Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
hacker_culture [2021/04/20 14:20] ntnsndr [Bounties] |
hacker_culture [2022/03/11 11:00] (current) ntnsndr |
||
---|---|---|---|
Line 52: | Line 52: | ||
The format of the exploit can vary based on the assignment. They might be primarily visual or primarily textual, or code. Show, don't just tell---provide screenshots, source code, and other forms of evidence. If they are not self-explanatory, include a [README](https://en.wikipedia.org/wiki/README) text that explains the nature and rationale of the hack. | The format of the exploit can vary based on the assignment. They might be primarily visual or primarily textual, or code. Show, don't just tell---provide screenshots, source code, and other forms of evidence. If they are not self-explanatory, include a [README](https://en.wikipedia.org/wiki/README) text that explains the nature and rationale of the hack. | ||
- | Exploits need not and should not be lengthy; their value is in the adventuresomeness of their thinking, not their girth. Just be sure to engage with at least one assigned source from the week. Also: do not break the law. | + | Exploits need not and should not be lengthy; their value is in the adventuresomeness of their thinking, not their girth. Just be sure to include [[engagement with assigned sources|engagement with at least one assigned source]] from the week. Also: do not break the law. |
### Objective 2: Teach | ### Objective 2: Teach | ||
Line 81: | Line 81: | ||
* clear explanation of the Exploit along with supporting evidence | * clear explanation of the Exploit along with supporting evidence | ||
* creative implementation and stretching of skills | * creative implementation and stretching of skills | ||
- | * sophisticated engagement with at least one of the module's assigned sources | + | * sophisticated [[engagement with assigned sources|engagement]] with at least one of the module's assigned sources |
* Objective 2: 20 points | * Objective 2: 20 points | ||
* accessible and fun introduction to a skill and its significance (5 points) | * accessible and fun introduction to a skill and its significance (5 points) | ||
Line 93: | Line 93: | ||
* comprehension of the hack and convincing, accessible analysis of it | * comprehension of the hack and convincing, accessible analysis of it | ||
* impressive and documented research with both [[:scholarly_sources|scholarly]] and primary sources, [[:citation_standards|appropriately cited]] | * impressive and documented research with both [[:scholarly_sources|scholarly]] and primary sources, [[:citation_standards|appropriately cited]] | ||
- | * sophisticated engagement with at least two assigned sources | + | * sophisticated [[engagement with assigned sources|engagement with at least two assigned sources]] |
* one-minute presentation, with a compelling slide, on the last day of class (5 points) | * one-minute presentation, with a compelling slide, on the last day of class (5 points) | ||
Line 258: | Line 258: | ||
* [Hack_Curio](https://hackcur.io/) | * [Hack_Curio](https://hackcur.io/) | ||
* [Hacker News](https://news.ycombinator.com/) | * [Hacker News](https://news.ycombinator.com/) | ||
- | * _[Hackernoon](https://hackernoon.com/)_ | + | * _[Hacker News, The](https://thehackernews.com/)_ |
+ | * _[Hacker Noon](https://hackernoon.com/)_ | ||
* _[Krebs on Security](http://krebsonsecurity.com/)_ | * _[Krebs on Security](http://krebsonsecurity.com/)_ | ||
* _[Lifehacker](http://lifehacker.com/)_ | * _[Lifehacker](http://lifehacker.com/)_ | ||
Line 269: | Line 270: | ||
* [r/unixporn](https://www.reddit.com/r/unixporn/) | * [r/unixporn](https://www.reddit.com/r/unixporn/) | ||
* _[xkcd](https://xkcd.com/)_ | * _[xkcd](https://xkcd.com/)_ | ||
+ | * _[Zero Day](https://zetter.substack.com/)_ | ||
--- | --- |