Jump to content

Talk:Certified ethical hacker

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by William Avery (talk | contribs) at 08:25, 20 April 2010 (Reverted 1 edit by 59.95.53.214. (TW)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
WikiProject iconComputer security: Computing Unassessed
WikiProject iconThis article is within the scope of WikiProject Computer security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
???This article has not yet received a rating on Wikipedia's content assessment scale.
???This article has not yet received a rating on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing.
Things you can help WikiProject Computer security with:
Article alerts are available, updated by AAlertBot. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject iconEducation Start‑class Low‑importance
WikiProject iconThis article is within the scope of WikiProject Education, a collaborative effort to improve the coverage of education and education-related topics on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
StartThis article has been rated as Start-class on Wikipedia's content assessment scale.
LowThis article has been rated as Low-importance on the project's importance scale.

You Mention That Hacking is a Felony

According to the Wikipedia article on "hacking", "A hacker is often someone who creates and modifies computer software or computer hardware, including computer programming, administration, and security-related items. A hacker is also someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems to get extra functionality or performance." Since when is this a felony? Even when you're talking about hackers in the field of security, not every hacker is out to commit a "felony". Perhaps "illegal hacking" should be used in this context?

Just trying to avoid any misconceptions of the term or, for that matter, two Wikipedia articles going against each other.

I fixed that. Felony is pointlessly specific and inaccurate in this context. Jclemens (talk) 05:04, 7 June 2008 (UTC)[reply]
I would also add that different places have different laws - both in the sense that some forms of computer misuse may or may not be legal in other locations, and in the sense that many jurisdictions lack a separate category of crimes called "felony". Bobrayner (talk) 19:38, 6 January 2010 (UTC)[reply]

Intro

Hi all. I have started this page. It is actually my first page (and quite possibly my first edit as well). Enjoy! Jeremys779 01:27, 22 January 2006 (UTC)[reply]


Also, I don't know how to get it into a category, but I took that code from another certification page, so what else do I have to do? Jeremys779 01:36, 22 January 2006 (UTC)[reply]

Definition

Article was lacking with a proper definition of CEH so I have updated it.Digitalfunda 09:28, 12 October 2006 (UTC)[reply]

Investigation and MSS degree

The investigation information does not provide any sources. I am going to remove it.

The MSS information would be better suited for a page on the EC-Council, instead of a page dedicated to the CEH certification. Any thoughts? I am going to remove it as well if no one is going to object. Jeremys779 03:36, 25 October 2006 (UTC)[reply]

The entire text of this article seems to be directly copied from [1] —Preceding unsigned comment added by 207.10.157.5 (talk) 05:11, August 30, 2007 (UTC)

Good grief I hope that no one copyrighted the mess I just edited. Jclemens (talk) 05:04, 7 June 2008 (UTC)[reply]

Overhauled

Ok, I fixed a bunch of the errors, grammar, puffery, and outright tomfoolery in this article. Some of the facts and whatnot I can't help at the moment, but I may later. Feel free to update anything you know needs updating. Jclemens (talk) 05:04, 7 June 2008 (UTC)[reply]

Question

I believe ECouncil has a Certification that is equal to the CEH, and is the same exam but provides a different name for companies who don't want to employ a "Hacker". Anyone have any idea what it was? Sephiroth storm (talk) 18:34, 22 August 2008 (UTC)[reply]

Is penetration testing at the request of the owner illegal in Germany

The following sentence needs to be clarified and referenced:

Illegal hacking (i.e.; gaining unauthorized access to computer systems) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not, except in Germany.

Rsduhamel (talk) 20:40, 23 July 2009 (UTC)[reply]

I'll see what I can find out. Sephiroth storm (talk) 00:26, 24 July 2009 (UTC)[reply]