Jump to content

Talk:Computer security software

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Wiki Education Foundation-supported course assignment

[edit]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 1 September 2021 and 15 December 2021. Further details are available on the course page. Student editor(s): Gabe441.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 18:15, 16 January 2022 (UTC)[reply]

Winpatrol

[edit]

Why does Winpatrol redirect to Security Software? Winpatrol is a software program. http://www.winpatrol.com/ and is not a generic concept in computing relating to security. — Preceding unsigned comment added by 203.13.3.94 (talk) 00:41, 18 February 2013 (UTC)[reply]

Requested move 31 December 2016

[edit]
The following is a closed discussion of a requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a move review. No further edits should be made to this section.

The result of the move request was: Moved  — Amakuru (talk) 17:53, 5 January 2017 (UTC)[reply]



Security softwareComputer security software – There is also software concerned with other types of security Fixuture (talk) 02:51, 31 December 2016 (UTC)[reply]


The above discussion is preserved as an archive of a requested move. Please do not modify it. Subsequent comments should be made in a new section on this talk page or in a move review. No further edits should be made to this section.

Vandalism

[edit]

After applying my edits, this article has already begun to attract vandalism. Reverted floating <ref> related to "Español" from anon user with untraceable address using ipv6 tracert tools. IP 2806:108E:11:24FB:D463:18C0:EBA9:C1D7 Appears to end near Los Angeles servers and then tracert is lost. Araesmojo (talk) 19:28, 23 October 2020 (UTC)[reply]

Futuristic security concepts > Futuristic programs: Vague and Ideosyncratic Descriptions

[edit]

I am by no means an expert in computer security. I arrived on this page while trawling for info on antivirus programs. But I wanted to highlight the fact that from the section "Futuristic security concepts", this article veers sharply away from real-world computer security into a catalogue of concepts that seem to be pulled directly from (and indeed make numerous references to) various works of cyberpunk sci-fi. While I realise that computer security is a rapidly evolving field, and what looks like obvious science fiction to me, a non-expert, might look less outlandish to those with expertise in the subject, the overall tone of this section is flighty and frivolous.

In the description for 'Armor': "In the case of simsense environments, this protection then approaches its physical parallel, sheets of data that limit damaging interaction that might otherwise harm a user's physical form." The item for 'Biofeedback' includes the phrase "computational conflict" - broadly accurate, perhaps, but seems rather dramatic. The same entry suggests that a hacker may be "physically wounded if the target has somehow directly linked their body to the internet (like the Matrix movies)".

'Blackout' is described as a "kinder, gentler version" of Biofeedback which "causes stun damage". I presume based on a dice roll?

'Cloudless' refers to "previous incarnations of the Internet" and gives an example of "attempting to remove the idea of Neuromancer itself".

In 'Fork', we're told that "the result of the actions are determined separately against each target." Again: dice rolls?

'Nuke-from-orbit' is, the article tells us, "the only way to be sure".

'Tantrum' apparently "overlays simsense sensations on top of any offensive hacking action, hitting the target with a quick and disgusting sensation if even a small amount of damage is applied". I wouldn't be surprised to find this exact phrase in the manual of a roleplaying game.

A 'Tarball' is an "inaccurate combat program based on the tar-based ICE referenced within Shadowrun literature". Combat program? Shadowrun literature?

These are just a few examples.

As I said, I have no training or experience in computer security. These may in fact be realistic conceptions of what the future of the field may look like; but even in that case, I would strongly recommend the section be extensively reworded to ground it more in reality and to rely less on movie and roleplay game concepts and comparisons. If the entries in this section are as fantastical as they read to me, I suggest the sections be removed. - VexTalionis (talk) 12:06, 4 January 2021 (UTC)[reply]

@VexTalionis: Based on your comments, I have rewritten significant portions of the article to remove some of the more "game centric" ideas and in several areas expanded those articles to feature real-world examples of how these exploits might be accomplished using current (2021) generation hardware and software.