Difference between revisions of "Template:Computer hacking"

From blackwiki
Jump to navigation Jump to search
imported>Mindmatrix
(expand with software and conferences)
imported>Mindmatrix
(add a few more)
Line 8: Line 8:
 
| data3    = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]]
 
| data3    = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]]
 
| header4  = [[Timeline of computer security hacker history|History]]
 
| header4  = [[Timeline of computer security hacker history|History]]
| data5    = [[Phreaking]]
+
| data5    = [[Phreaking]]<br />[[Cryptovirology]]
 
| header6  = [[Hacker ethic]]
 
| header6  = [[Hacker ethic]]
 
| data7    = [[Black hat|Black hat]], [[Grey hat|Grey hat]], [[White hat]]<br />[[Hacker Manifesto]]<br />[[Black Hat Briefings]], [[DEF CON (convention)|DEF CON]]
 
| data7    = [[Black hat|Black hat]], [[Grey hat|Grey hat]], [[White hat]]<br />[[Hacker Manifesto]]<br />[[Black Hat Briefings]], [[DEF CON (convention)|DEF CON]]
 
| header8  = [[Cybercrime]]  
 
| header8  = [[Cybercrime]]  
| data9    = [[Computer crime]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]]
+
| data9    = [[Computer crime]], [[Crimeware]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]]
 
| header10 = [[Hacking tool]]s
 
| header10 = [[Hacking tool]]s
 
| data11  = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]]
 
| data11  = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]]
 
| header12 = [[Software]]
 
| header12 = [[Software]]
| data13  = [[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]]<br />[[Antivirus software]], [[Firewall]]
+
| data13  = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall]], [[Host-based intrusion detection system|HIDS]]
 
<!-- hacker culture? -->
 
<!-- hacker culture? -->
 
}}
 
}}

Revision as of 15:22, 30 November 2009