Difference between revisions of "Template:Computer hacking"
Jump to navigation
Jump to search
imported>Pghat |
imported>TheRealFennShysa |
||
| Line 10: | Line 10: | ||
| data5 = [[Phreaking]]<br />[[Cryptovirology]] | | data5 = [[Phreaking]]<br />[[Cryptovirology]] | ||
| header6 = [[Hacker ethic]] | | header6 = [[Hacker ethic]] | ||
| − | | data7 = [[Black hat|Black hat]], [[Grey hat|Grey hat]], [[White hat]]<br />[[Hacker Manifesto]]<br />[[Black Hat Briefings]], [[DEF CON (convention)|DEF CON | + | | data7 = [[Black hat|Black hat]], [[Grey hat|Grey hat]], [[White hat]]<br />[[Hacker Manifesto]]<br />[[Black Hat Briefings]], [[DEF CON (convention)|DEF CON]] |
| header8 = [[Cybercrime]] | | header8 = [[Cybercrime]] | ||
| data9 = [[Computer crime]], [[Crimeware]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]] | | data9 = [[Computer crime]], [[Crimeware]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]] | ||
Revision as of 19:51, 9 April 2010
| The above documentation is transcluded from Template:Computer hacking/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |