Tagged Questions
80
votes
10answers
19k views
Is Ken Thompson's compiler hack still a threat?
Ken Thompson Hack (1984)
Ken Thompson outlined a method for corrupting a compiler binary (and other compiled software, like a login script on a *nix system) in 1984. I was curious to know if modern ...
3
votes
1answer
134 views
Is this possible to re-duplicate the hardware signal on Linux?
Since that every things is a file on the UNIX system. If I have a hardware, for example, a mouse, move from left corner to right corner, it should produce some kinds of file to communicate with the ...
1
vote
1answer
427 views
Belkin device runs Linux, how can I create my own custom firmware for it?
The Belkin N300 F9K1002 firmware is located here. It does not appear to be encrypted. How can I upload my own custom Linux firmware to this device. How would I go about hacking it?