Tagged articles
2 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Aug 28, 2022 · Information Security

Essential Q&A on White‑Hat Hacking and Core Information Security Concepts

This article provides concise answers to 24 common questions about white‑hat hacking, covering definitions, tools, attack techniques such as footprinting, brute‑force, DoS, SQL injection, ARP spoofing, XSS, and practical defenses like input validation, firewalls, encryption, and secure coding practices.

White Hatcybersecuritypenetration testing
0 likes · 14 min read
Essential Q&A on White‑Hat Hacking and Core Information Security Concepts
21CTO
21CTO
Jul 10, 2020 · Information Security

Why Are ‘Black Hat’ and ‘White Hat’ Terms Under Fire in Cybersecurity?

The article examines the controversy sparked by Google’s VP withdrawing from Black Hat USA 2020 and the push for neutral terminology in cybersecurity, exploring historical origins, community reactions, and recent industry changes toward inclusive language.

Black HatTerminologyWhite Hat
0 likes · 7 min read
Why Are ‘Black Hat’ and ‘White Hat’ Terms Under Fire in Cybersecurity?