Group entry hacks are a favorite for hacker social ... If the card is on the list, the Pi triggers the door lock using a signal line originally designed to work with an intercom system.
He’s rigged up a hidden RFID reader which locks and unlocks his workstation ... It is a command line tool which simulates keyboard and mouse entry. His script detects when the xscreensaver ...