Talk:Hacker
From Wikipedia, the free encyclopedia
Contents |
[edit] Request to restore semi-protection made
See linky. Abb3w 04:37, 3 February 2007 (UTC)
...and declined. Copied from the SP request page:
[edit]
Semi-protect against IP vandalism. On 2006-12-11, Pengo [semi-protected] the hacker page, due to the long history of vandalism. During the following one month period, no vandalism reversions (IP-based or User-named) were required. On 2007-01-12, User:Centrx [removed semi-protection], in the hope that "protection is no longer necessary". By my count of the 65 revisions since, roughtly seven in ten have been either vandalism, or reversions of same. I assert the evidence indicates User:Centrx was wildly optimistic. Since the earlier semi-protection appeared to reduce both anonymous and non-anonymous vandalism, I suggest this indicates semi-protection may be adequate. Abb3w 03:53, 3 February 2007 (UTC)
- There is not enough recent activity to justify protection at this time. Just watchlist and revert any vandalism. Cbrown1023 talk 04:10, 3 February 2007 (UTC)
- I would point out that pre-block activity levels (circa 160 per month) were consistent with oral sex, which is under long term semi-protection, and hacker has only a slightly lower (75% vs. 85%) ratio of vandalism. Abb3w 06:57, 3 February 2007 (UTC)
- Semi-protected. I'm not going to force this article to be protected if others don't agree, but this article has had a constant, low-level of vandalism for a very long time, and there is so sign that it will stop. It seems people think they are hackers if they can "hack" the hacker article. (Oddly, very few make it to Hacker (computer security), which would be a more appropriate target). My primary watchlist went serenely quiet while this article was semi-protected. —Pengo 04:43, 3 February 2007 (UTC)
Abb3w 16:10, 3 February 2007 (UTC)
[edit] Code
I've heard alot about writing code But I have yet to find a manual or anything that teaches you how. Can someone help?
- Code means source code, and coding is synonymous with programming. If you can't find a programming manual or tutorial on the Internet, then you haven't looked very hard. Try starting at www.python.org or try wikibooks (i don't know if these are any good): book 1 book 2. In future you should ask your questions at Wikipedia:Reference desk/Computing. —Pengo 22:24, 16 February 2007 (UTC)
- Rarely, it might refer to the encoding methods used to represent protocols (search for Internet RFC's; there's a couple thousand that detail how protocols are supposed to work) or encryption (GPG's source is publicly available; if you can't master the RSA algorithm, any of the more complex methods is hopeless to attempt). These are also of high educational value for Hackers of various sorts. Abb3w 04:10, 18 February 2007 (UTC)
[edit] Egomaniacs, self-promoters, minor bit-part players, and other non-notables
[edit] Abudal jaleel malik
Removed:
*Abudal jaleel malik,Now a well known hacker of pakistan who made a modified version ISLAMIC windows of winXP with many included features of mac and linux.Microsoft has demanded him from gov of pakistan
...since
- Main references on the web seem minor 1 2 3 (see web site credits in last)
- Included "features" from above seem mostly cosmetic
- Such compromise of Windows is at most trivial slipstreaming and keygen work, not substantial novel coding or development of a globally used coding language such as C++ or html
- Report that "Microsoft has demanded him from gov of pakistan" is unsourced, possible original research
- Punctuation, spelling, and choice of abbreviations unencyclopedic caliber to boot
Probably another ego link. "Wahoo, I wuz a hackor!" Abb3w 04:03, 18 February 2007 (UTC)
[edit] tapeworm
Removed:
- tapeworm, tapeworm (2005). 1337 h4x0r h4ndb00k. Sams Publishing. ISBN 0672327279.
This was inserted from IP address 204.238.189.254; today IP 206.166.48.106 (osfhealthcare-peoria-dist.peoria.lincon.net) is the last router responding to traceroute from my location towards that source, suggesting the edit was from a machine in the Peoria area. This book was previously added and removed back in 2005; since it was added prior to publication, I suggested the evidence indicated self-promotion from its author, apparently based in... the Peoria area.
Barring strong consensus otherwise, I believe it should be yanked from hacker as non-noteworthy as well as self-promotion. Amazon "customer" reviews are mixed; however, the only other book I saw reviewed by anyone who reviewed this with four or five stars was a Java for Dummies book. The rest trash it. I just read it via my job's Safari books on-line paid subscription; I can't even call it a bundle of worthless drivel without feeling that I am insulting fine summer beach-grade drivel everywhere. However after some consideration, I did add it over at script kiddie, since the tone seems about right.
[edit] Michael Urbanski
Removed:
- Michael Urbanski — The creator of the Project49 (P49) Operating system. Program was finished, but nevber released to the public due to a copyright law. At age 16 he still continues to work on open source projects for the University of Minnesota.
Inserted from an IP address in the Minnesota area. I find no mention of a "Project49" operating system via Google Groups or Web search, strongly suggestive of non-notability; further, that copyright law precluded release indicates he was arguably not the "creator" anyway. The "nevber" typo is consistent with the level of carelessness I have seen from young (18 and under) college students in their writing for classes. At this time, I have no further remarks consistent with WP:CIV. Abb3w 09:33, 23 February 2007 (UTC)
[edit] Removed link
I have removed the link to http://2600.ir/ as possible link-spam. If I'm mistaken and there is a valid reason for the link discuss here (If consensus, add it back). —TheJC (Talk • Contribs • Count) 12:34, 15 March 2007 (UTC)
- Quick check of site via Google shows forum with 56 members; non-notable IMHO. "Spam" may not be the right flavor of pink lunch meat product, but it's close enough for Iron Chef. Abb3w 12:55, 15 March 2007 (UTC)
[edit] Chronic Over-editing and Encyclo-nazism
Is it just me or does this article seem to be degress-ing, because this current version looks very different from the work of art of a month or two ago, a version, I might point out, that was worthy of a star. I understand the need to remove POV's and lines that may appear self-promotional, but if this over-editing isn't curbed, this article will soon deteriorate to the level of this garbage: Hacker (computer security) -- Kerowren (talk • contribs • count) 03:50, 25 March 2007 (UTC)
[edit] Style and approach
This article introduces hacker as a relatively static, modern term. I think it would be of tremendous value to give a tour of the evolution of the term from MIT all the way to the public/media exposure in the late 80s (especially as a result of the Morris Worm and DOS viruses) and then on to the various efforts to control its usage. I'm sure there are good sources for this. Levy's book is a good start for the older historical bits. -Harmil 14:00, 3 April 2007 (UTC)