Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

Talk:Cylon computer virus/Archive 1: Difference between revisions

Discussion page of Cylon computer virus/Archive 1
Spencerian (talk | contribs)
Reorganization
 
Serenity (talk | contribs)
Comment about title and content
Line 2: Line 2:


This article is part of a breakout revision of what was in the [[Virus]] article, which is now a disambiguation. This article pertains to computer viruses only; other articles will break out other forms of viruses or infections into specific articles. --[[User:Spencerian|Spencerian]] 11:56, 15 May 2007 (CDT)
This article is part of a breakout revision of what was in the [[Virus]] article, which is now a disambiguation. This article pertains to computer viruses only; other articles will break out other forms of viruses or infections into specific articles. --[[User:Spencerian|Spencerian]] 11:56, 15 May 2007 (CDT)
:A good portion of this article deals with the backdoor exploits in the Miniseries. This aren't really viruses though. At first I thought about renaming it to something more general like "Cylon electronic warfare", but another possibility is to just delete most of that, as the content should already be present at [[Command Navigation Program]]. A very short summary of the backdoor problem is enough here.

Revision as of 17:16, 15 May 2007

Reorganization

This article is part of a breakout revision of what was in the Virus article, which is now a disambiguation. This article pertains to computer viruses only; other articles will break out other forms of viruses or infections into specific articles. --Spencerian 11:56, 15 May 2007 (CDT)

A good portion of this article deals with the backdoor exploits in the Miniseries. This aren't really viruses though. At first I thought about renaming it to something more general like "Cylon electronic warfare", but another possibility is to just delete most of that, as the content should already be present at Command Navigation Program. A very short summary of the backdoor problem is enough here.