diablohorn.com
Abuse legitimate code for backdoor purposes
So once in a while you hear about some backdoor which was slipped into some source code. Mostly in C applications…so I was thinking how would this be done in Java? Most of the times the backd…