1
edit
Changes
no edit summary
</tr> <tr> <td>Cisco Router Hacking</td> <td>Cho Long Chor</td>
<td>[http://scs.senecac.on.ca/~anthony.austin/secproj/Cisco-router-hacking.docx]Document</a></td>
</tr><tr><td> Ipad2&3 hacking</td><td> Celeste So'brien Beatty</td><td>[http://scs.senecac.on.ca/~anthony.austin/secproj/Ipad2hacks.docx]Document </tr><tr><td>Perl Wifi Hacking</td><td>Calum Picken</td><td>[http://scs.senecac.on.ca/~aaustin/secproj/Perl-wif-hacking.pl] Code</td></tr><tr><td>Cell Phone monitoring</td><td>Yaser Sayed</td><td>[http://scsc.senecac.on.ca/~aaustin/secproj/cellphonemonitoring.docx]Document</td></tr><tr><td>SAP Vulnerabililties</td><td>Matthew Tuori</td><td>[http://scs.senecac.on.ca/~aaustin/secproj/SAP.rtf]</td></tr></table>