Difference between revisions of "Template:Computer hacking"
Jump to navigation
Jump to search
imported>Elvenmuse |
imported>Pnm (Clarify focus of this template + misc improvements) |
||
| Line 1: | Line 1: | ||
{{infobox | {{infobox | ||
| image = <!-- http://catb.org/hacker-emblem/ --> | | image = <!-- http://catb.org/hacker-emblem/ --> | ||
| − | | above = <small>This article is part of a series on:</small><br />[[Hacker (computer security)|Computer hacking]] | + | | above = <small>This article is part of a series on:</small><br />[[Hacker (computer security)|Computer security hacking]] |
| headerstyle = background: #ccccff; | | headerstyle = background: #ccccff; | ||
| − | |||
| − | |||
| − | |||
| header4 = [[Timeline of computer security hacker history|History]] | | header4 = [[Timeline of computer security hacker history|History]] | ||
| data5 = [[Phreaking]]<br />[[Cryptovirology]] | | data5 = [[Phreaking]]<br />[[Cryptovirology]] | ||
| Line 14: | Line 11: | ||
| header10 = [[Hacking tool]]s | | header10 = [[Hacking tool]]s | ||
| data11 = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]] | | data11 = [[Vulnerability (computing)|Vulnerability]]<br />[[Exploit (computer security)|Exploit]]<br />[[Payload (software)|Payload]] | ||
| − | | header12 = [[ | + | | header12 = [[Malware]] |
| − | | data13 = | + | | data13 = [[Rootkit]], [[Backdoor (computing)|Backdoor]]<br />[[Trojan horse (computing)|Trojan horse]], [[Computer virus|Virus]], [[Computer worm|Worm]]<br />[[Spyware]], [[Botnet]], [[Keystroke logging]]<br />[[Antivirus software]], [[Firewall (networking)|Firewall]], [[Host-based intrusion detection system|HIDS]] |
| + | | header14 = [[Computer security]] | ||
| + | | data15 = [[Computer insecurity]]<br />[[Application security]]<br />[[Network security]] | ||
}}<noinclude> | }}<noinclude> | ||
{{documentation}} | {{documentation}} | ||
</noinclude> | </noinclude> | ||
Revision as of 00:56, 3 January 2011
| The above documentation is transcluded from Template:Computer hacking/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |