Talk:Defense strategy (computing)
This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||
|
Addition strategy types
editDescription of defense strategies against fileless Malware ( and other traveling security threats ) are welcomed.
Copy Edit
editHi, I'm a new editor and this article caught my eye on the list of articles needing copy edit. In my edit I have attempted to make the flow of the article less terse by adding punctuation, pronouns, and articles. I changed some wikilinks to display in lower-case, and added a few. I changed the references to the different strategies to lower-case in the body of the article. I think capitalization would be appropriate if these were trademarks, but I think they are generic terms and therefore not proper nouns. I have left the headings unchanged, but I think there may be room for clean-up in regards to capitalization there. DancesWithThermalPaste (talk) 01:36, 26 December 2019 (UTC)
A Commons file used on this page has been nominated for speedy deletion
editThe following Wikimedia Commons file used on this page has been nominated for speedy deletion:
You can see the reason for deletion at the file description page linked above. —Community Tech bot (talk) 08:51, 19 January 2020 (UTC)
Commons files used on this page have been nominated for speedy deletion
editThe following Wikimedia Commons files used on this page have been nominated for speedy deletion:
You can see the reasons for deletion at the file description pages linked above. —Community Tech bot (talk) 09:36, 19 January 2020 (UTC)
Strategy analysis
editThere is no point to delete strategy analysis , if someone want to improve it , he/she is very welcomed. — Preceding unsigned comment added by Davidy2001 (talk • contribs) 06:42, 29 January 2020 (UTC)