This is a Wikipedia user page. This is not an encyclopedia article or the talk page for an encyclopedia article. If you find this page on any site other than Wikipedia, you are viewing a mirror site. Be aware that the page may be outdated and that the user in whose space this page is located may have no personal affiliation with any site other than Wikipedia. The original page is located at https://en.wikipedia.org/wiki/User:TheJC/Malware/Project. |
Some Wikipedians have formed a project to better organize information in articles related to Malware. This page and its subpages contain their suggestions; it is hoped that this project will help to focus the efforts of other Wikipedians. If you would like to help, please inquire on the talk page and see the to-do list there.
For more information on WikiProjects, please see Wikipedia:WikiProjects and Wikipedia:WikiProject best practices.
Title
editWikiProject on Malware
Scope
editThis WikiProject aims to help organise, format and expand articles about malicious computer software (also known as malware). This includes articles regarding Computer viruses, trojans, rootkits, adware, spyware and anything else in the related to malware.
Parentage
editThis WikiProject is a child of WikiProject Computer science
-
- WikiProject Malware
Descendant WikiProjects
editNo descendant WikiProjects have been defined.
Related Collaborations
editParticipants
edit- TheJC TalkContributions 05:15, 18 May 2006 (UTC)
Structure
editAt present, there are three different kinds of Wikipedia articles on malware:
Basic stub
editBasic stubs contain what type of malware is in question, and perhaps very basic information about a significant payload, if there is one. Generally, the template is not used. These articles should be considered placeholders for expansion. An example article is Alex & Solo (computer virus).
Extended stub
editExtended stubs contain advanced descriptions of behaviour, but not a complete analysis. Some minor details, such as text strings may be missing. The template is generally used. This should be used for semi-common malware or formerly common malware, and does not require immediate expansion; expanding these articles is low priority. An example article is AntiCMOS (computer virus).
Full article
editA full, thorough description and analysis is included. An example is Westwood (computer virus).
Hierarchy definition
editNo classification of this project has been defined.
Goals
edit- To expand all articles in the Malware stubs category.
- Consistency across formatting of all malware articles (using common infoboxes, headings, etc).
- Categorisation of all malware related articles.
- Ensure that all red-links are either created as new articles, re-directs made to existing articles (if appropriate), or if it's just a typographical error - corrected.
- Disambiguation of all articles related to malware if necessary. This is because malware is sometimes named after something already in existence (see Jerusalem (computer virus)).
- For articles that discuss something that will likely never be used as anything other than malware (for example: SpyAxe) there is no need to disambiguate to SpyAxe (computer spyware).
- Redirects for all known aliases of the malware. If there is an article already with the same name as the alias, disambiguate the article, or add a link at the top of the article.
Projects
edit- Expand all articles in the Malware stubs category.
- Expand all articles in the Spyware removal category.
Tasks
edit- Organisation of the Category:Malware ensuring that any article that could be placed into a sub-catagory is - rather than having a lot of articles listed under malware.
Adopt an article
editSimilar to the Collaboration of the week, but on a smaller scale, you might want to "adopt" an article. This would involve doing the research, writing, and picture-taking (if possible) for either a non-existent article or a stub. Of course, everyone else can still edit an adopted article, and you can work on other things too, but the idea is to find a focus for a while, to try and build up the number of quality articles the Project has produced.
- To adopt an article, edit this section, and at the bottom add an asterisk with a wikified link to the article you're adopting, followed by ~~~~. For example:
* [[Brontok (computer worm)]] ~~~~
General strategy and discussion forums
editOther subpages
editTemplates
editInfoboxes
editStub templates
edit- {{Malware-stub}}
- and the associated stub category Category:Malware stubs
Other templates
edit- {{MalwareProject}} (for use on Talk pages)
- {{inuse}}
- {{Underconstruction}}
Userboxes
editCategories
edit- Category:Malware
- Category:Adware
- Category:Internet bots (not sure why it's a child of malware)
- Category:Computer viruses
- Category:Computer worms
- Category:E-mail worms
- Category:Exploit-based worms
- Category:Summer of worms (maybe this should have it's own article)
- Category:Rootkits
- Category:Spyware (also includes rogue antispyware programs)
- Category:Trojan horses
- Category:Remote administration software (some programs - such as Sub7 may be classed as more than one category (malware/remote administration software) depending on use. E.g. it's remote administration software if the owner of the computer permitted the install of the software, otherwise it would likely be considered as malware.
Lists
editArticles
editWikipedia articles on Malware
edit
New Wikipedia articles related to Malware
editPlease feel free to list your new Malware-related articles here (newer articles at the top, please). Any new articles that have an interesting or unusual fact in them should be suggested for the Did you know? box on the Main Wikipedia page. DYN has a 72 hr. time limit from the creation of the article.
Ongoing Wikipedia surveys
editDeletion links
editWikiProject Deletion sorting
editWikipedia:WikiProject Deletion sorting is a new effort that attempts to classify various articles nominated for votes for deletion by major categories. The Malware-related articles at VFD are listed at Wikipedia:WikiProject Deletion sorting/Computers.
Requests
editA detailed analysis of the continuously evolving threat of Malwares
http://en.wikipedia.org/wiki/User_talk:Maliciousbrains
Author: Rajdeep (aka ~MaliciousBrains~)
Website: http://www.malwareinfo.org
Blog: http://blog.malwareinfo.org
Forum: http://forum.malwareinfo.org
Email: rajdeep@malwareinfo.org
Case Study: A known rogue application
Analysis of a real Malware : http://www.malwareinfo.org/files/WhitePaper.pdf
Some archived Analysis Reports:
(you can stay updated about this list from the url: http://www.malwareinfo.org/archive.html)
http://www.malwareinfo.org/archive/XPAntivirus2008.doc
http://www.malwareinfo.org/archive/TrojanSpyFinanzJ.doc
http://www.malwareinfo.org/archive/SystemErrorFixer.doc
http://www.malwareinfo.org/archive/TrojanWin32Srizbigen.doc
http://www.malwareinfo.org/archive/Peacomm.doc
http://www.malwareinfo.org/archive/TrojanDropperWin32CutwailY.doc
http://www.malwareinfo.org/archive/HeurDownloader.doc
http://www.malwareinfo.org/archive/TrojanWin32Buzusbrq.doc
http://www.malwareinfo.org/archive/TrojanCryptXPACKGen.doc
http://www.malwareinfo.org/archive/SpywareSpyBuddy.doc
http://www.malwareinfo.org/archive/MalDropperY.doc
http://www.malwareinfo.org/archive/NewMalwarebl.doc
http://www.malwareinfo.org/archive/Win32AutoHotKey.doc
http://www.malwareinfo.org/archive/W32MalwareGemini.doc
http://www.malwareinfo.org/archive/VirToolWin32ObfuscatorC.doc http://www.malwareinfo.org/archive/TrojanWin32Meredrop.doc
http://www.malwareinfo.org/archive/MalEncPkBW.doc
http://www.malwareinfo.org/archive/TrojanDownloaderWin32HarniggenL.htm
http://www.malwareinfo.org/archive/HeuristicSuspiciousDownloader.doc
http://www.malwareinfo.org/archive/TrojanSpyWin32Zbotaob.doc
http://www.malwareinfo.org/archive/TrojanWin32DNSChangerarn.htm
http://www.malwareinfo.org/archive/TrojanWin32AlureonGenH.htm
http://www.malwareinfo.org/archive/TrojanDropperQhostN.htm
http://www.malwareinfo.org/archive/BackdoorWin32GF13xA.txt
http://www.malwareinfo.org/archive/WormWin32TaterfGenC.txt
http://www.malwareinfo.org/archive/W32SillyDC.txt
http://www.malwareinfo.org/archive/TrojanWin32TibsEW.txt
http://www.malwareinfo.org/archive/TrojanWin32NsilA.txt
http://www.malwareinfo.org/archive/TrojanSpyWin32BankerKew.txt
http://www.malwareinfo.org/archive/TrojanDropperWin32AgentDgc.txt
http://www.malwareinfo.org/archive/Infostealer.txt
http://www.malwareinfo.org/archive/BackdoorWin32SharkAoo.txt
http://www.malwareinfo.org/archive/AdwareUdefenderT.txt
http://www.malwareinfo.org/archive/Win32SorerA.doc
http://www.malwareinfo.org/archive/WinTrojanXemaVariant.txt
http://www.malwareinfo.org/archive/AdWareWin32MostofateAA.txt
http://www.malwareinfo.org/archive/TrojanClickerWin32DelfLP.txt
http://www.malwareinfo.org/archive/TrojanDownloaderWin32AgentCCL.txt
http://www.malwareinfo.org/archive/TrojanWin32PakesCHF.txt
http://www.malwareinfo.org/archive/TrojanZlob.txt
http://www.malwareinfo.org/archive/Win32DelfITZ.txt
~MaliciousBrains~.
Resources
editSister Project links
editThese templates may be useful if a sister project has details about something in an article.
- {{commons}}
- {{Commonscat}}
- {{Wikiquote}}
- {{Wikiquotepar}}
- {{Wiktionary}}
- {{Wiktionarypar}}
- {{Wikinews}}
- {{Wikinewscat}}
- {{wikibooks}}
- {{Wikibookspar}}
- {{Wikisource}}
- {{Wikisourcepar}}
- {{Wikisource author}}
- {{Wikisource1911Enc}}
- {{Wikispecies}}
- {{Meta}}
- {{Sisterlinks}}