diff --git a/docs/jargon-org.txt b/docs/jargon-org.txt index 5c32e71..7f5c1a2 100644 --- a/docs/jargon-org.txt +++ b/docs/jargon-org.txt @@ -19,7 +19,7 @@ Free Documentation License". * Generated -This file last generated Tuesday, 16 October 2018 08:58PM UTC +This file last generated Tuesday, 16 October 2018 09:11PM UTC * Glossary ** ( @@ -2279,7 +2279,9 @@ n.,obs. (alt.: bit-shift keyboard ) A non-standard keyboard layout that seems to n. [common] A collection of arcane, unpublished, and (by implication) mostly ad-hoc techniques developed for a particular application or systems area (compare black magic ). VLSI design and compiler code optimization were (in their beginnings) considered classic examples of black art; as theory developed they became deep magic , and once standard textbooks had been written, became merely heavy wizardry. The huge proliferation of formal and informal channels for spreading around new computer-related technologies during the last twenty years has made both the term black art and what it describes less common than formerly. See also voodoo programming. *** black hat -someone considering a potential business relationship with an ISP or other provider will post a query to a NANA group, asking about the provider's hat color. The term albedo has also been used to describe a provider's spam-friendliness. +1. n. A criminal, malicious or offensive security oriented hacker; a cracker. + +2. Name of a conference about offensive hacking. Also known as red teaming. Contrast with white hat. *** black hole n.,vt. [common] What data (a piece of email or netnews, or a stream of TCP/IP packets) has fallen into if it disappears mysteriously between its origin and destination sites (that is, without returning a bounce message ). I think there's a black hole at foovax ! conveys suspicion that site foovax has been dropping a lot of stuff on the floor lately (see drop on the floor ). The implied metaphor of email as interstellar travel is interesting in itself. @@ -3344,7 +3346,7 @@ n. [Vancouver area] A problem that occurs on a computer that will not reappear w n. [common] A reference that doesn't actually lead anywhere (in C and some other languages, a pointer that doesn't actually point at anything valid). Usually this happens because it formerly pointed to something that has moved or disappeared. Used as jargon in a generalization of its techspeak meaning; for example, a local phone number for a person who has since moved to the other coast is a dangling pointer. *** dark-side hacker -n. A criminal or malicious hacker; a cracker. From George Lucas's Darth Vader, seduced by the dark side of the Force. The implication that hackers form a sort of elite of technological Jedi Knights is intended. Oppose samurai. +See black hat. *** data controller In the language of data protection laws the "data controller" (DC) is the entity which stores and/or processes Personally Identifiable Information (PII) about "data subjects". @@ -8573,7 +8575,7 @@ Term used to refer to a well-known effect whereby function in a computing system n. [Stanford University] A period in larval stage during which student hackers hassle each other by attempting to log each other out of the system, delete each other's files, and otherwise wreak havoc, usually at the expense of the lesser users. *** white hat -See black hat. +A hacker who does not engage in offensive security practices (cracking). White hat hackers may still engage in red teaming or penetration testing but in a strictly legal manner ususlly only on machines which they own or which they are authorized to test. Contrast with black hat. *** whitelist n. The opposite of a blacklist. aka "allow list" That is, instead of being an explicit list of people or domains who are banned, it's an explicit list of people who are to be admitted. Hackers use this especially of lists of email addresses that are explicitly enabled to get past strict anti-spam filters. diff --git a/docs/jargon.1.gz b/docs/jargon.1.gz index 649d652..df1d1c5 100644 Binary files a/docs/jargon.1.gz and b/docs/jargon.1.gz differ diff --git a/docs/jargon.html b/docs/jargon.html index 203c39d..7cbb4db 100644 --- a/docs/jargon.html +++ b/docs/jargon.html @@ -18,7 +18,7 @@ Free Documentation License".

Generated

-This file last generated Tuesday, 16 October 2018 08:58PM UTC +This file last generated Tuesday, 16 October 2018 09:11PM UTC

Glossary

@@ -2735,9 +2735,9 @@ This file last generated Tuesday, 16 October 2018 08:58PM UTC n. [common] A collection of arcane, unpublished, and (by implication) mostly ad-hoc techniques developed for a particular application or systems area (compare black magic ). VLSI design and compiler code optimization were (in their beginnings) considered classic examples of black art; as theory developed they became deep magic , and once standard textbooks had been written, became merely heavy wizardry. The huge proliferation of formal and informal channels for spreading around new computer-related technologies during the last twenty years has made both the term black art and what it describes less common than formerly. See also voodoo programming.

black hat

-

- someone considering a potential business relationship with an ISP or other provider will post a query to a NANA group, asking about the provider's hat color. The term albedo has also been used to describe a provider's spam-friendliness. -

+

1. n. A criminal, malicious or offensive security oriented hacker; a cracker.

+ +

2. Name of a conference about offensive hacking. Also known as red teaming. Contrast with white hat.

black hole

n.,vt. [common] What data (a piece of email or netnews, or a stream of TCP/IP packets) has fallen into if it disappears mysteriously between its origin and destination sites (that is, without returning a bounce message ). I think there's a black hole at foovax ! conveys suspicion that site foovax has been dropping a lot of stuff on the floor lately (see drop on the floor ). The implied metaphor of email as interstellar travel is interesting in itself. @@ -3972,7 +3972,7 @@ This file last generated Tuesday, 16 October 2018 08:58PM UTC

dark-side hacker

- n. A criminal or malicious hacker; a cracker. From George Lucas's Darth Vader, seduced by the dark side of the Force. The implication that hackers form a sort of elite of technological Jedi Knights is intended. Oppose samurai. + See black hat.

data controller

@@ -10033,7 +10033,7 @@ This file last generated Tuesday, 16 October 2018 08:58PM UTC

white hat

- See black hat. + A hacker who does not engage in offensive security practices (cracking). White hat hackers may still engage in red teaming or penetration testing but in a strictly legal manner ususlly only on machines which they own or which they are authorized to test. Contrast with black hat.

whitelist

diff --git a/entries/black hat.txt b/entries/black hat.txt index 372ea43..ff09b5f 100644 --- a/entries/black hat.txt +++ b/entries/black hat.txt @@ -1,7 +1,5 @@ black hat -someone considering a potential business relationship with an ISP or other -provider will post a query to a NANA group, asking about the provider's hat -color. The term albedo has also been used to describe a provider's -spam-friendliness. - +1. n. A criminal, malicious or offensive security oriented hacker; a cracker. +2. Name of a conference about offensive hacking. Also known as red teaming. +Contrast with white hat. \ No newline at end of file diff --git a/entries/dark-side hacker.txt b/entries/dark-side hacker.txt index 6ae742d..9652a8f 100644 --- a/entries/dark-side hacker.txt +++ b/entries/dark-side hacker.txt @@ -1,7 +1,3 @@ dark-side hacker -n. A criminal or malicious hacker; a cracker. From George Lucas's Darth -Vader, seduced by the dark side of the Force. The implication that hackers -form a sort of elite of technological Jedi Knights is intended. Oppose -samurai. - +See black hat. diff --git a/entries/white hat.txt b/entries/white hat.txt index ec18a9b..6b00c9c 100644 --- a/entries/white hat.txt +++ b/entries/white hat.txt @@ -1,4 +1,6 @@ white hat -See black hat. - +A hacker who does not engage in offensive security practices (cracking). +White hat hackers may still engage in red teaming or penetration testing +but in a strictly legal manner ususlly only on machines which they own +or which they are authorized to test. Contrast with black hat.