Difference between revisions of "Template:Computer hacking"
Jump to navigation
Jump to search
imported>Reisio m (rmws) |
imported>R'n'B m (Disambiguate Firewall to Firewall (networking) using popups) |
||
| Line 16: | Line 16: | ||
| data11 = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]] | | data11 = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]] | ||
| header12 = [[Software]] | | header12 = [[Software]] | ||
| − | | data13 = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall]], [[Host-based intrusion detection system|HIDS]] | + | | data13 = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall (networking)|Firewall]], [[Host-based intrusion detection system|HIDS]] |
<!-- hacker culture? --> | <!-- hacker culture? --> | ||
}}<noinclude> | }}<noinclude> | ||
{{documentation}} | {{documentation}} | ||
</noinclude> | </noinclude> | ||
Revision as of 11:32, 12 February 2010
| The above documentation is transcluded from Template:Computer hacking/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |