File:Monitor padlock.svg
Appearance
Size of this PNG preview of this SVG file: 486 × 445 pixels. Other resolutions: 262 × 240 pixels | 524 × 480 pixels | 839 × 768 pixels | 1,118 × 1,024 pixels | 2,237 × 2,048 pixels.
Original file (SVG file, nominally 486 × 445 pixels, file size: 8 KB)
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 03:26, 16 March 2011 | 486 × 445 (8 KB) | File Upload Bot (Magnus Manske) | {{BotMoveToCommons|en.wikipedia|year={{subst:CURRENTYEAR}}|month={{subst:CURRENTMONTHNAME}}|day={{subst:CURRENTDAY}}}} {{Information |Description={{en|A candidate icon for en:Portal:Computer security}} |Source=Transferred from [http://en.wikipedia. |
File usage
More than 100 pages use this file. The following list shows the first 100 pages that use this file only. A full list is available.
- Corkscrew (program)
- CrossCrypt
- Data diddling
- Honeytoken
- L0phtCrack
- Nessus (software)
- Pluggable Authentication Module
- Resource Access Control Facility
- Secure file transfer program
- Software blacklist
- Voluntary collective licensing
- Talk:40-bit encryption
- Talk:Access-control list
- Talk:Adobe Flash
- Talk:Adrian Lamo
- Talk:Authentication
- Talk:BIOS
- Talk:Bell–LaPadula model
- Talk:Biba Model
- Talk:Browser exploit
- Talk:Bruce Schneier
- Talk:Brute-force attack
- Talk:Buffer overflow
- Talk:CIH (computer virus)
- Talk:Children's Online Privacy Protection Act
- Talk:Chinese wall
- Talk:ClamAV
- Talk:Comparison of computer viruses
- Talk:Computer forensics
- Talk:Computer insecurity
- Talk:Cryptographic hash function
- Talk:Cryptography
- Talk:Cybercrime
- Talk:Demon dialing
- Talk:Dictionary attack
- Talk:Download.ject
- Talk:Edward Felten
- Talk:Electronic Frontier Foundation
- Talk:Electronic voting
- Talk:Exec Shield
- Talk:Federal Information Processing Standards
- Talk:Full disclosure (computer security)
- Talk:Google Hacks
- Talk:HTTP cookie
- Talk:Hack (term)
- Talk:Hacker Manifesto
- Talk:Hacker ethic
- Talk:Hackers: Heroes of the Computer Revolution
- Talk:Honeypot (computing)
- Talk:Internet security
- Talk:Iptables
- Talk:Karl Koch (hacker)
- Talk:Kevin Mitnick
- Talk:LM hash
- Talk:List of security hacking incidents
- Talk:Mail and wire fraud
- Talk:Man-in-the-middle attack
- Talk:Mark Abene
- Talk:Melissa (computer virus)
- Talk:Modula
- Talk:Morris worm
- Talk:Mydoom
- Talk:Null character
- Talk:Obfuscation (software)
- Talk:Off-by-one error
- Talk:OpenBSD
- Talk:Operation Sundevil
- Talk:Password Authentication Protocol
- Talk:Personal identification number
- Talk:Phishing
- Talk:Phreaking
- Talk:Pretty Good Privacy
- Talk:Privacy
- Talk:Proxy server
- Talk:Public key infrastructure
- Talk:RADIUS
- Talk:Reverse engineering
- Talk:Risk
- Talk:Role-based access control
- Talk:SQL Slammer
- Talk:Script kiddie
- Talk:Secure Shell
- Talk:Security-Enhanced Linux
- Talk:Security-focused operating system
- Talk:Security through obscurity
- Talk:Self-driving car
- Talk:Shellcode
- Talk:Snort (software)
- Talk:Social engineering
- Talk:Software cracking
- Talk:Spy Sweeper
- Talk:Sudo
- Talk:Synopsys
- Talk:Timeline of computer viruses and worms
- Talk:Trojan horse (computing)
- Talk:Tubular pin tumbler lock
- Talk:Virtual private network
- Talk:WarGames
- Talk:Wardialing
- Talk:Web of trust
View more links to this file.
Global file usage
The following other wikis use this file:
- Usage on ar.wikipedia.org
- فيروس حاسوب
- دودة حاسوب
- حصان طروادة (حاسوب)
- انتهاك الخصوصية
- برمجية إعلانات
- راصد لوحة مفاتيح
- جدار حماية (حوسبة)
- طاهر الجمل
- إرهاب سيبراني
- هجمات الحرمان من الخدمات
- محاكاة افتراضية
- تصنيف:أمن الحاسوب
- ذا ماتريكس (فيلم)
- تعمية (تخصص)
- برمجية خبيثة
- رونالد ريفست
- كيفين ميتنيك
- اجتياز نات
- فري بي إس دي
- واير شارك
- كاين (برنامج)
- نت ستومبلر (برنامج)
- أمن المعلومات
- تجاوز سعة المخزن المؤقت
- دافيد هاينماير هانسون
- ملقم افتراضي
- آلة افتراضية
- نافذة منبثقة
- كارنيفور
- إيكيلون
- إن أوبونتو
- آي بي كوب
- دانييل يوليوس بيرنشتاين
- راسم المرور متعدد المسار
- شاشة الموت الزرقاء
- سيسكو
- زون ألارم
- ملف الفهرس
- كلاموين
- تصنيف:فيروسات الحاسوب
- نورتن أنتي فايرس
- تصنيف:ترميز
- إف تي بي إس
- وكالة الأمن القومي الأمريكية
- جريمة الحاسوب
- شبكة خاصة افتراضية
- موت قاسي 4
- حروف تحقق
- وكيل (حوسبة)
- تروكربت
View more global usage of this file.