Botnet/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Meg Taylor
No edit summary
m (Text replacement - "{{r|Swarming (military)}}" to "")
 
(One intermediate revision by one other user not shown)
Line 20: Line 20:
{{r|Malware}}
{{r|Malware}}
{{r|Port scanning}}
{{r|Port scanning}}
{{r|Swarming (military)}}
 
{{r|Worm (computers)}}
{{r|Worm (computers)}}


{{Bot-created_related_article_subpage}}
{{Bot-created_related_article_subpage}}
<!-- Remove the section above after copying links to the other sections. -->
<!-- Remove the section above after copying links to the other sections. -->
==Articles related by keyphrases (Bot populated)==
{{r|Personal computer}}
{{r|Routing protocol}}
{{r|Port scanning}}
{{r|Ubiquitous computing}}
{{r|Amazon.com}}
{{r|Computer architecture}}

Latest revision as of 11:47, 1 October 2024

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Botnet.
See also changes related to Botnet, or pages that link to Botnet or to this page or whose text contains "Botnet".

Parent topics

Subtopics

Other related topics

Bot-suggested topics

Auto-populated based on Special:WhatLinksHere/Botnet. Needs checking by a human.

  • Amplification attack [r]: A means of denying service from computers, networks, or both, not by the direct volume or resource consumption of the attack stimulus itself, but by the volume of responses that it generates [e]
  • Robot [r]: Virtual or mechanical artificial agent, usually an electro-mechanical machine which is guided by computer or electronic programming, and is thus able to do tasks on its own. [e]
  • Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]
  • Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
  • Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
  • Port scanning [r]: A class of network reconnaissance techniques that may be part of legitimate network operations, or a probing to find vulnerabilities to attack [e]

Articles related by keyphrases (Bot populated)