Talk:Exploit (computer security): Difference between revisions

Content deleted Content added
silly me - forgot to sign
m Reverted 1 edit by 103.143.243.26 (talk) to last revision by Mindmatrix
Tags: Twinkle Undo Mobile edit Mobile web edit
 
(32 intermediate revisions by 24 users not shown)
Line 1:
{{WikiProject Computerbanner Securityshell|class=StubStart|importance=High}}
{{WikiProject Computing|classimportance=mid|security=Stubyes|security-importance=Top}}
}}
 
== Extend privileges ==
An exploit may or may not 'extend privileges'. It could cicumvent access control, or entend it to provide or extends access to a feature _or_ allows a feature to be used in a manner not intended by the softwares developers. --[[:User:MartinSpamer|MartinSpamer]] 18:03, 27 January 2003 (UTC)
 
:there are always such misfeatures, bugs, holes, whatever you wanna call 'em. It's best not to distinguish but imagine software itself as swiss cheese that one grabs onto by fumbling fingers in the dark, some of which give access to the center and let you grab the whole cheese, take it out of the dark, adn eat it. --[[Special:Contributions/142.177.104.164|142.177.104.164]] 18:10, 27 January 2003 (UTC)
 
This is supposed to be an encyclopedia, its whole premises is centered on completeness and accuracy. --[[:User:MartinSpamer|MartinSpamer]] 17:21, 2 February 2003 (UTC)
 
== This is not computer science ==
 
The term "exploit" as defined here is not a [[computer science]] term. It is a term from computer security operations. I propose that this article be moved to ''[[Exploit (computer security)]]''. Any objections? --[[User:Fubar Obfusco|FOo]] 14:29, 18 AugAugust 2004 (UTC)
 
:Well, nobody objected in a few months, so moved it is. --[[User:Fubar Obfusco|FOo]] 04:24, 4 FebFebruary 2005 (UTC)
 
== Numerious problems ==
Line 33 ⟶ 35:
The typical problem with any computer/information security discussion on wikipedia is nobody agrees on (and fewer people have a correct understanding of the nomenclature). This article confuses exploits, vulnerabilities and threats. I'd suggest dropping all the unsourced statements and start again. <small>—Preceding [[Wikipedia:Signatures|unsigned]] comment added by [[Special:Contributions/142.46.212.114|142.46.212.114]] ([[User talk:142.46.212.114|talk]]) 19:55, 23 October 2007 (UTC)</small><!-- Template:UnsignedIP --> <!--Autosigned by SineBot-->
 
== Requested move 25 March 2018 ==
== Vulnerable InforMation And IT News A new good website ==
 
<div class="boilerplate" style="background-color: #efe; margin: 2em 0 0 0; padding: 0 10px 0 10px; border: 1px dotted #aaa;"><!-- Template:RM top -->
This is a website about IT News,computer security,special computer skills and vulnerable informations ( include Remote Code Execution,Remote File Include,Sql injection,Xss,Bugs etc…)
:''The following is a closed discussion of a [[WP:requested moves|requested move]]. <span style="color:red">'''Please do not modify it.'''</span> Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a [[Wikipedia:move review|move review]]. No further edits should be made to this section. ''
 
The result of the move request was: '''consensus not to move''' the pages at this time, per the discussion below. [[User:Dekimasu|Dekimasu]]<small>[[User talk:Dekimasu|よ!]]</small> 18:33, 31 March 2018 (UTC)
[www.vul.kr]
----
 
* [[:Exploit (computer security)]] → {{no redirect|Exploit}}
or even this one [http://www.hackerscenter.com] which deals with among other things how to hack a wikipedia sysop.[[User:Kurtadkins|Kurtadkins]] ([[User talk:Kurtadkins|talk]]) 15:17, 12 August 2009 (UTC)
* [[:Exploit]] → {{no redirect|Exploit (disambiguation)}}
– This article makes sense as the [[WP:PRIMARYTOPIC]]. It gets 290 views daily with the video game article only getting 33 views daily, and while [[Exploitation of natural resources]] gets a lot of views, nobody would type in "Exploit" to look up that article, they would more likely type [[Exploitation]]. As the clear winner in terms of pageviews and precedence for the term "Exploit", it should be primary. <!-- [[User:DoNotArchiveUntil]] 12:54, 8 April 2018 (UTC) -->{{User:ClueBot III/DoNotArchiveUntil|1523192042}} <sub><small>[[User:Zxcvbnm|ZXCVBNM]] ([[User Talk:Zxcvbnm|TALK]])</small></sub> 12:54, 25 March 2018 (UTC)
 
* '''Oppose''' Per [[WP:PTOPIC]]: "no single criterion for defining a primary topic, two major aspects that are commonly considered are [usage] and [long-term significance]"..."''consensus'' may be useful in determining which topic, if any, is the primary topic." My input is it remain how it is, the term "exploit" has been used to describe labor and resources far longer than video games and computers. Also note PTOPIC's mention of [[Apple]] vs Apple Inc. Internet clicks is irrelevant, it doesn't give the whole picture. Having the disambiguation as the primary is a fair compromise already. [[User:DA1|DA1]] ([[User talk:DA1|talk]]) 17:09, 25 March 2018 (UTC)
**You are talking about the word "exploitation". "Exploit" on its own is not used to describe labor and resources, hence why it's called "labor exploitation" and not "labor exploits". There is a difference, which is why this should point to the subject that uses "Exploit". A hatnote can clear up any confusion.<sub><small>[[User:Zxcvbnm|ZXCVBNM]] ([[User Talk:Zxcvbnm|TALK]])</small></sub> 20:25, 25 March 2018 (UTC)
*'''Oppose''' exploit is a common noun, and verb. This obscure computer security use would be [[WP:ASTONISH]]ing. So far from a [[WP:PT]] surprised to see an RM [[User:In ictu oculi|In ictu oculi]] ([[User talk:In ictu oculi|talk]]) 08:36, 26 March 2018 (UTC)
*'''Oppose''' – does ''not'' make sense as primarytopic. [[User:Dicklyon|Dicklyon]] ([[User talk:Dicklyon|talk]]) 02:52, 27 March 2018 (UTC)
*'''Oppose'''. Oh please! Clearly no primary topic for this common English word. -- [[User:Necrothesp|Necrothesp]] ([[User talk:Necrothesp|talk]]) 13:31, 28 March 2018 (UTC)
----
:''The above discussion is preserved as an archive of a [[Wikipedia:Requested moves|requested move]]. <span style="color:red">'''Please do not modify it.'''</span> Subsequent comments should be made in a new section on this talk page or in a [[Wikipedia:Move review|move review]]. No further edits should be made to this section.''</div><!-- Template:RM bottom -->
 
== Pivoting is a follow-on to an exploit ==
 
It seems that pivoting is not an exploit by itself, but a technique used as a follow-on to an exploit. It doesn't really fit with the article. If it did, then all the follow-on things because of the exploit's success would fit also. Check out the section itself: the VPN application enabling the pivoting is a ''payload'' of an exploit. That's the only mention of the word "exploit" in this section.
 
So,
# Move to [[Pivoting]]
# Fix the disambiguation page [[Pivoting]] too --[[User:Tikmok|Tikmok]] ([[User talk:Tikmok|talk]]) 12:21, 13 August 2024 (UTC)