أرابيكا:مبادرة العطاء الرقمي/المقالات المقترحة/حماية الحاسوب
Computer Security
- Access token
- List of TCP and UDP port numbers
- Swatting
- SOCKS
- SHA-2
- SHA-1
- Torpig
- Wi-Fi Protected Access
- Rainbow table
- Payment Card Industry Data Security Standard
- Certified Information Systems Security Professional
- Intel Active Management Technology
- Gary McKinnon
- Chief information officer
- Keychain
- IEEE 802.1X
- Air gap
- Protection ring
- Hardware security module
- Certified Ethical Hacker
- FIPS 140-2
- Address space layout randomization
- Extensible Authentication Protocol
- BonziBuddy
- Juniper Networks
- Role-based access control
- Gemalto
- Sneakers
- Chaos Communication Congress
- Whitelist
- Webroot
- Trend Micro
- Segmentation fault
- Return-oriented programming
- Identity management
- Patch Tuesday
- Iptables
- Digest access authentication
- Extended Validation Certificate
- ISO/IEC 27002
- Clickjacking
- Cyber security standards
- Kill switch
- Common Criteria
- Mail and wire fraud
- United States Cyber Command
- Packet analyzer
- Common Vulnerabilities and Exposures
- Security token
- Jonathan James
- Self-signed certificate
- Chinese wall
- Fork bomb
- Data breach
- Data loss prevention software
- Stateful firewall
- Comparison of firewalls
- OWASP
- Paywall
- Certificate signing request
- IEEE 802.11i-2004
- List of warez groups
- Network Access Control
- Port scanner
- Key derivation function
- FireEye
- Root certificate
- Zip bomb
- SYN flood
- Tokenization
- NT LAN Manager
- Jeremy Hammond
- Fortinet
- Security-focused operating system
- Comodo Group
- Stack buffer overflow
- DNS spoofing
- Cracking of wireless networks
- Authenticated encryption
- Curve25519
- Malwarebytes
- Ixquick
- HMAC-based One-time Password Algorithm
- Bruce Schneier
- Ankit Fadia
- ISO/IEC 27001:2005
- Service set
- Brain
- ISACA
- Tiger team
- Chief information security officer
- Browser hijacking
- MAC spoofing
- Hardening
- Device fingerprint
- Koobface
- Application security
- Mandatory access control
- Cult of the Dead Cow
- Datagram Transport Layer Security
- Drive-by download
- STRIDE
- Symantec Endpoint Protection
- OpenCandy
- Paul Kocher
- Capability-based security
- Dual EC DRBG
- Pharming
- ArcSight
- Scareware
- Linux malware
- Security controls
- Sony BMG copy protection rootkit scandal
- The Cuckoo's Egg
- Security management
- Passwd
- Mutual authentication
- Open mail relay
- Salsa20
- Trusted Computing
- AACS encryption key controversy
- Badbunny
- Buffer overflow protection
- Cold boot attack
- Forcepoint
- Man-in-the-browser
- Computer emergency response team
- Adversary
- Offensive Security Certified Professional
- WS-Security
- Off-by-one error
- International Safe Harbor Privacy Principles
- Session fixation
- List of computer criminals
- CyberArk
- Mobile device forensics
- Vyatta
- System Management Mode
- Hacker ethic
- Information assurance
- Dan Kaminsky
- Cyber-security regulation
- Application firewall
- 2600: The Hacker Quarterly
- Slowloris
- SANS Institute
- Arbitrary code execution
- Blaster
- Host-based intrusion detection system
- Acceptable use policy
- Authentication protocol
- PKCS 1
- Information technology controls
- Heuristic analysis
- Black hole
- Windows Firewall
- Windows Search
- Security testing
- Zooko's triangle
- Cisco PIX
- Barracuda Networks
- Responsible disclosure
- Communications security
- Coverity
- Seccomp
- VLAN hopping
- Gutmann method
- Kernel Patch Protection
- Hacking tool
- Challenge-Handshake Authentication Protocol
- McAfee SiteAdvisor
- Integrated Windows Authentication
- Dynamic linker
- 2007 cyberattacks on Estonia
- IT risk
- Proofpoint
- Astalavista.box.sk
- Blacklist
- Chief data officer
- Chain of trust
- Brian Krebs
- Malicious Software Removal Tool
- Evil twin
- Fast flux
- Electronic lock
- File inclusion vulnerability
- Polymorphic code
- Key server
- Anna Kournikova
- Federal Information Security Management Act of 2002
- Rogue access point
- War dialing
- Software token
- Cryptosystem
- FIPS 140
- Local shared object
- Steve Gibson
- Titan Rain
- Access Control Matrix
- Confused deputy problem
- Return-to-libc attack
- Mydoom
- Black Hat Briefings
- Website defacement
- Voice phishing
- Bounds checking
- Heap spraying
- Port knocking
- DREAD
- Blum Blum Shub
- Macro virus
- Attack surface
- Whiz Kids
- Chief security officer
- Cyberwarfare by Russia
- The Open Group
- SQL Slammer
- Managed security service
- Directory traversal attack
- Ad-Aware
- Executable space protection
- GhostNet
- Opportunistic TLS
- EC-Council
- Bluesnarfing
- Microsoft CryptoAPI
- Christmas tree packet
- Comodo Internet Security
- Heap overflow
- Vulnerability management
- MafiaBoy
- Markus Hess
- Legion of Doom
- Hacking: The Art of Exploitation
- Little Snitch
- Banner grabbing
- PaX
- Ingress filtering
- Poly1305
- Mebroot
- Data Execution Prevention
- HitmanPro
- WinDbg
- Wireless intrusion prevention system
- GNOME Keyring
- Peiter Zatko
- Vsftpd
- SafeNet
- NSAKEY
- Tsutomu Shimomura
- Microsoft Baseline Security Analyzer
- Security Content Automation Protocol
- Camellia
- Hackers: Heroes of the Computer Revolution
- Internet Gateway Device Protocol
- Joanna Rutkowska
- AutoRun
- Nftables
- TCP Wrapper
- TCP/IP stack fingerprinting
- Nimda
- Microsoft Forefront
- HTTP header injection
- Dave Kleiman
- Ophcrack
- Skype security
- ITIL security management
- SUPERAntiSpyware
- Computer security model
- CERT Coordination Center
- Elk Cloner
- Biba Model
- Dan Boneh
- Self-destruct
- Network forensics
- Trusted computing base
- Global Information Assurance Certification
- Full disclosure
- ShadowCrew
- L0phtCrack
- Multilevel security
- InfraGard
- Out-of-band
- StarForce
- IronPort
- Secure coding
- Electronic Privacy Information Center
- Website spoofing
- Memory corruption
- List of Unix daemons
- Montgomery modular multiplication
- Trusted Computing Group
- Windows Security Log
- Blue Pill
- Layered security
- Phrack
- Loyd Blankenship
- WinNuke
- Yarrow algorithm
- MAC flooding
- Anomaly-based intrusion detection system
- Anti-phishing software
- WANK
- WS-Federation
- Bro
- Rkhunter
- Security and Maintenance
- Privilege
- Web threat
- Norton 360
- L0pht
- National Vulnerability Database
- Filesystem-level encryption
- GlobalSign
- Memory safety
- Rubberhose
- Winlogon
- Gpg4win
- Cryptome
- Hacker group
- Netcraft
- Fortuna
- Cryptographic key types
- FreeOTFE
- Check Point VPN-1
- Center for Democracy and Technology
- Unix security
- Hackers on Planet Earth
- Linux-VServer
- Computer security incident management
- Red/black concept
- Cryptographic Service Provider
- Department of Defense Information Assurance Certification and Accreditation Process
- Chief privacy officer
- Karl Koch
- Qualified Security Assessor
- TCP half-open
- Peg DHCP
- Security breach notification laws
- SSL acceleration
- Wau Holland
- Rainbow Series
- AhnLab
- 40-bit encryption
- Crack
- CryptGenRandom
- Attack tree
- Aladdin Knowledge Systems
- BS 7799
- Gordon Lyon
- Vundo
- Multipartite virus
- SMS phishing
- Edward Felten
- Great Hacker War
- The 414s
- Ross J. Anderson
- Switzerland
- TLS-PSK
- AOHell
- Lattice-based access control
- Zone-H
- Operation Sundevil
- CoolWebSearch
- FTP bounce attack
- Mandatory Integrity Control
- Data Protection API
- Host protected area
- Uncomplicated Firewall
- SSLeay
- Object-capability model
- Computer security policy
- Vector
- Power virus
- Stacheldraht
- Milestone Systems
- UIN
- Idle scan
- Uncontrolled format string
- Metamorphic code
- National Cyber Security Division
- CAPICOM
- Shred
- Computer Online Forensic Evidence Extractor
- Software assurance
- Reverse connection
- SSH Communications Security
- Null route
- Ben Laurie
- AIDS
- Multiplexed Transport Layer Security
- Employee monitoring software
- Computer security conference
- Bluebugging
- Matt Blaze
- Trust anchor
- Information Technology Security Assessment
- PGPDisk
- Four Horsemen of the Infocalypse
- Norton Safe Web
- Sherwood Applied Business Security Architecture
- RainbowCrack
- Tor-ramdisk
- Dancing pigs
- BigFix Inc
- Charlie Miller
- AS4
- NESSIE
- DNSCurve
- User Interface Privilege Isolation
- Len Sassaman
- Dan Geer
- Chkrootkit
- Antisec Movement
- Password management
- IBM Internet Security Systems
- System Center Data Protection Manager
- Database audit
- Code Access Security
- AIDS
- Crash reporter
- Finjan
- Johnny Long
- KWallet
- Committee on National Security Systems
- SOAtest
- Intego
- Exec Shield
- Software security assurance
- Lynis
- Moonlight Maze
- Social engineering
- CA/Browser Forum
- Authbind
- Zango
- Authentication server
- Privilege separation
- SCA
- Mathew Bevan
- Obfuscated TCP
- ITSEC
- Secure attention key
- Alphanumeric shellcode
- Stefan Savage
- Gene Spafford
- Google Hacks
- Messenger Plus!
- Shadowserver
- Dark Avenger
- Brontok
- Kerio Technologies
- Robert Morris
- Windows Live OneCare
- Einstein
- SAINT
- Markus Kuhn
- Peter Gutmann
- OpenBSD security features
- NetScreen Technologies
- Md5deep
- Shatter attack
- Brewer and Nash model
- McColo
- Hacktivismo
- Firewall pinhole
- Happy99
- Stratus VOS
- NetOps
- Pre-boot authentication
- BBS: The Documentary
- National Cybersecurity Center
- Dennis Moran
- Balabit
- Imprivata
- Nobody
- Ping-Pong virus
- Honker Union
- Form grabbing
- Non-interference
- Intruder detection
- Lightweight Extensible Authentication Protocol
- Cryptoloop
- Separation of protection and security
- Meredith L. Patterson
- Christopher Soghoian
- Runas
- Certified Information Security Manager
- Secure Computing Corporation
- Cascade
- Protected computer
- OpenCA
- Air Force Cyber Command
- Bagle
- Solar Designer
- Quarantine
- ShmooCon
- Dead Peer Detection
- Database forensics
- David A. Wagner
- Honeynet Project
- Riskware
- Wireless Transport Layer Security
- Privacy-invasive software
- Ryan Lackey
- Bugtraq
- 0x80
- Graphical identification and authentication
- Take-grant protection model
- Chris Wysopal
- Jtest
- Graham-Denning model
- Susan Landau
- Operation D-Elite
- Cyber force
- Dorothy E. Denning
- Beast
- Null session
- Security modes
- Jeanson James Ancheta
- Shawn Carpenter
- Defacement
- Peter G. Neumann
- Polyinstantiation
- Virus Bulletin
- Network telescope
- Systrace
- Internet Authentication Service
- HDDerase
- File binder
- Open security
- Zardoz
- Syndie
- Sean Hastings
- Dr Solomon's Antivirus
- Authentication and Key Agreement
- Movieland
- Server-Gated Cryptography
- Erik Bloodaxe
- What the Hack
- Nahshon Even-Chaim
- Electron
- One-time authorization code
- Browser exploit
- Elias Levy
- Vern Paxson
- XSS worm
- WinFixer
- Chris Klaus
- Goodtimes virus
- Samhain
- Wietse Venema
- Window Snyder
- EICAR
- Munged password
- Protection mechanism
- Ilfak Guilfanov
- Kraken botnet
- RootkitRevealer
- Martin Roesch
- Sir Dystic
- David Litchfield
- Gateway Anti-Virus
- Vba32 AntiVirus
- Marcus J. Ranum
- Firestarter
- Grandmaster Ratte'
- 1260
- Defensive computing
- Heap feng shui
- MPack
- MirOS BSD
- Anti-worm
- Trinoo
- Christien Rioux
- Organisation-based access control
- Backdoor.Win32.IRCBot
- Hackers Wanted
- Dave Aitel
- Zlob trojan
- Massachusetts Bay Transportation Authority v. Anderson
- Transaction verification
- Father Christmas
- ShieldsUp
- Dan Farmer
- Hacktivismo Enhanced-Source Software License Agreement
- Byte Bandit
- Paradox
- Gumblar
- Agobot
- Claria Corporation
- Melissa Hathaway
- Computer Security Institute
- Devnull
- JBoss SSO
- Cameron Lacroix
- Anti-Phishing Working Group
- L. Jean Camp
- Rop Gonggrijp
- David Brumley
- Mixter
- Ambient authority
- Stakkato
- Wendy M. Grossman
- Robert Schifreen
- Form
- NetIQ Access Manager
- Economics of security
- Raphael Gray
- Mega-D botnet
- Attack patterns
- Login spoofing
- National Information Assurance Glossary
- MacMag
- Information Networking Institute
- Michael Schroeder
- Sircam
- Greynet
- Cyber Storm Exercise
- OneHalf
- Petname
- Tribe Flood Network
- Jon Callas
- Yasca
- RFPolicy
- NBName
- Oligomorphic code
- Computer trespass
- Spy Sweeper
- ExploreZip
- Month of bugs
- Nikita Borisov
- Mary Ann Davidson
- CDP Spoofing
- Natas
- Misuse detection
- Hack-Tic
- AOL Active Virus Shield
- In-session phishing
- Kiwicon
- HoneyMonkey
- Chad Davis
- ToneLoc
- ISO/IEC 27005
- MacSweeper
- CA Anti-Spyware
- Neurosecurity
- Life is beautiful virus hoax
- Website reputation ratings
- C-list
- Akbot
- IT Baseline Protection Catalogs
- VirusBuster
- Norton AntiBot
- Virtual security switch
- Bliss
- Craig Neidorf
- Application protocol-based intrusion detection system
- Parry Aftab
- Mark Ludwig
- Type enforcement
- Johan Helsingius
- Staog
- Kerio Control
- Pete Herzog
- Online Armor Personal Firewall
- Secure environment
- Cydoor
- Warhol worm
- Bluesniping
- Federal Desktop Core Configuration
- Tuxissa
- EAuthentication
- Justin Tanner Petersen
- Bot herder
- Blackworm
- Marc Maiffret
- PERMIS
- AntiVirus Gold
- Tom Van Vleck
- Kenneth P. Weiss
- GlobalHell
- Comet Cursor
- Hacking at Random
- Australian High Tech Crime Centre
- New.net
- Lorcon
- Concept virus
- UXu
- MacScan
- Protocol-based intrusion detection system
- MoBlock
- Douglas Thomas
- Improper input validation
- Factotum
- Netwar
- Alexander Sotirov
- Festering Hate
- Bit nibbler
- Monoculture
- Sarah Gordon
- Gary McGraw
- Norton Insight
- SULFNBK.EXE
- Blacker
- Avi Rubin
- HoHoCon
- Blended threat
- Harri Hursti
- FSA Corporation
- Stration
- CoSign single sign on
- Child Exploitation Tracking System
- ToorCon
- Datenschleuder
- Leap
- Summercon
- Whale
- Kak worm
- Norton Personal Firewall
- Leonard Rose
- Graybird
- Killbit
- X.1035
- Shankar's Virus
- CryptoRights Foundation
- Sadmind
- SevenDust
- Ghostball
- Zorp firewall
- Ewido Networks
- Twinge attack
- COPS
- Event data
- DShield
- AEGIS SecureConnect
- Software forensics
- Paul van Oorschot
- Derek Atkins
- ESafe
- Site Security Handbook
- Certified Computer Examiner
- Fake AP
- Hacker Halted
- Carolyn Meinel
- Abraxas
- ContraVirus
- Acid
- /dev/random
- Jennifer Seberry
- Daniel B. Cid
- Bradley Willman
- Roger R. Schell
- Web Single Sign-On Metadata Exchange Protocol
- StankDawg
- Rafail Ostrovsky
- Burt Kaliski
- Ada
- Peter H. Gregory
- GIANT AntiSpyware
- Brian LaMacchia
- 1984 Network Liberty Alliance
- William Genovese
- Web Single Sign-On Interoperability Profile
- TriGeo Network Security
- Differentiated security
- Anti-pharming
- ABC
- Alabama
- Yersinia
- Jim Christy
- Direct Revenue
- Johannes Ullrich
- CipherTrust
- Carlisle Adams
- Demon Roach Underground
- Peter Garza
- Farid Essebar
- Michael Howard
- Collaboration-oriented architecture
- Cyber Storm II
- Mylife
- Graugon AntiVirus
- Wicked Rose
- KYPS
- Sysjail
- Web Services Security Kerberos Binding
- Ambulance
- Michael Schearer
- Scores
- CounterSpy
- Automated information systems security
- 4K
- Warzapping
- AI
- CWShredder
- BotHunter
- Adam Botbyl
- Rogue system
- Antichrist
- Bomber
- Robert Slade
- Class
- Multi categories security
- Christopher Boyd
- Kaisa Nyberg
- Security Protocols Open Repository
- Acme
- Neil Daswani
- Cookiemonster attack
- Authenticated Identity Body
- Digital DawgPound
- Privilege bracketing
- Stealware
- Jeffrey Hunker
- Zmist
- Badtrans
- Micro Bill Systems
- 3wPlayer
- Virgil D. Gligor
- RF monitor software
- Agent.AWF
- Hybris
- Institute for Information Infrastructure Protection
- Evgeniy Gabrilovich
- Computer Underground Digest
- KoKo
- Archiveus
- Mimail
- International Journal of Private Law
- Robert C. Seacord
- Rebecca Mercuri
- Hare
- Commwarrior-A
- National Information Assurance Certification and Accreditation Process
- Hackers at Large
- Gokar
- Smeg Virus Construction Kit
- Angela Orebaugh
- PhreakNIC
- Alcon
- CESG Claims Tested Mark
- Actifed
- Anton Chuvakin
- Tom Cross
- Cyber Security Task Force
- Damballa
- NVIR
- Spy-phishing
- Bargain Buddy
- HuntBar
- W32.Gammima.AG
- W32/Storm.worm
- AntiCMOS
- Microcosm Ltd
- Mirar Toolbar
- Loren Kohnfelder
- Conference on Email and Anti-Spam
- Tom Berson
- Gray Areas
- Doomjuice
- Swizzor
- Q-CERT
- Spy Wiper
- Nicolas Jacobsen
- Navidad virus
- ARCV-n
- AntiVermins
- WARP
- Virus Information Alliance
- Bohmini.A
- Lawrie Brown
- LAIM Working Group
- EGABTR
- Centurion guard
- Offer Assistant
- Alec Yasinsac
- SpySubtract
- Flip button
- W32.Myzor.FK@yf
- INIT 1984
- Alcra
- Ne0h
- Mumu
- MDEF
- 5lo
- Voyager
- Toxbot
- Lance Hoffman
- Sygate Technologies
- EFF-Austin
- Virtual Bouncer
- Syhunt
- Consumer alert system
- SpywareQuake
- Yamanner
- Remote Access Quarantine Client
- AGI-Plan
- Cisco Global Exploiter
- Ultimate Fixer
- Twelve Tricks
- Spyvampire
- Malware Bell
- Bolgimo
- Richard Forno
- CSIv2
- Sony malware
- Hack trapper
- Kinsmod
- Emcodec
- ClipGenie
- WANSecure Firewall
- Mixed threat attack
- IT Underground
- DoSnet
- MP3Concept
- Object-code Buffer Overrun Evaluator
- Optix Pro
- Privacy piracy
- Central Point Anti-Virus
- Kaspersky Anti-Hacker
- Jake Kouns