Wikipedia:Version 1.0 Editorial Team/Computer Security articles by quality and importance/2

From Wikipedia, the free encyclopedia


(prev) (up) (next)
Contact with WP Computer Security
Article Import Date Assess Ver
Hacker Manifesto [1] December 7, 2009 Stub
Hacker group [2] December 7, 2009 Stub
Hacking tool [3] December 7, 2009 Stub
Hacktivismo Enhanced-Source Software License Agreement [4] December 7, 2009 Stub
Hare (computer virus) [5] December 7, 2009 Stub
Heap feng shui [6] December 7, 2009 Stub
Helpful worm [7] December 7, 2009 Stub
HoHoCon [8] December 7, 2009 Stub
Homepage hijacking [9] December 7, 2009 Stub
Honeynet Project [10] December 7, 2009 Stub
Honeypot and forEnsic Analysis Tool [11] December 7, 2009 Stub
Host-based intrusion detection system [12] December 7, 2009 Stub
Hybris (computer worm) [13] December 7, 2009 Stub
IBM Internet Security Systems [14] December 7, 2009 Stub
INIT 1984 (computer virus) [15] December 7, 2009 Stub
ISO/IEC 27002 [16] December 7, 2009 Stub
ITSEC [17] December 7, 2009 Stub
Ilfak Guilfanov [18] December 7, 2009 Stub
InstaFinder [19] December 7, 2009 Stub
JBoss SSO [20] December 7, 2009 Stub
Jacob Appelbaum [21] December 7, 2009 Stub
Jdbgmgr.exe virus hoax [22] December 7, 2009 Stub
Jeff Moss (hacker) [23] December 7, 2009 Stub
Jeffrey Hunker [24] December 7, 2009 Stub
Jennifer Seberry [25] December 7, 2009 Stub
Jim Christy [26] December 7, 2009 Stub
Joanna Rutkowska [27] December 7, 2009 Stub
Johannes Ullrich [28] December 7, 2009 Stub
Jon Callas [29] December 7, 2009 Stub
Kaisa Nyberg [30] December 7, 2009 Stub
Kak worm [31] December 7, 2009 Stub
Karl Koch (hacker) [32] December 7, 2009 Stub
Knark [33] December 7, 2009 Stub
KoKo (computer virus) [34] December 7, 2009 Stub
Kraken botnet [35] December 7, 2009 Stub
L. Jean Camp [36] December 7, 2009 Stub
L10n worm [37] December 7, 2009 Stub
Lamer Exterminator (computer virus) [38] December 7, 2009 Stub
Lance Hoffman [39] December 7, 2009 Stub
Lattice-based access control [40] December 7, 2009 Stub
Lawrie Brown [41] December 7, 2009 Stub
Len Sassaman [42] December 7, 2009 Stub
Life is beautiful virus hoax [43] December 7, 2009 Stub
Loke Yeng Hoe [44] December 7, 2009 Stub
Looksky (computer worm) [45] December 7, 2009 Stub
Loyd Blankenship [46] December 7, 2009 Stub
MS Antivirus (malware) [47] December 7, 2009 Stub
Marc Maiffret [48] December 7, 2009 Stub
Markus Jakobsson [49] December 7, 2009 Stub
Martin Roesch [50] December 7, 2009 Stub
Martín Abadi [51] December 7, 2009 Stub
Mass mailer [52] December 7, 2009 Stub
Matt Blaze [53] December 7, 2009 Stub
Mausezahn [54] December 7, 2009 Stub
McAfee Personal Firewall Plus [55] December 7, 2009 Stub
McAfee VirusScan [56] December 7, 2009 Stub
Mebroot [57] December 7, 2009 Stub
Merijn Bellekom [58] December 7, 2009 Stub
Michael Howard (Microsoft) [59] December 7, 2009 Stub
Michael Lynn [60] December 7, 2009 Stub
Michael Schroeder [61] December 7, 2009 Stub
Michał Zalewski [62] December 7, 2009 Stub
Mimail [63] December 7, 2009 Stub
Multipartite virus [64] December 7, 2009 Stub
Mumu (computer worm) [65] December 7, 2009 Stub
Mylife (computer worm) [66] December 7, 2009 Stub
Nagware [67] December 7, 2009 Stub
Natas (computer virus) [68] December 7, 2009 Stub
National Information Assurance Certification and Accreditation Process [69] December 7, 2009 Stub
Navidad virus [70] December 7, 2009 Stub
Ne0h [71] December 7, 2009 Stub
Neil Daswani [72] December 7, 2009 Stub
Network intrusion detection system [73] December 7, 2009 Stub
Nikita Borisov [74] December 7, 2009 Stub
Nimda [75] December 7, 2009 Stub
Noisebridge [76] December 7, 2009 Stub
Norton Personal Firewall [77] December 7, 2009 Stub
Nyxem Worm [78] December 7, 2009 Stub
OSF.8759 [79] December 7, 2009 Stub
Ofir Arkin [80] December 7, 2009 Stub
Oligomorphic code [81] December 7, 2009 Stub
Olympic Torch (virus hoax) [82] December 7, 2009 Stub
OneHalf (computer virus) [83] December 7, 2009 Stub
Ophcrack [84] December 7, 2009 Stub
Optix Pro [85] December 7, 2009 Stub
Paul Kocher [86] December 7, 2009 Stub
Paul van Oorschot [87] December 7, 2009 Stub
Payload (software) [88] December 7, 2009 Stub
Personal firewall [89] December 7, 2009 Stub
Pete Herzog [90] December 7, 2009 Stub
Peter G. Neumann [91] December 7, 2009 Stub
Peter Garza [92] December 7, 2009 Stub
Peter Gutmann (computer scientist) [93] December 7, 2009 Stub
Peter Tippett [94] December 7, 2009 Stub
Pikachu virus [95] December 7, 2009 Stub
Polymorphic packer [96] December 7, 2009 Stub
Protected computer [97] December 7, 2009 Stub
Protection mechanism [98] December 7, 2009 Stub
Protocol-based intrusion detection system [99] December 7, 2009 Stub
Przemysław Frasunek [100] December 7, 2009 Stub
Pumping Station One [101] December 7, 2009 Stub
RX Toolbar [102] December 7, 2009 Stub
Rafail Ostrovsky [103] December 7, 2009 Stub
Rebecca Mercuri [104] December 7, 2009 Stub
Return-oriented programming [105] December 7, 2009 Stub
Richard Forno [106] December 7, 2009 Stub
Robert C. Seacord [107] December 7, 2009 Stub
Robert Morris (cryptographer) [108] December 7, 2009 Stub
Robert Schifreen [109] December 7, 2009 Stub
Roger R. Schell [110] December 7, 2009 Stub
Rogue system [111] December 7, 2009 Stub
Rop Gonggrijp [112] December 7, 2009 Stub
Ross J. Anderson (professor) [113] December 7, 2009 Stub
Runas [114] December 7, 2009 Stub
Ryan Lackey [115] December 7, 2009 Stub
SANS Institute [116] December 7, 2009 Stub
SCA (computer virus) [117] December 7, 2009 Stub
SULFNBK.EXE [118] December 7, 2009 Stub
Sadmind (computer worm) [119] December 7, 2009 Stub
Samhain (software) [120] December 7, 2009 Stub
Samy (XSS) [121] December 7, 2009 Stub
Schneier's Law [122] December 7, 2009 Stub
Secure coding [123] December 7, 2009 Stub
Security architecture [124] December 7, 2009 Stub
Security modes [125] December 7, 2009 Stub
Security testing [126] December 7, 2009 Stub
SevenDust (computer virus) [127] December 7, 2009 Stub
Shankar's Virus [128] December 7, 2009 Stub
Simon Johnson (security expert) [129] December 7, 2009 Stub
Sircam [130] December 7, 2009 Stub
Smeg Virus Construction Kit [131] December 7, 2009 Stub
SmitFraud [132] December 7, 2009 Stub
Sony malware [133] December 7, 2009 Stub
Spy Wiper [134] December 7, 2009 Stub
Spydawn [135] December 7, 2009 Stub
Spyvampire [136] December 7, 2009 Stub
SpywareBlaster [137] December 7, 2009 Stub
Stacheldraht [138] December 7, 2009 Stub
Stakkato [139] December 7, 2009 Stub
Staog [140] December 7, 2009 Stub
Stealth virus (computers) [141] December 7, 2009 Stub
Stealware [142] December 7, 2009 Stub
Steven M. Bellovin [143] December 7, 2009 Stub
Stration [144] December 7, 2009 Stub
TCP/IP stack fingerprinting [145] December 7, 2009 Stub
Take-grant protection model [146] December 7, 2009 Stub
Titan Rain [147] December 7, 2009 Stub
Tom Berson [148] December 7, 2009 Stub
Toxbot [149] December 7, 2009 Stub
Trend Micro Internet Security [150] December 7, 2009 Stub
Trinoo [151] December 7, 2009 Stub
Trojan.Zonebac [152] December 7, 2009 Stub
Tuxissa [153] December 7, 2009 Stub
Type enforcement [154] December 7, 2009 Stub
UXu [155] December 7, 2009 Stub
Ultimate fixer [156] December 7, 2009 Stub
Vector (malware) [157] December 7, 2009 Stub
Vern Paxson [158] December 7, 2009 Stub
Virgil D. Gligor [159] December 7, 2009 Stub
Virus Information Alliance [160] December 7, 2009 Stub
Vulnerability scanner [161] December 7, 2009 Stub
VundoFix [162] December 7, 2009 Stub
W32.Myzor.FK@yf [163] December 7, 2009 Stub
W32.alcra.F [164] December 7, 2009 Stub
W32/Bolgimo.worm (computer worm) [165] December 7, 2009 Stub
W32/Storm.worm [166] December 7, 2009 Stub
WANK (computer worm) [167] December 7, 2009 Stub
Wabbit [168] December 7, 2009 Stub
Warhol worm [169] December 7, 2009 Stub
Whale (computer virus) [170] December 7, 2009 Stub
White hat [171] December 7, 2009 Stub
Wicked Rose [172] December 7, 2009 Stub
Wietse Venema [173] December 7, 2009 Stub
WinAntiVirus 2006 [174] December 7, 2009 Stub
XAKEP (journal) [175] December 7, 2009 Stub
Xandu.2385 (computer virus) [176] December 7, 2009 Stub
Yamanner [177] December 7, 2009 Stub
ZMist [178] December 7, 2009 Stub
Zango Messenger [179] December 7, 2009 Stub
Zenux [180] December 7, 2009 Stub
Zlob trojan [181] December 7, 2009 Stub
List of TCP and UDP port numbers [182] December 7, 2009 List
List of computer viruses [183] December 7, 2009 List
List of computer viruses (A–D) [184] December 7, 2009 List
List of computer viruses (E–K) [185] December 7, 2009 List
List of computer viruses (L–R) [186] December 7, 2009 List
List of computer viruses (Numeric) [187] December 7, 2009 List
List of computer viruses (S–Z) [188] December 7, 2009 List
List of computer viruses (all) [189] December 7, 2009 List
List of computer worms [190] December 7, 2009 List
180SearchAssistant [191] December 7, 2009 Unassessed
AAA protocol [192] December 7, 2009 Unassessed
ABC (computer virus) [193] December 7, 2009 Unassessed
AIDS (trojan horse) [194] December 7, 2009 Unassessed
AIDS II (computer virus) [195] December 7, 2009 Unassessed
ARCV-n (computer virus) [196] December 7, 2009 Unassessed
Abraxas (computer virus) [197] December 7, 2009 Unassessed
Acceptable use policy [198] December 7, 2009 Unassessed
Access Control Matrix [199] December 7, 2009 Unassessed
Access token [200] December 7, 2009 Unassessed
Ada (computer virus) [201] December 7, 2009 Unassessed
Agena (computer virus) [202] December 7, 2009 Unassessed
Ah (computer virus) [203] December 7, 2009 Unassessed
Alabama (computer virus) [204] December 7, 2009 Unassessed
Alexander Sotirov [205] December 7, 2009 Unassessed
Ambient authority [206] December 7, 2009 Unassessed
Ambulance (computer virus) [207] December 7, 2009 Unassessed
Anna Kournikova (computer virus) [208] December 7, 2009 Unassessed
Anomaly-based intrusion detection system [209] December 7, 2009 Unassessed
AntiVermins [210] December 7, 2009 Unassessed
Astalavista.box.sk [211] December 7, 2009 Unassessed
Astaro [212] December 7, 2009 Unassessed
Attack surface [213] December 7, 2009 Unassessed
Avira security software [214] December 7, 2009 Unassessed
BSDRadius [215] December 7, 2009 Unassessed
Bad Sectors 1.2 (computer virus) [216] December 7, 2009 Unassessed
Bagle (computer worm) [217] December 7, 2009 Unassessed
Bandook [218] December 7, 2009 Unassessed
Beast Trojan (trojan horse) [219] December 7, 2009 Unassessed
Beyond Security [220] December 7, 2009 Unassessed
BeyondTrust [221] December 7, 2009 Unassessed
Blackworm [222] December 7, 2009 Unassessed
Bliss (virus) [223] December 7, 2009 Unassessed
BlockHosts [224] December 7, 2009 Unassessed
BlockSSHD [225] December 7, 2009 Unassessed
BloodhoundV2 Trojan Horse [226] December 7, 2009 Unassessed
Bluesnarfing [227] December 7, 2009 Unassessed
Bohmini.A [228] December 7, 2009 Unassessed
Brain (computer virus) [229] December 7, 2009 Unassessed
Bro (software) [230] December 7, 2009 Unassessed
Brontok (computer worm) [231] December 7, 2009 Unassessed
CAPTCHA [232] December 7, 2009 Unassessed
CIH (computer virus) [233] December 7, 2009 Unassessed
COPS (software) [234] December 7, 2009 Unassessed
CPTS [235] December 7, 2009 Unassessed
CPU modes [236] December 7, 2009 Unassessed
CTX (computer virus) [237] December 7, 2009 Unassessed
CVSS [238] December 7, 2009 Unassessed
Capability-based security [239] December 7, 2009 Unassessed
Caribe (computer worm) [240] December 7, 2009 Unassessed
Certified Information Security Manager [241] December 7, 2009 Unassessed
Child Exploitation Tracking System [242] December 7, 2009 Unassessed
Christmas Tree EXEC [243] December 7, 2009 Unassessed
Christopher Soghoian [244] December 7, 2009 Unassessed
Cleevix (computer virus) [245] December 7, 2009 Unassessed
CoSign single sign on [246] December 7, 2009 Unassessed
Code Red II (computer worm) [247] December 7, 2009 Unassessed
Cold boot attack [248] December 7, 2009 Unassessed
Common Vulnerabilities and Exposures [249] December 7, 2009 Unassessed
Commwarrior-A [250] December 7, 2009 Unassessed
Comodo Internet Security [251] December 7, 2009 Unassessed
Computational trust [252] December 7, 2009 Unassessed
Computer Online Forensic Evidence Extractor [253] December 7, 2009 Unassessed
Computer surveillance [254] December 7, 2009 Unassessed
Confused deputy problem [255] December 7, 2009 Unassessed
ContraVirus [256] December 7, 2009 Unassessed
Controlled interface [257] December 7, 2009 Unassessed
Core Force [258] December 7, 2009 Unassessed
Crazy Boot (computer virus) [259] December 7, 2009 Unassessed
Crimeware [260] December 7, 2009 Unassessed
Cross-site request forgery [261] December 7, 2009 Unassessed
Cyber Storm II [262] December 7, 2009 Unassessed
DNS cache poisoning [263] December 7, 2009 Unassessed
DNS hijacking [264] December 7, 2009 Unassessed
Dan Kaminsky [265] December 7, 2009 Unassessed
Dancing pigs [266] December 7, 2009 Unassessed
Data breach [267] December 7, 2009 Unassessed
Data validation [268] December 7, 2009 Unassessed
Defacement (vandalism) [269] December 7, 2009 Unassessed
Defensive computing [270] December 7, 2009 Unassessed
Differentiated security [271] December 7, 2009 Unassessed
Domx [272] December 7, 2009 Unassessed
Dosnet [273] December 7, 2009 Unassessed
Drive-by download [274] December 7, 2009 Unassessed
Dynamic linker [275] December 7, 2009 Unassessed
Einstein (US-CERT program) [276] December 7, 2009 Unassessed
Eliza (computer virus) [277] December 7, 2009 Unassessed
Elk Cloner [278] December 7, 2009 Unassessed
Emcodec [279] December 7, 2009 Unassessed
Employee monitoring software [280] December 7, 2009 Unassessed
Enterprise information security architecture [281] December 7, 2009 Unassessed
Event data [282] December 7, 2009 Unassessed
Evil twin (wireless networks) [283] December 7, 2009 Unassessed
Extended Copy Protection [284] December 7, 2009 Unassessed
External Security Manager [285] December 7, 2009 Unassessed
FIPS 140-3 [286] December 7, 2009 Unassessed
FTP bounce attack [287] December 7, 2009 Unassessed
Fail2ban [288] December 7, 2009 Unassessed
File binder [289] December 7, 2009 Unassessed
File system permissions [290] December 7, 2009 Unassessed
Finjan [291] December 7, 2009 Unassessed
Firewall pinhole [292] December 7, 2009 Unassessed
Flaw hypothesis methodology [293] December 7, 2009 Unassessed
Fork bomb [294] December 7, 2009 Unassessed
Form (computer virus) [295] December 7, 2009 Unassessed
Four Horsemen of the Infocalypse [296] December 7, 2009 Unassessed
Frame injection [297] December 7, 2009 Unassessed
FreeOTFE [298] December 7, 2009 Unassessed
Gateway (computer program) [299] December 7, 2009 Unassessed
Ghost Rat [300] December 7, 2009 Unassessed
Gideon Rasmussen [301] December 7, 2009 Unassessed
Green Antivirus 2009 [302] December 7, 2009 Unassessed
Gwava [303] December 7, 2009 Unassessed
HTTP header injection [304] December 7, 2009 Unassessed
HTTP response splitting [305] December 7, 2009 Unassessed
HackThisSite [306] December 7, 2009 Unassessed
Hackerspace [307] December 7, 2009 Unassessed
Hardware Trojan (computing) [308] December 7, 2009 Unassessed
Herbert Hugh Thompson [309] December 7, 2009 Unassessed
HoneyMonkey [310] December 7, 2009 Unassessed
Human-computer interaction (security) [311] December 7, 2009 Unassessed
IAntivirus [312] December 7, 2009 Unassessed
IObit Security 360 [313] December 7, 2009 Unassessed
IP hijacking [314] December 7, 2009 Unassessed
Inference attack [315] December 7, 2009 Unassessed
Insurrection (trojan horse) [316] December 7, 2009 Unassessed
Inter-Control Center Communications Protocol [317] December 7, 2009 Unassessed
Inter-protocol communication [318] December 7, 2009 Unassessed
Inter-protocol exploitation [319] December 7, 2009 Unassessed
Internet Storm Center [320] December 7, 2009 Unassessed
Internet leak [321] December 7, 2009 Unassessed
Intrusion detection system evasion techniques [322] December 7, 2009 Unassessed
Ivan Krstić [323] December 7, 2009 Unassessed
Jerusalem (computer virus) [324] December 7, 2009 Unassessed
Justin Tanner Petersen [325] December 7, 2009 Unassessed
Kama Sutra (computer worm) [326] December 7, 2009 Unassessed
Kenneth Weiss [327] December 7, 2009 Unassessed
Kill switch [328] December 7, 2009 Unassessed
Kiosk hacking [329] December 7, 2009 Unassessed
Klez (computer worm) [330] December 7, 2009 Unassessed
LAIM Working Group [331] December 7, 2009 Unassessed
Layered security [332] December 7, 2009 Unassessed
Leap virus [333] December 7, 2009 Unassessed
Linux malware [334] December 7, 2009 Unassessed
List of compact discs sold with XCP [335] December 7, 2009 Unassessed
Lock-Keeper [336] December 7, 2009 Unassessed
Logic bomb [337] December 7, 2009 Unassessed
Login spoofing [338] December 7, 2009 Unassessed
Lorcon [339] December 7, 2009 Unassessed
Lynis [340] December 7, 2009 Unassessed
MDEF (computer virus) [341] December 7, 2009 Unassessed
MPack (software) [342] December 7, 2009 Unassessed
MacMag (computer virus) [343] December 7, 2009 Unassessed
MacSweeper [344] December 7, 2009 Unassessed
Macro virus (computing) [345] December 7, 2009 Unassessed
Man in the Browser [346] December 7, 2009 Unassessed
Marcus Sachs [347] December 7, 2009 Unassessed
Markus Kuhn [348] December 7, 2009 Unassessed
Matrix Software License Protection System [349] December 7, 2009 Unassessed
McColo [350] December 7, 2009 Unassessed
See also: assessed article categories. Last update:


(prev) (up) (next)