Content deleted Content added
Mindmatrix (talk | contribs) m Reverted edit by 37.223.120.149 (talk) to last version by Eaaaaugh |
Guninvalid (talk | contribs) m Reverted 1 edit by 103.143.243.26 (talk) to last revision by Mindmatrix |
||
(13 intermediate revisions by 11 users not shown) | |||
Line 1:
{{WikiProject
{{WikiProject Computing|
}}
== Extend privileges ==
An exploit may or may not 'extend privileges'. It could cicumvent access control, or entend it to provide or extends access to a feature _or_ allows a feature to be used in a manner not intended by the softwares developers. --[[:User:MartinSpamer|MartinSpamer]] 18:03, 27 January 2003 (UTC)
:there are always such misfeatures, bugs, holes, whatever you wanna call 'em. It's best not to distinguish but imagine software itself as swiss cheese that one grabs onto by fumbling fingers in the dark, some of which give access to the center and let you grab the whole cheese, take it out of the dark, adn eat it. --[[Special:Contributions/142.177.104.164|142.177.104.164]] 18:10, 27 January 2003 (UTC)
This is supposed to be an encyclopedia, its whole premises is centered on completeness and accuracy. --[[:User:MartinSpamer|MartinSpamer]] 17:21, 2 February 2003 (UTC)
== This is not computer science ==
The term "exploit" as defined here is not a [[computer science]] term. It is a term from computer security operations. I propose that this article be moved to ''[[Exploit (computer security)]]''. Any objections? --[[User:Fubar Obfusco|FOo]] 14:29, 18
:Well, nobody objected in a few months, so moved it is. --[[User:Fubar Obfusco|FOo]] 04:24, 4
== Numerious problems ==
Line 52 ⟶ 54:
----
:''The above discussion is preserved as an archive of a [[Wikipedia:Requested moves|requested move]]. <span style="color:red">'''Please do not modify it.'''</span> Subsequent comments should be made in a new section on this talk page or in a [[Wikipedia:Move review|move review]]. No further edits should be made to this section.''</div><!-- Template:RM bottom -->
== Pivoting is a follow-on to an exploit ==
It seems that pivoting is not an exploit by itself, but a technique used as a follow-on to an exploit. It doesn't really fit with the article. If it did, then all the follow-on things because of the exploit's success would fit also. Check out the section itself: the VPN application enabling the pivoting is a ''payload'' of an exploit. That's the only mention of the word "exploit" in this section.
So,
# Move to [[Pivoting]]
# Fix the disambiguation page [[Pivoting]] too --[[User:Tikmok|Tikmok]] ([[User talk:Tikmok|talk]]) 12:21, 13 August 2024 (UTC)
|