Difference between revisions of "Template:Computer hacking"
Jump to navigation
Jump to search
(Fuck, wrong wiki!) |
imported>Rtc (removed confusion between Hacker (computer security) and the other hacker definitions) |
||
| Line 1: | Line 1: | ||
{{infobox | {{infobox | ||
| − | |||
| image = [[Image:Computer-eat.svg|100px]] | | image = [[Image:Computer-eat.svg|100px]] | ||
| − | | above = <small>This article is part of a series on:</small><br />[[Hacker ( | + | | above = <small>This article is part of a series on:</small><br />[[Hacker (computer security)|Computer Hacking]] |
| headerstyle = background: #ccccff; | | headerstyle = background: #ccccff; | ||
| − | | data1 = [[Hacker | + | | data1 = [[Hacker definition controversy]] |
| header2 = [[Hacker (computer security)|Hacking in computer security]] | | header2 = [[Hacker (computer security)|Hacking in computer security]] | ||
| data3 = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]] | | data3 = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]] | ||
| header4 = [[Timeline of computer security hacker history|History]] | | header4 = [[Timeline of computer security hacker history|History]] | ||
| data5 = [[Phreaking]]<br />[[Cryptovirology]] | | data5 = [[Phreaking]]<br />[[Cryptovirology]] | ||
| − | | header6 = [[Hacker ethic]] | + | | header6 = [[Hacker manifesto|Hacker ethic]] |
| − | | data7 = [[Black hat]], [[Grey hat]], [[White hat | + | | data7 = [[Black hat]], [[Grey hat]], [[White hat]]<br />[[Black Hat Briefings]], [[DEF CON (convention)|DEF CON]] |
| header8 = [[Cybercrime]] | | header8 = [[Cybercrime]] | ||
| data9 = [[Computer crime]], [[Crimeware]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]] | | data9 = [[Computer crime]], [[Crimeware]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]] | ||
| Line 17: | Line 16: | ||
| header12 = [[Software]] | | header12 = [[Software]] | ||
| data13 = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall (networking)|Firewall]], [[Host-based intrusion detection system|HIDS]] | | data13 = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall (networking)|Firewall]], [[Host-based intrusion detection system|HIDS]] | ||
| − | |||
}}<noinclude> | }}<noinclude> | ||
{{documentation}} | {{documentation}} | ||
</noinclude> | </noinclude> | ||
Revision as of 15:07, 24 September 2010
Usage
Add to pages with
{{Computer hacking}}
| The above documentation is transcluded from Template:Computer hacking/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |