2012年1月29日 星期日

ttyrec:錄製你的tty 控制台 比scripy還好用!!

ttyrec:錄製你的tty 控制台

這是一個與script有著異曲同工之妙的小工具。ttyrec是一個tty控制台錄製程序,其所錄製的數據文件可以使用與之配套的ttyplay播放。不管是你在tty中的各種操作,還是在tty中耳熟能詳的軟件,都可進行錄製。
ttyrec 使用ttyrec 進行錄製的情形
ttyrec 當前版本為1.0.8,於去年6 月發布。你可在所用的Linux 發行版中搜索安裝。若是沒有,也可下載其源代碼,自行編譯。
你若要編譯ttyrec,可以執行make指令,這個過程很快就會完成。在編譯成功後,其目錄包括ttyrec、ttyplay、ttytime三個可執行文件:
  • ttyrec-用於錄製tty 控制台
  • ttyplay-用來播放ttyrec 所錄製的數據文件
  • ttytime-了解ttyrec 所錄製數據文件的時間

ttyrec 的使用亦很簡單,為了方便其執行,你可以將上述三個文件複製到/usr/bin 或/usr/local/bin 目錄。
  1. 在執行ttyrec指令後,即開始錄製過程。注意,ttyrec沒有輸出任何提示信息。
  2. 若是錄製完成,則可以使用exit結束。
  3. ttyrec所錄製的數據文件一般為ttyrecord,可使用ttyplay ttyrecord播放。

一點注意事項:最好能夠使錄製和播放的終端尺寸保持一致。
Read More:

2012年1月28日 星期六

用script錄下終端機中的session

使用 script 录制终端会话

script 真是一个神奇的小家伙,别看它小不起眼,可是却足够的好玩。script 能够将终端的会话过程录制下来,然后使用 scriptreplay 就可以将其录制的结果播放给他人观看。script 的好处就在于,你在终端中的所有操作过程,它都可以原原本本地进行录制。试想一下,我们可以将这种录制应用在很多方面,诸如教学、演示等等。
script
一般来说,script 和 scriptreplay 在 Linux 发行版中都有默认安装。如果你打算使用 script 开始录制终端会话,可以敲入下列指令: script -t 2>demo.timing -a demo.session
该指令中的 -t 选项指明输出录制的时间数据,而 -a 选项则输出录制的文件。你可以将指令中的 demo 换成自己设置的名称。当终端中返回“Script started, file is demo.session”的信息时,你就可以进行需要录制的操作了。
如果需要结束录制过程,则输入 exit 即可。
要播放已录制完成的终端会话,可以使用指令:scriptreplay demo.timing demo.session
关于 script 及 scriptreplay 的更多信息,可以使用 man script 或 man scriptreplay 查询。
[via]
Read More:

transcend不能格式化成NTFS的解決辦法

以Windows XP為例下列步驟是新增NTFS格式化磁碟選項:
1.請點選進入"我的電腦"圖示後選擇行動碟所代表的磁碟機按右鍵
2.選擇"內容",
3.選擇"硬體",
4.點選"內容"按鈕,
5.選擇"原則",
6.選擇"效能最佳化"。
當完成上述步驟您應該可以在格式化工具找到NTFS此一磁碟格式化選項
(請注意在Mac作業系統上可能無法正常使用 NTFS檔案系統。)

2012年1月4日 星期三

Top 10 hacking tools

This is a Cool Collection of Top Ten Linux Hacking Tools.
1. nmap – Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available.
2. Nikto – Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
3. THC-Amap – Amap is a next-generation tool for assistingnetwork penetration testing. It performs fast and reliable application protocol detection, independant on the TCP/UDP port they are being bound to.
4. Ethereal – Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product.
5. THC-Hydra – Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.
6. Metasploit Framework – The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code. This project initially started off as a portable network game and has evolved into a powerful tool for penetration testing, exploit development, and vulnerability research.
7. John the Ripper – John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
8. Nessus – Nessus is the world’s most popular vulnerability scanner used in over 75,000 organisations world-wide. Many of the world’s largest organisations are realising significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
9. IRPAS – Internetwork Routing Protocol Attack Suite – Routing protocols are by definition protocols, which are used by routers to communicate with each other about ways to deliver routed protocols, such as IP. While many improvements have been done to the host security since the early days of the Internet, the core of this network still uses unauthenticated services for critical communication.
10. Rainbowcrack – RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In short, the RainbowCrack tool is a hash cracker. A traditional brute force cracker try all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called “rainbow table”.
Popularity: 8% [?]
You might be interested in the following Articles
  1. Top 20 Hacking Tools
  2. Top 10 Windows Hacking Tools
  3. Tools for Hacking Bluetooth Enabled Devices
  4. Three Most used Backdoor Programs
  5. Setting Up A Hackers Workstation
  6. Best 5 Port Scanners
  7. Hacking With Nmap – The Network Mapping Tool
  8. Top 15 SQL Injection Scanners

2012年1月3日 星期二

linux 駭客基本學習清單

好用的mtr指令

linux 駭客基本學習清單
  

2011年12月29日 星期四

How to become a Hacker

How to become a Hacker


Become an ethical hacker
There are two kind of hackers, malicious hackers who crack email accounts, distribute viruses, cause destruction and steal money from others, known as crackers or black hat hackers, and ethical hackers who tweak hardware and software to create things that nobody ever thought about, hackers are also programmers and security penetration testers whose job is to find a vulnerability, software bug or technical error before the bad guys do, warning the company/community, aka white hat hackers, this post is about how to become an ethical hacker.
To become a computer hacker requires intelligence, dedication and tenacity, problem solving abilities are a must have and above all you must like computer tinkering since you will spend lots of time working with them. Even thought most desktop computers run on Windows, most servers run some kind of Unix variant, i.e. Linux, FreeBSD, Solaris.
Knowing only Windows will get you nowhere, the first step you should do to become a hacker is to get used to a Unix based operating system where you get to see that not all is a point and click mouse and you can play with a program’s source code, unlike Windows or MAC, source code in Unix is free to modify and distribute, aka open source.
GRML Linux hackers distribution
GRML Linux hackers distribution
Linux distributions for hackers:
GRML: A Debian based Linux distribution specially designed for system administrators and text tool users, capable of analyzing systems/networks, to be used as a rescue system or as a main desktop.
BackTrack: Linux distribution intended for security professionals, with tools for hacking wireless access points, exploiting web servers  and learning, an indispensable  security penetration testing tool.
Tip: If you are a Linux beginner download something easier like Knoppix, if you do not want to install it in your computer it can be run as a live CD/DVD or USB thumbdrive, and do not forget that BSD distributions like OpenBSD are also appropriate for hackers.
Programming languages a hacker should learn 
Python is a well designed and documented programming language ideal for beginners due to its power and friendliness, C is a +40 years old general purpose programming language still in use, C++ is related to C and knowing one of the languages will make learning the other easy, Perl is a Unix scripting language often used in network administration, you will need to know Perl in order to understand other people scripts rather than writing it yourself, LISP (LISt Processing) is an ancient programming language closely connected with artificial intelligence projects, reverse engineering and being able to disassemble software is a must have skill for software hackers, if you come across a trojan you will want to know how it works and what it does.
Python: Flexible intuitive programming language with clear and readable syntax, it uses standard libraries and third party modules.
Perl: Feature rich programming language that can be embedded into webservers and databases, also used in e-commerce.
Learn the English language 
English is the main communication language in between people of different countries wherever you go, the ability to communicate verbally and in writing in English is an essential skill, if you have a different mother tongue, once you have mastered the English language you will be able to translate documentation and will be in a better position than monolingual people. English speaking people must also take care not to misspell or make grammatical errors as that makes you look illiterate, impressions count, nobody is going to hire someone who appears to be uneducated and can’t spell.
Dynamo Dictionary: A free online vocabulary game to improve your reading and writing skills.
  Social engineering
Information and communication technologies relies on humans one way or another, human resources, network administrators and security guards are all composed of humans, if a system is too hard to get into then hack the people in charge (aka social engineering). Some companies hire penetration testers to discover their own weak points and test staff security awareness before something happens for real.
How to become a hacker
How to become a hacker
You will want to learn human psychology, what makes people give up their password to strangers? How to get information out of people without knowing them? Can people be fooled into thinking a stranger works for the company just because he says so? All of that is used by hackers to learn of administrator passwords and much more.
Social engineer podcast: A podcast with interviews and tutorials teaching you how people get fooled into giving up private information that later be used for malicious hacking and other bad deeds.
Learn HTML
Everything worthwhile to learn is on the Internet, tutorials, ebooks, software, is all served to you in websites, you should learn HTML language (not a programming language) this will beuseful to understand how websites work and help you to create a blog/website or manage a forum where to interact with others.
W3Schools: Web developer portal for beginners and advanced users, you will learn how to develop a website and technologies being used to do that (HTML, XML, CSS, JavaScript, PHP, and SQL).
Hacking war games
Technology evolves quickly you need to keep learning and adapt to new challenges, security is not a target that can be reached, it is a process that you need to keep improving for ever, hackers never give up due to failure, they keep trying until they find a solution no matter how hard it is. Getting involved in an open source project will be a good way to be part of a community and keep your skills up to date, open source project take all kind of volunteers regardless of skills, if you can’t program yet maybe you can write documentation on how things work.
Another good way to keep your skills up to date and getting started in the hacking world is by joining a war game where the target is to hack other people, everything being legal and only being simulated, aka hacker games.
HackThisSite: A free legal website where to train your hacking skills, with tutorials and a forum where to discuss network security and anything related with computers.
Hacker-Project: Online hacking simulation game where you have to complete tasks like installing virii, hiding/encrypting files,recover logs, acquire computer IPs and collect profits of your hacking activities.
Get hacker status
If you help to test and debug open source software, keep the infrastructure working, write open source software, and publish useful information and submit it to conferences, you will soon come into contact with other hackers who will appreciate your help and dedication as well as admire you for your work, you will make a name for yourself and if you are good enough, get invited to conferences as a speaker, networking will help you be part of the community and maybe even find an employer or people with whom to work together in a project.
Defcon (DEFense CONdition): One of the oldest hackers conferences in the world where to meet like minded people and showcase new hacking tricks and tips.
BlackHat: A series of highly technical information security conferences that brings together hackers from government agencies, corporations and the underground world.

2011年12月12日 星期一

駭客一定要會的進階shell script 設計

Back to FAQS.ORG homepage

Advanced Bash-Scripting Guide

An in-depth exploration of the art of shell scripting

Version 1.8.4
12 June 2003

Mendel Cooper


thegrendel@theriver.com
This tutorial assumes no previous knowledge of scripting or programming, but progresses rapidly toward an intermediate/advanced level of instruction . . . all the while sneaking in little snippets of UNIX wisdom and lore. It serves as a textbook, a manual for self-study, and a reference and source of knowledge on shell scripting techniques. The exercises and heavily-commented examples invite active reader participation, under the premise that the only way to really learn scripting is to write scripts.
Author's home site.


Dedication

For Anita, the source of all the magic

Table of Contents
Part 1. Introduction
1. Why Shell Programming?
2. Starting Off With a Sha-Bang
2.1. Invoking the script
2.2. Preliminary Exercises
Part 2. Basics
3. Special Characters
4. Introduction to Variables and Parameters
4.1. Variable Substitution
4.2. Variable Assignment
4.3. Bash Variables Are Untyped
4.4. Special Variable Types

5. Quoting

6. Exit and Exit Status

7. Tests


7.1. Test Constructs
7.2. File test operators
7.3. Comparison operators (binary)
7.4. Nested if/then Condition Tests
7.5. Testing Your Knowledge of Tests

8. Operations and Related Topics


8.1. Operators
8.2. Numerical Constants

Part 3. Beyond the Basics


9. Variables Revisited
9.1. Internal Variables
9.2. Manipulating Strings
9.3. Parameter Substitution
9.4. Typing variables: declare or typeset
9.5. Indirect References to Variables
9.6. $RANDOM: generate random integer
9.7. The Double Parentheses Construct

10. Loops and Branches


10.1. Loops
10.2. Nested Loops
10.3. Loop Control
10.4. Testing and Branching

11. Internal Commands and Builtins


11.1. Job Control Commands

12. External Filters, Programs and Commands


12.1. Basic Commands
12.2. Complex Commands
12.3. Time / Date Commands
12.4. Text Processing Commands
12.5. File and Archiving Commands
12.6. Communications Commands
12.7. Terminal Control Commands
12.8. Math Commands
12.9. Miscellaneous Commands

13. System and Administrative Commands

14. Command Substitution

15. Arithmetic Expansion

16. I/O Redirection


16.1. Using exec
16.2. Redirecting Code Blocks
16.3. Applications

17. Here Documents

18. Recess Time


Part 4. Advanced Topics


19. Regular Expressions
19.1. A Brief Introduction to Regular Expressions
19.2. Globbing

20. Subshells

21. Restricted Shells

22. Process Substitution

23. Functions


23.1. Complex Functions and Function Complexities
23.2. Local Variables

24. Aliases

25. List Constructs

26. Arrays

27. Files

28. /dev and /proc


28.1. /dev
28.2. /proc

29. Of Zeros and Nulls

30. Debugging

31. Options

32. Gotchas

33. Scripting With Style


33.1. Unofficial Shell Scripting Stylesheet

34. Miscellany


34.1. Interactive and non-interactive shells and scripts
34.2. Shell Wrappers
34.3. Tests and Comparisons: Alternatives
34.4. Recursion
34.5. "Colorizing" Scripts
34.6. Optimizations
34.7. Assorted Tips
34.8. Security Issues
34.9. Portability Issues
34.10. Shell Scripting Under Windows

35. Bash, version 2


36. Endnotes


36.1. Author's Note
36.2. About the Author
36.3. Tools Used to Produce This Book
36.3.1. Hardware
36.3.2. Software and Printware

36.4. Credits


Bibliography

A. Contributed Scripts

B. A Sed and Awk Micro-Primer


B.1. Sed
B.2. Awk

C. Exit Codes With Special Meanings

D. A Detailed Introduction to I/O and I/O Redirection

E. Localization

F. History Commands

G. A Sample .bashrc File

H. Converting DOS Batch Files to Shell Scripts

I. Exercises


I.1. Analyzing Scripts
I.2. Writing Scripts

J. Copyright


List of Examples
2-1. cleanup: A script to clean up the log files in /var/log
2-2. cleanup: An enhanced and generalized version of above script.
3-1. Code blocks and I/O redirection
3-2. Saving the results of a code block to a file
3-3. Running a loop in the background
3-4. Backup of all files changed in last day
4-1. Variable assignment and substitution
4-2. Plain Variable Assignment
4-3. Variable Assignment, plain and fancy
4-4. Integer or string?
4-5. Positional Parameters
4-6. whwhois domain name lookup
4-7. Using shift
5-1. Echoing Weird Variables
5-2. Escaped Characters
6-1. exit / exit status
6-2. Negating a condition using !
7-1. What is truth?
7-2. Equivalence of test/usr/bin/test[ ], and /usr/bin/[
7-3. Arithmetic Tests using (( ))
7-4. Testing for broken links
7-5. arithmetic and string comparisons
7-6. testing whether a string is null
7-7. zmost
8-1. Greatest common divisor
8-2. Using Arithmetic Operations
8-3. Compound Condition Tests Using && and ||
8-4. Representation of numerical constants
9-1. $IFS and whitespace
9-2. Timed Input
9-3. Once more, timed input
9-4. Timed read
9-5. Am I root?
9-6. arglist: Listing arguments with $* and $@
9-7. Inconsistent $* and $@ behavior
9-8. $* and $@ when $IFS is empty
9-9. underscore variable
9-10. Inserting a blank line between paragraphs in a text file
9-11. Converting graphic file formats, with filename change
9-12. Alternate ways of extracting substrings
9-13. Using parameter substitution and error messages
9-14. Parameter substitution and "usage" messages
9-15. Length of a variable
9-16. Pattern matching in parameter substitution
9-17. Renaming file extensions:
9-18. Using pattern matching to parse arbitrary strings
9-19. Matching patterns at prefix or suffix of string
9-20. Using declare to type variables
9-21. Indirect References
9-22. Passing an indirect reference to awk
9-23. Generating random numbers
9-24. Picking a random card from a deck
9-25. Rolling the die with RANDOM
9-26. Reseeding RANDOM
9-27. Pseudorandom numbers, using awk
9-28. C-type manipulation of variables
10-1. Simple for loops
10-2. for loop with two parameters in each [list] element
10-3. Fileinfo: operating on a file list contained in a variable
10-4. Operating on files with a for loop
10-5. Missing in [list] in a for loop
10-6. Generating the [list] in a for loop with command substitution
10-7. grep replacement for binary files
10-8. Listing all users on the system
10-9. Checking all the binaries in a directory for authorship
10-10. Listing the symbolic links in a directory
10-11. Symbolic links in a directory, saved to a file
10-12. A C-like for loop
10-13. Using efax in batch mode
10-14. Simple while loop
10-15. Another while loop
10-16. while loop with multiple conditions
10-17. C-like syntax in a while loop
10-18. until loop
10-19. Nested Loop
10-20. Effects of break and continue in a loop
10-21. Breaking out of multiple loop levels
10-22. Continuing at a higher loop level
10-23. Using "continue N" in an actual task
10-24. Using case
10-25. Creating menus using case
10-26. Using command substitution to generate the case variable
10-27. Simple string matching
10-28. Checking for alphabetic input
10-29. Creating menus using select
10-30. Creating menus using select in a function
11-1. printf in action
11-2. Variable assignment, using read
11-3. What happens when read has no variable
11-4. Multi-line input to read
11-5. Detecting the arrow keys
11-6. Using read with file redirection
11-7. Changing the current working directory
11-8. Letting let do some arithmetic.
11-9. Showing the effect of eval
11-10. Forcing a log-off
11-11. A version of "rot13"
11-12. Using eval to force variable substitution in a Perl script
11-13. Using set with positional parameters
11-14. Reassigning the positional parameters
11-15. "unsetting" a variable
11-16. Using export to pass a variable to an embedded awk script
11-17. Using getopts to read the options/arguments passed to a script
11-18. "Including" a data file
11-19. A (useless) script that sources itself
11-20. Effects of exec
11-21. A script that exec's itself
11-22. Waiting for a process to finish before proceeding
11-23. A script that kills itself
12-1. Using ls to create a table of contents for burning a CDR disk
12-2. Badname, eliminate file names in current directory containing bad characters andwhitespace.
12-3. Deleting a file by its inode number
12-4. Logfile using xargs to monitor system log
12-5. copydir, copying files in current directory to another, using xargs
12-6. Using expr
12-7. Using date
12-8. Word Frequency Analysis
12-9. Which files are scripts?
12-10. Generating 10-digit random numbers
12-11. Using tail to monitor the system log
12-12. Emulating "grep" in a script
12-13. Checking words in a list for validity
12-14. toupper: Transforms a file to all uppercase.
12-15. lowercase: Changes all filenames in working directory to lowercase.
12-16. du: DOS to UNIX text file conversion.
12-17. rot13: rot13, ultra-weak encryption.
12-18. Generating "Crypto-Quote" Puzzles
12-19. Formatted file listing.
12-20. Using column to format a directory listing
12-21. nl: A self-numbering script.
12-22. Using cpio to move a directory tree
12-23. Unpacking an rpm archive
12-24. stripping comments from C program files
12-25. Exploring /usr/X11R6/bin
12-26. An "improved" strings command
12-27. Using cmp to compare two files within a script.
12-28. basename and dirname
12-29. Checking file integrity
12-30. uudecoding encoded files
12-31. A script that mails itself
12-32. Monthly Payment on a Mortgage
12-33. Base Conversion
12-34. Another way to invoke bc
12-35. Calculating PI
12-36. Converting a decimal number to hexadecimal
12-37. Factoring
12-38. Calculating the hypotenuse of a triangle
12-39. Using seq to generate loop arguments
12-40. Using getopt to parse command-line options
12-41. Capturing Keystrokes
12-42. Securely deleting a file
12-43. Filename generator
12-44. Converting meters to miles
12-45. Using m4
13-1. setting an erase character
13-2. secret password: Turning off terminal echoing
13-3. Keypress detection
13-4. pidof helps kill a process
13-5. Checking a CD image
13-6. Creating a filesystem in a file
13-7. Adding a new hard drive
13-8. killall, from /etc/rc.d/init.d
14-1. Stupid script tricks
14-2. Generating a variable from a loop
16-1. Redirecting stdin using exec
16-2. Redirecting stdout using exec
16-3. Redirecting both stdin and stdout in the same script with exec
16-4. Redirected while loop
16-5. Alternate form of redirected while loop
16-6. Redirected until loop
16-7. Redirected for loop
16-8. Redirected for loop (both stdin and stdout redirected)
16-9. Redirected if/then test
16-10. Data file "names.data" for above examples
16-11. Logging events
17-1. dummyfile: Creates a 2-line dummy file
17-2. broadcast: Sends message to everyone logged in
17-3. Multi-line message using cat
17-4. Multi-line message, with tabs suppressed
17-5. Here document with parameter substitution
17-6. Parameter substitution turned off
17-7. upload: Uploads a file pair to "Sunsite" incoming directory
17-8. Here documents and functions
17-9. "Anonymous" Here Document
17-10. Commenting out a block of code
17-11. A self-documenting script
20-1. Variable scope in a subshell
20-2. List User Profiles
20-3. Running parallel processes in subshells
21-1. Running a script in restricted mode
23-1. Simple function
23-2. Function Taking Parameters
23-3. Maximum of two numbers
23-4. Converting numbers to Roman numerals
23-5. Testing large return values in a function
23-6. Comparing two large integers
23-7. Real name from username
23-8. Local variable visibility
23-9. Recursion, using a local variable
24-1. Aliases within a script
24-2. unalias: Setting and unsetting an alias
25-1. Using an "and list" to test for command-line arguments
25-2. Another command-line arg test using an "and list"
25-3. Using "or lists" in combination with an "and list"
26-1. Simple array usage
26-2. Formatting a poem
26-3. Some special properties of arrays
26-4. Of empty arrays and empty elements
26-5. Copying and concatenating arrays
26-6. An old friend: The Bubble Sort
26-7. Embedded arrays and indirect references
26-8. Complex array application: Sieve of Eratosthenes
26-9. Emulating a push-down stack
26-10. Complex array application: Exploring a weird mathematical series
26-11. Simulating a two-dimensional array, then tilting it
28-1. Finding the process associated with a PID
28-2. On-line connect status
29-1. Hiding the cookie jar
29-2. Setting up a swapfile using /dev/zero
29-3. Creating a ramdisk
30-1. A buggy script
30-2. Missing keyword
30-3. test24, another buggy script
30-4. Testing a condition with an "assert"
30-5. Trapping at exit
30-6. Cleaning up after Control-C
30-7. Tracing a variable
32-1. Subshell Pitfalls
32-2. Piping the output of echo to a read
34-1. shell wrapper
34-2. A slightly more complex shell wrapper
34-3. shell wrapper around an awk script
34-4. Perl embedded in a Bash script
34-5. Bash and Perl scripts combined
34-6. A (useless) script that recursively calls itself
34-7. A (useful) script that recursively calls itself
34-8. "colorized" address database
34-9. Echoing colored text
34-10. Return value trickery
34-11. Even more return value trickery
34-12. Passing and returning arrays
34-13. Fun with anagrams
35-1. String expansion
35-2. Indirect variable references - the new way
35-3. Simple database application, using indirect variable referencing
35-4. Using arrays and other miscellaneous trickery to deal four random hands from a deck of cards
A-1. manview: Viewing formatted manpages
A-2. mailformat: Formatting an e-mail message
A-3. rn: A simple-minded file rename utility
A-4. blank-rename: renames filenames containing blanks
A-5. encryptedpw: Uploading to an ftp site, using a locally encrypted password
A-6. copy-cd: Copying a data CD
A-7. Collatz series
A-8. days-between: Calculate number of days between two dates
A-9. Make a "dictionary"
A-10. Soundex conversion
A-11. "Game of Life"
A-12. Data file for "Game of Life"
A-13. behead: Removing mail and news message headers
A-14. ftpget: Downloading files via ftp
A-15. password: Generating random 8-character passwords
A-16. fifo: Making daily backups, using named pipes
A-17. Generating prime numbers using the modulo operator
A-18. tree: Displaying a directory tree
A-19. string functions: C-like string functions
A-20. Directory information
A-21. Object-oriented database
G-1. Sample .bashrc file
H-1. VIEWDATA.BAT: DOS Batch File
H-2. viewdata.sh: Shell Script Conversion of VIEWDATA.BAT

  Next
  Introduction