Browsing the "hacking" Tag

Developing the Rogue Pi

March 20th, 2013 | by Kalen Wessel

Developing the Rogue Pi for my final project at BCIT was a great experience. It provided me the opportunity to


Linux Key Logger

January 6th, 2013 | by Luke Queenan

As part of my covert backdoor application, I created a key logger for a Linux system written in C. The


Designing a Backdoor

November 4th, 2012 | by Luke Queenan

As any good brogrammer knows, designing before you code is usually a good idea. So today I’ll be taking you



Back to Top ↑