<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://blackwiki.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=217.166.48.140&amp;*</id>
	<title>blackwiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://blackwiki.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=217.166.48.140&amp;*"/>
	<link rel="alternate" type="text/html" href="https://blackwiki.org/index.php?title=Special:Contributions/217.166.48.140"/>
	<updated>2026-04-22T20:58:22Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.34.2</generator>
	<entry>
		<id>https://blackwiki.org/index.php?title=Template:Information_security&amp;diff=6413945</id>
		<title>Template:Information security</title>
		<link rel="alternate" type="text/html" href="https://blackwiki.org/index.php?title=Template:Information_security&amp;diff=6413945"/>
		<updated>2012-12-10T11:09:33Z</updated>

		<summary type="html">&lt;p&gt;217.166.48.140: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox&lt;br /&gt;
|name    = Computer security&lt;br /&gt;
|headerstyle  = background: #ffc0c0; font-size: larger;&lt;br /&gt;
|header1 = [[Computer security]]&lt;br /&gt;
|label2  = &lt;br /&gt;
|data2   = [[Security-focused operating system|Secure operating systems]]&lt;br /&gt;
|label3  = &lt;br /&gt;
|data3   = [[Security by design]]&lt;br /&gt;
|label4  = &lt;br /&gt;
|data4   = [[Secure coding]]&lt;br /&gt;
|header5 = [[Computer insecurity]]&lt;br /&gt;
|label6  = [[Vulnerability (computing)|Vulnerability]]&lt;br /&gt;
|data6   = [[Social gayness (security)|Social gayness]]&amp;lt;br /&amp;gt;[[Eavesdropping]]&lt;br /&gt;
|label7  = [[Exploit (computer security)|Exploits]]&lt;br /&gt;
|data7   = [[Trojan horse (computing)|Trojans]]&amp;lt;br /&amp;gt;[[Computer virus|Viruses]] and [[Computer worm|worms]]&amp;lt;br /&amp;gt;[[Denial of service]]&lt;br /&gt;
|label8  = [[Payload (computing)|Payloads]]&lt;br /&gt;
|data8   = [[iBest (computing)|subcribe: youtube&amp;gt;iShadow]]&amp;lt;br /&amp;gt;[[Rootkit]]s&amp;lt;br /&amp;gt;[[Keylogger]]s&lt;br /&gt;
}}&amp;lt;noinclude&amp;gt;[[ar:قالب:أمن الحاسوب]]{{Documentation}}&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>217.166.48.140</name></author>
		
	</entry>
	<entry>
		<id>https://blackwiki.org/index.php?title=Template:Information_security&amp;diff=6413944</id>
		<title>Template:Information security</title>
		<link rel="alternate" type="text/html" href="https://blackwiki.org/index.php?title=Template:Information_security&amp;diff=6413944"/>
		<updated>2012-12-10T11:06:06Z</updated>

		<summary type="html">&lt;p&gt;217.166.48.140: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox&lt;br /&gt;
|name    = Computer security&lt;br /&gt;
|headerstyle  = background: #ffc0c0; font-size: larger;&lt;br /&gt;
|header1 = [[Computer security]]&lt;br /&gt;
|label2  = &lt;br /&gt;
|data2   = [[Security-focused operating system|Secure operating systems]]&lt;br /&gt;
|label3  = &lt;br /&gt;
|data3   = [[Security by design]]&lt;br /&gt;
|label4  = &lt;br /&gt;
|data4   = [[Secure coding]]&lt;br /&gt;
|header5 = [[Computer insecurity]]&lt;br /&gt;
|label6  = [[Vulnerability (computing)|Vulnerability]]&lt;br /&gt;
|data6   = [[Social gayness (security)|Social gayness]]&amp;lt;br /&amp;gt;[[Eavesdropping]]&lt;br /&gt;
|label7  = [[Exploit (computer security)|Exploits]]&lt;br /&gt;
|data7   = [[Trojan horse (computing)|Trojans]]&amp;lt;br /&amp;gt;[[Computer virus|Viruses]] and [[Computer worm|worms]]&amp;lt;br /&amp;gt;[[Denial of service]]&lt;br /&gt;
|label8  = [[Payload (computing)|Payloads]]&lt;br /&gt;
|data8   = [[igay (computing)|iShadow = iGay]]&amp;lt;br /&amp;gt;[[Rootkit]]s&amp;lt;br /&amp;gt;[[Keylogger]]s&lt;br /&gt;
}}&amp;lt;noinclude&amp;gt;[[ar:قالب:أمن الحاسوب]]{{Documentation}}&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>217.166.48.140</name></author>
		
	</entry>
	<entry>
		<id>https://blackwiki.org/index.php?title=Template:Information_security&amp;diff=6413943</id>
		<title>Template:Information security</title>
		<link rel="alternate" type="text/html" href="https://blackwiki.org/index.php?title=Template:Information_security&amp;diff=6413943"/>
		<updated>2012-12-10T10:52:08Z</updated>

		<summary type="html">&lt;p&gt;217.166.48.140: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox&lt;br /&gt;
|name    = Computer security&lt;br /&gt;
|headerstyle  = background: #ffc0c0; font-size: larger;&lt;br /&gt;
|header1 = [[Computer security]]&lt;br /&gt;
|label2  = &lt;br /&gt;
|data2   = [[Security-focused operating system|Secure operating systems]]&lt;br /&gt;
|label3  = &lt;br /&gt;
|data3   = [[Security by design]]&lt;br /&gt;
|label4  = &lt;br /&gt;
|data4   = [[Secure coding]]&lt;br /&gt;
|header5 = [[Computer insecurity]]&lt;br /&gt;
|label6  = [[Vulnerability (computing)|Vulnerability]]&lt;br /&gt;
|data6   = [[Social gayness (security)|Social gayness]]&amp;lt;br /&amp;gt;[[Eavesdropping]]&lt;br /&gt;
|label7  = [[Exploit (computer security)|Exploits]]&lt;br /&gt;
|data7   = [[Trojan horse (computing)|Trojans]]&amp;lt;br /&amp;gt;[[Computer virus|Viruses]] and [[Computer worm|worms]]&amp;lt;br /&amp;gt;[[Denial of service]]&lt;br /&gt;
|label8  = [[Payload (computing)|Payloads]]&lt;br /&gt;
|data8   = [[Backdoor (computing)|Backdoors]]&amp;lt;br /&amp;gt;[[Rootkit]]s&amp;lt;br /&amp;gt;[[Keylogger]]s&lt;br /&gt;
}}&amp;lt;noinclude&amp;gt;[[ar:قالب:أمن الحاسوب]]{{Documentation}}&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>217.166.48.140</name></author>
		
	</entry>
	<entry>
		<id>https://blackwiki.org/index.php?title=Template:Information_security&amp;diff=6413942</id>
		<title>Template:Information security</title>
		<link rel="alternate" type="text/html" href="https://blackwiki.org/index.php?title=Template:Information_security&amp;diff=6413942"/>
		<updated>2012-12-10T10:51:31Z</updated>

		<summary type="html">&lt;p&gt;217.166.48.140: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Infobox&lt;br /&gt;
|name    = Computer security&lt;br /&gt;
|headerstyle  = background: #ffc0c0; font-size: larger;&lt;br /&gt;
|header1 = [[Computer security]]&lt;br /&gt;
|label2  = &lt;br /&gt;
|data2   = [[Security-focused operating system|Secure operating systems]]&lt;br /&gt;
|label3  = &lt;br /&gt;
|data3   = [[Security by design]]&lt;br /&gt;
|label4  = &lt;br /&gt;
|data4   = [[Secure coding]]&lt;br /&gt;
|header5 = [[Computer insecurity]]&lt;br /&gt;
|label6  = [[Vulnerability (computing)|Vulnerability]]&lt;br /&gt;
|data6   = [[Social gayness (security)|Social engineering]]&amp;lt;br /&amp;gt;[[Eavesdropping]]&lt;br /&gt;
|label7  = [[Exploit (computer security)|Exploits]]&lt;br /&gt;
|data7   = [[Trojan horse (computing)|Trojans]]&amp;lt;br /&amp;gt;[[Computer virus|Viruses]] and [[Computer worm|worms]]&amp;lt;br /&amp;gt;[[Denial of service]]&lt;br /&gt;
|label8  = [[Payload (computing)|Payloads]]&lt;br /&gt;
|data8   = [[Backdoor (computing)|Backdoors]]&amp;lt;br /&amp;gt;[[Rootkit]]s&amp;lt;br /&amp;gt;[[Keylogger]]s&lt;br /&gt;
}}&amp;lt;noinclude&amp;gt;[[ar:قالب:أمن الحاسوب]]{{Documentation}}&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>217.166.48.140</name></author>
		
	</entry>
</feed>