Difference between revisions of "Template:Computer hacking"

From blackwiki
Jump to navigation Jump to search
imported>Reisio
m (rmws)
imported>R'n'B
m (Disambiguate Firewall to Firewall (networking) using popups)
Line 16: Line 16:
 
| data11  = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]]
 
| data11  = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]]
 
| header12 = [[Software]]
 
| header12 = [[Software]]
| data13  = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall]], [[Host-based intrusion detection system|HIDS]]
+
| data13  = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall (networking)|Firewall]], [[Host-based intrusion detection system|HIDS]]
 
<!-- hacker culture? -->
 
<!-- hacker culture? -->
 
}}<noinclude>
 
}}<noinclude>
 
{{documentation}}
 
{{documentation}}
 
</noinclude>
 
</noinclude>

Revision as of 11:32, 12 February 2010