Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
hacker_culture [2021/05/01 15:13]
ntnsndr [What should I be checking out to keep up with hacker culture?]
hacker_culture [2022/03/11 11:00] (current)
ntnsndr
Line 52: Line 52:
 The format of the exploit can vary based on the assignment. They might be primarily visual or primarily textual, or code. Show, don't just tell---provide screenshots,​ source code, and other forms of evidence. If they are not self-explanatory,​ include a [README](https://​en.wikipedia.org/​wiki/​README) text that explains the nature and rationale of the hack.  The format of the exploit can vary based on the assignment. They might be primarily visual or primarily textual, or code. Show, don't just tell---provide screenshots,​ source code, and other forms of evidence. If they are not self-explanatory,​ include a [README](https://​en.wikipedia.org/​wiki/​README) text that explains the nature and rationale of the hack. 
  
-Exploits need not and should not be lengthy; their value is in the adventuresomeness of their thinking, not their girth. Just be sure to engage ​with at least one assigned source from the week. Also: do not break the law.+Exploits need not and should not be lengthy; their value is in the adventuresomeness of their thinking, not their girth. Just be sure to include [[engagement with assigned sources|engagement ​with at least one assigned source]] from the week. Also: do not break the law.
  
 ### Objective 2: Teach ### Objective 2: Teach
Line 81: Line 81:
     * clear explanation of the Exploit along with supporting evidence     * clear explanation of the Exploit along with supporting evidence
     * creative implementation and stretching of skills     * creative implementation and stretching of skills
-    * sophisticated engagement with at least one of the module'​s assigned sources+    * sophisticated ​[[engagement ​with assigned sources|engagement]] ​with at least one of the module'​s assigned sources
   * Objective 2: 20 points   * Objective 2: 20 points
     * accessible and fun introduction to a skill and its significance (5 points)     * accessible and fun introduction to a skill and its significance (5 points)
Line 93: Line 93:
       * comprehension of the hack and convincing, accessible analysis of it       * comprehension of the hack and convincing, accessible analysis of it
       * impressive and documented research with both [[:​scholarly_sources|scholarly]] and primary sources, [[:​citation_standards|appropriately cited]]       * impressive and documented research with both [[:​scholarly_sources|scholarly]] and primary sources, [[:​citation_standards|appropriately cited]]
-      * sophisticated engagement with at least two assigned sources+      * sophisticated ​[[engagement with assigned sources|engagement with at least two assigned sources]]
     * one-minute presentation,​ with a compelling slide, on the last day of class (5 points)     * one-minute presentation,​ with a compelling slide, on the last day of class (5 points)
  
Line 259: Line 259:
   * [Hacker News](https://​news.ycombinator.com/​)   * [Hacker News](https://​news.ycombinator.com/​)
   * _[Hacker News, The](https://​thehackernews.com/​)_   * _[Hacker News, The](https://​thehackernews.com/​)_
-  * _[Hackernoon](https://​hackernoon.com/​)_+  * _[Hacker Noon](https://​hackernoon.com/​)_
   * _[Krebs on Security](http://​krebsonsecurity.com/​)_   * _[Krebs on Security](http://​krebsonsecurity.com/​)_
   * _[Lifehacker](http://​lifehacker.com/​)_   * _[Lifehacker](http://​lifehacker.com/​)_
Line 270: Line 270:
   * [r/​unixporn](https://​www.reddit.com/​r/​unixporn/​)   * [r/​unixporn](https://​www.reddit.com/​r/​unixporn/​)
   * _[xkcd](https://​xkcd.com/​)_   * _[xkcd](https://​xkcd.com/​)_
 +  * _[Zero Day](https://​zetter.substack.com/​)_
  
 --- ---