Computer Literacy

Total Page:16

File Type:pdf, Size:1020Kb

Computer Literacy Alexey Shipunov COMPUTER LITERACY Make computer do the dirty work January 27, 2020 Make the computer do the dirty work. Tim O’Reilly Shipunov, Alexey. Computer Literacy. Make the computer do the dirty work. January 27, 2020 version (draft). 147 pp. Title page image: Tux, Linux mascot. Some other heading illustrations were taken (with deep gratitude) from XKCD, https://xkcd.com. CTAN lion drawing is by Du- ane Bibby; thanks to www.ctan.org. This work is dedicated to public domain. Contents Data 9 Chapter 1. Text ................................... 11 Text software ................................... 12 Chapter 2. Operating systems .......................... 13 Chapter 3. Files and file systems ......................... 15 File name extensions ............................... 16 Organize your files ................................ 17 File operations .................................. 17 File metadata ................................... 18 File managers. OFM ............................... 18 Privacy and cleaning ............................... 19 Chapter 4. Internet ................................. 20 Internet protocols ................................ 20 Chapter 5. Licenses ................................. 22 Chapter 6. Intro to spreadsheets ......................... 24 Format ...................................... 24 Formulas ..................................... 25 Drag and fill ................................. 25 Protect ................................... 26 Ranges .................................... 26 Conditions ................................. 26 Tab delimited ................................... 27 Chapter 7. Markup and ebooks .......................... 28 Plain text ..................................... 28 HTML ....................................... 28 My first Web page ............................. 28 How to work with HTML .......................... 29 Second HTML document .......................... 29 CONTENTS 5 Step three. Fancy HTML .......................... 30 Step four. PNG and JPEG .......................... 31 Step five. SVG ................................ 34 Step six. CSS ................................ 36 Step seven. JavaScript. ........................... 36 Symbol ebooks .................................. 37 PDF ..................................... 37 EPUB .................................... 38 Scanned ebooks ................................. 38 DjVu ..................................... 38 Chapter 8. TEX ................................... 41 LATEX ........................................ 41 My firstAT L EX document .......................... 41 Second LATEX document .......................... 42 LATEX ebooks ................................. 44 Commands 45 Chapter 9. CLI is to command .......................... 46 Chapter 10. Terminals and where to find them . 47 Chapter 11. UNIX Power Tools .......................... 50 Navigate ...................................... 50 Files ........................................ 51 Find ........................................ 52 Directories .................................... 52 Help ........................................ 55 Pipes and other connections .......................... 55 Text ........................................ 56 Regexp ...................................... 58 Connect ...................................... 60 Script ....................................... 60 UNIX Power Tools cheatsheet .......................... 62 Chapter 12. Intro to Python ........................... 65 First things first ................................. 65 Installing Python ................................. 65 2 or 3? .................................... 66 Interactive Mode ................................. 66 6 CONTENTS Python in Web Browser ............................. 67 Chapter 13. Hello, World! ............................. 68 Creating and Running your First Program ................... 68 Printing ...................................... 69 Quotes ....................................... 70 Expressions .................................... 71 Talking to humans (and other intelligent beings) ............... 73 Examples ..................................... 73 Exercises ..................................... 74 Chapter 14. Who Goes There? .......................... 75 Input and Variables ............................... 75 Assignment .................................... 77 Examples ..................................... 79 Exercises ..................................... 80 Chapter 15. Count to 10 .............................. 81 While loops .................................... 81 Examples ..................................... 83 Exercises ..................................... 84 Chapter 16. Decisions ............................... 85 If statement .................................... 85 Examples ..................................... 87 Exercises ..................................... 90 Chapter 17. Debugging .............................. 91 What is debugging? ............................... 91 What should the program do? .......................... 91 What does the program do? ........................... 93 How do I fix the program? ............................ 98 Exercises ..................................... 98 Chapter 18. Functions ...............................100 Creating Functions ................................ 100 Variables in functions .............................. 102 More complex example .......................... 102 Examples ..................................... 104 Exercises ..................................... 106 Chapter 19. Lists ..................................107 CONTENTS 7 Variables with more than one value ...................... 107 More features of lists ............................... 108 Examples ..................................... 113 Exercises ..................................... 115 Chapter 20. “For” Loops ..............................116 Exercises ..................................... 120 Chapter 21. Booleans ...............................121 Examples ..................................... 125 Exercises ..................................... 126 Chapter 22. File Input and Output . 127 Exercises ..................................... 128 Chapter 23. Introduce Python turtle . 129 Examples ..................................... 129 Exercises ..................................... 134 Chapter 24. Who Goes There-2, or GUI . 135 Exercises ..................................... 136 Chapter 25. Objects ................................137 Exercises ..................................... 140 Chapter 26. Python cheatsheet . 141 Homework 143 Chapter 27. Topics for self-study . 144 Chapter 28. Phylogeny Primer . 146 Some useful references ..............................147 Small foreword I use computer technologies for a long time, and learned many good stuff. To my amazement, I always perform routine work on the computer much faster then my colleagues. Therefore, I believe that if somebody will learn at least some of my meth- ods, they will perform computer-based work in a more efficient way. This is the goal of the “Computer literacy: make computer do the dirty work” book. I only want to mention that I am biologist and like command line and (very primi- tive!) programming. This explains some features of the book. Data Chapter 1 Text 1. Essentially, computer understands only numbers. Simple text interface was developed to make communication easier. Despite simplicity, it is extremely powerful and have much more capabilities then point and click graphical in- terface. 2. There are two main issues with simple text, line ends and encoding: (a) Line ends must be encoded as a separate invisible symbol(s). The way his- torically differ between operating systems: old Mac, Windows and UNIX. Most of text software is aware of these differences but there are some (like Windows Notepad) which do not do this job well. (b) Encoding regulates how many bytes are spend per symbol of text. There are (among others) 1 and 2 bytes encodings. (c) 1 byte encodings like ASCII or Latin-1 (ISO 8859-1) could only support 256 symbols, this is enough for core English but not enough for many world languages, especially if they used together. Actually, ASCII encodes only 7 128 symbols so it is /8-byte encoding. (d) 2 byte encodings like UTF-8 could support 256 × 256 = 65536 symbols which practically is enough for most of current languages together. (e) Some systems use 4 byte or 8 byte UTF-16 or UTF-32. The first is quite popular on Windows. (f) UTF-8 has one advantage over other multi-byte encodings: English letter are encoded like in ASCII. This is useful and saves traffic. (g) UTF-8 is one (of many) realizations of Unicode standard which covers all symbols which humanity developed during its history. (h) And one more detail: some computers read bytes from right to left (from second to first), and others from left to right. So UTF-8 text files havebyte 12 Text order mark (BOM) in the beginning of file. Sometimes, if BOM is acciden- tally absent, software could have troubles with UTF-8 encoded files. Text software There are many editors which are capable to work with simple text, i.e. text without formatting, which symbols only (including invisible ones like line ends, tabulation etc.) However, only few of them are really cross-platform (work on Windows, Linux and macOS) and even less are free and open source: • Geany. Fast, has many plug-ins which enhance it. • Kate. Part of the KDE environment but could be used separately. Exercise 1 Open the text editor, type or copy-paste
Recommended publications
  • Computer Science & Information Technology 33
    Computer Science & Information Technology 33 Dhinaharan Nagamalai Sundarapandian Vaidyanathan (Eds) Computer Science & Information Technology Fifth International Conference on Computer Science, Engineering and Applications (CCSEA-2015) Dubai, UAE, January 23 ~ 24 - 2015 AIRCC Volume Editors Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Sydney, Australia E-mail: [email protected] Sundarapandian Vaidyanathan, R & D Centre, Vel Tech University, India E-mail: [email protected] ISSN: 2231 - 5403 ISBN: 978-1-921987-26-7 DOI : 10.5121/csit.2015.50201 - 10.5121/csit.2015.50218 This work is subject to copyright. All rights are reserved, whether whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the International Copyright Law and permission for use must always be obtained from Academy & Industry Research Collaboration Center. Violations are liable to prosecution under the International Copyright Law. Typesetting: Camera-ready by author, data conversion by NnN Net Solutions Private Ltd., Chennai, India Preface Fifth International Conference on Computer Science, Engineering and Applications (CCSEA-2015) was held in Dubai, UAE, during January 23 ~ 24, 2015. Third International Conference on Data Mining & Knowledge Management Process (DKMP 2015), International Conference on Artificial Intelligence and Applications (AIFU-2015) and Fourth International Conference on Software Engineering and Applications (SEA-2015) were collocated with the CCSEA-2015. The conferences attracted many local and international delegates, presenting a balanced mixture of intellect from the East and from the West.
    [Show full text]
  • Making an Erotic Book 2016 Workshop by Cecilia Tan (Ceciliatan.Com)
    Making an Erotic Book 2016 Workshop by Cecilia Tan (ceciliatan.com) Book-making Software & Free Stuff You Will Need [Online at http://blog.ceciliatan.com/archives/2994] OpenOffice/NeoOffice/LibreOffice --free/donationware open software "clone" of MS Office suite --OO "Writer" is the Word equivalent OpenOffice Plugins: • Altsearch - Alternative Find/Replace (so you can find non-printing characters) http://extensions.openoffice.org/en/project/alternative-dialog-find-replace-writer-altsearch • Writer2epub (http://extensions.openoffice.org/en/project/writer2epub) GIMP: Image editing software (https://www.gimp.org/downloads/) Cover designs for ebooks must be 1400 pixels x 2100 pixels minimum Free image sources: Pixabay (free portal to Shutterstock) FreeImages.com (very limited, free portal to Getty Images) Cheap image sources: Dreamstime.com iStockphoto (also owned by Getty), Shutterstock, a few others Sigil WYSIWYG epub editing software INDISPENSABLE (https://github.com/Sigil-Ebook/Sigil) Calibre meant to be used as an ebook library tool but has crude/ugly format conversion functions and DRM stripping functions (https://calibre-ebook.com/download) ePub Zip/ePub Unzip Script that unzips your epub and then puts it back together again, allowing for manual deletion of encrypted files (http://en.freedownloadmanager.org/Mac-OS/ePub-Zip-Unzip-FREE.html) Typesetting and layout Adobe Indesign is the standard, costs $74.99 for one month cloud access, $39.99/mo for 1 yr. Scribus is open source free https://sourceforge.net/projects/scribus/ Epubcheck Online validator: http://validator.idpf.org/ (does files up to 10MB) Barcodes and Createspace Templates: Bookow.com free barcode generator: http://bookow.com/resources.php#isbn-barcode-generator Bookow Free createspace template: http://bookow.com/resources.php#cs-cover-template- generator.
    [Show full text]
  • Self-Publishing 102: Introduction To
    Self-Publishing 102: Introduction to Ebooks Obtain an ISBN Learn about and obtain your free ISBN from Library and Archives Canada’s ISBN Canada: o www.bac-lac.gc.ca/eng/services/isbn-canada/Pages/isbn-canada.aspx Ebook Metadata: Information about the Ebook Metadata will need to be entered into ebook creation software and on distribution websites BASIC: Determine and note core metadata (title, author, ISBN, pub date, format, etc.) ADVANCED: Research how to optimize discoverability using metadata. An example: o https://www.thebookdesigner.com/2012/05/self-publishing-basics- introduction-to-metadata/ Copyright Resources Canadian Intellectual Property Office – Copyright o Learn about copyright in Canada and register copyright o http://www.ic.gc.ca/eic/site/cipointernet-internetopic.nsf/eng/h_wr02281.html Creative Commons o Creative Commons licenses work alongside copyright and enable modification of copyright terms to best suit your needs. There is no registration to use Creative Commons licenses. o www.creativecommons.org C cc C C Creative Public Copyright Copyleft Commons Domain Vancouver Public Library | Self-Publishing 101 Handout 1 Ebook Project Checklist Must haves: A digital copy of your manuscript that has been edited and basic formatting applied (.doc, .docx, .html, .rtf) Portable storage device to save your working files (USB, Portable Hard Drive) o Inspiration Lab ‘General Technology Skills’ guide: http://www.vpl.ca/guide/inspiration-lab-general-technology-skills . See sections on “Using External Storage” and “using Cloud
    [Show full text]
  • [email protected]
    PRIVACY TOOLKIT FOR LIBRARIANS [email protected] libraryfreedomproject.org/resources/privacy-toolkit-for-librarians/ THREAT MODELING ● assets ● adversaries ● capabilities ● consequences how much trouble are you willing to go through in order to try to prevent those? FREE SOFTWARE FOSS: the freedom to run, copy, distribute, study, change and improve the software (gnu.org) -vs. proprietary software -why does this matter for privacy? -most of these tools are free software SAFER BROWSING ● who owns your browser? ● what is a browser extension? ● Firefox and Tor ● Firefox privacy settings ● Firefox extensions menu ENCRYPTED WEBSITES ● what is encryption? 1. confidentiality 2. authenticity 3. integrity ● http vs https ● HTTPS Everywhere ● Let's Encrypt THIRD PARTY TRACKING ● cookies ● widgets ● analytics ● beacons ● behavioral advertising ● Privacy Badger This is a real image from an online marketing company. SEARCH TRACKING ● Google, Bing, and Yahoo collect and store your searches ● DuckDuckGo does not. They even have an extension! ● alerting patrons: “You might notice that your search engine looks different” ● embedded Google searchbars: Google Sharing TERMS OF SERVICE Image credit: xkcd.com E.U.L.A. = end user license agreement Terms of Service; Didn't Read WIFI SECURITY ● Open wifi access and plausible deniability ● Closed wifi encryption (authenticity – and integrity) ● Wired network snooping is possible but requires a physical connection FILE DELETION Clean system and protect privacy: trash, logs, recent places, cache, session data, etc CCLeaner – Windows and Mac OSX, not FOSS *Windows users, do not ever use the registry cleaner! Bleachbit – Windows and Linux, FOSS Deep Freeze/Clean Slate on patron PCs: very useful, easy to use, but not totally secure deletion.
    [Show full text]
  • Raster Images in R Graphics by Paul Murrell
    48 CONTRIBUTED RESEARCH ARTICLES Raster Images in R Graphics by Paul Murrell Abstract The R graphics engine has new sup- 39837_s_at 1267_at 402_s_at 32562_at 37600_at 1007_s_at 36643_at 1039_s_at 40215_at 39781_at port for rendering raster images via the func- 266_s_at 307_at 38408_at 37539_at 1911_s_at 1463_at 2057_g_at 39556_at 41744_at 34789_at 34850_at rasterImage() grid.raster() 38631_at tions and . This 37280_at 36536_at 37006_at 41397_at 41346_at 40692_at 35714_at 1992_at 33244_at 40167_s_at 32872_at 34699_at 33440_at leads to better scaling of raster images, faster 36275_at 33809_at 40953_at 1308_g_at 1928_s_at 1307_at 40504_at 41742_s_at 41743_i_at 1674_at 40784_at 40785_g_at rendering to screen, and smaller graphics files. 37978_at 37099_at 1973_s_at 38413_at 2036_s_at 1126_s_at 31472_s_at 37184_at 35256_at 40493_at 41779_at 33412_at Several examples of possible applications of 37193_at 37479_at 39210_at 919_at 1140_at 41478_at 35831_at 176_at 37724_at 38385_at 41401_at 41071_at these new features are described. 39135_at 34961_at 37251_s_at 41470_at 1947_g_at 37810_at 36777_at 38004_at 177_at 36897_at 34106_at 31615_i_at 35665_at 33358_at 39315_at 41191_at 931_at 1914_at 36873_at 37809_at 39635_at 38223_at 33936_at 37558_at 41348_at 31605_at 205_g_at 32475_at 34247_at 36149_at 1500_at 34098_f_at 33528_at 35663_at 40393_at 33193_at 39716_at 33405_at 1929_at 36092_at 32215_i_at 41448_at 40763_at 873_at Prior to version 2.11.0, the core R graphics engine 37225_at 38056_at 37413_at 39424_at 32116_at 2039_s_at 40480_s_at 35816_at 1134_at
    [Show full text]
  • The Elinks Manual the Elinks Manual Table of Contents Preface
    The ELinks Manual The ELinks Manual Table of Contents Preface.......................................................................................................................................................ix 1. Getting ELinks up and running...........................................................................................................1 1.1. Building and Installing ELinks...................................................................................................1 1.2. Requirements..............................................................................................................................1 1.3. Recommended Libraries and Programs......................................................................................1 1.4. Further reading............................................................................................................................2 1.5. Tips to obtain a very small static elinks binary...........................................................................2 1.6. ECMAScript support?!...............................................................................................................4 1.6.1. Ok, so how to get the ECMAScript support working?...................................................4 1.6.2. The ECMAScript support is buggy! Shall I blame Mozilla people?..............................6 1.6.3. Now, I would still like NJS or a new JS engine from scratch. .....................................6 1.7. Feature configuration file (features.conf).............................................................................7
    [Show full text]
  • Schon Mal Dran Gedacht,Linux Auszuprobieren? Von G. Schmidt
    Schon mal dran gedacht, Linux auszuprobieren? Eine Einführung in das Betriebssystem Linux und seine Distributionen von Günther Schmidt-Falck Das Magazin AUSWEGE wird nun schon seit 2010 mit Hilfe des Computer-Betriebs- system Linux erstellt: Texte layouten, Grafiken und Fotos bearbeiten, Webseiten ge- stalten, Audio schneiden - alles mit freier, unabhängiger Software einer weltweiten Entwicklergemeinde. Aufgrund der guten eigenen Erfahrungen möchte der folgende Aufsatz ins Betriebssystem Linux einführen - mit einem Schwerpunkt auf der Distri- bution LinuxMint. Was ist Linux? „... ein hochstabiles, besonders schnelles und vor allem funktionsfähiges Betriebssystem, das dem Unix-System ähnelt, … . Eine Gemeinschaft Tausender programmierte es und verteilt es nun unter der GNU General Public Li- cense. Somit ist es frei zugänglich für jeden und kos- tenlos! Mehrere Millionen Leute, viele Organisatio- nen und besonders Firmen nutzen es weltweit. Die meisten nutzen es aus folgenden Gründen: • besonders schnell, stabil und leistungs- stark • gratis Support aus vielen Internet- Newsgruppen Tux, der Pinguin, ist das Linux-Maskottchen • übersichtliche Mailing-Listen • massenweise www-Seiten • direkter Mailkontakt mit dem Programmierer sind möglich • Bildung von Gruppen • kommerzieller Support“1 Linux ist heute weit verbreitet im Serverbereich: „Im Oktober 2012 wurden mindes- tens 32% aller Webseiten auf einem Linux-Server gehostet. Da nicht alle Linux-Ser- ver sich auch als solche zu erkennen geben, könnte der tatsächliche Anteil um bis zu 24% höher liegen. Damit wäre ein tatsächlicher Marktanteil von bis zu 55% nicht 1 http://www.linuxnetworx.com/linux-richtig-nutzen magazin-auswege.de – 2.11.2015 Schon mal dran gedacht, Linux auszuprobieren? 1 auszuschliessen. (…) Linux gilt innerhalb von Netzwerken als ausgesprochen sicher und an die jeweiligen Gegebenheiten anpassbar.
    [Show full text]
  • Understanding Image Formats and When to Use Them
    Understanding Image Formats And When to Use Them Are you familiar with the extensions after your images? There are so many image formats that it’s so easy to get confused! File extensions like .jpeg, .bmp, .gif, and more can be seen after an image’s file name. Most of us disregard it, thinking there is no significance regarding these image formats. These are all different and not cross‐ compatible. These image formats have their own pros and cons. They were created for specific, yet different purposes. What’s the difference, and when is each format appropriate to use? Every graphic you see online is an image file. Most everything you see printed on paper, plastic or a t‐shirt came from an image file. These files come in a variety of formats, and each is optimized for a specific use. Using the right type for the right job means your design will come out picture perfect and just how you intended. The wrong format could mean a bad print or a poor web image, a giant download or a missing graphic in an email Most image files fit into one of two general categories—raster files and vector files—and each category has its own specific uses. This breakdown isn’t perfect. For example, certain formats can actually contain elements of both types. But this is a good place to start when thinking about which format to use for your projects. Raster Images Raster images are made up of a set grid of dots called pixels where each pixel is assigned a color.
    [Show full text]
  • Graphic File Preparation for Letterpress Printing ©2016
    GRAPHIC FILE PREPARATION FOR LETTERPRESS PRINTING ©2016, Smart Set, Inc. COMMON GRAPHIC FILE FORMATS Vector Formats .ai (Adobe Illustrator) Native Illustrator file format. Best format for importing into Adobe InDesign. Illustrators’s native code is pdf, so saving files in .ai contains the portability of pdf files, but retaining all the editing capabilities of Illustrator. (AI files must be opened in the version of Illustrator that they were created in (or higher). .pdf (Adobe Portable Document Format) A vector format which embeds font and raster graphics within a self-con- tained document that can be viewed and printed (but not edited) in Adobe’s Reader freeware. All pre-press systems are in the process of transitioning from PostScript workflows to PDF workflows. Because of the ability to em- bed all associated fonts and graphics, pdf documents can be generated from most graphics software packages and can be utilized cross-platform and without having all versions of different software packages. Many large printers will now only accept pdf files for output. .eps (Encapsulated PostScript) Before Adobe created the pdf format, PostScript allowed files to be created in a device-independent format, eps files printed on a 300 dpi laser printer came out 300 dpi, the same file printed to an imagesetter would come out at 2540 dpi. PostScript files are straight code files, an Encapsulated PostScript includes a 72 dpi raster preview so that you can see what you’re working with in a layout program such as Quark XPress or InDesign. COMMON GRAPHIC FILE FORMATS Raster Formats .tiff (Tagged Image File Format) Tiffs are binary images best for raster graphics.
    [Show full text]
  • Openoffice Spreadsheet Override Auto Capatilization
    Openoffice Spreadsheet Override Auto Capatilization Selfsame Randie thraws her anesthesia so debauchedly that Merwin spiles very raspingly. Mitral Gerrard condones synchronically, he catches his pitchstone very unpreparedly. Is Lon Muhammadan or associate when rematches some requisition tile war? For my monobook skin is a list of As arch Capital will change percentage setting in gorgeous Voice Settings dialog. What rate the 4 basic layout types? Class WriteExcel Documentation for writeexcel 104. OpenOfficeorg 3 Getting Started Calamo. Saving Report Output native Excel XLSX Format. Installed tax product to another precious you should attend Office Manager and. Sep 2015 How to boast Off Automatic Capitalization in Excel 2013 middot Click. ExportMode Defaults to 'xlsx' and uses the tow Office XML standards. HttpwwwopenofficeorglicensesPDLhtml with the additional caveat that anyone. The Source Documents window up the Change Summary window but easily be. Usually if you change this option it affects all components. Excel Export allows exporting ag-Grid data create Excel using Open XML format xlsx or its's own XML format. Lionel Elie Mamane fdo57640 Auto capitalization for letters wrong. Associating a document with somewhat different template 75. The Advantages of Apache OpenOffice Apache OpenOffice Wiki. Note We always prompt response keywords in first capital letters for clarity but the. It is based on code from Apache OpenOffice made available getting the. Citations that sort been inserted with automatic citation updates disabled would be inserted. Getting Started with LibreOffice 60 Dash. Ranges in A1 notation must restore in uppercase like outlook Excel. Open up office vs closed plan office advantages and. OpenDocument applications such as OpenOfficeorg let this change the format of.
    [Show full text]
  • U.S. Government Printing Office Style Manual, 2008
    U.S. Government Printing Offi ce Style Manual An official guide to the form and style of Federal Government printing 2008 PPreliminary-CD.inddreliminary-CD.indd i 33/4/09/4/09 110:18:040:18:04 AAMM Production and Distribution Notes Th is publication was typeset electronically using Helvetica and Minion Pro typefaces. It was printed using vegetable oil-based ink on recycled paper containing 30% post consumer waste. Th e GPO Style Manual will be distributed to libraries in the Federal Depository Library Program. To fi nd a depository library near you, please go to the Federal depository library directory at http://catalog.gpo.gov/fdlpdir/public.jsp. Th e electronic text of this publication is available for public use free of charge at http://www.gpoaccess.gov/stylemanual/index.html. Use of ISBN Prefi x Th is is the offi cial U.S. Government edition of this publication and is herein identifi ed to certify its authenticity. ISBN 978–0–16–081813–4 is for U.S. Government Printing Offi ce offi cial editions only. Th e Superintendent of Documents of the U.S. Government Printing Offi ce requests that any re- printed edition be labeled clearly as a copy of the authentic work, and that a new ISBN be assigned. For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 ISBN 978-0-16-081813-4 (CD) II PPreliminary-CD.inddreliminary-CD.indd iiii 33/4/09/4/09 110:18:050:18:05 AAMM THE UNITED STATES GOVERNMENT PRINTING OFFICE STYLE MANUAL IS PUBLISHED UNDER THE DIRECTION AND AUTHORITY OF THE PUBLIC PRINTER OF THE UNITED STATES Robert C.
    [Show full text]
  • Versatile Exploitation Techniques: Drone Hacking and Jamming with Raspberry-Pi and Wi-Fi Pineapple
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-9, Issue-1, November 2019 Versatile Exploitation Techniques: Drone Hacking and Jamming with Raspberry-Pi and Wi-Fi Pineapple J Caroline El Fiorenza, Revanth Kumar Lokku, Kirthika Sivakumar, M Reene Stephanie Unmanned aerial (UAVs) vehicles, or drones, are an Abstract—The utilization of Internet-of-Things (IoT) unmanned aerial vehicle that has no pilot ready, and are innovation is developing exponentially as more shoppers and explored by either a remote control, or by ready PCs. Drones organizations recognize the benefits offered by the savvy and are normally partitioned into three unique sorts of classes: (a) shrewd gadgets. The major purpose of this paper arose due to the reason that since drone innovation is a quickly rising segment recreational, (b) business and (c) military drones. inside the IoT and the danger of hacking couldn't just purpose an The expansion of recreational drone usage has prompted information break, it could likewise represent a noteworthy discourses in regards to the security of the unregulated drone hazard to the open well-being. On account of their flexible usage, and how to maintain a strategic distance from specialist applications and access to ongoing data, commercial drones are abusing airspace rules. At a similar time as buyers utilized used across a wide variety of smart city applications. However, with many IoT devices, security is frequently an untimely idea, drones as specialists, organizations have progressively leaving numerous drones helpless against programmers. What is investigated utilizing rambles for business use. being done in this paper is that this paper examines the present In 2016 they uncovered that they were trying a conveyance condition of automation security and exhibits a lot of Wi-Fi administration where clients could get little bundles up to five empowered drone vulnerabilities.
    [Show full text]