Skip to Main Content
Apply
Quicklinks
Search
A-Z Index
BengalWeb
Campus Map
Directory
Email
Events
Library
Moodle
News
Give
Admissions
Students
Faculty & Staff
Parents
Alumni & Visitors
Academic Calendar
Academic Catalogs
Administration
Advising
Athletics
Campus Security
Career Center
Class Schedule
Colleges & Departments
Financial Aid
Health & Wellness
Housing
Human Resources
Jobs
Museum of Natural History
Parking
Registrar
Scholarships
Transcripts
Tuition
Majors
Cost
Visit
Parking
Map
Apply
Give
Search
Common Searches
BengalWeb
Bookstore
Academic Calendar
Directory
COVID-19
Jobs
Human Resources
Moodle
Calendar
Tuition
JavaScriptMessages
NIATEC
National Information Assurance Training and Education Center
News
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
H
H
Ha Ha Only Serious
Hack
Hack Attack
Hack Mode
Hack On
Hack Together
Hack Up
Hack Value
Hacked Off
Hacked Up
Hacker
Hacker code of ethics
Hacker Ethic, The
Hacker vulnerability testing tools
Hackers (and Unauthorized Users)
Hacking
Hacking root
Hacking Run
Hacking X For Y
Hackintosh
Hackish
Hackishness
Hackitude
Hacktivism
Hair
Hairball
Hairy
HAKMEM
Hakspek
Half-Duplex Operation
Halftone
Halftone Characteristic
hallenge-Handshake Authentication Protocol (CHAP)
Hammer
Hamming Code
Hamming Distance
Hamming Weight
Hamster
Hand Cruft
Hand geometry scanning
Hand-Hacking
Handle
Handled
Handled By
Handler
Handling Caveats
Handling Restrictions
Hand-Roll
Handshaking
Handshaking Procedure
Handshaking Procedures
Hand-shaking stages
Handwave
Hang
Hanlon's Razor
Happily
Haque
Hard Boot
Hard Copy
Hard Copy Key
Hardcoded
Harden
Hardening
Hardware
Hardware Asset Management
Hardware Handshaking
Hardware Isolation Mechanisms
Hardware Protection Mechanisms
Hardware Security
Hardwarily
Hardwire
Hardwired
Hardwired Key
Has The X Nature
Hash
Hash Bucket
Hash Collision
Hash Total
Hashed Message Authentication Code
Hashing
Hashword
Hat
Hazard
HCF
HD
HDLC
HDM
Header
Header checksum
Header destruction
Header length
Head-On Collision
Heads Down
Health Information Portability and Accountability Act (HIPAA[AuQ3][AuQ3])
Heartbeat
Heatseeker
Heavy Metal
Heavy Wizardry
Heavyweight
Heisenbug
Hello, Sailor!
Hello, Wall!
Hello, World
Hertz
Heuristic
Hex
Hexadecimal
Hexadecimal directory traversal attack
Hexit
HF
HHOK
HHOS
Hidden Flag
Hidden Sections
Hierarchical
Hierarchical Computer Network
Hierarchical Development Methodology (HDM)
Hierarchically Synchronized Network
High Bit
High Moby
High Order Language
High Risk Environment
High-Level Control
High-Level Data Link Control
High-Level Language
Highly
Hing
HIPAA (Health Information Portability and Accountability Act)
Hirsute
History Of Information Security
HLL
HMAC
HMAC (key-Hashed Message Authentication Code)
Hobbit
Hog
HOIS
HOIST
HOL
Hole
Holy Wars
Home Box
Home Machine
Home page
Homeland Security Act of 2002
Hook
Hop
Hose
Hosed
Host
Host assessment tools
Host Computer
Host firewall
Host IDS
Host part
Host To Front-End
Host To Front-End Protocol
Hostile Code
Hostile Cognizant Agent
Hostile Intelligence Sources
Hostile Threat Environment
Hosting companies
Hot site
Hot Spot
Hot-Standby
House Wizard
Housekeeping Procedures
HP-SUX
HSM
HTML (Hypertext Markup Language)
HTML body parts
HTTP (Hypertext Transfer Protocol)
HTTP proxy server
Https
Huff
Human Intelligence
Human Interface Functions
Human Source
Human Threats
HUMINT
Humma
Humor, Hacker
Hung
Hungry Puppy
Hungus
HUS
HUSK
Hybrid attacks
Hybrid Computer
Hybrid TCP/IP-OSI architecture
Hyperspace
Hypertext Markup Language (HTML)
Hypertext Transfer Protocol (HTTP)
Hysterical Reasons
Hz
Hacker Ethic, The
1.n. The belief that information-sharing is a powerful positive good, and that it is an ethical duty of hackers to share their expertise by writing free software and facilitating access to information and to computing resources wherever possible.
The belief that system-cracking for fun and exploration is ethically OK as long as the cracker commits no theft, vandalism, or breach of confidentiality. Both of these normative ethical principles are widely, but by no means universally, accepted among hackers. Most hackers subscribe to the hacker ethic in sense 1, and many act on it by writing and giving away free software. A few go further and assert that *all* information should be free and *any* proprietary control of it is bad; this is the philosophy behind the GNU project. Sense 2 is more controversial some people consider the act of cracking itself to be unethical, like breaking and entering. But the belief that `ethical' cracking excludes destruction at least moderates the behavior of people who see themselves as `benign' crackers (see also samurai). On this view, it may be one of the highest forms of hackerly courtesy to (a) break into a system, and then (b) explain to the sysop, preferably by email from a superuser account, exactly how it was done and how the hole can be plugged -- acting as an unpaid (and unsolicited) tiger team. The most reliable manifestation of either version of the hacker ethic is that almost all hackers are actively willing to share technical tricks, software, and (where possible) computing resources with other hackers. Huge cooperative networks such as Usenet, FidoNet and Internet (see Internet address) can function without central control because of this trait; they both rely on and reinforce a sense of community that may be hackerdom's most valuable intangible asset.