{"id":26572,"date":"2022-04-20T17:29:00","date_gmt":"2022-04-20T15:29:00","guid":{"rendered":"https:\/\/perseus.de\/hackers\/"},"modified":"2026-03-30T10:06:24","modified_gmt":"2026-03-30T08:06:24","slug":"hackers","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/hackers\/","title":{"rendered":"Hackers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26572\" class=\"elementor elementor-26572 elementor-22266\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Hackers<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5bb1d56b e-flex e-con-boxed e-con e-parent\" data-id=\"5bb1d56b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-235b0387 e-con-full e-flex e-con e-child\" data-id=\"235b0387\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Dans le domaine des technologies de l\u2019information, un \u00ab hacker \u00bb est quelqu\u2019un qui p\u00e9n\u00e8tre dans des syst\u00e8mes informatiques sans autorisation. Les hackers criminels sont principalement pr\u00e9sents dans la conscience publique, utilisant leurs comp\u00e9tences \u00e0 leur avantage et au d\u00e9triment des autres. Cependant, il existe aussi des \u00ab hackers \u00e9thiques \u00bb qui d\u00e9couvrent des failles dans les syst\u00e8mes et les r\u00e9seaux afin de mieux les prot\u00e9ger. \u00c0 cette fin, le Federal Intelligence Service (BND), par exemple, emploie des hackers professionnels.   <\/p><h4> <\/h4><h4>Que signifie en d\u00e9tail le terme hacker ?<\/h4><div> <\/div><p>Le terme d\u00e9rive du verbe anglais \u00ab to hack \u00bb, qui (similaire au terme allemand) signifie couper quelque chose, d\u00e9sassembler quelque chose. Le terme \u00ab hacker \u00bb est apparu dans les ann\u00e9es 1950 et d\u00e9signait \u00e0 l\u2019origine des bricoleurs qui d\u00e9montaient des dispositifs techniques et tentaient de les remonter diff\u00e9remment, neufs ou am\u00e9lior\u00e9s. Depuis le d\u00e9but des ann\u00e9es 1980, le terme hacker est de plus en plus li\u00e9 au sujet de la cybercriminalit\u00e9. Aujourd\u2019hui, il existe environ trois types de hackers :   <\/p><ul><li>Les hackers \u00e9thiques, ou \u00ab white hats \u00bb, d\u00e9tectent les failles et probl\u00e8mes de s\u00e9curit\u00e9 afin d\u2019\u00e9liminer ces vuln\u00e9rabilit\u00e9s. Ils peuvent le faire professionnellement ou pendant leur temps libre et m\u00eame prouver leur \u00e9thique avec des certificats reconnus internationalement. <\/li><li>Les hackers criminels ou \u00ab black hats \u00bb sont aujourd\u2019hui principalement associ\u00e9s au mot \u00ab hacker \u00bb. Et pour de bonnes raisons. Parce qu\u2019il est d\u2019une grande importance de sensibiliser aux dangers qu\u2019ils posent.  <\/li><li>Un troisi\u00e8me groupe s\u2019appelle les \u00ab chapeaux gris \u00bb. C\u2019est un terme collectif d\u00e9signant tous les hackers qui ne peuvent pas \u00eatre clairement attribu\u00e9s aux deux autres groupes. Par exemple, parce qu\u2019ils utilisent des moyens ill\u00e9gaux pour d\u00e9couvrir des vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 dans un programme informatique et les publier sur Internet \u2013 mais sans laisser au fabricant le temps de combler les lacunes au pr\u00e9alable.<br>Le sens original du terme hacker est li\u00e9 aux \u00ab life hacks \u00bb populaires sur Internet. Ce sont des tours ludiques qui (du moins soi-disant) facilitent la vie. Par exemple, comment refroidir une bi\u00e8re en 2 minutes ou comment nettoyer le clavier d\u2019ordinateur avec un post-it.    <\/li><\/ul><h4> <\/h4><h4>O\u00f9 puis-je rencontrer des hackers dans mon travail quotidien ?<\/h4><div> <\/div><p>Vous pouvez croiser des hackers presque partout dans votre travail quotidien. Virtuellement, par exemple, via un e-mail intelligemment con\u00e7u qui cherche \u00e0 vous persuader d\u2019ouvrir la pi\u00e8ce jointe (<a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/social-engineering\/\">ing\u00e9nierie sociale<\/a>). Dans notre monde connect\u00e9, le travail des hackers peut aussi avoir un impact sur des aspects apparemment non num\u00e9riques de notre vie quotidienne. Par exemple, des annulations de train, bus ou train peuvent survenir \u00e0 la suite d\u2019un piratage d\u2019un fournisseur de services de transport en commun. Ou gr\u00e2ce \u00e0 un hacker \u00e9thique, la prochaine mise \u00e0 jour de l\u2019ordinateur de bord de votre voiture d\u2019entreprise contient des lignes de programme qui rendent difficile l\u2019ouverture du syst\u00e8me de verrouillage centralis\u00e9 par des personnes non autoris\u00e9es.    <\/p><h4> <\/h4><h4>Que puis-je faire pour me prot\u00e9ger des hackers ?<\/h4><div> <\/div><p>Les hackers utilisent de nombreuses m\u00e9thodes, points de d\u00e9part et failles de s\u00e9curit\u00e9 pour p\u00e9n\u00e9trer les syst\u00e8mes informatiques sans autorisation. Augmentez de mani\u00e8re globale la <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cybersicherheit\/\">cybers\u00e9curit\u00e9<\/a> de votre organisation afin de minimiser les points d\u2019attaque pour les hackers. Les mesures importantes incluent :  <\/p><ul><li>Des mises \u00e0 jour <a href=\"https:\/\/perseus.de\/2022\/04\/26\/update\/\">aussi<\/a> \u00e0 jour que possible<\/li><li>Structures informatiques pertinentes telles que <a href=\"https:\/\/perseus.de\/2022\/04\/20\/firewall\/\">les pare-feux<\/a> et les antivirus<\/li><li><a href=\"https:\/\/perseus.de\/2022\/04\/22\/mitarbeitenden-sensibilisierung\/\">Sensibilisation de vos employ\u00e9s<\/a><\/li><li><a href=\"https:\/\/perseus.de\/2022\/04\/22\/passwortsicherheit\/\">Mots de passe s\u00e9curis\u00e9s<\/a><\/li><li>Si n\u00e9cessaire, des r\u00e9seaux s\u00e9par\u00e9s pour les divisions ou d\u00e9partements sensibles de l\u2019entreprise<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc607f0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fc607f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Hackers Dans le domaine des technologies de l\u2019information, un \u00ab hacker \u00bb est quelqu\u2019un qui p\u00e9n\u00e8tre dans des syst\u00e8mes informatiques sans autorisation. Les hackers criminels sont principalement pr\u00e9sents dans la conscience publique, utilisant leurs comp\u00e9tences \u00e0 leur avantage et au d\u00e9triment des autres. Cependant, il existe aussi des \u00ab hackers \u00e9thiques \u00bb qui d\u00e9couvrent des [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26572","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/hackers\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Hackers Dans le domaine des technologies de l\u2019information, un \u00ab hacker \u00bb est quelqu\u2019un qui p\u00e9n\u00e8tre dans des syst\u00e8mes informatiques sans autorisation. Les hackers criminels sont principalement pr\u00e9sents dans la conscience publique, utilisant leurs comp\u00e9tences \u00e0 leur avantage et au d\u00e9triment des autres. Cependant, il existe aussi des \u00ab hackers \u00e9thiques \u00bb qui d\u00e9couvrent des [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-20T15:29:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T08:06:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Hackers\",\"datePublished\":\"2022-04-20T15:29:00+00:00\",\"dateModified\":\"2026-03-30T08:06:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/\"},\"wordCount\":620,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/\",\"name\":\"Hackers - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-20T15:29:00+00:00\",\"dateModified\":\"2026-03-30T08:06:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/hackers\/","og_locale":"fr_FR","og_type":"article","og_title":"Hackers - Perseus Technologies","og_description":"Hackers Dans le domaine des technologies de l\u2019information, un \u00ab hacker \u00bb est quelqu\u2019un qui p\u00e9n\u00e8tre dans des syst\u00e8mes informatiques sans autorisation. Les hackers criminels sont principalement pr\u00e9sents dans la conscience publique, utilisant leurs comp\u00e9tences \u00e0 leur avantage et au d\u00e9triment des autres. Cependant, il existe aussi des \u00ab hackers \u00e9thiques \u00bb qui d\u00e9couvrent des [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/hackers\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-20T15:29:00+00:00","article_modified_time":"2026-03-30T08:06:24+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/hackers\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/hackers\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Hackers","datePublished":"2022-04-20T15:29:00+00:00","dateModified":"2026-03-30T08:06:24+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/hackers\/"},"wordCount":620,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/hackers\/","url":"https:\/\/perseus.de\/fr\/hackers\/","name":"Hackers - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/hackers\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-20T15:29:00+00:00","dateModified":"2026-03-30T08:06:24+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/hackers\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/hackers\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/hackers\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Hackers"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26572"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26572\/revisions"}],"predecessor-version":[{"id":26573,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26572\/revisions\/26573"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}