From f62616951e2cb689d6365e8dc4b2471d90f5c10b Mon Sep 17 00:00:00 2001 From: 46halbe <46halbe@berlin.ccc.de> Date: Fri, 9 Apr 2010 23:29:18 +0000 Subject: committing page revision 4 --- pages/hackerethik.en.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'pages/hackerethik.en.md') diff --git a/pages/hackerethik.en.md b/pages/hackerethik.en.md index 2a126fb4..b0274a09 100644 --- a/pages/hackerethik.en.md +++ b/pages/hackerethik.en.md @@ -1,8 +1,8 @@ title: Hackerethik date: 2009-03-29 03:42:00 -updated: 2010-04-09 23:19:37 +updated: 2010-04-09 23:29:18 author: admin -tags: hackerethik, ethik +tags: hackerethik, ethik, ethische grundsaetze Was sind die ethischen Grundsätze des Hackens - Motivation und Grenzen -- cgit v1.2.3