Knowledge

:Articles for deletion/Security Essentials 2010 - Knowledge

Source 📝

162: 156: 123: 290: 96: 91: 100: 83: 243: 177: 144: 59: 17: 198: 138: 305: 281: 251: 228: 210: 65: 134: 87: 319: 36: 184: 318:
Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a
264:? BTW, I didn't create this an intentional fork of Ms Security Essentials, but rather from perspective of the 247: 79: 71: 35:
Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a
261: 274: 224: 206: 220: 150: 239: 170: 301: 202: 29:
The following discussion is an archived debate of the proposed deletion of the article below.
49: 297: 117: 194: 236:
so the contents go but a "security essentials 2010" remains in the category
265: 312:
The above discussion is preserved as an archive of the debate.
260:- so why is the axe out for this article, and not all of 268:
rootkit, of which this malware is a notable installer.
113: 109: 105: 199:
Microsoft Security Essentials#Rogue antivirus software
169: 39:). No further edits should be made to this page. 322:). No further edits should be made to this page. 291:list of Software-related deletion discussions 183: 8: 289:Note: This debate has been included in the 288: 7: 193:This article fails to comply with 24: 18:Knowledge:Articles for deletion 195:Knowledge notability guideline 1: 339: 306:21:51, 27 April 2011 (UTC) 252:16:42, 26 April 2011 (UTC) 229:12:32, 26 April 2011 (UTC) 211:11:17, 26 April 2011 (UTC) 315:Please do not modify it. 80:Security Essentials 2010 72:Security Essentials 2010 32:Please do not modify it. 282:11:02, 3 May 2011 (UTC) 66:04:30, 5 May 2011 (UTC) 61:Operation Big Bear 44:The result was 308: 294: 242:comment added by 197:and is a fork of 330: 317: 295: 280: 277: 254: 188: 187: 173: 121: 103: 62: 56: 34: 338: 337: 333: 332: 331: 329: 328: 327: 326: 320:deletion review 313: 275: 269: 237: 130: 94: 78: 75: 64: 60: 50: 37:deletion review 30: 22: 21: 20: 12: 11: 5: 336: 334: 325: 324: 309: 285: 284: 255: 244:80.191.138.163 231: 191: 190: 127: 74: 69: 58: 42: 41: 25: 23: 15: 14: 13: 10: 9: 6: 4: 3: 2: 335: 323: 321: 316: 310: 307: 303: 299: 292: 287: 286: 283: 278: 272: 267: 263: 259: 256: 253: 249: 245: 241: 235: 232: 230: 226: 222: 218: 215: 214: 213: 212: 208: 204: 203:Fleet Command 200: 196: 186: 182: 179: 176: 172: 168: 164: 161: 158: 155: 152: 149: 146: 143: 140: 136: 133: 132:Find sources: 128: 125: 119: 115: 111: 107: 102: 98: 93: 89: 85: 81: 77: 76: 73: 70: 68: 67: 63: 57: 55: 54: 47: 40: 38: 33: 27: 26: 19: 314: 311: 271:Socrates2008 270: 257: 233: 221:Johnclean184 216: 192: 180: 174: 166: 159: 153: 147: 141: 131: 52: 51: 45: 43: 31: 28: 238:—Preceding 157:free images 298:• Gene93k 53:Wizardman 240:unsigned 234:redirect 124:View log 266:Alureon 258:Comment 163:WP refs 151:scholar 97:protect 92:history 217:Delete 135:Google 101:delete 46:delete 262:these 219:Fork 178:JSTOR 139:books 118:views 110:watch 106:links 16:< 302:talk 276:Talk 248:talk 225:talk 207:talk 171:FENS 145:news 114:logs 88:talk 84:edit 296:-- 185:TWL 122:– ( 304:) 293:. 250:) 227:) 209:) 201:. 165:) 116:| 112:| 108:| 104:| 99:| 95:| 90:| 86:| 48:. 300:( 279:) 273:( 246:( 223:( 205:( 189:) 181:· 175:· 167:· 160:· 154:· 148:· 142:· 137:( 129:( 126:) 120:) 82:(

Index

Knowledge:Articles for deletion
deletion review
Wizardman
Operation Big Bear
04:30, 5 May 2011 (UTC)
Security Essentials 2010
Security Essentials 2010
edit
talk
history
protect
delete
links
watch
logs
views
View log
Google
books
news
scholar
free images
WP refs
FENS
JSTOR
TWL
Knowledge notability guideline
Microsoft Security Essentials#Rogue antivirus software
Fleet Command
talk

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.