Wikipedia:WikiProject Spam/LinkReports/infosecinstitute.com
{{User:COIBot/Summary/LinkReports}}
{{User:COIBot/linksaverdatabases|||||}}
{{NOINDEX}}
Links
- {{LinkSummary|community.infosecinstitute.com}}
:* community.infosecinstitute.com resolves to 162.159.128.79
:*: {{LinkSummary|162.159.128.79}}
:* Link is not on the blacklist.
:* Link is not on the domainredlist.
:* Link is not on the Monitorlist.
:* None of the mentioned users is on the blacklist.
:* Link is not on the whitelist.
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :ms:MediaWiki:Spam-blacklist ([https://ms.wikipedia.org/w/index.php?diff=5102157&oldid=5016861 diff] - )).
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :simple:MediaWiki:Spam-blacklist ([https://simple.wikipedia.org/w/index.php?diff=9437775&oldid=9275952 diff] - )).
:* Link is blacklisted by \binfosecinstitute\.com\b on [//bs.wikipedia.org/wiki/Mediawiki:Spam-blacklist bs.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//en.wikipedia.org/wiki/Mediawiki:Spam-blacklist en.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ks.wikipedia.org/wiki/Mediawiki:Spam-blacklist ks.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ms.wikipedia.org/wiki/Mediawiki:Spam-blacklist ms.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//simple.wikipedia.org/wiki/Mediawiki:Spam-blacklist simple.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ta.wikipedia.org/wiki/Mediawiki:Spam-blacklist ta.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ur.wikipedia.org/wiki/Mediawiki:Spam-blacklist ur.wikipedia.org]
:* Link is blacklisted by \143*\.com\.* on [//zh.wikipedia.org/wiki/Mediawiki:Spam-blacklist zh.wikipedia.org]
- {{LinkSummary|infosecinstitute.com}}
:* infosecinstitute.com resolves to 217.114.94.2
:*: {{LinkSummary|217.114.94.2}}
:* Link is not on the blacklist.
:* COIBot domainredlist search for link infosecinstitute.com gives:
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([http://en.wikipedia.org/w/index.php?diff=606963558&oldid=606576969 diff]))
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([http://en.wikipedia.org/w/index.php?diff=606966380&oldid=606965422 diff]))
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([http://en.wikipedia.org/w/index.php?diff=606975180&oldid=606966380 diff]))
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([http://en.wikipedia.org/w/index.php?diff=618102519&oldid=618102434 diff]))
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([http://en.wikipedia.org/w/index.php?diff=620814239&oldid=620738062 diff]))
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([http://en.wikipedia.org/w/index.php?diff=620857921&oldid=620857537 diff]))
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([http://en.wikipedia.org/w/index.php?diff=631042503&oldid=631019428 diff]))
:*: infosecinstitute.com (Automonitor: reported to :m:Talk:Spam blacklist ([https://meta.wikimedia.org/w/index.php?diff=13489808&oldid=13487384&rcid=6765929 diff]))
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([https://en.wikipedia.org/w/index.php?diff=679711901&oldid=679400703 diff]))
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([https://en.wikipedia.org/w/index.php?diff=687259893&oldid=687259777 diff]))
:*: infosecinstitute.com (Automonitor: reported to :en:MediaWiki talk:Spam-blacklist ([https://en.wikipedia.org/w/index.php?diff=780415958&oldid=780317680 diff]))
:* Link is not on the Monitorlist.
:* None of the mentioned users is on the blacklist.
:* Link is not on the whitelist.
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :ms:MediaWiki:Spam-blacklist ([https://ms.wikipedia.org/w/index.php?diff=5102157&oldid=5016861 diff] - )).
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :simple:MediaWiki:Spam-blacklist ([https://simple.wikipedia.org/w/index.php?diff=9437775&oldid=9275952 diff] - )).
:* Link is blacklisted by \binfosecinstitute\.com\b on [//bs.wikipedia.org/wiki/Mediawiki:Spam-blacklist bs.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//en.wikipedia.org/wiki/Mediawiki:Spam-blacklist en.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ks.wikipedia.org/wiki/Mediawiki:Spam-blacklist ks.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ms.wikipedia.org/wiki/Mediawiki:Spam-blacklist ms.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//simple.wikipedia.org/wiki/Mediawiki:Spam-blacklist simple.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ta.wikipedia.org/wiki/Mediawiki:Spam-blacklist ta.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ur.wikipedia.org/wiki/Mediawiki:Spam-blacklist ur.wikipedia.org]
:* Link is blacklisted by \143*\.com\.* on [//zh.wikipedia.org/wiki/Mediawiki:Spam-blacklist zh.wikipedia.org]
- {{LinkSummary|r-esources.infosecinstitute.com}}
:* r-esources.infosecinstitute.com resolves to X
:*: {{LinkSummary|X}}
:* Link is not on the blacklist.
:* Link is not on the domainredlist.
:* Link is not on the Monitorlist.
:* None of the mentioned users is on the blacklist.
:* Link is not on the whitelist.
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :ms:MediaWiki:Spam-blacklist ([https://ms.wikipedia.org/w/index.php?diff=5102157&oldid=5016861 diff] - )).
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :simple:MediaWiki:Spam-blacklist ([https://simple.wikipedia.org/w/index.php?diff=9437775&oldid=9275952 diff] - )).
:* Link is blacklisted by \binfosecinstitute\.com\b on [//bs.wikipedia.org/wiki/Mediawiki:Spam-blacklist bs.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//en.wikipedia.org/wiki/Mediawiki:Spam-blacklist en.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ks.wikipedia.org/wiki/Mediawiki:Spam-blacklist ks.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ms.wikipedia.org/wiki/Mediawiki:Spam-blacklist ms.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//simple.wikipedia.org/wiki/Mediawiki:Spam-blacklist simple.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ta.wikipedia.org/wiki/Mediawiki:Spam-blacklist ta.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ur.wikipedia.org/wiki/Mediawiki:Spam-blacklist ur.wikipedia.org]
:* Link is blacklisted by \143*\.com\.* on [//zh.wikipedia.org/wiki/Mediawiki:Spam-blacklist zh.wikipedia.org]
- {{LinkSummary|resources.infosecinstitute.com}}
:* resources.infosecinstitute.com resolves to 172.64.153.158
:*: {{LinkSummary|172.64.153.158}}
:* resources.infosecinstitute.com is hosted on infosecinstitute.comCategory:COIBot LinkReports for redirect sites
:*: {{LinkSummary|infosecinstitute.com}}
:* infosecinstitute.com resolves to 217.114.94.2
:*: {{LinkSummary|217.114.94.2}}
:* {{GoogleAnalyticsSummary|146509}}
:* Link is not on the blacklist.
:* Link is not on the domainredlist.
:* Link is not on the Monitorlist.
:* None of the mentioned users is on the blacklist.
:* Link is not on the whitelist.
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :ms:MediaWiki:Spam-blacklist ([https://ms.wikipedia.org/w/index.php?diff=5102157&oldid=5016861 diff] - )).
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :simple:MediaWiki:Spam-blacklist ([https://simple.wikipedia.org/w/index.php?diff=9437775&oldid=9275952 diff] - )).
:* Link is blacklisted by \binfosecinstitute\.com\b on [//bs.wikipedia.org/wiki/Mediawiki:Spam-blacklist bs.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//en.wikipedia.org/wiki/Mediawiki:Spam-blacklist en.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ks.wikipedia.org/wiki/Mediawiki:Spam-blacklist ks.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ms.wikipedia.org/wiki/Mediawiki:Spam-blacklist ms.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//simple.wikipedia.org/wiki/Mediawiki:Spam-blacklist simple.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ta.wikipedia.org/wiki/Mediawiki:Spam-blacklist ta.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ur.wikipedia.org/wiki/Mediawiki:Spam-blacklist ur.wikipedia.org]
:* Link is blacklisted by \143*\.com\.* on [//zh.wikipedia.org/wiki/Mediawiki:Spam-blacklist zh.wikipedia.org]
- {{LinkSummary|securityiq.infosecinstitute.com}}
:* securityiq.infosecinstitute.com resolves to 18.204.95.21
:*: {{LinkSummary|18.204.95.21}}
:* Link is not on the blacklist.
:* Link is not on the domainredlist.
:* Link is not on the Monitorlist.
:* None of the mentioned users is on the blacklist.
:* Link is not on the whitelist.
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :ms:MediaWiki:Spam-blacklist ([https://ms.wikipedia.org/w/index.php?diff=5102157&oldid=5016861 diff] - )).
:* Link would be caught by rule \binfosecinstitute\.com\b on the monitor list (Automonitor: reported to :simple:MediaWiki:Spam-blacklist ([https://simple.wikipedia.org/w/index.php?diff=9437775&oldid=9275952 diff] - )).
:* Link is blacklisted by \binfosecinstitute\.com\b on [//bs.wikipedia.org/wiki/Mediawiki:Spam-blacklist bs.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//en.wikipedia.org/wiki/Mediawiki:Spam-blacklist en.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ks.wikipedia.org/wiki/Mediawiki:Spam-blacklist ks.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ms.wikipedia.org/wiki/Mediawiki:Spam-blacklist ms.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//simple.wikipedia.org/wiki/Mediawiki:Spam-blacklist simple.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ta.wikipedia.org/wiki/Mediawiki:Spam-blacklist ta.wikipedia.org]
:* Link is blacklisted by \binfosecinstitute\.com\b on [//ur.wikipedia.org/wiki/Mediawiki:Spam-blacklist ur.wikipedia.org]
:* Link is blacklisted by \143*\.com\.* on [//zh.wikipedia.org/wiki/Mediawiki:Spam-blacklist zh.wikipedia.org]
Users
- {{IPSummary|1.179.196.65}}
- {{IPSummary|109.95.25.234}}
- {{IPSummary|12.15.69.51}}
- {{IPSummary|162.218.1.62}}
- {{IPSummary|173.208.202.154}}
- {{IPSummary|188.27.81.64}}
- {{IPSummary|188.4.218.152}}
- {{IPSummary|199.198.251.109}}
- {{IPSummary|2.86.239.143}}
- {{UserSummary|2001:4898:80E8:2:693D:1EDC:EA87:517D}}
- {{UserSummary|2A02:2788:228:2EE:DCAF:3471:29FB:AE9F}}
- {{IPSummary|37.6.3.114}}
- {{IPSummary|46.204.12.214}}
- {{IPSummary|50.169.189.176}}
- {{IPSummary|74.96.227.149}}
- {{IPSummary|77.173.90.33}}
- {{IPSummary|80.187.122.174}}
- {{IPSummary|82.136.210.153}}
- {{IPSummary|83.237.3.50}}
- {{IPSummary|89.247.107.117}}
- {{IPSummary|91.129.106.140}}
- {{IPSummary|94.250.239.234}}
- {{IPSummary|98.117.64.193}}
- {{UserSummary|A5b}}
- ASammour
- : User is whitelisted: User is in a trusted group rollbacker on some wikis
- {{UserSummary|Ademuth1}}
- {{UserSummary|Albertajunkie}}
- {{UserSummary|AlishaNagarkar}}
- {{UserSummary|Anetek}}
- {{UserSummary|AshMo90}}
- {{UserSummary|Aspat25}}
- {{UserSummary|Auledas}}
- {{UserSummary|Avaya1}}
- {{UserSummary|AvoinlÃÂähde}}
- {{UserSummary|Avoinlähde}}
- {{UserSummary|Awm165}}
- {{UserSummary|Bellaoui}}
- {{UserSummary|Ben.okucu}}
- Bezik
- : User is whitelisted: User is in trusted groups sysop, reviewer on some wikis
- {{UserSummary|Bfull342}}
- {{UserSummary|Bmjpking}}
- {{UserSummary|BonifaceFR}}
- {{UserSummary|Bonwinj}}
- {{UserSummary|Borjalor}}
- {{UserSummary|Bountyleader}}
- Bradv
- : User is whitelisted: User is in trusted groups sysop, checkuser on some wikis
- {{UserSummary|Brenani}}
- {{UserSummary|Bricomsci}}
- {{UserSummary|Bugmenot123123123}}
- {{UserSummary|Citizen Kimi}}
- {{UserSummary|Cloud200}}
- {{UserSummary|Cody Gore}}
- {{UserSummary|CynK6}}
- {{UserSummary|Darker Dreams}}
- {{UserSummary|David pogrebeshsky}}
- {{UserSummary|DecorumForum125}}
- {{UserSummary|Deku-shrub}}
- {{UserSummary|Detininroman}}
- {{UserSummary|Dgerzog}}
- Diannaa
- : User is whitelisted: User is in trusted groups sysop, rollbacker on some wikis
- {{UserSummary|Dorito voador20}}
- Elvey
- : User is whitelisted: User is in a trusted group rollbacker on some wikis
- {{UserSummary|Erdi Hida}}
- {{UserSummary|Fercufer}}
- {{UserSummary|Fixuture}}
- Flamenc
- : User is whitelisted: User is in a trusted group sysop on some wikis
- Francewhoa
- : User is whitelisted: User is in a trusted group reviewer on some wikis
- {{UserSummary|Freemind TG}}
- {{UserSummary|Ghettoblaster}}
- Glenn
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Govindk56}}
- {{UserSummary|Govindk567}}
- GreenC bot
- : User is whitelisted: User is in a trusted group bot on some wikis
- {{UserSummary|Guillaume.f}}
- {{UserSummary|Guy Harris}}
- {{UserSummary|Henrypentest}}
- {{UserSummary|Hiiisparks}}
- {{UserSummary|Iamdave7f}}
- {{UserSummary|Iglassman1}}
- {{UserSummary|Ikkeer}}
- {{UserSummary|Ipr1}}
- {{UserSummary|J Rodriguez MIT}}
- {{UserSummary|JJayStocks}}
- {{UserSummary|Jako w}}
- {{UserSummary|Jashan27}}
- {{UserSummary|Jaszczuroczłek}}
- {{UserSummary|Jeriches}}
- {{UserSummary|Joerex101}}
- {{UserSummary|Johnathan.g.freeman}}
- Johnuniq
- : User is whitelisted: User is in trusted groups sysop, rollbacker on some wikis
- Jytdog
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- {{UserSummary|Kannonie}}
- {{UserSummary|Kelly Kubsch}}
- {{UserSummary|KernSibbald}}
- {{UserSummary|Kljtech}}
- {{UserSummary|Kmiguel02}}
- {{UserSummary|Kyle.long098}}
- {{UserSummary|Lawclass02}}
- {{UserSummary|Lentulo}}
- {{UserSummary|Liaon98}}
- {{UserSummary|MEvica}}
- {{UserSummary|Machinexa}}
- {{UserSummary|Magawla61}}
- {{UserSummary|Magere Hein}}
- {{UserSummary|Maike a}}
- {{UserSummary|MalzFan}}
- {{UserSummary|Markbassett}}
- {{UserSummary|Marmirych}}
- Marteau
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- {{UserSummary|Mateenrehan}}
- Medol
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Meggo608}}
- {{UserSummary|MichielN}}
- {{UserSummary|Miky96}}
- Milliped
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Mor.nitesh}}
- {{UserSummary|Mvb71}}
- {{UserSummary|Naga Sravani Dasari}}
- {{UserSummary|Ne0Freedom}}
- NewsBots
- : User is whitelisted: User is in a trusted group bot on some wikis
- {{UserSummary|Nidhisgupta}}
- Nil Einne
- : User is whitelisted: User is in trusted groups rollbacker, reviewer on some wikis
- OT38
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Obs1dianOwl}}
- {{UserSummary|OussamaAksbi}}
- {{UserSummary|OzQu}}
- {{UserSummary|Pdalal3}}
- {{UserSummary|PeachFuzzer}}
- {{UserSummary|Peter39c}}
- {{UserSummary|PhotographyEdits}}
- {{UserSummary|Raidv}}
- Ronn
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Rungspeek}}
- {{UserSummary|Rx1334}}
- {{UserSummary|Rúdisicyon}}
- {{UserSummary|Sakerfan47}}
- Sanandros
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Serro03}}
- {{UserSummary|ShadowBee}}
- {{UserSummary|Shaheen27}}
- {{UserSummary|Shilpacs}}
- {{UserSummary|Siwibegewp}}
- {{UserSummary|Sjm37}}
- {{UserSummary|Slava Sahakyan70}}
- {{UserSummary|Sophiamccain}}
- {{UserSummary|Spencerthellmann}}
- {{UserSummary|Spikeyrock}}
- Sporti
- : User is whitelisted: User is in trusted groups sysop, rollbacker on some wikis
- {{UserSummary|Srilekha selva}}
- {{UserSummary|Statuc97}}
- {{UserSummary|Suwa}}
- Tegel
- : User is whitelisted: User is in trusted groups sysop, rollbacker, steward, checkuser, reviewer on some wikis
- {{UserSummary|Tekowalsky}}
- {{UserSummary|TheRandomIP}}
- {{UserSummary|Thetechgirl}}
- ToBeFree
- : User is whitelisted: User is in trusted groups sysop, checkuser on some wikis
- {{UserSummary|ToorCon}}
- {{UserSummary|Trioadijo}}
- {{UserSummary|Télécom ParisTech groupe 6}}
- VateGV
- : User is whitelisted: User is in a trusted group sysop on some wikis
- {{UserSummary|Vinnypolston}}
- {{UserSummary|Wecandobetter}}
- {{UserSummary|Whatisyourbug}}
- XXBlackburnXx
- : User is whitelisted: User is in trusted groups sysop, rollbacker, checkuser, reviewer on some wikis
- {{UserSummary|Xxmarijnw}}
- {{UserSummary|Yae4}}
- {{UserSummary|Yasuo Miyakawa}}
- {{UserSummary|Zindagi713}}
- {{UserSummary|Лилит Сакеян}}
- علاء
- : User is whitelisted: User is in trusted groups sysop, steward on some wikis
Additions
{{User:COIBot/Additionlist_top}}
{{User:COIBot/EditSummary|id=608092802|lang=en|wikidomain=w|namespace=Talk|pagename=NSA ANT catalog|username=Elvey|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=56265934|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2014-05-03|time=19:45:04|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=923|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group rollbacker on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=923|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=608092236|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=Elvey|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=56277177|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2014-05-04|time=13:59:31|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=923|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group rollbacker on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=923|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=//resources.infosecinstitute.com|domain=|U=923|L=999999999|UL=X|WUL=X}}}}
{{User:COIBot/EditSummary|id=608092225|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=Elvey|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=56277190|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2014-05-04|time=13:59:55|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=923|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group rollbacker on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=923|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=608092199|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=Elvey|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=56277197|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2014-05-04|time=14:00:21|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=923|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group rollbacker on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=923|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607549698|lang=en|wikidomain=w|namespace=|pagename=Microsoft-specific exception handling mechanisms|username=188.27.81.64|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=57472778|edit_id=-3|resolved=104.18.34.98|isIP=1|date=2014-07-09|time=00:30:32|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=156|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=156|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607534089|lang=en|wikidomain=w|namespace=|pagename=SORM|username=Cloud200|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=57725864|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2014-07-23|time=10:00:20|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=19087|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=19087|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607534088|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=Cloud200|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=57725932|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2014-07-23|time=10:06:17|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=19087|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=19087|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607511940|lang=en|wikidomain=w|namespace=|pagename=Brandon Gray Internet Services|username=82.136.210.153|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=58140068|edit_id=-3|resolved=104.18.34.98|isIP=1|date=2014-08-09|time=16:20:29|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1560|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=1560|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607502266|lang=en|wikidomain=w|namespace=|pagename=System Management Mode|username=83.237.3.50|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=58293264|edit_id=-3|resolved=104.18.34.98|isIP=1|date=2014-08-16|time=00:11:59|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=4|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=28991047|lang=fr|wikidomain=w|namespace=|pagename=Social Engineering Toolkit|username=BonifaceFR|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques-3-0/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=http://fr.wikipedia.org/w/index.php?diff=107290649&oldid=100355743&rcid=125544106|edit_id=-2|resolved=X|isIP=0|date=2014-09-09|time=16:05:28|wiki=fr.wikipedia.org|revid=107290649|oldid=100355743|usercount=10103|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/phishing-and-social-engineering-techniques-3-0/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques-3-0/|domain=resources.infosecinstitute.com|U=10103|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ehacking.net/2011/08/social-engineering-toolkit-tutorial.html|domain=ehacking.net|U=10103|L=28|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607465731|lang=en|wikidomain=w|namespace=|pagename=Bacula|username=KernSibbald|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=58881108|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2014-09-13|time=11:43:36|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=21|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=21|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=30645278|lang=fi|wikidomain=w|namespace=|pagename=Aikajana merkittävistä tietokoneviruksista ja madoista|username=OzQu|link=resources.infosecinstitute.com/history-malware-part-three-1993-1999/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=http://fi.wikipedia.org/w/index.php?diff=14330238&oldid=13208624|edit_id=-2|resolved=X|isIP=0|date=2014-09-24|time=09:53:13|wiki=fi.wikipedia.org|revid=14330238|oldid=13208624|usercount=114|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/history-malware-part-three-1993-1999/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/history-malware-part-three-1993-1999/|domain=resources.infosecinstitute.com|U=114|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607410896|lang=en|wikidomain=w|namespace=|pagename=Domain hijacking|username=50.169.189.176|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=59603148|edit_id=-3|resolved=104.18.34.98|isIP=1|date=2014-10-17|time=00:26:49|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=2|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=33572887|lang=el|wikidomain=b|namespace=|pagename=Τεχνική Νομοθεσία Για Μηχανικούς Πληροφορικής/Αναλύστε ένα εργαλείο λογισμικού για FORENSICS|username=188.4.218.152|link=resources.infosecinstitute.com/metadata-the-hidden-treasure/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=http://el.wikibooks.org/w/index.php?diff=32579&oldid=32578|edit_id=-2|resolved=X|isIP=1|date=2014-10-18|time=14:40:09|wiki=el.wikibooks.org|revid=32579|oldid=32578|usercount=6|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/playing-hide-and-seek-with-metadata/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/metadata-the-hidden-treasure/|domain=resources.infosecinstitute.com|U=6|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=thehackernews.com/2012/04/forensic-foca-power-of-metadata-in.html|domain=thehackernews.com|U=6|L=1893|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.staroffice.org|domain=staroffice.org|U=6|L=6|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=office.microsoft.com|domain=office.microsoft.com|U=6|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.informatica64.com/forensicfoca/|domain=informatica64.com|U=6|L=3|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.informatica64.com|domain=informatica64.com|U=6|L=3|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=33787959|lang=de|wikidomain=w|namespace=|pagename=Online-Casino|username=Lentulo|link=resources.infosecinstitute.com/legal-aspects-of-online-gambling/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=http://de.wikipedia.org/w/index.php?diff=135064283&oldid=134896398|edit_id=-2|resolved=X|isIP=0|date=2014-10-20|time=17:36:51|wiki=de.wikipedia.org|revid=135064283|oldid=134896398|usercount=17|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/legal-aspects-of-online-gambling/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.olswang.com/articles/2012/10/online-gambling-is-taking-off-in-belgium/|domain=olswang.com|U=17|L=84|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.gamingcommission.fgov.be/opencms/opencms/jhksweb_fr/home/index.html|domain=gamingcommission.fgov.be|U=17|L=36|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.casinoguru.net/de/legalitat-von-online-casinos/|domain=casinoguru.net|U=17|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.agco.on.ca/en/whatwedo/criminalcode.aspx|domain=agco.on.ca|U=17|L=23|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.crikey.com.au/2011/06/22/last-bets-around-the-world-in-online-casinos-first-stop-gibraltar/|domain=crikey.com.au|U=17|L=7242|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.findlaw.com.au/articles/478/interactive-gambling-act-receives-assent.aspx|domain=findlaw.com.au|U=17|L=337|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=thenextweb.com/us/2013/03/22/a-historical-moment-888-first-online-gambling-firm-to-obtain-us-license/|domain=thenextweb.com|U=17|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.forbes.com/sites/nathanvardi/2011/12/23/department-of-justice-flip-flops-on-internet-gambling/|domain=forbes.com|U=17|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/legal-aspects-of-online-gambling/|domain=resources.infosecinstitute.com|U=17|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=whoswholegal.com/news/features/article/29234/online-gambling-law-belgium-recent-developments/|domain=whoswholegal.com|U=17|L=436|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=europa.eu/rapid/press-release_IP-12-1135_de.htm|domain=europa.eu|U=17|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607334683|lang=en|wikidomain=w|namespace=|pagename=Nmap|username=Marteau|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=60874022|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2014-12-14|time=01:15:49|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2798|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=2798|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607239349|lang=en|wikidomain=w|namespace=User|pagename=Govindk567|username=Govindk567|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=61894448|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2015-01-23|time=11:40:40|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3170|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=3170|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607239244|lang=en|wikidomain=w|namespace=User|pagename=Govindk567|username=Govindk567|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=61894463|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2015-01-23|time=11:41:45|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3170|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=3170|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607239224|lang=en|wikidomain=w|namespace=User|pagename=Govindk567|username=Govindk567|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=61894470|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2015-01-23|time=11:42:06|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3170|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=3170|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607239153|lang=en|wikidomain=w|namespace=User|pagename=Govindk567|username=Govindk567|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=61894477|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2015-01-23|time=11:42:39|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3170|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=3170|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607239107|lang=en|wikidomain=w|namespace=User|pagename=Govindk567|username=Govindk567|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=61894493|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2015-01-23|time=11:43:11|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3170|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=3170|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=607239083|lang=en|wikidomain=w|namespace=User|pagename=Govindk567|username=Govindk567|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=61894498|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2015-01-23|time=11:43:24|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3170|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=3170|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606573913|lang=en|wikidomain=w|namespace=|pagename=Steve Gibson (computer programmer)|username=Jytdog|link=resources.infosecinstitute.com|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=62331815|edit_id=-3|resolved=104.18.34.98|isIP=0|date=2015-02-08|time=22:28:34|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=23876|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com|domain=resources.infosecinstitute.com|U=23876|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606531526|lang=en|wikidomain=w|namespace=|pagename=Enterprise mobility management|username=89.247.107.117|link=resources.infosecinstitute.com/bringing-security-risks-byod-encryption-policy/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=62528911|edit_id=-3|resolved=X|isIP=1|date=2015-02-16|time=10:55:11|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/bringing-security-risks-byod-encryption-policy/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/bringing-security-risks-byod-encryption-policy/|domain=resources.infosecinstitute.com|U=5|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606531506|lang=en|wikidomain=w|namespace=|pagename=Enterprise mobility management|username=89.247.107.117|link=resources.infosecinstitute.com/bringing-security-risks-byod-encryption-policy/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=62528915|edit_id=-3|resolved=X|isIP=1|date=2015-02-16|time=10:55:30|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/bringing-security-risks-byod-encryption-policy/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/bringing-security-risks-byod-encryption-policy/|domain=resources.infosecinstitute.com|U=5|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606481913|lang=en|wikidomain=w|namespace=|pagename=Cloud computing|username=Awm165|link=resources.infosecinstitute.com/2013-impact-cybercrime/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=62817606|edit_id=-3|resolved=X|isIP=0|date=2015-02-27|time=12:38:10|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=8|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/2013-impact-cybercrime/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/2013-impact-cybercrime/|domain=resources.infosecinstitute.com|U=8|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606430475|lang=en|wikidomain=w|namespace=|pagename=Mass surveillance in the United States|username=Sakerfan47|link=resources.infosecinstitute.com/classified-nsa-exploit-tools-radon-dewsweeper-work/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=63107808|edit_id=-3|resolved=X|isIP=0|date=2015-03-10|time=22:55:09|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=9|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/classified-nsa-exploit-tools-radon-dewsweeper-work/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/classified-nsa-exploit-tools-radon-dewsweeper-work/|domain=resources.infosecinstitute.com|U=9|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606430465|lang=en|wikidomain=w|namespace=|pagename=Mass surveillance in the United States|username=Sakerfan47|link=resources.infosecinstitute.com/classified-nsa-exploit-tools-radon-dewsweeper-work/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=63107812|edit_id=-3|resolved=X|isIP=0|date=2015-03-10|time=22:55:26|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=9|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/classified-nsa-exploit-tools-radon-dewsweeper-work/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/classified-nsa-exploit-tools-radon-dewsweeper-work/|domain=resources.infosecinstitute.com|U=9|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606426217|lang=en|wikidomain=w|namespace=|pagename=Man-in-the-browser|username=199.198.251.109|link=resources.infosecinstitute.com/imperva%E2%80%99s-amichai-shulman-discusses-the-boy-in-the-browser-attack/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=63146595|edit_id=-3|resolved=X|isIP=1|date=2015-03-12|time=15:59:53|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1238|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/imperva%E2%80%99s-amichai-shulman-discusses-the-boy-in-the-browser-attack/|domain=resources.infosecinstitute.com|U=1238|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606426204|lang=en|wikidomain=w|namespace=|pagename=Man-in-the-browser|username=199.198.251.109|link=resources.infosecinstitute.com/imperva%E2%80%99s-amichai-shulman-discusses-the-boy-in-the-browser-attack/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=63146697|edit_id=-3|resolved=X|isIP=1|date=2015-03-12|time=16:05:19|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1238|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/imperva%E2%80%99s-amichai-shulman-discusses-the-boy-in-the-browser-attack/|domain=resources.infosecinstitute.com|U=1238|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606410153|lang=en|wikidomain=w|namespace=|pagename=Bullrun (decryption program)|username=Lawclass02|link=resources.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=63254443|edit_id=-3|resolved=X|isIP=0|date=2015-03-17|time=06:08:49|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/|domain=resources.infosecinstitute.com|U=2|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606410150|lang=en|wikidomain=w|namespace=|pagename=Bullrun (decryption program)|username=Lawclass02|link=resources.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=63254447|edit_id=-3|resolved=X|isIP=0|date=2015-03-17|time=06:09:06|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/|domain=resources.infosecinstitute.com|U=2|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606393535|lang=en|wikidomain=w|namespace=User talk|pagename=Diannaa|username=Diannaa|link=resources.infosecinstitute.com/how-to-prevent-cross-site-scripting-attacks/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=63822831|edit_id=-3|resolved=X|isIP=0|date=2015-03-22|time=02:21:47|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=219381|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/application-security/how-to-prevent-cross-site-scripting-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/how-to-prevent-cross-site-scripting-attacks/|domain=resources.infosecinstitute.com|U=219381|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606393498|lang=en|wikidomain=w|namespace=User talk|pagename=Diannaa|username=Diannaa|link=resources.infosecinstitute.com/how-to-prevent-cross-site-scripting-attacks/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=63822847|edit_id=-3|resolved=X|isIP=0|date=2015-03-22|time=02:22:45|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=219381|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/application-security/how-to-prevent-cross-site-scripting-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/how-to-prevent-cross-site-scripting-attacks/|domain=resources.infosecinstitute.com|U=219381|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606385469|lang=en|wikidomain=w|namespace=User talk|pagename=Phantomsteve|username=Thetechgirl|link=resources.infosecinstitute.com/issap-salary/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=63890734|edit_id=-3|resolved=X|isIP=0|date=2015-03-24|time=21:06:49|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=45|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/cissp/issap-salary/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/issap-salary/|domain=resources.infosecinstitute.com|U=45|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606343034|lang=en|wikidomain=w|namespace=|pagename=ArpON|username=Spikeyrock|link=resources.infosecinstitute.com/attacking-arp/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=64053908|edit_id=-3|resolved=X|isIP=0|date=2015-03-31|time=17:59:19|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=37|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/incident-response-resources/address-resolution-protocol-arp-with-wireshark/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/attacking-arp/|domain=resources.infosecinstitute.com|U=37|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606230875|lang=en|wikidomain=w|namespace=|pagename=Bullrun (decryption program)|username=Mor.nitesh|link=resources.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=64423093|edit_id=-3|resolved=X|isIP=0|date=2015-04-16|time=01:03:55|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=62|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/nsa-surveillance-changing-users-internet-exp/|domain=resources.infosecinstitute.com|U=62|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=54769768|lang=zh|wikidomain=w|namespace=|pagename=洋葱路由|username=Liaon98|link=resources.infosecinstitute.com/good-tor-2014/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=http://zh.wikipedia.org/w/index.php?diff=35178604&oldid=34938877|edit_id=-2|resolved=X|isIP=0|date=2015-04-18|time=10:14:10|wiki=zh.wikipedia.org|revid=35178604|oldid=34938877|usercount=7695|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/good-tor-2014/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/good-tor-2014/|domain=resources.infosecinstitute.com|U=7695|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arstechnica.com/news.ars/post/20070830-security-researcher-stumbles-across-embassy-e-mail-log-ins.html|domain=arstechnica.com|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=threatpost.com/researcher-finds-tor-exit-node-adding-malware-to-binaries/109008|domain=threatpost.com|U=7695|L=2835|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1145%2F1042031.1042032|domain=dx.doi.org|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=gnunet.org/sites/default/files/Wright-2004.pdf|domain=gnunet.org|U=7695|L=405|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=svn.torproject.org/svn/projects/design-paper/tor-design.html|domain=svn.torproject.org|U=7695|L=61|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007%2F11863908_2|domain=dx.doi.org|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007/11863908_2|domain=dx.doi.org|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.onion-router.net/Publications/tor-design.pdf|domain=onion-router.net|U=7695|L=387|UL=6|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=blog.washingtonpost.com/securityfix/2007/08/attacks_prompt_update_for_tor.html?nav=rss_blog|domain=blog.washingtonpost.com|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140407091125/http://blog.washingtonpost.com/securityfix/2007/08/attacks_prompt_update_for_tor.html?nav=rss_blog|domain=web.archive.org|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.torproject.org/about/sponsors.html.en|domain=torproject.org|U=7695|L=5986|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.torproject.org/docs/faq#WhyCalledTor|domain=torproject.org|U=7695|L=5986|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archives.seul.org/or/dev/Sep-2002/msg00019.html|domain=archives.seul.org|U=7695|L=296|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.com/books?id=qGLjvFNuaM4C&printsec=frontcover&dq=WikiLeaks:+Inside+Julian+Assange%27s+War+on+Secrecy&hl=en&sa=X&ei=gesAVP36NNGPyATnhYLoCQ&ved=0CB8Q6AEwAA#v=onepage&q=WikiLeaks%3A%20Inside%20Julian%20Assange%27s%20War%20on%20Secrecy&f=false|domain=books.google.com|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.com/books?id=qM0uxPH8RasC&printsec=frontcover&dq=The+Armed+Forces:+Instrument+of+Peace,+Strength,+Development+and+Prosperity&hl=en&sa=X&ei=_-oAVKD1J8uMyAS41IGYCA&ved=0CCoQ6AEwAA#v=onepage&q=The%20Armed%20Forces%3A%20Instrument%20of%20Peace%2C%20Strength%2C%20Development%20and%20Prosperity&f=false|domain=books.google.com|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=pando.com/2014/07/16/tor-spooks/|domain=pando.com|U=7695|L=3721|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=worldwide.espacenet.com/textdoc?DB=EPODOC&IDX=US6266704|domain=worldwide.espacenet.com|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=668972|domain=ieeexplore.ieee.org|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.onion-router.net/Publications/CACM-1999.pdf|domain=onion-router.net|U=7695|L=387|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606074529|lang=en|wikidomain=w|namespace=User|pagename=Michael thomas 89/sandbox|username=94.250.239.234|link=resources.infosecinstitute.com/file-integrity-monitoring-fim-pci-dss/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=64579855|edit_id=-3|resolved=X|isIP=1|date=2015-04-21|time=12:01:48|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/file-integrity-monitoring-fim-pci-dss/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/file-integrity-monitoring-fim-pci-dss/|domain=resources.infosecinstitute.com|U=5|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=606071309|lang=en|wikidomain=w|namespace=|pagename=WordPress|username=Vinnypolston|link=resources.infosecinstitute.com/7-best-wordpress-security-plugins/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=65501796|edit_id=-3|resolved=X|isIP=0|date=2015-04-22|time=01:56:25|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/7-best-wordpress-security-plugins/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/7-best-wordpress-security-plugins/|domain=resources.infosecinstitute.com|U=2|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=63880325|lang=ja|wikidomain=w|namespace=|pagename=フィッシング (詐欺)|username=Yasuo Miyakawa|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=http://ja.wikipedia.org/w/index.php?diff=55722284&oldid=55719167|edit_id=-2|resolved=X|isIP=0|date=2015-06-01|time=12:01:37|wiki=ja.wikipedia.org|revid=55722284|oldid=55719167|usercount=5657|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=-1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/phishing-and-social-engineering-techniques-3-0/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques/|domain=resources.infosecinstitute.com|U=5657|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques/|domain=resources.infosecinstitute.com|U=5657|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques/|domain=resources.infosecinstitute.com|U=5657|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575391844|lang=en|wikidomain=w|namespace=Talk|pagename=Kill Chain|username=Darker Dreams|link=resources.infosecinstitute.com/cyber-kill-chain-is-a-great-idea-but-is-it-something-your-company-can-implement/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=66999907|edit_id=-3|resolved=X|isIP=0|date=2015-06-10|time=14:23:15|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1600|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/cyber-kill-chain-is-a-great-idea-but-is-it-something-your-company-can-implement/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-kill-chain-is-a-great-idea-but-is-it-something-your-company-can-implement/|domain=resources.infosecinstitute.com|U=1600|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575391841|lang=en|wikidomain=w|namespace=Talk|pagename=Kill Chain|username=Darker Dreams|link=resources.infosecinstitute.com/cyber-kill-chain-is-a-great-idea-but-is-it-something-your-company-can-implement/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=66999981|edit_id=-3|resolved=X|isIP=0|date=2015-06-10|time=14:27:40|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1600|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/cyber-kill-chain-is-a-great-idea-but-is-it-something-your-company-can-implement/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-kill-chain-is-a-great-idea-but-is-it-something-your-company-can-implement/|domain=resources.infosecinstitute.com|U=1600|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575382114|lang=en|wikidomain=w|namespace=User|pagename=Govindk56|username=Govindk56|link=resources.infosecinstitute.com/ramp-5-levels-top-50-network-administrator-interview-questions/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=67482401|edit_id=-3|resolved=X|isIP=0|date=2015-07-02|time=02:38:01|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15498|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/ramp-5-levels-top-50-network-administrator-interview-questions/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/ramp-5-levels-top-50-network-administrator-interview-questions/|domain=resources.infosecinstitute.com|U=15498|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575382102|lang=en|wikidomain=w|namespace=User|pagename=Govindk56|username=Govindk56|link=resources.infosecinstitute.com/ramp-5-levels-top-50-network-administrator-interview-questions/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=67482410|edit_id=-3|resolved=X|isIP=0|date=2015-07-02|time=02:38:23|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15498|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/ramp-5-levels-top-50-network-administrator-interview-questions/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/ramp-5-levels-top-50-network-administrator-interview-questions/|domain=resources.infosecinstitute.com|U=15498|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575374087|lang=en|wikidomain=w|namespace=User|pagename=Joerex101|username=Joerex101|link=resources.infosecinstitute.com/author/joseph-rex/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=67826744|edit_id=-3|resolved=X|isIP=0|date=2015-07-18|time=09:52:03|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/author/joseph-rex/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/author/joseph-rex/|domain=resources.infosecinstitute.com|U=3|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575362512|lang=en|wikidomain=w|namespace=Talk|pagename=List of Tor hidden services|username=Deku-shrub|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68210277|edit_id=-3|resolved=X|isIP=0|date=2015-08-06|time=13:22:40|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=3908|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575362508|lang=en|wikidomain=w|namespace=Talk|pagename=List of Tor hidden services|username=Deku-shrub|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68210280|edit_id=-3|resolved=X|isIP=0|date=2015-08-06|time=13:22:59|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=3908|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575346539|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Carding (fraud)|username=Deku-shrub|link=resources.infosecinstitute.com/card-fraud-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68514692|edit_id=-3|resolved=X|isIP=0|date=2015-08-20|time=23:25:15|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/card-fraud-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/card-fraud-in-the-deep-web/|domain=resources.infosecinstitute.com|U=3908|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575333475|lang=en|wikidomain=w|namespace=User|pagename=Ne0Freedom/sandbox|username=Ne0Freedom|link=resources.infosecinstitute.com/equation-group-apt-tao-nsa-two-hacking-arsenals-similar/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68731854|edit_id=-3|resolved=X|isIP=0|date=2015-08-31|time=15:52:07|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=538|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/equation-group-apt-tao-nsa-two-hacking-arsenals-similar/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/equation-group-apt-tao-nsa-two-hacking-arsenals-similar/|domain=resources.infosecinstitute.com|U=538|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575329078|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Dark Web|username=Deku-shrub|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68843459|edit_id=-3|resolved=X|isIP=0|date=2015-09-05|time=21:21:29|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=3908|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=73886742|lang=en|wikidomain=w|namespace=|pagename=Dark web|username=Deku-shrub|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?diff=679642136&oldid=679620700|edit_id=-2|resolved=X|isIP=0|date=2015-09-05|time=21:23:46|wiki=en.wikipedia.org|revid=679642136|oldid=679620700|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=3908|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575329075|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Dark Web|username=Deku-shrub|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68843532|edit_id=-3|resolved=X|isIP=0|date=2015-09-05|time=21:25:40|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web|domain=resources.infosecinstitute.com|U=3908|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575329045|lang=en|wikidomain=w|namespace=Talk|pagename=Dark Web|username=Fixuture|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68845918|edit_id=-3|resolved=X|isIP=0|date=2015-09-06|time=00:40:38|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5553|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=5553|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575329041|lang=en|wikidomain=w|namespace=Talk|pagename=Dark Web|username=Fixuture|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68845927|edit_id=-3|resolved=X|isIP=0|date=2015-09-06|time=00:41:25|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5553|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=5553|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575329032|lang=en|wikidomain=w|namespace=Talk|pagename=Dark Web|username=Fixuture|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68846050|edit_id=-3|resolved=X|isIP=0|date=2015-09-06|time=00:53:18|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5553|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=5553|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575328870|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Darknet market|username=Deku-shrub|link=infosecinstitute.com|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=68852500|edit_id=-3|resolved=217.114.94.2|isIP=0|date=2015-09-06|time=09:00:32|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=infosecinstitute.com|domain=infosecinstitute.com|U=3908|L=50|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575323234|lang=en|wikidomain=w|namespace=Draft|pagename=Carding (fraud)|username=Deku-shrub|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=69008650|edit_id=-3|resolved=X|isIP=0|date=2015-09-13|time=20:33:42|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=3908|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=74727306|lang=en|wikidomain=w|namespace=|pagename=Carding (fraud)|username=Deku-shrub|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web<nowiki>|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?diff=680885292&oldid=680884376|edit_id=-2|resolved=X|isIP=0|date=2015-09-13|time=20:34:12|wiki=en.wikipedia.org|revid=680885292|oldid=680884376|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/hacking-communities-in-the-deep-web<nowiki>/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web<nowiki>|domain=resources.infosecinstitute.com|U=3908|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575323233|lang=en|wikidomain=w|namespace=Draft|pagename=Carding (fraud)|username=Deku-shrub|link=r-esources.infosecinstitute.com/hacking-communities-in-the-deep-web|sortdomain=com.infosecinstitute.r-esources.|domain=r-esources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=69008661|edit_id=-3|resolved=X|isIP=0|date=2015-09-13|time=20:34:42|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3908|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=r-esources.infosecinstitute.com/hacking-communities-in-the-deep-web|domain=r-esources.infosecinstitute.com|U=3908|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575315926|lang=en|wikidomain=w|namespace=Draft|pagename=Virtual private network|username=Shaheen27|link=resources.infosecinstitute.com/tunneling-crypto-and-vpns/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=69226985|edit_id=-3|resolved=X|isIP=0|date=2015-09-23|time=12:08:14|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/cryptography/tunneling-crypto-and-vpns/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/tunneling-crypto-and-vpns/|domain=resources.infosecinstitute.com|U=4|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575286229|lang=en|wikidomain=w|namespace=Talk|pagename=Supply chain attack|username=David pogrebeshsky|link=resources.infosecinstitute.com/cyber-security-in-supply-chain-management-part-1/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=70116542|edit_id=-3|resolved=X|isIP=0|date=2015-10-27|time=12:17:09|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=57|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/cyber-security-in-supply-chain-management-part-1/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/|domain=resources.infosecinstitute.com|U=57|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-security-in-supply-chain-management-part-1/|domain=resources.infosecinstitute.com|U=57|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575284412|lang=en|wikidomain=w|namespace=User|pagename=Johnuniq/sandbox2|username=Johnuniq|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=70160398|edit_id=-3|resolved=X|isIP=0|date=2015-10-29|time=09:33:19|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=36758|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=36758|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575281243|lang=en|wikidomain=w|namespace=User|pagename=Database encryption|username=Spencerthellmann|link=resources.infosecinstitute.com/symmetric-asymmetric-encryption/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=70223887|edit_id=-3|resolved=X|isIP=0|date=2015-11-01|time=10:53:05|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=47|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/cryptography/symmetric-asymmetric-encryption/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/symmetric-asymmetric-encryption/|domain=resources.infosecinstitute.com|U=47|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575237327|lang=en|wikidomain=w|namespace=User|pagename=Doxing|username=Bmjpking|link=resources.infosecinstitute.com/doxing-the-dark-side-of-reconnaissance/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=70854769|edit_id=-3|resolved=X|isIP=0|date=2015-11-30|time=19:37:56|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=10|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/dark-web-fraud-how-to-guides-make-cybercrime-too-easy/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/doxing-the-dark-side-of-reconnaissance/|domain=resources.infosecinstitute.com|U=10|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575237322|lang=en|wikidomain=w|namespace=User|pagename=Doxing|username=Bmjpking|link=resources.infosecinstitute.com/doxing-the-dark-side-of-reconnaissance/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=70854783|edit_id=-3|resolved=X|isIP=0|date=2015-11-30|time=19:39:01|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=10|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/dark-web-fraud-how-to-guides-make-cybercrime-too-easy/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/doxing-the-dark-side-of-reconnaissance/|domain=resources.infosecinstitute.com|U=10|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575191480|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Reference desk/Computing|username=Nil Einne|link=resources.infosecinstitute.com/legality-jailbreaking-mobile-phones/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=71624958|edit_id=-3|resolved=X|isIP=0|date=2016-01-06|time=15:58:58|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2266|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups rollbacker, reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/legality-jailbreaking-mobile-phones/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/legality-jailbreaking-mobile-phones/|domain=resources.infosecinstitute.com|U=2266|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=93878923|lang=sl|wikidomain=w|namespace=|pagename=Mariposa (botnet)|username=Trioadijo|link=resources.infosecinstitute.com/botnets-how-do-they-work-architectures-and-case-studies-part-2/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://sl.wikipedia.org/w/index.php?oldid=4559300&rcid=8066266|edit_id=-2|resolved=X|isIP=0|date=2016-01-09|time=15:52:24|wiki=sl.wikipedia.org|revid=4559300|oldid=0|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/botnets-how-do-they-work-architectures-and-case-studies-part-2/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.neowin.net/news/fbi-announces-arrest-of-10-people-over-butterfly-botnet|domain=neowin.net|U=5|L=9217|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/technology-25506016|domain=bbc.com|U=5|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/botnets-how-do-they-work-architectures-and-case-studies-part-2/|domain=resources.infosecinstitute.com|U=5|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.zdnet.com/article/how-the-butterfly-botnet-was-broken/|domain=zdnet.com|U=5|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.scmagazineuk.com/mariposa-inspired-butterfly-botnet-reported-as-having-infected-computers-globally/article/206449/|domain=scmagazineuk.com|U=5|L=1346|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=94582592|lang=el|wikidomain=b|namespace=|pagename=Ανάλυση ενός εργαλείου forensic|username=2.86.239.143|link=resources.infosecinstitute.com/anti-forensics-part-1/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://el.wikibooks.org/w/index.php?diff=40440&oldid=40439|edit_id=-2|resolved=X|isIP=1|date=2016-01-12|time=02:44:52|wiki=el.wikibooks.org|revid=40440|oldid=40439|usercount=6|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/computer-forensics-anti-forensic-tools-techniques/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/anti-forensics-part-1/|domain=resources.infosecinstitute.com|U=6|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/anti-forensics-part-1/|domain=resources.infosecinstitute.com|U=6|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=blog.priveonlabs.com/sec_blog.php?title=forensic-basics-slack-space&more=1&c=1&tb=1&pb=1|domain=blog.priveonlabs.com|U=6|L=2|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=blog.priveonlabs.com/sec_blog.php?title=forensic-basics-slack-space&more=1&c=1&tb=1&pb=1|domain=blog.priveonlabs.com|U=6|L=2|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.computerhope.com/jargon/s/slack-space.htm|domain=computerhope.com|U=6|L=2917|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.computerhope.com/jargon/s/slack-space.htm|domain=computerhope.com|U=6|L=2917|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=94666320|lang=ru|wikidomain=w|namespace=|pagename=Palantir|username=Bezik|link=resources.infosecinstitute.com/the-palantir-technologies-model-lights-and-shadows-on-a-case-of-success/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://ru.wikipedia.org/w/index.php?diff=75714576&oldid=75670544|edit_id=-2|resolved=X|isIP=0|date=2016-01-12|time=10:52:15|wiki=ru.wikipedia.org|revid=75714576|oldid=75670544|usercount=9213|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/the-palantir-technologies-model-lights-and-shadows-on-a-case-of-success/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/the-palantir-technologies-model-lights-and-shadows-on-a-case-of-success/|domain=resources.infosecinstitute.com|U=9213|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=94863632|lang=sl|wikidomain=w|namespace=|pagename=Wiper|username=Brenani|link=resources.infosecinstitute.com/cyber-attack-sony-pictures-much-data-breach/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://sl.wikipedia.org/w/index.php?diff=4560591&oldid=4560590|edit_id=-2|resolved=X|isIP=0|date=2016-01-12|time=20:35:13|wiki=sl.wikipedia.org|revid=4560591|oldid=4560590|usercount=23|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/news/cyber-attack-sony-pictures-much-data-breach/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-attack-sony-pictures-much-data-breach/|domain=resources.infosecinstitute.com|U=23|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securityaffairs.co/wordpress/30791/cyber-crime/trendmicro-analyzed-wiper-malware-infected-sony-pictures.html|domain=securityaffairs.co|U=23|L=534|UL=4|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securityaffairs.co/wordpress/30791/cyber-crime/trendmicro-analyzed-wiper-malware-infected-sony-pictures.html|domain=securityaffairs.co|U=23|L=534|UL=4|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securityaffairs.co/wordpress/30875/cyber-crime/wiper-malware-hit-sony-picture-written-korean.html|domain=securityaffairs.co|U=23|L=534|UL=4|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securityaffairs.co/wordpress/30875/cyber-crime/wiper-malware-hit-sony-picture-written-korean.html|domain=securityaffairs.co|U=23|L=534|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575138443|lang=en|wikidomain=w|namespace=Draft|pagename=Jonathan Brossard|username=Sophiamccain|link=resources.infosecinstitute.com/close-look-nsa-monitor-catalog-server-hacking/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=72320041|edit_id=-3|resolved=X|isIP=0|date=2016-02-05|time=02:00:24|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=135|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/close-look-nsa-monitor-catalog-server-hacking/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/close-look-nsa-monitor-catalog-server-hacking/|domain=resources.infosecinstitute.com|U=135|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575138439|lang=en|wikidomain=w|namespace=Draft|pagename=Jonathan Brossard|username=Sophiamccain|link=resources.infosecinstitute.com/close-look-nsa-monitor-catalog-server-hacking/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=72320045|edit_id=-3|resolved=X|isIP=0|date=2016-02-05|time=02:00:52|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=135|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/close-look-nsa-monitor-catalog-server-hacking/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/close-look-nsa-monitor-catalog-server-hacking/|domain=resources.infosecinstitute.com|U=135|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575138438|lang=en|wikidomain=w|namespace=Draft|pagename=Jonathan Brossard|username=Sophiamccain|link=resources.infosecinstitute.com/close-look-nsa-monitor-catalog-server-hacking/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=72320059|edit_id=-3|resolved=X|isIP=0|date=2016-02-05|time=02:01:34|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=135|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/close-look-nsa-monitor-catalog-server-hacking/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/close-look-nsa-monitor-catalog-server-hacking/|domain=resources.infosecinstitute.com|U=135|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=108953668|lang=fr|wikidomain=w|namespace=Utilisateur|pagename=Bellaoui/Brouillon|username=Bellaoui|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=123164461&oldid=123164358&rcid=165295370|edit_id=-2|resolved=X|isIP=0|date=2016-02-08|time=18:47:50|wiki=fr.wikipedia.org|revid=123164461|oldid=123164358|usercount=67|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/u-s-privacy-and-cybersecurity-laws-an-overview/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|domain=resources.infosecinstitute.com|U=67|L=282|UL=14|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|domain=resources.infosecinstitute.com|U=67|L=282|UL=14|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=120709087|lang=fr|wikidomain=w|namespace=|pagename=Crowdsensing|username=Bellaoui|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/:|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=123255010&oldid=123254917&rcid=165737818|edit_id=-2|resolved=X|isIP=0|date=2016-02-11|time=16:02:13|wiki=fr.wikipedia.org|revid=123255010|oldid=123254917|usercount=67|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/:/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/:|domain=resources.infosecinstitute.com|U=67|L=282|UL=14|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575132205|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Requested articles/Applied arts and sciences/Computer science, computing, and Internet|username=74.96.227.149|link=resources.infosecinstitute.com/reverse-deception/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=72512586|edit_id=-3|resolved=X|isIP=1|date=2016-02-13|time=22:59:58|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/reverse-deception/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/reverse-deception/|domain=resources.infosecinstitute.com|U=2|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575132204|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Requested articles/Applied arts and sciences/Computer science, computing, and Internet|username=74.96.227.149|link=resources.infosecinstitute.com/reverse-deception/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=72512596|edit_id=-3|resolved=X|isIP=1|date=2016-02-13|time=23:00:36|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/reverse-deception/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/reverse-deception/|domain=resources.infosecinstitute.com|U=2|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=147999481|lang=fr|wikidomain=w|namespace=|pagename=Crowdsensing|username=Bellaoui|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/%20State%20of%20the%20Art%20and%20Privacy%20Aspects|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=123369025&oldid=123368800&rcid=166496610|edit_id=-2|resolved=X|isIP=0|date=2016-02-15|time=12:07:58|wiki=fr.wikipedia.org|revid=123369025|oldid=123368800|usercount=67|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/%20state%20of%20the%20art%20and%20privacy%20aspects/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/%20State%20of%20the%20Art%20and%20Privacy%20Aspects|domain=resources.infosecinstitute.com|U=67|L=282|UL=14|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=135267631|lang=fr|wikidomain=w|namespace=|pagename=Crowdsensing|username=Bellaoui|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/:|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=123369516&oldid=123369296&rcid=166501383|edit_id=-2|resolved=X|isIP=0|date=2016-02-15|time=12:25:02|wiki=fr.wikipedia.org|revid=123369516|oldid=123369296|usercount=67|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/:/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/:|domain=resources.infosecinstitute.com|U=67|L=282|UL=14|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=135217022|lang=fr|wikidomain=w|namespace=|pagename=Crowdsensing|username=Bellaoui|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/%20Crowdsensing|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=123369911&oldid=123369756&rcid=166505742|edit_id=-2|resolved=X|isIP=0|date=2016-02-15|time=12:38:02|wiki=fr.wikipedia.org|revid=123369911|oldid=123369756|usercount=67|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/%20crowdsensing/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/%20Crowdsensing|domain=resources.infosecinstitute.com|U=67|L=282|UL=14|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=148502756|lang=nl|wikidomain=w|namespace=Gebruiker|pagename=Gebruiker:Bountyleader/Kladblok|username=Bountyleader|link=resources.infosecinstitute.com/hunting-malware-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://nl.wikipedia.org/w/index.php?diff=46064471&oldid=46064256&rcid=78650623|edit_id=-2|resolved=X|isIP=0|date=2016-02-20|time=12:16:12|wiki=nl.wikipedia.org|revid=46064471|oldid=46064256|usercount=19|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/hunting-malware-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hunting-malware-deep-web/|domain=resources.infosecinstitute.com|U=19|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/|domain=pcadvisor.co.uk|U=19|L=4273|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=108432688|lang=en|wikidomain=b|namespace=|pagename=An Internet of Everything?/Access to Knowledge and Data in Everyday Life|username=Wecandobetter|link=resources.infosecinstitute.com/a-history-of-anonymous/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikibooks.org/w/index.php?diff=3061928&oldid=3061925|edit_id=-2|resolved=X|isIP=0|date=2016-03-11|time=10:05:18|wiki=en.wikibooks.org|revid=3061928|oldid=3061925|usercount=8|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/a-history-of-anonymous/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/a-history-of-anonymous/|domain=resources.infosecinstitute.com|U=8|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/a-history-of-anonymous/|domain=resources.infosecinstitute.com|U=8|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575063755|lang=en|wikidomain=w|namespace=User|pagename=Certified Ethical Hacker|username=Freemind TG|link=www.infosecinstitute.com/courses/ethical_hacking_training.html|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=73612190|edit_id=-3|resolved=X|isIP=0|date=2016-03-28|time=13:48:17|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses/ethical_hacking_training.html|domain=infosecinstitute.com|U=4|L=50|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=575063754|lang=en|wikidomain=w|namespace=User|pagename=Certified Ethical Hacker|username=Freemind TG|link=www.infosecinstitute.com/courses/ethical_hacking_training.html|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=73612241|edit_id=-3|resolved=X|isIP=0|date=2016-03-28|time=13:51:47|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=4|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses/ethical_hacking_training.html|domain=infosecinstitute.com|U=4|L=50|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=131611585|lang=nl|wikidomain=w|namespace=|pagename=Dark web|username=Bountyleader|link=resources.infosecinstitute.com/hunting-malware-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://nl.wikipedia.org/w/index.php?oldid=46696508&rcid=81633012|edit_id=-2|resolved=X|isIP=0|date=2016-05-14|time=09:22:29|wiki=nl.wikipedia.org|revid=46696508|oldid=0|usercount=19|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/hunting-malware-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.linkedin.com/pulse/how-terrorists-communicate-dark-web-anurag-harsh|domain=linkedin.com|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.helpnetsecurity.com/2016/04/08/dark-web-content/|domain=helpnetsecurity.com|U=19|L=714|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.co.uk/programmes/b04grp09|domain=bbc.co.uk|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.youtube.com/watch?v=MaDl4laMVTo|domain=youtube.com|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=be-nl.norton.com/botnet|domain=be-nl.norton.com|U=19|L=10|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hunting-malware-deep-web/|domain=resources.infosecinstitute.com|U=19|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/|domain=pcadvisor.co.uk|U=19|L=4273|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/technology-30637010|domain=bbc.com|U=19|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574955037|lang=en|wikidomain=w|namespace=User|pagename=PeachFuzzer/PeachFuzzer|username=PeachFuzzer|link=resources.infosecinstitute.com/fuzzing-vulnserver-with-peach-part-2/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=75026030|edit_id=-3|resolved=X|isIP=0|date=2016-05-19|time=23:41:16|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=60|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/penetration-testing/fuzzing-introduction-definition-types-and-tools-for-cybersecurity-pros/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/fuzzing-vulnserver-with-peach-part-2/|domain=resources.infosecinstitute.com|U=60|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574886368|lang=en|wikidomain=w|namespace=Template talk|pagename=Pos malware|username=Srilekha selva|link=resources.infosecinstitute.com/malware-based-attacks-pos-systems/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=75603890|edit_id=-3|resolved=X|isIP=0|date=2016-06-17|time=09:10:42|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=266|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/malware-based-attacks-pos-systems/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/malware-based-attacks-pos-systems/|domain=resources.infosecinstitute.com|U=266|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=144312593|lang=fr|wikidomain=w|namespace=|pagename=Fake (informatique)|username=Télécom ParisTech groupe 6|link=resources.infosecinstitute.com/error-level-analysis-detect-image-manipulation/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=127155456&oldid=127155196&rcid=193478190|edit_id=-2|resolved=X|isIP=0|date=2016-06-18|time=11:33:50|wiki=fr.wikipedia.org|revid=127155456|oldid=127155196|usercount=0|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/error-level-analysis-detect-image-manipulation/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=fotoforensics.com/tutorial-ela.php|domain=fotoforensics.com|U=0|L=30|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/error-level-analysis-detect-image-manipulation/|domain=resources.infosecinstitute.com|U=0|L=282|UL=0|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574845085|lang=en|wikidomain=w|namespace=Draft|pagename=Bishop Fox|username=Kelly Kubsch|link=resources.infosecinstitute.com/fifteen-famous-bug-bounty-hunters/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=75800199|edit_id=-3|resolved=X|isIP=0|date=2016-06-27|time=04:47:53|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=47|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/fifteen-famous-bug-bounty-hunters/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/fifteen-famous-bug-bounty-hunters/|domain=resources.infosecinstitute.com|U=47|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574800838|lang=en|wikidomain=w|namespace=User talk|pagename=173.208.202.154|username=173.208.202.154|link=resources.infosecinstitute.com/wp-admin/?replycontent=Cold+Front+Moves+In+%E9%88%A5?February+2016+M%26A+Activity+|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=75872124|edit_id=-3|resolved=X|isIP=1|date=2016-06-30|time=15:35:15|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=452|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/wp-admin/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/wp-admin/?replycontent=Cold+Front+Moves+In+%E9%88%A5?February+2016+M%26A+Activity+|domain=resources.infosecinstitute.com|U=452|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574603008|lang=en|wikidomain=w|namespace=Draft|pagename=CenterPOS Malware|username=Srilekha selva|link=resources.infosecinstitute.com/pos-malwareall-you-need-to-know/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=76492771|edit_id=-3|resolved=X|isIP=0|date=2016-08-02|time=05:00:09|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=266|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/pos-malwareall-you-need-to-know/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/pos-malwareall-you-need-to-know/|domain=resources.infosecinstitute.com|U=266|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574547217|lang=en|wikidomain=w|namespace=Draft|pagename=CenterPOS Malware|username=Srilekha selva|link=resources.infosecinstitute.com/pos-malwareall-you-need-to-know/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=76888513|edit_id=-3|resolved=X|isIP=0|date=2016-08-23|time=09:31:04|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=266|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/pos-malwareall-you-need-to-know/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/pos-malwareall-you-need-to-know/|domain=resources.infosecinstitute.com|U=266|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574531267|lang=en|wikidomain=w|namespace=User talk|pagename=Teredo tunneling|username=Tekowalsky|link=resources.infosecinstitute.com/teredo-tunneling/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77141617|edit_id=-3|resolved=X|isIP=0|date=2016-09-05|time=00:56:06|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=6|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/teredo-tunneling/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/teredo-tunneling/|domain=resources.infosecinstitute.com|U=6|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574531266|lang=en|wikidomain=w|namespace=User talk|pagename=Teredo tunneling|username=Tekowalsky|link=resources.infosecinstitute.com/teredo-tunneling/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77141620|edit_id=-3|resolved=X|isIP=0|date=2016-09-05|time=00:56:30|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=6|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/teredo-tunneling/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/teredo-tunneling/|domain=resources.infosecinstitute.com|U=6|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=169939914|lang=tr|wikidomain=w|namespace=|pagename=Bal küpü|username=Magawla61|link=resources.infosecinstitute.com/what-is-a-honey-pot/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://tr.wikipedia.org/w/index.php?diff=17627330&oldid=17627268|edit_id=-2|resolved=X|isIP=0|date=2016-09-22|time=13:50:28|wiki=tr.wikipedia.org|revid=17627330|oldid=17627268|usercount=6089|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/what-is-a-honey-pot/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/what-is-a-honey-pot/|domain=resources.infosecinstitute.com|U=6089|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/what-is-a-honey-pot/|domain=resources.infosecinstitute.com|U=6089|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574507530|lang=en|wikidomain=w|namespace=User|pagename=YARA|username=Milliped|link=resources.infosecinstitute.com/yara-simple-effective-way-dissecting-malware/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77521295|edit_id=-3|resolved=X|isIP=0|date=2016-09-22|time=16:32:30|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3052|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/yara-simple-effective-way-dissecting-malware/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/yara-simple-effective-way-dissecting-malware/|domain=resources.infosecinstitute.com|U=3052|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574507108|lang=en|wikidomain=w|namespace=User|pagename=Mateenrehan/sandbox|username=Mateenrehan|link=resources.infosecinstitute.com/securing-cookies-httponly-secure-flags/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77529197|edit_id=-3|resolved=X|isIP=0|date=2016-09-23|time=01:29:09|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=16|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/securing-cookies-httponly-secure-flags/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/securing-cookies-httponly-secure-flags/|domain=resources.infosecinstitute.com|U=16|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574507104|lang=en|wikidomain=w|namespace=User|pagename=Mateenrehan/sandbox|username=Mateenrehan|link=resources.infosecinstitute.com/securing-cookies-httponly-secure-flags/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77529225|edit_id=-3|resolved=X|isIP=0|date=2016-09-23|time=01:30:02|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=16|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/securing-cookies-httponly-secure-flags/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/securing-cookies-httponly-secure-flags/|domain=resources.infosecinstitute.com|U=16|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574482272|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Software Development Security|username=Sjm37|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77923087|edit_id=-3|resolved=X|isIP=0|date=2016-10-09|time=16:29:57|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/guiding-principles-in-information-security/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|domain=resources.infosecinstitute.com|U=18|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574482263|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Software Development Security|username=Sjm37|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77923090|edit_id=-3|resolved=X|isIP=0|date=2016-10-09|time=16:30:13|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/guiding-principles-in-information-security/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|domain=resources.infosecinstitute.com|U=18|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574482254|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Software Development Security|username=Sjm37|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77923301|edit_id=-3|resolved=X|isIP=0|date=2016-10-09|time=16:41:30|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/guiding-principles-in-information-security/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|domain=resources.infosecinstitute.com|U=18|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574482252|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Software Development Security|username=Sjm37|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77923313|edit_id=-3|resolved=X|isIP=0|date=2016-10-09|time=16:42:07|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/guiding-principles-in-information-security/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|domain=resources.infosecinstitute.com|U=18|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574482250|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Software Development Security|username=Sjm37|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77923319|edit_id=-3|resolved=X|isIP=0|date=2016-10-09|time=16:42:38|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/guiding-principles-in-information-security/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|domain=resources.infosecinstitute.com|U=18|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574482243|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Software Development Security|username=Sjm37|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=77923325|edit_id=-3|resolved=X|isIP=0|date=2016-10-09|time=16:42:48|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/guiding-principles-in-information-security/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/guiding-principles-in-information-security/|domain=resources.infosecinstitute.com|U=18|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=184584538|lang=de|wikidomain=w|namespace=|pagename=Registrierungsdatenbank|username=TheRandomIP|link=resources.infosecinstitute.com/forensic-investigation-windows-machines/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://de.wikipedia.org/w/index.php?diff=159495007&oldid=159492077|edit_id=-2|resolved=X|isIP=0|date=2016-11-08|time=11:04:17|wiki=de.wikipedia.org|revid=159495007|oldid=159492077|usercount=10033|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/forensic-investigation-windows-machines/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/forensic-investigation-windows-machines/|domain=resources.infosecinstitute.com|U=10033|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.de/books?id=Y06H-cZAiwAC&pg=PA398#v=onepage|domain=books.google.de|U=10033|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574412372|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Mobile Crowdsensing|username=Jeriches|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=78690694|edit_id=-3|resolved=X|isIP=0|date=2016-11-13|time=10:06:49|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/u-s-privacy-and-cybersecurity-laws-an-overview/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|domain=resources.infosecinstitute.com|U=5|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574412366|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Mobile Crowdsensing|username=Jeriches|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=78690701|edit_id=-3|resolved=X|isIP=0|date=2016-11-13|time=10:07:11|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/u-s-privacy-and-cybersecurity-laws-an-overview/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|domain=resources.infosecinstitute.com|U=5|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574410851|lang=en|wikidomain=w|namespace=Talk|pagename=Codeproof|username=Shilpacs|link=resources.infosecinstitute.com/infosec-institute-interview-satish-shetty-of-codeproof-technologies/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=78725130|edit_id=-3|resolved=X|isIP=0|date=2016-11-15|time=00:24:42|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=54|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/infosec-institute-interview-satish-shetty-of-codeproof-technologies/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/infosec-institute-interview-satish-shetty-of-codeproof-technologies/|domain=resources.infosecinstitute.com|U=54|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=190323006|lang=et|wikidomain=w|namespace=Kasutaja|pagename=WEP|username=Raidv|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://et.wikipedia.org/w/index.php?diff=4522789&oldid=4522760|edit_id=-2|resolved=X|isIP=0|date=2016-11-21|time=21:42:47|wiki=et.wikipedia.org|revid=4522789|oldid=4522760|usercount=152|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/20-popular-wireless-hacking-tools-updated-for-2016/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|domain=resources.infosecinstitute.com|U=152|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574402750|lang=en|wikidomain=w|namespace=User|pagename=Naga Sravani Dasari/sandbox|username=Naga Sravani Dasari|link=resources.infosecinstitute.com/social-engineering-a-hacking-story/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=78917009|edit_id=-3|resolved=X|isIP=0|date=2016-11-23|time=20:17:40|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=25|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/social-engineering-a-hacking-story/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/social-engineering-a-hacking-story/|domain=resources.infosecinstitute.com|U=25|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574402740|lang=en|wikidomain=w|namespace=User|pagename=Naga Sravani Dasari/sandbox|username=Naga Sravani Dasari|link=resources.infosecinstitute.com/social-engineering-a-hacking-story/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=78917017|edit_id=-3|resolved=X|isIP=0|date=2016-11-23|time=20:17:57|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=25|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/social-engineering-a-hacking-story/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/social-engineering-a-hacking-story/|domain=resources.infosecinstitute.com|U=25|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574397582|lang=en|wikidomain=w|namespace=File|pagename=YARA|username=Markbassett|link=resources.infosecinstitute.com/yara-simple-effective-way-dissecting-malware/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=79018060|edit_id=-3|resolved=X|isIP=0|date=2016-11-28|time=16:13:02|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2369|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/yara-simple-effective-way-dissecting-malware/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/yara-simple-effective-way-dissecting-malware/|domain=resources.infosecinstitute.com|U=2369|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=194957827|lang=nl|wikidomain=w|namespace=|pagename=Dark web|username=XXBlackburnXx|link=resources.infosecinstitute.com/hunting-malware-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://nl.wikipedia.org/w/index.php?diff=48102911&oldid=48102907&rcid=87129839|edit_id=-2|resolved=X|isIP=0|date=2016-12-03|time=12:07:12|wiki=nl.wikipedia.org|revid=48102911|oldid=48102907|usercount=15179|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker, checkuser, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/hunting-malware-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=creativecommons.org/licenses/by-sa/3.0/deed.nl|domain=creativecommons.org|U=15179|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.linkedin.com/pulse/how-terrorists-communicate-dark-web-anurag-harsh|domain=linkedin.com|U=15179|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.helpnetsecurity.com/2016/04/08/dark-web-content/|domain=helpnetsecurity.com|U=15179|L=714|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.co.uk/programmes/b04grp09|domain=bbc.co.uk|U=15179|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.youtube.com/watch?v=MaDl4laMVTo|domain=youtube.com|U=15179|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=be-nl.norton.com/botnet|domain=be-nl.norton.com|U=15179|L=10|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hunting-malware-deep-web/|domain=resources.infosecinstitute.com|U=15179|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/|domain=pcadvisor.co.uk|U=15179|L=4273|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/technology-30637010|domain=bbc.com|U=15179|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=194957994|lang=nl|wikidomain=w|namespace=|pagename=Dark web|username=Xxmarijnw|link=resources.infosecinstitute.com/hunting-malware-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://nl.wikipedia.org/w/index.php?diff=48102921&oldid=48102919&rcid=87129878|edit_id=-2|resolved=X|isIP=0|date=2016-12-03|time=12:08:13|wiki=nl.wikipedia.org|revid=48102921|oldid=48102919|usercount=4616|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/hunting-malware-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=creativecommons.org/licenses/by-sa/3.0/deed.nl|domain=creativecommons.org|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.linkedin.com/pulse/how-terrorists-communicate-dark-web-anurag-harsh|domain=linkedin.com|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.helpnetsecurity.com/2016/04/08/dark-web-content/|domain=helpnetsecurity.com|U=4616|L=714|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.co.uk/programmes/b04grp09|domain=bbc.co.uk|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.youtube.com/watch?v=MaDl4laMVTo|domain=youtube.com|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=be-nl.norton.com/botnet|domain=be-nl.norton.com|U=4616|L=10|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hunting-malware-deep-web/|domain=resources.infosecinstitute.com|U=4616|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/|domain=pcadvisor.co.uk|U=4616|L=4273|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/technology-30637010|domain=bbc.com|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=196177271|lang=fr|wikidomain=w|namespace=Utilisateur|pagename=Utilisateur:Jako w/Brouillon|username=Guillaume.f|link=resources.infosecinstitute.com/cellphone-surveillance-the-secret-arsenal/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=132436818&oldid=132435852&rcid=235016594|edit_id=-2|resolved=X|isIP=0|date=2016-12-06|time=09:42:52|wiki=fr.wikipedia.org|revid=132436818|oldid=132435852|usercount=70|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/cellphone-surveillance-the-secret-arsenal/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cellphone-surveillance-the-secret-arsenal/|domain=resources.infosecinstitute.com|U=70|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cellphone-surveillance-the-secret-arsenal/|domain=resources.infosecinstitute.com|U=70|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=imsicatcher.info/article/equipment-list/|domain=imsicatcher.info|U=70|L=3|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=imsicatcher.info/article/equipment-list/|domain=imsicatcher.info|U=70|L=3|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=link.springer.com/chapter/10.1007/978-3-319-29742-2_3|domain=link.springer.com|U=70|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=link.springer.com/chapter/10.1007/978-3-319-29742-2_3|domain=link.springer.com|U=70|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=umtrx.org|domain=umtrx.org|U=70|L=2|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=nuand.com|domain=nuand.com|U=70|L=8|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ettus.com/product/details/UB210-KIT|domain=ettus.com|U=70|L=63|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574388529|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Articles for deletion/Crowdsensing|username=Bradv|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=79230708|edit_id=-3|resolved=X|isIP=0|date=2016-12-06|time=23:34:20|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=8284|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, checkuser on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/u-s-privacy-and-cybersecurity-laws-an-overview/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|domain=resources.infosecinstitute.com|U=8284|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=196484246|lang=sl|wikidomain=w|namespace=|pagename=Anonymous (skupina)|username=MEvica|link=resources.infosecinstitute.com/a-history-of-anonymous/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://sl.wikipedia.org/w/index.php?oldid=4727596&rcid=11773143|edit_id=-2|resolved=X|isIP=0|date=2016-12-07|time=21:27:46|wiki=sl.wikipedia.org|revid=4727596|oldid=0|usercount=30|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/a-history-of-anonymous/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=techcrunch.com/2011/06/23/lulzsec-releases-arizona-law-enforcement-data-in-retaliation-for-immigration-law/|domain=techcrunch.com|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcmag.com/article2/0,2817,2389447,00.asp|domain=pcmag.com|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnet.com/news/antisec-hackers-post-stolen-police-data-as-revenge-for-arrests/|domain=cnet.com|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.foxnews.com/tech/2012/03/06/hacking-group-lulzsec-swept-up-by-law-enforcement.html|domain=foxnews.com|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/uk-14315442|domain=bbc.com|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.foxnews.com/tech/2011/07/19/leading-member-lulzsec-hacker-squad-arrested-in-london.html|domain=foxnews.com|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.monitor.si/novica/anonymous-slovenija-vdrl-v-ameriski-fbi/153543/|domain=monitor.si|U=30|L=87|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.prlekija-on.net/lokalno/3754/spletna-stran-obcine-ljutomer-tarca-skupine-anonymous.html|domain=prlekija-on.net|U=30|L=97|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.finance.si/339380|domain=finance.si|U=30|L=686|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.rtvslo.si/svet/anonymous-znova-grozi-sloveniji/276612|domain=rtvslo.si|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.politikis.si/?p=51974|domain=politikis.si|U=30|L=116|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.telecomasia.net/content/massive-data-breach-exposes-all-philippines-voters|domain=telecomasia.net|U=30|L=1165|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hackread.com/anonymous-target-donald-trump-website/|domain=hackread.com|U=30|L=825|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.dnevnik.si/1042706297|domain=dnevnik.si|U=30|L=5690|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/|domain=krebsonsecurity.com|U=30|L=2986|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hackread.com/8-most-awesome-hacks-conducted-by-anonymous-hackers/|domain=hackread.com|U=30|L=825|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080705202321/http://www.thelegality.com/archives/22|domain=web.archive.org|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=theminaretonline.com/2011/11/30/is-anonymous-friend-or-foe/|domain=theminaretonline.com|U=30|L=156|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/a-history-of-anonymous/|domain=resources.infosecinstitute.com|U=30|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theguardian.com/technology/2012/sep/08/anonymous-behind-masks-cyber-insurgents|domain=theguardian.com|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=content.time.com/time/specials/packages/article/0,28804,2111975_2111976_2112122,00.html|domain=content.time.com|U=30|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574387233|lang=en|wikidomain=w|namespace=Talk|pagename=Crowdsensing|username=Cody Gore|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=79260000|edit_id=-3|resolved=X|isIP=0|date=2016-12-08|time=04:25:39|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/u-s-privacy-and-cybersecurity-laws-an-overview/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|domain=resources.infosecinstitute.com|U=5|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574387232|lang=en|wikidomain=w|namespace=Talk|pagename=Crowdsensing|username=Cody Gore|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=79260008|edit_id=-3|resolved=X|isIP=0|date=2016-12-08|time=04:26:23|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/u-s-privacy-and-cybersecurity-laws-an-overview/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|domain=resources.infosecinstitute.com|U=5|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574387231|lang=en|wikidomain=w|namespace=Talk|pagename=Crowdsensing|username=Cody Gore|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=79260014|edit_id=-3|resolved=X|isIP=0|date=2016-12-08|time=04:27:07|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/u-s-privacy-and-cybersecurity-laws-an-overview/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/crowdsensing-state-art-privacy-aspects/|domain=resources.infosecinstitute.com|U=5|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=198706394|lang=sl|wikidomain=w|namespace=|pagename=Anonymous|username=Sporti|link=resources.infosecinstitute.com/a-history-of-anonymous/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://sl.wikipedia.org/w/index.php?diff=4727633&oldid=4727598|edit_id=-2|resolved=X|isIP=0|date=2016-12-08|time=07:25:05|wiki=sl.wikipedia.org|revid=4727633|oldid=4727598|usercount=247643|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/a-history-of-anonymous/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=techcrunch.com/2011/06/23/lulzsec-releases-arizona-law-enforcement-data-in-retaliation-for-immigration-law/|domain=techcrunch.com|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcmag.com/article2/0,2817,2389447,00.asp|domain=pcmag.com|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnet.com/news/antisec-hackers-post-stolen-police-data-as-revenge-for-arrests/|domain=cnet.com|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.foxnews.com/tech/2012/03/06/hacking-group-lulzsec-swept-up-by-law-enforcement.html|domain=foxnews.com|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/uk-14315442|domain=bbc.com|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.foxnews.com/tech/2011/07/19/leading-member-lulzsec-hacker-squad-arrested-in-london.html|domain=foxnews.com|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.monitor.si/novica/anonymous-slovenija-vdrl-v-ameriski-fbi/153543/|domain=monitor.si|U=247643|L=87|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.prlekija-on.net/lokalno/3754/spletna-stran-obcine-ljutomer-tarca-skupine-anonymous.html|domain=prlekija-on.net|U=247643|L=97|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.finance.si/339380|domain=finance.si|U=247643|L=686|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.rtvslo.si/svet/anonymous-znova-grozi-sloveniji/276612|domain=rtvslo.si|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.politikis.si/?p=51974|domain=politikis.si|U=247643|L=116|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.telecomasia.net/content/massive-data-breach-exposes-all-philippines-voters|domain=telecomasia.net|U=247643|L=1165|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hackread.com/anonymous-target-donald-trump-website/|domain=hackread.com|U=247643|L=825|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.dnevnik.si/1042706297|domain=dnevnik.si|U=247643|L=5690|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/|domain=krebsonsecurity.com|U=247643|L=2986|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hackread.com/8-most-awesome-hacks-conducted-by-anonymous-hackers/|domain=hackread.com|U=247643|L=825|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080705202321/http://www.thelegality.com/archives/22|domain=web.archive.org|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=theminaretonline.com/2011/11/30/is-anonymous-friend-or-foe/|domain=theminaretonline.com|U=247643|L=156|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/a-history-of-anonymous/|domain=resources.infosecinstitute.com|U=247643|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theguardian.com/technology/2012/sep/08/anonymous-behind-masks-cyber-insurgents|domain=theguardian.com|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=content.time.com/time/specials/packages/article/0,28804,2111975_2111976_2112122,00.html|domain=content.time.com|U=247643|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574384936|lang=en|wikidomain=w|namespace=User|pagename=Maike a/sandbox|username=Maike a|link=resources.infosecinstitute.com/security-challenges-in-the-internet-of-things-iot/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=79305664|edit_id=-3|resolved=X|isIP=0|date=2016-12-09|time=22:36:26|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/iot-security/security-challenges-in-the-internet-of-things-iot/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/security-challenges-in-the-internet-of-things-iot/|domain=resources.infosecinstitute.com|U=22|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=200044814|lang=zh|wikidomain=w|namespace=|pagename=洋葱路由|username=Liaon98|link=resources.infosecinstitute.com/good-tor-2014/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://zh.wikipedia.org/w/index.php?diff=42533868&oldid=42533375|edit_id=-2|resolved=X|isIP=0|date=2016-12-22|time=12:17:09|wiki=zh.wikipedia.org|revid=42533868|oldid=42533375|usercount=7695|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/good-tor-2014/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=668972|domain=ieeexplore.ieee.org|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.onion-router.net/Publications/CACM-1999.pdf|domain=onion-router.net|U=7695|L=387|UL=6|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.onion-router.net|domain=onion-router.net|U=7695|L=387|UL=6|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/good-tor-2014/|domain=resources.infosecinstitute.com|U=7695|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arstechnica.com/news.ars/post/20070830-security-researcher-stumbles-across-embassy-e-mail-log-ins.html|domain=arstechnica.com|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=threatpost.com/researcher-finds-tor-exit-node-adding-malware-to-binaries/109008|domain=threatpost.com|U=7695|L=2835|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=gnunet.org/sites/default/files/Wright-2004.pdf|domain=gnunet.org|U=7695|L=405|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=svn.torproject.org/svn/projects/design-paper/tor-design.html|domain=svn.torproject.org|U=7695|L=61|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007/11863908_2|domain=dx.doi.org|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.onion-router.net/Publications/tor-design.pdf|domain=onion-router.net|U=7695|L=387|UL=6|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=blog.washingtonpost.com/securityfix/2007/08/attacks_prompt_update_for_tor.html?nav=rss_blog|domain=blog.washingtonpost.com|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20140407091125/http://blog.washingtonpost.com/securityfix/2007/08/attacks_prompt_update_for_tor.html?nav=rss_blog|domain=web.archive.org|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.torproject.org/about/sponsors.html.en|domain=torproject.org|U=7695|L=5986|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.torproject.org/docs/faq#WhyCalledTor|domain=torproject.org|U=7695|L=5986|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archives.seul.org/or/dev/Sep-2002/msg00019.html|domain=archives.seul.org|U=7695|L=296|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=worldwide.espacenet.com/textdoc?DB=EPODOC&IDX=US6266704|domain=worldwide.espacenet.com|U=7695|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=207992694|lang=fr|wikidomain=w|namespace=|pagename=IMSI-catcher|username=Jako w|link=resources.infosecinstitute.com/cellphone-surveillance-the-secret-arsenal/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=133355498&oldid=127582246&rcid=241806057|edit_id=-2|resolved=X|isIP=0|date=2017-01-05|time=12:42:20|wiki=fr.wikipedia.org|revid=133355498|oldid=127582246|usercount=173|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/cellphone-surveillance-the-secret-arsenal/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.aclu.org/map/stingray-tracking-devices-whos-got-them|domain=aclu.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.laweekly.com/news/lapd-spied-on-21-using-stingray-anti-terrorism-tool-2612739|domain=laweekly.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securityaffairs.co/wordpress/40380/cyber-crime/airline-passengers-imsi-catchers.html|domain=securityaffairs.co|U=173|L=534|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ibtimes.co.uk/china-arrests-1500-people-sending-spam-text-messages-fake-mobile-base-stations-1442099|domain=ibtimes.co.uk|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.senat.fr/rap/a14-445/a14-44515.html|domain=senat.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wired.com/2010/07/intercepting-cell-phone-calls/|domain=wired.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securityaffairs.co/wordpress/41513/hacking/low-cost-imsi-catcher-lte.html|domain=securityaffairs.co|U=173|L=534|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arstechnica.com/security/2013/09/the-body-worn-imsi-catcher-for-all-your-covert-phone-snooping-needs/|domain=arstechnica.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=imsicatcher.info/article/equipment-list/|domain=imsicatcher.info|U=173|L=3|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cellphone-surveillance-the-secret-arsenal/|domain=resources.infosecinstitute.com|U=173|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.schneier.com/blog/archives/2015/04/the_further_dem_1.html|domain=schneier.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bailii.org/ew/cases/EWCA/Civ/2012/7.html|domain=bailii.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=worldwide.espacenet.com/publicationDetails/biblio?CC=EP&NR=1051053&KC=&FT=E&locale=en_EP|domain=worldwide.espacenet.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cryptophone.de|domain=cryptophone.de|U=173|L=6|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.x-cellular.com|domain=x-cellular.com|U=173|L=5|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.laweekly.com/news/lapd-spied-on-21-using-stingray-anti-terrorism-tool-2612739|domain=laweekly.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.legifrance.gouv.fr/affichCodeArticle.do;jsessionid=50DB00FB7B998272EB6FEF36840A355A.tpdila16v_2?idArticle=LEGIARTI000028345203&cidTexte=LEGITEXT000006070719&categorieLien=id&dateTexte=|domain=legifrance.gouv.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000006070719&idArticle=LEGIARTI000028345197|domain=legifrance.gouv.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theguardian.com/world/2016/nov/19/extreme-surveillance-becomes-uk-law-with-barely-a-whimper|domain=theguardian.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.zdnet.com/article/snoopers-charter-expansive-new-spying-powers-becomes-law/|domain=zdnet.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.lemonde.fr/pixels/article/2016/11/24/trois-ans-apres-les-revelations-snowden-la-surveillance-de-masse-se-porte-bien_5037022_4408996.html|domain=lemonde.fr|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.privacyinternational.org/node/454|domain=privacyinternational.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=thebristolcable.org/wp-content/uploads/2016/10/09-imsi-2.pdf|domain=thebristolcable.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theguardian.com/world/2016/oct/10/controversial-phone-snooping-technology-imsi-catcher-seven-police-forces|domain=theguardian.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=thebristolcable.org/2016/10/imsi/|domain=thebristolcable.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnil.fr/fr/publication-de-lavis-sur-le-projet-de-loi-relatif-au-renseignement|domain=cnil.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.senat.fr/rap/l15-335/l15-335_mono.html#toc23|domain=senat.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.assemblee-nationale.fr/14/propositions/pion3469.asp|domain=assemblee-nationale.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.legifrance.gouv.fr/affichCodeArticle.do?cidTexte=LEGITEXT000025503132&idArticle=LEGIARTI000031944797&dateTexte=&categorieLien=cid|domain=legifrance.gouv.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theguardian.com/uk/2011/oct/30/metropolitan-police-mobile-phone-surveillance|domain=theguardian.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arstechnica.com/tech-policy/2015/05/cops-must-now-get-a-warrant-to-use-stingrays-in-washington-state/|domain=arstechnica.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=lawfilesext.leg.wa.gov/biennium/2015-16/Pdf/Bills/Session%20Laws/House/1440-S.SL.pdf|domain=lawfilesext.leg.wa.gov|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.aclunc.org/our-work/legislation/calecpa|domain=aclunc.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.eff.org/fr/cases/californias-electronic-communications-privacy-act-calecpa|domain=eff.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.lemonde.fr/pixels/article/2015/04/08/aux-etats-unis-un-vaste-programme-de-surveillance-telephonique-bien-avant-la-nsa_4611363_4408996.html|domain=lemonde.fr|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bloomberg.com/news/articles/2015-03-24/state-laws-start-catching-up-to-police-phone-spying|domain=bloomberg.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.justice.gouv.fr/le-garde-des-sceaux-10016/modernisation-des-techniques-speciales-denquetes-28786.html|domain=justice.gouv.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.legifrance.gouv.fr/affichCode.do;jsessionid=65F16A0FCB0DB42A5F7B3A5558ECEC0F.tpdila15v_2?idSectionTA=LEGISCTA000032653938&cidTexte=LEGITEXT000006071154&dateTexte=20160708|domain=legifrance.gouv.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.legifrance.gouv.fr/affichTexteArticle.do;jsessionid=D5EF0B18B5502B17DDDD0307557A5791.tpdila22v_1?idArticle=JORFARTI000032627262&cidTexte=JORFTEXT000032627231&dateTexte=29990101&categorieLien=id|domain=legifrance.gouv.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.senat.fr/leg/tas13-046.html|domain=senat.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.douane.gouv.fr/Portals/0/fichiers/datadouane/marches-publics/2012-marches-publics.pdf|domain=douane.gouv.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=twitter.com/julesbonnard/status/600975133940064256|domain=twitter.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.lemonde.fr/pixels/article/2015/05/20/les-douanes-ont-achete-des-imsi-catchers-alors-que-leur-utilisation-est-illegale_4636988_4408996.html|domain=lemonde.fr|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.fuzo-archiv.at/artikel/288198v2|domain=fuzo-archiv.at|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=platterwatch.at/PETITION.html|domain=platterwatch.at|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ris.bka.gv.at/GeltendeFassung.wxe?Abfrage=Bundesnormen&Gesetzesnummer=10005792|domain=ris.bka.gv.at|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bundesverfassungsgericht.de/entscheidungen/rk20060822_2bvr134503.html|domain=bundesverfassungsgericht.de|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.gesetze-im-internet.de/stpo/__100i.html|domain=gesetze-im-internet.de|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.juriscom.net/wp-content/uploads/2016/10/20161026penalcomm.pdf|domain=juriscom.net|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1145%2F2664243.2664272|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf|domain=sba-research.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1145%2F2810103.2813615|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cs.ru.nl/~rverdult/Defeating_IMSI_Catchers-CCS_2015.pdf|domain=cs.ru.nl|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cs.ru.nl/bachelorscripties/2016/Bauke_Brenninkmeijer___4366298___Catching_IMSI-catcher-catchers.pdf|domain=cs.ru.nl|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ieeexplore.ieee.org/document/1368846/|domain=ieeexplore.ieee.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1109%2FPIMRC.2004.1368846|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007/s00145-007-9001-y|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007%2Fs00145-007-9001-y|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=worldcat.org/issn/0933-2790&lang=fr|domain=worldcat.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arxiv.org/abs/1510.08531|domain=arxiv.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=doi.acm.org/10.1145/1023646.1023662|domain=doi.acm.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1145%2F1023646.1023662|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.5803|domain=citeseerx.ist.psu.edu|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1.1.215.5803|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cryptome.org|domain=cryptome.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cryptome.org|domain=cryptome.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1007%2F11693383_1|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Zhang-Shan-Forcing-Targeted-Lte-Cellphone-Into-Unsafe-Network.pdf|domain=media.defcon.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ericsson.com/res/docs/2016/protecting-imsi-and-user-privacy-in-5g-networks.pdf|domain=ericsson.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cis.upenn.edu/current-students/undergraduate/courses/documents/EAS499Honors-IMSICatchersandMobileSecurity-V18F-1.pdf|domain=cis.upenn.edu|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ee.columbia.edu/~roger/LTE_security_TakeDownCon.pdf|domain=ee.columbia.edu|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=events.ccc.de/congress/2014/Fahrplan/system/attachments/2553/original/31c3-ss7-locate-track-manipulate.pdf|domain=events.ccc.de|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=events.ccc.de/congress/2014/Fahrplan/system/attachments/2493/original/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf|domain=events.ccc.de|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epub.uni-regensburg.de/7382/1/Fede3_99Buch3Mobil.pdf|domain=epub.uni-regensburg.de|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=events.ccc.de/congress/2009/Fahrplan/attachments/1519_26C3.Karsten.Nohl.GSM.pdf|domain=events.ccc.de|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cryptome.org/a51-bsw.htm|domain=cryptome.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.npag.fr/doc/papers/a52hacktool.pdf|domain=npag.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arxiv.org/abs/1510.07563|domain=arxiv.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1145%2F2664243.2664272|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sba-research.org/wp-content/uploads/publications/DabrowskiEtAl-IMSI-Catcher-Catcher-ACSAC2014.pdf|domain=sba-research.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wired.com/2010/07/intercepting-cell-phone-calls/|domain=wired.com|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=homepages.staff.os3.nl/~delaat/rp/2015-2016/p86/report.pdf|domain=homepages.staff.os3.nl|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.blackhat.com/docs/eu-16/materials/eu-16-OHanlon-WiFi-IMSI-Catcher.pdf|domain=blackhat.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.fr/books?hl=fr&lr=&id=BzQ7CgAAQBAJ&oi=fnd&pg=PA129&dq=imsi+catcher+law&ots=eU50zzMfE5&sig=lF6Oea1S6hggZTE8UvfwLF1mLWw#v=onepage&q=imsi%20catcher%20law&f=false|domain=books.google.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.secorvo.de/publikationen/imsicatcher-fox-2002.pdf|domain=secorvo.de|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.blackhat.com/docs/eu-15/materials/eu-15-Borgaonkar-LTE-And-IMSI-Catcher-Myths.pdf|domain=blackhat.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1109%2F26.837039|domain=dx.doi.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=worldcat.org/issn/0090-6778&lang=fr|domain=worldcat.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ieeexplore.ieee.org/document/5967298/|domain=ieeexplore.ieee.org|U=173|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cis.upenn.edu/current-students/undergraduate/courses/documents/EAS499Honors-IMSICatchersandMobileSecurity-V18F-1.pdf|domain=cis.upenn.edu|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.emsec.rub.de/media/crypto/attachments/files/2011/04/imsi_catcher.pdf|domain=emsec.rub.de|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epub.uni-regensburg.de/7382/1/Fede3_99Buch3Mobil.pdf|domain=epub.uni-regensburg.de|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2807|domain=portal.3gpp.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=security.osmocom.org/trac/wiki/A52_Withdrawal|domain=security.osmocom.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.etsi.org/deliver/etsi_gts/03/0312/05.00.00_60/gsmts_0312v050000p.pdf|domain=etsi.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_33_Beijing/Docs/PDF/S3-040262.pdf|domain=3gpp.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=twitter.com/Snowden/status/799371508808302596|domain=twitter.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=twitter.com/Snowden/status/799371508808302596|domain=twitter.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=thebristolcable.org|domain=thebristolcable.org|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pwnieexpress.com|domain=pwnieexpress.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=esdoverwatch.com|domain=esdoverwatch.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.x-cellular.com|domain=x-cellular.com|U=173|L=5|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cryptophone.de|domain=cryptophone.de|U=173|L=6|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.silentcircle.com/products-and-solutions/devices/silent-os/|domain=silentcircle.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=umtrx.org|domain=umtrx.org|U=173|L=2|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ettus.com/product/details/UB210-KIT|domain=ettus.com|U=173|L=63|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=greatscottgadgets.com/hackrf/|domain=greatscottgadgets.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=nuand.com|domain=nuand.com|U=173|L=8|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=sourceforge.net/projects/openlte/|domain=sourceforge.net|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=github.com/srsLTE/srsLTE|domain=github.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.gammagroup.com|domain=gammagroup.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pki-electronic.com|domain=pki-electronic.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.amesys.fr|domain=amesys.fr|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.drti.com|domain=drti.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.rohde-schwarz.com/fr/accueil_48230.html|domain=rohde-schwarz.com|U=173|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=204935470|lang=pl|wikidomain=w|namespace=|pagename=APT28|username=Jaszczuroczłek|link=resources.infosecinstitute.com/apt28-cybercrime-or-state-sponsored-hacking/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://pl.wikipedia.org/w/index.php?oldid=48155744&rcid=74578782|edit_id=-2|resolved=X|isIP=0|date=2017-01-11|time=23:55:35|wiki=pl.wikipedia.org|revid=48155744|oldid=0|usercount=0|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/apt28-cybercrime-or-state-sponsored-hacking/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=en.interfax.com.ua/news/general/395186.html|domain=en.interfax.com.ua|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/|domain=crowdstrike.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/russia-hacks-bellingcat-mh17-investigation/|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=threatconnect.com/blog/tapping-into-democratic-national-committee/|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/does-a-bear-leak-in-the-woods/|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=worldcat.org/issn/0013-0613|domain=worldcat.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.economist.com/news/united-states/21707574-whats-worse-being-attacked-russian-hacker-being-attacked-two-bear-bear|domain=economist.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.crowdstrike.com/blog/bears-midst-intrusion-democratic-national-committee/|domain=crowdstrike.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=news.softpedia.com/news/russia-behind-world-anti-doping-agency-international-sports-court-hacks-507562.shtml|domain=news.softpedia.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/fancy-bear-anti-doping-agency-phishing/|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=news.softpedia.com/news/anonymous-hacks-world-anti-doping-agency-international-sports-court-507265.shtml|domain=news.softpedia.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wada-ama.org/en/media/news/2016-07/wada-statement-independent-investigation-confirms-russian-state-manipulation-of|domain=wada-ama.org|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.reuters.com/article/us-france-russia-cybercrime-idUSKBN0OQ2GG20150610|domain=reuters.com|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/technology-33093895|domain=bbc.com|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/technology-36284447|domain=bbc.com|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/technology-36284447|domain=bbc.com|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/guccifer-2-all-roads-lead-russia/|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securelist.com/blog/research/72924/sofacy-apt-hits-high-profile-targets-with-updated-toolset/|domain=securelist.com|U=0|L=2047|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/apt28-cybercrime-or-state-sponsored-hacking/|domain=resources.infosecinstitute.com|U=0|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=threatpost.com/office-java-patches-erase-latest-apt-28-zero-days/113825/|domain=threatpost.com|U=0|L=2835|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=blog.trendmicro.com/trendlabs-security-intelligence/operation-pawn-storm-the-red-in-sednit/|domain=blog.trendmicro.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/state-board-election-rabbit-hole/ââ¬Â|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/state-board-election-rabbit-hole/ââ¬Â|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/state-board-election-rabbit-hole/|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/does-a-bear-leak-in-the-woods/ââ¬Â|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/does-a-bear-leak-in-the-woods/ââ¬Â|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/does-a-bear-leak-in-the-woods/|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/state-board-election-rabbit-hole/ââ¬Â|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/state-board-election-rabbit-hole/ââ¬Â|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.threatconnect.com/blog/state-board-election-rabbit-hole/|domain=threatconnect.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.fireeye.com/blog/threat-research/2014/10/apt28-a-window-into-russias-cyber-espionage-operations.html|domain=fireeye.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.kaspersky.pl/o-nas/informacje-prasowe/2529/grupa-cyberszpiegowska-sofacy-wraca-do-gry-z-nowymi-szkodliwymi-narzedziami|domain=kaspersky.pl|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.crowdstrike.com/blog/who-is-fancy-bear/|domain=crowdstrike.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=blogs.microsoft.com/microsoftsecure/2015/11/18/microsoft-security-intelligence-report-volume-19-is-now-available/|domain=blogs.microsoft.com|U=0|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=215412220|lang=nl|wikidomain=w|namespace=|pagename=Dark web|username=Xxmarijnw|link=resources.infosecinstitute.com/hunting-malware-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://nl.wikipedia.org/w/index.php?diff=48558765&oldid=48558757&rcid=88952658|edit_id=-2|resolved=X|isIP=0|date=2017-02-07|time=20:19:14|wiki=nl.wikipedia.org|revid=48558765|oldid=48558757|usercount=4616|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/hunting-malware-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.bbc.co.uk/programmes/b04grp09|domain=bbc.co.uk|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.youtube.com/watch?v=MaDl4laMVTo|domain=youtube.com|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=be-nl.norton.com/botnet|domain=be-nl.norton.com|U=4616|L=10|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hunting-malware-deep-web/|domain=resources.infosecinstitute.com|U=4616|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/|domain=pcadvisor.co.uk|U=4616|L=4273|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/technology-30637010|domain=bbc.com|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=creativecommons.org/licenses/by-sa/3.0/deed.nl|domain=creativecommons.org|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.linkedin.com/pulse/how-terrorists-communicate-dark-web-anurag-harsh|domain=linkedin.com|U=4616|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.helpnetsecurity.com/2016/04/08/dark-web-content/|domain=helpnetsecurity.com|U=4616|L=714|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=215675305|lang=en|wikidomain=v|namespace=|pagename=Computer Security/Computer Hackers/Ardit Ferizi/History|username=Bugmenot123123123|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikiversity.org/w/index.php?oldid=1654295&rcid=1902897|edit_id=-2|resolved=X|isIP=0|date=2017-02-09|time=03:24:10|wiki=en.wikiversity.org|revid=1654295|oldid=0|usercount=100|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/news/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/#gref|domain=resources.infosecinstitute.com|U=100|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.justice.gov/opa/file/784501/download|domain=justice.gov|U=100|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574332132|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Articles for deletion/Ye Yint Min Thu Htut|username=Whatisyourbug|link=resources.infosecinstitute.com/worlds-largest-public-hacker-database|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=80840362|edit_id=-3|resolved=X|isIP=0|date=2017-02-13|time=16:13:48|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=30|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/how-quickly-can-hackers-find-exposed-data-online-faster-than-you-think/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/worlds-largest-public-hacker-database|domain=resources.infosecinstitute.com|U=30|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574332131|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Articles for deletion/Ye Yint Min Thu Htut|username=Whatisyourbug|link=resources.infosecinstitute.com/worlds-largest-public-hacker-database|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=80840367|edit_id=-3|resolved=X|isIP=0|date=2017-02-13|time=16:13:57|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=30|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/how-quickly-can-hackers-find-exposed-data-online-faster-than-you-think/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/worlds-largest-public-hacker-database|domain=resources.infosecinstitute.com|U=30|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574332009|lang=en|wikidomain=w|namespace=Wikipedia|pagename=Articles for deletion/Ye Yint Min Thu Htut|username=Whatisyourbug|link=resources.infosecinstitute.com/worlds-largest-public-hacker-database/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=80840538|edit_id=-3|resolved=X|isIP=0|date=2017-02-13|time=16:22:30|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=30|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/how-quickly-can-hackers-find-exposed-data-online-faster-than-you-think/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/worlds-largest-public-hacker-database/|domain=resources.infosecinstitute.com|U=30|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=220193004|lang=pt|wikidomain=w|namespace=|pagename=Phishing|username=Rúdisicyon|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://pt.wikipedia.org/w/index.php?diff=48132421&oldid=48132032&rcid=73165133|edit_id=-2|resolved=X|isIP=0|date=2017-02-28|time=01:45:27|wiki=pt.wikipedia.org|revid=48132421|oldid=48132032|usercount=0|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/phishing-and-social-engineering-techniques-3-0/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.webcitation.org/5w9YcgvUb?url=http%3A%2F%2Fwww.theregister.co.uk%2F2008%2F04%2F16%2Fwhaling_expedition_continues%2F|domain=webcitation.org|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theregister.co.uk/2008/04/16/whaling_expedition_continues/.|domain=theregister.co.uk|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques/|domain=resources.infosecinstitute.com|U=0|L=282|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.firmex.com/blog/spear-phishing-whos-getting-caught/|domain=firmex.com|U=0|L=250|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archives.fbi.gov/archives/news/stories/2009/april/spearphishing_040109|domain=archives.fbi.gov|U=0|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574316014|lang=en|wikidomain=w|namespace=User|pagename=Cyberterrorism|username=Dgerzog|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=81257728|edit_id=-3|resolved=X|isIP=0|date=2017-03-01|time=23:31:10|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=7|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/news/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|domain=resources.infosecinstitute.com|U=7|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574316013|lang=en|wikidomain=w|namespace=User|pagename=Cyberterrorism|username=Dgerzog|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=81257731|edit_id=-3|resolved=X|isIP=0|date=2017-03-01|time=23:31:20|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=7|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/news/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|domain=resources.infosecinstitute.com|U=7|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574316003|lang=en|wikidomain=w|namespace=User|pagename=Cyberterrorism|username=Dgerzog|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=81257733|edit_id=-3|resolved=X|isIP=0|date=2017-03-01|time=23:31:34|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=7|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/news/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|domain=resources.infosecinstitute.com|U=7|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574309616|lang=en|wikidomain=w|namespace=Template|pagename=Fuzzing|username=Ikkeer|link=resources.infosecinstitute.com/intro-to-fuzzing/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=81428425|edit_id=-3|resolved=X|isIP=0|date=2017-03-09|time=08:59:01|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=110|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/intro-to-fuzzing/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/intro-to-fuzzing/#gref|domain=resources.infosecinstitute.com|U=110|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=232422326|lang=de|wikidomain=w|namespace=|pagename=Registrierungsdatenbank|username=Siwibegewp|link=resources.infosecinstitute.com/forensic-investigation-windows-machines/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://de.wikipedia.org/w/index.php?diff=164295481&oldid=164295466|edit_id=-2|resolved=X|isIP=0|date=2017-04-06|time=11:13:19|wiki=de.wikipedia.org|revid=164295481|oldid=164295466|usercount=3063|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/forensic-investigation-windows-machines/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=books.google.de/books?id=3jNOHGmrpRkC&pg=RA1-PA251|domain=books.google.de|U=3063|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/forensic-investigation-windows-machines/|domain=resources.infosecinstitute.com|U=3063|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.de/books?id=Y06H-cZAiwAC&pg=PA398#v=onepage|domain=books.google.de|U=3063|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wintotal.de/total-registry-infoguide-rund-um-die-registry/|domain=wintotal.de|U=3063|L=55|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=support.microsoft.com/kb/256986/|domain=support.microsoft.com|U=3063|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=blogs.msdn.com/b/oldnewthing/archive/2008/01/18/7145021.aspx|domain=blogs.msdn.com|U=3063|L=22245|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=msdn.microsoft.com/en-us/library/aa918610.aspx|domain=msdn.microsoft.com|U=3063|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.computerwoche.de/a/tools-rund-um-die-windows-registry,2527431|domain=computerwoche.de|U=3063|L=3382|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=244589136|lang=sl|wikidomain=w|namespace=|pagename=Anonymous|username=Tegel|link=resources.infosecinstitute.com/a-history-of-anonymous/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://sl.wikipedia.org/w/index.php?diff=4851557&oldid=4851556|edit_id=-2|resolved=X|isIP=0|date=2017-05-13|time=18:02:39|wiki=sl.wikipedia.org|revid=4851557|oldid=4851556|usercount=170673|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, rollbacker, steward, checkuser, reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/a-history-of-anonymous/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=techcrunch.com/2011/06/23/lulzsec-releases-arizona-law-enforcement-data-in-retaliation-for-immigration-law/|domain=techcrunch.com|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcmag.com/article2/0,2817,2389447,00.asp|domain=pcmag.com|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnet.com/news/antisec-hackers-post-stolen-police-data-as-revenge-for-arrests/|domain=cnet.com|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.foxnews.com/tech/2012/03/06/hacking-group-lulzsec-swept-up-by-law-enforcement.html|domain=foxnews.com|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/uk-14315442|domain=bbc.com|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.foxnews.com/tech/2011/07/19/leading-member-lulzsec-hacker-squad-arrested-in-london.html|domain=foxnews.com|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.monitor.si/novica/anonymous-slovenija-vdrl-v-ameriski-fbi/153543/|domain=monitor.si|U=170673|L=87|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.prlekija-on.net/lokalno/3754/spletna-stran-obcine-ljutomer-tarca-skupine-anonymous.html|domain=prlekija-on.net|U=170673|L=97|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.finance.si/339380|domain=finance.si|U=170673|L=686|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.rtvslo.si/svet/anonymous-znova-grozi-sloveniji/276612|domain=rtvslo.si|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.politikis.si/?p=51974|domain=politikis.si|U=170673|L=116|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.telecomasia.net/content/massive-data-breach-exposes-all-philippines-voters|domain=telecomasia.net|U=170673|L=1165|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hackread.com/anonymous-target-donald-trump-website/|domain=hackread.com|U=170673|L=825|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.dnevnik.si/1042706297|domain=dnevnik.si|U=170673|L=5690|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=krebsonsecurity.com/2011/02/hbgary-federal-hacked-by-anonymous/|domain=krebsonsecurity.com|U=170673|L=2986|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hackread.com/8-most-awesome-hacks-conducted-by-anonymous-hackers/|domain=hackread.com|U=170673|L=825|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20080705202321/http://www.thelegality.com/archives/22|domain=web.archive.org|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=theminaretonline.com/2011/11/30/is-anonymous-friend-or-foe/|domain=theminaretonline.com|U=170673|L=156|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/a-history-of-anonymous/|domain=resources.infosecinstitute.com|U=170673|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theguardian.com/technology/2012/sep/08/anonymous-behind-masks-cyber-insurgents|domain=theguardian.com|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=content.time.com/time/specials/packages/article/0,28804,2111975_2111976_2112122,00.html|domain=content.time.com|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/magazine-15359735|domain=bbc.com|U=170673|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574211887|lang=en|wikidomain=w|namespace=User|pagename=InfoSec Institute|username=Francewhoa|link=www.infosecinstitute.com/company|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=82882059|edit_id=-3|resolved=X|isIP=0|date=2017-05-14|time=22:11:37|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2179|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/company|domain=infosecinstitute.com|U=2179|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574211876|lang=en|wikidomain=w|namespace=User|pagename=InfoSec Institute|username=Francewhoa|link=www.infosecinstitute.com|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=82882236|edit_id=-3|resolved=104.18.37.154|isIP=0|date=2017-05-14|time=22:19:54|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2179|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com|domain=infosecinstitute.com|U=2179|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574211854|lang=en|wikidomain=w|namespace=User|pagename=InfoSec Institute|username=Francewhoa|link=www.infosecinstitute.com|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=82882244|edit_id=-3|resolved=104.18.37.154|isIP=0|date=2017-05-14|time=22:20:18|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2179|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com|domain=infosecinstitute.com|U=2179|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574211847|lang=en|wikidomain=w|namespace=User|pagename=InfoSec Institute|username=Francewhoa|link=www.infosecinstitute.com/company|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=82882283|edit_id=-3|resolved=X|isIP=0|date=2017-05-14|time=22:22:39|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2179|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/company|domain=infosecinstitute.com|U=2179|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574211845|lang=en|wikidomain=w|namespace=User|pagename=InfoSec Institute|username=Francewhoa|link=www.infosecinstitute.com/company|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=82882286|edit_id=-3|resolved=X|isIP=0|date=2017-05-14|time=22:23:03|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2179|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/company|domain=infosecinstitute.com|U=2179|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574211840|lang=en|wikidomain=w|namespace=User|pagename=Vault 7|username=Francewhoa|link=resources.infosecinstitute.com/cia-vault-7-data-leak-know-since-now/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=82882588|edit_id=-3|resolved=X|isIP=0|date=2017-05-14|time=22:40:36|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2179|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/wikileaks-vault-7-data-leak-another-earthquake-intelligence-community/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cia-vault-7-data-leak-know-since-now/|domain=resources.infosecinstitute.com|U=2179|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574211784|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=Francewhoa|link=www.infosecinstitute.com|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=82883221|edit_id=-3|resolved=104.18.37.154|isIP=0|date=2017-05-14|time=23:32:25|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2179|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com|domain=infosecinstitute.com|U=2179|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574211782|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=Francewhoa|link=www.infosecinstitute.com|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=82883234|edit_id=-3|resolved=104.18.37.154|isIP=0|date=2017-05-14|time=23:33:35|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2179|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com|domain=infosecinstitute.com|U=2179|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=244981590|lang=en|wikidomain=w|namespace=|pagename=InfoSec Institute|username=Francewhoa|link=infosecinstitute.com/company|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?diff=780466796&oldid=780451302|edit_id=-2|resolved=X|isIP=0|date=2017-05-15|time=08:51:24|wiki=en.wikipedia.org|revid=780466796|oldid=780451302|usercount=2179|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group reviewer on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=infosecinstitute.com/company|domain=infosecinstitute.com|U=2179|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=247086407|lang=ca|wikidomain=w|namespace=Usuari|pagename=Usuari:Miky96/proves/Atacs a esquemes de contrasenyes|username=Miky96|link=resources.infosecinstitute.com/10-popular-password-cracking-tools/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://ca.wikipedia.org/w/index.php?diff=18474567&oldid=18474566&rcid=47756280|edit_id=-2|resolved=X|isIP=0|date=2017-05-25|time=06:39:33|wiki=ca.wikipedia.org|revid=18474567|oldid=18474566|usercount=72|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/10-popular-password-cracking-tools/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/10-popular-password-cracking-tools/#gref|domain=resources.infosecinstitute.com|U=72|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/10-popular-password-cracking-tools/#gref|domain=resources.infosecinstitute.com|U=72|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=247794905|lang=ca|wikidomain=w|namespace=|pagename=Atacs a esquemes de contrasenyes|username=Miky96|link=resources.infosecinstitute.com/10-popular-password-cracking-tools/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://ca.wikipedia.org/w/index.php?oldid=18482591&rcid=48158075|edit_id=-2|resolved=X|isIP=0|date=2017-05-27|time=23:32:32|wiki=ca.wikipedia.org|revid=18482591|oldid=0|usercount=72|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/10-popular-password-cracking-tools/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/10-popular-password-cracking-tools/#gref|domain=resources.infosecinstitute.com|U=72|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/10-popular-password-cracking-tools/#gref|domain=resources.infosecinstitute.com|U=72|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cl.cam.ac.uk/~rja14/book.html|domain=cl.cam.ac.uk|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cl.cam.ac.uk/~rja14/book.html|domain=cl.cam.ac.uk|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.lightbluetouchpaper.org/2011/11/08/want-to-create-a-really-strong-password-dont-ask-google/|domain=lightbluetouchpaper.org|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.lightbluetouchpaper.org/2011/11/08/want-to-create-a-really-strong-password-dont-ask-google/|domain=lightbluetouchpaper.org|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.imperva.com/docs/gated/WP_Consumer_Password_Worst_Practices.pdf|domain=imperva.com|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.imperva.com/docs/gated/WP_Consumer_Password_Worst_Practices.pdf|domain=imperva.com|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=crackstation.net/hashing-security.htm#salt|domain=crackstation.net|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=crackstation.net/hashing-security.htm#salt|domain=crackstation.net|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=lasec.epfl.ch/~oechslin/publications/crypto03.pdf|domain=lasec.epfl.ch|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=lasec.epfl.ch/~oechslin/publications/crypto03.pdf|domain=lasec.epfl.ch|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283|domain=sans.org|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283|domain=sans.org|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283|domain=sans.org|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283|domain=sans.org|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cl.cam.ac.uk/~rja14/book.html|domain=cl.cam.ac.uk|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cl.cam.ac.uk/~rja14/book.html|domain=cl.cam.ac.uk|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=support.microsoft.com/es-es/help/102716/ntlm-user-authentication-in-windows|domain=support.microsoft.com|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=support.microsoft.com/es-es/help/102716/ntlm-user-authentication-in-windows|domain=support.microsoft.com|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=72|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=72|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=574081550|lang=en|wikidomain=w|namespace=User|pagename=Anetek/Workpages/Mass surveillance in Russia|username=Anetek|link=resources.infosecinstitute.com/russia-controls-internet/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=83965640|edit_id=-3|resolved=X|isIP=0|date=2017-07-03|time=13:27:15|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=537|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/russia-controls-internet/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/russia-controls-internet/|domain=resources.infosecinstitute.com|U=537|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=309499883|lang=ca|wikidomain=w|namespace=|pagename=Low Orbit Ion Cannon|username=Auledas|link=resources.infosecinstitute.com/loic-dos-attacking-tool/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://ca.wikipedia.org/w/index.php?diff=18822322&oldid=17921064&rcid=63361271|edit_id=-2|resolved=X|isIP=0|date=2017-09-14|time=10:43:15|wiki=ca.wikipedia.org|revid=18822322|oldid=17921064|usercount=1772|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/loic-dos-attacking-tool/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.forbes.com/sites/andygreenberg/2012/01/19/anonymous-hackers-claims-attack-on-doj-universal-music-and-riaa-after-megaupload-takedown/#46f6a663c774|domain=forbes.com|U=1772|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.elperiodico.cat/ca/tecnologia/20101221/grups-organitzats-bloquegen-la-web-del-congres-per-protestar-per-la-llei-sinde-632997|domain=elperiodico.cat|U=1772|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.catalunyapress.cat/texto-diario/mostrar/666818/web-psoe-lunica-resisteix-latac-massiu-dels-internautes|domain=catalunyapress.cat|U=1772|L=445|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.elperiodico.cat/ca/internacional/20101209/la-justicia-dels-eua-estudia-mesures-contra-lofensiva-cibernetica-de-seguidors-de-wikileaks-618207|domain=elperiodico.cat|U=1772|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.incapsula.com/ddos/attack-glossary/low-orbit-ion-cannon.html|domain=incapsula.com|U=1772|L=281|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=gizmodo.com/5883146/what-is-hoic|domain=gizmodo.com|U=1772|L=76823|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/loic-dos-attacking-tool/#gref|domain=resources.infosecinstitute.com|U=1772|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573974153|lang=en|wikidomain=w|namespace=Wikipedia|pagename=InfoSec Institute|username=162.218.1.62|link=www.infosecinstitute.com/courses|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=85757417|edit_id=-3|resolved=X|isIP=1|date=2017-09-20|time=20:13:05|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=14|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/security-iq|domain=infosecinstitute.com|U=14|L=50|UL=8|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses|domain=infosecinstitute.com|U=14|L=50|UL=8|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/|domain=resources.infosecinstitute.com|U=14|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573974149|lang=en|wikidomain=w|namespace=Wikipedia|pagename=InfoSec Institute|username=162.218.1.62|link=www.infosecinstitute.com/courses|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=85757427|edit_id=-3|resolved=X|isIP=1|date=2017-09-20|time=20:13:42|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=14|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/security-iq|domain=infosecinstitute.com|U=14|L=50|UL=8|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses|domain=infosecinstitute.com|U=14|L=50|UL=8|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/|domain=resources.infosecinstitute.com|U=14|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573974146|lang=en|wikidomain=w|namespace=Wikipedia|pagename=InfoSec Institute|username=162.218.1.62|link=www.infosecinstitute.com/courses|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=85757453|edit_id=-3|resolved=X|isIP=1|date=2017-09-20|time=20:15:38|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=14|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/security-iq|domain=infosecinstitute.com|U=14|L=50|UL=8|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses|domain=infosecinstitute.com|U=14|L=50|UL=8|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/|domain=resources.infosecinstitute.com|U=14|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573974143|lang=en|wikidomain=w|namespace=Wikipedia|pagename=InfoSec Institute|username=162.218.1.62|link=www.infosecinstitute.com/courses|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=85757456|edit_id=-3|resolved=X|isIP=1|date=2017-09-20|time=20:15:45|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=14|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/security-iq|domain=infosecinstitute.com|U=14|L=50|UL=8|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses|domain=infosecinstitute.com|U=14|L=50|UL=8|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/|domain=resources.infosecinstitute.com|U=14|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=314640306|lang=en|wikidomain=w|namespace=|pagename=InfoSec Institute|username=Meggo608|link=infosecinstitute.com/company|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?diff=801622578&oldid=801622043|edit_id=-2|resolved=X|isIP=0|date=2017-09-20|time=20:20:01|wiki=en.wikipedia.org|revid=801622578|oldid=801622043|usercount=12|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=infosecinstitute.com/company|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573974136|lang=en|wikidomain=w|namespace=Wikipedia|pagename=InfoSec Institute|username=Meggo608|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=85757773|edit_id=-3|resolved=X|isIP=0|date=2017-09-20|time=20:34:03|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=12|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/security-iq|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573974134|lang=en|wikidomain=w|namespace=Wikipedia|pagename=InfoSec Institute|username=Meggo608|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=85757775|edit_id=-3|resolved=X|isIP=0|date=2017-09-20|time=20:34:12|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=12|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/security-iq|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573974132|lang=en|wikidomain=w|namespace=Wikipedia|pagename=InfoSec Institute|username=Meggo608|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=85757776|edit_id=-3|resolved=X|isIP=0|date=2017-09-20|time=20:34:20|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=12|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/security-iq|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573973659|lang=en|wikidomain=w|namespace=User talk|pagename=Security awareness|username=162.218.1.62|link=securityiq.infosecinstitute.com/|sortdomain=com.infosecinstitute.securityiq.|domain=securityiq.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=85774273|edit_id=-3|resolved=X|isIP=1|date=2017-09-21|time=17:08:02|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=14|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=securityiq.infosecinstitute.com/|domain=securityiq.infosecinstitute.com|U=14|L=2|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573973657|lang=en|wikidomain=w|namespace=User talk|pagename=Security awareness|username=162.218.1.62|link=securityiq.infosecinstitute.com/|sortdomain=com.infosecinstitute.securityiq.|domain=securityiq.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=85774287|edit_id=-3|resolved=X|isIP=1|date=2017-09-21|time=17:08:09|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=14|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=securityiq.infosecinstitute.com/|domain=securityiq.infosecinstitute.com|U=14|L=2|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573945160|lang=en|wikidomain=w|namespace=Draft|pagename=Unit 8200|username=Avaya1|link=resources.infosecinstitute.com/duqu-2-0-the-most-sophisticated-malware-ever-seen/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=86504728|edit_id=-3|resolved=X|isIP=0|date=2017-10-24|time=23:33:07|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2923|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/duqu-2-0-the-most-sophisticated-malware-ever-seen/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/duqu-2-0-the-most-sophisticated-malware-ever-seen/#gref|domain=resources.infosecinstitute.com|U=2923|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=337814771|lang=ca|wikidomain=w|namespace=|pagename=Password cracking|username=Medol|link=resources.infosecinstitute.com/10-popular-password-cracking-tools/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://ca.wikipedia.org/w/index.php?diff=19062091&oldid=18491615&rcid=72721470|edit_id=-2|resolved=X|isIP=0|date=2017-10-25|time=17:05:29|wiki=ca.wikipedia.org|revid=19062091|oldid=18491615|usercount=61757|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/10-popular-password-cracking-tools/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/10-popular-password-cracking-tools/#gref|domain=resources.infosecinstitute.com|U=61757|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/10-popular-password-cracking-tools/#gref|domain=resources.infosecinstitute.com|U=61757|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.lightbluetouchpaper.org/2011/11/08/want-to-create-a-really-strong-password-dont-ask-google/|domain=lightbluetouchpaper.org|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.lightbluetouchpaper.org/2011/11/08/want-to-create-a-really-strong-password-dont-ask-google/|domain=lightbluetouchpaper.org|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.imperva.com/docs/gated/WP_Consumer_Password_Worst_Practices.pdf|domain=imperva.com|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.imperva.com/docs/gated/WP_Consumer_Password_Worst_Practices.pdf|domain=imperva.com|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=crackstation.net/hashing-security.htm#salt|domain=crackstation.net|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=crackstation.net/hashing-security.htm#salt|domain=crackstation.net|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=lasec.epfl.ch/~oechslin/publications/crypto03.pdf|domain=lasec.epfl.ch|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=lasec.epfl.ch/~oechslin/publications/crypto03.pdf|domain=lasec.epfl.ch|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283|domain=sans.org|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sans.org/reading-room/whitepapers/testing/pass-the-hash-attacks-tools-mitigation-33283|domain=sans.org|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cl.cam.ac.uk/~rja14/book.html|domain=cl.cam.ac.uk|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cl.cam.ac.uk/~rja14/book.html|domain=cl.cam.ac.uk|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=support.microsoft.com/es-es/help/102716/ntlm-user-authentication-in-windows|domain=support.microsoft.com|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=support.microsoft.com/es-es/help/102716/ntlm-user-authentication-in-windows|domain=support.microsoft.com|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www2.cs.arizona.edu/~collberg/Teaching/466-566/2012/Resources/presentations/2012/topic7-final/report.pdf|domain=cs.arizona.edu|U=61757|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=61757|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=346906922|lang=el|wikidomain=b|namespace=|pagename=Να περιγράψετε ενα εργαλείο λογισμικού ψηφιακής εγκληματολογίας (digital forensics) (5η Εργασία 2017-18)|username=37.6.3.114|link=resources.infosecinstitute.com/computer-forensics-tools/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://el.wikibooks.org/w/index.php?diff=47779&oldid=47778|edit_id=-2|resolved=X|isIP=1|date=2017-11-17|time=19:06:45|wiki=el.wikibooks.org|revid=47779|oldid=47778|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/computer-forensics-tools/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/computer-forensics-tools/#gref|domain=resources.infosecinstitute.com|U=15|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/computer-forensics-tools/#gref|domain=resources.infosecinstitute.com|U=15|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=351058676|lang=ru|wikidomain=w|namespace=|pagename=Кибероружие|username=Лилит Сакеян|link=resources.infosecinstitute.com/cyber-warfare-cyber-weapons-real-growing-threat/%20-%20gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://ru.wikipedia.org/w/index.php?diff=89292693&oldid=89288450|edit_id=-2|resolved=X|isIP=0|date=2017-11-27|time=17:59:51|wiki=ru.wikipedia.org|revid=89292693|oldid=89288450|usercount=0|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/cyber-warfare-cyber-weapons-real-growing-threat/%20-%20gref/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-warfare-cyber-weapons-real-growing-threat/%20-%20gref|domain=resources.infosecinstitute.com|U=0|L=282|UL=0|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=390319166|lang=fr|wikidomain=w|namespace=|pagename=Démarrage d'un ordinateur|username=OT38|link=resources.infosecinstitute.com/pci-expansion-rom/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=144700060&oldid=144700039&rcid=354856060|edit_id=-2|resolved=X|isIP=0|date=2018-01-21|time=13:59:14|wiki=fr.wikipedia.org|revid=144700060|oldid=144700039|usercount=28254|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/pci-expansion-rom/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=code.google.com/p/akernelloader/|domain=code.google.com|U=28254|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=people.ofset.org/~ckhung/p/mk-boot-usb/|domain=people.ofset.org|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.mossywell.com/boot-sequence/|domain=mossywell.com|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=origin.advantech.eu/adf/file/munich/agenda/Fast_Boot_Technology_Boost_your_Time_to_Application.pdf|domain=origin.advantech.eu|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/pci-expansion-rom/|domain=resources.infosecinstitute.com|U=28254|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.osdev.org/PCI#PCI_Device_Structure|domain=wiki.osdev.org|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.courstechinfo.be/Hard/Alimentations.pdf|domain=courstechinfo.be|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.courstechinfo.be/Hard/Alimentations.pdf|domain=courstechinfo.be|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=390324231|lang=fr|wikidomain=w|namespace=|pagename=Démarrage d'un ordinateur|username=OT38|link=resources.infosecinstitute.com/pci-expansion-rom/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=144700622&oldid=144700613&rcid=354857357|edit_id=-2|resolved=X|isIP=0|date=2018-01-21|time=14:13:03|wiki=fr.wikipedia.org|revid=144700622|oldid=144700613|usercount=28254|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/pci-expansion-rom/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=code.google.com/p/akernelloader/|domain=code.google.com|U=28254|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=people.ofset.org/~ckhung/p/mk-boot-usb/|domain=people.ofset.org|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.mossywell.com/boot-sequence/|domain=mossywell.com|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=origin.advantech.eu/adf/file/munich/agenda/Fast_Boot_Technology_Boost_your_Time_to_Application.pdf|domain=origin.advantech.eu|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/pci-expansion-rom/|domain=resources.infosecinstitute.com|U=28254|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wiki.osdev.org/PCI#PCI_Device_Structure|domain=wiki.osdev.org|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.courstechinfo.be/Hard/Alimentations.pdf|domain=courstechinfo.be|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.courstechinfo.be/Hard/Alimentations.pdf|domain=courstechinfo.be|U=28254|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=392360196|lang=es|wikidomain=w|namespace=|pagename=CTF (Informática)|username=Borjalor|link=resources.infosecinstitute.com/tools-of-trade-and-resources-to-prepare-in-a-hacker-ctf-competition-or-challenge/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://es.wikipedia.org/w/index.php?oldid=105152014&rcid=181280100|edit_id=-2|resolved=X|isIP=0|date=2018-01-25|time=20:33:55|wiki=es.wikipedia.org|revid=105152014|oldid=0|usercount=26|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/capture-the-flag/tools-of-trade-and-resources-to-prepare-in-a-hacker-ctf-competition-or-challenge/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.hackthebox.eu|domain=hackthebox.eu|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.hackthebox.eu|domain=hackthebox.eu|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.root-me.org/?lang=es/|domain=root-me.org|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.root-me.org/?lang=es/|domain=root-me.org|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=captf.com/practice-ctf/|domain=captf.com|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=captf.com/practice-ctf/|domain=captf.com|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ctftime.org|domain=ctftime.org|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ctftime.org|domain=ctftime.org|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=amanhardikar.com/mindmaps/Practice.html|domain=amanhardikar.com|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=amanhardikar.com/mindmaps/Practice.html|domain=amanhardikar.com|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wikis.fdi.ucm.es/ELP/Esteganograf%C3%ADa|domain=wikis.fdi.ucm.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wikis.fdi.ucm.es/ELP/Esteganograf%C3%ADa|domain=wikis.fdi.ucm.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wikis.fdi.ucm.es/ELP/Criptograf%C3%ADa|domain=wikis.fdi.ucm.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=wikis.fdi.ucm.es/ELP/Criptograf%C3%ADa|domain=wikis.fdi.ucm.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cybercamp.es/competiciones/CTF_individual|domain=cybercamp.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cybercamp.es/competiciones/CTF_individual|domain=cybercamp.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=atenea.ccn-cert.cni.es|domain=atenea.ccn-cert.cni.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=atenea.ccn-cert.cni.es|domain=atenea.ccn-cert.cni.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=s3lab.deusto.es/capture-the-flag-hacking-juego/|domain=s3lab.deusto.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=s3lab.deusto.es/capture-the-flag-hacking-juego/|domain=s3lab.deusto.es|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/tools-of-trade-and-resources-to-prepare-in-a-hacker-ctf-competition-or-challenge/|domain=resources.infosecinstitute.com|U=26|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/tools-of-trade-and-resources-to-prepare-in-a-hacker-ctf-competition-or-challenge/|domain=resources.infosecinstitute.com|U=26|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.defcon.org/html/links/dc-ctf.html|domain=defcon.org|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.defcon.org/html/links/dc-ctf.html|domain=defcon.org|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=overthewire.org/wargames/|domain=overthewire.org|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=overthewire.org/wargames/|domain=overthewire.org|U=26|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=577755195|lang=ar|wikidomain=w|namespace=Ãâ¦Ã³ÃªÃ®Ã¯Ãâ¦|pagename=ASammour/èÃÂ§ÃÆ ÃâÃÅ Ãâ ÃÆ|username=ASammour|link=www.infosecinstitute.com/courses/cisa_bootcamp_training.html|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://ar.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=23268898|edit_id=-3|resolved=X|isIP=0|date=2018-03-29|time=20:09:03|wiki=ar.wikipedia.org|revid=0|oldid=0|usercount=7945|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group rollbacker on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses/cisa_bootcamp_training.html|domain=infosecinstitute.com|U=7945|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=436915223|lang=ar|wikidomain=w|namespace=|pagename=مدقق نظم معلومات معتمد|username=علاء|link=www.infosecinstitute.com/courses/cisa_bootcamp_training.html|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://ar.wikipedia.org/w/index.php?diff=28174460&oldid=28156273|edit_id=-2|resolved=X|isIP=0|date=2018-04-05|time=07:20:54|wiki=ar.wikipedia.org|revid=28174460|oldid=28156273|usercount=597|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, steward on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.isaca.org/Certification/CISA-Certified-Information-Systems-Auditor/How-to-Become-Certified/Pages/default.aspx|domain=isaca.org|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.isaca.org/About-ISACA/Press-room/Pages/CISA-Fact-Sheet.aspx|domain=isaca.org|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.isaca.org/Certification/CISA-Certified-Information-Systems-Auditor/Job-Practice-Areas/Pages/CISA-Job-Practice-Areas.aspx|domain=isaca.org|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.net-security.org/secworld.php?id=4012|domain=net-security.org|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cisafaq.blogspot.com|domain=cisafaq.blogspot.com|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=iaudit.blogspot.com/2007/10/cisa-exam-preparation.html|domain=iaudit.blogspot.com|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses/cisa_bootcamp_training.html|domain=infosecinstitute.com|U=597|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.isaca.org/cisa|domain=isaca.org|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.certifiedinfosec.com/CISA_SuperReview_Web_Based.htm|domain=certifiedinfosec.com|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.gckw.com/apages.asp?SPID=18|domain=gckw.com|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.jps-dir.net/default.asp|domain=jps-dir.net|U=597|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=447297490|lang=uk|wikidomain=w|namespace=|pagename=Bring your own device|username=Marmirych|link=resources.infosecinstitute.com/byod-policy-for-companies/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://uk.wikipedia.org/w/index.php?oldid=22507739|edit_id=-2|resolved=X|isIP=0|date=2018-04-26|time=16:59:59|wiki=uk.wikipedia.org|revid=22507739|oldid=0|usercount=26|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/byod-policy-for-companies/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=promodo.ua/blog/preimuschestva-i-nedostatki-politiki-byod.html|domain=promodo.ua|U=26|L=13|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=promodo.ua/blog/preimuschestva-i-nedostatki-politiki-byod.html|domain=promodo.ua|U=26|L=13|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.huffingtonpost.com/entry/byod-in-the-workplace-ben_b_10973342|domain=huffingtonpost.com|U=26|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bladetechinc.com/the-good-the-bad-and-the-ugly-of-mobility-and-byod/|domain=bladetechinc.com|U=26|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.optimuslearningservices.com/blog/practical-ld/advantages-disadvantages-byod-in-learning/|domain=optimuslearningservices.com|U=26|L=2|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.optimuslearningservices.com/blog/practical-ld/advantages-disadvantages-byod-in-learning/|domain=optimuslearningservices.com|U=26|L=2|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.simplilearn.com/what-is-byod-and-why-it-is-important-article|domain=simplilearn.com|U=26|L=214|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.msidata.com/pros-and-cons-of-byod-in-mobile-field-workforce|domain=msidata.com|U=26|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=mobilebusinessinsights.com/2017/08/the-latest-byod-trends-and-predictions-from-mobile-focus-to-endpoint-management/|domain=mobilebusinessinsights.com|U=26|L=10|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=mobilebusinessinsights.com/2017/08/the-latest-byod-trends-and-predictions-from-mobile-focus-to-endpoint-management/|domain=mobilebusinessinsights.com|U=26|L=10|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cbsnews.com/news/byod-alert-confidential-data-on-personal-devices/|domain=cbsnews.com|U=26|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cbsnews.com/news/byod-alert-confidential-data-on-personal-devices/|domain=cbsnews.com|U=26|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=hbr.org/2016/05/tracking-the-trends-in-bringing-our-own-devices-to-work|domain=hbr.org|U=26|L=19254|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=hbr.org/2016/05/tracking-the-trends-in-bringing-our-own-devices-to-work|domain=hbr.org|U=26|L=19254|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.arrkgroup.com/thought-leadership/beginners-guide-to-byod/|domain=arrkgroup.com|U=26|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/byod-policy-for-companies/#gref|domain=resources.infosecinstitute.com|U=26|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/byod-policy-for-companies/#gref|domain=resources.infosecinstitute.com|U=26|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ibm.com/mobile/bring-your-own-device|domain=ibm.com|U=26|L=21860|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.unisys.com|domain=unisys.com|U=26|L=726|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.citrix.com|domain=citrix.com|U=26|L=587|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.vs.inf.ethz.ch/publ/papers/rohs-byod-2004.pdf|domain=vs.inf.ethz.ch|U=26|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573724185|lang=en|wikidomain=w|namespace=Draft|pagename=Certified Expert Penetration Tester|username=Obs1dianOwl|link=www.infosecinstitute.com/courses/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=90493840|edit_id=-3|resolved=X|isIP=0|date=2018-04-29|time=17:31:03|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses/|domain=infosecinstitute.com|U=2|L=50|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573717506|lang=en|wikidomain=w|namespace=User|pagename=InfoSec Institute|username=Meggo608|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=90699033|edit_id=-3|resolved=X|isIP=0|date=2018-05-11|time=18:13:37|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=12|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=471939603|lang=en|wikidomain=w|namespace=|pagename=InfoSec Institute|username=Meggo608|link=www.infosecinstitute.com/company/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?diff=843530370&oldid=840720107|edit_id=-2|resolved=X|isIP=0|date=2018-05-29|time=18:59:22|wiki=en.wikipedia.org|revid=843530370|oldid=840720107|usercount=12|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/company/|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/company/|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=471943197|lang=en|wikidomain=w|namespace=|pagename=InfoSec Institute|username=ToBeFree|link=infosecinstitute.com/company|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?diff=843530827&oldid=843530370|edit_id=-2|resolved=X|isIP=0|date=2018-05-29|time=19:02:42|wiki=en.wikipedia.org|revid=843530827|oldid=843530370|usercount=44763|whitelisted=1|blacklisteduser=0|whitereason=User is in trusted groups sysop, checkuser on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=news.vice.com/article/a-20-year-old-just-pleaded-guilty-to-hacking-for-the-islamic-state|domain=news.vice.com|U=44763|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.washingtonpost.com/world/national-security/in-a-first-us-charges-a-suspect-with-terrorism-and-hacking/2015/10/15/463447a8-738b-11e5-8248-98e0f5a2e830_story.html|domain=washingtonpost.com|U=44763|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.politico.com/story/2016/03/hackers-declare-war-on-trump-221442|domain=politico.com|U=44763|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.washingtonpost.com/business/capitalbusiness/to-catch-a-hacker-it-pays-to-think-like-a-hacker/2012/09/28/4bb24fbe-0371-11e2-91e7-2962c74e7738_story.html|domain=washingtonpost.com|U=44763|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbb.org/chicago/business-reviews/computers-training/infosec-institute-inc-in-elmwood-park-il-88078698|domain=bbb.org|U=44763|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=20726872|domain=bloomberg.com|U=44763|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=infosecinstitute.com/company|domain=infosecinstitute.com|U=44763|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573698349|lang=en|wikidomain=w|namespace=User|pagename=Rafay Baloch|username=Zindagi713|link=resources.infosecinstitute.com/fifteen-famous-bug-bounty-hunters/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91038877|edit_id=-3|resolved=X|isIP=0|date=2018-06-01|time=12:38:52|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=85|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/fifteen-famous-bug-bounty-hunters/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/fifteen-famous-bug-bounty-hunters/#gref|domain=resources.infosecinstitute.com|U=85|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=479381921|lang=en|wikidomain=w|namespace=|pagename=InfoSec Institute|username=Meggo608|link=www.infosecinstitute.com/company/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?diff=844971880&oldid=843530827|edit_id=-2|resolved=X|isIP=0|date=2018-06-08|time=13:01:14|wiki=en.wikipedia.org|revid=844971880|oldid=843530827|usercount=12|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/company/|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/company/|domain=infosecinstitute.com|U=12|L=50|UL=12|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573673398|lang=en|wikidomain=w|namespace=Draft|pagename=Security Plus ( ) Certification|username=Iglassman1|link=resources.infosecinstitute.com/category/certifications-training/securityplus/security-history/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91483919|edit_id=-3|resolved=X|isIP=0|date=2018-06-29|time=16:56:50|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=11|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/category/certifications-training/securityplus/security-history/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/category/certifications-training/securityplus/security-history/#gref|domain=resources.infosecinstitute.com|U=11|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573673395|lang=en|wikidomain=w|namespace=Draft|pagename=Security Plus ( ) Certification|username=Iglassman1|link=resources.infosecinstitute.com/category/certifications-training/securityplus/security-history/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91483924|edit_id=-3|resolved=X|isIP=0|date=2018-06-29|time=16:57:01|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=11|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/category/certifications-training/securityplus/security-history/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/category/certifications-training/securityplus/security-history/#gref|domain=resources.infosecinstitute.com|U=11|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573671303|lang=en|wikidomain=w|namespace=Draft|pagename=CAINE Linux|username=Statuc97|link=resources.infosecinstitute.com/top-10-linux-distro-ethical-hacking-penetration-testing/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91532975|edit_id=-3|resolved=X|isIP=0|date=2018-07-02|time=02:10:41|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=24|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/penetration-testing/top-10-linux-distro-ethical-hacking-penetration-testing/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/top-10-linux-distro-ethical-hacking-penetration-testing/|domain=resources.infosecinstitute.com|U=24|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573671302|lang=en|wikidomain=w|namespace=Draft|pagename=CAINE Linux|username=Statuc97|link=resources.infosecinstitute.com/top-10-linux-distro-ethical-hacking-penetration-testing/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91532978|edit_id=-3|resolved=X|isIP=0|date=2018-07-02|time=02:10:52|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=24|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/penetration-testing/top-10-linux-distro-ethical-hacking-penetration-testing/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/top-10-linux-distro-ethical-hacking-penetration-testing/|domain=resources.infosecinstitute.com|U=24|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573655914|lang=en|wikidomain=w|namespace=Draft|pagename=Cybersecurity as a Service (CYaaS)|username=AlishaNagarkar|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91940055|edit_id=-3|resolved=X|isIP=0|date=2018-07-20|time=23:52:51|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/network-security-101/cyber-security-service-solution-defending-network-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|domain=resources.infosecinstitute.com|U=22|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573655913|lang=en|wikidomain=w|namespace=Draft|pagename=Cybersecurity as a Service (CYaaS)|username=AlishaNagarkar|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91940056|edit_id=-3|resolved=X|isIP=0|date=2018-07-20|time=23:52:59|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/network-security-101/cyber-security-service-solution-defending-network-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|domain=resources.infosecinstitute.com|U=22|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573655912|lang=en|wikidomain=w|namespace=Draft|pagename=Cybersecurity as a Service (CYaaS)|username=AlishaNagarkar|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91940058|edit_id=-3|resolved=X|isIP=0|date=2018-07-20|time=23:53:20|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/network-security-101/cyber-security-service-solution-defending-network-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|domain=resources.infosecinstitute.com|U=22|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573655911|lang=en|wikidomain=w|namespace=Draft|pagename=Cybersecurity as a Service (CYaaS)|username=AlishaNagarkar|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91940060|edit_id=-3|resolved=X|isIP=0|date=2018-07-20|time=23:53:27|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/network-security-101/cyber-security-service-solution-defending-network-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|domain=resources.infosecinstitute.com|U=22|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573655910|lang=en|wikidomain=w|namespace=Draft|pagename=Cybersecurity as a Service (CYaaS)|username=AlishaNagarkar|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91940065|edit_id=-3|resolved=X|isIP=0|date=2018-07-20|time=23:54:35|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/network-security-101/cyber-security-service-solution-defending-network-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|domain=resources.infosecinstitute.com|U=22|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573655906|lang=en|wikidomain=w|namespace=Draft|pagename=Cybersecurity as a Service (CYaaS)|username=AlishaNagarkar|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91940067|edit_id=-3|resolved=X|isIP=0|date=2018-07-20|time=23:54:38|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/network-security-101/cyber-security-service-solution-defending-network-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|domain=resources.infosecinstitute.com|U=22|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573655904|lang=en|wikidomain=w|namespace=Draft|pagename=Cybersecurity as a Service (CYaaS)|username=AlishaNagarkar|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91940087|edit_id=-3|resolved=X|isIP=0|date=2018-07-20|time=23:57:48|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/network-security-101/cyber-security-service-solution-defending-network-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|domain=resources.infosecinstitute.com|U=22|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573655903|lang=en|wikidomain=w|namespace=Draft|pagename=Cybersecurity as a Service (CYaaS)|username=AlishaNagarkar|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=91940088|edit_id=-3|resolved=X|isIP=0|date=2018-07-20|time=23:57:53|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/network-security-101/cyber-security-service-solution-defending-network-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cyber-security-service-solution-defending-network-attacks/#gref|domain=resources.infosecinstitute.com|U=22|L=282|UL=8|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573643863|lang=en|wikidomain=w|namespace=Draft|pagename=Duty of Care Risk Analysis|username=CynK6|link=resources.infosecinstitute.com/category/certifications-training/cissp/domains/security-and-risk-management/due-care-vs-due-diligence/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=92226797|edit_id=-3|resolved=X|isIP=0|date=2018-08-02|time=16:41:56|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=197|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/category/certifications-training/cissp/domains/security-and-risk-management/due-care-vs-due-diligence/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/category/certifications-training/cissp/domains/security-and-risk-management/due-care-vs-due-diligence/#gref|domain=resources.infosecinstitute.com|U=197|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573643861|lang=en|wikidomain=w|namespace=Draft|pagename=Duty of Care Risk Analysis|username=CynK6|link=resources.infosecinstitute.com/category/certifications-training/cissp/domains/security-and-risk-management/due-care-vs-due-diligence/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=92226803|edit_id=-3|resolved=X|isIP=0|date=2018-08-02|time=16:42:19|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=197|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/category/certifications-training/cissp/domains/security-and-risk-management/due-care-vs-due-diligence/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/category/certifications-training/cissp/domains/security-and-risk-management/due-care-vs-due-diligence/#gref|domain=resources.infosecinstitute.com|U=197|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=573533777|lang=en|wikidomain=w|namespace=User|pagename=J Rodriguez MIT/sandbox|username=J Rodriguez MIT|link=resources.infosecinstitute.com/clickjacking-strokejacking-ui-redress/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=94187418|edit_id=-3|resolved=X|isIP=0|date=2018-10-23|time=04:22:53|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=66|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/bypassing-same-origin-policy-part-3-clickjacking-cursorjacking-filejacking/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/clickjacking-strokejacking-ui-redress/#gref|domain=resources.infosecinstitute.com|U=66|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=566470435|lang=et|wikidomain=w|namespace=Kasutaja|pagename=Kasutaja:Rx1334/Valge kaabu|username=Rx1334|link=resources.infosecinstitute.com/hacking-tools-reverse-engineering/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://et.wikipedia.org/w/index.php?diff=5146155&oldid=5134523|edit_id=-2|resolved=X|isIP=0|date=2018-11-17|time=19:11:22|wiki=et.wikipedia.org|revid=5146155|oldid=5134523|usercount=52|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/reverse-engineering/hacking-tools-reverse-engineering/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.businessnewsdaily.com/10713-white-hat-hacker-career.html|domain=businessnewsdaily.com|U=52|L=1249|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cybersecuritymastersdegree.org/2017/11/top-ten-tools-for-cybersecurity-pros-and-black-hat-hackers/|domain=cybersecuritymastersdegree.org|U=52|L=9|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.techradar.com/news/internet/tools-and-tricks-of-the-white-hat-hackers-515208|domain=techradar.com|U=52|L=50176|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-tools-reverse-engineering/|domain=resources.infosecinstitute.com|U=52|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.eccouncil.org/programs/certified-ethical-hacker-ceh/|domain=eccouncil.org|U=52|L=396|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.newsweek.com/how-white-hat-hacker-breaks-business-438621|domain=newsweek.com|U=52|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=569326638|lang=et|wikidomain=w|namespace=|pagename=Valge kaabu|username=Rx1334|link=resources.infosecinstitute.com/hacking-tools-reverse-engineering/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://et.wikipedia.org/w/index.php?oldid=5157416&rcid=10164369|edit_id=-2|resolved=X|isIP=0|date=2018-11-29|time=23:46:49|wiki=et.wikipedia.org|revid=5157416|oldid=0|usercount=52|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/reverse-engineering/hacking-tools-reverse-engineering/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.clarifiedsecurity.com|domain=clarifiedsecurity.com|U=52|L=4|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=koolitus.ee/et/koolituskalender/c789/ITK-424-CEH-v9-Certified-Ethical-Hacking|domain=koolitus.ee|U=52|L=7|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wsj.com/articles/estonia-leads-the-way-in-natos-cyberdefense-1493550002|domain=wsj.com|U=52|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.janes.com/article/79652/locked-shields-2018-practises-for-large-scale-cyber-incident|domain=janes.com|U=52|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.businessnewsdaily.com/10713-white-hat-hacker-career.html|domain=businessnewsdaily.com|U=52|L=1249|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cybersecuritymastersdegree.org/2017/11/top-ten-tools-for-cybersecurity-pros-and-black-hat-hackers/|domain=cybersecuritymastersdegree.org|U=52|L=9|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.techradar.com/news/internet/tools-and-tricks-of-the-white-hat-hackers-515208|domain=techradar.com|U=52|L=50176|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-tools-reverse-engineering/|domain=resources.infosecinstitute.com|U=52|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.eccouncil.org/programs/certified-ethical-hacker-ceh/|domain=eccouncil.org|U=52|L=396|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.newsweek.com/how-white-hat-hacker-breaks-business-438621|domain=newsweek.com|U=52|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1016%2Fs1742-6847%2809%2970019-9|domain=dx.doi.org|U=52|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecurity-magazine.com/view/4611/license-to-hack-ethical-hacking/|domain=infosecurity-magazine.com|U=52|L=3588|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=dx.doi.org/10.1147%2Fsj.403.0769|domain=dx.doi.org|U=52|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=pdf.textfiles.com/security/palmer.pdf|domain=pdf.textfiles.com|U=52|L=419|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.nytimes.com/1981/07/26/business/case-of-the-purloined-password.html?pagewanted=3&pagewanted=all|domain=nytimes.com|U=52|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/karg74.pdf|domain=csrc.nist.gov|U=52|L=6240|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=slashdot.org/topic/bi/thinking-like-an-attacker-how-red-teams-hack-your-site-to-save-it/|domain=slashdot.org|U=52|L=3815|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/20130302035720/http://slashdot.org/topic/bi/thinking-like-an-attacker-how-red-teams-hack-your-site-to-save-it/|domain=web.archive.org|U=52|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.com/books?id=aVnA8pQmS54C&pg=PA26|domain=books.google.com|U=52|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=us.norton.com/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-hackers.html|domain=us.norton.com|U=52|L=696|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550882,00.html|domain=searchsecurity.techtarget.com|U=52|L=1740|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=598861309|lang=en|wikidomain=w|namespace=Template|pagename=Good article/doc|username=Bonwinj|link=resources.infosecinstitute.com/computer-forensics-tools/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=95376526|edit_id=-3|resolved=X|isIP=0|date=2018-12-09|time=15:10:15|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=7|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/computer-forensics-tools/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/computer-forensics-tools/#gref|domain=resources.infosecinstitute.com|U=7|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=597918338|lang=en|wikidomain=w|namespace=User|pagename=JJayStocks/sandbox|username=JJayStocks|link=resources.infosecinstitute.com/metadata-the-hidden-treasure/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=97975962|edit_id=-3|resolved=X|isIP=0|date=2019-03-25|time=00:55:31|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=17|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/playing-hide-and-seek-with-metadata/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/metadata-the-hidden-treasure/|domain=resources.infosecinstitute.com|U=17|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=597918336|lang=en|wikidomain=w|namespace=User|pagename=JJayStocks/sandbox|username=JJayStocks|link=resources.infosecinstitute.com/metadata-the-hidden-treasure/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=97975963|edit_id=-3|resolved=X|isIP=0|date=2019-03-25|time=00:55:37|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=17|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/playing-hide-and-seek-with-metadata/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/metadata-the-hidden-treasure/|domain=resources.infosecinstitute.com|U=17|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=597917958|lang=en|wikidomain=w|namespace=User|pagename=Kyle.long098/sandbox|username=Kyle.long098|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=97978313|edit_id=-3|resolved=X|isIP=0|date=2019-03-25|time=03:24:41|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=16|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/phishing/spear-phishing-real-life-examples/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|domain=resources.infosecinstitute.com|U=16|L=282|UL=5|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=597917954|lang=en|wikidomain=w|namespace=User|pagename=Kyle.long098/sandbox|username=Kyle.long098|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=97978327|edit_id=-3|resolved=X|isIP=0|date=2019-03-25|time=03:25:38|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=16|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/phishing/spear-phishing-real-life-examples/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|domain=resources.infosecinstitute.com|U=16|L=282|UL=5|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=597917905|lang=en|wikidomain=w|namespace=User|pagename=Kyle.long098/sandbox|username=Kyle.long098|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=97978337|edit_id=-3|resolved=X|isIP=0|date=2019-03-25|time=03:26:17|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=16|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/phishing/spear-phishing-real-life-examples/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|domain=resources.infosecinstitute.com|U=16|L=282|UL=5|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=597917895|lang=en|wikidomain=w|namespace=User|pagename=Kyle.long098/sandbox|username=Kyle.long098|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=97978340|edit_id=-3|resolved=X|isIP=0|date=2019-03-25|time=03:26:54|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=16|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/phishing/spear-phishing-real-life-examples/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|domain=resources.infosecinstitute.com|U=16|L=282|UL=5|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=597917875|lang=en|wikidomain=w|namespace=User|pagename=Kyle.long098/sandbox|username=Kyle.long098|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=97978362|edit_id=-3|resolved=X|isIP=0|date=2019-03-25|time=03:28:40|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=16|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/phishing/spear-phishing-real-life-examples/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/spear-phishing-real-life-examples/|domain=resources.infosecinstitute.com|U=16|L=282|UL=5|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=598087825|lang=nl|wikidomain=w|namespace=|pagename=Dark web|username=Ronn|link=resources.infosecinstitute.com/hunting-malware-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://nl.wikipedia.org/w/index.php?diff=53479869&oldid=53479829&rcid=106475759|edit_id=-2|resolved=X|isIP=0|date=2019-03-26|time=10:03:29|wiki=nl.wikipedia.org|revid=53479869|oldid=53479829|usercount=12662|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/hunting-malware-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=be-nl.norton.com/botnet|domain=be-nl.norton.com|U=12662|L=10|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hunting-malware-deep-web/|domain=resources.infosecinstitute.com|U=12662|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/|domain=pcadvisor.co.uk|U=12662|L=4273|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.helpnetsecurity.com/2016/04/08/dark-web-content/|domain=helpnetsecurity.com|U=12662|L=714|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.vpngids.nl/privacy/anoniem-browsen/hoe-toegang-tot-dark-web/|domain=vpngids.nl|U=12662|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.vpngids.nl/privacy/anoniem-browsen/hoe-toegang-tot-dark-web/|domain=vpngids.nl|U=12662|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=598317567|lang=nl|wikidomain=w|namespace=|pagename=Dark web|username=Magere Hein|link=resources.infosecinstitute.com/hunting-malware-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://nl.wikipedia.org/w/index.php?diff=53488437&oldid=53488436&rcid=106492289|edit_id=-2|resolved=X|isIP=0|date=2019-03-27|time=13:48:32|wiki=nl.wikipedia.org|revid=53488437|oldid=53488436|usercount=6064|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/hunting-malware-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hunting-malware-deep-web/|domain=resources.infosecinstitute.com|U=6064|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/|domain=pcadvisor.co.uk|U=6064|L=4273|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/technology-30637010|domain=bbc.com|U=6064|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=600792640|lang=en|wikidomain=w|namespace=Draft talk|pagename=MalwareMustDie|username=Kljtech|link=resources.infosecinstitute.com/exclusive-close-look-largest-credential-harvesting-campaign-via-iot-botnet/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=98266506|edit_id=-3|resolved=X|isIP=0|date=2019-04-06|time=16:51:59|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=171|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/exclusive-close-look-largest-credential-harvesting-campaign-via-iot-botnet/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/exclusive-close-look-largest-credential-harvesting-campaign-via-iot-botnet/|domain=resources.infosecinstitute.com|U=171|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=600792623|lang=en|wikidomain=w|namespace=Draft talk|pagename=MalwareMustDie|username=Kljtech|link=resources.infosecinstitute.com/exclusive-close-look-largest-credential-harvesting-campaign-via-iot-botnet/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=98266548|edit_id=-3|resolved=X|isIP=0|date=2019-04-06|time=16:54:08|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=171|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/exclusive-close-look-largest-credential-harvesting-campaign-via-iot-botnet/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/exclusive-close-look-largest-credential-harvesting-campaign-via-iot-botnet/|domain=resources.infosecinstitute.com|U=171|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=600827603|lang=en|wikidomain=w|namespace=Draft|pagename=InfoSec Institute|username=77.173.90.33|link=infosecinstitute.com|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=98283951|edit_id=-3|resolved=217.114.94.2|isIP=1|date=2019-04-07|time=14:13:17|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=458|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=infosecinstitute.com|domain=infosecinstitute.com|U=458|L=50|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=628024889|lang=en|wikidomain=w|namespace=User|pagename=ToorCon/sandbox|username=ToorCon|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100151367|edit_id=-3|resolved=X|isIP=0|date=2019-06-24|time=23:50:26|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=54|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/20-popular-wireless-hacking-tools-updated-for-2016/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|domain=resources.infosecinstitute.com|U=54|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=628024878|lang=en|wikidomain=w|namespace=User|pagename=ToorCon/sandbox|username=ToorCon|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100151369|edit_id=-3|resolved=X|isIP=0|date=2019-06-24|time=23:50:35|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=54|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/20-popular-wireless-hacking-tools-updated-for-2016/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|domain=resources.infosecinstitute.com|U=54|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=628024877|lang=en|wikidomain=w|namespace=User|pagename=ToorCon/sandbox|username=ToorCon|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100151372|edit_id=-3|resolved=X|isIP=0|date=2019-06-24|time=23:50:56|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=54|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/20-popular-wireless-hacking-tools-updated-for-2016/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|domain=resources.infosecinstitute.com|U=54|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=628024876|lang=en|wikidomain=w|namespace=User|pagename=ToorCon/sandbox|username=ToorCon|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100151373|edit_id=-3|resolved=X|isIP=0|date=2019-06-24|time=23:51:05|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=54|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/20-popular-wireless-hacking-tools-updated-for-2016/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/20-popular-wireless-hacking-tools-updated-for-2016/|domain=resources.infosecinstitute.com|U=54|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=631808569|lang=fr|wikidomain=w|namespace=|pagename=Social Engineering Toolkit|username=VateGV|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques-3-0/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=160994679&oldid=160994668&rcid=390542434|edit_id=-2|resolved=X|isIP=0|date=2019-07-17|time=17:31:13|wiki=fr.wikipedia.org|revid=160994679|oldid=160994668|usercount=15033|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/phishing-and-social-engineering-techniques-3-0/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.trustedsec.com|domain=trustedsec.com|U=15033|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques-3-0/|domain=resources.infosecinstitute.com|U=15033|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ehacking.net/2011/08/social-engineering-toolkit-tutorial.html|domain=ehacking.net|U=15033|L=28|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=632628457|lang=en|wikidomain=w|namespace=User|pagename=Aspat25/sandbox|username=Aspat25|link=resources.infosecinstitute.com/common-social-engineering-attacks/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100679124|edit_id=-3|resolved=X|isIP=0|date=2019-07-19|time=14:54:11|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/common-social-engineering-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/common-social-engineering-attacks/|domain=resources.infosecinstitute.com|U=15|L=282|UL=7|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=632628440|lang=en|wikidomain=w|namespace=User|pagename=Aspat25/sandbox|username=Aspat25|link=resources.infosecinstitute.com/common-social-engineering-attacks/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100679129|edit_id=-3|resolved=X|isIP=0|date=2019-07-19|time=14:54:51|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/common-social-engineering-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/common-social-engineering-attacks/|domain=resources.infosecinstitute.com|U=15|L=282|UL=7|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=632628439|lang=en|wikidomain=w|namespace=User|pagename=Aspat25/sandbox|username=Aspat25|link=resources.infosecinstitute.com/common-social-engineering-attacks/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100679136|edit_id=-3|resolved=X|isIP=0|date=2019-07-19|time=14:55:28|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/common-social-engineering-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/common-social-engineering-attacks/|domain=resources.infosecinstitute.com|U=15|L=282|UL=7|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=632628427|lang=en|wikidomain=w|namespace=User|pagename=Aspat25/sandbox|username=Aspat25|link=resources.infosecinstitute.com/common-social-engineering-attacks/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100679147|edit_id=-3|resolved=X|isIP=0|date=2019-07-19|time=14:55:58|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/common-social-engineering-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/common-social-engineering-attacks/|domain=resources.infosecinstitute.com|U=15|L=282|UL=7|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=632628426|lang=en|wikidomain=w|namespace=User|pagename=Aspat25/sandbox|username=Aspat25|link=resources.infosecinstitute.com/common-social-engineering-attacks/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100679166|edit_id=-3|resolved=X|isIP=0|date=2019-07-19|time=14:57:03|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/common-social-engineering-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/common-social-engineering-attacks/|domain=resources.infosecinstitute.com|U=15|L=282|UL=7|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=632628424|lang=en|wikidomain=w|namespace=User|pagename=Aspat25/sandbox|username=Aspat25|link=resources.infosecinstitute.com/common-social-engineering-attacks/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100679172|edit_id=-3|resolved=X|isIP=0|date=2019-07-19|time=14:57:31|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/common-social-engineering-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/common-social-engineering-attacks/|domain=resources.infosecinstitute.com|U=15|L=282|UL=7|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=632628354|lang=en|wikidomain=w|namespace=User|pagename=Aspat25/sandbox|username=Aspat25|link=resources.infosecinstitute.com/common-social-engineering-attacks/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=100679211|edit_id=-3|resolved=X|isIP=0|date=2019-07-19|time=15:00:38|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/common-social-engineering-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/common-social-engineering-attacks/|domain=resources.infosecinstitute.com|U=15|L=282|UL=7|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=644735117|lang=en|wikidomain=w|namespace=Talk|pagename=Unreal mode|username=2001:4898:80E8:2:693D:1EDC:EA87:517D|link=resources.infosecinstitute.com/system-address-map-initialization-in-x86x64-architecture-part-1-pci-based-systems/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=101351027|edit_id=-3|resolved=X|isIP=1|date=2019-08-19|time=19:49:58|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/system-address-map-initialization-in-x86x64-architecture-part-1-pci-based-systems/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/system-address-map-initialization-in-x86x64-architecture-part-1-pci-based-systems/|domain=resources.infosecinstitute.com|U=2|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=692645204|lang=en|wikidomain=w|namespace=File|pagename=InfoSec Institute|username=98.117.64.193|link=www.infosecinstitute.com/about-us/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=102703013|edit_id=-3|resolved=X|isIP=1|date=2019-10-14|time=01:24:25|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/about-us/|domain=infosecinstitute.com|U=2|L=50|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=692645177|lang=en|wikidomain=w|namespace=File|pagename=InfoSec Institute|username=98.117.64.193|link=www.infosecinstitute.com/about-us/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=102703018|edit_id=-3|resolved=X|isIP=1|date=2019-10-14|time=01:24:30|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=2|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/about-us/|domain=infosecinstitute.com|U=2|L=50|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=699362528|lang=tr|wikidomain=w|namespace=|pagename=Denetim|username=Ben.okucu|link=resources.infosecinstitute.com/itac-planning/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://tr.wikipedia.org/w/index.php?oldid=21072223&rcid=35765408|edit_id=-2|resolved=X|isIP=0|date=2019-10-18|time=12:55:18|wiki=tr.wikipedia.org|revid=21072223|oldid=0|usercount=30214|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/itac-planning/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=iedunote.com/audit-features|domain=iedunote.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=iedunote.com/audit-features|domain=iedunote.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.topaccountingdegrees.org/lists/the-5-characteristics-of-an-auditor/|domain=topaccountingdegrees.org|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.topaccountingdegrees.org/lists/the-5-characteristics-of-an-auditor/|domain=topaccountingdegrees.org|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=linfordco.com/blog/what-is-an-integrated-audit/|domain=linfordco.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=linfordco.com/blog/what-is-an-integrated-audit/|domain=linfordco.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.accountingedu.org/what-is-auditing.html|domain=accountingedu.org|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.accountingedu.org/what-is-auditing.html|domain=accountingedu.org|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=smallbusiness.chron.com/function-accounting-audit-17398.html|domain=smallbusiness.chron.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=smallbusiness.chron.com/function-accounting-audit-17398.html|domain=smallbusiness.chron.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.brightnetwork.co.uk/career-path-guides/accounting-audit-tax/what-is-audit-accounting/|domain=brightnetwork.co.uk|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.brightnetwork.co.uk/career-path-guides/accounting-audit-tax/what-is-audit-accounting/|domain=brightnetwork.co.uk|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=pcaobus.org//Rulemaking/Docket034/Concept_Release.pdf|domain=pcaobus.org|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=pcaobus.org//Rulemaking/Docket034/Concept_Release.pdf|domain=pcaobus.org|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/itac-planning/#gref|domain=resources.infosecinstitute.com|U=30214|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/itac-planning/#gref|domain=resources.infosecinstitute.com|U=30214|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=searchcompliance.techtarget.com/definition/IT-audit-information-technology-audit|domain=searchcompliance.techtarget.com|U=30214|L=71|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=searchcompliance.techtarget.com/definition/IT-audit-information-technology-audit|domain=searchcompliance.techtarget.com|U=30214|L=71|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.yourarticlelibrary.com/cost-accounting/cost-audit/audit-meaning-features-and-types/56157|domain=yourarticlelibrary.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.yourarticlelibrary.com/cost-accounting/cost-audit/audit-meaning-features-and-types/56157|domain=yourarticlelibrary.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=iedunote.com/audit-features|domain=iedunote.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=iedunote.com/audit-features|domain=iedunote.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=iedunote.com/audit|domain=iedunote.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=iedunote.com/audit|domain=iedunote.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.investopedia.com/terms/f/forensic-audit.asp|domain=investopedia.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.investopedia.com/terms/f/forensic-audit.asp|domain=investopedia.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wikiaccounting.com/operational-audit/|domain=wikiaccounting.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wikiaccounting.com/operational-audit/|domain=wikiaccounting.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ey.com/en_gl/assurance/the-6-components-of-sustainable-audit-quality|domain=ey.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ey.com/en_gl/assurance/the-6-components-of-sustainable-audit-quality|domain=ey.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.projectmanager.com/training/project-management-audit|domain=projectmanager.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.projectmanager.com/training/project-management-audit|domain=projectmanager.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=smallbusiness.chron.com/quality-audit-3812.html|domain=smallbusiness.chron.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=smallbusiness.chron.com/quality-audit-3812.html|domain=smallbusiness.chron.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.oag-bvg.gc.ca/internet/methodology/performance-audit/manual/101.shtm|domain=oag-bvg.gc.ca|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.oag-bvg.gc.ca/internet/methodology/performance-audit/manual/101.shtm|domain=oag-bvg.gc.ca|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sciqual.com.au/different-roles-consultant-auditor-and-certification-body|domain=sciqual.com.au|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sciqual.com.au/different-roles-consultant-auditor-and-certification-body|domain=sciqual.com.au|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.investopedia.com/terms/i/internalauditor.asp|domain=investopedia.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.investopedia.com/terms/i/internalauditor.asp|domain=investopedia.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.emerald.com/insight/content/doi/10.1108/JEAS-07-2015-0023/full/html|domain=emerald.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.emerald.com/insight/content/doi/10.1108/JEAS-07-2015-0023/full/html|domain=emerald.com|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sciencedirect.com/science/article/abs/pii/S1645991117300105|domain=sciencedirect.com|U=30214|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sciencedirect.com/science/article/abs/pii/S1645991117300105|domain=sciencedirect.com|U=30214|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.kscpa.org/writable/files/Self-Study/AAE/12._aae_self-study.pdf|domain=kscpa.org|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.kscpa.org/writable/files/Self-Study/AAE/12._aae_self-study.pdf|domain=kscpa.org|U=30214|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=703120265|lang=en|wikidomain=w|namespace=|pagename=Microsoft Detours|username=Ghettoblaster|link=resources.infosecinstitute.com/api-hooking-detours/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=102875058|edit_id=-3|resolved=X|isIP=0|date=2019-10-20|time=16:53:40|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=16098|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/api-hooking-detours/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/api-hooking-detours/|domain=resources.infosecinstitute.com|U=16098|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=736868071|lang=pt|wikidomain=w|namespace=|pagename=Phishing|username=Citizen Kimi|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://pt.wikipedia.org/w/index.php?diff=56702639&oldid=56702636&rcid=93414470|edit_id=-2|resolved=X|isIP=0|date=2019-11-12|time=10:00:22|wiki=pt.wikipedia.org|revid=56702639|oldid=56702636|usercount=750|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/phishing-and-social-engineering-techniques-3-0/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=brazil.kaspersky.com/internet-security-center/definitions/spear-phishing|domain=brazil.kaspersky.com|U=750|L=11|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.inf.ufpr.br/lesoliveira/download/ASOC2011.pdf|domain=inf.ufpr.br|U=750|L=200|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.sciencedirect.com/science/article/pii/S1568494611002547|domain=sciencedirect.com|U=750|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.webcitation.org/5w9YcgvUb?url=http://www.theregister.co.uk/2008/04/16/whaling_expedition_continues/|domain=webcitation.org|U=750|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.theregister.co.uk/2008/04/16/whaling_expedition_continues/.|domain=theregister.co.uk|U=750|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/phishing-and-social-engineering-techniques/|domain=resources.infosecinstitute.com|U=750|L=282|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.firmex.com/blog/spear-phishing-whos-getting-caught/|domain=firmex.com|U=750|L=250|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archives.fbi.gov/archives/news/stories/2009/april/spearphishing_040109|domain=archives.fbi.gov|U=750|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.unik.no/people/josang/papers/JAGAM2007-ACSAC.pdf|domain=unik.no|U=750|L=133|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=isc.sans.org/diary.php?storyid=1905|domain=isc.sans.org|U=750|L=178|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=isc.sans.org/diary.php?storyid=1905|domain=isc.sans.org|U=750|L=178|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=news.biharprabha.com/2014/02/20-indians-are-victims-of-online-phishing-attacks-microsoft/|domain=news.biharprabha.com|U=750|L=15216|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.com/books?id=I-9P1EkTkigC&pg=PA433|domain=books.google.com|U=750|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=en.oxforddictionaries.com/definition/phishing|domain=en.oxforddictionaries.com|U=750|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=743750624|lang=en|wikidomain=w|namespace=Draft|pagename=Kon-Boot|username=Henrypentest|link=resources.infosecinstitute.com/atm-penetration-testing/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=103719482|edit_id=-3|resolved=X|isIP=0|date=2019-11-22|time=20:33:33|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=410|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/penetration-testing/atm-penetration-testing/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/atm-penetration-testing/|domain=resources.infosecinstitute.com|U=410|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=747883996|lang=et|wikidomain=w|namespace=|pagename=Auditi liigid|username=91.129.106.140|link=resources.infosecinstitute.com/itac-planning/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://et.wikipedia.org/w/index.php?diff=5499116&oldid=5499091|edit_id=-2|resolved=X|isIP=1|date=2019-11-30|time=11:28:36|wiki=et.wikipedia.org|revid=5499116|oldid=5499091|usercount=5|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/itac-planning/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/itac-planning/#gref|domain=resources.infosecinstitute.com|U=5|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=searchcompliance.techtarget.com/definition/IT-audit-information-technology-audit|domain=searchcompliance.techtarget.com|U=5|L=71|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=752967291|lang=ru|wikidomain=w|namespace=|pagename=Аутентификация по сетчатке глаза|username=Detininroman|link=resources.infosecinstitute.com/retinal-recognition-ultimate-biometric/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://ru.wikipedia.org/w/index.php?oldid=103742735|edit_id=-2|resolved=X|isIP=0|date=2019-12-06|time=15:31:43|wiki=ru.wikipedia.org|revid=103742735|oldid=0|usercount=21|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/retinal-recognition-ultimate-biometric/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=habr.com/ru/post/261309/|domain=habr.com|U=21|L=3339|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.researchgate.net/publication/241635834_Retinal_recognition_Personal_identification_using_blood_vessels|domain=researchgate.net|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.discoveriesinmedicine.com/Ra-Thy/Retinography.html|domain=discoveriesinmedicine.com|U=21|L=149|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/retinal-recognition-ultimate-biometric/|domain=resources.infosecinstitute.com|U=21|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=link.springer.com/referenceworkentry/10.1007%2F978-0-387-73003-5_132|domain=link.springer.com|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.biometricupdate.com/201307/explainer-retinal-scan-technology|domain=biometricupdate.com|U=21|L=804|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.w3.org/1998/Math/MathML|domain=w3.org|U=21|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=755164044|lang=en|wikidomain=v|namespace=|pagename=Computer Security/Computer Hackers/Ardit Ferizi|username=1.179.196.65|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikiversity.org/w/index.php?diff=2105260&oldid=2105256|edit_id=-2|resolved=X|isIP=1|date=2019-12-08|time=18:12:32|wiki=en.wikiversity.org|revid=2105260|oldid=2105256|usercount=13|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/news/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.justice.gov/opa/pr/isil-linked-kosovo-hacker-sentenced-20-years-prison|domain=justice.gov|U=13|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.foxnews.com/world/2015/10/16/malaysia-arrests-isis-linked-hacker-who-allegedly-leaked-info-on-service.html|domain=foxnews.com|U=13|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/the-ferizi-case-the-first-man-charged-with-cyber-terrorism/#gref|domain=resources.infosecinstitute.com|U=13|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.justice.gov/opa/file/784501/download|domain=justice.gov|U=13|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=768787190|lang=ca|wikidomain=w|namespace=|pagename=Sensor biomètric|username=Flamenc|link=resources.infosecinstitute.com/heart-biometric-sensor/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://ca.wikipedia.org/w/index.php?diff=22493237&oldid=22493113&rcid=86756035|edit_id=-2|resolved=X|isIP=0|date=2019-12-22|time=14:40:15|wiki=ca.wikipedia.org|revid=22493237|oldid=22493113|usercount=47960|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/heart-biometric-sensor/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/heart-biometric-sensor/|domain=resources.infosecinstitute.com|U=47960|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=815196213|lang=fr|wikidomain=w|namespace=Utilisateur|pagename=OussamaAksbi/Brouillon|username=OussamaAksbi|link=resources.infosecinstitute.com/how-to-detect-and-prevent-secure-document-phishing-attacks/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=167581390&oldid=167581322&rcid=404600715|edit_id=-2|resolved=X|isIP=0|date=2020-02-19|time=11:49:46|wiki=fr.wikipedia.org|revid=167581390|oldid=167581322|usercount=7|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/phishing/how-to-detect-and-prevent-secure-document-phishing-attacks/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=repository.tudelft.nl/islandora/object/uuid:3134a851-2b40-4af1-896a-41a6ce7a5816/datastream/OBJ1/download|domain=repository.tudelft.nl|U=7|L=1437|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=media.kaspersky.com|domain=media.kaspersky.com|U=7|L=16|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/how-to-detect-and-prevent-secure-document-phishing-attacks/#gref|domain=resources.infosecinstitute.com|U=7|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.microsoft.com|domain=microsoft.com|U=7|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ijustwannared.team/2017/12/28/phishing-with-smart-ish-msis/|domain=ijustwannared.team|U=7|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=prdeving.wordpress.com/2017/02/08/camouflating-windows-malware/|domain=prdeving.wordpress.com|U=7|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=blog.netspi.com/all-you-need-is-one-a-clickonce-love-story/|domain=blog.netspi.com|U=7|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=815978813|lang=en|wikidomain=w|namespace=Draft|pagename=Ios security|username=Jashan27|link=resources.infosecinstitute.com/password-security-complexity-vs-length/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=105909908|edit_id=-3|resolved=X|isIP=0|date=2020-02-20|time=10:49:49|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/password-security-complexity-vs-length/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/password-security-complexity-vs-length/|domain=resources.infosecinstitute.com|U=15|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=815978796|lang=en|wikidomain=w|namespace=Draft|pagename=Ios security|username=Jashan27|link=resources.infosecinstitute.com/password-security-complexity-vs-length/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=105909911|edit_id=-3|resolved=X|isIP=0|date=2020-02-20|time=10:50:04|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=15|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/password-security-complexity-vs-length/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/password-security-complexity-vs-length/|domain=resources.infosecinstitute.com|U=15|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=819689734|lang=es|wikidomain=w|namespace=|pagename=Agujero de seguridad|username=Fercufer|link=resources.infosecinstitute.com/intro-secure-software-development-life-cycle/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://es.wikipedia.org/w/index.php?diff=123860954&oldid=123841197|edit_id=-2|resolved=X|isIP=0|date=2020-02-27|time=09:00:41|wiki=es.wikipedia.org|revid=123860954|oldid=123841197|usercount=1969|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/secure-coding/intro-secure-software-development-life-cycle/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.a2secure.com/blog/herramientas-de-prueba-de-seguridad-de-aplicaciones-ast/|domain=a2secure.com|U=1969|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=fundacionpascualtomas.org/catalogo/27001.pdf|domain=fundacionpascualtomas.org|U=1969|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/intro-secure-software-development-life-cycle/#gref|domain=resources.infosecinstitute.com|U=1969|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=821863673|lang=en|wikidomain=w|namespace=User|pagename=Johnathan.g.freeman|username=Johnathan.g.freeman|link=resources.infosecinstitute.com/phishing-as-a-service/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=106171756|edit_id=-3|resolved=X|isIP=0|date=2020-03-01|time=22:01:54|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=20|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/phishing/phishing-as-a-service/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/phishing-as-a-service/|domain=resources.infosecinstitute.com|U=20|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=821863664|lang=en|wikidomain=w|namespace=User|pagename=Johnathan.g.freeman|username=Johnathan.g.freeman|link=resources.infosecinstitute.com/phishing-as-a-service/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=106171759|edit_id=-3|resolved=X|isIP=0|date=2020-03-01|time=22:01:59|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=20|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/phishing/phishing-as-a-service/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/phishing-as-a-service/|domain=resources.infosecinstitute.com|U=20|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=830458582|lang=es|wikidomain=w|namespace=|pagename=Phishing|username=Fercufer|link=resources.infosecinstitute.com/the-most-popular-social-network-phishing-schemes/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://es.wikipedia.org/w/index.php?diff=124250356&oldid=124248780|edit_id=-2|resolved=X|isIP=0|date=2020-03-14|time=14:31:38|wiki=es.wikipedia.org|revid=124250356|oldid=124248780|usercount=1969|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/social-media-scams/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.aui.es/IMG/pdf_estudio_phishing_observatorio_inteco.pdf|domain=aui.es|U=1969|L=17|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pandasecurity.com/spain/mediacenter/consejos/ataques-phishing-movil/|domain=pandasecurity.com|U=1969|L=980|UL=4|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.redeszone.net/2019/07/07/diferentes-tipos-ataques-phishing-movil-consejos/|domain=redeszone.net|U=1969|L=84|UL=13|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=breakdev.org/evilginx-2-next-generation-of-phishing-2fa-tokens/|domain=breakdev.org|U=1969|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ubisecure.com/security/phishing-2-0/|domain=ubisecure.com|U=1969|L=23|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.maestrosdelweb.com/que-es-tabnabbing-phishing-robo-identidad/|domain=maestrosdelweb.com|U=1969|L=75|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/the-most-popular-social-network-phishing-schemes/#gref|domain=resources.infosecinstitute.com|U=1969|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=origendata.com/2018/01/11/realizar-un-ataque-evil-twin-para-capturar-claves-wi-fi-con-wifiphisher/|domain=origendata.com|U=1969|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=nordvpn.com/es/blog/evil-twin-attack/|domain=nordvpn.com|U=1969|L=540|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=mug-it.org.ar/343019-Watering-Hole-Attack-Metodo-de-espionaje-contra-las-empresas.note.aspx|domain=mug-it.org.ar|U=1969|L=4|UL=4|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=es.godaddy.com/blog/que-es-el-phishing-y-que-tipos-existen/|domain=es.godaddy.com|U=1969|L=5|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.muyseguridad.net/2019/02/15/ataques-phishing-riesgo-seguridad/|domain=muyseguridad.net|U=1969|L=25|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=steemit.com/spanish/@josecarrerag/bitacora-tecnologia-3-ataques-comunes-a-los-sistemas-informaticos|domain=steemit.com|U=1969|L=2337|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.kaspersky.es/resource-center/definitions/pharming|domain=kaspersky.es|U=1969|L=62|UL=14|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securelist.com/nigerian-phishing-industrial-companies-under-attack/78565/|domain=securelist.com|U=1969|L=2047|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.enisa.europa.eu/publications/info-notes/phishing-on-the-rise|domain=enisa.europa.eu|U=1969|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=medium.com/@ReputationDefender/tips-to-avoid-phishing-4-search-engine-phishing-bcaec7811933|domain=medium.com|U=1969|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docplayer.es/815862-Maite-moreno-csirt-cv-jose-miguel-holguin-csirt-cv.html|domain=docplayer.es|U=1969|L=3370|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.kaspersky.es/blog/what-is-spearphishing/14959/|domain=kaspersky.es|U=1969|L=62|UL=14|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.trendmicro.com/vinfo/us/security/definition/business-email-compromise-(bec)|domain=trendmicro.com|U=1969|L=865|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.adslzone.net/2018/02/20/punto-url-phishing/|domain=adslzone.net|U=1969|L=499|UL=3|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbva.com/es/phishing-vishing-smishing-que-son-y-como-protegerse-de-estas-amenazas/|domain=bbva.com|U=1969|L=728|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=spinbackup.com/blog/prevent-phishing-attacks-g-suite-office-365/|domain=spinbackup.com|U=1969|L=10|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=repositori.uji.es/xmlui/bitstream/handle/10234/127507/TFG_Leguizam%C3%B3n_Mayra.pdf?sequence=1|domain=repositori.uji.es|U=1969|L=703|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=831284246|lang=en|wikidomain=w|namespace=Talk|pagename=Mass surveillance in the United States|username=12.15.69.51|link=resources.infosecinstitute.com/classified-nsa-exploit-tools-radon-dewsweeper-work/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=106519721|edit_id=-3|resolved=X|isIP=1|date=2020-03-16|time=00:34:26|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/classified-nsa-exploit-tools-radon-dewsweeper-work/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/classified-nsa-exploit-tools-radon-dewsweeper-work/|domain=resources.infosecinstitute.com|U=1|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=839828366|lang=en|wikidomain=w|namespace=User|pagename=Offensive Security|username=Yae4|link=resources.infosecinstitute.com/oscp-certification-and-exam/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=106806465|edit_id=-3|resolved=X|isIP=0|date=2020-03-28|time=00:07:06|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=4206|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/oscp-certification-and-exam/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/oscp-certification-and-exam/|domain=resources.infosecinstitute.com|U=4206|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=839828365|lang=en|wikidomain=w|namespace=User|pagename=Offensive Security|username=Yae4|link=resources.infosecinstitute.com/oscp-certification-and-exam/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=106806574|edit_id=-3|resolved=X|isIP=0|date=2020-03-28|time=00:13:47|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=4206|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/oscp-certification-and-exam/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/oscp-certification-and-exam/|domain=resources.infosecinstitute.com|U=4206|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=839828364|lang=en|wikidomain=w|namespace=User|pagename=Offensive Security|username=Yae4|link=resources.infosecinstitute.com/oscp-certification-and-exam/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=106806756|edit_id=-3|resolved=X|isIP=0|date=2020-03-28|time=00:24:07|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=4206|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/oscp-certification-and-exam/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/oscp-certification-and-exam/|domain=resources.infosecinstitute.com|U=4206|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=857585442|lang=pl|wikidomain=w|namespace=|pagename=Nanomity|username=Iamdave7f|link=resources.infosecinstitute.com/anti-memory-dumping-techniques/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://pl.wikipedia.org/w/index.php?oldid=59376938&rcid=104248728|edit_id=-2|resolved=X|isIP=0|date=2020-04-12|time=15:31:11|wiki=pl.wikipedia.org|revid=59376938|oldid=0|usercount=18|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/reverse-engineering/anti-memory-dumping-techniques/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=haker.info/blog/details/nanomity-metoda-utrudniajaca-zrzuty-pamieci|domain=haker.info|U=18|L=23|UL=16|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=haker.info/blog/details/nanomity-metoda-utrudniajaca-zrzuty-pamieci|domain=haker.info|U=18|L=23|UL=16|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/anti-memory-dumping-techniques/|domain=resources.infosecinstitute.com|U=18|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.apriorit.com/white-papers/293-nanomite-technology|domain=apriorit.com|U=18|L=173|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=861738971|lang=en|wikidomain=w|namespace=User|pagename=Kannonie/sandbox|username=Kannonie|link=resources.infosecinstitute.com/guide-to-cobit-2019/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=107399486|edit_id=-3|resolved=X|isIP=0|date=2020-04-19|time=07:05:26|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=11|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/management-compliance-auditing/guide-to-cobit-2019/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/guide-to-cobit-2019/#gref|domain=resources.infosecinstitute.com|U=11|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=879861362|lang=en|wikidomain=b|namespace=|pagename=Information Technology and Ethics/Privacy and Social Networking sites|username=Pdalal3|link=resources.infosecinstitute.com/5-social-media-site-privacy-issues-worry/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikibooks.org/w/index.php?oldid=3682869&rcid=3926758|edit_id=-2|resolved=X|isIP=0|date=2020-04-24|time=18:56:22|wiki=en.wikibooks.org|revid=3682869|oldid=0|usercount=36|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/5-social-media-site-privacy-issues-worry/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.cnet.com/news/ccpa-what-californias-new-privacy-law-means-for-facebook-twitter-users/|domain=cnet.com|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cnet.com/news/ccpa-what-californias-new-privacy-law-means-for-facebook-twitter-users/|domain=cnet.com|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=medium.com/@unboxsocial/gdpr-social-media-what-the-updated-privacy-policies-mean-69984844c43|domain=medium.com|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=medium.com/@unboxsocial/gdpr-social-media-what-the-updated-privacy-policies-mean-69984844c43|domain=medium.com|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ncsl.org/research/telecommunications-and-information-technology/state-laws-prohibiting-access-to-social-media-usernames-and-passwords.aspx|domain=ncsl.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ncsl.org/research/telecommunications-and-information-technology/state-laws-prohibiting-access-to-social-media-usernames-and-passwords.aspx|domain=ncsl.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=medium.com/@unboxsocial/gdpr-social-media-what-the-updated-privacy-policies-mean-69984844c43|domain=medium.com|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=medium.com/@unboxsocial/gdpr-social-media-what-the-updated-privacy-policies-mean-69984844c43|domain=medium.com|U=36|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=epic.org/privacy/socialnet/|domain=epic.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/5-social-media-site-privacy-issues-worry/#gref|domain=resources.infosecinstitute.com|U=36|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/5-social-media-site-privacy-issues-worry/#gref|domain=resources.infosecinstitute.com|U=36|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/|domain=cpomagazine.com|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/|domain=cpomagazine.com|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pewresearch.org/fact-tank/2018/03/27/americans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns/|domain=pewresearch.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pewresearch.org/fact-tank/2018/03/27/americans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns/|domain=pewresearch.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.toptenreviews-online.com/social-media-sites/|domain=toptenreviews-online.com|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.toptenreviews-online.com/social-media-sites/|domain=toptenreviews-online.com|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=historycooperative.org/the-history-of-social-media/|domain=historycooperative.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=historycooperative.org/the-history-of-social-media/|domain=historycooperative.org|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.digitaltrends.com/features/the-history-of-social-networking/|domain=digitaltrends.com|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.digitaltrends.com/features/the-history-of-social-networking/|domain=digitaltrends.com|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.huffpost.com/entry/social-media-vs-social-ne_b_4017305|domain=huffpost.com|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.huffpost.com/entry/social-media-vs-social-ne_b_4017305|domain=huffpost.com|U=36|L=|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=873704121|lang=en|wikidomain=b|namespace=|pagename=Information Technology and Ethics/Who commits cyber crimes?|username=Kmiguel02|link=resources.infosecinstitute.com/category/healthcare-information-security/healthcare-attack-statistics-and-case-studies/case-study-health-insurer-anthem/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikibooks.org/w/index.php?diff=3683305&oldid=3683304|edit_id=-2|resolved=X|isIP=0|date=2020-04-26|time=19:25:28|wiki=en.wikibooks.org|revid=3683305|oldid=3683304|usercount=3|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/category/healthcare-information-security/healthcare-attack-statistics-and-case-studies/case-study-health-insurer-anthem/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/category/healthcare-information-security/healthcare-attack-statistics-and-case-studies/case-study-health-insurer-anthem/#gref|domain=resources.infosecinstitute.com|U=3|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=901446525|lang=es|wikidomain=w|namespace=|pagename=Empaquetador de ejecutables|username=Fercufer|link=resources.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/analyzing-packed-malware/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://es.wikipedia.org/w/index.php?oldid=126055692&rcid=221711748|edit_id=-2|resolved=X|isIP=0|date=2020-05-14|time=15:33:33|wiki=es.wikipedia.org|revid=126055692|oldid=0|usercount=1969|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/analyzing-packed-malware/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=bibdigital.epn.edu.ec/bitstream/15000/18817/1/CD-8204.pdf|domain=bibdigital.epn.edu.ec|U=1969|L=453|UL=3|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.welivesecurity.com/la-es/2011/03/22/el-reinado-de-upx/|domain=welivesecurity.com|U=1969|L=685|UL=16|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=webdiis.unizar.es/~ricardo/files/PFCs-TFGs/Analisis-Rendimiento-Protectores/Memoria_PFC_AnalisisProtectoresSw.pdf|domain=webdiis.unizar.es|U=1969|L=154|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/top-popular-packers-used-in-malware/#gref|domain=resources.infosecinstitute.com|U=1969|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/analyzing-packed-malware/#gref|domain=resources.infosecinstitute.com|U=1969|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=blog.malwarebytes.com/cybercrime/malware/2017/03/explained-packer-crypter-and-protector/|domain=blog.malwarebytes.com|U=1969|L=448|UL=9|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=901472621|lang=es|wikidomain=w|namespace=|pagename=Protector de software|username=Fercufer|link=resources.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/top-popular-packers-used-in-malware/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://es.wikipedia.org/w/index.php?diff=126056639&oldid=126056406|edit_id=-2|resolved=X|isIP=0|date=2020-05-14|time=15:56:27|wiki=es.wikipedia.org|revid=126056639|oldid=126056406|usercount=1969|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/top-popular-packers-used-in-malware/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/top-popular-packers-used-in-malware/#gref|domain=resources.infosecinstitute.com|U=1969|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=901474279|lang=es|wikidomain=w|namespace=|pagename=Protector de software|username=Fercufer|link=resources.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/analyzing-packed-malware/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://es.wikipedia.org/w/index.php?diff=126056690&oldid=126056639|edit_id=-2|resolved=X|isIP=0|date=2020-05-14|time=15:57:26|wiki=es.wikipedia.org|revid=126056690|oldid=126056639|usercount=1969|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/analyzing-packed-malware/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/category/certifications-training/malware-analysis-reverse-engineering/reverse-engineering-packed-malware/analyzing-packed-malware/#gref|domain=resources.infosecinstitute.com|U=1969|L=282|UL=6|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=901728646|lang=ru|wikidomain=w|namespace=|pagename=Microsoft Visual Studio Debugger|username=A5b|link=resources.infosecinstitute.com/debugging-with-visual-studio-2010/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://ru.wikipedia.org/w/index.php?diff=107041604&oldid=100152622|edit_id=-2|resolved=X|isIP=0|date=2020-05-14|time=22:15:32|wiki=ru.wikipedia.org|revid=107041604|oldid=100152622|usercount=22518|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/reverse-engineering/assembly-programming-visual-studio-net/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/debugging-with-visual-studio-2010/|domain=resources.infosecinstitute.com|U=22518|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/debugging-with-visual-studio-2010/|domain=resources.infosecinstitute.com|U=22518|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=books.google.ru/books?id=SEcDF5ZSO74C&pg=PT412&|domain=books.google.ru|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/debugger-feature-tour?view=vs-2019|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/debugger-feature-tour?view=vs-2019|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/intellitrace?view=vs-2015&redirectedfrom=MSDN|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/intellitrace?view=vs-2015&redirectedfrom=MSDN|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/?view=vs-2019|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/?view=vs-2019|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/remote-debugging?view=vs-2019|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/remote-debugging?view=vs-2019|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/debug-multiple-processes?view=vs-2019|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=docs.microsoft.com/en-us/visualstudio/debugger/debug-multiple-processes?view=vs-2019|domain=docs.microsoft.com|U=22518|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=930512516|lang=en|wikidomain=w|namespace=User|pagename=Erdi Hida/Intrusion detection system|username=Erdi Hida|link=resources.infosecinstitute.com/network-design-firewall-idsips/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=109256526|edit_id=-3|resolved=X|isIP=0|date=2020-06-26|time=05:03:20|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=20|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/network-security-101/network-design-firewall-idsips/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/network-design-firewall-idsips/|domain=resources.infosecinstitute.com|U=20|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=943882474|lang=da|wikidomain=w|namespace=|pagename=BNC-stik|username=Glenn|link=community.infosecinstitute.com/discussion/287/what-does-bnc-really-mean|sortdomain=com.infosecinstitute.community.|domain=community.infosecinstitute.com|origdiff=https://da.wikipedia.org/w/index.php?diff=10422544&oldid=10422535&rcid=33858184|edit_id=-2|resolved=X|isIP=0|date=2020-08-01|time=17:39:09|wiki=da.wikipedia.org|revid=10422544|oldid=10422535|usercount=15615|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=web.archive.org/web/20200801173730/https://community.infosecinstitute.com/discussion/287/what-does-bnc-really-mean|domain=web.archive.org|U=15615|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=community.infosecinstitute.com/discussion/287/what-does-bnc-really-mean|domain=community.infosecinstitute.com|U=15615|L=3|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=973506251|lang=fi|wikidomain=w|namespace=|pagename=Rootkit|username=Ipr1|link=resources.infosecinstitute.com/zeroaccess-malware-part-2-the-kernel-mode-device-driver-stealth-rootkit/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fi.wikipedia.org/w/index.php?diff=19222361&oldid=19173131&rcid=38595828|edit_id=-2|resolved=X|isIP=0|date=2020-10-09|time=22:23:45|wiki=fi.wikipedia.org|revid=19222361|oldid=19173131|usercount=130252|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/zeroaccess-malware-part-2-the-kernel-mode-device-driver-stealth-rootkit/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/zeroaccess-malware-part-2-the-kernel-mode-device-driver-stealth-rootkit/|domain=resources.infosecinstitute.com|U=130252|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arstechnica.com/information-technology/2020/10/custom-made-uefi-bootkit-found-lurking-in-the-wild/|domain=arstechnica.com|U=130252|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=973507174|lang=fi|wikidomain=w|namespace=|pagename=Haittaohjelma|username=Ipr1|link=resources.infosecinstitute.com/zeroaccess-malware-part-2-the-kernel-mode-device-driver-stealth-rootkit/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fi.wikipedia.org/w/index.php?diff=19222365&oldid=19222364&rcid=38595844|edit_id=-2|resolved=X|isIP=0|date=2020-10-09|time=22:29:08|wiki=fi.wikipedia.org|revid=19222365|oldid=19222364|usercount=130252|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/zeroaccess-malware-part-2-the-kernel-mode-device-driver-stealth-rootkit/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/zeroaccess-malware-part-2-the-kernel-mode-device-driver-stealth-rootkit/|domain=resources.infosecinstitute.com|U=130252|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=975077376|lang=en|wikidomain=v|namespace=|pagename=Digital Media Concepts/Cyber Crimes|username=Nidhisgupta|link=resources.infosecinstitute.com/evolution-in-the-world-of-cyber-crime/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikiversity.org/w/index.php?diff=2218996&oldid=2218992|edit_id=-2|resolved=X|isIP=0|date=2020-10-12|time=21:19:08|wiki=en.wikiversity.org|revid=2218996|oldid=2218992|usercount=22|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/evolution-in-the-world-of-cyber-crime/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.cashfloat.co.uk/blog/technology-innovation/yahoo-cyber-attack/|domain=cashfloat.co.uk|U=22|L=14|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/world-us-canada-37447016|domain=bbc.com|U=22|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=us.norton.com/internetsecurity-how-to-how-to-recognize-and-protect-yourself-from-cybercrime.html|domain=us.norton.com|U=22|L=696|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=cyberlaws.net/cyber-law-repository/cyber-laws-different-countries/|domain=cyberlaws.net|U=22|L=10|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.computerhope.com/jargon/c/cyber-law.htm|domain=computerhope.com|U=22|L=2917|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=law.jrank.org/pages/11983/Cyber-Crime-Computers-targets-or-criminal-tools.html#:~:text=Computers%20can%20be%20the%20target,unleashing%20a%20virus%20through%20email.|domain=law.jrank.org|U=22|L=2199|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/evolution-in-the-world-of-cyber-crime/|domain=resources.infosecinstitute.com|U=22|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=976728270|lang=en|wikidomain=w|namespace=Draft|pagename=Burp Suite|username=Mvb71|link=resources.infosecinstitute.com/burpsuite-tutorial/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=112151329|edit_id=-3|resolved=X|isIP=0|date=2020-10-16|time=03:14:07|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=38|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/penetration-testing/burpsuite-tutorial/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/burpsuite-tutorial/|domain=resources.infosecinstitute.com|U=38|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=976728259|lang=en|wikidomain=w|namespace=Draft|pagename=Burp Suite|username=Mvb71|link=resources.infosecinstitute.com/burpsuite-tutorial/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=112151330|edit_id=-3|resolved=X|isIP=0|date=2020-10-16|time=03:14:12|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=38|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/penetration-testing/burpsuite-tutorial/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/burpsuite-tutorial/|domain=resources.infosecinstitute.com|U=38|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=979824986|lang=ru|wikidomain=n|namespace=|pagename=Уязвимости в MySQL, Wicd, FreePBX, RPM, MediaWiki, Ghostscript, LibTIFF, libpng, FFmpeg, Gajim, Puppet|username=NewsBots|link=www.infosecinstitute.com/courses/ethical_hacking_training.html|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://ru.wikinews.org/w/index.php?oldid=8676564&rcid=27783956|edit_id=-2|resolved=X|isIP=0|date=2020-10-23|time=03:11:56|wiki=ru.wikinews.org|revid=8676564|oldid=0|usercount=6235406|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=connect.ok.ru/offer?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%25A3%25D1%258F%25D0%25B7%25D0%25B2%25D0%25B8%25D0%25BC%25D0%25BE%25D1%2581%25D1%2582%25D0%25B8_%25D0%25B2_MySQL%2C_Wicd%2C_FreePBX%2C_RPM%2C_MediaWiki%2C_Ghostscript%2C_LibTIFF%2C_libpng%2C_FFmpeg%2C_Gajim%2C_Puppet&title=%D0%A3%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8+%D0%B2+MySQL%2C+Wicd%2C+FreePBX%2C+RPM%2C+MediaWiki%2C+Ghostscript%2C+LibTIFF%2C+libpng%2C+FFmpeg%2C+Gajim%2C+Puppet+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8|domain=connect.ok.ru|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=vkontakte.ru/share.php?url=https:%2F%2Fru.wikinews.org%2Fwiki%2F%25D0%25A3%25D1%258F%25D0%25B7%25D0%25B2%25D0%25B8%25D0%25BC%25D0%25BE%25D1%2581%25D1%2582%25D0%25B8_%25D0%25B2_MySQL%2C_Wicd%2C_FreePBX%2C_RPM%2C_MediaWiki%2C_Ghostscript%2C_LibTIFF%2C_libpng%2C_FFmpeg%2C_Gajim%2C_Puppet&title=%D0%A3%D1%8F%D0%B7%D0%B2%D0%B8%D0%BC%D0%BE%D1%81%D1%82%D0%B8+%D0%B2+MySQL%2C+Wicd%2C+FreePBX%2C+RPM%2C+MediaWiki%2C+Ghostscript%2C+LibTIFF%2C+libpng%2C+FFmpeg%2C+Gajim%2C+Puppet+%E2%80%94+%D0%92%D0%B8%D0%BA%D0%B8%D0%BD%D0%BE%D0%B2%D0%BE%D1%81%D1%82%D0%B8|domain=vkontakte.ru|U=6235406|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.opennet.ru/opennews/art.shtml?num=33607|domain=opennet.ru|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=puppetlabs.com/security/|domain=puppetlabs.com|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=puppetlabs.com|domain=puppetlabs.com|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=secunia.com/advisories/48708/|domain=secunia.com|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=gajim.org|domain=gajim.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ffmpeg.org/download.html|domain=ffmpeg.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=secunia.com/advisories/48770/|domain=secunia.com|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=ffmpeg.org|domain=ffmpeg.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.libpng.org/pub/png/src/libpng-1.5.10-README.txt|domain=libpng.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=home.gdal.org/private/zdi-can-1221/zdi-can-1221.txt|domain=home.gdal.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=bugs.ghostscript.com/show_bug.cgi?id=692856|domain=bugs.ghostscript.com|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.ghostscript.com|domain=ghostscript.com|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=rpm.org/wiki/Releases/4.9.1.3#Security|domain=rpm.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.freepbx.org/news/2012-03-26/security-concerns-2-11-updates-and-expiring-early-bird-specials|domain=freepbx.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archives.neohapsis.com/archives/fulldisclosure/2012-03/0234.html|domain=archives.neohapsis.com|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.freepbx.org|domain=freepbx.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=launchpad.net/wicd/+announcement/9888|domain=launchpad.net|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.infosecinstitute.com/courses/ethical_hacking_training.html|domain=infosecinstitute.com|U=6235406|L=50|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=seclists.org/fulldisclosure/2012/Apr/123|domain=seclists.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=pastebin.com/tCxNTD96|domain=pastebin.com|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=bugs.mysql.com/bug.php?id=59533|domain=bugs.mysql.com|U=6235406|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=permalink.gmane.org/gmane.comp.db.mysql.announce/655|domain=permalink.gmane.org|U=6235406|L=999999999|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=985640767|lang=en|wikidomain=w|namespace=User|pagename=Password cracking|username=Hiiisparks|link=resources.infosecinstitute.com/topic/10-popular-password-cracking-tools/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=112666300|edit_id=-3|resolved=X|isIP=0|date=2020-11-07|time=21:20:19|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1544|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/10-popular-password-cracking-tools/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/10-popular-password-cracking-tools/|domain=resources.infosecinstitute.com|U=1544|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=985640766|lang=en|wikidomain=w|namespace=User|pagename=Password cracking|username=Hiiisparks|link=resources.infosecinstitute.com/topic/10-popular-password-cracking-tools/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=112666310|edit_id=-3|resolved=X|isIP=0|date=2020-11-07|time=21:20:56|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1544|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/10-popular-password-cracking-tools/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/10-popular-password-cracking-tools/|domain=resources.infosecinstitute.com|U=1544|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=990352461|lang=en|wikidomain=w|namespace=Wikipedia|pagename=One-time password|username=Hiiisparks|link=resources.infosecinstitute.com/topic/one-time-passwords-pros-and-cons/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=112987483|edit_id=-3|resolved=X|isIP=0|date=2020-11-21|time=10:24:29|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1544|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/one-time-passwords-pros-and-cons/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/one-time-passwords-pros-and-cons/|domain=resources.infosecinstitute.com|U=1544|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1003068354|lang=en|wikidomain=w|namespace=Talk|pagename=InfoSec Institute|username=AshMo90|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=113766030|edit_id=-3|resolved=X|isIP=0|date=2020-12-21|time=07:02:59|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=75|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=75|L=50|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1012697934|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Google hacking|username=Machinexa|link=resources.infosecinstitute.com/topic/defending-from-google-hackers/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=114490991|edit_id=-3|resolved=X|isIP=0|date=2021-01-16|time=13:57:51|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=4198|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/google-hacking-overview/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/defending-from-google-hackers/|domain=resources.infosecinstitute.com|U=4198|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1046764296|lang=en|wikidomain=w|namespace=Talk|pagename=Carding (fraud)|username=Hiiisparks|link=resources.infosecinstitute.com/topic/all-about-carding-for-noobs-only/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=116153532|edit_id=-3|resolved=X|isIP=0|date=2021-03-13|time=08:42:12|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=1544|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/security-awareness/all-about-carding-for-noobs-only/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/all-about-carding-for-noobs-only/|domain=resources.infosecinstitute.com|U=1544|L=282|UL=4|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1225340520|lang=en|wikidomain=w|namespace=Draft|pagename=Android (operating system)|username=Bricomsci|link=resources.infosecinstitute.com/topic/practical-android-phone-forensics/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=118578369|edit_id=-3|resolved=X|isIP=0|date=2021-06-14|time=01:20:02|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=4895|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/practical-android-phone-forensics/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/practical-android-phone-forensics/|domain=resources.infosecinstitute.com|U=4895|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1230421540|lang=en|wikidomain=w|namespace=User|pagename=Rungspeek/sandbox|username=Rungspeek|link=resources.infosecinstitute.com/topic/masscan-scan-internet-minutes/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=118644755|edit_id=-3|resolved=X|isIP=0|date=2021-06-16|time=18:30:20|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=208|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/penetration-testing/masscan-scan-internet-minutes/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/masscan-scan-internet-minutes/|domain=resources.infosecinstitute.com|U=208|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1365120795|lang=et|wikidomain=w|namespace=|pagename=Steganograafia|username=Suwa|link=resources.infosecinstitute.com/topic/steganography-and-tools-to-perform-steganography/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://et.wikipedia.org/w/index.php?diff=5952555&oldid=5952553|edit_id=-2|resolved=X|isIP=0|date=2021-08-28|time=10:07:54|wiki=et.wikipedia.org|revid=5952555|oldid=5952553|usercount=4032|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/cryptography/steganography-and-tools-to-perform-steganography/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/steganography-and-tools-to-perform-steganography/|domain=resources.infosecinstitute.com|U=4032|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1365139046|lang=et|wikidomain=w|namespace=|pagename=Steganograafia|username=Suwa|link=resources.infosecinstitute.com/topic/steganography-and-tools-to-perform-steganography/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://et.wikipedia.org/w/index.php?diff=5952563&oldid=5952559|edit_id=-2|resolved=X|isIP=0|date=2021-08-28|time=10:22:28|wiki=et.wikipedia.org|revid=5952563|oldid=5952559|usercount=4032|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/cryptography/steganography-and-tools-to-perform-steganography/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/steganography-and-tools-to-perform-steganography/|domain=resources.infosecinstitute.com|U=4032|L=282|UL=2|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1503124595|lang=en|wikidomain=w|namespace=User|pagename=ShadowBee/sandbox|username=ShadowBee|link=resources.infosecinstitute.com/topic/practical-android-phone-forensics/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=123903378|edit_id=-3|resolved=X|isIP=0|date=2021-11-17|time=01:54:28|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=236|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/practical-android-phone-forensics/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/practical-android-phone-forensics/|domain=resources.infosecinstitute.com|U=236|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1503124573|lang=en|wikidomain=w|namespace=User|pagename=ShadowBee/sandbox|username=ShadowBee|link=resources.infosecinstitute.com/topic/practical-android-phone-forensics/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=123903383|edit_id=-3|resolved=X|isIP=0|date=2021-11-17|time=01:55:19|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=236|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/practical-android-phone-forensics/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/practical-android-phone-forensics/|domain=resources.infosecinstitute.com|U=236|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1503124369|lang=en|wikidomain=w|namespace=User|pagename=ShadowBee/sandbox|username=ShadowBee|link=resources.infosecinstitute.com/topic/practical-android-phone-forensics/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=123903389|edit_id=-3|resolved=X|isIP=0|date=2021-11-17|time=01:56:05|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=236|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/digital-forensics/practical-android-phone-forensics/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/practical-android-phone-forensics/|domain=resources.infosecinstitute.com|U=236|L=282|UL=3|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1550928639|lang=en|wikidomain=w|namespace=User|pagename=Bfull342/Choose an Article|username=Bfull342|link=resources.infosecinstitute.com/topic/introduction-anti-phishing/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=127422063|edit_id=-3|resolved=X|isIP=0|date=2022-02-08|time=03:08:43|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=40|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/phishing/introduction-anti-phishing/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/introduction-anti-phishing/|domain=resources.infosecinstitute.com|U=40|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1551260130|lang=fi|wikidomain=w|namespace=|pagename=Avoin protokolla|username=Avoinlähde|link=resources.infosecinstitute.com/topic/open-vs-proprietary-protocols|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fi.wikipedia.org/w/index.php?oldid=20289982&rcid=42332245|edit_id=-2|resolved=X|isIP=0|date=2022-02-11|time=12:46:50|wiki=fi.wikipedia.org|revid=20289982|oldid=0|usercount=0|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/scada-ics-security/open-vs-proprietary-protocols/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=coss.fi/avoimuus|domain=coss.fi|U=0|L=12|UL=0|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=opensource.org|domain=opensource.org|U=0|L=5472|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/open-vs-proprietary-protocols|domain=resources.infosecinstitute.com|U=0|L=282|UL=0|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1557114147|lang=de|wikidomain=w|namespace=Benutzer|pagename=Wiper (Schadsoftware)|username=Sanandros|link=resources.infosecinstitute.com/topic/malware-spotlight-what-are-wipers/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://de.wikipedia.org/w/index.php?diff=221342412&oldid=221324419|edit_id=-2|resolved=X|isIP=0|date=2022-03-20|time=18:22:38|wiki=de.wikipedia.org|revid=221342412|oldid=221324419|usercount=6976|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group sysop on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/malware-spotlight-what-are-wipers/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/malware-spotlight-what-are-wipers/|domain=resources.infosecinstitute.com|U=6976|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1557717117|lang=en|wikidomain=w|namespace=User|pagename=Open protocol|username=AvoinlÃÂähde|link=resources.infosecinstitute.com/topic/open-vs-proprietary-protocols/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=129276728|edit_id=-3|resolved=X|isIP=0|date=2022-03-23|time=20:28:34|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=0|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/scada-ics-security/open-vs-proprietary-protocols/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/open-vs-proprietary-protocols/|domain=resources.infosecinstitute.com|U=0|L=282|UL=0|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1557717096|lang=en|wikidomain=w|namespace=User|pagename=Open protocol|username=AvoinlÃÂähde|link=resources.infosecinstitute.com/topic/open-vs-proprietary-protocols/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=129276783|edit_id=-3|resolved=X|isIP=0|date=2022-03-23|time=20:30:40|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=0|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/scada-ics-security/open-vs-proprietary-protocols/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/open-vs-proprietary-protocols/|domain=resources.infosecinstitute.com|U=0|L=282|UL=0|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1558952715|lang=en|wikidomain=w|namespace=User|pagename=NSA ANT catalog|username=PhotographyEdits|link=resources.infosecinstitute.com/topic/nsa-bios-backdoor-god-mode-malware-deitybounce/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=129916822|edit_id=-3|resolved=X|isIP=0|date=2022-04-08|time=14:22:04|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=17150|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/malware-analysis/nsa-bios-backdoor-aka-god-mode-malware-part-2-bulldozer/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/nsa-bios-backdoor-god-mode-malware-deitybounce/|domain=resources.infosecinstitute.com|U=17150|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1571228874|lang=en|wikidomain=w|namespace=Draft|pagename=DNS sinkhole|username=MichielN|link=resources.infosecinstitute.com/topic/dns-sinkhole/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=135361618|edit_id=-3|resolved=X|isIP=0|date=2022-08-19|time=16:02:56|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=5177|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/dns-sinkhole/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/dns-sinkhole/|domain=resources.infosecinstitute.com|U=5177|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1571704676|lang=en|wikidomain=w|namespace=User talk|pagename=Cengage|username=DecorumForum125|link=www.infosecinstitute.com/newsroom/cengage-group-completes-acquisition-of-infosec/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=135488034|edit_id=-3|resolved=X|isIP=0|date=2022-08-22|time=21:36:33|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=144|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/newsroom/cengage-group-completes-acquisition-of-infosec/|domain=infosecinstitute.com|U=144|L=50|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1571704673|lang=en|wikidomain=w|namespace=User talk|pagename=InfoSec Institute|username=DecorumForum125|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=135488064|edit_id=-3|resolved=X|isIP=0|date=2022-08-22|time=21:39:20|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=144|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=144|L=50|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1571713431|lang=pt|wikidomain=w|namespace=|pagename=Vigilância de computadores e redes|username=Dorito voador20|link=resources.infosecinstitute.com/topic/nsa-monitors-target-computers-radar-wave-devices/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://pt.wikipedia.org/w/index.php?diff=64253695&oldid=64248750&rcid=115923457|edit_id=-2|resolved=X|isIP=0|date=2022-08-23|time=01:27:16|wiki=pt.wikipedia.org|revid=64253695|oldid=64248750|usercount=892|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/nsa-monitors-target-computers-radar-wave-devices/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/nsa-monitors-target-computers-radar-wave-devices/|domain=resources.infosecinstitute.com|U=892|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arstechnica.com/tech-policy/news/2011/02/black-ops-how-hbgary-wrote-backdoors-and-rootkits-for-the-government.ars|domain=arstechnica.com|U=892|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.tecmundo.com.br/antivirus/2174-o-que-e-rootkit-.htm|domain=tecmundo.com.br|U=892|L=4113|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=theintercept.com/2014/03/12/nsa-plans-infect-millions-computers-malware/|domain=theintercept.com|U=892|L=43870|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1574042914|lang=en|wikidomain=w|namespace=User|pagename=EtherType|username=Guy Harris|link=community.infosecinstitute.com/discussion/104431/isis|sortdomain=com.infosecinstitute.community.|domain=community.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=136247797|edit_id=-3|resolved=X|isIP=0|date=2022-09-08|time=18:53:09|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=62335|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=community.infosecinstitute.com/discussion/104431/isis|domain=community.infosecinstitute.com|U=62335|L=3|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1574042906|lang=en|wikidomain=w|namespace=User|pagename=EtherType|username=Guy Harris|link=community.infosecinstitute.com/discussion/104431/isis).|sortdomain=com.infosecinstitute.community.|domain=community.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=136247815|edit_id=-3|resolved=X|isIP=0|date=2022-09-08|time=18:54:05|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=62335|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=community.infosecinstitute.com/discussion/104431/isis).|domain=community.infosecinstitute.com|U=62335|L=3|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1575683543|lang=en|wikidomain=w|namespace=Talk|pagename=Software cracking|username=46.204.12.214|link=resources.infosecinstitute.com/topic/kali-linux-top-8-tools-for-reverse-engineering/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=136699680|edit_id=-3|resolved=X|isIP=1|date=2022-09-18|time=18:00:15|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=3|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/reverse-engineering/kali-linux-top-8-tools-for-reverse-engineering/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/kali-linux-top-8-tools-for-reverse-engineering/|domain=resources.infosecinstitute.com|U=3|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1583625850|lang=en|wikidomain=w|namespace=Talk|pagename=InfoSec Institute|username=Peter39c|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=138869459|edit_id=-3|resolved=X|isIP=0|date=2022-11-06|time=04:55:15|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=8440|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=8440|L=50|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1583625849|lang=en|wikidomain=w|namespace=Talk|pagename=InfoSec Institute|username=Peter39c|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=138869480|edit_id=-3|resolved=X|isIP=0|date=2022-11-06|time=04:57:36|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=8440|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=8440|L=50|UL=2|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1586507500|lang=en|wikidomain=w|namespace=User|pagename=Brad Haines|username=Albertajunkie|link=resources.infosecinstitute.com/topic/cyber-threats-aviation-industry/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=139660873|edit_id=-3|resolved=X|isIP=0|date=2022-11-25|time=17:26:59|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=102|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/scada-ics-security/cyber-threats-aviation-industry/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/cyber-threats-aviation-industry/|domain=resources.infosecinstitute.com|U=102|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1591996488|lang=en|wikidomain=w|namespace=Draft|pagename=SESIP|username=Serro03|link=resources.infosecinstitute.com/topic/the-real-dangers-of-vulnerable-iot-devices/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=140901646|edit_id=-3|resolved=X|isIP=0|date=2022-12-28|time=10:56:37|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=8|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/vulnerabilities/the-real-dangers-of-vulnerable-iot-devices/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topic/the-real-dangers-of-vulnerable-iot-devices/|domain=resources.infosecinstitute.com|U=8|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1602835058|lang=en|wikidomain=b|namespace=|pagename=Information Technology and Ethics/The Privacy Chapter : Completed|username=Ademuth1|link=resources.infosecinstitute.com/5-social-media-site-privacy-issues-worry/#gref|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikibooks.org/w/index.php?diff=4283877&oldid=4283875|edit_id=-2|resolved=X|isIP=0|date=2023-04-25|time=06:14:52|wiki=en.wikibooks.org|revid=4283877|oldid=4283875|usercount=29|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/5-social-media-site-privacy-issues-worry/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/5-social-media-site-privacy-issues-worry/#gref|domain=resources.infosecinstitute.com|U=29|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1611174764|lang=|wikidomain=d|namespace=|pagename=Q30639573|username=2A02:2788:228:2EE:DCAF:3471:29FB:AE9F|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://www.wikidata.org/w/index.php?diff=1908779676&oldid=1374297235&rcid=1967131293|edit_id=-2|resolved=X|isIP=1|date=2023-06-05|time=11:53:55|wiki=www.wikidata.org|revid=1908779676|oldid=1374297235|usercount=8|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=8|L=50|UL=1|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1611182664|lang=fr|wikidomain=w|namespace=|pagename=IMSI-catcher|username=2A02:2788:228:2EE:DCAF:3471:29FB:AE9F|link=resources.infosecinstitute.com/cellphone-surveillance-the-secret-arsenal/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=204930027&oldid=202037545&rcid=494983412|edit_id=-2|resolved=X|isIP=1|date=2023-06-05|time=13:04:34|wiki=fr.wikipedia.org|revid=204930027|oldid=202037545|usercount=8|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/general-security/cellphone-surveillance-the-secret-arsenal/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.cryptophone.de/|domain=cryptophone.de|U=8|L=6|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.x-cellular.com/|domain=x-cellular.com|U=8|L=5|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=webcache.googleusercontent.com/search?hl=fr&q=cache:https://www.privacyinternational.org/node/454|domain=webcache.googleusercontent.com|U=8|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.is/https://www.privacyinternational.org/node/454|domain=archive.is|U=8|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=archive.wikiwix.com/cache/?url=https://www.privacyinternational.org/node/454|domain=archive.wikiwix.com|U=8|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=web.archive.org/web/*/https://www.privacyinternational.org/node/454|domain=web.archive.org|U=8|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/cellphone-surveillance-the-secret-arsenal/|domain=resources.infosecinstitute.com|U=8|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1633366285|lang=pl|wikidomain=w|namespace=|pagename=Wiper|username=109.95.25.234|link=resources.infosecinstitute.com/topics/news/cyber-attack-sony-pictures-much-data-breach/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://pl.wikipedia.org/w/index.php?oldid=71553697&rcid=137923599|edit_id=-2|resolved=X|isIP=1|date=2023-10-19|time=15:02:34|wiki=pl.wikipedia.org|revid=71553697|oldid=0|usercount=24|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/news/cyber-attack-sony-pictures-much-data-breach/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=avlab.pl/f-secure-sense-mocne-strony-routera-ktory-przez-dwa-tygodnie-zabezpieczal-nasza-siec-wi-fi/|domain=avlab.pl|U=24|L=7|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securelist.com/what-was-that-wiper-thing-48/34088/|domain=securelist.com|U=24|L=2047|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.bbc.com/news/uk-32493516|domain=bbc.com|U=24|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.pandasecurity.com/en/mediacenter/news/guardians-peace-new-hacker-group-loose/|domain=pandasecurity.com|U=24|L=980|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securityaffairs.com/30875/cyber-crime/wiper-malware-hit-sony-picture-written-korean.html|domain=securityaffairs.com|U=24|L=28|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topics/news/cyber-attack-sony-pictures-much-data-breach/|domain=resources.infosecinstitute.com|U=24|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securityaffairs.com/30791/cyber-crime/trendmicro-analyzed-wiper-malware-infected-sony-pictures.html|domain=securityaffairs.com|U=24|L=28|UL=2|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=arstechnica.com/information-technology/2014/12/inside-the-wiper-malware-that-brought-sony-pictures-to-its-knees/|domain=arstechnica.com|U=24|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=worldcat.org/issn/1059-1028|domain=worldcat.org|U=24|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.wired.com/2012/08/wiper-possible-origins/|domain=wired.com|U=24|L=-1|UL=X|WUL=X|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=www.metaling.si/varnost.php?subaction=showfull&id=1110978596&archive=&cnshow=news&start_from=&ucat=&|domain=metaling.si|U=24|L=3|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=securityintelligence.com/wiper-malware-poses-destructive-threat/|domain=securityintelligence.com|U=24|L=818|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1652964319|lang=fr|wikidomain=w|namespace=|pagename=DarkComet|username=MalzFan|link=resources.infosecinstitute.com/topics/threat-intelligence/wikileaks-vault-7-data-leak-another-earthquake-intelligence-community/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://fr.wikipedia.org/w/index.php?diff=212269228&oldid=212269045&rcid=513513948|edit_id=-2|resolved=X|isIP=0|date=2024-02-08|time=17:11:46|wiki=fr.wikipedia.org|revid=212269228|oldid=212269045|usercount=13|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/threat-intelligence/wikileaks-vault-7-data-leak-another-earthquake-intelligence-community/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/topics/threat-intelligence/wikileaks-vault-7-data-leak-another-earthquake-intelligence-community/|domain=resources.infosecinstitute.com|U=13|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1653178969|lang=en|wikidomain=w|namespace=|pagename=Dark web|username=GreenC bot|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?diff=1205671675&oldid=1194860605|edit_id=-2|resolved=X|isIP=0|date=2024-02-10|time=05:24:51|wiki=en.wikipedia.org|revid=1205671675|oldid=1194860605|usercount=5807745|whitelisted=1|blacklisteduser=0|whitereason=User is in a trusted group bot on some wikis|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/hacking-communities-in-the-deep-web/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/hacking-communities-in-the-deep-web/|domain=resources.infosecinstitute.com|U=5807745|L=282|UL=X|WUL=X|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1691384937|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=80.187.122.174|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=164407894|edit_id=-3|resolved=X|isIP=1|date=2024-09-12|time=14:13:57|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=13|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=13|L=50|UL=5|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1691384515|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=80.187.122.174|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=164407896|edit_id=-3|resolved=X|isIP=1|date=2024-09-12|time=14:14:12|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=13|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=13|L=50|UL=5|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1691384125|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=80.187.122.174|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=164407921|edit_id=-3|resolved=X|isIP=1|date=2024-09-12|time=14:15:47|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=13|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=13|L=50|UL=5|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1691383697|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=80.187.122.174|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=164407928|edit_id=-3|resolved=X|isIP=1|date=2024-09-12|time=14:15:59|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=13|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=13|L=50|UL=5|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1691383183|lang=en|wikidomain=w|namespace=MediaWiki talk|pagename=Spam-blacklist|username=80.187.122.174|link=www.infosecinstitute.com/|sortdomain=com.infosecinstitute.|domain=infosecinstitute.com|origdiff=https://en.wikipedia.org/w/index.php?title=Special:Log&type=spamblacklist&logid=164407930|edit_id=-3|resolved=X|isIP=1|date=2024-09-12|time=14:16:04|wiki=en.wikipedia.org|revid=0|oldid=0|usercount=13|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=1|there=|checked=0|coiflag=0|otherlinks={{User:COIBot/OtherLinks|link=www.infosecinstitute.com/|domain=infosecinstitute.com|U=13|L=50|UL=5|WUL=1|base=|basedomain=|baseip=}}}}
{{User:COIBot/EditSummary|id=1698653768|lang=hy|wikidomain=w|namespace=|pagename=Դոմենի խարդախում|username=Slava Sahakyan70|link=resources.infosecinstitute.com/domain-slamming/|sortdomain=com.infosecinstitute.resources.|domain=resources.infosecinstitute.com|origdiff=https://hy.wikipedia.org/w/index.php?diff=10128527&oldid=10128488|edit_id=-2|resolved=X|isIP=0|date=2024-10-15|time=16:40:53|wiki=hy.wikipedia.org|revid=10128527|oldid=10128488|usercount=204084|whitelisted=0|blacklisteduser=0|whitereason=|blackreason=|deleted=0|top=0|there=|checked=0|coiflag=0|base=www.infosecinstitute.com/resources/hacking/domain-slamming/|basedomain=infosecinstitute.com|baseip=217.114.94.2|remark=|otherlinks={{User:COIBot/OtherLinks|link=www.jmg-enterprises.com/images/droa-front.jpg|domain=jmg-enterprises.com|U=204084|L=1|UL=1|WUL=1|base=|basedomain=|baseip=}}{{User:COIBot/OtherLinks|link=resources.infosecinstitute.com/domain-slamming/|domain=resources.infosecinstitute.com|U=204084|L=282|UL=1|WUL=0|base=|basedomain=|baseip=}}}}
{{User:COIBot/Additionlist_bottom}}
- Displayed all 299 additions.