This is an automatically generated cleanup listing.
Warning: WolterBot stopped operating in 2010 and has been superseded by User:CleanupWorklistBot. Live cleanup listings can be found at bambots
The listing is based on a database snapshot of 12 March 2010. It contains all articles flagged for cleanup which are tagged with {{WikiProject Computer Security}} on their talk page.
Based on that data, 962 articles are assigned to this project, of which 495, or 51.5%, are flagged for cleanup.
The following quality assessment classes were evaluated for this report:
Assessment class | Abbrev. | Category |
---|---|---|
Featured articles | FA | Category:FA-Class Computer Security articles |
Featured lists | FL | Category:FL-Class Computer Security articles |
A-Class articles | A | Category:A-Class Computer Security articles |
Good articles | GA | Category:GA-Class Computer Security articles |
The following importance assessment classes were evaluated for this report:
Assessment class | Abbrev. | Category |
---|---|---|
Top-importance articles | Top | Category:Top-importance Computer Security articles |
High-importance articles | High | Category:High-importance Computer Security articles |
The project has 2 featured articles. 2 of them, or 100.0%, are flagged for cleanup.
Article | Maintenance categories |
---|---|
Acid2 «FA» | Articles needing additional references (Nov 2009) |
Storm botnet «FA» | Articles with obsolete information, Articles with unsourced statements (Mar 2008) |
The project has 1 featured lists. None of them is flagged for cleanup.
The project has 0 A-Class articles.
The project has 5 good articles. 2 of them, or 40.0%, are flagged for cleanup.
Article | Maintenance categories |
---|---|
Microsoft Security Essentials «GA» | Articles with obsolete information, Articles with unsourced statements (Oct 2009) |
Norton 360 «GA» | Wikipedia articles in need of updating |
The project has 19 top-importance articles. 13 of them, or 68.4%, are flagged for cleanup.
Article | Maintenance categories |
---|---|
Committee on National Security Systems «Top» | Articles lacking sources (Oct 2009), Articles needing expert attention (Oct 2009), Computer Security articles needing expert attention, Education articles needing expert attention |
Computer insecurity «Top» | Articles lacking in-text citations (Dec 2009), Articles needing cleanup (Dec 2008), Articles with unsourced statements (Feb 2007, Mar 2008), Wikipedia articles needing style editing (Dec 2007) |
Computer security «Top» | Articles with unsourced statements (Aug 2008, Apr 2009, Aug 2009), Wikipedia articles needing clarification (Feb 2009) |
Cyberspace «Top» | Articles with unsourced statements (Dec 2007) |
Cyber spying «Top» | Articles lacking in-text citations (Jun 2009) |
Firewall (computing) «Top» | Articles needing additional references (Feb 2008) |
Information security «Top» | Articles to be expanded (Feb 2007), Articles with specifically-marked weasel-worded phrases (Feb 2010), Articles with unsourced statements (Jan 2008, May 2009) |
Malware «Top» | Articles with specifically-marked weasel-worded phrases (Dec 2009), Articles with unsourced statements (Feb 2007, Nov 2008) |
Security bug «Top» | Articles lacking sources (Feb 2008), Articles to be merged (Jan 2010) |
Software Security Assurance «Top» | Articles that need to be wikified (Jul 2008), Wikipedia articles needing copy edit (Jul 2008) |
Systems assurance «Top» | Articles lacking sources (Jan 2008), Articles with topics of unclear notability (Jan 2008), Orphaned articles (Feb 2009) |
Theo de Raadt «Top» | Articles with unsourced statements (Jan 2010) |
Vulnerability (computing) «Top» | Articles needing additional references (Jun 2008), Articles to be merged (Jan 2010), Wikipedia articles needing style editing (Jun 2008), Wikipedia external links cleanup, Wikipedia spam cleanup |
The project has 79 high-importance articles. 48 of them, or 60.8%, are flagged for cleanup.
Article | Maintenance categories |
---|---|
2007 cyberattacks on Estonia «High» | Articles with unsourced statements (Jul 2007) |
4K (computer virus) «High» | Articles lacking sources (Sep 2009) |
Ad-Aware «High» | Articles with unsourced statements (Oct 2007, Oct 2009) |
Adam Botbyl «High» | Articles with unsourced statements (Dec 2008) |
Adware «High» | Articles lacking sources (Jun 2009), Articles with unsourced statements (Oct 2009, Jan 2010) |
Anti-phishing software «High» | Articles needing cleanup (Dec 2008) |
Arbitrary code execution «High» | Articles lacking sources (Dec 2009) |
Attack patterns «High» | Orphaned articles (Feb 2009) |
Authentication «High» | Articles with unsourced statements (Jan 2010) |
Bruce Schneier «High» | Articles with unsourced statements (Dec 2008) |
Brute force attack «High» | Articles lacking in-text citations (Nov 2008) |
Computer crime «High» | Articles needing cleanup (Oct 2008), Articles with specifically-marked weasel-worded phrases (Oct 2007), Articles with unsourced statements (Oct 2008, Jan 2009, Feb 2010) |
Computer virus «High» | Articles lacking reliable references (Mar 2009), Articles that may contain original research (Jan 2008, Mar 2009), Articles with unsourced statements (Jan 2008, Feb 2009) |
Cross-site scripting «High» | Articles with unsourced statements (Oct 2009) |
Cyberwarfare «High» | Articles with unsourced statements (Oct 2009, Feb 2010), Wikipedia articles needing style editing (Nov 2009) |
Denial-of-service attack «High» | Articles containing predictions or speculation, Articles needing cleanup (Dec 2009), Articles with unsourced statements (Aug 2007, Sep 2008, Jan 2009, Sep 2009) |
DMZ (computing) «High» | Articles lacking sources (Oct 2008), Articles with unsourced statements (Dec 2008) |
Electronic Frontier Foundation «High» | Articles with unsourced statements (Jan 2010), Wikipedia articles needing clarification (Feb 2010) |
Eric Corley «High» | Articles with unsourced statements (Sep 2009) |
Exploit (computer security) «High» | Articles with unsourced statements (Feb 2008, Aug 2009) |
Form (computer virus) «High» | Articles with unsourced statements (Feb 2010) |
Gary McKinnon «High» | Articles with dead external links (Jan 2010), Articles with unsourced statements (Aug 2009, Jan 2010) |
Hacker (computer security) «High» | Articles needing additional references (Nov 2007), Articles needing cleanup (Aug 2008), Articles with invalid date parameter in template, Articles with sections that need to be turned into prose (Aug 2008), Articles with unsourced statements (May 2008, Oct 2008, Feb 2010) |
Hacker (computing) «High» | Wikipedia articles needing reorganization |
Honeypot (computing) «High» | Articles needing additional references (Jun 2009), Articles with unsourced statements (Oct 2008) |
Information assurance «High» | Articles lacking in-text citations (Feb 2008), Articles needing cleanup (Feb 2008), Articles with unsourced statements (Sep 2009) |
Intrusion prevention system «High» | Articles with unsourced statements (Aug 2009, Jan 2010) |
Jetico Personal Firewall «High» | Articles with topics of unclear notability (Jun 2009), Articles with unsourced statements (Dec 2009) |
Kaspersky Lab «High» | Articles needing cleanup (Apr 2009), Articles with unsourced statements (Mar 2009), Vague or ambiguous time |
Kevin Mitnick «High» | Articles with unsourced statements (Jan 2010) |
McAfee Personal Firewall Plus «High» | Articles lacking sources (Dec 2007) |
Norton Personal Firewall «High» | Articles to be merged (Mar 2009), Articles with unsourced statements (Aug 2008) |
Operation D-Elite «High» | Articles with unsourced statements (Feb 2007, Sep 2009) |
Peter G. Neumann «High» | Articles lacking in-text citations (Oct 2009) |
Phishing «High» | Articles that may contain original research (Dec 2008), Articles with unsourced statements (Dec 2008), NPOV disputes (Dec 2008) |
Port scanner «High» | Articles needing additional references (Jul 2009), Articles with unsourced statements (May 2009, Jul 2009) |
Pretty Good Privacy «High» | Articles with unsourced statements (Feb 2010) |
Proxy server «High» | Articles needing additional references (Feb 2009, Sep 2009), Articles needing expert attention (Nov 2008), Articles with unsourced statements (Oct 2008, Feb 2010), Technology articles needing expert attention |
Robert Tappan Morris «High» | Articles with unsourced statements (Oct 2009) |
Rootkit «High» | Articles with unsourced statements (Sep 2007, Aug 2008, Mar 2009), Wikipedia articles needing copy edit (May 2009) |
Security as a service «High» | Articles lacking sources (Feb 2010), Articles with topics of unclear notability (Feb 2010) |
Security Now! «High» | Articles lacking reliable references (Jul 2008) |
Spybot – Search & Destroy «High» | Orphaned articles (Mar 2010), Wikipedia references cleanup (Sep 2009) |
Spyware «High» | Articles with unsourced statements (Feb 2007, Feb 2009), Vague or ambiguous time |
Timeline of computer security hacker history «High» | Articles lacking reliable references (Aug 2008), Articles that may contain original research (Aug 2008), Articles that need to be wikified (Nov 2008), Articles with specifically-marked weasel-worded phrases (Aug 2008), Articles with unsourced statements (Aug 2008) |
Timeline of computer viruses and worms «High» | Articles needing cleanup (Nov 2009), Articles needing link rot cleanup, Articles with unsourced statements (Oct 2008, Feb 2009, Sep 2009, Mar 2010) |
Trojan horse (computing) «High» | Articles with unsourced statements (Nov 2009) |
Vundo «High» | Articles with unsourced statements (Feb 2010) |
Article | Maintenance categories |
---|---|
Domx | Articles lacking reliable references (Dec 2008), Articles needing more detailed references, Articles that may contain original research (Jul 2008, Dec 2008), Articles with broken or outdated citations (Dec 2008), Articles with specifically-marked weasel-worded phrases (Dec 2008), Articles with topics of unclear notability (Jul 2008), Articles with unsourced statements (Dec 2008), Articles with weasel words (Dec 2008), Orphaned articles (Jul 2008), Wikipedia articles needing clarification (Dec 2008) |
Article | Maintenance categories |
---|---|
Keystroke logging | Articles needing additional references (Feb 2010), Articles needing cleanup (Mar 2008, Aug 2009), Articles to be expanded (Aug 2009), Articles with unsourced statements (Sep 2008, Apr 2009, Aug 2009, Oct 2009), Wikipedia articles needing clarification (Aug 2009) |
Article | Maintenance categories |
---|---|
Chinese wall | Articles lacking sources (Jul 2008), Articles that may contain original research (Oct 2009), Articles with unsourced statements (Feb 2007, Jun 2009, Aug 2009, Sep 2009, Oct 2009) |
Hacker (computer security) «High» | Articles needing additional references (Nov 2007), Articles needing cleanup (Aug 2008), Articles with invalid date parameter in template, Articles with sections that need to be turned into prose (Aug 2008), Articles with unsourced statements (May 2008, Oct 2008, Feb 2010) |
Security through obscurity | Articles needing additional references (Nov 2009), Articles that may contain original research (Nov 2009), Articles with disputed statements (Nov 2009), Articles with specifically-marked weasel-worded phrases (Nov 2009), Articles with unsourced statements (Feb 2008, Jul 2009, Nov 2009) |
Article | Maintenance categories |
---|---|
Denial-of-service attack «High» | Articles containing predictions or speculation, Articles needing cleanup (Dec 2009), Articles with unsourced statements (Aug 2007, Sep 2008, Jan 2009, Sep 2009) |
Lost Door RAT | Articles lacking sources (Jan 2010), Articles needing expert attention (Jan 2010), Articles to be expanded (Jan 2010), Articles with topics of unclear notability (Jan 2010), Computer Security articles needing expert attention, Software articles needing expert attention |
Phreaking | Articles needing additional references (Jan 2008), Articles that may contain original research (Feb 2008, Mar 2010), Articles to be merged (Nov 2008), Articles with specifically-marked weasel-worded phrases (Nov 2008), Articles with unsourced statements (Feb 2007) |
Proxy server «High» | Articles needing additional references (Feb 2009, Sep 2009), Articles needing expert attention (Nov 2008), Articles with unsourced statements (Oct 2008, Feb 2010), Technology articles needing expert attention |
Scareware | Articles needing cleanup (Oct 2009), Articles with specifically-marked weasel-worded phrases (Sep 2009), Articles with unsourced statements (Sep 2009, Feb 2010), Vague or ambiguous time, Wikipedia articles needing factual verification (Feb 2010) |
Timeline of computer viruses and worms «High» | Articles needing cleanup (Nov 2009), Articles needing link rot cleanup, Articles with unsourced statements (Oct 2008, Feb 2009, Sep 2009, Mar 2010) |
Wireless identity theft | Articles lacking reliable references (May 2009), Articles to be merged (Aug 2008), Articles with dead external links (Sep 2009), Articles with unsourced statements (May 2009, Sep 2009), Orphaned articles (Feb 2010) |
Article | Maintenance categories |
---|---|
Computer crime «High» | Articles needing cleanup (Oct 2008), Articles with specifically-marked weasel-worded phrases (Oct 2007), Articles with unsourced statements (Oct 2008, Jan 2009, Feb 2010) |
Computer insecurity «Top» | Articles lacking in-text citations (Dec 2009), Articles needing cleanup (Dec 2008), Articles with unsourced statements (Feb 2007, Mar 2008), Wikipedia articles needing style editing (Dec 2007) |
Computer virus «High» | Articles lacking reliable references (Mar 2009), Articles that may contain original research (Jan 2008, Mar 2009), Articles with unsourced statements (Jan 2008, Feb 2009) |
Extended Copy Protection | Articles needing additional references (Feb 2008), Articles needing cleanup (Feb 2008), Articles with dead external links (Nov 2009), Articles with unsourced statements (Feb 2008), Wikipedia laundry list cleanup |
GNUCITIZEN | Articles lacking in-text citations (Apr 2008), Articles needing cleanup (Apr 2008), Articles that need to be wikified (Apr 2008), Articles with unsourced statements (Apr 2008, Oct 2008) |
Gumblar | Articles lacking in-text citations (Aug 2009), Articles needing expert attention (Oct 2009), Articles with unsourced statements (Nov 2009, Jan 2010), Computer Security articles needing expert attention |
Laptop theft | Articles containing how-to sections, Articles needing additional references (Nov 2008), Articles needing cleanup (Feb 2008, Oct 2009), Articles with unsourced statements (Feb 2008) |
Loke Yeng Hoe | Articles with a promotional tone (Mar 2010), Articles with topics of unclear notability (Apr 2009), Orphaned articles (Feb 2009), Unreferenced BLPs (Mar 2010), Wikipedia articles with possible conflicts of interest |
Null session | Articles that need to be wikified (Oct 2008), Articles which may contain unencyclopedic material, Articles with topics of unclear notability (Oct 2008), Wikipedia articles needing context (Oct 2008), Wikipedia introduction cleanup (Oct 2008) |
Quarantine technology | Articles needing additional references (Dec 2009), Orphaned articles (Feb 2009), Wikipedia articles needing clarification (Aug 2009), Wikipedia articles needing context (Aug 2009), Wikipedia introduction cleanup (Aug 2009) |
Software cracking | Articles needing additional references (Jul 2009), Articles to be merged (Nov 2008), Articles with peacock terms (Oct 2009), Articles with unsourced statements (Mar 2009, Aug 2009) |
Timeline of computer security hacker history «High» | Articles lacking reliable references (Aug 2008), Articles that may contain original research (Aug 2008), Articles that need to be wikified (Nov 2008), Articles with specifically-marked weasel-worded phrases (Aug 2008), Articles with unsourced statements (Aug 2008) |
Vulnerability (computing) «Top» | Articles needing additional references (Jun 2008), Articles to be merged (Jan 2010), Wikipedia articles needing style editing (Jun 2008), Wikipedia external links cleanup, Wikipedia spam cleanup |
Article | Maintenance categories |
---|---|
Committee on National Security Systems «Top» | Articles lacking sources (Oct 2009), Articles needing expert attention (Oct 2009), Computer Security articles needing expert attention, Education articles needing expert attention |
Computer security «Top» | Articles with unsourced statements (Aug 2008, Apr 2009, Aug 2009), Wikipedia articles needing clarification (Feb 2009) |
Finjan | Articles with a promotional tone, Articles with unsourced statements (Aug 2009), NPOV disputes (Feb 2008), Wikipedia articles needing clarification (Aug 2009) |
Information security «Top» | Articles to be expanded (Feb 2007), Articles with specifically-marked weasel-worded phrases (Feb 2010), Articles with unsourced statements (Jan 2008, May 2009) |
Mandatory access control | Articles needing cleanup (Jan 2008), Articles with unsourced statements (Jan 2009, Oct 2009, Nov 2009) |
Masters of Deception | Articles lacking in-text citations (Aug 2009), Articles lacking sources (Mar 2009), Articles that may contain original research (Mar 2009), Articles to be expanded (Jan 2007) |
Microsoft Intelligent Application Gateway | Articles lacking reliable references (Sep 2008), Articles that need to be wikified (Sep 2008), Articles to be merged (Feb 2010), Articles with unsourced statements (Sep 2008) |
Mixed threat attack | Articles lacking sources (Dec 2009), Orphaned articles (Feb 2009), Wikipedia articles needing context (Oct 2009), Wikipedia introduction cleanup (Oct 2009) |
Przemysław Frasunek | Articles lacking reliable references (Jan 2008), Articles with topics of unclear notability (Jan 2008), BLP articles lacking sources, Orphaned articles (Feb 2009) |
Quick Heal Technologies | Articles lacking sources (Oct 2009), Articles needing cleanup (Oct 2009), Articles with a promotional tone (Dec 2009), Articles with topics of unclear notability (Oct 2009) |
Returnil Virtual System | Articles lacking reliable references (Feb 2009, Mar 2009), Articles needing cleanup (Feb 2009), Wikipedia external links cleanup |
Rootkit «High» | Articles with unsourced statements (Sep 2007, Aug 2008, Mar 2009), Wikipedia articles needing copy edit (May 2009) |
Secure coding | Articles lacking sources (May 2008), Articles needing cleanup (Sep 2009), Pages missing lead section, Wikipedia introduction cleanup (Sep 2009) |
Security-Enhanced Linux | Articles needing additional references (Jun 2009), Articles with unsourced statements (Jun 2008, Jun 2009, Oct 2009) |
Security architecture | Articles lacking reliable references (Jul 2008), Articles needing cleanup (Sep 2009), Articles that need to be wikified (May 2008), Wikipedia introduction cleanup (Sep 2009) |
Trusted Computing | Articles needing additional references (Jun 2008), Articles with unsourced statements (Mar 2009, Jun 2009, Jul 2009) |
WinAntiVirus 2006 | Articles needing additional references (Mar 2009), Articles to be merged (Mar 2010), Articles with unsourced statements (Mar 2009), Orphaned articles (Feb 2009) |
Wireless cracking | Articles lacking in-text citations (Jul 2009), Articles that may contain original research (Apr 2009), Articles which may contain unencyclopedic material, Articles with trivia sections (Nov 2008) |
Article | Maintenance categories |
---|---|
Acceptable use policy | Articles that may contain original research (Feb 2009), NPOV disputes (Oct 2008), Wikipedia references cleanup (Sep 2009) |
Adware «High» | Articles lacking sources (Jun 2009), Articles with unsourced statements (Oct 2009, Jan 2010) |
Angela Orebaugh | Articles needing cleanup (Nov 2007), Articles with unsourced statements (Nov 2007), Orphaned articles (Feb 2009) |
Attack tree | Articles with specifically-marked weasel-worded phrases (Oct 2008), Articles with unsourced statements (Oct 2008, Aug 2009) |
AVG (software) | Articles with unsourced statements (Jan 2009, Mar 2009, Dec 2009) |
Avira security software | Articles needing cleanup (Mar 2009), Articles with unsourced statements (Nov 2009), Wikipedia articles needing copy edit (Mar 2009) |
Bliss (virus) | Articles lacking reliable references (Feb 2010), Articles with specifically-marked weasel-worded phrases (Feb 2010), Articles with unsourced statements (Feb 2010) |
Bluebugging | Articles needing cleanup (May 2009), Orphaned articles (Apr 2009), Wikipedia articles needing copy edit (May 2009) |
Capability-based security | Articles needing additional references (Jul 2007), Articles to be merged (Jan 2009), Articles with unsourced statements (Jul 2007) |
CapDesk | Articles lacking in-text citations (May 2009), Articles lacking sources (May 2009), Articles needing cleanup (May 2009) |
Child Exploitation Tracking System | Articles that need to be wikified (Jun 2009), Orphaned articles (Jul 2009), Wikipedia articles needing copy edit (Jun 2009) |
CIH (computer virus) | Articles to be merged (Jun 2009), Articles with specifically-marked weasel-worded phrases (Jun 2009), Wikipedia articles needing clarification (Nov 2008) |
Click fraud | Articles with unsourced statements (Mar 2009, May 2009, Jan 2010) |
Cyberwarfare «High» | Articles with unsourced statements (Oct 2009, Feb 2010), Wikipedia articles needing style editing (Nov 2009) |
Digital DawgPound | Articles with unsourced statements (Jul 2007), Orphaned articles (Jan 2007), Wikipedia articles needing style editing (Jul 2007) |
Erik Bloodaxe (hacker) | Articles with unsourced statements (May 2008), Unreferenced BLPs (May 2009), Wikipedia articles needing style editing (Jul 2008) |
Gary McKinnon «High» | Articles with dead external links (Jan 2010), Articles with unsourced statements (Aug 2009, Jan 2010) |
Gigabyte (virus writer) | Articles lacking in-text citations (Jan 2009), Orphaned articles (Feb 2009), Wikipedia articles with possible conflicts of interest |
Great Hacker War | Articles with unsourced statements (May 2008), NPOV disputes (Dec 2007), Wikipedia articles needing style editing (Dec 2007) |
Hacktivism | Articles with unsourced statements (Nov 2008), Wikipedia external links cleanup, Wikipedia spam cleanup |
Hardware keylogger | Articles needing additional references (Apr 2009), Articles to be merged (Sep 2008), Articles with unsourced statements (Apr 2009) |
Host-based intrusion detection system | Articles lacking sources (May 2008), Wikipedia external links cleanup, Wikipedia spam cleanup |
IDN homograph attack | Articles needing cleanup (Jan 2010), Wikipedia articles in need of updating, Wikipedia introduction cleanup (Jan 2010) |
Iframe virus | Articles lacking in-text citations (Sep 2009), Articles needing cleanup (Nov 2009), Wikipedia articles needing copy edit (Nov 2009) |
Information assurance «High» | Articles lacking in-text citations (Feb 2008), Articles needing cleanup (Feb 2008), Articles with unsourced statements (Sep 2009) |
Jason Burks | Articles needing additional references (Nov 2008), Articles with trivia sections (Sep 2009), Orphaned articles (Sep 2008) |
Kaspersky Internet Security | Articles needing cleanup (Jun 2009), Articles with unsourced statements (Jul 2009), NPOV disputes (Mar 2009) |
Kaspersky Lab «High» | Articles needing cleanup (Apr 2009), Articles with unsourced statements (Mar 2009), Vague or ambiguous time |
Kiosk hacking | Articles lacking sources (Dec 2007), Articles with topics of unclear notability (Dec 2007), Orphaned articles (Dec 2007) |
Knark | Articles lacking sources (Feb 2007), Articles with unsourced statements (Sep 2008), Orphaned articles (Feb 2009) |
List of warez groups | Articles lacking reliable references (Jan 2008), Articles that may contain original research (Jan 2008), Articles with unsourced statements (Jun 2007) |
Malware «Top» | Articles with specifically-marked weasel-worded phrases (Dec 2009), Articles with unsourced statements (Feb 2007, Nov 2008) |
Matrix Software License Protection System | Articles lacking sources (Apr 2009), Articles with unsourced statements (Jun 2008, Apr 2009) |
Munge | Articles lacking reliable references (Feb 2009), Articles with unsourced statements (Jun 2009), Wikipedia articles needing style editing (Jun 2009) |
Ne0h | Articles lacking reliable references (Apr 2008), Articles to be expanded (Apr 2008), BLP articles lacking sources |
Peter Tippett | Articles needing sections (Oct 2009), Articles with unsourced statements (May 2009), Wikipedia articles needing reorganization |
Phishing «High» | Articles that may contain original research (Dec 2008), Articles with unsourced statements (Dec 2008), NPOV disputes (Dec 2008) |
Play mp3.exe (trojan) | Articles needing additional references (Jan 2009), Articles that need to be wikified (Jan 2009), Orphaned articles (Feb 2009) |
Port scanner «High» | Articles needing additional references (Jul 2009), Articles with unsourced statements (May 2009, Jul 2009) |
Pre-boot authentication | Articles needing additional references (Apr 2008), Articles needing cleanup (Apr 2008), Articles to be expanded (Apr 2008) |
Relay attack | Articles with unsourced statements (May 2007), Wikipedia articles needing context (Oct 2009), Wikipedia introduction cleanup (Oct 2009) |
RF monitor software | Articles needing cleanup (Oct 2008), Articles to be expanded (Oct 2008), Articles with topics of unclear notability (Oct 2008) |
Robert Schifreen | Articles needing additional references (Feb 2009), Articles with topics of unclear notability (Nov 2008), Orphaned articles (Feb 2009) |
SMiShing | Articles to be expanded (Mar 2007), Articles to be merged (Apr 2009), Articles with unsourced statements (Jul 2009) |
SpyHunter | Articles with unsourced statements (Aug 2008), Orphaned articles (Feb 2009), Wikipedia references cleanup (Sep 2009) |
Spyware «High» | Articles with unsourced statements (Feb 2007, Feb 2009), Vague or ambiguous time |
Systempunkt | Articles needing cleanup (Jan 2008), Orphaned articles (Aug 2008), Wikipedia articles needing style editing (Jan 2008) |
Systems assurance «Top» | Articles lacking sources (Jan 2008), Articles with topics of unclear notability (Jan 2008), Orphaned articles (Feb 2009) |
Warzapping | Articles with disputed statements (Dec 2008), Articles with topics of unclear notability (Nov 2008), Orphaned articles (Feb 2009) |
WinFixer | Articles needing cleanup (Dec 2008), Articles that may contain original research (Oct 2008), Self-contradictory articles (Aug 2009) |
Yahoo! Assistant | Articles containing how-to sections, Articles needing cleanup (Dec 2007), Articles with specifically-marked weasel-worded phrases (Nov 2009) |
Zardoz (computer security) | Wikipedia articles needing clarification (Mar 2009), Wikipedia articles needing context (Mar 2009), Wikipedia introduction cleanup (Mar 2009) |
Detail listing is suppressed due to size restrictions.
Group | # Articles |
---|---|
Articles with 2 cleanup categories assigned | 117 |
Articles with one cleanup category assigned | 283 |