Wikipedia:WikiProject Computer Security/Cleanup listing

This is an automatically generated cleanup listing.

NOTE: WolterBot has not been run since 2010. Live cleanup listings are at: https://bambots.brucemyers.com/cwb/index.html

About this listing

edit

The listing is based on a database snapshot of 12 March 2010. It contains all articles flagged for cleanup which are tagged with {{WikiProject Computer Security}} on their talk page.

Based on that data, 962 articles are assigned to this project, of which 495, or 51.5%, are flagged for cleanup.

The following quality assessment classes were evaluated for this report:

Assessment classAbbrev.Category
Featured articlesFACategory:FA-Class Computer Security articles
Featured listsFLCategory:FL-Class Computer Security articles
A-Class articlesACategory:A-Class Computer Security articles
Good articlesGACategory:GA-Class Computer Security articles

The following importance assessment classes were evaluated for this report:

Assessment classAbbrev.Category
Top-importance articlesTopCategory:Top-importance Computer Security articles
High-importance articlesHighCategory:High-importance Computer Security articles

Listing by article assessment

edit

Quality

edit
edit

The project has 2 featured articles. 2 of them, or 100.0%, are flagged for cleanup.

ArticleMaintenance categories
Acid2 «FA» Articles needing additional references (Nov 2009)
Storm botnet «FA» Articles with obsolete information, Articles with unsourced statements (Mar 2008)
edit

The project has 1 featured lists. None of them is flagged for cleanup.

A-Class articles

edit

The project has 0 A-Class articles.

Good articles

edit

The project has 5 good articles. 2 of them, or 40.0%, are flagged for cleanup.

ArticleMaintenance categories
Microsoft Security Essentials «GA» Articles with obsolete information, Articles with unsourced statements (Oct 2009)
Norton 360 «GA» Wikipedia articles in need of updating

Importance

edit

Top-importance articles

edit

The project has 19 top-importance articles. 13 of them, or 68.4%, are flagged for cleanup.

ArticleMaintenance categories
Committee on National Security Systems «Top» Articles lacking sources (Oct 2009), Articles needing expert attention (Oct 2009), Computer Security articles needing expert attention, Education articles needing expert attention
Computer insecurity «Top» Articles lacking in-text citations (Dec 2009), Articles needing cleanup (Dec 2008), Articles with unsourced statements (Feb 2007, Mar 2008), Wikipedia articles needing style editing (Dec 2007)
Computer security «Top» Articles with unsourced statements (Aug 2008, Apr 2009, Aug 2009), Wikipedia articles needing clarification (Feb 2009)
Cyberspace «Top» Articles with unsourced statements (Dec 2007)
Cyber spying «Top» Articles lacking in-text citations (Jun 2009)
Firewall (computing) «Top» Articles needing additional references (Feb 2008)
Information security «Top» Articles to be expanded (Feb 2007), Articles with specifically-marked weasel-worded phrases (Feb 2010), Articles with unsourced statements (Jan 2008, May 2009)
Malware «Top» Articles with specifically-marked weasel-worded phrases (Dec 2009), Articles with unsourced statements (Feb 2007, Nov 2008)
Security bug «Top» Articles lacking sources (Feb 2008), Articles to be merged (Jan 2010)
Software Security Assurance «Top» Articles that need to be wikified (Jul 2008), Wikipedia articles needing copy edit (Jul 2008)
Systems assurance «Top» Articles lacking sources (Jan 2008), Articles with topics of unclear notability (Jan 2008), Orphaned articles (Feb 2009)
Theo de Raadt «Top» Articles with unsourced statements (Jan 2010)
Vulnerability (computing) «Top» Articles needing additional references (Jun 2008), Articles to be merged (Jan 2010), Wikipedia articles needing style editing (Jun 2008), Wikipedia external links cleanup, Wikipedia spam cleanup

High-importance articles

edit

The project has 79 high-importance articles. 48 of them, or 60.8%, are flagged for cleanup.

ArticleMaintenance categories
2007 cyberattacks on Estonia «High» Articles with unsourced statements (Jul 2007)
4K (computer virus) «High» Articles lacking sources (Sep 2009)
Ad-Aware «High» Articles with unsourced statements (Oct 2007, Oct 2009)
Adam Botbyl «High» Articles with unsourced statements (Dec 2008)
Adware «High» Articles lacking sources (Jun 2009), Articles with unsourced statements (Oct 2009, Jan 2010)
Anti-phishing software «High» Articles needing cleanup (Dec 2008)
Arbitrary code execution «High» Articles lacking sources (Dec 2009)
Attack patterns «High» Orphaned articles (Feb 2009)
Authentication «High» Articles with unsourced statements (Jan 2010)
Bruce Schneier «High» Articles with unsourced statements (Dec 2008)
Brute force attack «High» Articles lacking in-text citations (Nov 2008)
Computer crime «High» Articles needing cleanup (Oct 2008), Articles with specifically-marked weasel-worded phrases (Oct 2007), Articles with unsourced statements (Oct 2008, Jan 2009, Feb 2010)
Computer virus «High» Articles lacking reliable references (Mar 2009), Articles that may contain original research (Jan 2008, Mar 2009), Articles with unsourced statements (Jan 2008, Feb 2009)
Cross-site scripting «High» Articles with unsourced statements (Oct 2009)
Cyberwarfare «High» Articles with unsourced statements (Oct 2009, Feb 2010), Wikipedia articles needing style editing (Nov 2009)
Denial-of-service attack «High» Articles containing predictions or speculation, Articles needing cleanup (Dec 2009), Articles with unsourced statements (Aug 2007, Sep 2008, Jan 2009, Sep 2009)
DMZ (computing) «High» Articles lacking sources (Oct 2008), Articles with unsourced statements (Dec 2008)
Electronic Frontier Foundation «High» Articles with unsourced statements (Jan 2010), Wikipedia articles needing clarification (Feb 2010)
Eric Corley «High» Articles with unsourced statements (Sep 2009)
Exploit (computer security) «High» Articles with unsourced statements (Feb 2008, Aug 2009)
Form (computer virus) «High» Articles with unsourced statements (Feb 2010)
Gary McKinnon «High» Articles with dead external links (Jan 2010), Articles with unsourced statements (Aug 2009, Jan 2010)
Hacker (computer security) «High» Articles needing additional references (Nov 2007), Articles needing cleanup (Aug 2008), Articles with invalid date parameter in template, Articles with sections that need to be turned into prose (Aug 2008), Articles with unsourced statements (May 2008, Oct 2008, Feb 2010)
Hacker (computing) «High» Wikipedia articles needing reorganization
Honeypot (computing) «High» Articles needing additional references (Jun 2009), Articles with unsourced statements (Oct 2008)
Information assurance «High» Articles lacking in-text citations (Feb 2008), Articles needing cleanup (Feb 2008), Articles with unsourced statements (Sep 2009)
Intrusion prevention system «High» Articles with unsourced statements (Aug 2009, Jan 2010)
Jetico Personal Firewall «High» Articles with topics of unclear notability (Jun 2009), Articles with unsourced statements (Dec 2009)
Kaspersky Lab «High» Articles needing cleanup (Apr 2009), Articles with unsourced statements (Mar 2009), Vague or ambiguous time
Kevin Mitnick «High» Articles with unsourced statements (Jan 2010)
McAfee Personal Firewall Plus «High» Articles lacking sources (Dec 2007)
Norton Personal Firewall «High» Articles to be merged (Mar 2009), Articles with unsourced statements (Aug 2008)
Operation D-Elite «High» Articles with unsourced statements (Feb 2007, Sep 2009)
Peter G. Neumann «High» Articles lacking in-text citations (Oct 2009)
Phishing «High» Articles that may contain original research (Dec 2008), Articles with unsourced statements (Dec 2008), NPOV disputes (Dec 2008)
Port scanner «High» Articles needing additional references (Jul 2009), Articles with unsourced statements (May 2009, Jul 2009)
Pretty Good Privacy «High» Articles with unsourced statements (Feb 2010)
Proxy server «High» Articles needing additional references (Feb 2009, Sep 2009), Articles needing expert attention (Nov 2008), Articles with unsourced statements (Oct 2008, Feb 2010), Technology articles needing expert attention
Robert Tappan Morris «High» Articles with unsourced statements (Oct 2009)
Rootkit «High» Articles with unsourced statements (Sep 2007, Aug 2008, Mar 2009), Wikipedia articles needing copy edit (May 2009)
Security as a service «High» Articles lacking sources (Feb 2010), Articles with topics of unclear notability (Feb 2010)
Security Now! «High» Articles lacking reliable references (Jul 2008)
Spybot – Search & Destroy «High» Orphaned articles (Mar 2010), Wikipedia references cleanup (Sep 2009)
Spyware «High» Articles with unsourced statements (Feb 2007, Feb 2009), Vague or ambiguous time
Timeline of computer security hacker history «High» Articles lacking reliable references (Aug 2008), Articles that may contain original research (Aug 2008), Articles that need to be wikified (Nov 2008), Articles with specifically-marked weasel-worded phrases (Aug 2008), Articles with unsourced statements (Aug 2008)
Timeline of computer viruses and worms «High» Articles needing cleanup (Nov 2009), Articles needing link rot cleanup, Articles with unsourced statements (Oct 2008, Feb 2009, Sep 2009, Mar 2010)
Trojan horse (computing) «High» Articles with unsourced statements (Nov 2009)
Vundo «High» Articles with unsourced statements (Feb 2010)

Listing by number of categories assigned

edit

Articles with 11 cleanup categories assigned

edit
ArticleMaintenance categories
Domx Articles lacking reliable references (Dec 2008), Articles needing more detailed references, Articles that may contain original research (Jul 2008, Dec 2008), Articles with broken or outdated citations (Dec 2008), Articles with specifically-marked weasel-worded phrases (Dec 2008), Articles with topics of unclear notability (Jul 2008), Articles with unsourced statements (Dec 2008), Articles with weasel words (Dec 2008), Orphaned articles (Jul 2008), Wikipedia articles needing clarification (Dec 2008)

Articles with 9 cleanup categories assigned

edit
ArticleMaintenance categories
Keystroke logging Articles needing additional references (Feb 2010), Articles needing cleanup (Mar 2008, Aug 2009), Articles to be expanded (Aug 2009), Articles with unsourced statements (Sep 2008, Apr 2009, Aug 2009, Oct 2009), Wikipedia articles needing clarification (Aug 2009)

Articles with 7 cleanup categories assigned

edit
ArticleMaintenance categories
Chinese wall Articles lacking sources (Jul 2008), Articles that may contain original research (Oct 2009), Articles with unsourced statements (Feb 2007, Jun 2009, Aug 2009, Sep 2009, Oct 2009)
Hacker (computer security) «High» Articles needing additional references (Nov 2007), Articles needing cleanup (Aug 2008), Articles with invalid date parameter in template, Articles with sections that need to be turned into prose (Aug 2008), Articles with unsourced statements (May 2008, Oct 2008, Feb 2010)
Security through obscurity Articles needing additional references (Nov 2009), Articles that may contain original research (Nov 2009), Articles with disputed statements (Nov 2009), Articles with specifically-marked weasel-worded phrases (Nov 2009), Articles with unsourced statements (Feb 2008, Jul 2009, Nov 2009)

Articles with 6 cleanup categories assigned

edit
ArticleMaintenance categories
Denial-of-service attack «High» Articles containing predictions or speculation, Articles needing cleanup (Dec 2009), Articles with unsourced statements (Aug 2007, Sep 2008, Jan 2009, Sep 2009)
Lost Door RAT Articles lacking sources (Jan 2010), Articles needing expert attention (Jan 2010), Articles to be expanded (Jan 2010), Articles with topics of unclear notability (Jan 2010), Computer Security articles needing expert attention, Software articles needing expert attention
Phreaking Articles needing additional references (Jan 2008), Articles that may contain original research (Feb 2008, Mar 2010), Articles to be merged (Nov 2008), Articles with specifically-marked weasel-worded phrases (Nov 2008), Articles with unsourced statements (Feb 2007)
Proxy server «High» Articles needing additional references (Feb 2009, Sep 2009), Articles needing expert attention (Nov 2008), Articles with unsourced statements (Oct 2008, Feb 2010), Technology articles needing expert attention
Scareware Articles needing cleanup (Oct 2009), Articles with specifically-marked weasel-worded phrases (Sep 2009), Articles with unsourced statements (Sep 2009, Feb 2010), Vague or ambiguous time, Wikipedia articles needing factual verification (Feb 2010)
Timeline of computer viruses and worms «High» Articles needing cleanup (Nov 2009), Articles needing link rot cleanup, Articles with unsourced statements (Oct 2008, Feb 2009, Sep 2009, Mar 2010)
Wireless identity theft Articles lacking reliable references (May 2009), Articles to be merged (Aug 2008), Articles with dead external links (Sep 2009), Articles with unsourced statements (May 2009, Sep 2009), Orphaned articles (Feb 2010)

Articles with 5 cleanup categories assigned

edit
ArticleMaintenance categories
Computer crime «High» Articles needing cleanup (Oct 2008), Articles with specifically-marked weasel-worded phrases (Oct 2007), Articles with unsourced statements (Oct 2008, Jan 2009, Feb 2010)
Computer insecurity «Top» Articles lacking in-text citations (Dec 2009), Articles needing cleanup (Dec 2008), Articles with unsourced statements (Feb 2007, Mar 2008), Wikipedia articles needing style editing (Dec 2007)
Computer virus «High» Articles lacking reliable references (Mar 2009), Articles that may contain original research (Jan 2008, Mar 2009), Articles with unsourced statements (Jan 2008, Feb 2009)
Extended Copy Protection Articles needing additional references (Feb 2008), Articles needing cleanup (Feb 2008), Articles with dead external links (Nov 2009), Articles with unsourced statements (Feb 2008), Wikipedia laundry list cleanup
GNUCITIZEN Articles lacking in-text citations (Apr 2008), Articles needing cleanup (Apr 2008), Articles that need to be wikified (Apr 2008), Articles with unsourced statements (Apr 2008, Oct 2008)
Gumblar Articles lacking in-text citations (Aug 2009), Articles needing expert attention (Oct 2009), Articles with unsourced statements (Nov 2009, Jan 2010), Computer Security articles needing expert attention
Laptop theft Articles containing how-to sections, Articles needing additional references (Nov 2008), Articles needing cleanup (Feb 2008, Oct 2009), Articles with unsourced statements (Feb 2008)
Loke Yeng Hoe Articles with a promotional tone (Mar 2010), Articles with topics of unclear notability (Apr 2009), Orphaned articles (Feb 2009), Unreferenced BLPs (Mar 2010), Wikipedia articles with possible conflicts of interest
Null session Articles that need to be wikified (Oct 2008), Articles which may contain unencyclopedic material, Articles with topics of unclear notability (Oct 2008), Wikipedia articles needing context (Oct 2008), Wikipedia introduction cleanup (Oct 2008)
Quarantine technology Articles needing additional references (Dec 2009), Orphaned articles (Feb 2009), Wikipedia articles needing clarification (Aug 2009), Wikipedia articles needing context (Aug 2009), Wikipedia introduction cleanup (Aug 2009)
Software cracking Articles needing additional references (Jul 2009), Articles to be merged (Nov 2008), Articles with peacock terms (Oct 2009), Articles with unsourced statements (Mar 2009, Aug 2009)
Timeline of computer security hacker history «High» Articles lacking reliable references (Aug 2008), Articles that may contain original research (Aug 2008), Articles that need to be wikified (Nov 2008), Articles with specifically-marked weasel-worded phrases (Aug 2008), Articles with unsourced statements (Aug 2008)
Vulnerability (computing) «Top» Articles needing additional references (Jun 2008), Articles to be merged (Jan 2010), Wikipedia articles needing style editing (Jun 2008), Wikipedia external links cleanup, Wikipedia spam cleanup

Articles with 4 cleanup categories assigned

edit
ArticleMaintenance categories
Committee on National Security Systems «Top» Articles lacking sources (Oct 2009), Articles needing expert attention (Oct 2009), Computer Security articles needing expert attention, Education articles needing expert attention
Computer security «Top» Articles with unsourced statements (Aug 2008, Apr 2009, Aug 2009), Wikipedia articles needing clarification (Feb 2009)
Finjan Articles with a promotional tone, Articles with unsourced statements (Aug 2009), NPOV disputes (Feb 2008), Wikipedia articles needing clarification (Aug 2009)
Information security «Top» Articles to be expanded (Feb 2007), Articles with specifically-marked weasel-worded phrases (Feb 2010), Articles with unsourced statements (Jan 2008, May 2009)
Mandatory access control Articles needing cleanup (Jan 2008), Articles with unsourced statements (Jan 2009, Oct 2009, Nov 2009)
Masters of Deception Articles lacking in-text citations (Aug 2009), Articles lacking sources (Mar 2009), Articles that may contain original research (Mar 2009), Articles to be expanded (Jan 2007)
Microsoft Intelligent Application Gateway Articles lacking reliable references (Sep 2008), Articles that need to be wikified (Sep 2008), Articles to be merged (Feb 2010), Articles with unsourced statements (Sep 2008)
Mixed threat attack Articles lacking sources (Dec 2009), Orphaned articles (Feb 2009), Wikipedia articles needing context (Oct 2009), Wikipedia introduction cleanup (Oct 2009)
Przemysław Frasunek Articles lacking reliable references (Jan 2008), Articles with topics of unclear notability (Jan 2008), BLP articles lacking sources, Orphaned articles (Feb 2009)
Quick Heal Technologies Articles lacking sources (Oct 2009), Articles needing cleanup (Oct 2009), Articles with a promotional tone (Dec 2009), Articles with topics of unclear notability (Oct 2009)
Returnil Virtual System Articles lacking reliable references (Feb 2009, Mar 2009), Articles needing cleanup (Feb 2009), Wikipedia external links cleanup
Rootkit «High» Articles with unsourced statements (Sep 2007, Aug 2008, Mar 2009), Wikipedia articles needing copy edit (May 2009)
Secure coding Articles lacking sources (May 2008), Articles needing cleanup (Sep 2009), Pages missing lead section, Wikipedia introduction cleanup (Sep 2009)
Security-Enhanced Linux Articles needing additional references (Jun 2009), Articles with unsourced statements (Jun 2008, Jun 2009, Oct 2009)
Security architecture Articles lacking reliable references (Jul 2008), Articles needing cleanup (Sep 2009), Articles that need to be wikified (May 2008), Wikipedia introduction cleanup (Sep 2009)
Trusted Computing Articles needing additional references (Jun 2008), Articles with unsourced statements (Mar 2009, Jun 2009, Jul 2009)
WinAntiVirus 2006 Articles needing additional references (Mar 2009), Articles to be merged (Mar 2010), Articles with unsourced statements (Mar 2009), Orphaned articles (Feb 2009)
Wireless cracking Articles lacking in-text citations (Jul 2009), Articles that may contain original research (Apr 2009), Articles which may contain unencyclopedic material, Articles with trivia sections (Nov 2008)

Articles with 3 cleanup categories assigned

edit
ArticleMaintenance categories
Acceptable use policy Articles that may contain original research (Feb 2009), NPOV disputes (Oct 2008), Wikipedia references cleanup (Sep 2009)
Adware «High» Articles lacking sources (Jun 2009), Articles with unsourced statements (Oct 2009, Jan 2010)
Angela Orebaugh Articles needing cleanup (Nov 2007), Articles with unsourced statements (Nov 2007), Orphaned articles (Feb 2009)
Attack tree Articles with specifically-marked weasel-worded phrases (Oct 2008), Articles with unsourced statements (Oct 2008, Aug 2009)
AVG (software) Articles with unsourced statements (Jan 2009, Mar 2009, Dec 2009)
Avira security software Articles needing cleanup (Mar 2009), Articles with unsourced statements (Nov 2009), Wikipedia articles needing copy edit (Mar 2009)
Bliss (virus) Articles lacking reliable references (Feb 2010), Articles with specifically-marked weasel-worded phrases (Feb 2010), Articles with unsourced statements (Feb 2010)
Bluebugging Articles needing cleanup (May 2009), Orphaned articles (Apr 2009), Wikipedia articles needing copy edit (May 2009)
Capability-based security Articles needing additional references (Jul 2007), Articles to be merged (Jan 2009), Articles with unsourced statements (Jul 2007)
CapDesk Articles lacking in-text citations (May 2009), Articles lacking sources (May 2009), Articles needing cleanup (May 2009)
Child Exploitation Tracking System Articles that need to be wikified (Jun 2009), Orphaned articles (Jul 2009), Wikipedia articles needing copy edit (Jun 2009)
CIH (computer virus) Articles to be merged (Jun 2009), Articles with specifically-marked weasel-worded phrases (Jun 2009), Wikipedia articles needing clarification (Nov 2008)
Click fraud Articles with unsourced statements (Mar 2009, May 2009, Jan 2010)
Cyberwarfare «High» Articles with unsourced statements (Oct 2009, Feb 2010), Wikipedia articles needing style editing (Nov 2009)
Digital DawgPound Articles with unsourced statements (Jul 2007), Orphaned articles (Jan 2007), Wikipedia articles needing style editing (Jul 2007)
Erik Bloodaxe (hacker) Articles with unsourced statements (May 2008), Unreferenced BLPs (May 2009), Wikipedia articles needing style editing (Jul 2008)
Gary McKinnon «High» Articles with dead external links (Jan 2010), Articles with unsourced statements (Aug 2009, Jan 2010)
Gigabyte (virus writer) Articles lacking in-text citations (Jan 2009), Orphaned articles (Feb 2009), Wikipedia articles with possible conflicts of interest
Great Hacker War Articles with unsourced statements (May 2008), NPOV disputes (Dec 2007), Wikipedia articles needing style editing (Dec 2007)
Hacktivism Articles with unsourced statements (Nov 2008), Wikipedia external links cleanup, Wikipedia spam cleanup
Hardware keylogger Articles needing additional references (Apr 2009), Articles to be merged (Sep 2008), Articles with unsourced statements (Apr 2009)
Host-based intrusion detection system Articles lacking sources (May 2008), Wikipedia external links cleanup, Wikipedia spam cleanup
IDN homograph attack Articles needing cleanup (Jan 2010), Wikipedia articles in need of updating, Wikipedia introduction cleanup (Jan 2010)
Iframe virus Articles lacking in-text citations (Sep 2009), Articles needing cleanup (Nov 2009), Wikipedia articles needing copy edit (Nov 2009)
Information assurance «High» Articles lacking in-text citations (Feb 2008), Articles needing cleanup (Feb 2008), Articles with unsourced statements (Sep 2009)
Jason Burks Articles needing additional references (Nov 2008), Articles with trivia sections (Sep 2009), Orphaned articles (Sep 2008)
Kaspersky Internet Security Articles needing cleanup (Jun 2009), Articles with unsourced statements (Jul 2009), NPOV disputes (Mar 2009)
Kaspersky Lab «High» Articles needing cleanup (Apr 2009), Articles with unsourced statements (Mar 2009), Vague or ambiguous time
Kiosk hacking Articles lacking sources (Dec 2007), Articles with topics of unclear notability (Dec 2007), Orphaned articles (Dec 2007)
Knark Articles lacking sources (Feb 2007), Articles with unsourced statements (Sep 2008), Orphaned articles (Feb 2009)
List of warez groups Articles lacking reliable references (Jan 2008), Articles that may contain original research (Jan 2008), Articles with unsourced statements (Jun 2007)
Malware «Top» Articles with specifically-marked weasel-worded phrases (Dec 2009), Articles with unsourced statements (Feb 2007, Nov 2008)
Matrix Software License Protection System Articles lacking sources (Apr 2009), Articles with unsourced statements (Jun 2008, Apr 2009)
Munge Articles lacking reliable references (Feb 2009), Articles with unsourced statements (Jun 2009), Wikipedia articles needing style editing (Jun 2009)
Ne0h Articles lacking reliable references (Apr 2008), Articles to be expanded (Apr 2008), BLP articles lacking sources
Peter Tippett Articles needing sections (Oct 2009), Articles with unsourced statements (May 2009), Wikipedia articles needing reorganization
Phishing «High» Articles that may contain original research (Dec 2008), Articles with unsourced statements (Dec 2008), NPOV disputes (Dec 2008)
Play mp3.exe (trojan) Articles needing additional references (Jan 2009), Articles that need to be wikified (Jan 2009), Orphaned articles (Feb 2009)
Port scanner «High» Articles needing additional references (Jul 2009), Articles with unsourced statements (May 2009, Jul 2009)
Pre-boot authentication Articles needing additional references (Apr 2008), Articles needing cleanup (Apr 2008), Articles to be expanded (Apr 2008)
Relay attack Articles with unsourced statements (May 2007), Wikipedia articles needing context (Oct 2009), Wikipedia introduction cleanup (Oct 2009)
RF monitor software Articles needing cleanup (Oct 2008), Articles to be expanded (Oct 2008), Articles with topics of unclear notability (Oct 2008)
Robert Schifreen Articles needing additional references (Feb 2009), Articles with topics of unclear notability (Nov 2008), Orphaned articles (Feb 2009)
SMiShing Articles to be expanded (Mar 2007), Articles to be merged (Apr 2009), Articles with unsourced statements (Jul 2009)
SpyHunter Articles with unsourced statements (Aug 2008), Orphaned articles (Feb 2009), Wikipedia references cleanup (Sep 2009)
Spyware «High» Articles with unsourced statements (Feb 2007, Feb 2009), Vague or ambiguous time
Systempunkt Articles needing cleanup (Jan 2008), Orphaned articles (Aug 2008), Wikipedia articles needing style editing (Jan 2008)
Systems assurance «Top» Articles lacking sources (Jan 2008), Articles with topics of unclear notability (Jan 2008), Orphaned articles (Feb 2009)
Warzapping Articles with disputed statements (Dec 2008), Articles with topics of unclear notability (Nov 2008), Orphaned articles (Feb 2009)
WinFixer Articles needing cleanup (Dec 2008), Articles that may contain original research (Oct 2008), Self-contradictory articles (Aug 2009)
Yahoo! Assistant Articles containing how-to sections, Articles needing cleanup (Dec 2007), Articles with specifically-marked weasel-worded phrases (Nov 2009)
Zardoz (computer security) Wikipedia articles needing clarification (Mar 2009), Wikipedia articles needing context (Mar 2009), Wikipedia introduction cleanup (Mar 2009)

Further entries (summary)

edit

Detail listing is suppressed due to size restrictions.

Group# Articles
Articles with 2 cleanup categories assigned117
Articles with one cleanup category assigned283

Listing by maintenance category

edit

Accuracy disputes

edit

Articles containing how-to sections

edit

Articles containing predictions or speculation

edit

Articles created via the Article Wizard

edit

Articles lacking in-text citations

edit

Articles lacking reliable references

edit

Articles lacking sources

edit

Articles needing additional references

edit

Articles needing cleanup

edit

Articles needing expert attention

edit
edit

Articles needing more detailed references

edit

Articles needing sections

edit

Articles that may contain original research

edit

Articles that need to be wikified

edit

Articles to be expanded

edit

Articles to be merged

edit

Articles which may contain unencyclopedic material

edit

Articles with a promotional tone

edit

Articles with broken or outdated citations

edit
edit

Articles with disputed statements

edit

Articles with invalid date parameter in template

edit

Articles with obsolete information

edit

Articles with peacock terms

edit

Articles with sections that need to be turned into prose

edit

Articles with specifically-marked weasel-worded phrases

edit

Articles with topics of unclear notability

edit

Articles with trivia sections

edit

Articles with unsourced statements

edit

Feb 2007

edit

Mar 2007

edit

May 2007

edit

Jun 2007

edit

Jul 2007

edit

Aug 2007

edit

Sep 2007

edit

Oct 2007

edit

Nov 2007

edit

Dec 2007

edit

Jan 2008

edit

Feb 2008

edit

Mar 2008

edit

Apr 2008

edit

May 2008

edit

Jun 2008

edit

Jul 2008

edit

Aug 2008

edit

Sep 2008

edit

Oct 2008

edit

Nov 2008

edit

Dec 2008

edit

Jan 2009

edit

Feb 2009

edit

Mar 2009

edit

Apr 2009

edit

May 2009

edit

Jun 2009

edit

Jul 2009

edit

Aug 2009

edit

Sep 2009

edit

Oct 2009

edit

Nov 2009

edit

Dec 2009

edit

Jan 2010

edit

Feb 2010

edit

Mar 2010

edit

Other

edit

Articles with weasel words

edit

BLP articles lacking sources

edit

Computer Security articles needing expert attention

edit

Education articles needing expert attention

edit

Law articles needing expert attention

edit

NPOV disputes

edit

Orphaned articles

edit

Sep 2006

edit

Nov 2006

edit

Jan 2007

edit

Oct 2007

edit

Dec 2007

edit

Jan 2008

edit

Apr 2008

edit

May 2008

edit

Jun 2008

edit

Jul 2008

edit

Aug 2008

edit

Sep 2008

edit

Oct 2008

edit

Dec 2008

edit

Jan 2009

edit

Feb 2009

edit

Mar 2009

edit

Apr 2009

edit

Jul 2009

edit

Aug 2009

edit

Oct 2009

edit

Nov 2009

edit

Dec 2009

edit

Feb 2010

edit

Mar 2010

edit

Pages missing lead section

edit

Self-contradictory articles

edit

Software articles needing expert attention

edit

Technology articles needing expert attention

edit

Unreferenced BLPs

edit

Vague or ambiguous time

edit

Wikipedia articles in need of updating

edit

Wikipedia articles needing clarification

edit

Wikipedia articles needing context

edit

Wikipedia articles needing copy edit

edit

Wikipedia articles needing factual verification

edit

Wikipedia articles needing reorganization

edit

Wikipedia articles needing style editing

edit

Wikipedia articles with plot summary needing attention

edit

Wikipedia articles with possible conflicts of interest

edit
edit

Wikipedia introduction cleanup

edit

Wikipedia laundry list cleanup

edit

Wikipedia references cleanup

edit

Wikipedia spam cleanup

edit