Talk:Defense strategy (computing)
This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||
|
Addition strategy types edit
Description of defense strategies against fileless Malware ( and other traveling security threats ) are welcomed.
Copy Edit edit
Hi, I'm a new editor and this article caught my eye on the list of articles needing copy edit. In my edit I have attempted to make the flow of the article less terse by adding punctuation, pronouns, and articles. I changed some wikilinks to display in lower-case, and added a few. I changed the references to the different strategies to lower-case in the body of the article. I think capitalization would be appropriate if these were trademarks, but I think they are generic terms and therefore not proper nouns. I have left the headings unchanged, but I think there may be room for clean-up in regards to capitalization there. DancesWithThermalPaste (talk) 01:36, 26 December 2019 (UTC)
A Commons file used on this page has been nominated for speedy deletion edit
The following Wikimedia Commons file used on this page has been nominated for speedy deletion:
You can see the reason for deletion at the file description page linked above. —Community Tech bot (talk) 08:51, 19 January 2020 (UTC)
Commons files used on this page have been nominated for speedy deletion edit
The following Wikimedia Commons files used on this page have been nominated for speedy deletion:
You can see the reasons for deletion at the file description pages linked above. —Community Tech bot (talk) 09:36, 19 January 2020 (UTC)
Strategy analysis edit
There is no point to delete strategy analysis , if someone want to improve it , he/she is very welcomed. — Preceding unsigned comment added by Davidy2001 (talk • contribs) 06:42, 29 January 2020 (UTC)