), 23 (film). Expand index (11 more) »

Alan Kay

Alan Curtis Kay (born May 17, 1940 published by the Association for Computing Machinery 2012) is an American computer scientist.

New!!: Hacker and Alan Kay · See more »

Bank

A bank is a financial institution that accepts deposits from the public and creates credit.

New!!: Hacker and Bank · See more »

Black hat

A black hat hacker (or black-hat hacker) is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".

New!!: Hacker and Black hat · See more »

Blue box

A blue box is an electronic device that generates the in-band signaling audio tones formerly used to control long-distance telephone exchanges.

New!!: Hacker and Blue box · See more »

Case modding

Case modification, commonly referred to as case modding, is the modification of a computer case or a video game console chassis.

New!!: Hacker and Case modding · See more »

Chaos Computer Club

The Chaos Computer Club (CCC) is Europe's largest association of hackers with 7,700 registered members.

New!!: Hacker and Chaos Computer Club · See more »

Clifford Stoll

Clifford Paul "Cliff" Stoll (born June 4, 1950) is an American astronomer, author and teacher.

New!!: Hacker and Clifford Stoll · See more »

Compiler

A compiler is computer software that transforms computer code written in one programming language (the source language) into another programming language (the target language).

New!!: Hacker and Compiler · See more »

Computer

A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.

New!!: Hacker and Computer · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Hacker and Computer security · See more »

Cyberspace

Cyberspace is interconnected technology.

New!!: Hacker and Cyberspace · See more »

Demoscene

The demoscene is an international computer art subculture focused on producing demos: self-contained, sometimes extremely small, computer programs that produce audio-visual presentations.

New!!: Hacker and Demoscene · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Hacker and Exploit (computer security) · See more »

Grey hat

The term "grey hat", alternatively spelled as "greyhat" or "gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.

New!!: Hacker and Grey hat · See more »

Hacker culture

The hacker culture is a subculture of individuals who enjoy the intellectual challenge of creatively overcoming limitations of software systems to achieve novel and clever outcomes.

New!!: Hacker and Hacker culture · See more »

Hacker Culture

Hacker Culture is a cultural criticism book written by Douglas Thomas that deals with hacker ethics and hackers.

New!!: Hacker and Hacker Culture · See more »

Hackers & Painters

Hackers & Painters: Big Ideas from the Computer Age is a collection of essays from Paul Graham discussing hacking, programming languages, start-up companies, and many other technological issues.

New!!: Hacker and Hackers & Painters · See more »

Hackers: Heroes of the Computer Revolution

Hackers: Heroes of the Computer Revolution is a book by Steven Levy about hacker culture.

New!!: Hacker and Hackers: Heroes of the Computer Revolution · See more »

Homebrew Computer Club

The Homebrew Computer Club was an early computer hobbyist group in Silicon Valley which met from March 5, 1975 to December 1986, and was depicted in the films Pirates of Silicon Valley (1999) and Jobs (2013), as well as the PBS documentary series, Triumph of the Nerds (1996).

New!!: Hacker and Homebrew Computer Club · See more »

Incompatible Timesharing System

Incompatible Timesharing System (ITS) is a time-sharing operating system developed principally by the MIT Artificial Intelligence Laboratory, with help from Project MAC.

New!!: Hacker and Incompatible Timesharing System · See more »

Internet troll

In Internet slang, a troll is a person who starts quarrels or upsets people on the Internet to distract and sow discord by posting inflammatory and digressive, extraneous, or off-topic messages in an online community (such as a newsgroup, forum, chat room, or blog) with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, whether for the troll's amusement or a specific gain.

New!!: Hacker and Internet troll · See more »

Jargon

Jargon is a type of language that is used in a particular context and may not be well understood outside that context.

New!!: Hacker and Jargon · See more »

Jargon File

The Jargon File is a glossary and usage dictionary of slang used by computer programmers.

New!!: Hacker and Jargon File · See more »

Life hack

Life hack (or life hacking) refers to any trick, shortcut, skill, or novelty method that increases productivity and efficiency, in all walks of life.

New!!: Hacker and Life hack · See more »

Linus Torvalds

Linus Benedict Torvalds (born December 28, 1969) is a Finnish-American software engineer who is the creator, and historically, the principal developer of the Linux kernel, which became the kernel for operating systems such as the Linux operating systems, Android, and Chrome OS.

New!!: Hacker and Linus Torvalds · See more »

Linux kernel

The Linux kernel is an open-source monolithic Unix-like computer operating system kernel.

New!!: Hacker and Linux kernel · See more »

Lock (security device)

A lock is a mechanical or electronic fastening device that is released by a physical object (such as a key, keycard, fingerprint, RFID card, security token, coin etc.), by supplying secret information (such as a keycode or password), or by a combination thereof.

New!!: Hacker and Lock (security device) · See more »

Mainstream media

Mainstream media (MSM) is a term and abbreviation used to refer collectively to the various large mass news media that influence a large number of people, and both reflect and shape prevailing currents of thought.

New!!: Hacker and Mainstream media · See more »

Massachusetts Institute of Technology

The Massachusetts Institute of Technology (MIT) is a private research university located in Cambridge, Massachusetts, United States.

New!!: Hacker and Massachusetts Institute of Technology · See more »

Masters of Deception

Masters of Deception (MOD) was a New York-based group of hackers, most widely known in media for their exploits of telephone company infrastructure and later prosecution.

New!!: Hacker and Masters of Deception · See more »

MIT Computer Science and Artificial Intelligence Laboratory

MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) is a research institute at the Massachusetts Institute of Technology formed by the 2003 merger of the Laboratory for Computer Science and the Artificial Intelligence Laboratory.

New!!: Hacker and MIT Computer Science and Artificial Intelligence Laboratory · See more »

Morris worm

The Morris worm or Internet worm of November 2, 1988, was one of the first computer worms distributed via the Internet.

New!!: Hacker and Morris worm · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Hacker and Password · See more »

Payment card number

A payment card number, primary account number (PAN), or simply a card number, is the card identifier found on payment cards, such as credit cards and debit cards, as well as stored-value cards, gift cards and other similar cards.

New!!: Hacker and Payment card number · See more »

Phreaking

Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.

New!!: Hacker and Phreaking · See more »

Popular culture

Popular culture (also called pop culture) is generally recognized as a set of the practices, beliefs, and objects that are dominant or ubiquitous in a society at a given point in time.

New!!: Hacker and Popular culture · See more »

Programmer

A programmer, developer, dev, coder, or software engineer is a person who creates computer software.

New!!: Hacker and Programmer · See more »

Request for Comments

In information and communications technology, a Request for Comments (RFC) is a type of publication from the technology community.

New!!: Hacker and Request for Comments · See more »

Rolling Stone

Rolling Stone is an American monthly magazine that focuses on popular culture.

New!!: Hacker and Rolling Stone · See more »

Script kiddie

In programming and hacking culture, a script kiddie or skiddie is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites.

New!!: Hacker and Script kiddie · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Hacker and Security hacker · See more »

Shibboleth

A shibboleth is any custom or tradition, particularly a speech pattern, that distinguishes one group of people (an ingroup) from others (outgroups).

New!!: Hacker and Shibboleth · See more »

Simon & Schuster

Simon & Schuster, Inc., a subsidiary of CBS Corporation, is an American publishing company founded in New York City in 1924 by Richard Simon and Max Schuster.

New!!: Hacker and Simon & Schuster · See more »

Software bug

A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.

New!!: Hacker and Software bug · See more »

Software cracking

Software cracking (known as "breaking" in the 1980s) is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, especially copy protection features (including protection against the manipulation of software, serial number, hardware key, date checks and disc check) or software annoyances like nag screens and adware.

New!!: Hacker and Software cracking · See more »

Steve Wozniak

Stephen Gary Wozniak (born on August 11, 1950), often referred to by the nickname Woz, is an American inventor, electronics engineer, programmer, philanthropist, and technology entrepreneur who co-founded Apple Computer, Inc.

New!!: Hacker and Steve Wozniak · See more »

Stewart Brand

Stewart Brand (born December 14, 1938) is an American writer, best known as editor of the Whole Earth Catalog.

New!!: Hacker and Stewart Brand · See more »

Systems design

Systems design is the process of defining the architecture, modules, interfaces, and data for a system to satisfy specified requirements.

New!!: Hacker and Systems design · See more »

Tech Model Railroad Club

The Tech Model Railroad Club (TMRC) is a student organization at the Massachusetts Institute of Technology (MIT).

New!!: Hacker and Tech Model Railroad Club · See more »

The 414s

The 414s were a group of computer hackers who broke into dozens of high-profile computer systems, including ones at Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific Bank, in 1982 and 1983.

New!!: Hacker and The 414s · See more »

The Art of Unix Programming

The Art of Unix Programming by Eric S. Raymond is a book about the history and culture of Unix programming from its earliest days in 1969 to 2003 when it was published, covering both genetic derivations such as BSD and conceptual ones such as Linux.

New!!: Hacker and The Art of Unix Programming · See more »

The Cuckoo's Egg

The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage is a 1989 book written by Clifford Stoll.

New!!: Hacker and The Cuckoo's Egg · See more »

The Tech (newspaper)

The Tech, first published on November 16, 1881, is the campus newspaper at the Massachusetts Institute of Technology in Cambridge, Massachusetts.

New!!: Hacker and The Tech (newspaper) · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Hacker and Trojan horse (computing) · See more »

Turing Award

The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to an individual selected for contributions "of lasting and major technical importance to the computer field".

New!!: Hacker and Turing Award · See more »

Underground (Dreyfus book)

Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier is a 1997 book by Suelette Dreyfus, researched by Julian Assange.

New!!: Hacker and Underground (Dreyfus book) · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Hacker and Unix · See more »

Video game

A video game is an electronic game that involves interaction with a user interface to generate visual feedback on a video device such as a TV screen or computer monitor.

New!!: Hacker and Video game · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

New!!: Hacker and Vulnerability (computing) · See more »

White hat (computer security)

The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization's information systems.

New!!: Hacker and White hat (computer security) · See more »

23 (film)

23 (German: 23 – Nichts ist so wie es scheint - "23 – Nothing is what it seems") is a 1998 German drama thriller film about a young hacker Karl Koch, who died on 23 May 1989, a presumed suicide.

New!!: Hacker and 23 (film) · See more »

Redirects here:

Computer hacker, Computer hacking, H4x0r5, H4x0rz, H@x0r, Hack (slang), Hack (technology slang), Hack (term), Hacker (computer expert), Hacker (computing), Hacker (expert), Hacker (term), Hacker community, Hacker definition controversy, Hacker naming controversy, Hacker style, Hackers, Hacking (computing), Hackz0rz, Haxorz, Super Hacker, Website Hacking.

References

[1] https://en.wikipedia.org/wiki/Hacker

OutgoingIncoming
Hey! We are on Facebook now! »