Difference between revisions of "Template:Computer hacking"
Jump to navigation
Jump to search
imported>Mindmatrix (expand with software and conferences) |
imported>Mindmatrix (add a few more) |
||
| Line 8: | Line 8: | ||
| data3 = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]] | | data3 = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]] | ||
| header4 = [[Timeline of computer security hacker history|History]] | | header4 = [[Timeline of computer security hacker history|History]] | ||
| − | | data5 = [[Phreaking]] | + | | data5 = [[Phreaking]]<br />[[Cryptovirology]] |
| header6 = [[Hacker ethic]] | | header6 = [[Hacker ethic]] | ||
| data7 = [[Black hat|Black hat]], [[Grey hat|Grey hat]], [[White hat]]<br />[[Hacker Manifesto]]<br />[[Black Hat Briefings]], [[DEF CON (convention)|DEF CON]] | | data7 = [[Black hat|Black hat]], [[Grey hat|Grey hat]], [[White hat]]<br />[[Hacker Manifesto]]<br />[[Black Hat Briefings]], [[DEF CON (convention)|DEF CON]] | ||
| header8 = [[Cybercrime]] | | header8 = [[Cybercrime]] | ||
| − | | data9 = [[Computer crime]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]] | + | | data9 = [[Computer crime]], [[Crimeware]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]] |
| header10 = [[Hacking tool]]s | | header10 = [[Hacking tool]]s | ||
| data11 = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]] | | data11 = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]] | ||
| header12 = [[Software]] | | header12 = [[Software]] | ||
| − | | data13 = [[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]]<br />[[Antivirus software]], [[Firewall]] | + | | data13 = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall]], [[Host-based intrusion detection system|HIDS]] |
<!-- hacker culture? --> | <!-- hacker culture? --> | ||
}} | }} | ||
Revision as of 15:22, 30 November 2009
| The above documentation is transcluded from Template:Computer hacking/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |