Difference between revisions of "Template:Computer hacking"

From blackwiki
Jump to navigation Jump to search
(Fuck, wrong wiki!)
imported>Rtc
(removed confusion between Hacker (computer security) and the other hacker definitions)
Line 1: Line 1:
 
{{infobox
 
{{infobox
| name    vdfhdfh'''ghfghf'''
 
 
| image    = [[Image:Computer-eat.svg|100px]]
 
| image    = [[Image:Computer-eat.svg|100px]]
| above    = <small>This article is part of a series on:</small><br />[[Hacker (computing)|Computer Hacking]]
+
| above    = <small>This article is part of a series on:</small><br />[[Hacker (computer security)|Computer Hacking]]
 
| headerstyle  = background: #ccccff;
 
| headerstyle  = background: #ccccff;
| data1    = [[Hacker (hobbyist)|Hobbyist hacker]]<br />[[Hack (technology)|Technology hacker]]<br />[[Hacker (programmer subculture)|Hacker programmer]]
+
| data1    = [[Hacker definition controversy]]
 
| header2  = [[Hacker (computer security)|Hacking in computer security]]
 
| header2  = [[Hacker (computer security)|Hacking in computer security]]
 
| data3    = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]]
 
| data3    = [[Computer security]]<br />[[Computer insecurity]]<br />[[Network security]]
 
| header4  = [[Timeline of computer security hacker history|History]]
 
| header4  = [[Timeline of computer security hacker history|History]]
 
| data5    = [[Phreaking]]<br />[[Cryptovirology]]
 
| data5    = [[Phreaking]]<br />[[Cryptovirology]]
| header6  = [[Hacker ethic]]
+
| header6  = [[Hacker manifesto|Hacker ethic]]
| data7    = [[Black hat]], [[Grey hat]], [[White hat]]<br />[[Hacker Manifesto]]<br />[[Black Hat Briefings]], [[DEF CON (convention)|DEF CON]]
+
| data7    = [[Black hat]], [[Grey hat]], [[White hat]]<br />[[Black Hat Briefings]], [[DEF CON (convention)|DEF CON]]
 
| header8  = [[Cybercrime]]  
 
| header8  = [[Cybercrime]]  
 
| data9    = [[Computer crime]], [[Crimeware]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]]
 
| data9    = [[Computer crime]], [[Crimeware]]<br />[[List of convicted computer criminals]]<br />[[Script kiddie]]
Line 17: Line 16:
 
| header12 = [[Software]]
 
| header12 = [[Software]]
 
| data13  = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall (networking)|Firewall]], [[Host-based intrusion detection system|HIDS]]
 
| data13  = [[Malware]]<br />[[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall (networking)|Firewall]], [[Host-based intrusion detection system|HIDS]]
<!-- hacker culture? -->
 
 
}}<noinclude>
 
}}<noinclude>
 
{{documentation}}
 
{{documentation}}
 
</noinclude>
 
</noinclude>

Revision as of 15:07, 24 September 2010