Difference between revisions of "User:Anthony austin"

From CDOT Wiki
Jump to: navigation, search
(Created page with 'Open Source Security Tools developed by CTY students in SEC 701 and 703. Projecys developed by student, under my supervision'' <table class="standard-table"> <tr> <th>Topic<…')
 
 
(6 intermediate revisions by the same user not shown)
Line 1: Line 1:
Open Source Security Tools developed by CTY students in SEC 701 and 703. Projecys developed by student, under my supervision''
+
Open Source Security Tools developed by CTY students in SEC 701 and 703. Projects developed by student, under my supervision''
  
<table class="standard-table">  <tr>    <th>Topic</th>    <th>Lead</th>
+
<table class="standard-table" border="1">  <tr>    <th>Topic</th>    <th>Lead</th>
 
<th>Documentation</th>
 
<th>Documentation</th>
  
  </tr>  <tr>    <td>cell 1</td>    <td>cell 2</td>
+
  </tr>  <tr>    <td>Cisco Router Hacking</td>    <td>Cho Long Chor</td>
<td></td>
+
<td>[http://scs.senecac.on.ca/~anthony.austin/secproj/Cisco-router-hacking.docx]Document</a></td>
  </tr> </table>
+
  </tr><tr><td> Ipad2&3 hacking</td><td> Celeste So'brien Beatty</td><td>[http://scs.senecac.on.ca/~anthony.austin/secproj/Ipad2hacks.docx]Document </tr><tr><td>Perl Wifi Hacking</td><td>Calum Picken</td><td>[http://scs.senecac.on.ca/~aaustin/secproj/Perl-wif-hacking.pl] Code</td></tr><tr><td>Cell Phone monitoring</td><td>Yaser Sayed</td><td>[http://scsc.senecac.on.ca/~aaustin/secproj/cellphonemonitoring.docx]Document</td></tr><tr><td>SAP Vulnerabililties</td><td>Matthew Tuori</td><td>[http://scs.senecac.on.ca/~aaustin/secproj/SAP.rtf] Document</td></tr></table>

Latest revision as of 08:56, 18 September 2012

Open Source Security Tools developed by CTY students in SEC 701 and 703. Projects developed by student, under my supervision

Topic Lead Documentation
Cisco Router Hacking Cho Long Chor [1]Document</a>
Ipad2&3 hacking Celeste So'brien Beatty[2]Document
Perl Wifi HackingCalum Picken[3] Code
Cell Phone monitoringYaser Sayed[4]Document
SAP VulnerabililtiesMatthew Tuori[5] Document