Talk:Defense strategy (computing)

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Addition strategy types[edit]

Description of defense strategies against fileless Malware ( and other traveling security threats ) are welcomed.

Copy Edit[edit]

Hi, I'm a new editor and this article caught my eye on the list of articles needing copy edit. In my edit I have attempted to make the flow of the article less terse by adding punctuation, pronouns, and articles. I changed some wikilinks to display in lower-case, and added a few. I changed the references to the different strategies to lower-case in the body of the article. I think capitalization would be appropriate if these were trademarks, but I think they are generic terms and therefore not proper nouns. I have left the headings unchanged, but I think there may be room for clean-up in regards to capitalization there. DancesWithThermalPaste (talk) 01:36, 26 December 2019 (UTC)[reply]

A Commons file used on this page has been nominated for speedy deletion[edit]

The following Wikimedia Commons file used on this page has been nominated for speedy deletion:

You can see the reason for deletion at the file description page linked above. —Community Tech bot (talk) 08:51, 19 January 2020 (UTC)[reply]

Commons files used on this page have been nominated for speedy deletion[edit]

The following Wikimedia Commons files used on this page have been nominated for speedy deletion:

You can see the reasons for deletion at the file description pages linked above. —Community Tech bot (talk) 09:36, 19 January 2020 (UTC)[reply]

Strategy analysis[edit]

There is no point to delete strategy analysis , if someone want to improve it , he/she is very welcomed. — Preceding unsigned comment added by Davidy2001 (talkcontribs) 06:42, 29 January 2020 (UTC)[reply]