Developing the Rogue Pi
March 20th, 2013 | by Kalen Wessel
Developing the Rogue Pi for my final project at BCIT was a great experience. It provided me the opportunity to
March 20th, 2013 | by Kalen Wessel
Developing the Rogue Pi for my final project at BCIT was a great experience. It provided me the opportunity to
January 6th, 2013 | by Luke Queenan
As part of my covert backdoor application, I created a key logger for a Linux system written in C. The
November 4th, 2012 | by Luke Queenan
As any good brogrammer knows, designing before you code is usually a good idea. So today I’ll be taking you
October 29th, 2012 | by Luke Queenan
If you’ve ever wanted to know how to redirect people to random websites for fun, today is your lucky day.
October 29th, 2012 | by Kalen Wessel
What are CTFs? Capture The Flag competitions have started to become a growing trend in the security community. They are