Difference between revisions of "Template:Information security"
Jump to navigation
Jump to search
(ar) |
|||
Line 16: | Line 16: | ||
|label8 = [[Exploit (computer security)|Exploits]] | |label8 = [[Exploit (computer security)|Exploits]] | ||
|data8 = [[Trojan horse (computing)|Trojans]]<br />[[Computer virus|Viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | |data8 = [[Trojan horse (computing)|Trojans]]<br />[[Computer virus|Viruses]] and [[Computer worm|worms]]<br />[[Denial of service]] | ||
− | |label9 = [[Payload ( | + | |label9 = [[Payload (computing |
+ | )|Payloads]] | ||
|data9 = [[Backdoor (computing)|Backdoors]]<br />[[Rootkit]]s<br />[[Keylogger]]s | |data9 = [[Backdoor (computing)|Backdoors]]<br />[[Rootkit]]s<br />[[Keylogger]]s | ||
}}<noinclude>[[ar:قالب:أمن الحاسوب]]{{Documentation}}</noinclude> | }}<noinclude>[[ar:قالب:أمن الحاسوب]]{{Documentation}}</noinclude> |
Revision as of 22:20, 18 September 2011
The above documentation is transcluded from Template:Information security/doc. (edit | history) Editors can experiment in this template's sandbox (create | mirror) and testcases (create) pages. Please add categories to the /doc subpage. Subpages of this template. |