Difference between revisions of "Template:Computer hacking"
Jump to navigation
Jump to search
imported>Trash mapache (Adding a conferences section) |
imported>TrueRoganJosh m (Corrected Kali link) |
||
| (4 intermediate revisions by 2 users not shown) | |||
| Line 30: | Line 30: | ||
* [[DEF CON]] | * [[DEF CON]] | ||
* [[Hackers on Planet Earth]] | * [[Hackers on Planet Earth]] | ||
| + | * [[Security_BSides]] | ||
| + | * [[ShmooCon]] | ||
| heading4 = [[Computer crime]] | | heading4 = [[Computer crime]] | ||
| content4 = | | content4 = | ||
| Line 42: | Line 44: | ||
* [[Payload (computing)|Payload]] | * [[Payload (computing)|Payload]] | ||
* [[Social engineering (security)|Social engineering]] | * [[Social engineering (security)|Social engineering]] | ||
| − | * [[Kali]] | + | * [[Kali_Linux|Kali]] |
| heading6 = [[Hacker culture|Practice sites]] | | heading6 = [[Hacker culture|Practice sites]] | ||
| content6 = | | content6 = | ||
| Line 61: | Line 63: | ||
* [[Host-based intrusion detection system|HIDS]] | * [[Host-based intrusion detection system|HIDS]] | ||
* [[Web shell]] | * [[Web shell]] | ||
| + | * [[Arbitrary code execution|RCE]] | ||
| heading8 = [[Computer security]] | | heading8 = [[Computer security]] | ||
| content8 = | | content8 = | ||
* [[Application security]] | * [[Application security]] | ||
* [[Network security]] | * [[Network security]] | ||
| + | * [[Cloud computing security]] | ||
| heading9 = [[Hacker group|Groups]] | | heading9 = [[Hacker group|Groups]] | ||
| content9 = | | content9 = | ||
| Line 80: | Line 84: | ||
* ''[[Nuts and Volts]]'' | * ''[[Nuts and Volts]]'' | ||
* ''[[Phrack]]'' | * ''[[Phrack]]'' | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
}}<noinclude> | }}<noinclude> | ||
{{documentation}} | {{documentation}} | ||
</noinclude> | </noinclude> | ||
Latest revision as of 01:33, 6 September 2020
| This article is part of a series on |
| Computer hacking |
|---|
| History |
| Hacker culture & ethic |
| Conferences |
| Computer crime |
| Hacking tools |
| Practice sites |
| Malware |
| Computer security |
| Groups |
|
| Publications |
| The above documentation is transcluded from Template:Computer hacking/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |