New pages

From Encyclopedia of Cybersecurity
New pages
Hide registered users | Show bots | Show redirects
(newest | oldest) View ( | older 50) (20 | 50 | 100 | 250 | 500)
  • 14:45, 5 May 2024Business Email Compromise (hist | edit) ‎[4,386 bytes]Ccocrick (talk | contribs) (Created page with "== Business Email Compromise == '''Business Email Compromise''' (BEC) is a type of cyber attack in which cybercriminals use social engineering techniques to deceive employees, executives, or business partners into transferring funds, sensitive information, or executing fraudulent transactions via compromised email accounts. === Overview === Business Email Compromise attacks typically involve impersonation of trusted individuals, such as company executives, suppliers,...")
  • 14:43, 5 May 2024Business Continuity Plan (hist | edit) ‎[5,502 bytes]Ccocrick (talk | contribs) (Created page with "== Business Continuity Plan == A '''Business Continuity Plan''' (BCP) is a comprehensive strategy and set of procedures designed to ensure the continued operation of an organization's critical business functions and processes during and after disruptive events, such as natural disasters, cyber attacks, or other emergencies. === Overview === A Business Continuity Plan outlines the steps and measures that an organization will take to maintain essential operations, servi...")
  • 14:38, 5 May 2024Bug Bounty Program (hist | edit) ‎[5,287 bytes]Ccocrick (talk | contribs) (Created page with "== Bug Bounty Program == A '''Bug Bounty Program''' is a crowdsourced cybersecurity initiative that rewards individuals, often referred to as security researchers or ethical hackers, for discovering and responsibly disclosing security vulnerabilities and weaknesses in software, applications, websites, or digital assets. === Overview === Bug Bounty Programs are established by organizations, including technology companies, software developers, financial institutions, an...")
  • 14:37, 5 May 2024Brute Force Attack (hist | edit) ‎[3,489 bytes]Ccocrick (talk | contribs) (Created page with "== Brute Force Attack == A '''Brute Force Attack''' is a cybersecurity technique used to gain unauthorized access to a system, account, or encrypted data by systematically trying all possible combinations of passwords or encryption keys until the correct one is found. === Overview === In a Brute Force Attack, an attacker attempts to guess the correct password or decryption key by systematically trying all possible combinations, typically starting with the simplest or...")
  • 14:36, 5 May 2024Browser Isolation (hist | edit) ‎[3,671 bytes]Ccocrick (talk | contribs) (Created page with "== Browser Isolation == '''Browser Isolation''' is a cybersecurity approach that separates web browsing activities from the endpoint device by executing web content in a remote, isolated environment, commonly referred to as a sandbox or virtual machine. === Overview === Browser Isolation aims to mitigate the risk of web-based threats, such as malware infections, drive-by downloads, phishing attacks, and zero-day exploits, by isolating potentially malicious web content...")
  • 14:34, 5 May 2024Breach (hist | edit) ‎[4,032 bytes]Ccocrick (talk | contribs) (Created page with "== Breach == A '''Breach''' refers to the unauthorized access, disclosure, or compromise of sensitive information or systems, resulting in a security incident or violation of data protection and privacy regulations. === Overview === A breach occurs when an attacker gains unauthorized access to an organization's network, systems, or data repositories, either through exploiting vulnerabilities, social engineering tactics, or insider threats. The consequences of a breach...")
  • 14:33, 5 May 2024Botnet (hist | edit) ‎[3,970 bytes]Ccocrick (talk | contribs) (Created page with "== Botnet == A '''Botnet''' is a network of interconnected computers, servers, or Internet of Things (IoT) devices that are infected with malicious software, known as bots or zombies, and controlled remotely by a command and control (C&C) infrastructure operated by cybercriminals. === Overview === Botnets are used by cybercriminals to carry out various malicious activities, including: # '''Distributed Denial of Service (DDoS) Attacks''': Launching coordinated attacks...")
  • 14:32, 5 May 2024Blue Team (hist | edit) ‎[4,679 bytes]Ccocrick (talk | contribs) (Created page with "== Blue Team == The '''Blue Team''' refers to the group within an organization responsible for defending against cybersecurity threats, conducting incident response, and maintaining the overall security posture of the organization's systems and networks. === Overview === The Blue Team's primary objective is to protect the organization's assets, including data, networks, and infrastructure, from cyber threats and attacks. This team typically works in collaboration with...")
  • 14:30, 5 May 2024Blockchain Security (hist | edit) ‎[4,737 bytes]Ccocrick (talk | contribs) (Created page with "== Blockchain Security == '''Blockchain Security''' encompasses the measures, protocols, and techniques designed to safeguard the integrity, confidentiality, and availability of blockchain networks and their associated data, transactions, and assets. === Overview === Blockchain Security involves: # '''Consensus Mechanisms''': Implementing robust consensus algorithms, such as Proof of Work (PoW), Proof of Stake (PoS), or Practical Byzantine Fault Tolerance (PBFT), to...")
  • 14:30, 5 May 2024Blockchain Analysis (hist | edit) ‎[4,244 bytes]Ccocrick (talk | contribs) (Created page with "== Blockchain Analysis == '''Blockchain Analysis''' is the process of examining and interpreting data stored on a blockchain to gain insights into transactions, addresses, and activities related to cryptocurrencies, such as Bitcoin and Ethereum. === Overview === Blockchain Analysis involves: # '''Transaction Analysis''': Analyzing transactions recorded on the blockchain to trace the flow of cryptocurrency funds between addresses, identify patterns of behavior, and de...")
  • 14:26, 5 May 2024Block Size (hist | edit) ‎[3,115 bytes]Ccocrick (talk | contribs) (Created page with "== Block Size == '''Block Size''' refers to the fixed length of data blocks used in block ciphers and other cryptographic algorithms during encryption and decryption processes. === Overview === Block Size determines the size of the data blocks that are processed by cryptographic algorithms such as block ciphers. It defines the amount of data that is encrypted or decrypted in a single operation. === Importance === The Block Size is crucial for several reasons: # '''...")
  • 13:53, 5 May 2024Block Ciphers (hist | edit) ‎[3,496 bytes]Ccocrick (talk | contribs) (Created page with "== Block Ciphers == '''Block Ciphers''' are cryptographic algorithms that encrypt fixed-size blocks of plaintext data into ciphertext and decrypt ciphertext back into plaintext using a symmetric key. === Overview === Block Ciphers operate by dividing the input data into fixed-size blocks and applying a series of encryption or decryption transformations to each block independently. The transformation depends on the key provided, and the same key is used for both encryp...")
  • 13:52, 5 May 2024Blacklisting (hist | edit) ‎[5,048 bytes]Ccocrick (talk | contribs) (Created page with "== Blacklisting == '''Blacklisting''' is a cybersecurity measure used to block or deny access to specific entities, such as IP addresses, domain names, email addresses, or URLs, that are identified as malicious, suspicious, or unwanted based on predefined criteria. === Overview === Blacklisting involves: # '''Identification''': Identifying and monitoring entities, such as IP addresses, domain names, or email addresses, that are associated with malicious activities, s...")
  • 13:50, 5 May 2024Black Hat (hist | edit) ‎[5,108 bytes]Ccocrick (talk | contribs) (Created page with "== Black Hat == '''Black Hat''' refers to a type of hacker or cybercriminal who engages in malicious activities, exploits security vulnerabilities, and violates computer security laws and ethical standards for personal gain, financial profit, or malicious intent. === Overview === Black Hat hackers engage in various illegal or unethical activities, including: # '''Malware Development''': Creating and distributing malicious software, such as viruses, worms, Trojans, ra...")
  • 13:44, 5 May 2024Biometric Security (hist | edit) ‎[4,789 bytes]Ccocrick (talk | contribs) (Created page with "== Biometric Security == '''Biometric Security''' refers to the use of unique biological characteristics, such as fingerprints, iris patterns, facial features, voice patterns, or hand geometry, to authenticate and verify the identity of individuals. It employs biometric technology to provide secure access control to physical spaces, digital devices, and sensitive information. Biometric security systems are widely used in various domains, including law enforcement, border...")
  • 13:43, 5 May 2024Biometric Authentication (hist | edit) ‎[4,331 bytes]Ccocrick (talk | contribs) (Created page with "'''Biometric Authentication''' is a security process that relies on the unique biological characteristics of individuals to verify their identity. It uses physical or behavioral traits, such as fingerprints, iris patterns, facial features, voice patterns, or hand geometry, to authenticate users. Biometric authentication is often employed in access control systems, mobile devices, and computer security systems as a more secure and reliable alternative to traditional authe...")
  • 13:41, 5 May 2024Attack Vector (hist | edit) ‎[4,467 bytes]Ccocrick (talk | contribs) (Created page with "== Attack Vector == An '''Attack Vector''' refers to the pathway or means by which an attacker gains unauthorized access to a system, network, or application in order to compromise its security or exploit vulnerabilities. === Overview === Attack Vectors can be categorized into several types: # '''Network-Based Attack Vectors''': Exploiting vulnerabilities or weaknesses in network protocols, services, or infrastructure components to gain unauthorized access or control...")
  • 13:39, 5 May 2024Attack Surface Analysis (hist | edit) ‎[5,786 bytes]Ccocrick (talk | contribs) (Created page with "== Attack Surface Analysis == '''Attack Surface Analysis''' is a cybersecurity process used to identify, evaluate, and reduce the potential entry points and exposure points within a system, network, or application that could be exploited by attackers. === Overview === Attack Surface Analysis involves: # '''Asset Identification''': Identifying and cataloging the assets, resources, and components comprising the organization's attack surface, including hardware devices,...")
  • 13:36, 5 May 2024Attack Path Mapping (hist | edit) ‎[5,446 bytes]Ccocrick (talk | contribs) (Created page with "== Attack Path Mapping == '''Attack Path Mapping''' is a cybersecurity technique used to identify and visualize the possible paths an attacker may take to compromise a system, network, or organization. === Overview === Attack Path Mapping involves: # '''Asset Identification''': Identifying critical assets, resources, and components within the system or network that are potential targets for attackers, including servers, databases, applications, and sensitive data. #...")
  • 13:34, 5 May 2024Asymmetric Algorithm (hist | edit) ‎[5,006 bytes]Ccocrick (talk | contribs) (Created page with "== Asymmetric Algorithm == An '''Asymmetric Algorithm''' is a cryptographic algorithm that uses a pair of keys, namely a public key and a private key, for encryption and decryption operations. === Overview === Asymmetric Algorithms operate as follows: # '''Key Generation''': Generating a pair of mathematically related keys, consisting of a public key and a corresponding private key, using complex mathematical functions and algorithms. # '''Public Key Distribution''':...")
  • 13:33, 5 May 2024Application Security (hist | edit) ‎[4,646 bytes]Ccocrick (talk | contribs) (Created page with "== Application Security == '''Application Security''' refers to the measures and practices implemented to protect software applications from security threats, vulnerabilities, and attacks throughout the software development lifecycle (SDLC). === Overview === Application Security involves: # '''Secure Development Practices''': Incorporating security considerations, best practices, and coding standards into the software development process to prevent security vulnerabi...")
  • 13:31, 5 May 2024Application Delivery Controllers (hist | edit) ‎[5,918 bytes]Ccocrick (talk | contribs) (Created page with "== Application Delivery Controllers == '''Application Delivery Controllers''' ('''ADCs''') are networking devices or software solutions designed to optimize the delivery, availability, and security of applications across data centers, cloud environments, and distributed networks. === Overview === Application Delivery Controllers perform the following functions: # '''Load Balancing''': Distributing client requests or traffic evenly across multiple servers, virtual mac...")
  • 13:30, 5 May 2024API Security (hist | edit) ‎[4,583 bytes]Ccocrick (talk | contribs) (Created page with "== API Security == '''API Security''' refers to the measures and practices implemented to protect application programming interfaces (APIs) from unauthorized access, data breaches, and malicious attacks. === Overview === API Security involves: # '''Authentication''': Verifying the identity of API clients, users, or applications requesting access to APIs through authentication mechanisms such as API keys, OAuth tokens, JWT (JSON Web Tokens), or client certificates. #...")
  • 13:29, 5 May 2024Antivirus Software (hist | edit) ‎[4,764 bytes]Ccocrick (talk | contribs) (Created page with "== Antivirus Software == '''Antivirus Software''' is a type of software designed to detect, prevent, and remove malicious software (malware) from computer systems, networks, and devices. === Overview === Antivirus Software performs the following functions: # '''Malware Detection''': Scanning files, programs, memory, and system processes for known patterns or signatures of malware, such as viruses, worms, Trojans, ransomware, spyware, and adware. # '''Real-Time Protec...")
  • 13:26, 5 May 2024Anomaly Detection (hist | edit) ‎[3,964 bytes]Ccocrick (talk | contribs) (Created page with "== Anomaly Detection == '''Anomaly Detection''' is a technique used in data analysis and machine learning to identify patterns, behaviors, or events that deviate from the norm or expected behavior within a dataset. === Overview === Anomaly Detection involves: # '''Data Collection''': Collecting and aggregating data from various sources, such as sensors, logs, or transaction records, to create a dataset for analysis. # '''Pattern Identification''': Analyzing the datas...")
  • 13:25, 5 May 2024Algorithm-Specific Generation (hist | edit) ‎[4,244 bytes]Ccocrick (talk | contribs) (Created page with "== Algorithm-Specific Generation == '''Algorithm-Specific Generation''' refers to the process of generating cryptographic keys or parameters using algorithms specifically designed or tailored for a particular cryptographic scheme or protocol. === Overview === Algorithm-Specific Generation involves: # '''Selection''': Choosing a cryptographic algorithm or method suitable for generating keys or parameters based on the requirements, security considerations, and constrai...")
  • 13:24, 5 May 2024Adware (hist | edit) ‎[4,018 bytes]Ccocrick (talk | contribs) (Created page with "== Adware == '''Adware''' is a type of software that automatically displays or downloads advertisements on a user's computer or device, often without their consent, with the primary purpose of generating revenue for the software developer or advertiser. === Overview === Adware typically operates by: # '''Displaying Advertisements''': Injecting or displaying advertisements in various forms, such as pop-up ads, banners, sponsored links, or video ads, within web browser...")
  • 13:21, 5 May 2024Advanced Threat Protection (hist | edit) ‎[4,145 bytes]Ccocrick (talk | contribs) (Created page with "== Advanced Threat Protection == '''Advanced Threat Protection''' ('''ATP''') refers to a set of security technologies and solutions designed to detect, prevent, and mitigate sophisticated cyber threats and attacks that evade traditional security defenses. === Overview === Advanced Threat Protection encompasses various security capabilities and techniques, including: # '''Behavioral Analysis''': Analyzing the behavior of users, applications, and network traffic to id...")
  • 13:20, 5 May 2024Advanced Persistent Threat (hist | edit) ‎[4,246 bytes]Ccocrick (talk | contribs) (Created page with "== Advanced Persistent Threat == An '''Advanced Persistent Threat''' ('''APT''') is a sophisticated and stealthy cyberattack strategy carried out by highly skilled and organized threat actors with the objective of infiltrating and maintaining unauthorized access to targeted systems or networks over an extended period. === Overview === Advanced Persistent Threats typically involve: # '''Surreptitious Access''': Gaining initial access to the target environment through...")
  • 13:19, 5 May 2024Advanced Encryption Standard (hist | edit) ‎[3,303 bytes]Ccocrick (talk | contribs) (Created page with "== Advanced Encryption Standard == The '''Advanced Encryption Standard''' ('''AES''') is a symmetric encryption algorithm used to secure sensitive data and communications by encrypting and decrypting information. AES is widely adopted and considered one of the most secure encryption standards available. === Overview === AES operates on blocks of data, with each block typically consisting of 128 bits. It uses a symmetric key cipher, meaning the same key is used for bot...")
  • 13:18, 5 May 2024Administrative Metadata (hist | edit) ‎[3,779 bytes]Ccocrick (talk | contribs) (Created page with "== Administrative Metadata == '''Administrative Metadata''' refers to descriptive information that provides details about the management, administration, and maintenance of digital assets, resources, or records within an information system or repository. === Overview === Administrative Metadata serves various administrative purposes, including: # '''Management''': Facilitating the organization, categorization, and classification of digital resources to support effici...")
  • 13:16, 5 May 2024Account Takeover (hist | edit) ‎[3,727 bytes]Ccocrick (talk | contribs) (Created page with "== Account Takeover == '''Account Takeover''' (ATO) is a type of cyberattack where an unauthorized individual gains access to a user's online account, such as an email, social media, banking, or e-commerce account, and assumes control over it without the owner's consent. === Overview === Account Takeover typically involves: # '''Credential Theft''': Obtaining the user's login credentials, such as usernames and passwords, through various means, including phishing atta...")
  • 13:15, 5 May 2024Access Token (hist | edit) ‎[3,700 bytes]Ccocrick (talk | contribs) (Created page with "== Access Token == An '''Access Token''' is a unique string of characters or credentials that are used to authenticate and authorize a user or application to access specific resources or perform certain actions within a system or service. === Overview === Access Tokens are commonly used in authentication and authorization protocols, such as OAuth and OpenID Connect, to grant permissions and access rights to users or applications without revealing their actual credenti...")
  • 05:29, 5 May 2024Doxing (hist | edit) ‎[4,042 bytes]Ccocrick (talk | contribs) (Created page with "== Doxing == '''Doxing''' (alternatively spelled as '''doxxing''') is the act of researching, gathering, and publishing personal or private information about an individual on the internet without their consent, often with malicious intent. === Overview === Doxing typically involves: # '''Research''': Conducting online searches and investigations to uncover personal information about the victim, including their full name, home address, phone number, email address, soc...")
  • 05:28, 5 May 2024Geo-Stalking (hist | edit) ‎[3,068 bytes]Ccocrick (talk | contribs) (Created page with "== Geo-Stalking == '''Geo-Stalking''' is a form of harassment or surveillance that utilizes location-based services or GPS technology to monitor and track an individual's physical whereabouts and movements, often without their knowledge or consent. === Overview === Geo-Stalking typically involves: # '''Location Tracking''': Monitoring an individual's real-time location using GPS-enabled devices, such as smartphones, tablets, or GPS trackers. # '''Digital Surveillance...")
  • 05:27, 5 May 2024Cyberstalking (hist | edit) ‎[3,207 bytes]Ccocrick (talk | contribs) (Created page with "== Cyberstalking == '''Cyberstalking''' is a form of harassment or intimidation that occurs online or through digital communication channels. It involves the persistent and unwanted pursuit or monitoring of an individual, often with malicious intent, using technology such as the internet, social media, email, or messaging apps. === Overview === Cyberstalking behaviors may include: # '''Persistent Communication''': Sending repeated, unsolicited messages, emails, or co...")
  • 05:26, 5 May 2024Cyberbullying (hist | edit) ‎[2,769 bytes]Ccocrick (talk | contribs) (Created page with "== Cyberbullying == '''Cyberbullying''' is a form of harassment, intimidation, or abuse that takes place online or through digital communication platforms. It involves the use of technology, such as social media, instant messaging, or email, to target individuals or groups with harmful or offensive behavior. === Overview === Cyberbullying can take various forms, including: # '''Harassment''': Sending threatening or abusive messages, comments, or emails to intimidate...")
  • 05:11, 5 May 2024Discretionary Access Control (hist | edit) ‎[2,942 bytes]Ccocrick (talk | contribs) (Created page with "== Discretionary Access Control == '''Discretionary Access Control''' ('''DAC''') is a type of access control mechanism used in computer systems to manage and enforce permissions for accessing resources. In DAC, resource owners have discretion over who they grant or deny access to their resources based on their own judgment or policies. === Overview === In Discretionary Access Control, access permissions are determined and managed by the owner of the resource. Owners...")
  • 05:10, 5 May 2024Mandatory Access Control List (hist | edit) ‎[3,195 bytes]Ccocrick (talk | contribs) (Created page with "== Mandatory Access Control List == '''Mandatory Access Control List''' ('''MAC''') are a type of access control mechanism used in computer systems to manage and enforce permissions for accessing resources. Unlike Discretionary Access Control (DAC), where resource owners have discretion over access permissions, MAC enforces access policies based on centrally defined rules or labels. === Overview === In Mandatory Access Control List, access permissions are centrally ma...")
  • 05:08, 5 May 2024Discretionary Access Control List (hist | edit) ‎[2,954 bytes]Ccocrick (talk | contribs) (Created page with "== Discretionary Access Control List == '''Discretionary Access Control List''' ('''DAC''') are a type of access control mechanism used in computer systems to manage and enforce permissions for accessing resources. DAC allows the owner of a resource to control who can access it and what actions they can perform on it. === Overview === In Discretionary Access Control List, access permissions are determined and managed by the owner of the resource. Owners have discretio...")
  • 05:07, 5 May 2024Access control list (hist | edit) ‎[2,666 bytes]Ccocrick (talk | contribs) (Created page with "== Access Control List == An '''Access Control List''' ('''ACL''') is a security mechanism used in computer systems and networks to manage and enforce permissions for accessing resources. It is a list of rules or entries that specifies which users, groups, or entities are granted or denied access to specific resources, such as files, folders, devices, or network services. === Overview === Access Control Lists provide granular control over resource access by defining w...")
  • 05:04, 5 May 2024Access Control (hist | edit) ‎[3,355 bytes]Ccocrick (talk | contribs) (Created page with "== Access Control == '''Access control''' is a security measure used to regulate and restrict access to resources, systems, or information based on predefined rules or policies. It is a fundamental component of cybersecurity and helps protect sensitive data, prevent unauthorized activities, and ensure compliance with security requirements. === Overview === Access control mechanisms are implemented to manage who can access what resources and under what conditions. Thes...")
  • 05:02, 5 May 2024Bitcoin (hist | edit) ‎[3,249 bytes]Ccocrick (talk | contribs) (Created page with "== Bitcoin == '''Bitcoin''' is a decentralized digital currency, often referred to as a cryptocurrency, that was invented in 2008 by an unknown person or group of people using the pseudonym Satoshi Nakamoto. It was released as open-source software in 2009, and since then, it has become the first and most well-known cryptocurrency in the world. === Overview === Bitcoin operates on a peer-to-peer network without the need for a central authority or intermediary, such...")
  • 05:00, 5 May 2024Cybersecurity (hist | edit) ‎[3,849 bytes]Ccocrick (talk | contribs) (Created page with "== Cybersecurity == '''Cybersecurity''' refers to the practice of protecting computer systems, networks, and data from unauthorized access, cyber threats, and attacks. It encompasses a range of technologies, processes, and practices designed to safeguard digital assets and ensure the confidentiality, integrity, and availability of information in cyberspace. === Importance === Cybersecurity is essential in today's interconnected world, where organizations and individua...")
  • 04:59, 5 May 2024Cybercrime (hist | edit) ‎[2,828 bytes]Ccocrick (talk | contribs) (Created page with "== Cybercrime == '''Cybercrime''' refers to criminal activities carried out using computers, networks, or digital devices, often with the intent to cause harm, steal information, or generate profit illegally. It encompasses a wide range of illicit activities conducted in cyberspace, including hacking, fraud, identity theft, malware distribution, and online harassment. === Types of Cybercrime === Cybercrime can take various forms, including: # '''Hacking''': Unauthori...")
  • 04:54, 5 May 2024Malware (hist | edit) ‎[2,484 bytes]Ccocrick (talk | contribs) (Created page with "== Malware == '''Malware''' is a broad term used to describe malicious software designed to infiltrate or damage a computer system, network, or device without the user's consent. It encompasses a wide range of harmful programs created by cybercriminals with various objectives, including stealing sensitive information, compromising system integrity, or disrupting normal operations. === Types of Malware === Malware can take many forms, including: # '''Viruses''': Self-...")
  • 04:53, 5 May 2024Ransomware (hist | edit) ‎[2,488 bytes]Ccocrick (talk | contribs) (Created page with "== Ransomware == '''Ransomware''' is a type of malware that encrypts files or locks users out of their devices, typically with the intention of extorting money from the victim in exchange for restoring access. It is a form of cyber extortion that has become increasingly prevalent in recent years, posing a significant threat to individuals, businesses, and organizations worldwide. === Operation === Ransomware attacks typically follow these steps: # '''Infectio...")
  • 04:51, 5 May 2024Phishing (hist | edit) ‎[2,343 bytes]Ccocrick (talk | contribs) (Created page with "== Phishing == '''Phishing''' is a form of cybercrime in which attackers attempt to deceive individuals into disclosing sensitive information, such as usernames, passwords, credit card numbers, or other personal information, by impersonating a trustworthy entity. Phishing attacks commonly take the form of deceptive emails, instant messages, or websites that appear to be from legitimate sources, such as banks, social media platforms, or government agencies. === Oper...") Tag: Visual edit: Switched
  • 04:21, 5 May 2024BitPaymer Ransomware (hist | edit) ‎[2,398 bytes]Ccocrick (talk | contribs) (Initial Submit) Tag: Visual edit
(newest | oldest) View ( | older 50) (20 | 50 | 100 | 250 | 500)