Raspberry Pi for secret agents: turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!
9781849695787, 1849695784
25365MB
EnglishPages IV, 134 Seiten: Illustrationen, Diagramme
[153]Year 2013
Table of contents : Cover......Page 1 Copyright......Page 3 Credits......Page 4 About the Author......Page 5 About the Reviewers......Page 6 www.PacktPub.com......Page 7 Table of Contents......Page 12 Preface......Page 16 A brief history lesson on the Pi......Page 22 GPIO......Page 23 LAN......Page 24 Power......Page 25 Getting Raspbian......Page 26 SD card image writing in Mac OS X or Linux......Page 27 Booting up and configuring Raspbian......Page 28 Wired network setup......Page 31 Wi-Fi network setup......Page 32 Connecting to the Pi from Windows......Page 33 The importance of a sneaky headless setup......Page 34 Keeping your system up-to-date......Page 35 Summary......Page 36 Introducing the ALSA sound system......Page 38 Controlling the volume......Page 39 Testing the speakers......Page 41 Preparing to record......Page 42 Testing the microphone......Page 43 Clipping, feedback distortion, and improving sound quality......Page 44 Recording conversations for later retrieval......Page 45 Writing to an MP3 or OGG file......Page 46 Creating command shortcuts with aliases......Page 47 Keep your recordings running safely with tmux......Page 49 Listening in on conversations from a distance......Page 50 Listening on Windows......Page 51 Listening on Mac OS X or Linux......Page 53 Talking on Windows......Page 54 Talking on Mac OS X or Linux......Page 55 Distorting your voice in weird and wonderful ways......Page 56 Start on power up......Page 58 Start in a couple of minutes from now......Page 61 Bonus one line sampler......Page 63 Summary......Page 64 Meet the USB Video Class drivers and Video4Linux......Page 66 Finding out your webcam's capabilities......Page 67 Capturing your target on film......Page 69 Viewing in Mac OS X......Page 73 Recording the video stream......Page 74 Recording in Mac OS X......Page 75 Detecting an intruder and setting off an alarm......Page 76 Creating an initial Motion configuration......Page 77 Trying out Motion......Page 79 Collecting the evidence......Page 81 Preparing a webcam stream in Windows......Page 83 Preparing a webcam stream in Mac OS X......Page 84 Configuring Motion for multiple input streams......Page 85 Building a security monitoring wall......Page 86 Turning your TV on or off using the Pi......Page 88 Scheduling video recording or staging a playback scare......Page 89 Summary......Page 92 Getting an overview of all the computers on your network......Page 94 Monitoring Wi-Fi airspace with Kismet......Page 95 Preparing Kismet for launch......Page 96 First Kismet session......Page 97 Enabling rouge access point detection......Page 100 Mapping out your network with Nmap......Page 101 Finding out what the other computers are up to......Page 104 How encryption changes the game......Page 107 Shoulder surfing in Elinks......Page 108 Pushing unexpected images into browser windows......Page 109 Protecting your network against Ettercap......Page 111 Analyzing packet dumps with Wireshark......Page 113 Running Wireshark on Mac OS X......Page 115 Running Wireshark on Linux......Page 116 Summary......Page 117 Keeping the Pi dry and running with housing and batteries......Page 118 Creating a direct wired connection......Page 119 Static IP assignment on Windows......Page 120 Creating an ad hoc Wi-Fi network......Page 121 Connecting to an ad hoc Wi-Fi network on Windows......Page 123 Connecting to an ad hoc Wi-Fi network on Mac OS X......Page 124 Tracking the Pi's whereabouts using GPS......Page 125 Setting up Google Earth......Page 127 Mapping GPS data from Kismet......Page 128 Using the GPS as a time source......Page 130 Setting up the GPS on boot......Page 131 Controlling the Pi with your smartphone......Page 132 Receiving status updates from the Pi......Page 134 Tagging tweets with GPS coordinates......Page 137 Keeping your data secret with encryption......Page 139 Creating a vault inside a file......Page 140 Graduation......Page 142 Index......Page 144