Talk:Malware: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (→Glad to cooperate: new section) |
imported>Howard C. Berkowitz No edit summary |
||
Line 1: | Line 1: | ||
{{subpages}} | |||
I'll revisit this as soon as I can [[User:Ched Davis|Ched Davis]] 18:50, 6 February 2009 (UTC) | I'll revisit this as soon as I can [[User:Ched Davis|Ched Davis]] 18:50, 6 February 2009 (UTC) | ||
Revision as of 12:58, 6 February 2009
I'll revisit this as soon as I can Ched Davis 18:50, 6 February 2009 (UTC)
Glad to cooperate
I've been putting up some things more on the network side, still short, such as network reconnaissance, amplification attack, and port scanning. Obviously, the two blend in the DoS area. You may also want to look at information security.
Hope you don't mind, but I created the cluster so it would both show up in Live Articles, and I could start on Related Articles, the latter probably after I convince a (luckily small) cat that my fingers, on the keyboard, do not really need a warmer on top of them.
I'm interested in doing some work on surveillance for malware and exploits, again more on the network side.
I'll leave the Definition entry to you.