Hacker/Related Articles: Difference between revisions
< Hacker
Jump to navigation
Jump to search
imported>Daniel Mietchen m (Robot: encapsulating subpages template in noinclude tag) |
No edit summary |
||
(3 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
<noinclude>{{subpages}}</noinclude> | <noinclude>{{subpages}}</noinclude> | ||
{{TOC|right}} | |||
==Parent topics== | ==Parent topics== | ||
{{r|Information assurance}} | |||
{{r|Information security||**}} | |||
{{r|Computer security||***}} | |||
{{r|Network security||***}} | |||
{{r|Massachusetts Institute of Technology}} | |||
==Subtopics== | ==Subtopics== | ||
{{r|Hacker ethic}} | |||
{{r|Miscreant}} | |||
==Related Topics== | |||
{{r|Wetware hacker}} | |||
{{r|Malware}} | |||
<!-- Remove the section below after copying links to the other sections. --> | <!-- Remove the section below after copying links to the other sections. --> | ||
==Bot-suggested topics== | ==Bot-suggested topics== | ||
{{r|Free Software Foundation}} | {{r|Free Software Foundation}} | ||
{{r|GNU}} | {{r|GNU}} | ||
{{r|Open source software}} | {{r|Open source software}} | ||
{{r|Richard Stallman}} | {{r|Richard Stallman}} | ||
{{r|Source code}} | {{r|Source code}} | ||
{{r| | ==Articles related by keyphrases (Bot populated)== | ||
{{r| | {{r|System Control And Data Acquisition}} | ||
{{r| | {{r|Miscreant}} | ||
{{r|Pulmonary embolism}} | |||
Latest revision as of 06:00, 25 August 2024
- See also changes related to Hacker, or pages that link to Hacker or to this page or whose text contains "Hacker".
Parent topics
- Information assurance [r]: The combination of computer security, communications security, auditing and administrative controls such as physical security and personnel security clearances [e]
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Computer security [r]: Computer security is a branch of technology known as information security as applied to computers. [e]
- Network security [r]: Add brief definition or description
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
- Massachusetts Institute of Technology [r]: A private research university in Cambridge, Massachusetts with a strong emphasis on scientific and technological research. [e]
Subtopics
- Hacker ethic [r]: Add brief definition or description
- Miscreant [r]: One who enters a computer or computer network without authorization by the owner or administrator, regardless of the motivation for entry [e]
Related Topics
- Wetware hacker [r]: Person who experiments with biological materials to advance knowledge, and does so in a spirit of creative improvisation. [e]
- Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
Bot-suggested topics
- Free Software Foundation [r]: Massachusetts-based non-profit organization founded by Richard Stallman to support the free software movement. [e]
- GNU [r]: A free operating system modeled after AT&T's UNIX, originally announced by Dr. Richard Stallman on September 27th, 1983. The acronym GNU stands for "GNU is not Unix" and is intended to be a play on words. [e]
- Open source software [r]: Software where the source code is freely modifiable and redistributable. [e]
- Richard Stallman [r]: Software engineer and hacker who founded the GNU project and Free Software Foundation. [e]
- Source code [r]: Human-readable code which a compiler turns into a compiled piece of software or an interpreter runs. [e]
- System Control And Data Acquisition [r]: An industrial control system which uses a computer system monitoring and controlling process. [e]
- Miscreant [r]: One who enters a computer or computer network without authorization by the owner or administrator, regardless of the motivation for entry [e]
- Pulmonary embolism [r]: Blocking of the pulmonary artery or one of its branches by an embolus. [e]