Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
http://dbpedia.org/class/yago/Feat100036762
An Entity of Type:
Thing
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
rdfs:
subClassOf
yago
:Accomplishment100035189
owl:
equivalentClass
yago-res
:wordnet_feat_100036762
is
rdf:
type
of
dbr
:BREACH_(security_exploit)
dbr
:Pronunciation_of_English_⟨th⟩
dbr
:English-language_vowel_changes_before_historic_/l/
dbr
:MAC_spoofing
dbr
:Patched_(malware)
dbr
:WCT_World_Doubles
dbr
:2007_Moorilla_Hobart_International_–_Doubles
dbr
:2008_World_Mixed_Doubles_Curling_Championship
dbr
:2009_Copa_Sevilla_–_Doubles
dbr
:2009_Moorilla_Hobart_International_–_Doubles
dbr
:2009_Open_Castilla_y_León_–_Doubles
dbr
:2009_Open_Diputación_Ciudad_de_Pozoblanco_–_Doubles
dbr
:2009_World_Mixed_Doubles_Curling_Championship
dbr
:2010_Copa_Sevilla_–_Doubles
dbr
:2010_Moorilla_Hobart_International_–_Doubles
dbr
:2010_Open_Castilla_y_León_–_Doubles
dbr
:2010_Open_Diputación_Ciudad_de_Pozoblanco_–_Doubles
dbr
:2010_World_Mixed_Doubles_Curling_Championship
dbr
:2011_Caloundra_International_–_Doubles
dbr
:2011_Copa_Sevilla_–_Doubles
dbr
:2011_Moorilla_Hobart_International_–_Doubles
dbr
:2011_Open_Castilla_y_León_–_Doubles
dbr
:2011_Open_Diputación_Ciudad_de_Pozoblanco_–_Men's_Doubles
dbr
:2011_Open_Diputación_Ciudad_de_Pozoblanco_–_Women's_Doubles
dbr
:2011_World_Mixed_Doubles_Curling_Championship
dbr
:2012_Caloundra_International_–_Doubles
dbr
:2012_Copa_Sevilla_–_Doubles
dbr
:2012_Moorilla_Hobart_International_–_Doubles
dbr
:2012_Open_Castilla_y_León_–_Doubles
dbr
:2012_Open_Diputación_Ciudad_de_Pozoblanco_–_Doubles
dbr
:2012_World_Mixed_Doubles_Curling_Championship
dbr
:2013_Copa_Sevilla_–_Doubles
dbr
:2013_Moorilla_Hobart_International_–_Doubles
dbr
:2013_Open_Castilla_y_León_–_Doubles
dbr
:Denial-of-service_attack
dbr
:Arbitrary_code_execution
dbr
:John_the_Ripper
dbr
:Pharming
dbr
:Return-oriented_programming
dbr
:Cyber_Insider_Threat
dbr
:Cyberwarfare
dbr
:DNS_rebinding
dbr
:Ultrasurf
dbr
:Uncontrolled_format_string
dbr
:Defensive_computing
dbr
:Duqu
dbr
:Integer_overflow
dbr
:Inter-protocol_exploitation
dbr
:Internet_security
dbr
:Intrusion_detection_system_evasion_techniques
dbr
:JIT_spraying
dbr
:L-vocalization
dbr
:Radio_jamming
dbr
:SQL_injection
dbr
:Predictable_serial_number_attack
dbr
:1976_WCT_World_Doubles
dbr
:1977_WCT_World_Doubles
dbr
:1978_WCT_World_Doubles
dbr
:1979_WCT_World_Doubles
dbr
:1980_WCT_World_Doubles
dbr
:1981_WCT_World_Doubles
dbr
:1982_WCT_World_Doubles
dbr
:1983_WCT_World_Doubles
dbr
:1984_WCT_World_Doubles
dbr
:1985_WCT_World_Doubles
dbr
:1986_WCT_World_Doubles
dbr
:1994_Tasmanian_International_–_Doubles
dbr
:1995_Schweppes_Tasmanian_International_–_Doubles
dbr
:Computer_security
dbr
:Content_Security_Policy
dbr
:Cookie_stuffing
dbr
:DSploit
dbr
:SYN_flood
dbr
:System_Reconfiguration_Attacks
dbr
:Vulnerability_database
dbr
:Vulnerability_(computing)
dbr
:Web_threat
dbr
:English-language_vowel_changes_before_historic_/r/
dbr
:Content_sniffing
dbr
:Cookiemonster_attack
dbr
:Copy_attack
dbr
:Cross-application_scripting
dbr
:Cross-site_cooking
dbr
:Cross-site_request_forgery
dbr
:Cross-site_scripting
dbr
:Cross-site_tracing
dbr
:Cross-zone_scripting
dbr
:Dangling_pointer
dbr
:Riskware
dbr
:Tabnabbing
dbr
:1973_WCT_World_Doubles
dbr
:1974_WCT_World_Doubles
dbr
:1975_WCT_World_Doubles
dbr
:Alphanumeric_shellcode
dbr
:Linux_kernel
dbr
:Low_Orbit_Ion_Cannon
dbr
:Slow_loris
dbr
:Stuxnet
dbr
:Clear_channel_assessment_attack
dbr
:Email_bomb
dbr
:Email_injection
dbr
:Email_spoofing
dbr
:Fault_injection
dbr
:Clickjacking
dbr
:Davies'_attack
dbr
:Keystroke_logging
dbr
:Pass_the_hash
dbr
:Payload_(computing)
dbr
:Phishing
dbr
:Proof-carrying_code
dbr
:Proof_of_concept
dbr
:Messaging_spam
dbr
:Protocol_spoofing
dbr
:SMS_spoofing
dbr
:Spamming
dbr
:Spoofed_URL
dbr
:Mass_assignment_vulnerability
dbr
:Rootkit
dbr
:Voice_phishing
dbr
:1996_Schweppes_Tasmanian_International_–_Doubles
dbr
:1997_ANZ_Tasmanian_International_–_Doubles
dbr
:1998_ANZ_Tasmanian_International_–_Doubles
dbr
:1999_ANZ_Tasmanian_International_–_Doubles
dbr
:2001_ANZ_Tasmanian_International_–_Doubles
dbr
:BackTrack
dbr
:Broadcast_radiation
dbr
:Brute-force_attack
dbr
:W3af
dbr
:Dolev–Yao_model
dbr
:Drive-by_download
dbr
:HTTP_Strict_Transport_Security
dbr
:HTTP_header_injection
dbr
:HTTP_response_splitting
dbr
:Heap_feng_shui
dbr
:Heap_overflow
dbr
:Heap_spraying
dbr
:Fakesysdef_(malware)
dbr
:Login_spoofing
dbr
:Rogue_access_point
dbr
:2013_Svijany_Open_–_Doubles
dbr
:2013_World_Mixed_Doubles_Curling_Championship
dbr
:2014_Hobart_International_–_Doubles
dbr
:Advance-fee_scam
dbr
:Flapping
dbr
:Nmap
dbr
:Null_character
dbr
:Billion_laughs
dbr
:Dictionary_attack
dbr
:Directory_traversal_attack
dbr
:Fast_flux
dbr
:Fork_(file_system)
dbr
:Fork_bomb
dbr
:Form_grabbing
dbr
:Frame_injection
dbr
:Password_cracking
dbr
:Privilege_escalation
dbr
:SGML_entity
dbr
:Internet_Relay_Chat_flood
dbr
:MAC_flooding
dbr
:Session_fixation
dbr
:Rainbow_table
dbr
:Reflected_DOM_Injection
dbr
:Replay_attack
dbr
:HTTP_cookie
dbr
:Heartbleed
dbr
:Back_Orifice
dbr
:Backdoor_(computing)
dbr
:Covert_channel
dbr
:WinNuke
dbr
:XSA
dbr
:TR-069
dbr
:TRESOR
dbr
:Th-stopping
dbr
:Armitage_(computing)
dbr
:ARP_spoofing
dbr
:Acoustic_cryptanalysis
dbr
:Kali_Linux
dbr
:Blended_threat
dbr
:Bluejacking
dbr
:Swatting
dbr
:TCP_reset_attack
dbr
:Code_injection
dbr
:Cold_boot_attack
dbr
:Threat_(computer)
dbr
:Trojan_horse_(computing)
dbr
:ZMW_attack
dbr
:Zeus_(malware)
dbr
:Mixed_threat_attack
dbr
:Ping_of_death
dbr
:Reflection_attack
dbr
:Relay_attack
dbr
:Astalavista.box.sk
dbr
:Buffer_over-read
dbr
:Buffer_overflow
dbr
:Buffer_underrun
dbr
:CPLINK
dbr
:Phonological_change
dbr
:Phreaking
dbr
:Social_jacking
dbr
:File_inclusion_vulnerability
dbr
:Hping
dbr
:Idle_scan
dbr
:Kismet_(software)
dbr
:Metasploit_Project
dbr
:Browser_exploit
dbr
:Browser_hijacking
dbr
:Browser_security
dbr
:Brute-force_search
dbr
:OWASP
dbr
:Off-by-one_error
dbr
:Open_Source_Vulnerability_Database
dbr
:Race_condition
dbr
:Self-modifying_code
dbr
:World_Mixed_Doubles_Curling_Championship
dbr
:Spambot
dbr
:Session_hijacking
dbr
:Man-in-the-browser
dbr
:Man-in-the-middle_attack
dbr
:Memory_safety
dbr
:Microsoft_Security_Development_Lifecycle
dbr
:Security_Content_Automation_Protocol
dbr
:Type_safety
dbr
:Port_scanner
dbr
:Shoulder_surfing_(computer_security)
dbr
:Smudge_attack
dbr
:Smurf_attack
dbr
:Snarfing
dbr
:Social_engineering
dbr
:Virtual_machine_escape
dbr
:War_dialing
dbr
:Warchalking
dbr
:Source_code_virus
dbr
:Virus_hoax
dbr
:Symlink_race
dbr
:Shellcode
dbr
:Exploit_(computer_security)
dbr
:FTP_bounce_attack
dbr
:ICMP_tunnel
dbr
:IDN_homograph_attack
dbr
:IP_address_spoofing
dbr
:Improper_input_validation
dbr
:In-session_phishing
dbr
:Script_kiddie
dbr
:Pre-play_attack
dbr
:Register_spring
dbr
:Stack_buffer_overflow
dbr
:Rogue_DHCP
dbr
:Time_of_check_to_time_of_use
dbr
:The_Open_Organisation_Of_Lockpickers
dbr
:Evasion_(network_security)
dbr
:Evil_twin_(wireless_networks)
dbr
:Flame_(malware)
dbr
:Gh0st_RAT
dbr
:NOP_slide
dbr
:Threat_model
dbr
:Zombie_(computer_science)
dbr
:Physical_information_security
dbr
:Ping_flood
dbr
:Zero-day_(computing)
dbr
:Session_poisoning
dbr
:Warzapping
dbr
:Packet_analyzer
dbr
:TCP_sequence_prediction_attack
dbr
:Return-to-libc_attack
dbr
:SMBRelay
dbr
:Referer_spoofing
dbr
:AirSnort
dbr
:Raw_socket
dbr
:Webattacker
dbr
:XSS_worm
dbr
:Th-fronting
dbr
:Nikto_Web_Scanner
dbr
:GetAdmin
is
rdfs:
subClassOf
of
yago
:WikicatComputerSecurityExploits
yago
:WikicatWebSecurityExploits
yago
:Derring-do100043116
yago
:Hit100043902
yago
:Rally100045646
yago
:WikicatInjectionExploits
yago
:Stunt100046344
yago
:TourDeForce100047018
yago
:WikicatPrivilegeEscalationExploits
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License