Archive for May, 2012

Malicious VM to Host Attacks

In The Hacker Games, a hostile VM is used as the target. It employs a few counterattacks among the included CTF-style challenges, so if you don’t want any spoilers, don’t keep reading!

No Comments