Wikipedia:WikiProject Computer Security/Cleanup listing

About this listing
The listing is based on a database snapshot of 2010-03-12. It contains all articles flagged for cleanup which are tagged with WikiProject Computer Security on their talk page.

Based on that data, 962 articles are assigned to this project, of which 495, or 51.5%, are flagged for cleanup.

The following quality assessment classes were evaluated for this report:

The following importance assessment classes were evaluated for this report:

Featured articles
The project has 2 featured articles. 2 of them, or 100.0%, are flagged for cleanup.

Featured lists
The project has 1 featured lists. None of them is flagged for cleanup.

A-Class articles
The project has 0 A-Class articles.

Good articles
The project has 5 good articles. 2 of them, or 40.0%, are flagged for cleanup.

Top-importance articles
The project has 19 top-importance articles. 13 of them, or 68.4%, are flagged for cleanup.

High-importance articles
The project has 79 high-importance articles. 48 of them, or 60.8%, are flagged for cleanup.

Further entries (summary)
Detail listing is suppressed due to size restrictions.

Accuracy disputes

 * Edgar Danielyan (Mar 2008)

Articles containing how-to sections

 * Laptop theft
 * Yahoo! Assistant

Articles containing predictions or speculation

 * Denial-of-service attack «High»

Articles created via the Article Wizard

 * FIPS 140-3

Articles lacking in-text citations

 * Hackers: Heroes of the Computer Revolution (Feb 2008)
 * Information assurance (Feb 2008) «High»
 * GNUCITIZEN (Apr 2008)
 * Brute force attack (Nov 2008) «High»
 * Gigabyte (virus writer) (Jan 2009)
 * Electron (computer hacker) (Mar 2009)
 * Optix Pro (Mar 2009)
 * 2600: The Hacker Quarterly (Apr 2009)
 * Bohmini.A (Apr 2009)
 * Eddy Willems (Apr 2009)
 * Graybird (Apr 2009)
 * Principle of least privilege (Apr 2009)
 * Raw socket (Apr 2009)
 * Sub7 (Apr 2009)
 * CapDesk (May 2009)
 * OSVDB (May 2009)
 * Cyber spying (Jun 2009) «Top»
 * Swatting (Jun 2009)
 * Wireless cracking (Jul 2009)
 * 1984 Network Liberty Alliance (Aug 2009)
 * Gumblar (Aug 2009)
 * Masters of Deception (Aug 2009)
 * Iframe virus (Sep 2009)
 * Peter G. Neumann (Oct 2009) «High»
 * Computer insecurity (Dec 2009) «Top»
 * The iSONEWS (Mar 2010)

Articles lacking reliable references

 * Matt Blaze (Jun 2007)
 * Roger R. Schell (Dec 2007)
 * List of warez groups (Jan 2008)
 * Przemysław Frasunek (Jan 2008)
 * Joanna Rutkowska (Feb 2008)
 * SAINT (software) (Mar 2008)
 * Ne0h (Apr 2008)
 * Security architecture (Jul 2008)
 * Security Now! (Jul 2008) «High»
 * Timeline of computer security hacker history (Aug 2008) «High»
 * Microsoft Intelligent Application Gateway (Sep 2008)
 * JBoss SSO (Nov 2008)
 * SAML 2.0 (Nov 2008)
 * Domx (Dec 2008)
 * OWASP (Jan 2009)
 * Munge (Feb 2009)
 * Returnil Virtual System (Feb 2009)
 * Cameron Lacroix (Mar 2009)
 * Cisco PIX (Mar 2009)
 * Computer virus (Mar 2009) «High»
 * Kaspersky Anti-Hacker (Mar 2009)
 * Returnil Virtual System (Mar 2009)
 * Grandmaster Ratte' (May 2009)
 * Wireless identity theft (May 2009)
 * Zooko's triangle (May 2009)
 * Hack-Tic (Jun 2009)
 * Milestone Systems (Jul 2009)
 * Pete Herzog (Jul 2009)
 * Petname (Nov 2009)
 * Retina Vulnerability Assessment Scanner (Nov 2009)
 * Michael Schroeder (Jan 2010)
 * UXu (Jan 2010)
 * Bliss (virus) (Feb 2010)
 * Internet Storm Center (Feb 2010)
 * Panda Cloud Antivirus (Feb 2010)

Articles lacking sources

 * Heuristic analysis (Oct 2006)
 * Secure state (Nov 2006)
 * CPU modes (Dec 2006)
 * Ambient authority (Jan 2007)
 * Central Point Anti-Virus (Jan 2007)
 * Knark (Feb 2007)
 * Gateway (computer program) (Mar 2007)
 * SANS Institute (May 2007)
 * File binder (Jun 2007)
 * On-demand scan (Sep 2007)
 * Memory safety (Oct 2007)
 * Kiosk hacking (Dec 2007)
 * McAfee Personal Firewall Plus (Dec 2007) «High»
 * Shoulder surfing (computer security) (Dec 2007)
 * Sympatico Security Manager (Jan 2008)
 * Systems assurance (Jan 2008) «Top»
 * Data loss prevention software (Feb 2008)
 * Security bug (Feb 2008) «Top»
 * Transaction authentication (Mar 2008)
 * Yersinia (computing) (Apr 2008)
 * Host-based intrusion detection system (May 2008)
 * Secure coding (May 2008)
 * Kaspersky Mobile Security (Jun 2008)
 * Chinese wall (Jul 2008)
 * Data validation (Aug 2008)
 * Twinge attack (Aug 2008)
 * Wau Holland (Sep 2008)
 * DMZ (computing) (Oct 2008) «High»
 * Internet leak (Oct 2008)
 * AOHell (Nov 2008)
 * Personal firewall (Nov 2008)
 * Chaos Communication Congress (Jan 2009)
 * Digipass (Jan 2009)
 * Hackers Wanted (Jan 2009)
 * Kill switch (Jan 2009)
 * ARP spoofing (Feb 2009)
 * Vba32 AntiVirus (Feb 2009)
 * Zone-H (Feb 2009)
 * Masters of Deception (Mar 2009)
 * Matrix Software License Protection System (Apr 2009)
 * CapDesk (May 2009)
 * AAA protocol (Jun 2009)
 * Adware (Jun 2009) «High»
 * Generic!Artemis (Jul 2009)
 * Software forensics (Jul 2009)
 * 4K (computer virus) (Sep 2009) «High»
 * E-mail spoofing (Sep 2009)
 * Employee monitoring software (Sep 2009)
 * Kingsoft internet security (Sep 2009)
 * Security operations center (computing) (Sep 2009)
 * Committee on National Security Systems (Oct 2009) «Top»
 * Quick Heal Technologies (Oct 2009)
 * 180SearchAssistant (Dec 2009)
 * Arbitrary code execution (Dec 2009) «High»
 * Browser exploit (Dec 2009)
 * Chernobyl packet (Dec 2009)
 * CTCPEC (Dec 2009)
 * Defacement (vandalism) (Dec 2009)
 * External Security Manager (Dec 2009)
 * Firewall pinhole (Dec 2009)
 * Flaw hypothesis methodology (Dec 2009)
 * Flip button (Dec 2009)
 * Login spoofing (Dec 2009)
 * MAC spoofing (Dec 2009)
 * Mixed threat attack (Dec 2009)
 * Peg DHCP (Dec 2009)
 * Protocol-based intrusion detection system (Dec 2009)
 * Replay attack (Dec 2009)
 * Secure environment (Dec 2009)
 * Security testing (Dec 2009)
 * Service scan (Dec 2009)
 * String exploits (Dec 2009)
 * Symlink race (Dec 2009)
 * Lost Door RAT (Jan 2010)
 * Security as a service (Feb 2010) «High»
 * Snort (software) (Feb 2010)
 * Sub7 (Mar 2010)

Articles needing additional references

 * Certified Information Security Manager (Jun 2007)
 * Vishing (Jun 2007)
 * Capability-based security (Jul 2007)
 * Information sensitivity (Jul 2007)
 * List of compact discs sold with XCP (Jul 2007)
 * Virus Locker (Oct 2007)
 * Hacker (computer security) (Nov 2007) «High»
 * Jim Christy (Nov 2007)
 * LinuxShield (Dec 2007)
 * Tiger Team (TV series) (Dec 2007)
 * Kenneth Weiss (Jan 2008)
 * Phreaking (Jan 2008)
 * SMS spoofing (Jan 2008)
 * Extended Copy Protection (Feb 2008)
 * Firewall (computing) (Feb 2008) «Top»
 * Pre-boot authentication (Apr 2008)
 * Runas (Apr 2008)
 * Trusted Computing (Jun 2008)
 * Vulnerability (computing) (Jun 2008) «Top»
 * Tim Newsham (Aug 2008)
 * Hacking tool (Sep 2008)
 * Public computer (Oct 2008)
 * Code injection (Nov 2008)
 * CoolWebSearch (Nov 2008)
 * Graugon AntiVirus (Nov 2008)
 * Jason Burks (Nov 2008)
 * Laptop theft (Nov 2008)
 * Packet analyzer (Nov 2008)
 * EC-Council (Dec 2008)
 * Panda Security (Jan 2009)
 * Pharming (Jan 2009)
 * Play mp3.exe (trojan) (Jan 2009)
 * Hackers (film) (Feb 2009)
 * Proxy server (Feb 2009) «High»
 * Robert Schifreen (Feb 2009)
 * War dialing (Feb 2009)
 * Grey hat (Mar 2009)
 * WinAntiVirus 2006 (Mar 2009)
 * Gordon Lyon (Apr 2009)
 * Hardware keylogger (Apr 2009)
 * Honker Union (Apr 2009)
 * Mark Abene (Apr 2009)
 * Nimda (Apr 2009)
 * NOP slide (Apr 2009)
 * Return-to-libc attack (Apr 2009)
 * Tiger team (Apr 2009)
 * OSVDB (May 2009)
 * Superantispyware (May 2009)
 * Honeypot (computing) (Jun 2009) «High»
 * Security-Enhanced Linux (Jun 2009)
 * Port scanner (Jul 2009) «High»
 * Software cracking (Jul 2009)
 * Windows Defender (Jul 2009)
 * Offensive Security Certified Professional (Aug 2009)
 * Ophcrack (Aug 2009)
 * ANG Antivirus (Sep 2009)
 * Proxy server (Sep 2009) «High»
 * Acid2 (Nov 2009) «FA»
 * Race condition (Nov 2009)
 * Security through obscurity (Nov 2009)
 * Quarantine technology (Dec 2009)
 * Sudo (Dec 2009)
 * Gene Spafford (Jan 2010)
 * Application firewall (Feb 2010)
 * Encrypting File System (Feb 2010)
 * Keystroke logging (Feb 2010)

Articles needing cleanup

 * Information sensitivity (Dec 2006)
 * Astalavista.box.sk (Jul 2007)
 * Angela Orebaugh (Nov 2007)
 * Idle scan (Dec 2007)
 * Yahoo! Assistant (Dec 2007)
 * Discretionary access control (Jan 2008)
 * Mandatory access control (Jan 2008)
 * Systempunkt (Jan 2008)
 * Extended Copy Protection (Feb 2008)
 * Information assurance (Feb 2008) «High»
 * Intrusion detection system evasion techniques (Feb 2008)
 * Laptop theft (Feb 2008)
 * Keystroke logging (Mar 2008)
 * Transaction authentication (Mar 2008)
 * GNUCITIZEN (Apr 2008)
 * Pre-boot authentication (Apr 2008)
 * Secure transmission (Apr 2008)
 * Application security (Jul 2008)
 * Hacker (computer security) (Aug 2008) «High»
 * Web application security scanner (Aug 2008)
 * Computer crime (Oct 2008) «High»
 * Legion of Doom (hacking) (Oct 2008)
 * RF monitor software (Oct 2008)
 * Anti-phishing software (Dec 2008) «High»
 * Computer insecurity (Dec 2008) «Top»
 * Symlink race (Dec 2008)
 * WinFixer (Dec 2008)
 * Returnil Virtual System (Feb 2009)
 * Avira security software (Mar 2009)
 * Kaspersky Lab (Apr 2009) «High»
 * Trinoo (Apr 2009)
 * Bluebugging (May 2009)
 * CapDesk (May 2009)
 * Kaspersky Internet Security (Jun 2009)
 * Keystroke logging (Aug 2009)
 * Secure coding (Sep 2009)
 * Security architecture (Sep 2009)
 * Laptop theft (Oct 2009)
 * Microsoft data loss 2009 (Oct 2009)
 * Quick Heal Technologies (Oct 2009)
 * Scareware (Oct 2009)
 * Iframe virus (Nov 2009)
 * Timeline of computer viruses and worms (Nov 2009) «High»
 * Denial-of-service attack (Dec 2009) «High»
 * Hack (technology) (Dec 2009)
 * Role-based access control (Dec 2009)
 * IDN homograph attack (Jan 2010)

Articles needing expert attention

 * Proxy server (Nov 2008) «High»
 * Reverse engineering (Apr 2009)
 * List of computer viruses (all) (Aug 2009)
 * Committee on National Security Systems (Oct 2009) «Top»
 * Gumblar (Oct 2009)
 * Lost Door RAT (Jan 2010)

Articles needing link rot cleanup

 * Timeline of computer viruses and worms «High»

Articles needing more detailed references

 * Domx
 * Trusted Computing Group

Articles needing sections

 * Marcus Sachs (Oct 2009)
 * Peter Tippett (Oct 2009)

Articles that may contain original research

 * Computer virus (Jan 2008) «High»
 * List of warez groups (Jan 2008)
 * Alphanumeric code (Feb 2008)
 * Phreaking (Feb 2008)
 * Domx (Jul 2008)
 * SpywareBlaster (Aug 2008)
 * Timeline of computer security hacker history (Aug 2008) «High»
 * Wardriving (Aug 2008)
 * WinFixer (Oct 2008)
 * Domx (Dec 2008)
 * Phishing (Dec 2008) «High»
 * Acceptable use policy (Feb 2009)
 * Stack buffer overflow (Feb 2009)
 * Computer virus (Mar 2009) «High»
 * Masters of Deception (Mar 2009)
 * Wireless cracking (Apr 2009)
 * Chinese wall (Oct 2009)
 * Cross Domain Solutions (Oct 2009)
 * Security through obscurity (Nov 2009)
 * Phreaking (Mar 2010)

Articles that need to be wikified

 * GNUCITIZEN (Apr 2008)
 * Security architecture (May 2008)
 * Trusted Computing Group (May 2008)
 * Software Security Assurance (Jul 2008) «Top»
 * Microsoft Intelligent Application Gateway (Sep 2008)
 * Null session (Oct 2008)
 * Timeline of computer security hacker history (Nov 2008) «High»
 * Justin Tanner Petersen (Jan 2009)
 * Play mp3.exe (trojan) (Jan 2009)
 * VirusBuster (Feb 2009)
 * Child Exploitation Tracking System (Jun 2009)

Articles to be expanded

 * Masters of Deception (Jan 2007)
 * Trend Micro Internet Security (Jan 2007)
 * Information security (Feb 2007) «Top»
 * SMiShing (Mar 2007)
 * Torpig (May 2007)
 * Peter Gutmann (computer scientist) (Aug 2007)
 * Hakin9 (Nov 2007)
 * Marcus Sachs (Mar 2008)
 * Ne0h (Apr 2008)
 * Pre-boot authentication (Apr 2008)
 * Red Hacker Alliance (Apr 2008)
 * Kaspersky Mobile Security (Jun 2008)
 * RF monitor software (Oct 2008)
 * Kaspersky Anti-Hacker (Mar 2009)
 * Computer security conference (Apr 2009)
 * TOMOYO Linux (Jul 2009)
 * Keystroke logging (Aug 2009)
 * Mark Ludwig (Aug 2009)
 * Lost Door RAT (Jan 2010)
 * Metasploit Project (Feb 2010)

Articles to be merged

 * IP hijacking (Jun 2008)
 * Wireless identity theft (Aug 2008)
 * Hardware keylogger (Sep 2008)
 * Computer surveillance (Oct 2008)
 * Internet leak (Oct 2008)
 * Phreaking (Nov 2008)
 * Software cracking (Nov 2008)
 * Capability-based security (Jan 2009)
 * The Open Organization Of Lockpickers (Jan 2009)
 * Norton Personal Firewall (Mar 2009) «High»
 * PIFTS.exe (Mar 2009)
 * In-session phishing (Apr 2009)
 * SMiShing (Apr 2009)
 * 180SearchAssistant (Jun 2009)
 * Chen Ing Hau (Jun 2009)
 * CIH (computer virus) (Jun 2009)
 * Blackworm (Aug 2009)
 * Generic!Artemis (Aug 2009)
 * Viruslist.com (Aug 2009)
 * HouseCall (Sep 2009)
 * Inter-protocol communication (Oct 2009)
 * Inter-protocol exploitation (Oct 2009)
 * File system permissions (Jan 2010)
 * Hackerspace (Jan 2010)
 * Security bug (Jan 2010) «Top»
 * Vulnerability (computing) (Jan 2010) «Top»
 * Microsoft Forefront Unified Access Gateway (Feb 2010)
 * Microsoft Intelligent Application Gateway (Feb 2010)
 * Cross-site printing (Mar 2010)
 * WinAntiVirus 2006 (Mar 2010)

Articles which may contain unencyclopedic material

 * Null session
 * Wireless cracking

Articles with a promotional tone

 * Kenneth Weiss (Dec 2007)
 * SAINT (software) (Mar 2008)
 * DigitalFusion Platform (Dec 2008)
 * Astaro (Jan 2009)
 * Vba32 AntiVirus (Apr 2009)
 * BitDefender (Nov 2009)
 * FireEye, Inc. (Dec 2009)
 * Quick Heal Technologies (Dec 2009)
 * Loke Yeng Hoe (Mar 2010)
 * Finjan

Articles with broken or outdated citations

 * Domx (Dec 2008)

Articles with dead external links

 * Stack buffer overflow (Jun 2008)
 * GhostNet (Mar 2009)
 * Mary Ann Davidson (Apr 2009)
 * Hackers Wanted (Jun 2009)
 * Peiter Zatko (Jun 2009)
 * Cyber Storm Exercise (Sep 2009)
 * Ixquick (Sep 2009)
 * Wireless identity theft (Sep 2009)
 * Extended Copy Protection (Nov 2009)
 * Climatic Research Unit documents (Jan 2010)
 * Gary McKinnon (Jan 2010) «High»

Articles with disputed statements

 * Warzapping (Dec 2008)
 * Security through obscurity (Nov 2009)
 * Computer worm (Jan 2010)
 * Kraken botnet (Feb 2010)

Articles with invalid date parameter in template

 * Hacker (computer security) «High»

Articles with obsolete information

 * Microsoft Security Essentials «GA»
 * Online Armor Personal Firewall
 * SONAR (Symantec)
 * Storm botnet «FA»

Articles with peacock terms

 * Tsutomu Shimomura (Mar 2009)
 * Software cracking (Oct 2009)

Articles with sections that need to be turned into prose

 * Hacker (computer security) (Aug 2008) «High»

Articles with specifically-marked weasel-worded phrases

 * Computer crime (Oct 2007) «High»
 * Timeline of computer security hacker history (Aug 2008) «High»
 * Hacker group (Sep 2008)
 * Attack tree (Oct 2008)
 * Phreaking (Nov 2008)
 * Domx (Dec 2008)
 * Buffer overflow protection (Mar 2009)
 * Hack (technology) (Mar 2009)
 * Len Sassaman (Mar 2009)
 * Schneier's Law (Mar 2009)
 * CIH (computer virus) (Jun 2009)
 * Common Vulnerabilities and Exposures (Jun 2009)
 * Scareware (Sep 2009)
 * Norton AntiBot (Nov 2009)
 * Security through obscurity (Nov 2009)
 * Yahoo! Assistant (Nov 2009)
 * Malware (Dec 2009) «Top»
 * Bliss (virus) (Feb 2010)
 * DNS cache poisoning (Feb 2010)
 * Information security (Feb 2010) «Top»
 * Wi-Fi Protected Access (Feb 2010)

Articles with topics of unclear notability

 * Eddy Willems (Nov 2007)
 * Edgar Danielyan (Nov 2007)
 * Markus Jakobsson (Nov 2007)
 * Kiosk hacking (Dec 2007)
 * Alexander Kornbrust (Jan 2008)
 * Przemysław Frasunek (Jan 2008)
 * Systems assurance (Jan 2008) «Top»
 * Tom Cross (computer security) (Jan 2008)
 * String exploits (Mar 2008)
 * Domx (Jul 2008)
 * Zorp firewall (Jul 2008)
 * BSDRadius (Sep 2008)
 * IT Baseline Protection Catalogs (Oct 2008)
 * Null session (Oct 2008)
 * RF monitor software (Oct 2008)
 * AFSSI-5020 (Nov 2008)
 * CTCPEC (Nov 2008)
 * Derek Atkins (Nov 2008)
 * Honeynet Project (Nov 2008)
 * JBoss SSO (Nov 2008)
 * Marc Maiffret (Nov 2008)
 * Ofir Arkin (Nov 2008)
 * Robert Schifreen (Nov 2008)
 * Warzapping (Nov 2008)
 * Herbert Hugh Thompson (Jan 2009)
 * Carnegie Mellon CyLab CyberSecurity Journalism Awards (Mar 2009)
 * Optix Pro (Mar 2009)
 * Loke Yeng Hoe (Apr 2009)
 * SafeSquid (May 2009)
 * Superantispyware (May 2009)
 * Jetico Personal Firewall (Jun 2009) «High»
 * MAGEN (security) (Jul 2009)
 * WholeSecurity (Jul 2009)
 * IObit Security 360 (Oct 2009)
 * Quick Heal Technologies (Oct 2009)
 * Techno (computer virus) (Oct 2009)
 * Kingsoft internet security (Nov 2009)
 * Petname (Nov 2009)
 * SpywareGuard (Nov 2009)
 * Lost Door RAT (Jan 2010)
 * Lynis (Jan 2010)
 * Rkhunter (Jan 2010)
 * Evgeniy Gabrilovich (Feb 2010)
 * Security as a service (Feb 2010) «High»
 * Paramount Defenses (Mar 2010)

Articles with trivia sections

 * Wireless cracking (Nov 2008)
 * Jason Burks (Sep 2009)

Feb 2007

 * Chinese wall
 * Christmas tree packet
 * Computer insecurity «Top»
 * Malware «Top»
 * Operation D-Elite «High»
 * Phreaking
 * Rebecca Mercuri
 * Safelayer Secure Communications
 * Spyware «High»

Mar 2007

 * IronPort
 * MafiaBoy

May 2007

 * Chad Davis
 * Relay attack

Jun 2007

 * List of warez groups
 * OWASP

Jul 2007

 * 2007 cyberattacks on Estonia «High»
 * Capability-based security
 * Digital DawgPound

Aug 2007

 * Denial-of-service attack «High»
 * Zero day attack

Sep 2007

 * AOL Active Virus Shield
 * Rootkit «High»

Oct 2007

 * Ad-Aware «High»
 * HouseCall
 * Stateful firewall

Nov 2007

 * Angela Orebaugh
 * Crimeware

Dec 2007

 * Cyberspace «Top»
 * Hakin9

Jan 2008

 * Computer virus «High»
 * Information security «Top»

Feb 2008

 * Exploit (computer security) «High»
 * Extended Copy Protection
 * Laptop theft
 * Security through obscurity

Mar 2008

 * Computer insecurity «Top»
 * Ewido Networks
 * Nmap
 * Storm botnet «FA»

Apr 2008

 * GNUCITIZEN

May 2008

 * Daniel J. Bernstein
 * Erik Bloodaxe (hacker)
 * Great Hacker War
 * Hacker (computer security) «High»

Jun 2008

 * Matrix Software License Protection System
 * Security-Enhanced Linux

Jul 2008

 * Application security

Aug 2008

 * Computer security «Top»
 * Dennis Moran (computer criminal)
 * Norton Personal Firewall «High»
 * Privilege escalation
 * Rootkit «High»
 * SpyHunter
 * Timeline of computer security hacker history «High»

Sep 2008

 * Denial-of-service attack «High»
 * Keystroke logging
 * Knark
 * Microsoft Intelligent Application Gateway
 * Wau Holland

Oct 2008

 * Attack tree
 * Check Point
 * Computer crime «High»
 * Firestarter (firewall)
 * GNUCITIZEN
 * Hacker (computer security) «High»
 * Honeypot (computing) «High»
 * Peiter Zatko
 * Proxy server «High»
 * Security Administrator Tool for Analyzing Networks
 * Timeline of computer viruses and worms «High»
 * Wardriving
 * Welchia

Nov 2008

 * AOL Active Virus Shield
 * Chris Klaus
 * Hacktivism
 * Malware «Top»
 * MPack (software)
 * Security information management

Dec 2008

 * Adam Botbyl «High»
 * Bruce Schneier «High»
 * DMZ (computing) «High»
 * Domx
 * Phishing «High»

Jan 2009

 * AVG (software)
 * Computer crime «High»
 * Denial-of-service attack «High»
 * Graugon AntiVirus
 * ILOVEYOU
 * Mandatory access control
 * MS Antivirus (malware)
 * Tsutomu Shimomura

Feb 2009

 * Computer virus «High»
 * Spyware «High»
 * Timeline of computer viruses and worms «High»
 * Whitelist

Mar 2009

 * AVG (software)
 * Blaster (computer worm)
 * Click fraud
 * Kaspersky Lab «High»
 * Radia Perlman
 * Rootkit «High»
 * Software cracking
 * SQL slammer (computer worm)
 * Threat model
 * Trusted Computing
 * WinAntiVirus 2006

Apr 2009

 * Computer security «Top»
 * Hardware keylogger
 * Keystroke logging
 * Matrix Software License Protection System
 * Panda Security
 * Windows Live OneCare

May 2009

 * Click fraud
 * Comet Cursor
 * Demon Roach Underground
 * Information security «Top»
 * Online Armor Personal Firewall
 * Peter Tippett
 * Port scanner «High»
 * Trusted client
 * Web Access Management
 * Wireless identity theft

Jun 2009

 * Chinese wall
 * Hacktivismo Enhanced-Source Software License Agreement
 * Hardware security module
 * Munge
 * Security-Enhanced Linux
 * Trusted Computing

Jul 2009

 * Kaspersky Internet Security
 * MAGEN (security)
 * Milestone Systems
 * Port scanner «High»
 * Race condition
 * Security through obscurity
 * SMiShing
 * StankDawg
 * Trusted Computing

Aug 2009

 * 1984 Network Liberty Alliance
 * Attack tree
 * Chinese wall
 * Computer security «Top»
 * Exploit (computer security) «High»
 * Finjan
 * Gary McKinnon «High»
 * Intrusion prevention system «High»
 * Keystroke logging
 * Network intrusion detection system
 * Offensive Security Certified Professional
 * Software cracking
 * WinNuke

Sep 2009

 * Chinese wall
 * Denial-of-service attack «High»
 * Eric Corley «High»
 * Information assurance «High»
 * Operation D-Elite «High»
 * Scareware
 * Timeline of computer viruses and worms «High»
 * Wireless identity theft
 * Zango (company)

Oct 2009

 * Ad-Aware «High»
 * Adware «High»
 * Cain and Abel (software)
 * Chinese wall
 * Cross-site scripting «High»
 * Cult of the Dead Cow
 * Cyberwarfare «High»
 * Keystroke logging
 * Lock picking
 * Mandatory access control
 * Microsoft Security Essentials «GA»
 * Parkerian Hexad
 * Robert Tappan Morris «High»
 * Secure by design
 * Security-Enhanced Linux
 * Tor (anonymity network)

Nov 2009

 * Avira security software
 * Check Point
 * Comodo Internet Security
 * Gumblar
 * Mandatory access control
 * Markus Hess
 * Security through obscurity
 * SMS spoofing
 * Trojan horse (computing) «High»

Dec 2009

 * AVG (software)
 * Jetico Personal Firewall «High»

Jan 2010

 * Adware «High»
 * Authentication «High»
 * BeyondTrust
 * Chaos Computer Club
 * Click fraud
 * DEF CON
 * Electronic Frontier Foundation «High»
 * Encrypting File System
 * Gary McKinnon «High»
 * Gumblar
 * Intrusion prevention system «High»
 * Kevin Mitnick «High»
 * Nguyễn Tử Quảng
 * WS-Security

Feb 2010

 * Bliss (virus)
 * Computer crime «High»
 * Cyberwarfare «High»
 * DNS hijacking
 * Farid Essebar
 * Form (computer virus) «High»
 * Hacker (computer security) «High»
 * Null character
 * Pretty Good Privacy «High»
 * Proxy server «High»
 * Scareware
 * Virus hoax
 * Vundo «High»

Mar 2010

 * Lock picking
 * Paramount Defenses
 * SQL slammer (computer worm)
 * Timeline of computer viruses and worms «High»

Other

 * Clickjacking
 * Code Red (computer worm)

Articles with weasel words

 * Domx (Dec 2008)
 * BSDRadius (Mar 2009)
 * Trend Micro Internet Security (Mar 2009)

BLP articles lacking sources

 * Cameron Lacroix
 * Grandmaster Ratte'
 * Joanna Rutkowska
 * Michael Schroeder
 * Ne0h
 * Pete Herzog
 * Przemysław Frasunek
 * Roger R. Schell

Computer Security articles needing expert attention

 * Committee on National Security Systems «Top»
 * Gumblar
 * List of computer viruses (all)
 * Lost Door RAT

Education articles needing expert attention

 * Committee on National Security Systems «Top»

Law articles needing expert attention

 * Reverse engineering

NPOV disputes

 * Great Hacker War (Dec 2007)
 * Finjan (Feb 2008)
 * Department of Defense Information Assurance Certification and Accreditation Process (Mar 2008)
 * Acceptable use policy (Oct 2008)
 * Phishing (Dec 2008) «High»
 * Kaspersky Internet Security (Mar 2009)
 * Dark Avenger (Nov 2009)
 * Climatic Research Unit hacking incident (Feb 2010)
 * SONAR (Symantec) (Feb 2010)

Sep 2006

 * GetAdmin

Nov 2006

 * Honeypot and forEnsic Analysis Tool

Jan 2007

 * Digital DawgPound
 * Safelayer Secure Communications

Oct 2007

 * Backdoor.Win32.IRCBot

Dec 2007

 * Kiosk hacking

Jan 2008

 * Wicked Rose

Apr 2008

 * PERMIS

May 2008

 * Autossh

Jun 2008

 * The Hacker's Handbook

Jul 2008

 * Domx

Aug 2008

 * Systempunkt
 * Twinge attack

Sep 2008

 * Jason Burks
 * Site Security Handbook

Oct 2008

 * Frame injection
 * Lock bypass

Dec 2008

 * 0x80
 * AFSSI-5020
 * DigitalFusion Platform

Jan 2009

 * Virus Information Alliance

Feb 2009

 * Agent.AWF
 * Aimetis Corporation
 * Angela Orebaugh
 * Astalavista.box.sk
 * Attack patterns «High»
 * Bargain Buddy
 * Beyond Security
 * Blended threat
 * Computer Law and Security Report
 * Cross-site printing
 * Cyber Storm Exercise
 * Cyber Storm II
 * Event data
 * External Security Manager
 * File binder
 * Flaw hypothesis methodology
 * GIAC Certified Forensic Analyst
 * Gigabyte (virus writer)
 * Gray Areas
 * HDDerase
 * Incredible Internet
 * Inference attack
 * Knark
 * Loke Yeng Hoe
 * Lynis
 * Michael Schearer
 * Mixed threat attack
 * Muffin (proxy)
 * Neil Daswani
 * NoAdware
 * Object-code Buffer Overrun Evaluator
 * Ofir Arkin
 * Play mp3.exe (trojan)
 * Przemysław Frasunek
 * Quarantine technology
 * Racetrack problem
 * Red Hacker Alliance
 * Reynaldo Anzaldua Jr.
 * Robert Schifreen
 * Secure transmission
 * Security Protocols Open Repository
 * Social engineer
 * Spy-phishing
 * SpyHunter
 * Spyvampire
 * Stakkato
 * Stefan Savage
 * Stephen T. Cobb
 * Stepping stone (computer security)
 * Sympatico Security Manager
 * Systems assurance «Top»
 * Twelve Tricks
 * Virgil D. Gligor
 * Virtual Bouncer
 * Virus Locker
 * Voyager (computer worm)
 * W32.Gammima.AG
 * Warzapping
 * Webattacker
 * WinAntiVirus 2006
 * XAKEP (journal)
 * XICE Desktop

Mar 2009

 * Parkerian Hexad

Apr 2009

 * ANG Antivirus
 * Bluebugging

Jul 2009

 * Billion laughs
 * Centurion guard
 * Child Exploitation Tracking System

Aug 2009

 * Hardware Trojan (computing)

Oct 2009

 * 3wPlayer
 * Anti-worm
 * SAML 1.1

Nov 2009

 * Anti-pharming
 * Secure state

Dec 2009

 * Chernobyl packet
 * Flip button
 * Service scan
 * Web threat

Feb 2010

 * Four Horsemen of the Infocalypse
 * Nguyễn Tử Quảng
 * Wireless identity theft

Mar 2010

 * Climatic Research Unit documents
 * Spybot – Search & Destroy «High»
 * SpywareBlaster

Pages missing lead section

 * Secure coding

Self-contradictory articles

 * WinFixer (Aug 2009)

Software articles needing expert attention

 * Lost Door RAT

Technology articles needing expert attention

 * Proxy server «High»

Unreferenced BLPs

 * Andy Müller-Maguhn (Jan 2008)
 * Evgeniy Gabrilovich (Nov 2008)
 * Erik Bloodaxe (hacker) (May 2009)
 * Gary McGraw (May 2009)
 * Dave Kleiman (Jun 2009)
 * Virgil D. Gligor (Aug 2009)
 * Steven M. Bellovin (Oct 2009)
 * Loke Yeng Hoe (Mar 2010)

Vague or ambiguous time

 * Chaos Computer Club
 * Kaspersky Lab «High»
 * Scareware
 * Spyware «High»
 * Wi-Fi Protected Access

Wikipedia articles in need of updating

 * IDN homograph attack
 * Norton 360 «GA»
 * Security Assertion Markup Language
 * The iSONEWS

Wikipedia articles needing clarification

 * Stateful firewall (Mar 2008)
 * CIH (computer virus) (Nov 2008)
 * Domx (Dec 2008)
 * Computer security (Feb 2009) «Top»
 * Zardoz (computer security) (Mar 2009)
 * Finjan (Aug 2009)
 * Keystroke logging (Aug 2009)
 * Quarantine technology (Aug 2009)
 * Iptables (Nov 2009)
 * Green Antivirus 2009 (Jan 2010)
 * Electronic Frontier Foundation (Feb 2010) «High»

Wikipedia articles needing context

 * Null session (Oct 2008)
 * Zardoz (computer security) (Mar 2009)
 * Quarantine technology (Aug 2009)
 * Brewer and Nash model (Oct 2009)
 * Graham-Denning model (Oct 2009)
 * KoKo (computer virus) (Oct 2009)
 * Mixed threat attack (Oct 2009)
 * Relay attack (Oct 2009)
 * SAML 2.0 (Oct 2009)

Wikipedia articles needing copy edit

 * Software Security Assurance (Jul 2008) «Top»
 * IT Baseline Protection Catalogs (Oct 2008)
 * Avira security software (Mar 2009)
 * Bluebugging (May 2009)
 * Rootkit (May 2009) «High»
 * Child Exploitation Tracking System (Jun 2009)
 * Iframe virus (Nov 2009)

Wikipedia articles needing factual verification

 * Norton AntiVirus (Feb 2010)
 * Scareware (Feb 2010)

Wikipedia articles needing reorganization

 * Hacker (computing) «High»
 * Peter Tippett

Wikipedia articles needing style editing

 * Digital DawgPound (Jul 2007)
 * Computer insecurity (Dec 2007) «Top»
 * Great Hacker War (Dec 2007)
 * Idle scan (Dec 2007)
 * Threat model (Dec 2007)
 * Type enforcement (Dec 2007)
 * Systempunkt (Jan 2008)
 * Vulnerability (computing) (Jun 2008) «Top»
 * Erik Bloodaxe (hacker) (Jul 2008)
 * Munge (Jun 2009)
 * Cyberwarfare (Nov 2009) «High»

Wikipedia articles with plot summary needing attention

 * Hackers: Heroes of the Computer Revolution (Sep 2008)

Wikipedia articles with possible conflicts of interest

 * Gigabyte (virus writer)
 * Loke Yeng Hoe
 * Michael Schearer

Wikipedia external links cleanup

 * Hacktivism
 * Host-based intrusion detection system
 * Returnil Virtual System
 * Vulnerability (computing) «Top»

Wikipedia introduction cleanup

 * Null session (Oct 2008)
 * Zardoz (computer security) (Mar 2009)
 * Quarantine technology (Aug 2009)
 * Secure coding (Sep 2009)
 * Security architecture (Sep 2009)
 * Brewer and Nash model (Oct 2009)
 * Graham-Denning model (Oct 2009)
 * KoKo (computer virus) (Oct 2009)
 * Mixed threat attack (Oct 2009)
 * Relay attack (Oct 2009)
 * IDN homograph attack (Jan 2010)

Wikipedia laundry list cleanup

 * Extended Copy Protection

Wikipedia references cleanup

 * Acceptable use policy (Sep 2009)
 * Neil Daswani (Sep 2009)
 * Spybot – Search & Destroy (Sep 2009) «High»
 * SpyHunter (Sep 2009)
 * SekChek Classic

Wikipedia spam cleanup

 * Hacktivism
 * Host-based intrusion detection system
 * Vulnerability (computing) «Top»