The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was delete. Jo-Jo Eumerus (talk, contributions) 08:05, 18 June 2017 (UTC)[reply]

Sticky keys attack[edit]

Sticky keys attack (edit | talk | history | protect | delete | links | watch | logs | views) – (View log · Stats)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

An attempt to redirect this article to an appropriate section of an existing article that covers all relevant content was reverted. This minor exploit does not meet WP:GNG, with all coverage of the term "sticky keys attack" limited to blogs and other user-generated content. The reference in the article does not refer to the term "sticky keys attack" and the method described in the article is not the method described in the reference. Wikipedia is not a "how-to" guide to exploits. Exemplo347 (talk) 08:57, 10 June 2017 (UTC)[reply]

Note: This debate has been included in the list of Computing-related deletion discussions. Coolabahapple (talk) 11:53, 10 June 2017 (UTC)[reply]
The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.