Talk:Exploit (computer security): Difference between revisions

Content deleted Content added
m Reverted 1 edit by 103.143.243.26 (talk) to last revision by Mindmatrix
Tags: Twinkle Undo Mobile edit Mobile web edit
 
(8 intermediate revisions by 7 users not shown)
Line 54:
----
:''The above discussion is preserved as an archive of a [[Wikipedia:Requested moves|requested move]]. <span style="color:red">'''Please do not modify it.'''</span> Subsequent comments should be made in a new section on this talk page or in a [[Wikipedia:Move review|move review]]. No further edits should be made to this section.''</div><!-- Template:RM bottom -->
 
== Pivoting is a follow-on to an exploit ==
 
It seems that pivoting is not an exploit by itself, but a technique used as a follow-on to an exploit. It doesn't really fit with the article. If it did, then all the follow-on things because of the exploit's success would fit also. Check out the section itself: the VPN application enabling the pivoting is a ''payload'' of an exploit. That's the only mention of the word "exploit" in this section.
 
So,
# Move to [[Pivoting]]
# Fix the disambiguation page [[Pivoting]] too --[[User:Tikmok|Tikmok]] ([[User talk:Tikmok|talk]]) 12:21, 13 August 2024 (UTC)