BlueHat
Encyclopedia
BlueHat or Blue Hat is a term used to refer to outside computer security
consulting firms that are employed to bug test a system prior to its launch, looking for exploits
so they can be closed. In particular, Microsoft
uses the term to refer to the computer security professionals they invited to find the vulnerability of their products such as Windows.
engineers and hackers
is called Blue Hat Microsoft Hacker Conference
. The event has led to both mutual understanding as well as the occasional confrontation. Microsoft developers were visibly uncomfortable when Metasploit was demonstrated.
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...
consulting firms that are employed to bug test a system prior to its launch, looking for exploits
Exploit (computer security)
An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic...
so they can be closed. In particular, Microsoft
Microsoft
Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...
uses the term to refer to the computer security professionals they invited to find the vulnerability of their products such as Windows.
Blue Hat Microsoft Hacker Conference
An event that is intended to open communication between MicrosoftMicrosoft
Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...
engineers and hackers
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...
is called Blue Hat Microsoft Hacker Conference
Meeting
In a meeting, two or more people come together to discuss one or more topics, often in a formal setting.- Definitions :An act or process of coming together as an assembly for a common purpose....
. The event has led to both mutual understanding as well as the occasional confrontation. Microsoft developers were visibly uncomfortable when Metasploit was demonstrated.
See also
- Hacker cultureHacker cultureA hacker is a member of the computer programmer subculture originated in the 1960s in the United States academia, in particular around the Massachusetts Institute of Technology 's Tech Model Railroad Club and MIT Artificial Intelligence Laboratory...
- Hacker ethicHacker ethicHacker ethic is the generic phrase which describes the moral values and philosophy that are standard in the hacker community. The early hacker culture and resulting philosophy originated at the Massachusetts Institute of Technology in the 1950s and 1960s...
- Legion of DoomLegion of Doom (hacking)The Legion of Doom was a hacker group active from the 1980s to the late 1990s and early 2000. Their name appears to be a reference to the antagonists of Challenge of the Superfriends...
- Chaos Computer ClubChaos Computer ClubThe Chaos Computer Club is an organization of hackers. The CCC is based in Germany and other German-speaking countries.The CCC describes itself as "a galactic community of life forms, independent of age, sex, race or societal orientation, which strives across borders for freedom of...
- Cult of the Dead CowCult of the Dead CowCult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas. The group maintains a weblog on its site, also titled "Cult of the Dead Cow"...
- Collusion SyndicateCollusion SyndicateThe Collusion Syndicate, formerly the Collusion Group, was a Computer Security and Internet Politics Special Interest Group founded in 1995 and effectively disbanded around 2002.- Collusion Group :...
- l0phtL0phtL0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.-Name:The second character in its name was originally a slashed zero, a symbol used by old teletypewriters and some character mode operating systems to mean zero...