Jump to content
Wikipedia The Free Encyclopedia

Talk:Computer security software

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
This article is rated Start-class on Wikipedia's content assessment scale.
It is of interest to the following WikiProjects:
WikiProject icon Computer security : Computing High‐importance
WikiProject icon This article is within the scope of WikiProject Computer security , a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.Computer securityWikipedia:WikiProject Computer securityTemplate:WikiProject Computer securityComputer security
High This article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (assessed as High-importance).
Things you can help WikiProject Computer security with:
Article alerts are available, updated by AAlertBot. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.
WikiProject icon Software : Computing High‐importance
WikiProject icon This article is within the scope of WikiProject Software , a collaborative effort to improve the coverage of software on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.SoftwareWikipedia:WikiProject SoftwareTemplate:WikiProject Softwaresoftware
High This article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing .

Wiki Education Foundation-supported course assignment

[edit ]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 1 September 2021 and 15 December 2021. Further details are available on the course page. Student editor(s): Gabe441.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 18:15, 16 January 2022 (UTC) [reply ]

Winpatrol

[edit ]

Why does Winpatrol redirect to Security Software? Winpatrol is a software program. http://www.winpatrol.com/ and is not a generic concept in computing relating to security. — Preceding unsigned comment added by 203.13.3.94 (talk) 00:41, 18 February 2013 (UTC) [reply ]

Requested move 31 December 2016

[edit ]
The following is a closed discussion of a requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a move review. No further edits should be made to this section.

The result of the move request was: MovedAmakuru (talk) 17:53, 5 January 2017 (UTC) [reply ]



Security softwareComputer security software – There is also software concerned with other types of security Fixuture (talk) 02:51, 31 December 2016 (UTC) [reply ]


The above discussion is preserved as an archive of a requested move. Please do not modify it. Subsequent comments should be made in a new section on this talk page or in a move review. No further edits should be made to this section.

Vandalism

[edit ]

After applying my edits, this article has already begun to attract vandalism. Reverted floating <ref> related to "Español" from anon user with untraceable address using ipv6 tracert tools. IP 2806:108E:11:24FB:D463:18C0:EBA9:C1D7 Appears to end near Los Angeles servers and then tracert is lost. Araesmojo (talk) 19:28, 23 October 2020 (UTC) [reply ]

Futuristic security concepts > Futuristic programs: Vague and Ideosyncratic Descriptions

[edit ]

I am by no means an expert in computer security. I arrived on this page while trawling for info on antivirus programs. But I wanted to highlight the fact that from the section "Futuristic security concepts", this article veers sharply away from real-world computer security into a catalogue of concepts that seem to be pulled directly from (and indeed make numerous references to) various works of cyberpunk sci-fi. While I realise that computer security is a rapidly evolving field, and what looks like obvious science fiction to me, a non-expert, might look less outlandish to those with expertise in the subject, the overall tone of this section is flighty and frivolous.

In the description for 'Armor': "In the case of simsense environments, this protection then approaches its physical parallel, sheets of data that limit damaging interaction that might otherwise harm a user's physical form." The item for 'Biofeedback' includes the phrase "computational conflict" - broadly accurate, perhaps, but seems rather dramatic. The same entry suggests that a hacker may be "physically wounded if the target has somehow directly linked their body to the internet (like the Matrix movies)".

'Blackout' is described as a "kinder, gentler version" of Biofeedback which "causes stun damage". I presume based on a dice roll?

'Cloudless' refers to "previous incarnations of the Internet" and gives an example of "attempting to remove the idea of Neuromancer itself".

In 'Fork', we're told that "the result of the actions are determined separately against each target." Again: dice rolls?

'Nuke-from-orbit' is, the article tells us, "the only way to be sure".

'Tantrum' apparently "overlays simsense sensations on top of any offensive hacking action, hitting the target with a quick and disgusting sensation if even a small amount of damage is applied". I wouldn't be surprised to find this exact phrase in the manual of a roleplaying game.

A 'Tarball' is an "inaccurate combat program based on the tar-based ICE referenced within Shadowrun literature". Combat program? Shadowrun literature?

These are just a few examples.

As I said, I have no training or experience in computer security. These may in fact be realistic conceptions of what the future of the field may look like; but even in that case, I would strongly recommend the section be extensively reworded to ground it more in reality and to rely less on movie and roleplay game concepts and comparisons. If the entries in this section are as fantastical as they read to me, I suggest the sections be removed. - VexTalionis (talk) 12:06, 4 January 2021 (UTC) [reply ]

@VexTalionis: Based on your comments, I have rewritten significant portions of the article to remove some of the more "game centric" ideas and in several areas expanded those articles to feature real-world examples of how these exploits might be accomplished using current (2021) generation hardware and software.

AltStyle によって変換されたページ (->オリジナル) /