Hackers can also be good, according to the RAE

Practically since the beginning of computing, the word hackers has always been associated with people who use their computer knowledge to commit crimes. However, for some time now, there are many hackers, good ones, who they do not use their knowledge to do evilBut for the opposite, to discover security holes that can be used by the bad hackers, to whom we have traditionally associated that name.

For some time now, to differentiate them, a tagline has been added at the end: white hat hackers They are the good guys and the black hats are the bad guys Those with white hats are recognized from now on by the Royal Academy of the Language.

From now on, when we look for the definition of hacker, we will find, a second meaning, apart from the traditional hacker:

Expert person in the handling of computers, who deals with the security of the systems and develop improvement techniques

Although this group has not sought at any time that its official definition, it will show other meanings, from now on, a hacker is officially recognized, in both meanings: the traditionally bad one that we have seen in many movies and the good news that little by little is becoming more public and notorious, at least in the computer world.

Good hackers are one of the most sought after professions by large companies, although these types of people usually work for pay on most occasions, that is, based on the rewards offered by large companies for find vulnerabilities in their software or in the services they offer over the Internet.

These changes have been made in the twenty-third edition of the Dictionary of the Spanish Language, which was presented last Wednesday and where some very fashionable terms in recent years in society were also revised, such as postureo, vallenato, hummus among others.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.