<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-GB">
	<id>https://www.vigyanwiki.in/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2601%3A183%3A4A80%3AE570%3ACF1%3A48D8%3A46E5%3A9CDA</id>
	<title>Vigyanwiki - User contributions [en-gb]</title>
	<link rel="self" type="application/atom+xml" href="https://www.vigyanwiki.in/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=2601%3A183%3A4A80%3AE570%3ACF1%3A48D8%3A46E5%3A9CDA"/>
	<link rel="alternate" type="text/html" href="https://www.vigyanwiki.in/wiki/Special:Contributions/2601:183:4A80:E570:CF1:48D8:46E5:9CDA"/>
	<updated>2026-04-07T10:20:17Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.39.3</generator>
	<entry>
		<id>https://www.vigyanwiki.in/index.php?title=Template:Computer_hacking&amp;diff=22284</id>
		<title>Template:Computer hacking</title>
		<link rel="alternate" type="text/html" href="https://www.vigyanwiki.in/index.php?title=Template:Computer_hacking&amp;diff=22284"/>
		<updated>2022-11-05T20:24:05Z</updated>

		<summary type="html">&lt;p&gt;2601:183:4A80:E570:CF1:48D8:46E5:9CDA: Minor edit&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Sidebar with collapsible lists&lt;br /&gt;
| name = Computer hacking&lt;br /&gt;
| pretitle = Part of a series on &lt;br /&gt;
| image =&lt;br /&gt;
| wraplinks = true&lt;br /&gt;
| title = [[Security hacker|Computer hacking]]&lt;br /&gt;
| headingstyle = &lt;br /&gt;
| titlestyle = &lt;br /&gt;
| listtitlestyle = border-top:1px solid #aaa;text-align:center;&lt;br /&gt;
| listclass = hlist&lt;br /&gt;
| collapse = {{{collapse|{{{1|all}}}}}}  &lt;br /&gt;
&lt;br /&gt;
| list1name = [[List of security hacking incidents|History]]&lt;br /&gt;
| list1title = [[List of security hacking incidents|History]]&lt;br /&gt;
| list1 =  &lt;br /&gt;
* [[Phreaking]]&lt;br /&gt;
* [[Cryptovirology]]&lt;br /&gt;
* [[Hacking of consumer electronics]]&lt;br /&gt;
* [[List of hackers]]&lt;br /&gt;
&lt;br /&gt;
| list2name = [[Hacker culture]] and [[Hacker ethic|ethic]]&lt;br /&gt;
| list2title = [[Hacker culture]] and [[Hacker ethic|ethic]]&lt;br /&gt;
| list2 = &lt;br /&gt;
&lt;br /&gt;
* [[Hackathon]]&lt;br /&gt;
* ''[[Hacker Manifesto]]''&lt;br /&gt;
* [[Hackerspace]]&lt;br /&gt;
* [[Hacktivism]]&lt;br /&gt;
* [[Maker culture]]&lt;br /&gt;
* Types of [[hacker]]s&lt;br /&gt;
** [[Black hat (computer security)|Black hat]]&lt;br /&gt;
** [[Grey hat]]&lt;br /&gt;
** [[White hat (computer security)|White hat]]&lt;br /&gt;
&lt;br /&gt;
| list3name = [[Computer security conference|Conferences]]&lt;br /&gt;
| list3title = [[Computer security conference|Conferences]]&lt;br /&gt;
| list3 =  &lt;br /&gt;
&lt;br /&gt;
* [[Black Hat Briefings]]&lt;br /&gt;
* [[Chaos Communication Congress]]&lt;br /&gt;
* [[DEF CON]]&lt;br /&gt;
* [[Hackers on Planet Earth]]&lt;br /&gt;
* [[Security BSides]]&lt;br /&gt;
* [[ShmooCon]]&lt;br /&gt;
* [[Summercon]]&lt;br /&gt;
&lt;br /&gt;
| list4name = [[Computer crime]]&lt;br /&gt;
| list4title = [[Computer crime]]&lt;br /&gt;
| list4 =  &lt;br /&gt;
&lt;br /&gt;
* [[Crimeware]]&lt;br /&gt;
* [[List of computer criminals]]&lt;br /&gt;
* [[Script kiddie]]&lt;br /&gt;
&lt;br /&gt;
| list5name = [[Hacking tool]]s&lt;br /&gt;
| list5title = [[Hacking tool]]s&lt;br /&gt;
| list5 =  &lt;br /&gt;
&lt;br /&gt;
* [[Exploit (computer security)|Exploit]]&lt;br /&gt;
* [[List of digital forensics tools#Forensics-focused operating systems|forensics-focused operating systems]]&lt;br /&gt;
* [[Payload (computing)|Payload]]&lt;br /&gt;
* [[Social engineering (security)|Social engineering]]&lt;br /&gt;
* [[Vulnerability (computing)|Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
| list6name = [[Hacker culture|Practice sites]]&lt;br /&gt;
| list6title = [[Hacker culture|Practice sites]]&lt;br /&gt;
| list6 =  &lt;br /&gt;
&lt;br /&gt;
* [[HackThisSite]]&lt;br /&gt;
* [[Zone-H]]&lt;br /&gt;
&lt;br /&gt;
| list7name = [[Malware]]&lt;br /&gt;
| list7title = [[Malware]]&lt;br /&gt;
| list7 =   &lt;br /&gt;
&lt;br /&gt;
* [[Rootkit]]&lt;br /&gt;
* [[Backdoor (computing)|Backdoor]]&lt;br /&gt;
* [[Trojan horse (computing)|Trojan horse]]&lt;br /&gt;
* [[Computer virus|Virus]]&lt;br /&gt;
* [[Computer worm|Worm]]&lt;br /&gt;
* [[Spyware]]&lt;br /&gt;
* [[Ransomware]]&lt;br /&gt;
* [[Logic bomb]]&lt;br /&gt;
* [[Botnet]]&lt;br /&gt;
* [[Keystroke logging]]&lt;br /&gt;
* [[Host-based intrusion detection system|HIDS]]&lt;br /&gt;
* [[Web shell]]&lt;br /&gt;
* [[Arbitrary code execution|RCE]]&lt;br /&gt;
&lt;br /&gt;
| list8name = [[Computer security]]&lt;br /&gt;
| list8title = [[Computer security]]&lt;br /&gt;
| list8 =   &lt;br /&gt;
&lt;br /&gt;
* [[Application security]]&lt;br /&gt;
* [[Cloud computing security]]&lt;br /&gt;
* [[Network security]]&lt;br /&gt;
&lt;br /&gt;
| list9name = [[Hacker group|Groups]]&lt;br /&gt;
| list9title = [[Hacker group|Groups]]&lt;br /&gt;
| list9 =    &lt;br /&gt;
&lt;br /&gt;
* [[Anonymous (group)|Anonymous]]&lt;br /&gt;
* [[Chaos Computer Club]]&lt;br /&gt;
* [[Homebrew Computer Club]] (defunct)&lt;br /&gt;
* [[Legion of Doom (hacking)|Legion of Doom]] (defunct)&lt;br /&gt;
* [[LulzSec]] (defunct)&lt;br /&gt;
* [[Masters of Deception]] (defunct)&lt;br /&gt;
* [[Red team]] / [[Blue team (computer security)|Blue team]]&lt;br /&gt;
&lt;br /&gt;
| list10name = Publications&lt;br /&gt;
| list10title = Publications&lt;br /&gt;
| list10 =     &lt;br /&gt;
&lt;br /&gt;
* ''[[2600: The Hacker Quarterly]]''&lt;br /&gt;
* [[Hacker News]]&lt;br /&gt;
* ''[[Nuts and Volts]]''&lt;br /&gt;
* ''[[Phrack]]''&lt;br /&gt;
}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
{{documentation}}&lt;br /&gt;
&amp;lt;/noinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>2601:183:4A80:E570:CF1:48D8:46E5:9CDA</name></author>
	</entry>
</feed>