Wicked Cool Ruby Scripts : Useful Scripts That Solve Difficult Problems.
Material type:
- text
- computer
- online resource
- 9781593272364
- 005.13/3
- QA76.7 -- .P84 2009eb
Intro -- BRIEF CONTENTS -- CONTENT SINDETAIL -- Foreword -- Acknowledgments -- Introduction -- Wicked Cool Ruby Scripts -- You Need Ruby Basics -- Documentation -- Organization and Approach -- The Website -- 1: General Purpose Utilities -- #1 Check for Changed Files -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #2 Encrypt a File -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #3 Decrypt a File -- The Code -- Running the Code -- The Results -- How It Works -- #4 File Splitting -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #5 File Joining -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #6 Windows Process Viewer -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #7 File Compressor -- The Code -- Running the Code -- The Results -- How It Works -- #8 File Decompression -- The Code -- Running the Code -- The Results -- How It Works -- #9 Mortgage Calculator -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- 2: Website Scripting -- #10 Web Page Link Validator -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #11 Orphan File Checker -- The Code -- Running the Script -- The Results -- How It Works -- #12 Form Generator -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #13 RSS Parsing -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #14 Stock Exchange Grep -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #15 IP Address Generation -- The Code -- Running the Code -- The Results -- How It Works -- #16 Subnet Calculator -- The Code -- Running the Code -- The Results.
How It Works -- Hacking the Script -- 3: Li(U)nix System Administration -- #17 Fixing Bad Filenames -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #18 Adding a User -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #19 Modifying a User -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #20 Killing a Stuck Process -- The Code -- Running the Code -- The Results -- How It Works -- #21 Validating Symlinks -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- 4: Picture Utilities -- #22 Mass Editing -- The Code -- Running the Code -- The Results -- How It Works -- #23 Image Information Extraction -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #24 Creating a Thumbnail -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #25 Resize a Picture -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #26 Adding a Watermark to Pictures -- The Code -- Running the Code -- The Results -- How It Works -- #27 Convert to Black and White -- The Code -- Running the Code -- The Results -- How It Works -- #28 Creating a Photo Gallery -- The Code -- Running the Code -- Results -- How It Works -- Hacking the Script -- 5: Games and Learning Tools -- #29 Sudoku Solver -- The Code -- Running the Code -- The Results -- How It Works -- #30 Flash Cards -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #31 Number-Guessing Game -- The Code -- Running the Code -- The Results -- How It Works -- #32 Rock, Paper, Scissors -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #33 Word Scramble -- The Code -- Running the Code -- The Results -- How It Works.
#34 Hangman -- The Code -- Running the Code -- The Results -- How It Works -- #35 Pig -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- 6: String Utilities -- #36 PDF Generator -- The Code -- Running the Code -- The Results -- How It Works -- #37 Word Frequency -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #38 Comma-Separated Value Parser -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #39 CSV to XML -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #40 Ruby Grep -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #41 Password Check -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- 7: Servers and Scrapers -- #42 Define -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #43 Automated SMS -- The Code -- Running the Code -- The Results -- How It Works -- #44 Link Scrape -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #45 Image Scrape -- The Code -- Running the Code -- The Results -- How It Works -- Hacking the Script -- #46 Scraper -- The Code -- Running the Code -- The Results -- How It Works -- #47 Encrypted Client -- The Code -- Running the Code -- The Results -- How It Works -- #48 Encrypted Server -- The Code -- Running the Code -- The Results -- How It Works -- 8: Arguments and Documentation -- #49 File Security -- The Code -- Running the Code -- The Results -- How It Works -- #50 Web Scraper -- The Code -- Running the Code -- The Results -- How It Works -- #51 Photo Utilities -- The Code -- Running the Code -- The Results -- How It Works -- Conclusion -- 9: Sorting Algorithms -- #52 Bubble Sort -- The Code -- Running the Code -- The Results.
How It Works -- #53 Selection Sort -- The Code -- Running the Code -- The Results -- How It Works -- #54 Shell Sort -- The Code -- Running the Code -- The Results -- How It Works -- #55 Merge Sort -- The Code -- Running the Code -- The Results -- How It Works -- #56 Heap Sort -- The Code -- Running the Code -- The Results -- How It Works -- #57 Quick Sort -- The Code -- Running the Code -- The Results -- How It Works -- #58 Shear Sort -- The Code -- Running the Code -- The Results -- How It Works -- A Note About Efficiencies -- 10: Writing a Metasploit 3.1 Module with Ruby -- Introduction to Metasploit -- Installation -- Writing a Module -- Building the Exploit -- Watching in Real Time -- Explanation of Metasploit Module Shell -- Finding the Payload Space -- Afterword -- Index -- Updates.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.