Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Raspberry Pi for Secret Agents

Buy

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!

Overview

  • Detect an intruder on camera and set off an alarm
  • Listen in or record conversations from a distance
  • Find out what the other computers on your network are up to
  • Unleash your Raspberry Pi on the world

In Detail

Ever wished you could play around with all the neat gadgets your favorite spies use (like James Bond or Michael Westen)? With the introduction of the remarkable Raspberry Pi and a few USB accessories, anybody can now join in on the action.

Discover how to turn your Raspberry Pi into a multipurpose secret agent tool! Through a series of fun, easy-to-follow projects you’ll learn how to set up audio/video surveillance, explore your Wi-Fi network, play pranks on your friends, and even learn how to free your Raspberry Pi from the constraints of the wall socket.

Raspberry Pi for Secret Agents starts out with the initial setup of your Raspberry Pi, guides you through a number of pranks and secret agent techniques, and then shows you how to apply what you’ve learned out in the real world.

Learn how to configure your operating system for maximum mischief and start exploring the audio, video, and Wi-Fi projects. Learn how to record, listen, or talk to people from a distance and how to distort your voice. You can even plug in your webcam and set up a motion detector with an alarm, or find out what the other computers on your Wi-Fi network are up to. Once you’ve mastered the techniques, combine them with a battery pack and GPS for the ultimate off-road spy kit.

What you will learn from this book

  • Install and configure Raspbian OS for maximum mischief
  • Schedule a prank to happen when your foe least expects it
  • Listen in or talk to people from a distance
  • Detect an intruder with motion detection and set off an alarm
  • Distort your voice in weird and wonderful ways
  • Push unexpected images into browser windows
  • Knock all visitors off your Wi-Fi network
  • Control the Pi with your smartphone
  • Keep your data secret with encryption

Approach

A playful, informal approach to using the Raspberry Pi for mischief!

Who this book is written for

Raspberry Pi for Secret Agents is for all mischievous Raspberry Pi owners who’d like to see their computer transform into a neat spy gadget to be used in a series of practical pranks and projects. No previous skills are required to follow along and if you’re completely new to Linux, you’ll pick up much of the basics for free.

Apart from the Raspberry Pi board itself, a USB microphone and/or a webcam is required for most of the audio/video topics and a Wi-Fi dongle is recommended for the networking examples. A Windows/Mac OS X/Linux computer (or second Raspberry Pi) is also recommended for remote network access.

(HTML tags aren't allowed.)

A First Course in Mathematical Modeling
A First Course in Mathematical Modeling

Offering a solid introduction to the entire modeling process, A FIRST COURSE IN MATHEMATICAL MODELING, 5th Edition delivers an excellent balance of theory and practice, and gives you relevant, hands-on experience developing and sharpening your modeling skills. Throughout, the book emphasizes key facets of modeling, including creative and...

Essential Algorithms: A Practical Approach to Computer Algorithms
Essential Algorithms: A Practical Approach to Computer Algorithms

A friendly and accessible introduction to the most useful algorithms

Computer algorithms are the basic recipes for programming. Professional programmers need to know how to use algorithms to solve difficult programming problems. Written in simple, intuitive English, this book describes how and when to use the most practical...

Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...

Applied Mathematics for Science and Engineering
Applied Mathematics for Science and Engineering

Prepare students for success in using applied mathematics for engineering practice and post-graduate studies

• moves from one mathematical method to the next sustaining reader interest and easing the application of the techniques
• Uses different examples from chemical, civil, mechanical and various
...

The Mobile Application Hacker's Handbook
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...

An Introduction to the Mathematics of Finance, Second Edition: A Deterministic Approach
An Introduction to the Mathematics of Finance, Second Edition: A Deterministic Approach

An Introduction to the Mathematics of Finance: A Deterministic Approach, 2e, offers a highly illustrated introduction to mathematical finance, with a special emphasis on interest rates. This revision of the McCutcheon-Scott classic follows the core subjects covered by the first professional exam required of UK actuaries,...

©2017 LearnIT (support@pdfchm.net) - Privacy Policy