<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by T-Jay Bautista on Medium]]></title>
        <description><![CDATA[Stories by T-Jay Bautista on Medium]]></description>
        <link>https://medium.com/@hakistatv?source=rss-88e91328939a------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*7QlLmRgz7pa7A6mk3DCYXw.png</url>
            <title>Stories by T-Jay Bautista on Medium</title>
            <link>https://medium.com/@hakistatv?source=rss-88e91328939a------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Wed, 06 May 2026 16:47:09 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@hakistatv/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Revitalizing the Proxmark3 Easy: Overcoming Portability Challenges in RFID Hacking]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/revitalizing-the-proxmark3-easy-overcoming-portability-challenges-in-rfid-hacking-1f354be29b82?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/600/1*YPcsLX_3lLCHM1k3dNHZeQ.png" width="600"></a></p><p class="medium-feed-snippet">Penetration testing tools often fall in and out of favor as newer, more integrated devices hit the market. One such veteran tool is the&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/revitalizing-the-proxmark3-easy-overcoming-portability-challenges-in-rfid-hacking-1f354be29b82?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/revitalizing-the-proxmark3-easy-overcoming-portability-challenges-in-rfid-hacking-1f354be29b82?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/1f354be29b82</guid>
            <category><![CDATA[rfid]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[hacker]]></category>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[hacking]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Thu, 29 Jan 2026 11:26:02 GMT</pubDate>
            <atom:updated>2026-01-29T11:26:02.277Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Hacking 3 cars in 10 seconds]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/hacking-3-cars-in-10-seconds-278fceddf81a?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/1024/1*ZLGM4yz1FKo25RzZ_Ty_BA.png" width="1024"></a></p><p class="medium-feed-snippet">A recent video by Hakista TV, titled &#x201C;Hacking 3 cars in 10 seconds,&#x201D; provides a compelling&#x200A;&#x2014;&#x200A;and sobering&#x200A;&#x2014;&#x200A;demonstration of how modern&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/hacking-3-cars-in-10-seconds-278fceddf81a?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/hacking-3-cars-in-10-seconds-278fceddf81a?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/278fceddf81a</guid>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[cars]]></category>
            <category><![CDATA[hacker]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Thu, 22 Jan 2026 11:16:02 GMT</pubDate>
            <atom:updated>2026-01-22T11:16:02.170Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Signal Jamming: The hack that is illegal in most countries]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/signal-jamming-the-hack-that-is-illegal-in-most-countries-b132a1194e12?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/1024/1*4kygE4C0ewtyzOBDpKfWfQ.jpeg" width="1024"></a></p><p class="medium-feed-snippet">In the rapidly evolving landscape of wireless technology, the security of our everyday devices&#x200A;&#x2014;&#x200A;from smart doorbells to cellular networks&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/signal-jamming-the-hack-that-is-illegal-in-most-countries-b132a1194e12?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/signal-jamming-the-hack-that-is-illegal-in-most-countries-b132a1194e12?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/b132a1194e12</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[radio]]></category>
            <category><![CDATA[hacker]]></category>
            <category><![CDATA[hardware]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Thu, 15 Jan 2026 11:02:56 GMT</pubDate>
            <atom:updated>2026-01-15T11:02:56.510Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Exploring the Best Flipper Zero Alternatives for Hardware Security]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/exploring-the-best-flipper-zero-alternatives-for-hardware-security-73fbf7e6085b?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/1024/1*4klkguM58vQ6r40CSZmLNg.jpeg" width="1024"></a></p><p class="medium-feed-snippet">While the Flipper Zero has become the &#x201C;Swiss Army Knife&#x201D; of the hardware hacking world, its popularity often leads to stock shortages or&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/exploring-the-best-flipper-zero-alternatives-for-hardware-security-73fbf7e6085b?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/exploring-the-best-flipper-zero-alternatives-for-hardware-security-73fbf7e6085b?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/73fbf7e6085b</guid>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[flipper-zero]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[hacker]]></category>
            <category><![CDATA[hacking]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Thu, 08 Jan 2026 06:12:20 GMT</pubDate>
            <atom:updated>2026-01-08T09:57:28.969Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[The truth about Kali Nethunter (The Good, The Bad, The Ugly)]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/the-truth-about-kali-nethunter-the-good-the-bad-the-ugly-715f85a08aa0?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/2181/1*1HzflIOtHxJUGmbrJTfF_A.png" width="2181"></a></p><p class="medium-feed-snippet">While you may have witnessed the broad capabilities of Kali Nethunter, this discussion focuses solely on the standard version, not&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/the-truth-about-kali-nethunter-the-good-the-bad-the-ugly-715f85a08aa0?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/the-truth-about-kali-nethunter-the-good-the-bad-the-ugly-715f85a08aa0?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/715f85a08aa0</guid>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[hacking-tools]]></category>
            <category><![CDATA[kali-linux]]></category>
            <category><![CDATA[penetration-testing]]></category>
            <category><![CDATA[kali-nethunter]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Sat, 12 Apr 2025 04:02:36 GMT</pubDate>
            <atom:updated>2025-04-12T04:02:36.047Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Use your phone as a BadUSB! Kali Nethunter w/ Rucky Android App]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/use-your-phone-as-a-badusb-kali-nethunter-w-rucky-android-app-4ad09edaabe4?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/670/1*3An5rXOBO5i28dmkTTEpRg.jpeg" width="670"></a></p><p class="medium-feed-snippet">Imagine the power of a USB Rubber Ducky, capable of injecting keystrokes at lightning speed, now unleashed on your Android device.</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/use-your-phone-as-a-badusb-kali-nethunter-w-rucky-android-app-4ad09edaabe4?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/use-your-phone-as-a-badusb-kali-nethunter-w-rucky-android-app-4ad09edaabe4?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/4ad09edaabe4</guid>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[kali-linux]]></category>
            <category><![CDATA[hacking]]></category>
            <category><![CDATA[security]]></category>
            <category><![CDATA[hacker]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Sat, 22 Mar 2025 05:33:33 GMT</pubDate>
            <atom:updated>2025-03-22T05:33:33.592Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Hack Wifi with just a phone? Kali Nethunter + Hijacker]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/hack-wifi-with-just-a-phone-kali-nethunter-hijacker-c14b74e9d74b?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/2600/1*apACJ5cs6Z2qqcjyOj00Lg.jpeg" width="6240"></a></p><p class="medium-feed-snippet">Kali NetHunter transforms Android devices into potent penetration testing platforms.</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/hack-wifi-with-just-a-phone-kali-nethunter-hijacker-c14b74e9d74b?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/hack-wifi-with-just-a-phone-kali-nethunter-hijacker-c14b74e9d74b?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/c14b74e9d74b</guid>
            <category><![CDATA[pentesting]]></category>
            <category><![CDATA[wifi]]></category>
            <category><![CDATA[hacking-tools]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[hacking]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Tue, 18 Mar 2025 02:46:05 GMT</pubDate>
            <atom:updated>2025-03-18T02:46:05.393Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Unlock the Secrets of Effective Code Commenting : A Must-Read for Developers]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/unlock-the-secrets-of-effective-code-commenting-a-must-read-for-developers-0ce592c2096f?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/856/1*nnKqL4XpCQiFZePA4zyBqg.png" width="856"></a></p><p class="medium-feed-snippet">Proper commenting not only enhances the readability and understandability of the code but also facilitates seamless collaboration among&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/unlock-the-secrets-of-effective-code-commenting-a-must-read-for-developers-0ce592c2096f?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/unlock-the-secrets-of-effective-code-commenting-a-must-read-for-developers-0ce592c2096f?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/0ce592c2096f</guid>
            <category><![CDATA[c-sharp-programming]]></category>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[code-review]]></category>
            <category><![CDATA[programming]]></category>
            <category><![CDATA[software-development]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Wed, 29 Jan 2025 00:31:59 GMT</pubDate>
            <atom:updated>2025-01-29T00:31:59.227Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[From Chaos to Clarity: Battling Ambiguity in Code Reviews for Better Software]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/from-chaos-to-clarity-battling-ambiguity-in-code-reviews-for-better-software-70b11970124e?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/856/1*OccOR3QnDvTI61qiB1AYMQ.png" width="856"></a></p><p class="medium-feed-snippet">One of the major challenges that developers face during code reviews is ambiguity. Ambiguity in code reviews can lead to&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/from-chaos-to-clarity-battling-ambiguity-in-code-reviews-for-better-software-70b11970124e?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/from-chaos-to-clarity-battling-ambiguity-in-code-reviews-for-better-software-70b11970124e?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/70b11970124e</guid>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[software-development]]></category>
            <category><![CDATA[c-sharp-programming]]></category>
            <category><![CDATA[code-review]]></category>
            <category><![CDATA[programming]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Tue, 28 Jan 2025 01:45:00 GMT</pubDate>
            <atom:updated>2025-01-28T01:45:00.517Z</atom:updated>
        </item>
        <item>
            <title><![CDATA[Catch It Early: Implementing Early Failure Mechanisms in Code]]></title>
            <description><![CDATA[<div class="medium-feed-item"><p class="medium-feed-image"><a href="https://medium.com/@hakistatv/catch-it-early-implementing-early-failure-mechanisms-in-code-e05a2f0fd469?source=rss-88e91328939a------2"><img src="https://cdn-images-1.medium.com/max/808/1*xieNAQLKNQAIkYghrkreDQ.png" width="808"></a></p><p class="medium-feed-snippet">Implementing early failure mechanisms helps catch errors and edge cases at the start of a function or process, preventing unnecessary&#x2026;</p><p class="medium-feed-link"><a href="https://medium.com/@hakistatv/catch-it-early-implementing-early-failure-mechanisms-in-code-e05a2f0fd469?source=rss-88e91328939a------2">Continue reading on Medium »</a></p></div>]]></description>
            <link>https://medium.com/@hakistatv/catch-it-early-implementing-early-failure-mechanisms-in-code-e05a2f0fd469?source=rss-88e91328939a------2</link>
            <guid isPermaLink="false">https://medium.com/p/e05a2f0fd469</guid>
            <category><![CDATA[c-sharp-programming]]></category>
            <category><![CDATA[code-review]]></category>
            <category><![CDATA[software-engineering]]></category>
            <category><![CDATA[software-development]]></category>
            <category><![CDATA[programming]]></category>
            <dc:creator><![CDATA[T-Jay Bautista]]></dc:creator>
            <pubDate>Sun, 19 Jan 2025 00:22:00 GMT</pubDate>
            <atom:updated>2025-01-19T00:22:00.302Z</atom:updated>
        </item>
    </channel>
</rss>