Books & Videos

Table of Contents

  1. Chapter 1 GENERAL PURPOSE UTILITIES

    1. Check for Changed Files

    2. Encrypt a File

    3. Decrypt a File

    4. File Splitting

    5. File Joining

    6. Windows Process Viewer

    7. File Compressor

    8. File Decompression

    9. Mortgage Calculator

  2. Chapter 2 WEBSITE SCRIPTING

    1. Web Page Link Validator

    2. Orphan File Checker

    3. Form Generator

    4. RSS Parsing

    5. Stock Exchange Grep

    6. IP Address Generation

    7. Subnet Calculator

  3. Chapter 3 LI(U)NIX SYSTEM ADMINISTRATION

    1. Fixing Bad Filenames

    2. Adding a User

    3. Modifying a User

    4. Killing a Stuck Process

    5. Validating Symlinks

  4. Chapter 4 PICTURE UTILITIES

    1. Mass Editing

    2. Image Information Extraction

    3. Creating a Thumbnail

    4. Resize a Picture

    5. Adding a Watermark to Pictures

    6. Convert to Black and White

    7. Creating a Photo Gallery

  5. Chapter 5 GAMES AND LEARNING TOOLS

    1. Sudoku Solver

    2. Flash Cards

    3. Number-Guessing Game

    4. Rock, Paper, Scissors

    5. Word Scramble

    6. Hangman

    7. Pig

  6. Chapter 6 STRING UTILITIES

    1. PDF Generator

    2. Word Frequency

    3. Comma-Separated Value Parser

    4. CSV to XML

    5. Ruby Grep

    6. Password Check

  7. Chapter 7 SERVERS AND SCRAPERS

    1. Define

    2. Automated SMS

    3. Link Scrape

    4. Image Scrape

    5. Scraper

    6. Encrypted Client

    7. Encrypted Server

  8. Chapter 8 ARGUMENTS AND DOCUMENTATION

    1. File Security

    2. Web Scraper

    3. Photo Utilities

    4. Conclusion

  9. Chapter 9 SORTING ALGORITHMS

    1. Bubble Sort

    2. Selection Sort

    3. Shell Sort

    4. Merge Sort

    5. Heap Sort

    6. Quick Sort

    7. Shear Sort

    8. A Note About Efficiencies

  10. Chapter 10 WRITING A METASPLOIT 3.1 MODULE WITH RUBY

    1. Introduction to Metasploit

    2. Installation

    3. Writing a Module

    4. Building the Exploit

    5. Watching in Real Time

    6. Explanation of Metasploit Module Shell

    7. Finding the Payload Space

  1. Appendix AFTERWORD

  2. COLOPHON