My Account Log in

3 options

Wicked cool Ruby scripts : useful scripts that solve difficult problems / by Steve Pugh.

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Pugh, Steve.
Language:
English
Subjects (All):
Ruby (Computer program language).
Macro instructions (Electronic computers).
Computers--Access control--Passwords.
Computers.
Physical Description:
1 online resource (220 p.)
Edition:
1st ed.
Place of Publication:
San Francisco : No Starch Press, c2009.
Language Note:
English
System Details:
text file
Summary:
Wicked Cool Ruby Scripts is a compendium of scripts that will make your life easier by saving you time and solving problems. If you find yourself wasting effort and time on a task a trained monkey could do, it's time for Ruby to come to the rescue. Wicked Cool Ruby Scripts provides carefully selected Ruby scripts that are immediately useful. Learn how to streamline administrative tasks like renaming files, disabling processes, and changing permissions. After you get your feet wet creating basic scripts, author Steve Pugh will show you how to create powerful Web crawlers, security scripts, full-fledged libraries and applications, and much more. With each script you'll get the raw code followed by an explanation of how it really works, as well as instructions for how to run the script and suggestions for customizing it. Wicked Cool Ruby Scripts will save you from the tedium of repetitive tasks and give you back the time it would take to write scripts from scratch.
Contents:
Intro
Wicked Cool Ruby Scripts
FOREWORD
ACKNOWLEDGMENTS
INTRODUCTION
You Need Ruby Basics
Documentation
Organization and Approach
The Website
1. GENERAL PURPOSE UTILITIES
Check for Changed Files
changedFiles.rb
The Code
Running the Code
The Results
How It Works
Hacking the Script
Encrypt a File
encrypt.rb
Decrypt a File
decrypt.rb
File Splitting
fileSplit.rb
File Joining
fileJoin.rb
Windows Process Viewer
listWin Processes.rb
File Compressor
compress.rb
File Decompression
decompress.rb
Mortgage Calculator
mortgageCalc.rb
2. WEBSITE SCRIPTING
Web Page Link Validator
linkValidator.rb
Orphan File Checker
orphanCheck.rb
Running the Script
Form Generator
formGenerator.rb
The Results.
How It Works
RSS Parsing
rssParser.rb
Stock Exchange Grep
stockGrep.rb
IP Address Generation
ipAdderGen.rb
Subnet Calculator
subnetCalc.rb
3. LI(U)NIX SYSTEM ADMINISTRATION
Fixing Bad Filenames
fixFilename.rb
Adding a User
addUser.rb
Modifying a User
modUser.rb
Killing a Stuck Process
killProcess.rb
Validating Symlinks
symlinkCheck.rb
4. PICTURE UTILITIES
Mass Editing
massEdit.rb
Image Information Extraction
imageInfo.rb
Creating a Thumbnail
thumbnail.rb
Resize a Picture
resizePhoto.rb
Running the Code.
The Results
Adding a Watermark to Pictures
watermark.rb
Convert to Black and White
bwPhoto.rb
Creating a Photo Gallery
createGallery.rb
Results
5. GAMES AND LEARNING TOOLS
Sudoku Solver
sudoku.rb
Flash Cards
flashCards.rb
Number-Guessing Game
guessingGame.rb
Rock, Paper, Scissors
rps.rb
Word Scramble
wordScramble.rb
Hangman
hangman.rb
Pig
pig.rb
6. STRING UTILITIES
PDF Generator
pdfGen.rb
Word Frequency
wordFreq.rb
Comma-Separated Value Parser
csv.rb
CSV to XML
csvToXML.rb
Ruby Grep
rubyGrep.rb
Password Check
password.rb
7. SERVERS AND SCRAPERS
Define
define.rb
Automated SMS
sms.rb
Link Scrape
linkScrape.rb
Image Scrape
imageScrape.rb
Scraper
scrape.rb
Encrypted Client
RSA_client.rb
Encrypted Server
RSA_server.rb
8. ARGUMENTS AND DOCUMENTATION
File Security
fileSecurity.rb
Web Scraper
webScraper.rb
Photo Utilities
photoUtility.rb
Conclusion
9. SORTING ALGORITHMS
Bubble Sort
bubbleSort.rb
Selection Sort
selectionSort.rb
Shell Sort
shellSort.rb
Merge Sort
mergeSort.rb
Heap Sort
heapSort.rb
Quick Sort
quickSort.rb
Shear Sort
shearSort.rb
A Note About Efficiencies
10. WRITING A METASPLOIT 3.1 MODULE WITH RUBY
Introduction to Metasploit
Installation
Writing a Module
Building the Exploit
Watching in Real Time
Explanation of Metasploit Module Shell
Finding the Payload Space
A. AFTERWORD
COLOPHON.
Notes:
Description based on publisher supplied metadata and other sources.
Includes index.
ISBN:
9781593272364
1593272367
OCLC:
560644008

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account