804:
how and when a security token would most assuredly prevent a keylogging based attack from succeeding, is complex and falls outside of the scope of this article. Here is what I mean by a tamper-proof system: A security token which uses an integrated circuit to implement a challange response system, lets say, crypto-hash based. Assume the crypto and its implementation in the token are strong. The authentication server authenticates a user using two-factor authentication: the token and a password. Assume the authentication server is not compromised. The user authenticates using a terminal/reader that is not secure. While an attacker might learn the password, the attacker can not log or otherwise fake having the token: the token must be in the reader for the user to authenticate, even if the reader itself is hacked. So here is what is certain: when the authentication server sends a challange and recieves the correct response, the correct security token was present. It does not, of course, itself prevent a hacker from then commandeering the session. Nor does it prevent said hacker from obtaining the token in some other way, but now we are discussing basically rubber-hose cryptanalysis. I digress...
1315:
808:
keylogger, will have also had the oportunity to (and may very well have) installed a full remote access backdoor or any number of other things also mentioned in the related features section. This is already mentioned in the current article, but I think it is central to helping a reader understand the issue. Another thing to stress is that discussion of keyloggers, as important as that discussion is to computer security, is of limited value outside of the context of a broader understanding of basic computer security issues, but without becoming a computer security primer itself.
1630:
596:
1604:
489:
278:
251:
346:
429:
402:
370:
1272:
986:
to create a new keyboard layout doesn't change e.g. Windows default shortcuts (i.e. you may swap the C and K keys, and pressing C would result in typing K, but still, Ctrl+C would operate as usual (becoming Ctrl+K), even though that is not the case if you changed the layout to Dvorak in language settings) - I'm guessing the information about keys pressed remains the same, but new values are assigned while typing text. --
220:
527:
799:
or security background one narrow topic, such as keyloggers, without digressing into much broader topics. Nevertheless, that is what this article should ideally accomplish, while avoiding giving or reinforcing misconceptions too much. We could say, for example, "no system is tamper proof" and leave it at that, since in the first place it is the
1704:
Maybe that's the point, something embarrassing like that would be captured by a key logger too. Pretty harmless IMO. If it really bothers you, you could edit the images or or create better screenshots yourself. Or try your luck at removing it entirely. But you shouldn't require other volunteers to do
1008:
Keyboards are quite difficult for most people to use if the letters printed on the keys do not match the letters that appear onscreen - this would be a serious usability problem. If the actual lettering on the keys changes (ie somebody swaps in AZERTY keyboard hardware), that might in principle cause
1004:
Keyboard maps are normally handled at an OS level. Some keyloggers may be fooled by using an alternate keymap; it depends on where they "listen". (To simplify: does the keylogger collect information about keypresses before or after
Windows accounts for localisation or any other keymap changes made by
985:
I'm just wondering if this could be mentioned (although I have no idea if it actually works) - wouldn't using a customised keyboard layout (i.e. producing one with MS Keyboard Layout
Creator for Windows systems) mess up the recording for at least some keyloggers? Strangely enough, using that software
758:
Socrates2008, I agree the link about the keyloggers installed in smart card (credit card) is relevant and interesting. However I am afraid that it could be confusing for readers without a significant discussion on why these smart cards, in this application, are vulnerable to keylogging whereas other
658:
WP does not give advice. What if your CD-based OS has a keylogger installed too, e.g. via a security flaw that allows infection via an IP port? What about hardware keyloggers (in BIOS, keyboard), acoustic keylogging etc? There's no simple solution if the attacker is determined and has had physical
642:
The article should mention that you can totally avoid ANY software malware inside a computer by cold booting from a LiveCD, such as Ubuntu or
Knoppix. Any software on the internal hard drive is completely bypassed. You can boot with a LiveCD and use the Internet. You can store data and programs on
1012:
As an aside, the latter can be a real problem for preboot encryption - as users may often need to type in credentials at a point where the OS isn't available to perform key-mapping magic, the preboot software's understanding of keypresses may differ significantly from the letters actually printed on
870:
knowing the keystrokes, mouse actions, display, clipboard etc at a compromised computer or device will not allow an attacker gain access to a protected resource on an uncompromised server. Security tokens that work as a type of hardware assisted one time password system will share the advantages of
1055:
Yes, the bash shell, for example keeps a shell history. Many older computer systems logged keystrokes to a separate storage device, and were capable of rebuilding a days transactions from the keystroke logs and an overnight backup. (I had the dubious pleasure of running this software on a GEAC 8000
798:
It can be "tamper proof" for all practical purposes (even paranoid ones), but only in a narrowed context. (Also note I self-applied the citation needed tag, since I/we can't just take my word for it.) At the same time I'm agreeing with you; its difficult to educate to a reader without a technical
822:
Agree with all your comments, but would just like to add that in countries like the UK, credit cards with an embedded smartcard still have a legacy magstripe. So while it's no longer possible to make a credit card purchase in the UK with a magstripe, in fact UK cardholders' credit cards revert to
807:
The article might be due for a sweeping overhaul. If I get a good idea for a better way to organize it, I'll post here for feedback. One thing to stress might be the fact that, an attacker who gains access to the system such as superuser or kernel-mode, in order to install/infect with a software
803:
thing to assume and, in a certain sense, it is true that no system which can be interacted with is "Truly Secure" with a capital T. At the same time, the statement is not entirely accurate, there is in fact such a thing as certainty in an uncertain world. The problem is, explaining to the reader
1039:
Are keyloggers ever used for legitimate purposes? I want to install one on my own computer to help me find which sequences of keystrokes I use the most often, so that I can write keyboard shortcuts for them. Just counting word frequencies won't work, because it wouldn't distinguish between text I
910:
I think you're on the right track - need some more refs though. Also in the last sentence, I understand poor security in the manufacturing chain was one of the big issues, as this allowed the tampering to go unnoticed. So how about: "In one instance, poor security in the manufacturing and supply
884:
entry may be vulnerable to keystoke logging. In one instance, criminals were able to use a hardware-based logger within
European credit card readers. The resource being protected was permitted by the design of the system to be read by from the token unencrypted, allowing the attack to succeed.
714:
One countermeasure not mentioned is keystroke encryption, such as that provided by QFX KeyScrambler. A custom keyboard driver is used to encrypt keystrokes, which are then decrypted within the target application (eg by a browser extension). Theoretically this should defeat most software-based
875:
within the integrated circuitry can improve security in a similar fashion. However, the effectiveness of a system based on security tokens at improving security in the face of a keylogging attack is variable and depends on the type of system, its implementation, and what is being protected.
1718:
Every875, I do not see the problem here. The words nude girls and playboy.com are not inappropriate, they are just words. If you feel strongly enough about them you can create new images to be used or look through commons to see if there is a different set of images that can be used.
759:
types of security tokens, used in another context, may me highly or completely resistant to this sort of attack (by rendering it irrelevant). I also apologize for not following suggested procedure by moving the link to the discussion page and explaining why it was removed.
1123:"Every software keylogger can log these typed characters sent from one program to another." Not sure this is true, if the typed characters are windows messages, and the keylogger is trapping hardware interrupts. Perhaps someone with the necessary knowledge can clarify.
823:
the old method when used in other countries. In other words, criminals capture the PIN and read the card in the UK, then use the details elsewhere. So as usual, while the underlying PKI technology itself is bullet-proof, the implementation is flawed.
1770:
I had put playboy in the tab on purpose to show how embarrassing keyloggers can be. This image is intended to show that keyloggers can be used to detect illegal or unwanted activities, but can also be used to break confidentiality and privacy.
638:
Most simple software- or hardware-based keylogging can be effectively thwarted by getting into the habit of NEVER typing any of your passwords in proper order. While you type any password, use the mouse to move around within the password.
1143:
On a modern OS, only a kernel mode logger (implemented as a driver) can trap keystrokes at the hardware level (Ring 0). Most usermode loggers hook the message queue or simply poll the OS for keypress via the GetAsyncKeyState() API.
1599:
If you take a careful look at the first image in the page, where the browser tabs are shown, you can see that an inappropriate tab titled "nude girls" is open. Should that image be replaced? This is very disturbing....
911:
chain allowed criminals to subvert
European credit card readers with a hardware-based logger. Poor design of the system allowed credit card details to be intercepted after they had been decrypted by the card reader."
730:
Yes keystroke encryption is definitely useful against certain types of keylogger. What I'm unsure about is whether something like KeyScrambler would work if installed on a computer that already has a keylogger on it.
153:
1735:
It looks as though the creator of the images forgot to close the tab before taking the screenshot. If that tab was open on purpose to show how embarrassing keyloggers can be, this should be included in the caption.
1174:
Should there be a section about the legality of keylogging, in particular, the restrictions and prohibitions certain governments have placed, maybe discussions about whether it may violate wiretap laws?
1075:
Keylogging is the technology used for auto-correct ("teh" becomes "the" in
Microsoft Word) and text-expansion functionality (typing "tyvm" becomes "thank you very much"); so yes, it has legitimate uses.
1509:
1864:
1523:
1403:
1882:
1878:
1541:
1537:
1421:
1417:
1013:
the keys, in an international organisation where different people have different localised keyboards. This tends to manifest as hundreds of cases for a helpdesk which start "
2046:
2026:
147:
379:
1303:
479:
1176:
1009:
problems for keylogging at a lower level - ie hardware keylogging - but in practice an attacker installing a hardware keylogger may well notice the alternate keyboard.
991:
1796:
1087:
774:
That's fine - do you have any suggestions as to how this can be improved or reworded? The scam made headline news, and illustrates that no system is tamper proof.
1510:
https://web.archive.org/web/20131221071647/http://themoscownews.com/russia/20130711/191758523/Russian-security-agency-to-buy-typewriters-to-avoid-surveillance.html
1235:
1226:
1203:
742:
699:
648:
558:
901:
813:
764:
679:
1257:
2006:
1513:
1083:
1222:
1199:
753:
1499:
715:
keyloggers, since they will get only the encrypted keystrokes. Perhaps this could be added as a new heading alongside 'Keystore interference software'?
336:
2041:
2021:
1262:
716:
703:
469:
384:
1307:
1940:
One of the images of keylogging under application has a secondary open tab that says "Nude girls". I think an updated image would be a better fit.
709:
768:
1850:
1163:
1041:
724:
1941:
1780:
1800:
1221:
The table shows keyloggers compared one to another by multiple of functionalities. The results shown in table seems to be easy to understand.
673:
1785:
I liked
Notimes images better because it is more modern. I feel like the two current images are dated. Also rip that man for being blocked.
1067:
1028:
746:
930:
905:
842:
817:
793:
1338:
1110:
1095:
445:
1765:
1134:
2036:
2016:
1930:
1589:
1207:
1991:
995:
643:
USB flash drives under your control. When you turn off the computer, there will be no trace of anything you did inside the computer. -
503:
326:
79:
1692:
1664:
1469:
2001:
1955:
1935:
360:
44:
1860:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
1751:
1742:
1723:
1519:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
1399:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
1389:
1713:
1641:
1615:
2051:
1189:
516:
436:
407:
1949:
1184:
168:
1369:
1118:
135:
1594:
1299:
85:
987:
980:
302:
1986:
1792:
1091:
958:
1514:
http://themoscownews.com/russia/20130711/191758523/Russian-security-agency-to-buy-typewriters-to-avoid-surveillance.html
1996:
1959:
738:
695:
644:
30:
1825:
1500:
https://web.archive.org/web/20090826150015/http://www.digitalsociety.org/2009/08/apple-keyboards-hacked-and-possessed
1474:
872:
1842:
1747:
Ok, what do you want? If it bothers you so much, make new screenshots. I do not see the problem with the images.
1491:
1361:
1230:
1049:
1379:
609:
190:
129:
567:
Create the
Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
2031:
1971:
1344:
498:
412:
285:
256:
99:
1881:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
1540:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
1420:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
2011:
1217:
I suggest adding the link to comparison table of most popular commercial monitoring products on keylogger.org:
866:
may improve security in some ways even when an unauthorized keylogger (or related) is present. In particular,
652:
355:
261:
104:
20:
1851:
https://web.archive.org/web/20080913072014/http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf
1503:
125:
1180:
74:
1925:
1679:
1584:
1464:
1333:
231:
175:
65:
1900:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
1559:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
1439:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
1841:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit
1490:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit
1360:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit
1253:
185:
1854:
1246:
Perhaps adding information on the more recent developments of keystroke logging would be recommended.
1128:
1061:
1218:
1761:
1169:
541:
1101:
That's not keylogging. Naturally a program reads your keystrokes in order to know what is wanted.
444:
on
Knowledge. If you would like to participate, please visit the project page, where you can join
301:
on
Knowledge. If you would like to participate, please visit the project page, where you can join
1916:
1575:
1455:
1390:
https://web.archive.org/web/20100626093658/http://networkintercept.com/keystrokeinterference.html
1278:
1034:
109:
1885:
before doing mass systematic removals. This message is updated dynamically through the template
1544:
before doing mass systematic removals. This message is updated dynamically through the template
1424:
before doing mass systematic removals. This message is updated dynamically through the template
1240:
Some external links needed in order for people who are looking for example keylogging software.
1901:
1838:
1560:
1487:
1440:
1156:
923:
835:
786:
665:
298:
141:
1888:
1776:
1547:
1427:
1249:
720:
237:
1370:
https://web.archive.org/web/20131207133350/http://www.spywareloop.com/news/keystroke-logging
896:
Ideally, there would be a short article dedicated to this incident and we'd just link there.
1908:
1788:
1567:
1447:
1125:
1079:
1058:
734:
691:
8:
1757:
1393:
1212:
1024:
219:
55:
1967:
1867:, "External links modified" talk page sections are no longer generated or monitored by
1526:, "External links modified" talk page sections are no longer generated or monitored by
1406:, "External links modified" talk page sections are no longer generated or monitored by
1106:
1045:
70:
1907:
If you found an error with any archives or the URLs themselves, you can fix them with
1566:
If you found an error with any archives or the URLs themselves, you can fix them with
1446:
If you found an error with any archives or the URLs themselves, you can fix them with
570:
Find editors who have shown interest in this subject and ask them to take a look here.
1945:
1834:
1629:
1483:
1353:
1001:
I moved your comment to the bottom of the page, per convention - hope you don't mind.
536:
441:
51:
24:
1373:
1772:
1748:
1720:
1686:
help me? This is getting really suspicious! Not a single person has replied to me!
1673:
1603:
1327:
161:
1710:
1357:
897:
809:
760:
1380:
https://web.archive.org/web/20110429181147/http://spyreveal.com/keyloggerremoval
1653:
1020:
863:
633:
1873:. No special action is required regarding these talk page notices, other than
1532:. No special action is required regarding these talk page notices, other than
1412:. No special action is required regarding these talk page notices, other than
618:
199:
1980:
1963:
1738:
1699:
1688:
1660:
1637:
1611:
1102:
622:
595:
203:
1015:
I'm sure I'm typing in the right password, but it keeps on locking me out...
1504:
http://www.digitalsociety.org/2009/08/apple-keyboards-hacked-and-possessed/
962:
1756:
I replaced the images with my own since the previous images were dated. --
1874:
1730:
1669:
1533:
1413:
1322:
877:
859:
1962:. I am sure that it we had an equivalent image, then we would use that.
1383:
1195:
1005:
the user? I know which I'd choose if I were writing keylogger software).
624:
204:
1706:
1056:
when the overnight crashed and the backups had been incorrectly made.)
488:
1040:
typed and text I downloaded. It also wouldn't get command sequences.
294:
1194:
Reference # 15, namely "Keylogger Removal" link is no more active -
1855:
http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf
620:
369:
345:
290:
277:
250:
201:
685:
428:
401:
1219:
http://www.keylogger.org/monitoring-software-review/tableview.htm
1623:
Update: the second image features "playboy.com" at the bottom:
625:
205:
526:
1845:
for additional information. I made the following changes:
1494:
for additional information. I made the following changes:
1364:
for additional information. I made the following changes:
1266:
1243:
Also links needed to anti-keylogging software are needed.
959:"Organized crime tampers with European card swipe devices"
881:
1394:
http://networkintercept.com/keystrokeinterference.html
160:
2047:
C-Class Computer Security articles of Low-importance
2027:
C-Class Computer hardware articles of Low-importance
589:
440:, a collaborative effort to improve the coverage of
289:, a collaborative effort to improve the coverage of
15:
1877:using the archive tool instructions below. Editors
1536:using the archive tool instructions below. Editors
1416:using the archive tool instructions below. Editors
548:Review importance and quality of existing articles
1374:http://www.spywareloop.com/news/keystroke-logging
1978:
1236:Links to software based keystroke logging needed
871:OTP, and others which implement a cryptographic
551:Identify categories related to Computer Security
33:for general discussion of the article's subject.
1863:This message was posted before February 2018.
1522:This message was posted before February 2018.
1402:This message was posted before February 2018.
680:comparison of keylogger avoidance technologies
956:
174:
688:would be truly benefitial to this article.
2007:C-Class software articles of Low-importance
754:Smart-Card Vulnerability to logging attacks
1958:appears to be the only example of that in
1833:I have just modified one external link on
1263:Semi-protected edit request on 25 May 2016
557:Identify articles for creation (see also:
2042:Low-importance Computer Security articles
2022:Low-importance Computer hardware articles
1956:File:Keylogger-screen-capture-example.png
1482:I have just modified 2 external links on
1352:I have just modified 3 external links on
539:. Please allow some days for processing.
1628:
1602:
710:Keystroke encryption as a countermeasure
1658:Can you help me? No one is responding!
454:Knowledge:WikiProject Computer Security
217:
1979:
1936:Application of keylogger image example
457:Template:WikiProject Computer Security
1384:http://spyreveal.com/keyloggerremoval
1196:http://spyreveal.com/keyloggerremoval
434:This article is within the scope of
283:This article is within the scope of
213:
684:I think that some information from
236:It is of interest to the following
23:for discussing improvements to the
13:
2037:C-Class Computer Security articles
2017:C-Class Computer hardware articles
1960:commons:Category:Keystroke logging
525:
487:
368:
344:
14:
2063:
1992:Low-importance Computing articles
1837:. Please take a moment to review
1486:. Please take a moment to review
1356:. Please take a moment to review
880:and their associated keypads for
873:challenge-response authentication
564:Identify articles for improvement
2002:Low-importance software articles
1313:
1270:
594:
427:
400:
276:
249:
218:
45:Click here to start a new topic.
1190:Suggest Removal of Reference 15
686:http://kyps.net/home/comparison
474:This article has been rated as
331:This article has been rated as
311:Knowledge:WikiProject Computing
2052:All Computer Security articles
1801:20:42, 28 September 2019 (UTC)
1119:Query about onscreen keyboards
950:
314:Template:WikiProject Computing
1:
1665:14:47, 31 December 2017 (UTC)
1595:A flop with two of the images
1198:I suggest removing the link.
1152:
1146:
1111:08:13, 18 December 2019 (UTC)
1096:07:53, 18 December 2019 (UTC)
919:
913:
831:
825:
782:
776:
661:
535:will be generated shortly by
517:WikiProject Computer Security
496:This article is supported by
448:and see a list of open tasks.
437:WikiProject Computer Security
377:This article is supported by
353:This article is supported by
305:and see a list of open tasks.
42:Put new text under old text.
1931:14:29, 9 December 2017 (UTC)
1642:00:30, 7 December 2017 (UTC)
1616:00:20, 7 December 2017 (UTC)
1590:22:06, 5 December 2017 (UTC)
1208:09:16, 5 December 2013 (UTC)
1029:13:32, 18 October 2010 (UTC)
996:13:13, 18 October 2010 (UTC)
981:Non-QWERTY / custom layouts?
957:Austin Modine (2008-10-10).
931:20:43, 4 November 2009 (UTC)
906:16:48, 2 November 2009 (UTC)
843:04:29, 31 October 2009 (UTC)
818:04:11, 31 October 2009 (UTC)
794:20:25, 29 October 2009 (UTC)
769:17:49, 29 October 2009 (UTC)
653:16:09, 28 January 2009 (UTC)
380:Computer hardware task force
7:
1781:11:57, 18 August 2019 (UTC)
1752:21:07, 3 January 2018 (UTC)
1743:21:03, 3 January 2018 (UTC)
1724:11:16, 3 January 2018 (UTC)
1714:22:58, 2 January 2018 (UTC)
1693:21:20, 2 January 2018 (UTC)
1293:to reactivate your request.
1281:has been answered. Set the
1231:10:30, 9 January 2014 (UTC)
1185:01:03, 11 August 2011 (UTC)
747:23:16, 12 August 2019 (UTC)
725:04:46, 3 October 2011 (UTC)
50:New to Knowledge? Welcome!
10:
2068:
1987:C-Class Computing articles
1972:08:13, 19 April 2024 (UTC)
1950:14:24, 18 April 2024 (UTC)
1894:(last update: 5 June 2024)
1830:Hello fellow Wikipedians,
1553:(last update: 5 June 2024)
1479:Hello fellow Wikipedians,
1433:(last update: 5 June 2024)
1349:Hello fellow Wikipedians,
1258:17:20, 10 March 2016 (UTC)
1050:21:23, 15 March 2011 (UTC)
674:22:20, 18 April 2009 (UTC)
480:project's importance scale
460:Computer Security articles
337:project's importance scale
1997:C-Class software articles
1766:13:53, 3 April 2019 (UTC)
1164:11:55, 19 July 2011 (UTC)
1135:22:57, 18 July 2011 (UTC)
1068:22:57, 18 July 2011 (UTC)
704:18:35, 21 July 2009 (UTC)
510:
495:
473:
422:
376:
352:
330:
271:
244:
80:Be welcoming to newcomers
1339:06:23, 25 May 2016 (UTC)
1308:06:18, 25 May 2016 (UTC)
1155:
1153:
1147:
922:
920:
914:
834:
832:
826:
785:
783:
777:
664:
662:
659:acces to your computer.
1826:External links modified
1475:External links modified
1470:04:33, 5 May 2017 (UTC)
1345:External links modified
2032:All Computing articles
1633:
1607:
530:
492:
373:
349:
299:information technology
226:This article is rated
75:avoid personal attacks
2012:All Software articles
1632:
1606:
529:
499:WikiProject Computing
491:
372:
348:
286:WikiProject Computing
100:Neutral point of view
1875:regular verification
1534:regular verification
1414:regular verification
554:Tag related articles
515:Things you can help
356:WikiProject Software
105:No original research
1865:After February 2018
1524:After February 2018
1404:After February 2018
1177:MaverickHunter40245
542:More information...
1919:InternetArchiveBot
1870:InternetArchiveBot
1634:
1608:
1578:InternetArchiveBot
1529:InternetArchiveBot
1458:InternetArchiveBot
1409:InternetArchiveBot
531:
493:
374:
350:
317:Computing articles
232:content assessment
86:dispute resolution
47:
1895:
1835:Keystroke logging
1803:
1791:comment added by
1712:
1705:work for you. --
1554:
1484:Keystroke logging
1434:
1354:Keystroke logging
1337:
1297:
1296:
1138:
1098:
1082:comment added by
1071:
878:Smartcard readers
749:
737:comment added by
694:comment added by
631:
630:
588:
587:
584:
583:
580:
579:
576:
575:
451:Computer Security
442:computer security
408:Computer Security
395:
394:
391:
390:
212:
211:
66:Assume good faith
43:
25:Keystroke logging
2059:
1929:
1920:
1893:
1892:
1871:
1786:
1741:
1734:
1709:
1703:
1691:
1663:
1657:
1640:
1614:
1588:
1579:
1552:
1551:
1530:
1468:
1459:
1432:
1431:
1410:
1325:
1321:Blank request —
1317:
1316:
1288:
1284:
1274:
1273:
1267:
1250:FockeWulf FW 190
1170:Legality Section
1162:
1161:
1159:
1150:
1149:
1133:
1077:
1066:
973:
972:
970:
969:
954:
929:
928:
926:
917:
916:
841:
840:
838:
829:
828:
792:
791:
789:
780:
779:
732:
706:
672:
671:
670:
668:
626:
598:
590:
559:Article requests
544:
512:
511:
462:
461:
458:
455:
452:
431:
424:
423:
418:
415:
404:
397:
396:
319:
318:
315:
312:
309:
280:
273:
272:
267:
264:
253:
246:
245:
229:
223:
222:
214:
206:
179:
178:
164:
95:Article policies
16:
2067:
2066:
2062:
2061:
2060:
2058:
2057:
2056:
1977:
1976:
1938:
1923:
1918:
1886:
1879:have permission
1869:
1843:this simple FaQ
1828:
1737:
1728:
1697:
1687:
1659:
1651:
1636:
1610:
1597:
1582:
1577:
1545:
1538:have permission
1528:
1492:this simple FaQ
1477:
1462:
1457:
1425:
1418:have permission
1408:
1362:this simple FaQ
1347:
1314:
1300:112.208.233.228
1286:
1282:
1271:
1265:
1238:
1215:
1192:
1172:
1121:
1037:
1035:Legitimate Uses
983:
978:
977:
976:
967:
965:
955:
951:
864:security tokens
756:
712:
689:
682:
660:
636:
627:
621:
603:
545:
540:
459:
456:
453:
450:
449:
416:
410:
316:
313:
310:
307:
306:
265:
259:
230:on Knowledge's
227:
208:
207:
202:
121:
116:
115:
114:
91:
61:
12:
11:
5:
2065:
2055:
2054:
2049:
2044:
2039:
2034:
2029:
2024:
2019:
2014:
2009:
2004:
1999:
1994:
1989:
1975:
1974:
1937:
1934:
1913:
1912:
1905:
1858:
1857:
1849:Added archive
1827:
1824:
1823:
1822:
1821:
1820:
1819:
1818:
1817:
1816:
1815:
1814:
1813:
1812:
1811:
1810:
1809:
1808:
1807:
1806:
1805:
1804:
1758:Notimelivelong
1716:
1627:
1626:
1625:
1624:
1596:
1593:
1572:
1571:
1564:
1517:
1516:
1508:Added archive
1506:
1498:Added archive
1476:
1473:
1452:
1451:
1444:
1397:
1396:
1388:Added archive
1386:
1378:Added archive
1376:
1368:Added archive
1346:
1343:
1342:
1341:
1295:
1294:
1275:
1264:
1261:
1237:
1234:
1214:
1211:
1191:
1188:
1171:
1168:
1167:
1166:
1139:
1120:
1117:
1116:
1115:
1114:
1113:
1073:
1072:
1036:
1033:
1032:
1031:
1018:
1010:
1006:
1002:
988:94.254.189.211
982:
979:
975:
974:
948:
947:
943:
942:
941:
940:
939:
938:
937:
936:
935:
934:
933:
886:
857:
855:
854:
853:
852:
851:
850:
849:
848:
805:
755:
752:
751:
750:
711:
708:
681:
678:
677:
676:
663:Socrates2008 (
635:
632:
629:
628:
623:
619:
617:
614:
613:
605:
604:
599:
593:
586:
585:
582:
581:
578:
577:
574:
573:
572:
571:
568:
565:
562:
555:
552:
549:
533:Article alerts
524:
521:
520:
508:
507:
504:Low-importance
494:
484:
483:
476:Low-importance
472:
466:
465:
463:
446:the discussion
432:
420:
419:
417:Low‑importance
405:
393:
392:
389:
388:
385:Low-importance
375:
365:
364:
361:Low-importance
351:
341:
340:
333:Low-importance
329:
323:
322:
320:
303:the discussion
281:
269:
268:
266:Low‑importance
254:
242:
241:
235:
224:
210:
209:
200:
198:
197:
194:
193:
181:
180:
118:
117:
113:
112:
107:
102:
93:
92:
90:
89:
82:
77:
68:
62:
60:
59:
48:
39:
38:
35:
34:
28:
9:
6:
4:
3:
2:
2064:
2053:
2050:
2048:
2045:
2043:
2040:
2038:
2035:
2033:
2030:
2028:
2025:
2023:
2020:
2018:
2015:
2013:
2010:
2008:
2005:
2003:
2000:
1998:
1995:
1993:
1990:
1988:
1985:
1984:
1982:
1973:
1969:
1965:
1961:
1957:
1954:
1953:
1952:
1951:
1947:
1943:
1933:
1932:
1927:
1922:
1921:
1910:
1906:
1903:
1899:
1898:
1897:
1890:
1884:
1880:
1876:
1872:
1866:
1861:
1856:
1852:
1848:
1847:
1846:
1844:
1840:
1836:
1831:
1802:
1798:
1794:
1793:64.53.233.212
1790:
1784:
1783:
1782:
1778:
1774:
1769:
1768:
1767:
1763:
1759:
1755:
1754:
1753:
1750:
1746:
1745:
1744:
1740:
1732:
1727:
1726:
1725:
1722:
1717:
1715:
1711:
1708:
1701:
1696:
1695:
1694:
1690:
1685:
1681:
1678:
1675:
1671:
1668:
1667:
1666:
1662:
1655:
1650:
1649:
1648:
1647:
1646:
1645:
1644:
1643:
1639:
1631:
1622:
1621:
1620:
1619:
1618:
1617:
1613:
1605:
1601:
1592:
1591:
1586:
1581:
1580:
1569:
1565:
1562:
1558:
1557:
1556:
1549:
1543:
1539:
1535:
1531:
1525:
1520:
1515:
1511:
1507:
1505:
1501:
1497:
1496:
1495:
1493:
1489:
1485:
1480:
1472:
1471:
1466:
1461:
1460:
1449:
1445:
1442:
1438:
1437:
1436:
1429:
1423:
1419:
1415:
1411:
1405:
1400:
1395:
1391:
1387:
1385:
1381:
1377:
1375:
1371:
1367:
1366:
1365:
1363:
1359:
1355:
1350:
1340:
1335:
1332:
1329:
1324:
1320:
1312:
1311:
1310:
1309:
1305:
1301:
1292:
1289:parameter to
1280:
1276:
1269:
1268:
1260:
1259:
1255:
1251:
1247:
1244:
1241:
1233:
1232:
1228:
1224:
1220:
1210:
1209:
1205:
1201:
1197:
1187:
1186:
1182:
1178:
1165:
1158:
1151:
1142:
1141:
1140:
1136:
1131:
1130:
1127:
1112:
1108:
1104:
1100:
1099:
1097:
1093:
1089:
1085:
1084:117.20.71.152
1081:
1074:
1069:
1064:
1063:
1060:
1054:
1053:
1052:
1051:
1047:
1043:
1030:
1026:
1022:
1019:
1016:
1011:
1007:
1003:
1000:
999:
998:
997:
993:
989:
964:
960:
953:
949:
946:
932:
925:
918:
909:
908:
907:
903:
899:
895:
894:
893:
892:
891:
890:
889:
888:
887:
883:
879:
874:
869:
868:in some cases
865:
861:
846:
845:
844:
837:
830:
821:
820:
819:
815:
811:
806:
802:
797:
796:
795:
788:
781:
773:
772:
771:
770:
766:
762:
748:
744:
740:
736:
729:
728:
727:
726:
722:
718:
707:
705:
701:
697:
693:
687:
675:
667:
657:
656:
655:
654:
650:
646:
640:
616:
615:
612:
611:
607:
606:
602:
597:
592:
591:
569:
566:
563:
560:
556:
553:
550:
547:
546:
543:
538:
534:
528:
523:
522:
518:
514:
513:
509:
505:
502:(assessed as
501:
500:
490:
486:
485:
481:
477:
471:
468:
467:
464:
447:
443:
439:
438:
433:
430:
426:
425:
421:
414:
409:
406:
403:
399:
398:
386:
383:(assessed as
382:
381:
371:
367:
366:
362:
359:(assessed as
358:
357:
347:
343:
342:
338:
334:
328:
325:
324:
321:
304:
300:
296:
292:
288:
287:
282:
279:
275:
274:
270:
263:
258:
255:
252:
248:
247:
243:
239:
233:
225:
221:
216:
215:
196:
195:
192:
189:
187:
183:
182:
177:
173:
170:
167:
163:
159:
155:
152:
149:
146:
143:
140:
137:
134:
131:
127:
124:
123:Find sources:
120:
119:
111:
110:Verifiability
108:
106:
103:
101:
98:
97:
96:
87:
83:
81:
78:
76:
72:
69:
67:
64:
63:
57:
53:
52:Learn to edit
49:
46:
41:
40:
37:
36:
32:
26:
22:
18:
17:
1939:
1917:
1914:
1889:source check
1868:
1862:
1859:
1832:
1829:
1787:— Preceding
1683:
1676:
1635:
1609:
1598:
1576:
1573:
1548:source check
1527:
1521:
1518:
1481:
1478:
1456:
1453:
1428:source check
1407:
1401:
1398:
1351:
1348:
1330:
1318:
1298:
1290:
1279:edit request
1248:
1245:
1242:
1239:
1223:Michael Dave
1216:
1200:Michael Dave
1193:
1173:
1148:Socrates2008
1145:
1124:
1122:
1078:— Preceding
1057:
1038:
1014:
984:
966:. Retrieved
963:The Register
952:
944:
915:Socrates2008
912:
867:
856:
827:Socrates2008
824:
800:
778:Socrates2008
775:
757:
739:95.147.5.140
733:— Preceding
713:
696:78.51.34.180
683:
645:96.237.5.182
641:
637:
608:
600:
532:
497:
475:
435:
378:
354:
332:
284:
238:WikiProjects
184:
171:
165:
157:
150:
144:
138:
132:
122:
94:
19:This is the
1773:FlippyFlink
1213:Adding Link
860:smart cards
717:Carl.antuar
690:—Preceding
148:free images
31:not a forum
1981:Categories
1926:Report bug
1585:Report bug
1465:Report bug
1283:|answered=
1129:Farmbrough
1062:Farmbrough
968:2009-04-18
945:References
898:Noogenesis
847:How about:
810:Noogenesis
761:Noogenesis
1909:this tool
1902:this tool
1654:Shellwood
1568:this tool
1561:this tool
1448:this tool
1441:this tool
1319:Not done:
1021:bobrayner
862:or other
537:AAlertBot
413:Computing
308:Computing
295:computing
291:computers
257:Computing
88:if needed
71:Be polite
21:talk page
1964:Peaceray
1915:Cheers.—
1789:unsigned
1749:~Â GBÂ fan
1739:Every875
1721:~Â GBÂ fan
1700:Every875
1689:Every875
1680:contribs
1661:Every875
1638:Every875
1612:Every875
1574:Cheers.—
1454:Cheers.—
1103:Johnuniq
1092:contribs
1080:unsigned
1042:Bostoner
735:unsigned
692:unsigned
601:Archives
262:Software
186:Archives
56:get help
29:This is
27:article.
1942:ClarkD3
1839:my edit
1488:my edit
1358:my edit
858:Use of
478:on the
335:on the
228:C-class
154:WPÂ refs
142:scholar
1731:GB fan
1682:) Can
1670:GBÂ fan
1323:JJMC89
801:safest
634:LiveCD
297:, and
234:scale.
126:Google
1707:intgr
1287:|ans=
1277:This
519:with:
169:JSTOR
130:books
84:Seek
1968:talk
1946:talk
1797:talk
1777:talk
1762:talk
1674:talk
1304:talk
1254:talk
1227:talk
1204:talk
1181:talk
1157:Talk
1126:Rich
1107:talk
1088:talk
1059:Rich
1046:talk
1025:talk
992:talk
924:Talk
902:talk
836:Talk
814:talk
787:Talk
765:talk
743:talk
721:talk
700:talk
666:Talk
649:talk
162:FENS
136:news
73:and
1883:RfC
1853:to
1684:you
1542:RfC
1512:to
1502:to
1422:RfC
1392:to
1382:to
1372:to
1285:or
882:PIN
470:Low
327:Low
176:TWL
1983::
1970:)
1948:)
1896:.
1891:}}
1887:{{
1799:)
1779:)
1771:--
1764:)
1555:.
1550:}}
1546:{{
1435:.
1430:}}
1426:{{
1306:)
1291:no
1256:)
1229:)
1206:)
1183:)
1132:,
1109:)
1094:)
1090:•
1065:,
1048:)
1027:)
994:)
961:.
904:)
816:)
767:)
745:)
723:)
702:)
651:)
506:).
411::
387:).
363:).
293:,
260::
156:)
54:;
1966:(
1944:(
1928:)
1924:(
1911:.
1904:.
1795:(
1775:(
1760:(
1733::
1729:@
1702::
1698:@
1677:·
1672:(
1656::
1652:@
1587:)
1583:(
1570:.
1563:.
1467:)
1463:(
1450:.
1443:.
1336:)
1334:C
1331:·
1328:T
1326:(
1302:(
1252:(
1225:(
1202:(
1179:(
1160:)
1154:(
1137:.
1105:(
1086:(
1070:.
1044:(
1023:(
1017:"
990:(
971:.
927:)
921:(
900:(
839:)
833:(
812:(
790:)
784:(
763:(
741:(
719:(
698:(
669:)
647:(
610:1
561:)
482:.
339:.
240::
191:1
188::
172:·
166:·
158:·
151:·
145:·
139:·
133:·
128:(
58:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.