System reconfiguration attacks
It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it. This message has remained in place for seven days, so the article may be deleted without further notice. Find sources: "System reconfiguration attacks" – news · newspapers · books · scholar · JSTOR Nominator: Please consider notifying the author/project: {{subst:proposed deletion notify|System reconfiguration attacks|concern=WP:NOTNEO}} ~~~~ Timestamp: 20110624021949 02:19, 24 June 2011 (UTC) Administrators: delete |
System Reconfiguration Attacks modify settings on a user’s PC for malicious purposes. For example: URLs in a favorites file might be modified to direct users to look alike websites. For example: a bank website URL may be changed from “bankofabc.com”to “bancofabc.com”.