<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.paulbui.net/wiki/index.php?action=history&amp;feed=atom&amp;title=Hacking</id>
	<title>Hacking - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.paulbui.net/wiki/index.php?action=history&amp;feed=atom&amp;title=Hacking"/>
	<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Hacking&amp;action=history"/>
	<updated>2026-04-26T14:21:21Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.31.8</generator>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=Hacking&amp;diff=3026&amp;oldid=prev</id>
		<title>PaulClayberg: /* Hacking */</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Hacking&amp;diff=3026&amp;oldid=prev"/>
		<updated>2009-03-06T17:45:59Z</updated>

		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Hacking&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Revision as of 17:45, 6 March 2009&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l2&quot; &gt;Line 2:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 2:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Unauthorised editing or tampering with security hierarchies or other such data structures. Hackers usually try to break into information they are not permitted to view, such as corporate databases, monetary funding, or other networks, by breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Unauthorised editing or tampering with security hierarchies or other such data structures. Hackers usually try to break into information they are not permitted to view, such as corporate databases, monetary funding, or other networks, by breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;If you get [[owned|hacked]], you should tighten your [[security]], or [[Special:Preferences|change your password.]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;If you get [[owned|hacked]], you should tighten your [[security]], or [[Special:Preferences&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;#Change_Password&lt;/ins&gt;|change your password.]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>PaulClayberg</name></author>
		
	</entry>
	<entry>
		<id>https://www.paulbui.net/wiki/index.php?title=Hacking&amp;diff=308&amp;oldid=prev</id>
		<title>PaulClayberg: /* Hacking */</title>
		<link rel="alternate" type="text/html" href="https://www.paulbui.net/wiki/index.php?title=Hacking&amp;diff=308&amp;oldid=prev"/>
		<updated>2008-09-08T00:48:11Z</updated>

		<summary type="html">&lt;p&gt;‎&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Hacking&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Hacking ==&lt;br /&gt;
Unauthorised editing or tampering with security hierarchies or other such data structures. Hackers usually try to break into information they are not permitted to view, such as corporate databases, monetary funding, or other networks, by breaking into, tampering, or otherwise ruining the [[integrity]] of a security architecture. This usually results in said hacker being [[owned|sent to jail]]. Hollywood has featured in movies [[lies|hackers who are hired by the government]], but the possibilities of this happening before being jailed are low to none.&lt;br /&gt;
&lt;br /&gt;
If you get [[owned|hacked]], you should tighten your [[security]], or [[Special:Preferences|change your password.]]&lt;/div&gt;</summary>
		<author><name>PaulClayberg</name></author>
		
	</entry>
</feed>