Talk:Defense strategy (computing)

Latest comment: 4 years ago by Davidy2001 in topic Strategy analysis

Addition strategy types

edit

Description of defense strategies against fileless Malware ( and other traveling security threats ) are welcomed.

Copy Edit

edit

Hi, I'm a new editor and this article caught my eye on the list of articles needing copy edit. In my edit I have attempted to make the flow of the article less terse by adding punctuation, pronouns, and articles. I changed some wikilinks to display in lower-case, and added a few. I changed the references to the different strategies to lower-case in the body of the article. I think capitalization would be appropriate if these were trademarks, but I think they are generic terms and therefore not proper nouns. I have left the headings unchanged, but I think there may be room for clean-up in regards to capitalization there. DancesWithThermalPaste (talk) 01:36, 26 December 2019 (UTC)Reply

A Commons file used on this page has been nominated for speedy deletion

edit

The following Wikimedia Commons file used on this page has been nominated for speedy deletion:

You can see the reason for deletion at the file description page linked above. —Community Tech bot (talk) 08:51, 19 January 2020 (UTC)Reply

Commons files used on this page have been nominated for speedy deletion

edit

The following Wikimedia Commons files used on this page have been nominated for speedy deletion:

You can see the reasons for deletion at the file description pages linked above. —Community Tech bot (talk) 09:36, 19 January 2020 (UTC)Reply

Strategy analysis

edit

There is no point to delete strategy analysis , if someone want to improve it , he/she is very welcomed. — Preceding unsigned comment added by Davidy2001 (talkcontribs) 06:42, 29 January 2020 (UTC)Reply