Jump to content

Wikipedia talk:WikiProject Computer Security

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
WikiProject iconComputer Security: Computing Project‑class
WikiProject iconThis page is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
ProjectThis page does not require a rating on Wikipedia's content assessment scale.
Taskforce icon
This page is supported by WikiProject Computing.
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Answer question about Same-origin_policy
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

There is a requested move discussion at Talk:CounterSpy (software)#Requested move 27 April 2024 that may be of interest to members of this WikiProject. Safari ScribeEdits! Talk! 22:59, 4 May 2024 (UTC)[reply]

Merge proposal at Norton 360

[edit]

I have created a merge proposal at Norton 360 that may be of interest to members of this WikiProject. (Apologies, I don't know how to use 'Article alerts' to be put on the 'Articles to be merged' list.) Tule-hog (talk) 08:26, 7 July 2024 (UTC)[reply]

I have nominated Microsoft Security Essentials for a featured article review here. Please join the discussion on whether this article meets the featured article criteria. Articles are typically reviewed for two weeks. If substantial concerns are not addressed during the review period, the article will be moved to the Featured Article Removal Candidates list for a further period, where editors may declare "Keep" or "Delist" in regards to the article's featured status. The instructions for the review process are here. Sohom (talk) 15:29, 8 July 2024 (UTC)[reply]

(computer security) disambiguator

[edit]

I have brought the threat and vulnerability articles in line with exploit in their use of (computer security) as a disambiguator; they previously used (computer) and (computing), respectively. This is justified by the cohesion of IT risk management (with the threat, vulnerability, and exploit terminology) as a unified practice. Noting here in case this is not desired. Tule-hog (talk) 19:50, 15 July 2024 (UTC)[reply]