Difference between revisions of "Template:Computer hacking"
Jump to navigation
Jump to search
imported>Mindmatrix (add a few more) |
imported>Reisio m (rmws) |
||
| Line 18: | Line 18: | ||
| data13 = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall]], [[Host-based intrusion detection system|HIDS]] | | data13 = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall]], [[Host-based intrusion detection system|HIDS]] | ||
<!-- hacker culture? --> | <!-- hacker culture? --> | ||
| − | }} | + | }}<noinclude> |
| − | <noinclude> | ||
{{documentation}} | {{documentation}} | ||
</noinclude> | </noinclude> | ||
Revision as of 22:59, 3 January 2010
File:Test Template Info-Icon - Version (2).svg Template documentation[view] [edit] [history] [purge]
Usage
Add to pages with
{{Computer hacking}}
| The above documentation is transcluded from Template:Computer hacking/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |