User:KnowledgeablePersona/WatchedCategories.js
Appearance
Code that you insert on this page could contain malicious content capable of compromising your account. If you import a script from another page with "importScript", "mw.loader.load", "iusc", or "lusc", take note that this causes you to dynamically load a remote script, which could be changed by others. Editors are responsible for all edits and actions they perform, including by scripts. User scripts are not centrally supported and may malfunction or become inoperable due to software changes. A guide to help you find broken scripts is available. If you are unsure whether code you are adding to this page is safe, you can ask at the appropriate village pump. This code will be executed when previewing this page. |
![]() | Documentation for this user script can be added at User:KnowledgeablePersona/WatchedCategories. |
var WatchedCategories=new Array(
// Place categories in this list. There should be a comma in all rows
// but the last; make sure the names start with a capital letter, have
// the correct case for all other letters, and don't have Category:
// before them. This watchlist cannot be kept private (that is, other
// users will be able to tell which categories you are watching).
//
// After editing this list (either for the first time or if you change
// it later on) you will need to bypass your cache.
"Wikipedia categories",
"Esoteric programming languages",
"Internet security",
"Web security exploits",
"Cyberattacks",
"Types of cyberattacks",
"Denial-of-service attacks",
"Internet Standards",
"Domain Name System",
"Internet protocols",
"Cryptographic protocols",
"Cryptography",
"Cryptographic attacks",
"Security engineering",
"Computer security",
"Computer criminals",
"Computer network security",
"Criminals",
"People by behavior",
"People associated with crime",
"Activists by issue",
"People",
"Suspected criminals",
"Network analyzers",
"Computer security software",
"Security software",
"Utility software by type",
"People associated with computer security",
"Hackers",
"Computer security qualifications",
"Computer security exploits",
"Computer security conferences",
"Security technology",
"Applications of cryptography",
"URI schemes",
"Technology-related lists",
"Nerd culture",
"Computer arithmetic algorithms"
);