Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
imported>Zarcillo m (add "s" to Trojan (plural is more accurate to refer to a category rather than a single instance)) |
imported>Zarcillo m (add "ses" to payload, backdoor, rootkit and keylogger) |
||
| Line 16: | Line 16: | ||
|label8 = [[Exploitation (computer security)|Exploitation]] | |label8 = [[Exploitation (computer security)|Exploitation]] | ||
|data8 = [[Trojan horse (computing)|Trojans]]<br />[[Computer virus|viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | |data8 = [[Trojan horse (computing)|Trojans]]<br />[[Computer virus|viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | ||
| − | |label9 = [[ | + | |label9 = [[Payloads (software)|Payloads]] |
| − | |data9 = [[ | + | |data9 = [[Backdoors (computing)|Backdoors]]<br />[[Rootkits]]<br />[[Keyloggers]] |
}}<noinclude>{{Documentation}}</noinclude> | }}<noinclude>{{Documentation}}</noinclude> | ||
Revision as of 13:13, 3 June 2010
| The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |