Template:Computer hacking
{{Sidebar with collapsible lists
| name = Computer hacking
| pretitle = Part of a series on
| wraplinks = true
| image = 80px
| title = Computer hacking
| templatestyles = Computer hacking/styles.css
| class = computer-hacking
| centered list titles = 1
| listclass = hlist
| collapse = {{{collapse|{{{1|all}}}}}}
| list1name = History
| list1title = History
| list1 =
| list2name = Hacker culture and ethic
| list2title = Hacker culture and ethic
| list2 =
- Hackathon
- Hacker Manifesto
- Hackerspace
- Hacktivism
- Maker culture
- Types of hackers
- Black hat
- Grey hat
- White hat
| list3name = Conferences
| list3title = Conferences
| list3 =
- Black Hat Briefings
- Chaos Communication Congress
- DEF CON
- Hackers on Planet Earth
- Security BSides
- ShmooCon
- Summercon
| list4name = Computer crime
| list4title = Computer crime
| list4 =
| list5name = Hacking tools
| list5title = Hacking tools
| list5 =
| list6name = Practice sites
| list6title = Practice sites
| list6 =
| list7name = Malware
| list7title = Malware
| list7 =
- Rootkit
- Backdoor
- Trojan horse
- Virus
- Worm
- Spyware
- Ransomware
- Logic bomb
- Botnet
- Keystroke logging
- HIDS
- Web shell
- RCE
- Infostealer
| list8name = Computer security
| list8title = Computer security
| list8 =
| list9name = Groups
| list9title = Groups
| list9 =
- Anonymous
- Chaos Computer Club
- Homebrew Computer Club (defunct)
- Legion of Doom (defunct)
- LulzSec (defunct)
- Masters of Deception (defunct)
- Red team / Blue team
| list10name = Publications
| list10title = Publications
| list10 =
}}
{{documentation}}