Adobe Acrobat (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Adobe Acrobat" in English language version.

refsWebsite
Global rank English rank
1,631st place
1,239th place
1st place
1st place
3rd place
3rd place
5th place
5th place
1,228th place
1,005th place
3,696th place
2,428th place
153rd place
151st place
67th place
64th place
466th place
349th place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
low place
4,423rd place
2,925th place
low place
low place
786th place
558th place
14th place
14th place
5,390th place
3,454th place
low place
low place
low place
low place

adobe.com (Global: 1,631st place; English: 1,239th place)

adobe.com

helpx.adobe.com

get.adobe.com

blog.adobe.com

  • Lamkin, Bryan. "Evolution of the Digital Document: Celebrating Adobe Acrobat's 25th Anniversary". Adobe Blog. Retrieved 2025-05-30.

apple.com (Global: 67th place; English: 64th place)

apps.apple.com

archive.today (Global: 14th place; English: 14th place)

  • Naraine, Ryan (15 September 2006). "Hacker Discovers Adobe PDF Back Doors". eWeek. Ziff Davis Enterprise Holdings Inc. Archived from the original on January 8, 2013. Retrieved 5 August 2011. David Kierznowski, a penetration testing expert specializing in Web application testing, has released proof-of-concept code and rigged PDF files to demonstrate how the Adobe Reader program could be used to initiate attacks without any user action.

books.google.com (Global: 3rd place; English: 3rd place)

cert.org (Global: low place; English: low place)

kb.cert.org

engadget.com (Global: 466th place; English: 349th place)

eweek.com (Global: 5,390th place; English: 3,454th place)

  • Naraine, Ryan (15 September 2006). "Hacker Discovers Adobe PDF Back Doors". eWeek. Ziff Davis Enterprise Holdings Inc. Archived from the original on January 8, 2013. Retrieved 5 August 2011. David Kierznowski, a penetration testing expert specializing in Web application testing, has released proof-of-concept code and rigged PDF files to demonstrate how the Adobe Reader program could be used to initiate attacks without any user action.

file.net (Global: low place; English: low place)

fileinfo.com (Global: low place; English: low place)

infotoday.com (Global: low place; English: low place)

infoworld.com (Global: 3,696th place; English: 2,428th place)

locklizard.com (Global: low place; English: low place)

lwn.net (Global: 4,423rd place; English: 2,925th place)

mcafee.com (Global: low place; English: low place)

microsoft.com (Global: 153rd place; English: 151st place)

apps.microsoft.com

microsoft.com

play.google.com (Global: 1,228th place; English: 1,005th place)

techwalla.com (Global: low place; English: low place)

us-cert.gov (Global: low place; English: low place)

web.archive.org (Global: 1st place; English: 1st place)

winsoft-international.com (Global: low place; English: low place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org

zdnet.com (Global: 786th place; English: 558th place)