أرابيكا:مبادرة العطاء الرقمي/المقالات المقترحة/حماية الحاسوب

هذه هي النسخة الحالية من هذه الصفحة، وقام بتعديلها عبود السكاف (نقاش | مساهمات) في 21:18، 1 يوليو 2023 (‏ بوت: إصلاح أخطاء فحص أرابيكا من 1 إلى 104). العنوان الحالي (URL) هو وصلة دائمة لهذه النسخة.

(فرق) → نسخة أقدم | نسخة حالية (فرق) | نسخة أحدث ← (فرق)

Computer Security

  1. Access token
  2. List of TCP and UDP port numbers
  3. Swatting
  4. SOCKS
  5. SHA-2
  6. SHA-1
  7. Torpig
  8. Wi-Fi Protected Access
  9. Rainbow table
  10. Payment Card Industry Data Security Standard
  11. Certified Information Systems Security Professional
  12. Intel Active Management Technology
  13. Gary McKinnon
  14. Chief information officer
  15. Keychain
  16. IEEE 802.1X
  17. Air gap
  18. Protection ring
  19. Hardware security module
  20. Certified Ethical Hacker
  21. FIPS 140-2
  22. Address space layout randomization
  23. Extensible Authentication Protocol
  24. BonziBuddy
  25. Juniper Networks
  26. Role-based access control
  27. Gemalto
  28. Sneakers
  29. Chaos Communication Congress
  30. Whitelist
  31. Webroot
  32. Trend Micro
  33. Segmentation fault
  34. Return-oriented programming
  35. Identity management
  36. Patch Tuesday
  37. Iptables
  38. Digest access authentication
  39. Extended Validation Certificate
  40. ISO/IEC 27002
  41. Clickjacking
  42. Cyber security standards
  43. Kill switch
  44. Common Criteria
  45. Mail and wire fraud
  46. United States Cyber Command
  47. Packet analyzer
  48. Common Vulnerabilities and Exposures
  49. Security token
  50. Jonathan James
  51. Self-signed certificate
  52. Chinese wall
  53. Fork bomb
  54. Data breach
  55. Data loss prevention software
  56. Stateful firewall
  57. Comparison of firewalls
  58. OWASP
  59. Paywall
  60. Certificate signing request
  61. IEEE 802.11i-2004
  62. List of warez groups
  63. Network Access Control
  64. Port scanner
  65. Key derivation function
  66. FireEye
  67. Root certificate
  68. Zip bomb
  69. SYN flood
  70. Tokenization
  71. NT LAN Manager
  72. Jeremy Hammond
  73. Fortinet
  74. Security-focused operating system
  75. Comodo Group
  76. Stack buffer overflow
  77. DNS spoofing
  78. Cracking of wireless networks
  79. Authenticated encryption
  80. Curve25519
  81. Malwarebytes
  82. Ixquick
  83. HMAC-based One-time Password Algorithm
  84. Bruce Schneier
  85. Ankit Fadia
  86. ISO/IEC 27001:2005
  87. Service set
  88. Brain
  89. ISACA
  90. Tiger team
  91. Chief information security officer
  92. Browser hijacking
  93. MAC spoofing
  94. Hardening
  95. Device fingerprint
  96. Koobface
  97. Application security
  98. Mandatory access control
  99. Cult of the Dead Cow
  100. Datagram Transport Layer Security
  101. Drive-by download
  102. STRIDE
  103. Symantec Endpoint Protection
  104. OpenCandy
  105. Paul Kocher
  106. Capability-based security
  107. Dual EC DRBG
  108. Pharming
  109. ArcSight
  110. Scareware
  111. Linux malware
  112. Security controls
  113. Sony BMG copy protection rootkit scandal
  114. The Cuckoo's Egg
  115. Security management
  116. Passwd
  117. Mutual authentication
  118. Open mail relay
  119. Salsa20
  120. Trusted Computing
  121. AACS encryption key controversy
  122. Badbunny
  123. Buffer overflow protection
  124. Cold boot attack
  125. Forcepoint
  126. Man-in-the-browser
  127. Computer emergency response team
  128. Adversary
  129. Offensive Security Certified Professional
  130. WS-Security
  131. Off-by-one error
  132. International Safe Harbor Privacy Principles
  133. Session fixation
  134. List of computer criminals
  135. CyberArk
  136. Mobile device forensics
  137. Vyatta
  138. System Management Mode
  139. Hacker ethic
  140. Information assurance
  141. Dan Kaminsky
  142. Cyber-security regulation
  143. Application firewall
  144. 2600: The Hacker Quarterly
  145. Slowloris
  146. SANS Institute
  147. Arbitrary code execution
  148. Blaster
  149. Host-based intrusion detection system
  150. Acceptable use policy
  151. Authentication protocol
  152. PKCS 1
  153. Information technology controls
  154. Heuristic analysis
  155. Black hole
  156. Windows Firewall
  157. Windows Search
  158. Security testing
  159. Zooko's triangle
  160. Cisco PIX
  161. Barracuda Networks
  162. Responsible disclosure
  163. Communications security
  164. Coverity
  165. Seccomp
  166. VLAN hopping
  167. Gutmann method
  168. Kernel Patch Protection
  169. Hacking tool
  170. Challenge-Handshake Authentication Protocol
  171. McAfee SiteAdvisor
  172. Integrated Windows Authentication
  173. Dynamic linker
  174. 2007 cyberattacks on Estonia
  175. IT risk
  176. Proofpoint
  177. Astalavista.box.sk
  178. Blacklist
  179. Chief data officer
  180. Chain of trust
  181. Brian Krebs
  182. Malicious Software Removal Tool
  183. Evil twin
  184. Fast flux
  185. Electronic lock
  186. File inclusion vulnerability
  187. Polymorphic code
  188. Key server
  189. Anna Kournikova
  190. Federal Information Security Management Act of 2002
  191. Rogue access point
  192. War dialing
  193. Software token
  194. Cryptosystem
  195. FIPS 140
  196. Local shared object
  197. Steve Gibson
  198. Titan Rain
  199. Access Control Matrix
  200. Confused deputy problem
  201. Return-to-libc attack
  202. Mydoom
  203. Black Hat Briefings
  204. Website defacement
  205. Voice phishing
  206. Bounds checking
  207. Heap spraying
  208. Port knocking
  209. DREAD
  210. Blum Blum Shub
  211. Macro virus
  212. Attack surface
  213. Whiz Kids
  214. Chief security officer
  215. Cyberwarfare by Russia
  216. The Open Group
  217. SQL Slammer
  218. Managed security service
  219. Directory traversal attack
  220. Ad-Aware
  221. Executable space protection
  222. GhostNet
  223. Opportunistic TLS
  224. EC-Council
  225. Bluesnarfing
  226. Microsoft CryptoAPI
  227. Christmas tree packet
  228. Comodo Internet Security
  229. Heap overflow
  230. Vulnerability management
  231. MafiaBoy
  232. Markus Hess
  233. Legion of Doom
  234. Hacking: The Art of Exploitation
  235. Little Snitch
  236. Banner grabbing
  237. PaX
  238. Ingress filtering
  239. Poly1305
  240. Mebroot
  241. Data Execution Prevention
  242. HitmanPro
  243. WinDbg
  244. Wireless intrusion prevention system
  245. GNOME Keyring
  246. Peiter Zatko
  247. Vsftpd
  248. SafeNet
  249. NSAKEY
  250. Tsutomu Shimomura
  251. Microsoft Baseline Security Analyzer
  252. Security Content Automation Protocol
  253. Camellia
  254. Hackers: Heroes of the Computer Revolution
  255. Internet Gateway Device Protocol
  256. Joanna Rutkowska
  257. AutoRun
  258. Nftables
  259. TCP Wrapper
  260. TCP/IP stack fingerprinting
  261. Nimda
  262. Microsoft Forefront
  263. HTTP header injection
  264. Dave Kleiman
  265. Ophcrack
  266. Skype security
  267. ITIL security management
  268. SUPERAntiSpyware
  269. Computer security model
  270. CERT Coordination Center
  271. Elk Cloner
  272. Biba Model
  273. Dan Boneh
  274. Self-destruct
  275. Network forensics
  276. Trusted computing base
  277. Global Information Assurance Certification
  278. Full disclosure
  279. ShadowCrew
  280. L0phtCrack
  281. Multilevel security
  282. InfraGard
  283. Out-of-band
  284. StarForce
  285. IronPort
  286. Secure coding
  287. Electronic Privacy Information Center
  288. Website spoofing
  289. Memory corruption
  290. List of Unix daemons
  291. Montgomery modular multiplication
  292. Trusted Computing Group
  293. Windows Security Log
  294. Blue Pill
  295. Layered security
  296. Phrack
  297. Loyd Blankenship
  298. WinNuke
  299. Yarrow algorithm
  300. MAC flooding
  301. Anomaly-based intrusion detection system
  302. Anti-phishing software
  303. WANK
  304. WS-Federation
  305. Bro
  306. Rkhunter
  307. Security and Maintenance
  308. Privilege
  309. Web threat
  310. Norton 360
  311. L0pht
  312. National Vulnerability Database
  313. Filesystem-level encryption
  314. GlobalSign
  315. Memory safety
  316. Rubberhose
  317. Winlogon
  318. Gpg4win
  319. Cryptome
  320. Hacker group
  321. Netcraft
  322. Fortuna
  323. Cryptographic key types
  324. FreeOTFE
  325. Check Point VPN-1
  326. Center for Democracy and Technology
  327. Unix security
  328. Hackers on Planet Earth
  329. Linux-VServer
  330. Computer security incident management
  331. Red/black concept
  332. Cryptographic Service Provider
  333. Department of Defense Information Assurance Certification and Accreditation Process
  334. Chief privacy officer
  335. Karl Koch
  336. Qualified Security Assessor
  337. TCP half-open
  338. Peg DHCP
  339. Security breach notification laws
  340. SSL acceleration
  341. Wau Holland
  342. Rainbow Series
  343. AhnLab
  344. 40-bit encryption
  345. Crack
  346. CryptGenRandom
  347. Attack tree
  348. Aladdin Knowledge Systems
  349. BS 7799
  350. Gordon Lyon
  351. Vundo
  352. Multipartite virus
  353. SMS phishing
  354. Edward Felten
  355. Great Hacker War
  356. The 414s
  357. Ross J. Anderson
  358. Switzerland
  359. TLS-PSK
  360. AOHell
  361. Lattice-based access control
  362. Zone-H
  363. Operation Sundevil
  364. CoolWebSearch
  365. FTP bounce attack
  366. Mandatory Integrity Control
  367. Data Protection API
  368. Host protected area
  369. Uncomplicated Firewall
  370. SSLeay
  371. Object-capability model
  372. Computer security policy
  373. Vector
  374. Power virus
  375. Stacheldraht
  376. Milestone Systems
  377. UIN
  378. Idle scan
  379. Uncontrolled format string
  380. Metamorphic code
  381. National Cyber Security Division
  382. CAPICOM
  383. Shred
  384. Computer Online Forensic Evidence Extractor
  385. Software assurance
  386. Reverse connection
  387. SSH Communications Security
  388. Null route
  389. Ben Laurie
  390. AIDS
  391. Multiplexed Transport Layer Security
  392. Employee monitoring software
  393. Computer security conference
  394. Bluebugging
  395. Matt Blaze
  396. Trust anchor
  397. Information Technology Security Assessment
  398. PGPDisk
  399. Four Horsemen of the Infocalypse
  400. Norton Safe Web
  401. Sherwood Applied Business Security Architecture
  402. RainbowCrack
  403. Tor-ramdisk
  404. Dancing pigs
  405. BigFix Inc
  406. Charlie Miller
  407. AS4
  408. NESSIE
  409. DNSCurve
  410. User Interface Privilege Isolation
  411. Len Sassaman
  412. Dan Geer
  413. Chkrootkit
  414. Antisec Movement
  415. Password management
  416. IBM Internet Security Systems
  417. System Center Data Protection Manager
  418. Database audit
  419. Code Access Security
  420. AIDS
  421. Crash reporter
  422. Finjan
  423. Johnny Long
  424. KWallet
  425. Committee on National Security Systems
  426. SOAtest
  427. Intego
  428. Exec Shield
  429. Software security assurance
  430. Lynis
  431. Moonlight Maze
  432. Social engineering
  433. CA/Browser Forum
  434. Authbind
  435. Zango
  436. Authentication server
  437. Privilege separation
  438. SCA
  439. Mathew Bevan
  440. Obfuscated TCP
  441. ITSEC
  442. Secure attention key
  443. Alphanumeric shellcode
  444. Stefan Savage
  445. Gene Spafford
  446. Google Hacks
  447. Messenger Plus!
  448. Shadowserver
  449. Dark Avenger
  450. Brontok
  451. Kerio Technologies
  452. Robert Morris
  453. Windows Live OneCare
  454. Einstein
  455. SAINT
  456. Markus Kuhn
  457. Peter Gutmann
  458. OpenBSD security features
  459. NetScreen Technologies
  460. Md5deep
  461. Shatter attack
  462. Brewer and Nash model
  463. McColo
  464. Hacktivismo
  465. Firewall pinhole
  466. Happy99
  467. Stratus VOS
  468. NetOps
  469. Pre-boot authentication
  470. BBS: The Documentary
  471. National Cybersecurity Center
  472. Dennis Moran
  473. Balabit
  474. Imprivata
  475. Nobody
  476. Ping-Pong virus
  477. Honker Union
  478. Form grabbing
  479. Non-interference
  480. Intruder detection
  481. Lightweight Extensible Authentication Protocol
  482. Cryptoloop
  483. Separation of protection and security
  484. Meredith L. Patterson
  485. Christopher Soghoian
  486. Runas
  487. Certified Information Security Manager
  488. Secure Computing Corporation
  489. Cascade
  490. Protected computer
  491. OpenCA
  492. Air Force Cyber Command
  493. Bagle
  494. Solar Designer
  495. Quarantine
  496. ShmooCon
  497. Dead Peer Detection
  498. Database forensics
  499. David A. Wagner
  500. Honeynet Project
  501. Riskware
  502. Wireless Transport Layer Security
  503. Privacy-invasive software
  504. Ryan Lackey
  505. Bugtraq
  506. 0x80
  507. Graphical identification and authentication
  508. Take-grant protection model
  509. Chris Wysopal
  510. Jtest
  511. Graham-Denning model
  512. Susan Landau
  513. Operation D-Elite
  514. Cyber force
  515. Dorothy E. Denning
  516. Beast
  517. Null session
  518. Security modes
  519. Jeanson James Ancheta
  520. Shawn Carpenter
  521. Defacement
  522. Peter G. Neumann
  523. Polyinstantiation
  524. Virus Bulletin
  525. Network telescope
  526. Systrace
  527. Internet Authentication Service
  528. HDDerase
  529. File binder
  530. Open security
  531. Zardoz
  532. Syndie
  533. Sean Hastings
  534. Dr Solomon's Antivirus
  535. Authentication and Key Agreement
  536. Movieland
  537. Server-Gated Cryptography
  538. Erik Bloodaxe
  539. What the Hack
  540. Nahshon Even-Chaim
  541. Electron
  542. One-time authorization code
  543. Browser exploit
  544. Elias Levy
  545. Vern Paxson
  546. XSS worm
  547. WinFixer
  548. Chris Klaus
  549. Goodtimes virus
  550. Samhain
  551. Wietse Venema
  552. Window Snyder
  553. EICAR
  554. Munged password
  555. Protection mechanism
  556. Ilfak Guilfanov
  557. Kraken botnet
  558. RootkitRevealer
  559. Martin Roesch
  560. Sir Dystic
  561. David Litchfield
  562. Gateway Anti-Virus
  563. Vba32 AntiVirus
  564. Marcus J. Ranum
  565. Firestarter
  566. Grandmaster Ratte'
  567. 1260
  568. Defensive computing
  569. Heap feng shui
  570. MPack
  571. MirOS BSD
  572. Anti-worm
  573. Trinoo
  574. Christien Rioux
  575. Organisation-based access control
  576. Backdoor.Win32.IRCBot
  577. Hackers Wanted
  578. Dave Aitel
  579. Zlob trojan
  580. Massachusetts Bay Transportation Authority v. Anderson
  581. Transaction verification
  582. Father Christmas
  583. ShieldsUp
  584. Dan Farmer
  585. Hacktivismo Enhanced-Source Software License Agreement
  586. Byte Bandit
  587. Paradox
  588. Gumblar
  589. Agobot
  590. Claria Corporation
  591. Melissa Hathaway
  592. Computer Security Institute
  593. Devnull
  594. JBoss SSO
  595. Cameron Lacroix
  596. Anti-Phishing Working Group
  597. L. Jean Camp
  598. Rop Gonggrijp
  599. David Brumley
  600. Mixter
  601. Ambient authority
  602. Stakkato
  603. Wendy M. Grossman
  604. Robert Schifreen
  605. Form
  606. NetIQ Access Manager
  607. Economics of security
  608. Raphael Gray
  609. Mega-D botnet
  610. Attack patterns
  611. Login spoofing
  612. National Information Assurance Glossary
  613. MacMag
  614. Information Networking Institute
  615. Michael Schroeder
  616. Sircam
  617. Greynet
  618. Cyber Storm Exercise
  619. OneHalf
  620. Petname
  621. Tribe Flood Network
  622. Jon Callas
  623. Yasca
  624. RFPolicy
  625. NBName
  626. Oligomorphic code
  627. Computer trespass
  628. Spy Sweeper
  629. ExploreZip
  630. Month of bugs
  631. Nikita Borisov
  632. Mary Ann Davidson
  633. CDP Spoofing
  634. Natas
  635. Misuse detection
  636. Hack-Tic
  637. AOL Active Virus Shield
  638. In-session phishing
  639. Kiwicon
  640. HoneyMonkey
  641. Chad Davis
  642. ToneLoc
  643. ISO/IEC 27005
  644. MacSweeper
  645. CA Anti-Spyware
  646. Neurosecurity
  647. Life is beautiful virus hoax
  648. Website reputation ratings
  649. C-list
  650. Akbot
  651. IT Baseline Protection Catalogs
  652. VirusBuster
  653. Norton AntiBot
  654. Virtual security switch
  655. Bliss
  656. Craig Neidorf
  657. Application protocol-based intrusion detection system
  658. Parry Aftab
  659. Mark Ludwig
  660. Type enforcement
  661. Johan Helsingius
  662. Staog
  663. Kerio Control
  664. Pete Herzog
  665. Online Armor Personal Firewall
  666. Secure environment
  667. Cydoor
  668. Warhol worm
  669. Bluesniping
  670. Federal Desktop Core Configuration
  671. Tuxissa
  672. EAuthentication
  673. Justin Tanner Petersen
  674. Bot herder
  675. Blackworm
  676. Marc Maiffret
  677. PERMIS
  678. AntiVirus Gold
  679. Tom Van Vleck
  680. Kenneth P. Weiss
  681. GlobalHell
  682. Comet Cursor
  683. Hacking at Random
  684. Australian High Tech Crime Centre
  685. New.net
  686. Lorcon
  687. Concept virus
  688. UXu
  689. MacScan
  690. Protocol-based intrusion detection system
  691. MoBlock
  692. Douglas Thomas
  693. Improper input validation
  694. Factotum
  695. Netwar
  696. Alexander Sotirov
  697. Festering Hate
  698. Bit nibbler
  699. Monoculture
  700. Sarah Gordon
  701. Gary McGraw
  702. Norton Insight
  703. SULFNBK.EXE
  704. Blacker
  705. Avi Rubin
  706. HoHoCon
  707. Blended threat
  708. Harri Hursti
  709. FSA Corporation
  710. Stration
  711. CoSign single sign on
  712. Child Exploitation Tracking System
  713. ToorCon
  714. Datenschleuder
  715. Leap
  716. Summercon
  717. Whale
  718. Kak worm
  719. Norton Personal Firewall
  720. Leonard Rose
  721. Graybird
  722. Killbit
  723. X.1035
  724. Shankar's Virus
  725. CryptoRights Foundation
  726. Sadmind
  727. SevenDust
  728. Ghostball
  729. Zorp firewall
  730. Ewido Networks
  731. Twinge attack
  732. COPS
  733. Event data
  734. DShield
  735. AEGIS SecureConnect
  736. Software forensics
  737. Paul van Oorschot
  738. Derek Atkins
  739. ESafe
  740. Site Security Handbook
  741. Certified Computer Examiner
  742. Fake AP
  743. Hacker Halted
  744. Carolyn Meinel
  745. Abraxas
  746. ContraVirus
  747. Acid
  748. /dev/random
  749. Jennifer Seberry
  750. Daniel B. Cid
  751. Bradley Willman
  752. Roger R. Schell
  753. Web Single Sign-On Metadata Exchange Protocol
  754. StankDawg
  755. Rafail Ostrovsky
  756. Burt Kaliski
  757. Ada
  758. Peter H. Gregory
  759. GIANT AntiSpyware
  760. Brian LaMacchia
  761. 1984 Network Liberty Alliance
  762. William Genovese
  763. Web Single Sign-On Interoperability Profile
  764. TriGeo Network Security
  765. Differentiated security
  766. Anti-pharming
  767. ABC
  768. Alabama
  769. Yersinia
  770. Jim Christy
  771. Direct Revenue
  772. Johannes Ullrich
  773. CipherTrust
  774. Carlisle Adams
  775. Demon Roach Underground
  776. Peter Garza
  777. Farid Essebar
  778. Michael Howard
  779. Collaboration-oriented architecture
  780. Cyber Storm II
  781. Mylife
  782. Graugon AntiVirus
  783. Wicked Rose
  784. KYPS
  785. Sysjail
  786. Web Services Security Kerberos Binding
  787. Ambulance
  788. Michael Schearer
  789. Scores
  790. CounterSpy
  791. Automated information systems security
  792. 4K
  793. Warzapping
  794. AI
  795. CWShredder
  796. BotHunter
  797. Adam Botbyl
  798. Rogue system
  799. Antichrist
  800. Bomber
  801. Robert Slade
  802. Class
  803. Multi categories security
  804. Christopher Boyd
  805. Kaisa Nyberg
  806. Security Protocols Open Repository
  807. Acme
  808. Neil Daswani
  809. Cookiemonster attack
  810. Authenticated Identity Body
  811. Digital DawgPound
  812. Privilege bracketing
  813. Stealware
  814. Jeffrey Hunker
  815. Zmist
  816. Badtrans
  817. Micro Bill Systems
  818. 3wPlayer
  819. Virgil D. Gligor
  820. RF monitor software
  821. Agent.AWF
  822. Hybris
  823. Institute for Information Infrastructure Protection
  824. Evgeniy Gabrilovich
  825. Computer Underground Digest
  826. KoKo
  827. Archiveus
  828. Mimail
  829. International Journal of Private Law
  830. Robert C. Seacord
  831. Rebecca Mercuri
  832. Hare
  833. Commwarrior-A
  834. National Information Assurance Certification and Accreditation Process
  835. Hackers at Large
  836. Gokar
  837. Smeg Virus Construction Kit
  838. Angela Orebaugh
  839. PhreakNIC
  840. Alcon
  841. CESG Claims Tested Mark
  842. Actifed
  843. Anton Chuvakin
  844. Tom Cross
  845. Cyber Security Task Force
  846. Damballa
  847. NVIR
  848. Spy-phishing
  849. Bargain Buddy
  850. HuntBar
  851. W32.Gammima.AG
  852. W32/Storm.worm
  853. AntiCMOS
  854. Microcosm Ltd
  855. Mirar Toolbar
  856. Loren Kohnfelder
  857. Conference on Email and Anti-Spam
  858. Tom Berson
  859. Gray Areas
  860. Doomjuice
  861. Swizzor
  862. Q-CERT
  863. Spy Wiper
  864. Nicolas Jacobsen
  865. Navidad virus
  866. ARCV-n
  867. AntiVermins
  868. WARP
  869. Virus Information Alliance
  870. Bohmini.A
  871. Lawrie Brown
  872. LAIM Working Group
  873. EGABTR
  874. Centurion guard
  875. Offer Assistant
  876. Alec Yasinsac
  877. SpySubtract
  878. Flip button
  879. W32.Myzor.FK@yf
  880. INIT 1984
  881. Alcra
  882. Ne0h
  883. Mumu
  884. MDEF
  885. 5lo
  886. Voyager
  887. Toxbot
  888. Lance Hoffman
  889. Sygate Technologies
  890. EFF-Austin
  891. Virtual Bouncer
  892. Syhunt
  893. Consumer alert system
  894. SpywareQuake
  895. Yamanner
  896. Remote Access Quarantine Client
  897. AGI-Plan
  898. Cisco Global Exploiter
  899. Ultimate Fixer
  900. Twelve Tricks
  901. Spyvampire
  902. Malware Bell
  903. Bolgimo
  904. Richard Forno
  905. CSIv2
  906. Sony malware
  907. Hack trapper
  908. Kinsmod
  909. Emcodec
  910. ClipGenie
  911. WANSecure Firewall
  912. Mixed threat attack
  913. IT Underground
  914. DoSnet
  915. MP3Concept
  916. Object-code Buffer Overrun Evaluator
  917. Optix Pro
  918. Privacy piracy
  919. Central Point Anti-Virus
  920. Kaspersky Anti-Hacker
  921. Jake Kouns