Talk:Certified Ethical Hacker
|WikiProject Computer Security / Computing||(Rated Start-class, Low-importance)|
|WikiProject Education||(Rated Start-class, Low-importance)|
You Mention That Hacking is a Felony
According to the Wikipedia article on "hacking", "A hacker is often someone who creates and modifies computer software or computer hardware, including computer programming, administration, and security-related items. A hacker is also someone who modifies electronics, for example, ham radio transceivers, printers or even home sprinkler systems to get extra functionality or performance." Since when is this a felony? Even when you're talking about hackers in the field of security, not every hacker is out to commit a "felony". Perhaps "illegal hacking" should be used in this context?
Just trying to avoid any misconceptions of the term or, for that matter, two Wikipedia articles going against each other.
- I fixed that. Felony is pointlessly specific and inaccurate in this context. Jclemens (talk) 05:04, 7 June 2008 (UTC)
Hi all. I have started this page. It is actually my first page (and quite possibly my first edit as well). Enjoy! Jeremys779 01:27, 22 January 2006 (UTC)
Also, I don't know how to get it into a category, but I took that code from another certification page, so what else do I have to do? Jeremys779 01:36, 22 January 2006 (UTC)
Article was lacking with a proper definition of CEH so I have updated it.Digitalfunda 09:28, 12 October 2006 (UTC)
Investigation and MSS degree
The investigation information does not provide any sources. I am going to remove it.
The MSS information would be better suited for a page on the EC-Council, instead of a page dedicated to the CEH certification. Any thoughts? I am going to remove it as well if no one is going to object. Jeremys779 03:36, 25 October 2006 (UTC)
Version 7 has landed - there's going to be a large 'launch' training even mid March at, I believe, 22 training locations around the world. This is sort of a sneak preview of the training before it's available on mass. Suggest this to be added to the article.
http://www.thehackernews.com/2011/01/certified-ethical-hacker-version-7.html —Preceding unsigned comment added by 22.214.171.124 (talk) 23:45, 3 February 2011 (UTC)
Possible Copyright Violation
- Good grief I hope that no one copyrighted the mess I just edited. Jclemens (talk) 05:04, 7 June 2008 (UTC)
Ok, I fixed a bunch of the errors, grammar, puffery, and outright tomfoolery in this article. Some of the facts and whatnot I can't help at the moment, but I may later. Feel free to update anything you know needs updating. Jclemens (talk) 05:04, 7 June 2008 (UTC)
I believe ECouncil has a Certification that is equal to the CEH, and is the same exam but provides a different name for companies who don't want to employ a "Hacker". Anyone have any idea what it was? Sephiroth storm (talk) 18:34, 22 August 2008 (UTC)
Is penetration testing at the request of the owner illegal in Germany
The following sentence needs to be clarified and referenced:
- Illegal hacking (i.e.; gaining unauthorized access to computer systems) is a crime in most countries, but penetration testing done by request of the owner of the targeted system(s) or network(s) is not, except in Germany.
- It is just nonsense. Companies as well as government bodies conduct pentests all the time in germany. About 4-3 companies do nothing besides security tests (i.e. they don't sell any products and do not install stuff for people). The person who buys the test needs to check if he is actually authorized to allow a third party to check everything he wants to be checked, and the testers need to proof that they didn't overlook any evidence to the contrary. For example, a simple error in IP-addresses should be noted if WHOIS points to someone who has nothing to do with the organisation. As long as everyone does their homework, pentests are legal in germany. 126.96.36.199 (talk) 10:20, 23 April 2010 (UTC)
I believe that the paragraph is referring to THIS http://dejure.org/gesetze/StGB/202c.html which is a very vague law. But which potentially does ban internal penetration tests, as the tools used would be illegal, even if used on one's own network. —Preceding unsigned comment added by 188.8.131.52 (talk) 18:33, 19 May 2010 (UTC)
- I am not a lawyer and I claim to have no knowledge whatsoever of German law. That having been said, if the owner of a system or a network hires me to test his network for vulnerabilities, clearly that means I'm authorized--I have the knowledge and consent of the owner of the property, who hired me to perform this task for him. Therefore laws against unauthorized access would not apply. Or am I misunderstanding something fundamental here? — Preceding unsigned comment added by 184.108.40.206 (talk) 01:14, 1 September 2015 (UTC)
White hat and black hat
I'm concerned that these tired old tropes are still being used in the lede; and, worse, the article's telling readers that the skills used by the good guys and bad guys are identical - but that only the good guys sit this exam. That's just silly. bobrayner (talk) 19:19, 27 May 2015 (UTC)