Difference between revisions of "Template:Computer hacking"

From blackwiki
Jump to navigation Jump to search
imported>H2g2bob
(+ computer crime)
imported>H2g2bob
(move non-computer security items to top)
Line 4: Line 4:
 
| above    = <small>This article is part of the series:</small><br />[[Hacker (computing)|Computer Hacking]]
 
| above    = <small>This article is part of the series:</small><br />[[Hacker (computing)|Computer Hacking]]
 
| headerstyle  = background: #ccccff;
 
| headerstyle  = background: #ccccff;
| header1  = [[Timeline of computer security hacker history|History]]
+
| data1    = [[Hacker (hobbyist)|Hobbyist hacker]]<br />[[Hack (technology)|Technology hacker]]<br />[[Hacker (free and open source software)|Free software hacker]]
| data2    = [[Phreaking]]
+
| header2 = [[Hacker (computer security)|Hacking in computer security]]
| header3 = [[Hacker (computer security)|Hacking in computer security]]
+
| data3   = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]]
| data4   = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]]
+
| header4  = [[Timeline of computer security hacker history|History]]
| header5 = [[Hacker ethic]]
+
| data5    = [[Phreaking]]
| data6   = [[Black hat|Black]], [[Grey hat|grey]], [[white hat]]<br />[[Hacker Manifesto]]
+
| header6 = [[Hacker ethic]]
| header7  = Types of hacker
+
| data7   = [[Black hat|Black]], [[Grey hat|grey]], [[white hat]]<br />[[Hacker Manifesto]]
| data8    = [[Script kiddie]]<br />[[Hacker (hobbyist)|Hobbyist hacker]]<br />[[Hack (technology)|Technology hacker]]<br />[[Hacker (free and open source software)|Free software hacker]]
+
| header8 = [[Cybercrime]]  
| header9 = [[Cybercrime]]  
+
| data9    = [[Computer crime]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]]
| data10  = [[Computer crime]]<br />[[List of convicted computer criminals]]
+
| header10 = [[Hacking tool]]s
| header11 = [[Hacking tool]]s
+
| data11   = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]]
| data12   = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]]
+
| header12 = [[Security software]]
| header13 = [[Security software]]
+
| data13   =  
| data14   =  
 
 
<!-- hacker culture? -->
 
<!-- hacker culture? -->
 
}}
 
}}

Revision as of 16:02, 30 August 2008