<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Infosegura</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Infosegura"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Infosegura"/>
		<updated>2026-04-22T12:01:51Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=35838</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=35838"/>
				<updated>2008-08-12T01:03:06Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Risk Factors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.&lt;br /&gt;
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative, when there is improvement of their level by the manner through peaceful exchange and without violating other people.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
A competitor can try to discovery your new product and introduce to the market first than you. Or try to get the secret information about your success. Or try to get your client database information.&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
=== Destructive Competition ===&lt;br /&gt;
: In 2007 the McLaren Mercedes, the leading team in the Formula One championship, was fined $100 million and excluded from the constructor’s title in connection with the spying scandal that has plagued the sport all season.&lt;br /&gt;
&lt;br /&gt;
=== Cooperative Competition ===&lt;br /&gt;
: If two companies are competing for business, but exchange some information about the market, they can improve their products to increase their sales.&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Competition Wikipedia]&lt;br /&gt;
* [http://sports.espn.go.com/nfl/news/story?id=3018338 ESPN]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Contractors&amp;diff=35541</id>
		<title>Contractors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Contractors&amp;diff=35541"/>
				<updated>2008-08-07T17:40:45Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Contractor is one that provides goods or service to costumers. The contractor can be a group or individual that has a contracts with another individual or organization to make a project or something especific.&lt;br /&gt;
The contract agreement between the customer and the contractor can include everything from the responsability for the methods, means, execution and/or supervision to the supplying of all material, labor, equipment and/or services necessary and it's include the budget, the general and special conditions and the plans and specification of the project, service or supplies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
To do this it is common for the general contractor to subcontract part of the work to other persons and companies that specialize in these types of work. These are called subcontractors.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/General_contractor Wikipedia]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Contractors&amp;diff=35540</id>
		<title>Contractors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Contractors&amp;diff=35540"/>
				<updated>2008-08-07T17:36:14Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Contractor is one that provides goods or service to costumers. The contractor can be a group or individual that has a contracts with another individual or organization to make a project or something especific.&lt;br /&gt;
The contract agreement between the customer and the contractor can include everything from the responsability for the methods, means, execution and/or supervision to the supplying of all material, labor, equipment and/or services necessary and it's include the budget, the general and special conditions and the plans and specification of the project, service or supplies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A general contractor usually is responsible for the supplying of all material, labor, equipment, (engineering vehicles and tools) and services necessary for the construction of the project. To do this it is common for the general contractor to subcontract part of the work to other persons and companies that specialize in these types of work. These are called subcontractors.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/General_contractor Wikipedia]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Contractors&amp;diff=35539</id>
		<title>Contractors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Contractors&amp;diff=35539"/>
				<updated>2008-08-07T17:35:56Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Contractor is one that provides goods or service to costumers. The contractor can be a group or individual that has a contracts with another individual or organization to make a project or something especific.&lt;br /&gt;
The contract agreement between the customer and the contractor can include everything from the responsability for the methods, means, execution and/or supervision to the supplying of all material, labor, equipment and/or services necessary and it's include the budget, the general and special conditions and the plans and specification of the project, service or supplies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A general contractor is responsible for the means and methods to be used in the construction execution of the project in accordance with the contract documents. Said contract documents usually include the contract agreement including budget, the general and special conditions and the plans and specification of the project that are prepared by a design professional. A general contractor usually is responsible for the supplying of all material, labor, equipment, (engineering vehicles and tools) and services necessary for the construction of the project. To do this it is common for the general contractor to subcontract part of the work to other persons and companies that specialize in these types of work. These are called subcontractors.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/General_contractor Wikipedia]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Contractors&amp;diff=35537</id>
		<title>Contractors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Contractors&amp;diff=35537"/>
				<updated>2008-08-07T17:14:23Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: New page: == Description == Contractor is one that provides goods or service to costumers. The contractor can be a group or individual that has a contracts with another individual or organization to...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Contractor is one that provides goods or service to costumers. The contractor can be a group or individual that has a contracts with another individual or organization to make a project or something especific.&lt;br /&gt;
&lt;br /&gt;
A general contractor is a group or individual that contracts with another organization or individual (the owner) for the construction or renovation of a building, road or other structure. A general contractor is defined as such if it is the signatory as the builder of the prime construction contract for the project. A general contractor is responsible for the means and methods to be used in the construction execution of the project in accordance with the contract documents. Said contract documents usually include the contract agreement including budget, the general and special conditions and the plans and specification of the project that are prepared by a design professional. A general contractor usually is responsible for the supplying of all material, labor, equipment, (engineering vehicles and tools) and services necessary for the construction of the project. To do this it is common for the general contractor to subcontract part of the work to other persons and companies that specialize in these types of work. These are called subcontractors.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/General_contractor Wikipedia]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=35318</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=35318"/>
				<updated>2008-08-04T19:18:04Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Risk Factors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.&lt;br /&gt;
&lt;br /&gt;
In general way there is 3 main type of computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Boot Virus&amp;lt;/b&amp;gt; - They staying in the boot sector of the floppy and in the Master Boot Record (MBR) of hard discs.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Macro Virus&amp;lt;/b&amp;gt; - They are the most common and most easily created, but less harmful. The virus of macro use a macro language of the application (such as Visual Basic or VBScript) to infect and duplicate documents and models. They attack any platform, but generally are made for Microsoft Office, using the programming environment from Microsoft for self-implementing the code of macro viral. When an infected document is opened, the virus infects runs and the models of the application user and can insert words, numbers or phrases in documents or unwanted change of command functions. Once a macro virus from the infected machine of a user, it can incorporate all the documents created in the future with the application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Program Virus&amp;lt;/b&amp;gt; - Normally be enforced with extensions .com, .exe and .bat and are activated only with a command from the user. Many of them are sent by e-mails or Instant Mesages.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
A Computer Virus could steal or delete information, make the computer slower or simply mess with the Operational System. In present days the most commom are virus to steal information from Internet Banking, so the attacker can transfer your money to his account, pay bills or buy something in the Internet.&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
Some famous and dangers computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Chernobyl&amp;lt;/b&amp;gt; or &amp;lt;b&amp;gt;Spacefiller&amp;lt;/b&amp;gt; in april 26 if the computer is infected the virus is activated and deletes the content of ROM memory (BIOS).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Melissa&amp;lt;/b&amp;gt; it's a computer virus that comes by e-mail attaching a Microsoft Word document, when this message is opened, the virus is activated and infect the file Normal.dot, then every document created by this text editor is infected and automatically send a infected e-mail for the first 50 contact from the catalog of the Outlook Express.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Codered&amp;lt;/b&amp;gt; virus attacks the Microsoft IIS 4.0 and 5.0 modifying the main page with the message &amp;quot;Welcome to http:// www.worm.com !  Hacked By Chinese!&amp;quot; and also program the infected computer to make a denial-of-service attack to the White House website (www.whitehouse.gov).&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IDGNow]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;br /&gt;
*[http://www.rsoutlook.com/articles/virusspecialist.htm Rsoutlook]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=35317</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=35317"/>
				<updated>2008-08-04T18:55:54Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.&lt;br /&gt;
&lt;br /&gt;
In general way there is 3 main type of computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Boot Virus&amp;lt;/b&amp;gt; - They staying in the boot sector of the floppy and in the Master Boot Record (MBR) of hard discs.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Macro Virus&amp;lt;/b&amp;gt; - They are the most common and most easily created, but less harmful. The virus of macro use a macro language of the application (such as Visual Basic or VBScript) to infect and duplicate documents and models. They attack any platform, but generally are made for Microsoft Office, using the programming environment from Microsoft for self-implementing the code of macro viral. When an infected document is opened, the virus infects runs and the models of the application user and can insert words, numbers or phrases in documents or unwanted change of command functions. Once a macro virus from the infected machine of a user, it can incorporate all the documents created in the future with the application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Program Virus&amp;lt;/b&amp;gt; - Normally be enforced with extensions .com, .exe and .bat and are activated only with a command from the user. Many of them are sent by e-mails or Instant Mesages.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
Some famous and dangers computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Chernobyl&amp;lt;/b&amp;gt; or &amp;lt;b&amp;gt;Spacefiller&amp;lt;/b&amp;gt; in april 26 if the computer is infected the virus is activated and deletes the content of ROM memory (BIOS).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Melissa&amp;lt;/b&amp;gt; it's a computer virus that comes by e-mail attaching a Microsoft Word document, when this message is opened, the virus is activated and infect the file Normal.dot, then every document created by this text editor is infected and automatically send a infected e-mail for the first 50 contact from the catalog of the Outlook Express.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Codered&amp;lt;/b&amp;gt; virus attacks the Microsoft IIS 4.0 and 5.0 modifying the main page with the message &amp;quot;Welcome to http:// www.worm.com !  Hacked By Chinese!&amp;quot; and also program the infected computer to make a denial-of-service attack to the White House website (www.whitehouse.gov).&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IDGNow]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;br /&gt;
*[http://www.rsoutlook.com/articles/virusspecialist.htm Rsoutlook]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=35316</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=35316"/>
				<updated>2008-08-04T18:52:16Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.&lt;br /&gt;
&lt;br /&gt;
In general way there is 3 main type of computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Boot Virus&amp;lt;/b&amp;gt; - They staying in the boot sector of the floppy and in the Master Boot Record (MBR) of hard discs.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Macro Virus&amp;lt;/b&amp;gt; - They are the most common and most easily created, but less harmful. The virus of macro use a macro language of the application (such as Visual Basic or VBScript) to infect and duplicate documents and models. They attack any platform, but generally are made for Microsoft Office, using the programming environment from Microsoft for self-implementing the code of macro viral. When an infected document is opened, the virus infects runs and the models of the application user and can insert words, numbers or phrases in documents or unwanted change of command functions. Once a macro virus from the infected machine of a user, it can incorporate all the documents created in the future with the application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Program Virus&amp;lt;/b&amp;gt; -&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
Some famous and dangers computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Chernobyl&amp;lt;/b&amp;gt; or &amp;lt;b&amp;gt;Spacefiller&amp;lt;/b&amp;gt; in april 26 if the computer is infected the virus is activated and deletes the content of ROM memory (BIOS).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Melissa&amp;lt;/b&amp;gt; it's a computer virus that comes by e-mail attaching a Microsoft Word document, when this message is opened, the virus is activated and infect the file Normal.dot, then every document created by this text editor is infected and automatically send a infected e-mail for the first 50 contact from the catalog of the Outlook Express.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Codered&amp;lt;/b&amp;gt; virus attacks the Microsoft IIS 4.0 and 5.0 modifying the main page with the message &amp;quot;Welcome to http:// www.worm.com !  Hacked By Chinese!&amp;quot; and also program the infected computer to make a denial-of-service attack to the White House website (www.whitehouse.gov).&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IDGNow]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;br /&gt;
*[http://www.rsoutlook.com/articles/virusspecialist.htm Rsoutlook]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34113</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34113"/>
				<updated>2008-07-15T01:26:19Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.&lt;br /&gt;
&lt;br /&gt;
In general way there is 3 main type of computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Boot Virus&amp;lt;/b&amp;gt; - They staying in the boot sector of the floppy and in the Master Boot Record (MBR) of hard discs.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Macro Virus&amp;lt;/b&amp;gt; - &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Program Virus&amp;lt;/b&amp;gt; -&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
Some famous and dangers computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Chernobyl&amp;lt;/b&amp;gt; or &amp;lt;b&amp;gt;Spacefiller&amp;lt;/b&amp;gt; in april 26 if the computer is infected the virus is activated and deletes the content of ROM memory (BIOS).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Melissa&amp;lt;/b&amp;gt; it's a computer virus that comes by e-mail attaching a Microsoft Word document, when this message is opened, the virus is activated and infect the file Normal.dot, then every document created by this text editor is infected and automatically send a infected e-mail for the first 50 contact from the catalog of the Outlook Express.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Codered&amp;lt;/b&amp;gt; virus attacks the Microsoft IIS 4.0 and 5.0 modifying the main page with the message &amp;quot;Welcome to http:// www.worm.com !  Hacked By Chinese!&amp;quot; and also program the infected computer to make a denial-of-service attack to the White House website (www.whitehouse.gov).&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IDGNow]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;br /&gt;
*[http://www.rsoutlook.com/articles/virusspecialist.htm Rsoutlook]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34110</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34110"/>
				<updated>2008-07-15T00:48:20Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Examples */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
Some famous and dangers computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Chernobyl&amp;lt;/b&amp;gt; or &amp;lt;b&amp;gt;Spacefiller&amp;lt;/b&amp;gt; in april 26 if the computer is infected the virus is activated and deletes the content of ROM memory (BIOS).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Melissa&amp;lt;/b&amp;gt; it's a computer virus that comes by e-mail attaching a Microsoft Word document, when this message is opened, the virus is activated and infect the file Normal.dot, then every document created by this text editor is infected and automatically send a infected e-mail for the first 50 contact from the catalog of the Outlook Express.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Codered&amp;lt;/b&amp;gt; virus attacks the Microsoft IIS 4.0 and 5.0 modifying the main page with the message &amp;quot;Welcome to http:// www.worm.com !  Hacked By Chinese!&amp;quot; and also program the infected computer to make a denial-of-service attack to the White House website (www.whitehouse.gov).&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IDGNow]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;br /&gt;
*[http://www.rsoutlook.com/articles/virusspecialist.htm Rsoutlook]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34109</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34109"/>
				<updated>2008-07-15T00:45:41Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
Some famous and dangers computer virus:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Chernobyl&amp;lt;/b&amp;gt; or &amp;lt;b&amp;gt;Spacefiller&amp;lt;/b&amp;gt; in april 26 the virus is activated and deletes the content of ROM memory (BIOS).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Melissa&amp;lt;/b&amp;gt; it's a computer virus that comes by e-mail attaching a Microsoft Word document, when this message is opened, the virus is activated and infect the file Normal.dot, then every document created by this text editor is infected and automatically send a infected e-mail for the first 50 contact from the catalog of the Outlook Express.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Codered&amp;lt;/b&amp;gt; virus attacks the Microsoft IIS 4.0 and 5.0 modifying the main page with the message &amp;quot;Welcome to http:// www.worm.com !  Hacked By Chinese!&amp;quot; and also program the infected computer to make a denial-of-service attack to the White House website (www.whitehouse.gov).&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IDGNow]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;br /&gt;
*[http://www.rsoutlook.com/articles/virusspecialist.htm Rsoutlook]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34108</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34108"/>
				<updated>2008-07-15T00:27:23Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Examples */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
Chernobyl or Spacefiller in april 26 the virus is activated and deletes the content of ROM memory (BIOS)&lt;br /&gt;
&lt;br /&gt;
Melissa it's a computer virus that comes by e-mail attaching a Microsoft Word document, when this message is opened, the virus is activated and infect the file Normal.dot, then every document created by this text editor is infected and automatically send a infected e-mail for the first 50 contact from the catalog of the Outlook Express.&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IDGNow]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34091</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34091"/>
				<updated>2008-07-14T18:29:27Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
The first computer virus was written in 1982 by a young student secundarista the U.S with 15 years old, called Rich Skrenta. This computer virus was identified as Elk Cloner and affecting the Apple II system and not caused major problems. This virus shows a small poem on the screen, it was able to make copy of itself when a floppy was inserted into the computer. When the media was used in another system, the process is spreading.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IDGNow]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34090</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34090"/>
				<updated>2008-07-14T18:10:16Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IDGNow]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34089</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34089"/>
				<updated>2008-07-14T18:09:32Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
*[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IdgNow.uol.com.br]&lt;br /&gt;
*[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
*[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
*[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
*[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34088</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34088"/>
				<updated>2008-07-14T18:07:49Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* References */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IdgNow.uol.com.br]&lt;br /&gt;
[http://www.gironsoft.com.br/virus.htm Gironsoft]&lt;br /&gt;
[http://pt.wikipedia.org/wiki/V%C3%ADrus_de_computador Wikipedia]&lt;br /&gt;
[http://www.infowester.com/virus.php Infowester]&lt;br /&gt;
[http://www.microsoft.com/brasil/athome/security/viruses/intro_viruses_what.mspx Microsoft]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34087</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=34087"/>
				<updated>2008-07-14T18:04:06Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[http://idgnow.uol.com.br/seguranca/2007/07/13/idgnoticia.2007-07-13.8750778632/ IdgNow.uol.com.br]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=33896</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=33896"/>
				<updated>2008-07-11T20:53:47Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. A real virus does not spread without human action, we need to send someone a file or send email to it from spreading. The virus can be disguised as attachments of image. audio and video.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=33894</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=33894"/>
				<updated>2008-07-11T20:47:46Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. The good news is that a real virus does not spread without human action. We need to send someone a file or send email to it from spreading.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=33893</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=33893"/>
				<updated>2008-07-11T20:47:17Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. The good news is that a real virus does not spread without human action. We need to send someone a file or send email to it from spreading.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=33892</id>
		<title>Computer Viruses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Computer_Viruses&amp;diff=33892"/>
				<updated>2008-07-11T20:47:00Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: New page: == Description == A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by alterin...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
A Computer Virus is a small program designed to cause some kind of damage in the infected computer, eitheir deleting data, either capturing information, either by altering the normal operation of the machine.&lt;br /&gt;
&lt;br /&gt;
Like the human virus has different levels of gravity, such as the Ebola virus and the influenza virus, the computer virus range from slightly disturbing to totally destructive. The good news is that a real virus does not spread without human action. We need to send someone a file or send email to it from spreading.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32450</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32450"/>
				<updated>2008-06-26T14:41:25Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: /* Destructive Competition */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.&lt;br /&gt;
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative, when there is improvement of their level by the manner through peaceful exchange and without violating other people.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
=== Destructive Competition ===&lt;br /&gt;
: In 2007 the McLaren Mercedes, the leading team in the Formula One championship, was fined $100 million and excluded from the constructor’s title in connection with the spying scandal that has plagued the sport all season.&lt;br /&gt;
&lt;br /&gt;
=== Cooperative Competition ===&lt;br /&gt;
: If two companies are competing for business, but exchange some information about the market, they can improve their products to increase their sales.&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Competition Wikipedia]&lt;br /&gt;
* [http://sports.espn.go.com/nfl/news/story?id=3018338 ESPN]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32449</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32449"/>
				<updated>2008-06-26T14:41:01Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.&lt;br /&gt;
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative, when there is improvement of their level by the manner through peaceful exchange and without violating other people.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
=== Destructive Competition ===&lt;br /&gt;
: '''Espionage''' - In 2007 the McLaren Mercedes, the leading team in the Formula One championship, was fined $100 million and excluded from the constructor’s title in connection with the spying scandal that has plagued the sport all season.&lt;br /&gt;
=== Cooperative Competition ===&lt;br /&gt;
: If two companies are competing for business, but exchange some information about the market, they can improve their products to increase their sales.&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Competition Wikipedia]&lt;br /&gt;
* [http://sports.espn.go.com/nfl/news/story?id=3018338 ESPN]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32202</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32202"/>
				<updated>2008-06-23T18:10:12Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.&lt;br /&gt;
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative, when there is improvement of their level by the manner through peaceful exchange and without violating other people.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Competition Wikipedia]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32201</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32201"/>
				<updated>2008-06-23T18:10:04Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.&lt;br /&gt;
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative, when there is improvement of their level by the manner through peaceful exchange and without violating other people.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Competition Wkipedia]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32199</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32199"/>
				<updated>2008-06-23T18:08:20Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.&lt;br /&gt;
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative, when there is improvement of their level by the manner through peaceful exchange and without violating other people.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32198</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32198"/>
				<updated>2008-06-23T18:05:30Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.&lt;br /&gt;
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative, where there is improvement of their level by manner through peaceful exchange and without violating other people.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32194</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32194"/>
				<updated>2008-06-23T17:57:43Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. So the competition is an incentive for self-improvement, it is necessary to overcome the expectations to win it.&lt;br /&gt;
The competition can be destructive, when the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32193</id>
		<title>Competitors</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Competitors&amp;diff=32193"/>
				<updated>2008-06-23T17:40:01Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: New page: == Description == Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for foo...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Competition is an interaction between individuals from the same species or different species (Human, animal or vegetal) who dispute something. This dispute may be for food, for territory, for light, for employment, for female, for male and so on. Therefore, the competition gives incentives for self improvement, because make you to top expectations to win the competition.&lt;br /&gt;
The competition can be destructive, where the individual/group/organism seeks to benefit by damaging/eliminating competing or cooperative&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32188</id>
		<title>Carelessness</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32188"/>
				<updated>2008-06-23T17:02:53Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Carelessness or Negligence is lack of concern about the consequences of an action. The negligence may be a foreseeable action or a unintentionally, but in the both cases a person can be held responsible for any consequences of such negligence. Only humans can be negligence and this can cause damage to an organization's business systems, facilities, or personnel.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
* A dissatisfied employee can stop to make updates in a server, leaving it vulnerable to attacks.&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
=== Conscious ===&lt;br /&gt;
: Don't apply a patch to a known critical issue.&lt;br /&gt;
=== Unintentionally ===&lt;br /&gt;
: Send a confidential e-mail to a wrong person.&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Carelessness Wikipedia]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32186</id>
		<title>Carelessness</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32186"/>
				<updated>2008-06-23T16:50:33Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Carelessness or Negligence is lack of concern about the consequences of an action. The negligence may be a foreseeable action or a unintentionally, but in the both cases a person can be held responsible for any consequences of such negligence. Only humans can be negligence and this can cause damage to an organization's business systems, facilities, or personnel.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
=== Conscious ===&lt;br /&gt;
* Don't apply a patch to a known critical issue.&lt;br /&gt;
=== Unintentionally ===&lt;br /&gt;
* Send a confidential e-mail to a wrong person.&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Carelessness Wikipedia]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32165</id>
		<title>Carelessness</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32165"/>
				<updated>2008-06-23T13:24:21Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Carelessness or Negligence is lack of concern about the consequences of an action. The negligence may be a foreseeable action or a unintentionally, but in the both cases a person can be held responsible for any consequences of such negligence. Only humans can be negligence and this can cause damage to an organization's business systems, facilities, or personnel.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
* Don't apply a patch to a known critical issue.&lt;br /&gt;
* Send a confidential e-mail to a wrong person.&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Carelessness Wikipedia]&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32164</id>
		<title>Carelessness</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32164"/>
				<updated>2008-06-23T13:23:17Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Carelessness or Negligence is lack of concern about the consequences of an action. The negligence may be a foreseeable action or a unintentionally, but in the both cases a person can be held responsible for any consequences of such negligence. Only humans can be negligence and this can cause damage to an organization's business systems, facilities, or personnel.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
* Don't apply a patch to a known critical issue.&lt;br /&gt;
* Send a confidential e-mail to a wrong person.&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32163</id>
		<title>Carelessness</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32163"/>
				<updated>2008-06-23T12:57:35Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Carelessness or Negligence is lack of concern about the consequences of an action. The negligence is foreseeable action and a person can be held responsible for any consequences of such negligence.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32151</id>
		<title>Carelessness</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32151"/>
				<updated>2008-06-22T16:47:58Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
Carelessness or Negligence is lack of concern about the consequences of an action.&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32150</id>
		<title>Carelessness</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Carelessness&amp;diff=32150"/>
				<updated>2008-06-22T16:38:32Z</updated>
		
		<summary type="html">&lt;p&gt;Infosegura: New page: == Description == TBD  == Risk Factors == TBD  == Examples == TBD  ==Related Attacks== TBD  ==Related Vulnerabilities== TBD  == References == TBD&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Risk Factors ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Examples ==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
TBD&lt;/div&gt;</summary>
		<author><name>Infosegura</name></author>	</entry>

	</feed>