hacking

solving of technical work that requires deep understanding, especially of a computer system

hacking is …
sublass of (P279):
workaroundQ457174
activityQ1914636

External links are
P9084ABC News topic IDhacking
P7870Analysis & Policy Observatory term ID21817
P7033Australian Educational Vocabulary IDscot/15277
P6200BBC News topic IDc347w30eq7xt
P1617BBC Things IDbcd5eeb9-81cf-4f2b-8c73-8a075d42e1b6
P3569Cultureel Woordenboek IDwet-en-recht/hacken
P1417Encyclopædia Britannica Online IDtopic/hacking-computing
P646Freebase ID/m/011z1t
P5247Giant Bomb ID3015-1154
P9100GitHub topichacking
P2671Google Knowledge Graph ID/g/1pv0nqml
P3106Guardian topic IDtechnology/hacking
P8408KBpedia IDHackingComputerSecurity
P11810Mastodon instance URLhttps://hispagatos.space
P691NL CR AUT IDph138199
P3417Quora topic IDComputer-Hacking-security
Hacking-programming-style
P4342Store norske leksikon IDhacking
P3984subreddithacking
P2612TED topic IDhack
P4527UK Parliament thesaurus ID296955
P2347YSO ID16687

P1552has characteristicmaliceQ55019500
P1479has contributing factorvulnerabilityQ631425
P1382partially coincident withcybercrimeQ29137
P3095practiced byhackerQ1487
P1424topic's main templateTemplate:Computer hackingQ7220944
???Q109406170

Reverse relations

field of work (P101)
Q112551463Alissa Knight
Q92473687Beau Woods
Q47758652Command C4 - IEW
Q21144415Daniil Turovsky
Q47689198Gianfranco Marinelli
Q104874529Helix
Q77658809Jennifer Arcuri
Q60668326John McAlaney
Q7449Kevin Mitnick
Q117247220Kim Crawley
Q56528766Matt Miller
Q113493162May Contain Hackers 2022
Q108293483Sakura Gang
Q124644739Sebastian Kubitschko
Q1786014Tech Model Railroad Club
Q56528272The Deckers
Q54358163Yahya khan Ahmadani
Q3083944hacker culture

named after (P138)
Q125420702Hack for LA
Q106287055Hack im Pott

instance of (P31)
Q958174Google hacking
Q87977766Jeff Bezos phone hacking incident
Q112633647Karmenator11
Q7711912The 414s
Q5368817email hacking

convicted of (P1399)
Q21789544Badir Brothers
Q5944470Hunter Moore

template has topic (P1423)
Q7220944Template:Computer hacking
Q109406170テンプレート:ハッキング

uses (P2283)
Q124645587Hacker Cartography
Q28005470Russian interference in the 2016 United States elections

subclass of (P279)
Q5205179DIY biology
Q60761004Government hacking
Q30588523automotive hacking
Q5026509camfecting
Q56669895ethical hacking
Q22685hacktivism
Q7187193phone hacking
Q1162746phreaking
Q1138423software cracking
Q12341530white hat and black hat

part of (P361)
Q3263397hack
Q7189582physical access

has use (P366)
Q108540395SkyTemple
Q3125508hacking tool

item for this sense (P5137)
uri / http://www.wikidata.org/entity/L1161476-S1L1161476-S1
uri / http://www.wikidata.org/entity/L1173908-S1L1173908-S1
uri / http://www.wikidata.org/entity/L1196450-S1L1196450-S1
uri / http://www.wikidata.org/entity/L1323934-S1L1323934-S1
uri / http://www.wikidata.org/entity/L28191-S1L28191-S1
uri / http://www.wikidata.org/entity/L631006-S1L631006-S1
uri / http://www.wikidata.org/entity/L631007-S1L631007-S1

main subject (P921)
Q122090570Hackeři
Q122025398Protidžihádistický vigilantismus v kyberprostoru
Q121995273Securita: chci vědět víc
Q122097343Vpád: stručné dějiny ruských hackerů
Q99557068"It's not just hacking for the sake of it": a qualitative study of health innovators' views on patient-driven open innovations, quality and safety
Q21626923
Q47873760A Systems Approach to Healthcare Innovation Using the MIT Hacking Medicine Model
Q59540621A nexus of Cyber-Geography and Cyber-Psychology: Topos/“Notopia” and identity in hacking
Q56902733A smart vision of brain hacking
Q57570492ADS: Protecting NTFS from hacking
Q50309918An adolescent case with Internet addiction and hacking: how are we dealing with this diverse spectrum of disorder?
Q37959094An inside job: hacking into Janus kinase/signal transducer and activator of transcription signaling cascades by the intracellular protozoan Toxoplasma gondii
Q103837719Analysis goals, error-cost sensitivity, and analysis hacking: Essential considerations in hypothesis testing and multiple comparisons
Q56884167Anxiety about internet hacking: Results from a community sample
Q95292806Assessing the Factors Associated With the Detection of Juvenile Hacking Behaviors
Q812608Bayrische Hackerpost
Q61654781Building and hacking open source hardware
Q91340075Cell Biology: Hacking Alpha Satellites out of the HAC
Q89715511Claims of Russian hacking in BDA elections
Q57616566Co-Curation as Hacking: Biohackers in Copenhagen's Medical Museion
Q118123148Coding freedom : the ethics and aesthetics of hacking
Q57308988Cognitive hacking and intelligence and security informatics
Q99632099Collaboration between Law Enforcement Agencies in Combating Cybercrime: Implications of a Taiwanese Case Study about ATM Hacking
Q107919737Community structure and trophic relationships of the fish fauna of an estuarine Posidonia Australis seagrass habitat in port hacking, new South Wales
Q110512483Compiler Hacking for Source Code Analysis
Q70934684Computer science: Hacking into the cyberworld
Q55035320Concepts, Diagnosis and the History of Medicine: Historicising Ian Hacking and Munchausen Syndrome.
Q63196549Considering the potential of criminal profiling to combat hacking
Q106629042Cracking the Codes of Black Power Struggles: Hacking, Hacked, and Black Lives Matter
Q93181812Creativity on Demand - Hacking into Creative Problem Solving
Q88600843DIY Biology - hacking goes viral!
Q108736781Dear Yahoo: A Comment on In Re Yahoo Mail Litigation
Q92973573Detecting cognitive hacking in visual inspection with physiological measurements
Q40732214Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times.
Q88344729Encryption and watermark-treated medical image against hacking disease-An immune convention in spatial and frequency domains
Q95935493Enhanced Golic+: Highly effective CRISPR gene targeting and transgene HACKing in Drosophila
Q56674246Ethical Hacking
Q54139162Ethical hacking
Q56673204Evolution of User-generated Translation: Fansubs, Translation Hacking and Crowdsourcing
Q96648061Examination of Hacking and Blunt Force Skeletal Trauma
Q47426135Exploiting bilosomes for delivering bioactive polysaccharide isolated from Enteromorpha intestinalis for hacking hepatocellular carcinoma
Q58658115Failing, hacking, passing: Autism, entanglement, and the ethics of transformation
Q63549481Fashion Hacking
Q38400239Free-space QKD system hacking by wavelength control using an external laser
Q38640256From hacking the human genome to editing organs
Q80950784Gene hacking
Q46649341Gene regulation: hacking the network on a sugar high
Q57270495Genome hacking
Q38028807HACking the centromere chromatin code: insights from human artificial chromosomes.
Q109853338HackCurio
Q30487726HackaMol: An Object-Oriented Modern Perl Library for Molecular Hacking on Multiple Scales
Q189304Hacker Manifesto
Q106267162Hackers and the Dark Net: A Look into Hacking and the Deep Web
Q66498388Hacking
Q58507956Hacking 101: Does It Appear We Are Training The Cyberspace Criminals Of The Future?
Q107399216Hacking 360 Link: A hybrid approach
Q91761807Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
Q110511639Hacking Adaptation: Updating, Porting, and Forking the Shakespearean Source Code
Q58572366Hacking Aging: A Strategy to Use Big Data From Medical Studies to Extend Human Life
Q58510961Hacking Blackboard: Customizing Access to Library Resources Through the Blackboard Course Management System
Q57174330Hacking CD/DVD/Blu-ray for Biosensing
Q88727078Hacking Cancer Metabolism
Q47876221Hacking DNA copy number for circuit engineering
Q50421104Hacking Hackathons: Preparing the next generation for the multidisciplinary world of healthcare technology.
Q85645072Hacking Heats Up
Q84945750Hacking History: Redressing Gender Inequities on Wikipedia Through an Editathon
Q96132893Hacking Human Beings with Machine Biology to Increase Lifespan
Q24645018Hacking RNA: Hakai promotes tumorigenesis by enhancing the RNA-binding function of PSF
Q107399509Hacking Summon
Q107399379Hacking Summon 2.0 The Elegant Way
Q110540880Hacking agency: Apps, autism, and neurodiversity
Q50155063Hacking an Algal Transcription Factor for Lipid Biosynthesis.
Q58197460Hacking and the security curriculum
Q58973920Hacking at the Divide Between Polar Science and HPC: Using Hackathons as Training Tools
Q38119462Hacking cell differentiation: transcriptional rerouting in reprogramming, lineage infidelity and metaplasia
Q55673880Hacking code/space: Confounding the code of global capitalism
Q92356995Hacking conservation: how a tech start-up aims to save biodiversity
Q54090439Hacking diabetes: DIY artificial pancreas systems.
Q44110294Hacking drones
Q85812880Hacking health care
Q39951285Hacking hexokinase halts tumor growth
Q60064241Hacking in court
Q98825460Hacking in the public interest: Authority, legitimacy, means, and ends
Q35574148Hacking into bacterial biofilms: a new therapeutic challenge
Q56510411Hacking into the granuloma: Could antibody antibiotic conjugates be developed for TB?
Q58986742Hacking is a crime
Q50110979Hacking macrophage-associated immunosuppression for regulating glioblastoma angiogenesis.
Q38107818Hacking medical devices a review - biomed 2013.
Q44650468Hacking medicine...
Q56997937Hacking memes
Q37718153Hacking on decoy-state quantum key distribution system with partial phase randomization
Q89331445Hacking plant P450s for production of medicine
Q54360780Hacking rules for E. coli.
Q47390987Hacking shock.
Q99244943Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination
Q97549935Hacking systemic lupus erythematosus (SLE): outcomes of the Waterlupus hackathon
Q91715792Hacking teamwork in health care: Addressing adverse effects of ad hoc team composition in critical care medicine
Q92461605Hacking the 'Cellular Immunology Agency': T cells caught in the act
Q38914687Hacking the Bell test using classical light in energy-time entanglement-based quantum key distribution
Q68209445Hacking the Brain: Dimensions of Cognitive Enhancement.
Q92085279Hacking the Cancer Genome: Profiling Therapeutically Actionable Long Non-coding RNAs Using CRISPR-Cas9 Screening
Q59357408Hacking the Human: The Prevalence Paradox in Cybersecurity
Q56770649Hacking the JPEG/PDF tree format
Q50463807Hacking the Matrix.
Q106987575Hacking the Research Library: Wikipedia, Trump, and Information Literacy in the Escape Room at Fresno State
Q58188261Hacking the Storage and Preservation of Social Media Data
Q37079411Hacking the code of amyloid formation: the amyloid stretch hypothesis
Q39836958Hacking the genetic code of mammalian cells
Q33211031Hacking the genome
Q79876878Hacking the genome
Q38477830Hacking the health system: using public key infrastructure to protect health information on the Internet.
Q47355589Hacking the hospital environment: young adults designing youth-friendly hospital rooms together with young people with cancer experiences
Q89756798Hacking the host: exploitation of macrophage polarization by intracellular bacterial pathogens
Q84476893Hacking the lights out. Computer viruses have taken out hardened industrial control systems. The electrical power grid may be next
Q57523469Hacking the social life of Big Data
Q48341114Hacking the stem cell niche.
Q52543714Hacking the thylakoid proton motive force for improved photosynthesis: modulating ion flux rates that control proton motive force partitioning into Δψ and ΔpH.
Q93659222Hacking through the fields of electromagnetic mania
Q93019545Hacking women's health: A new methodology
Q74543821Hacking your way through the jungle
Q84583510Hacks, hackers and hacking
Q92955991Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information
Q91447048Healthcare Data Are Remarkably Vulnerable to Hacking: Connected Healthcare Delivery Increases the Risks
Q118798430Help-seeking among Australian ransomware victims
Q33384563High-throughput hacking of the methylation patterns in breast cancer by in vitro transcription and thymidine-specific cleavage mass array on MALDI-TOF silico-chip
Q58361543History versus hacking on probability
Q58510935How I Hacked Packetstorm: A Look at Hacking WWW threads by Means of SQL—Part 2
Q58510838How I Hacked Packetstorm: A Look at Hacking Wwwthreads by Means of SQL
Q109952955INKLUSION I DET DIGITALE FÆLLESSKAB: Hacking af open source-software og progressiv politik i New York City
Q59260733Ian Hacking, Why Is There Philosophy of Mathematics at All?, Cambridge: Cambridge University Press, 2014. Pp. xv + 290. ISBN 978-1-107-65815-8. £17.99 (paperback)
Q57173949Immune Cell Hacking: Challenges and Clinical Approaches to Create Smarter Generations of Chimeric Antigen Receptor T Cells
Q58534219Intervention: Hacking history, from analogue to digital and back again
Q56521948Is Anonymous a New Form of Luddism?: A Comparative Analysis of Industrial Machine Breaking, Computer Hacking, and Related Rhetorical Strategies
Q75037203Jamming With Edward
Q50648413Less noise, more hacking: how to deploy principles from MIT's hacking medicine to accelerate health care.
Q47203531Macroscopic and stereomicroscopic comparison of hacking trauma of bones before and after carbonization.
Q44875146Macroscopic characteristics of hacking trauma
Q59283096Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model
Q113493162May Contain Hackers 2022
Q33181904Microscopic characteristics of hacking trauma.
Q81201297NYPL Labs: Hacking the Library
Q97648972Neurocognitive hacking A new capability in cyber conflict?
Q100429229Neuromodulatory hacking: a review of the technology and security risks of spinal cord stimulation
Q60636685Neuroscience: Hacking the brain to overcome fear
Q3345582Noway
Q56008584On the mangrove and saltmarsh vegetation near Sydney, New South Wales, with special reference to Cabbage Tree Creek, Port Hacking
Q51519263Optimised quantum hacking of superconducting nanowire single-photon detectors.
Q43244849P hacking in biology: An open secret
Q28750102Patriot
Q89357405Peptide design: Hacking hemagglutinin
Q89555169Phenotypic Adaption of Pseudomonas aeruginosa by Hacking Siderophores Produced by Other Microorganisms
Q59047756Plan to outlaw hacking
Q92373355Prescribing Time to Temporize Burnout: Are We Hacking at the Branches, or Striking at the Root?
Q47602326Primum non nocere or primum facere meliorem? Hacking the brain in the 21st century
Q50001621Protein evolution: Hacking an enzyme.
Q62427140Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks
Q62538045Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Q61833354Quantum hacking: attacking practical quantum key distribution systems
Q33694738Quantum key distribution with hacking countermeasures and long term field trial
Q74202743Researchers split over NSA hacking
Q56021496Results of an exploration of aboriginal rock- shelters at Port Hacking
Q48503295Retraction: Hacking on decoy-state quantum key distribution system with partial phase randomization.
Q33221027Scanning electron microscopy analysis of experimental bone hacking trauma.
Q92229720Sequencer Hacking Unlocks Quantitative Protein Studies
Q108736772Silencing the Call to Arms: A Shift Away From Cyber Attacks as Warfare
Q109594176Software Startup Education: Gamifying Growth Hacking
Q109297764Software startup education: gamifying growth hacking
Q58488348Solutions and frictions in civic hacking: collaboratively designing and building wait time predictions for an immigration office
Q41720776Splicing: HACking into the unfolded-protein response
Q39264898Synthetic Immunology: Hacking Immune Cells to Expand Their Therapeutic Capabilities
Q95486786TOO VULNERABLE TO ATTACK: Multitude of medical devices pose hacking threats for providers
Q62111505The Inverse Gambler's Fallacy and Cosmology—A Reply to Hacking
Q73835532The hacking cough
Q31213901The hidden face of the Internet
Q55650674The need for specific penalties for hacking in criminal law.
Q63196536The security and privacy impact of criminalising the distribution of hacking tools
Q104746880Therapeutic targeting of TGF-β in cancer: hacking a master switch of immune suppression
Q56039184Tools & toys: Hacking the Nokia N800
Q99585306Transcending the brain: is there a cost to hacking the nervous system?
Q57299406Trolling, hacking and the 2016 US presidential election
Q63437356Virtuous human hacking: The ethics of social engineering in penetration-testing
Q44310046Viruses and the 26S proteasome: hacking into destruction
Q47204995Wake-up call. Fraud may come later in historic Utah hacking case
Q1371726Watch Dogs
Q24455756Watch Dogs 2
Q64534648Watch Dogs: Legion
Q92387580[Hacking into a pacemaker; risks of smart healthcare devices]
Q68802892[Some possibilities of identifying hacking, stabbing and cutting weapons]
Q113880369hacker convention
Q87421102thebroken

Q2901752hackabilityfacet ofP1269
Q112633647Karmenator11participant inP1344
Q29137cybercrimepartially coincident withP1382
Q3618796antispywarehas effectP1542
Q3098964L0phtinterested inP2650
Q1487hackerfield of this occupationP425
Q28456918foreign electoral interventionhas part(s)P527
Q113532018Lennert Woutersnotable workP800
uri / http://www.wikidata.org/entity/L16880-S2L16880-S2predicate forP9970

The articles in Wikimedia projects and languages

Arabic (ar / Q13955)اختراقwikipedia
Bavarian (bar / Q29540)Hackwikipedia
      Hackwikipedia
      Hackwikipedia
      Hackearwikipedia
Basque language (eu / Q8752)Hackingwikipedia
      Hackingwikipedia
      האקינגwikipedia
      Hackingwikipedia
      ハッキングwikipedia
      해킹wikipedia
      Hackenwikipedia

Search more.