User Tools

Site Tools


blog:spring2016:hheath:journal

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
blog:spring2016:hheath:journal [2016/03/01 04:49] hheathblog:spring2016:hheath:journal [2016/05/05 03:59] (current) hheath
Line 216: Line 216:
 **Pro tip** – Don’t forget to close your file. fclose($fh); **Pro tip** – Don’t forget to close your file. fclose($fh);
  
-====February 29, 2016====+====FEBRUARY 29, 2016====
  
 ==Week 7== ==Week 7==
Line 259: Line 259:
  
 At this point, I want to explore thickening the line weight and maybe playing with the color(s). Note: make these changes! At this point, I want to explore thickening the line weight and maybe playing with the color(s). Note: make these changes!
 +
 +
 +====MARCH 7, 2016====
 +
 +==Week 8==
 +
 +This week's exploration into PHP landed us in the world of drawing apparatus'. We cooked up a clever html/php concoction that allowed the user to choose certain specs from a given selection. Based on those chosen specs the output is displayed to the user in a web page.
 +
 +Using html we created a table within a submission form. On submit the form data is sent to a file called draw.php using the post method. The draw.php file processes the data from the drawerer.html file and displays the output to the user in a png image. It does this by storing all the “posted” values into an associative array called $_POST. 
 +
 +  $width = $_POST["width"];
 +
 +A post request never caches, doesn't remain in the browser history, has no restrictions on data length and cannot be bookmarked. Hitting the back button requires re-submitting the information typically after alerting the user about the data re-submission.
 +
 +The html input options for the user explored the use of radio buttons, check boxes and submit buttons.  Using the “checked” option at the end of the input type allows the checkbox or radio button to automatically load with the specified value selected.
 +
 +  <input type="radio" name="bcolor" value="teal" checked /> Teal
 +  <input type="checkbox" name="fill" value="fill" checked /> 
 +
 +The draw.php file starts out with a call to the header(), which outputs an image in the form of a png file. 
 +
 +  header("Content-type: image/png");
 +
 +$_POST is an associative array of variables passed to the current script.  The isset() function checks to see whether a variable is set and is not null. If a variable is already unset with the unset() function, it will no longer be set and isset() will return FALSE if the testing variable contains a NULL value.
 +
 +  if  (isset($_POST[“fill”]))
 + $fill  =  $_POST[“fill”];
 +  else
 + $fill  = “no”;
 +
 +Next, we mix up some colors in our virtual palette using the imagecolorallocate () function and then we start running through our loops to check which values the user selected. Parameters are passed depending on which selections were chosen. 
 +
 +
 +====MARCH 14, 2016====
 +
 +==Week 9==
 +
 +This week we tinkered with various things and added to our collection of example codes. Using a native php extension called Imagick we created and modified an image. The ImageMagick API is extensive and capable of creating, editing, and composing bitmap images as well as reading, converting, and writing images in over 100 formats.
 +
 +The magick.php file holds the all the image trickery discussed in the following ramblings. The first few lines of our code after the header creates a thumbnail by “newing up” the Imagick object. 
 +
 +  $image = new Imagick('mudkip.jpg');
 +  $image -> thumbnailImage(320, null);
 +
 +The next little ditty of code creates a reflection of the mudkip by flipping it and overlaying a gradient on top of the image. Then both images (the original and reflection) are overlayed onto a canvas.
 +
 +This line of code creates a white border around the image. 
 +
 +  $img -> borderImage(new ImagickPixel("white"), 5, 5);
 +
 +It might be beneficial at this point to stop and attempt to explain the arrow in the line of code above. It's called an arrow operator (->) and is used in object scope to access the members and properties of an object directly from its address. The content on the right of the operator is a member of the  "newed up" or instantiated object passed to the variable on the left side of the arrow operator. A more familiar approach to this is to use a dot (".") operator to access the methods and properties of instantiated objects. In php the dot operator is used to concatenate strings. 
 +
 +The next step is to clone the image and flip it. This is accomplished in the next two lines using the clone() and flipImage() functions. The clone() function creates an object copy by copying all of the object’s properties. The flipImage() function creates a vertical mirror image of the object by reflecting the pixels around the center x-axis.
 +
 +  $reflection = $img -> clone();
 +  $reflection -> flipImage();
 +
 +It is now time to create the gradient that will be overlayed on the reflection 
 +
 +  $gradient = new Imagick();
 +
 +Creates a gradient large enough to encompass the image and the borders.
 +
 +  $gradient -> newPseudoImage($reflection -> getImageWidth() + 10, $reflection -> getImageHeight() + 10,   
 +  "gradient:transparent-black");
 +
 +Composite the gradient on the reflection by combining the two images.
 +
 +  $reflection -> compositeImage($gradient, imagick::COMPOSITE_OVER, 0, 0);
 +
 +Here’s another foreign symbol worth mentioning ("::"). The double colon is a scope resolution operator that allows access to static, constant, and overridden properties or methods of a class. 
 +
 +Add some opacity to the image.
 +
 +  $reflection -> setImageOpacity( 0.3 );
 +
 +Next we create an empty canvas large enough to hold both images and set its format to a png.
 +
 +  $canvas = new Imagick();
 +  $width = $img -> getImageWidth() + 40;
 +  $height = ($img -> getImageHeight() * 2) + 30;
 +
 +  $canvas -> newImage($width, $height, new ImagickPixel("black"));
 +  $canvas -> setImageFormat("png");
 +
 +Combine the original image and the reflection onto the canvas.
 +
 +  $canvas -> compositeImage($img, imagick::COMPOSITE_OVER, 20, 10);
 +  $canvas -> compositeImage($reflection, imagick::COMPOSITE_OVER, 20, $img-> getImageHeight() + 10);
 +
 +The last two lines output the image.
 +
 +  header("Content-Type: image/png");
 +  echo $canvas;
 +
 +====MARCH 21, 2016====
 +
 +==Week 10==
 +
 +This week we welcomed our first official project: Monte Carlo Pi. The concept started as an homage to Pi day and blossomed into a project type thing. 
 +
 +**A Little Background Information**
 +
 +The Monte Carlo method is a class of computational algorithms relying on pseudo random samplings to obtain numerical results. The method is useful for obtaining numerical solutions to problems that are too complex to solve otherwise. 
 +
 +We started with a PHP program that calculated Pi by generating pseudo random numbers, which were then counted by how many landed within the circle and how many landed in the square. We then multiplied by four the number of iterations that fell within the circle and divided that outcome by the number of iterations that fell in the square. 
 +
 +**The Math Explained**
 +
 +Full disclosure I am "appropriating" this explanation from the interwebs because, well…math.
 +
 +The area of a circle is equal to:
 +
 +  area = Pi * (radius * radius)
 +
 +The area of a square is equal to:
 +
 +  area = s₂ or length of one side * length of one side
 +
 +When you enclose a circle within a square the length of one side of the square is equal to 2 * the radius of the circle. 
 +
 +The area of the square is equal to:
 +
 +  area = (2 * radius) * (2 * radius) = 4 * (radius * radius) 
 +
 +Dividing the area of the circle by the area of the square yields Pi/4. To get the value of Pi we multiply the area of the circle by four and divide the result by the area of the square surrounding the circle.
 +
 +[[http://mytinylab.com/20101020_MonteCarloSimulationToCalculatePiInPHP]]
 +
 +**The Code**
 +
 +Now for a look at the code that runs all that complicated math.
 +
 +We start by declaring and defining our variables. 
 +
 +The number of iterations it takes to estimate Pi
 +  $iterations  = 35000;          
 +
 +The radius of the circle 
 +  $radius = 1.00; 
 +
 +Calculate radius squared         
 +  $radiusSquare  = $radius * $radius;            
 +
 +  $count   = 0;
 +  $init    = 0;
 +
 +Next up is the for loop.
 +
 +  for ($iters = 0;  $iters < $iterations;  $iters++) 
 +  {
 +    $x = lcg_value();     -- random x-coordinate 
 +    $y = lcg_value();     -- random y-coordinate 
 +
 +The lcg_value() math function in PHP returns a pseudo random float value in the range of (0,1). For both the x and y coordinates a random number from 0 to radius or 1 because we set the value of radius to 1 is chosen.
 +
 +The coordinates inside the square of the radius
 +  $isin   = ($x * $x) + ($y * $y);    
 +
 +  if ($isin  <= $radiusSquare)      
 +  {
 +  Count the number of points in the circle
 +    $init = $init + 1;       
 +   }
 +  }
 +
 +The number of points inside the square
 +  $pi = ($init * 4) / $iterations;    
 +
 +Originally we output the results to the browser in text format.
 +
 +  # in the square: 35000
 +  # in the circle: 275001
 +  pi = 3.1428685714286
 +
 +Finding the results visually boring it was decided that we incorporate our results into a visually stimulating graph. Thus a project was crafted. The challenge laid before us was to graphically plot the points of the original text output onto a circle within a square. 
 +
 +
 +====APRIL 4, 2016====
 +
 +==Week 11==
 +
 +Coming off break week, I have nothing exciting to report. We buttoned up our Monte Carlo Pi PHP program before break began, which leaves us open to starting something new this week.
 +
 +In last week’s OPUS, post I broke down the PHP code used to calculate Monte Carlo Pi and left off with a tantalizing pointer to a project. This week I will break down the code for implementing the Monte Carlo Pi code into a graphical display of goodness involving rectangles, circles, and pixels.
 +
 +The first step was to figure out how to visually display the graph in a web browser. I started by wrapping everything in HTML tags and then went on to create the graph (rectangle, nested circle, and plotted points) in PHP. It functioned, output a bordered rectangle with a nested circle, and plotted points. I abandoned this method and moved to what is the “final” version of the project after realizing that all the steps could be accomplished using only PHP. 
 +
 +**The Code**
 +
 +First up is creating the container for the graph.  Leaving an extra 100 pixels on the height allows room to add the string output of the plotted point count at the bottom of the graph.
 +
 +  $img = imagecreatetruecolor(800, 900);
 +
 +
 +Next step is to mix up our virtual palette of colors. One color example is listed below.
 +
 +  $redish = imagecolorallocate($img, 100, 0, 0);
 +
 +
 +**Now for the graph**
 +
 +Start by creating a rectangle to hold the nested circle and plotted points.
 +
 +  imagefilledrectangle($img, 0, 0, 800, 800);
 +
 +The allotted x and y coordinates fill the container created above with the exception of 100 pixels at the bottom, which is reserved for output that’ll be explained later. 
 +
 +To nest a circle in the rectangle you can use either the imagefilledellipse() or imagefilledarc() function. I chose the arc function.
 +
 +  imagefilledarc($img, 400, 400, 600, 600, 0, 360, $redish, IMG_ARC_PIE);
 +
 +imagefilledarc draws a partial arc centered at a specified coordinate with the image. It takes nine parameters listed below.
 +
 +  * $img is the image resource returned by imagecreatetruecolor
 +  * The x-coordinate (400) and y-coordinate (400) of the center
 +  * The width (600) and height (600) of the arc 
 +  * The starting (0) and ending angle (360), in degrees of the arc
 +  * A color identifier chosen from our virtual palette ($redish) 
 +  * A style (IMG_ARC_PIE), which produces a rounded edge
 +
 +After the creation of the rectangle and nested circle add the Monte Carlo Pi function explained last week with a few modifications. 
 +
 +The for loop was modified to reflect the multiplication of the rectangle size by the lcg_value(). 
 +
 +  $x = lcg_value();      800;
 +  $y = lcg_value();      800;
 +
 +After the closing of the if statement, but before the closing of the for loop insert the function to display the plotted points using pixels. imagesetPixel draws a pixel at the specified coordinate using an image resource parameter ,  x-coordinate and y-coordinate and color identifier.
 +
 +  imagesetPixel($img, $x, $y, purple);
 +
 +The Monte Carlo Pi function now displays in a graphical format. To add the original output text to the bottom of the graph use the imagestring() function. This function draws a horizontal string at given coordinates.
 +
 +It takes six parameters listed below.
 +
 +  * $img is the image resource returned by imagecreatetruecolor
 +  * Font uses a number between 1-5 for built-in fonts in latin2 encoding
 +  * The x-coordinate of the upper left corner
 +  * The y-coordinate of the upper left corner
 +  * The width (600) and height (600) of the arc 
 +  * The string to be written to the specified coordinates
 +  * A color identifier chosen from our virtual palette ($green) 
 +
 +Example:
 +
 +  imagestring($img, 3, 75, 820, “# in the square: $iterations”,  $green); 
 +  imagestring($img, 3, 75, 840, “# in the circle: $init”,  $green); 
 +  imagestring($img, 3, 75, 860, “pi =  $pi”,  $green); 
 +
 +
 +This concludes the breakdown of the code for Monte Carlo Pi.
 +
 +====APRIL 6, 2016====
 +
 +==Week 11==
 +
 +Bonus post.
 +
 +Our next project is Show and Tell. Unfortunately, it does not involve exploding volcano’s, slimy frogs, or baking soda and vinegar rockets.  However, it does allow for some creative thinking in PHP. The objective is to pick something interesting in relation to PHP and implement/explore it to gain a deeper understanding of it’s functionality.  The final presentation is in a web-accessible format for all to view. 
 +
 +Some ideas I am interested in exploring.
 +
 +  * Create a PHP photo gallery using the exif function
 +  * Databases and PHP
 +  * Create a PHP/MySQL powered forum from scratch
 +  * Management Systems
 +
 +Not sure what direction I want to take at this point. 
 +
 +====APRIL 13, 2016====
 +
 +==Week 12==
 +
 +For the Show and Tell project I chose to explore photo galleries using PHP. In my explorations I found several ways to implement a photo gallery using strictly PHP, PHP and jQuery, PHP and SQL, and PHP and Ajax. In addition, galleries have multiple storage options. Some galleries are created and stored in databases using MySQL and other galleries are created and stored in folders on the web server. I found a really old but very informative tutorial on creating an automated PHP gallery system using PHP, MySQL, GD and ImageMagick on the SitePoint website. It walks you through the process of setting up the database schema and building a browser-based uploading system, which sets up an index within the tables, stores the files, and automatically builds thumbnails. 
 +
 +Ultimately, I settled on something a little less complicated for a first timer. I chose to create a photo gallery using strictly PHP. I am working through the code to display the images as thumbnails until clicked where they are displayed full size. I need to upload some images to the server to test the code. I anticipate a good amount of troubleshooting to get everything processing correctly. Also, I need to figure out how to create the thumbnails. I have seen code that automatically does this process, which I’ll have to explore further. If I can get the initial photo gallery working I’d like to attempt to add a watermark feature to each image, but that is not a critical component at this time.
 +
 +====APRIL 20, 2016====
 +
 +==Week 13==
 +
 +The end of the semester is fast approaching as noted by the influx of final papers/projects being deployed. In fact, our very own EoCE has just deployed. Before delving to depths of the abyss with this experience I will take one last post to explain the code associated with the Show and Tell project that I am working on. 
 +
 +First up is the variable declaration. These variables are used to declare the columns displayed, location of the thumbnails, and location of the full size images used in the gallery.
 +
 +  $images = "image_gallery/";  // Location of thumbnails
 +  $big    = "big/";  // Location of full size images
 +  $cols   = 2;  // Number of displayed columns 
 +
 +$images builds the contact sheet or “thumbnails”.
 +
 +Next step is to open the directory containing the images and loop through it to add the image files to an array. The first line of the if statement opens the directory where all of the images are stored. The while condition loops over the directory and adds every file it finds to an array called $files[]. The readdir function reads entries from the directory handle and returns the name of the next entry in the directory. Entries are returned in the order they are stored by the filesystem. Any directory entry name that evaluates to FALSE will stop the loop. The nested if statement prevents the . (the current directory), .. (the directory one level up), and the $big directory from being added to the array. If displayed in the browser, they would show as broken links. Any file in the $images directory is added to the array and rendered as an image so be careful what you place here. The closedir function closes the directory handle opened by the opendir function.
 +
 +  if ($handle = opendir($images)) { 
 +    while (false !== ($file = readdir($handle))) { 
 +       if ($file != "." && $file != ".." && $file !=       rtrim($big,"/")) { 
 +           $files[] = $file; 
 +       
 +   
 +   closedir($handle); 
 +  }
 +
 +
 +Now it’s time to output the table that displays the images. The goal here is to display the thumbnails as a contact sheet while linking each to its full size image. The first echo statement outputs the first part of the table. The first line in the for loop tests whether $colCtr (initialized to 0 before the loop) is of equal value to $col (number of columns to display). If yes, the table row closes, a new row is opened and an hr line break is used to separate the rows. The next echo statement creates a link to the full size images. The output is an a href attribute that specifies the link’s destination. In this case the link is built using the variables defined earlier in the code, $image, $big, and $file. The img src attribute outputs the image using $image. $file. The last step before closing the table is to increment the $colCtr variable to output the number of columns needed for displaying the images. 
 +
 +
 +  $colCtr = 0; 
 +
 +  echo '<table width="100%" cellspacing="3"><tr>'; 
 +
 +  foreach($files as $file) 
 +  { 
 +  if($colCtr %$cols == 0) 
 +    echo '</tr><tr><td colspan="2"><hr /></td></tr><tr>'; 
 +  echo '<td align="center"><a href="' . $images . $big .   $file . '">
 +  <img src="' . $images . $file . '" /></a></td>'; 
 +    $colCtr++; 
 +  } 
 +
 +  echo '</table>' . "\r\n";
 +
 +In comparing the process of creating a basic photo gallery using PHP and HTML/CSS it appears PHP has the advantage. The code is more streamlined meaning it uses far less steps to accomplish the same end result.
 +
 +
 +====APRIL 27, 2016====
 +
 +==Week 14==
 +
 +The countdown to the end of the semester is approaching warp speed. The end is nigh. It’s final crunch time for end of semester presentations and projects, which some are scrambling to complete. I am slowly whittling away at the EoCE. I have started 0x0, draw a picture reflecting your interpretation of “April showers bring May flowers.” Conceptually, I have an image floating around in my head and to date the “creation” has closely represented said image. The only constraints I foresee with this task is my indecisive nature steering me off the plank and into the abyss. 
 +
 +I have discovered that the imagefilledpolygon function in PHP has the capability to draw a triangle using an array to define its points. My initial use for the triangle was to add texture to the grass section of the image, but after seeing the output I have discovered other uses for the imagefilledpolygon. Immediately after seeing the sharply pointed, pink object appear on the screen I wanted to use it to represent the sun’s rays. The challenge is figuring out how to wrap it around the outside edge of the imagefilledarc. This is something I need to explore as it may be beyond my skill level. 
 +
 +I have also started thinking about the binary table as I feel this may cause me to bang my head against a wall. I am exploring methods and ideas but haven’t settled on something solid yet. 
 +
 +
 +====MAY 4, 2016====
 +
 +==Week 15==
 +
 +This entry marks the last week of classes for the semester and therefore the last blog post for PHP. It’s been a semester full of fun and exciting new explorations. I’ve learned that PHP is not just for querying a database, drawing pictures is an excellent way to learn a new programming language, and there is a whole world of memes that lure you into a time suck. 
 +
 +Still working on the EoCE. Progress has slowed as I needed to focus on other courses, but with most other projects behind me I can return to drawing pictures, creating meme’s and binary tables. 
 +
  
  
Line 391: Line 735:
 The octal2ascii.c file is c source, ASCII text. Open in a text editor and read the comment section. The c code is a helper program that takes data from STDIN, converts it, and displays it to STDOUT. Follow the directions to compile the code using the correct file names (gcc octal2ascii.c –o octal2ascii). This creates an executable file that can be used like any other tool in your UNIX arsenal. To be continued… The octal2ascii.c file is c source, ASCII text. Open in a text editor and read the comment section. The c code is a helper program that takes data from STDIN, converts it, and displays it to STDOUT. Follow the directions to compile the code using the correct file names (gcc octal2ascii.c –o octal2ascii). This creates an executable file that can be used like any other tool in your UNIX arsenal. To be continued…
  
-====February 29, 2016====+====FEBRUARY 29, 2016====
  
 ==Week 7== ==Week 7==
Line 436: Line 780:
  
 I have started this little ditty and am finding it quite fun to create. Not going to give any spoilers because the project isn’t complete and I’ve hit a creative roadblock. I will update this post as soon as I unblock and finish the adventure.  I have started this little ditty and am finding it quite fun to create. Not going to give any spoilers because the project isn’t complete and I’ve hit a creative roadblock. I will update this post as soon as I unblock and finish the adventure. 
 +
 +
 +====MARCH 7, 2016====
 +
 +==Week 8==
 +
 +
 +For those sensitive to the well being of the animal kingdom please refrain from reading the next line. This week we killed cats! Not the fury, hairball coughing kind but the process running kind related to the "cat" command. 
 +
 +Process management or the windows equivalent "task manager" shows every process running on your machine. Every command run has a numeric number or process ID associated with it and when "ps" is typed at the command prompt, a table is displayed listing the various information about each running process. 
 +
 +Killing things is a way of terminating sending signals to processes. The operating system communicates with processes. The default action is to terminate if process does not have a signal.
 +
 +The command to send a signal to a process is "kill". The syntax is:
 +
 +  Kill –signal PID
 +
 +Kill –l shows 64 ways to kill a process. When typed at the command prompt it lists all of the kill commands. Signals are actually not about killing but communicating. 
 +
 +**"Killing" cats a brief tutorial.** 
 + 
 +  To "kill" cat.
 +
 +    * Type ‘cat’ in one Lab46 terminal (1)
 +    * Type ‘ps’ in another Lab46 terminal (2)
 +    * Find the process id (PID) number of cat 
 +    * In terminal 2 type, “kill -1 ‘cat’s PID’”
 +    * Watch what happens to cat in terminal 1.
 +    * Boom! You just killed a cat!
 +
 +**Useful killing knowledge:**
 +
 +“SIGBUS” A signal is sent to the processor because something is off balance. More specifically, it is when you access mapped memory that doesn’t correspond to a file. 
 +
 +“SIGFPE” is a floating-point exception issued when an illegal math operation is attempted.
 +
 +“SIGKILL” The ultimate kill. Absolute termination of a process without performing any cleanup operations.
 +
 +
 +We now transition from the process of killing cats to an undead state. Zombies! Not the supernaturally reanimated ones, these zombies wreak havoc on the process state. A zombie process state occurs when a child process dies before the parent process. Zombies eat random resources, are unpredictable, and when they become dislodged from the operations process can’t be killed. When a child process spawns or forks the process terminates, but creates a return value. If too much time passes before the parent collects its remains, the process becomes a zombie. If this happens try launching a tactical nuke or just use the ultimate kill command, “SIGKILL”. 
 +
 +**Kill order:**
 +
 +  - hang-up 
 +  - interrupt
 +  - hang-up
 +  - nuke
 +
 +SIGTERM (kill #15) is the default kill for a process when  the command “kill PID” is issued without a kill number following the PID.
 +
 +
 +**Project Notes:**
 +
 +Due to an unforeseen illness, I have zero project notes to date. Will update when completed.
 +
 +
 +====MARCH 14, 2016====
 +
 +==Week 9==
 +
 +This week's adventure is all about scripting (in bash). Scripts unlock super powers, which is pretty amazing considering they are just files containing ASCII text. 
 +
 +__Shell variances:__
 +      * Sh—bourne shell
 +      * Bash—bourne again shell
 +
 +**Bash Scripting**
 +
 +Start every bash script with a shabang/shebang, tomehtoe/tomahtoe. 
 +
 +  #!/bin/bash
 +  #script2.sh
 +  #
 +
 +This first line tells the shell what program to use when interpreting the script. The example above uses /bin/bash/. The second line is a comment (#) and ignored by bash since it appears after the # symbol. It is good practice to comment your scripts. 
 +
 +Always end your script with an exit or end. Exit status is a return value issued from a terminating command. The value is an integer between 0 and 255 an indicates the success or failure of the command's execution. A value of 0 is a success and a non-zero is a failure. The true command always executes successfully and the false command always executes unsuccessfully. Set the exit status of your script when it's finished. This causes the script to terminate immediately and sets the exit status to the given value as an argument.
 +
 +To execute a script, it needs to have the proper file permissions. Quit out of the text editor and at the command prompt type:
 +
 +  Chmod 755 script2.sh
 +
 +The 755 gives you read, write, and execute permissions. 
 +
 +To run the script, type the following at the command prompt:
 +  ./script2.sh
 +
 +This is a specified path issued on the command line that tells the shell where to find the executable file. To have bash show you the steps it takes when running your script add a "-x" to the first line of your script. Bash displays each line as it executes it.
 +
 +  #!/bin/bash -x
 +
 +
 +**Bash has if statements!**
 +
 +The if statement makes a decision based on the exit status of a command. When you have an if statement you must have exactly:
 +
 +**1 if**
 +
 +Syntax:
 +
 +  If  [ “$val” = “hello” ]; then
 +     commands/do something
 +  fi
 +
 +
 +**0 or 1 else statements (always at the end)**
 +
 +Syntax:
 +
 +  If  [ “$val” = “hello” ]; then
 +    commands/do something
 +  else
 +    commands/do something
 +  fi
 +
 +**0 or more elif statements**
 +
 +Syntax:
 +
 +  If  [ “$val” = “hello” ]; then
 +    commands/do something
 +  elif [  .………….……….  ]; then
 +    commands/do something
 +  else
 +    commands/do something
 +  fi
 +
 +You can also have nested ifs and compound stuff. 
 +Compound:
 +  If [ command ] && [ condition 2 ]; then
 +
 +**Command Line Scripting**
 +
 +Anything you type in a command line can be typed in a script. The square brackets command can be used when scripting on the command line.  
 +  [ $num -lt $val ]
 +
 +Quotes make a valid string. Use them around your strings.
 +
 +  [ "$val" = "hello" ] && echo "true" || echo "false"  //Everything is a string.
 +
 +**Protip:**
 +
 +Square brackets don’t like to touch things except the semi-colon. 
 +
 +
 +**Binary Control**
 +
 +Binary control or bc is an arbitrary precision calculator language or calculator function run at the command prompt. By default, it is in integer mode. ibase(input base) and obase (output base) are special variables that define the conversion base for input and output numbers. To switch to another base type "obase=2 or ibase=2" at the command prompt. "Bc -l" gives decimals.
 +
 +
 +**Miscellaneous Tips:**
 +
 +  * # is the comment symbol for bash scripting
 +  * When scripting in bash assume everything is a string.
 +  * Curly braces isolate variable names.    Num6=${num2}1${num4}
 +
 +Logical operators chain commands together and can be used on the command line.
 +&&--the AND logical operator
 +||--the OR logical operator
 +
 +
 +**Project Notes:**
 +
 +Preliminary investigation yields the following results:
 +
 +Absolute mindbender.
 +
 +
 +====MARCH 21, 2016====
 +
 +==Week 10==
 +
 +**Endianness and Etymology** 
 +
 +The concept of Big-Endian and Little-Endian was first introduced by Danny Cohen in 1980 who derived his byte ordering names from a segment of Johnathan Swift’s “Gulliver’s Travels.” 
 +
 +**Endianness Explained**
 +
 +Endianness is the arrangement or storage of bytes (binary data). Big-Endian is where the most significant byte of a multi-byte data field is stored at the lowest memory address. Little-Endian is where the least significant byte of a multi-byte data field is stored at the lowest memory address. Thus creating a Big vs Little feud. Fact: there are 256 unique values in 1 byte.
 +
 +Big-endian = B0 CF 
 +Little-endian = CF B0
 +
 +
 +**Regular Expressions**
 +
 +A regular expression or regex is a sequence of characters that define a search pattern. Most commonly used with strings to perform pattern matching operations. Often considered a jacked up wildcard. 
 +
 +Requirements:
 +Know your data! If you do not know what you want, you have no business poking around the data. Knowing the data allows you to make more intelligent requests.
 +
 +
 +Regex Symbols
 +
 +  . (dot) matches any single character
 +  * O or more of the previous; cannot use by itself; pair it with something before it 
 +  [    ] character class, match any one of the enclosed characters
 +  [^  ] inverted character class; do not match any one of the enclosed characters
 +  \< match start of word
 +  \> match end of word
 +  ^ match start of line
 +  $ match end of line
 +  ? match the preceding 0 or 1 times. 1 time optionality - It’s either there or not. Pair it.
 +  + 1 or more of the previous. Not all tools support this.
 +
 +The grep command is used to match patterns within a text file. 
 +
 +__Example__
 +
 +Wander into the dictionary and start searching. 
 +
 +Find all of the 4 character lines in the dictionary.
 +
 +  cat words | grep  ‘^….$’ | wc -l
 +
 +
 +Extended Regex Symols
 +
 +          (    Group together
 +  sed ->  \( \) Group together
 +            |         Logical OR
 +
 +The egrep command is used to match patterns within a text file. 
 +
 +__Example__
 +
 +Wander into the dictionary and start searching.
 +
 +Find all words that start with M followed by ic, ou.
 +
 +  cat words | egrep ‘^m(ou|ic)’ | wc -l
 +
 +
 +**Project Notes:**
 +
 +Preliminary investigation yields the following results:
 +
 +Absolute mindblender.
 +
 +
 +====MARCH 28, 2016====
 +
 +==Week 11==
 +
 +It’s break week and I have taken a chunk of time to organize my notes from the last few weeks so this post is going to be a modge podge of things that failed to make it in the previous entries.
 +
 +
 +**Data**
 +
 +All binary is text data, but not all text is binary.
 +Text—vi, cat, head, tail, echo all deal with text.
 +Binary—not encoded in ASCII.
 +
 +
 +**All About the Double 'd'**
 +
 +The 'dd' command is your main tool for the udr0 project and it makes an appearance in udr1 when overlaying the backup onto disk.image. 'dd' (data dump or data duplicator) is cat on steroids. It reads from stdin and writes to stdout unless otherwise specified by the if (input file) and of (output file) options. To use give it a set of flags. A report of the ‘records in’ and ‘records out’ is displayed as an output message after the 'dd' command executes. ‘dd’ likes decimal data (base 10) if not in base 10 convert first. 
 +
 +
 +**Syntax of ‘dd’ command:**
 +
 +  dd if=<source file name> of=<target file name [Options]
 +
 +
 +**Examples:**
 +
 +  dd if=/etc/motd of=newfile bs=512 count=1
 +
 +The ‘if’ stands for input file, ‘of’ stands for output file, ‘bs’ stands for the block size (number of bytes to be read/write at a time), and ‘count’ refers to the number of input blocks to be copied.
 +
 +The default value for input and output block sizes is 512 bytes (one sector)
 +
 +//To Use dd as cat://
 +
 +  dd if=/etc/motd of=/dev/tty
 +
 +
 +//To Use dd as copy://
 +
 +  dd if=/etc/motd of=newfile
 +
 +
 +**Project Notes:**
 +//udr1—Data Recovery//
 +
 +New this year is a mind numbing data recovery experience. This week’s project delves deep into the realm of abstraction and roots around the topic of raw data management and data recovery in relation to hard drives and partition tables. 
 +
 +__Useful Information__
 +
 +The Master Boot Record (MBR) is located on the first sector (one sector is equal to 512 bytes) of the hard drive. It contains the Master (or Primary) Partition Table information needed to determine the starting sectors and overall sizes of each partition needing extraction. The primary partition table is 64 bytes of the 512 byte MBR. The Partition Table contains four 16 byte entries and thus can have no more than four Primary partitions. 
 +
 +//Restoration://
 +
 +The dd command has the ability to modify data in a specified place. 
 +
 +//Example://
 +
 +dd if=<source file name> of=<target file name> bs=1 conv=notrunc
 +
 +This command overwrites the first 512 bytes of a file. The notrunc option means do not truncate the output file. If the target file already exists, replace the specified bytes and do not touch the rest of the target file. 
 +
 +To be continued…
 +
 +
 +====APRIL 6, 2016====
 +
 +==Week 11==
 +
 +Bonus Post.
 +
 +Coming off break week, I find myself grappling with the abstract concepts of the udr series of labs. Each progression in the series catapults you further down the rabbit hole. It is clear that my natural sandbox is not in data storage or recovery at the bit level. I am more comfortable dissecting work from Willem de Kooning, Franz Kline or Jackson Pollock during the Abstract Expressionism period. 
 +
 +As I muddle through these labs, I find I am gaining a deeper understanding of  how partition tables and data packets work. Two extremely useful commands in the labs’ arsenal are dd and search. These are your friends throughout the duration of this mind numbing, but educational experience. The most difficult concept was finding a starting point. Once found things started to make more sense and flow smoother.  If there is a follow-up post then I survived the udr series.  Otherwise, I never found my way out of the rabbit hole. 
 +
 +====APRIL 13, 2016====
 +
 +==Week 12==
 +
 +Review week and more bash scripting. We’ve been adding more bash examples to our arsenal of scripting files this week. This should prove useful with our next project on grade calculations. Remember that the proper use of quotes matters and backticks are not single quotes. Single quotes are literal quotes meaning that it searches for what is literally within the ‘quotes.’ 
 +
 +
 +**Project Notes:**
 +
 +Upr0—UNIX Permission Review
 +
 +This week’s project schooled procrastinator’s in the art of time management while reviewing file permissions. A concept we explored early in the semester and something we are currently using with bash scripting. 
 +
 +Files in Unix have three permission attributes: owner, group, and other or world. Owner permissions determine what privileges the file owner has on the file. Group permissions determine what privileges a user in a group that a file belongs to has on the file. Other or world permissions determine what privileges all other users have on the file. Each file permission is broken into groups consisting of three characters per group. The three characters are read, write, and execute. The first two are self-explanatory and the execute bit grants the user privileges to run a file as a program. All three are associated with a numerical value—read (4), write (2), execute (1), which is used to change the file permission. A dash (-) in the place of a numerical value represents nothing or (0). Adding up the values in each group results in a value with a range between 0 and 7. 
 +
 +Example:
 +
 +  srwx--x-w- (712)
 +
 +The ‘s’ is the file type and changes with depending on the file. Watch out for these in the project they can trip you up at first. The ‘rwx’ represents a value of 7 and grants access to all privileges in the owner field.  The ‘--x’ grants executable access to members of a group owning the file and ‘-w- ‘gives write privileges only to all other users.
 +
 +Special file permissions surface about halfway through the project. These permissions allow the user running an executable file to assume the ID of the owner of the file. The setUID permission has a numerical value of 4 and is displayed in owner permissions in the executable field. The setGID has a numerical value of 2 and is displayed in the group permissions in the executable field. The sticky bit has a numerical value of 1 and is displayed in the other or world permissions in the executable field. If an executable bit is set the setUID or setGID represented by an ‘s’ will be lowercase and if no executable fields exists, then the bit is uppercase. The same rule applies to the sticky bit except it is represented by a ‘t’. 
 +
 +Example:
 +
 +  dr-sr-srwt (7557)
 +
 +The file type field is set to a directory as noted by the 'd' at the beginning of the file permission. The ‘r-s’ represents a value of 5 for the regular permissions and 4 for the special permissions and the ‘rwt’ presents 7 for the regular permissions and 1 for the special permissions. Add up the special permissions and put that value in front of the regular permissions.
 +
 +
 +The chmod command is used to change the permissions of a file or directory. Specify the numerical permission settings followed by the file or directory name you want to modify. 
 +
 +  chmod 6777 file1.txt
 +
 +This concludes the review session.
 +
 +====April 20, 2016====
 +
 +===Week 13===
 +
 +
 +For the last two weeks or so we have been exploring the use of regular expressions. Regular expressions are used in conjunction with several different commands such as sed, ed, awk, and grep. We have focused primarily on sed and grep. Here is a brief recap of the commands and their syntax. 
 +
 +The grep command mentioned in an earlier post, but not fully explored searches standard input or text within a file for string patterns and prints any lines matching the specified pattern to stdout (the terminal).
 +
 +It’s syntax is:
 +
 +  grep [options] PATTERN [FILE…]
 +  grep [options] [-e PATTERN | -f FILE] [FILE…]
 +
 +The sed command or stream editor is invoked by sending data to it through a pipe. The data sent passes through sed and goes to stdout without changing the input file.
 +
 +It’s syntax is:
 +
 +  /pattern/action
 +
 +Where pattern is a regular expression and action is a command given. The slash characters are used as delimiters. Sed is line oriented meaning if you are using the substitute (s) command it will only replace the first instance of the string being replaced. If you have an input line that reads “One fish, Two fish, Red Fish, Blue fish.” and you want to replace “fish” with “FISH” by default sed will only replace the first instance of fish with FISH. 
 +
 +**Miscellaneous Notes**
 +
 +Single quotes are literal quotes. Searches for what is literally within the ‘quotes.’
 +
 +Printf “%&s “ “ “   right justifies by default. “%$s “ ” ” adds padding value. 
 +Printf “%-3s ”   Negates padding value (left justify) 
 +
 +
 +====April 27, 2016====
 +
 +===Week 14===
 +
 +The end of the semester is upon us and the EoCE for UNIX has been deployed. Gulp! I have started to tackle the first problem, 0x0: Script Analysis, and found that once I created and ran the script I had a much better understanding of what it was doing. With my nerves eased I was able to settle in and begin answering the questions pertaining to the various components of the script. I have my responses captured in screen shots and randomly written on paper I just need to add them to the blog. This brings me to the next problem, 0x1: super puzzlebox 2 turbo, I had a feeling we weren’t done with the puzzlebox yet.  I equate these to solving a Rubik’s cube. For some people finding the solution only takes seconds while others may spend minutes, hours or even days twisting the colorful cube to perfection. The last category of people spends many frustrating hours twisting that cube until they have two squares left to align. They are forced with the ultimate decision do I keep twisting knowing that I will destroy all progress or do I carefully peel back the corner of the sticker? I will know my fate once I open and start unraveling the puzzlebox.
 +
 +====MAY 4, 2016====
 +
 +==Week 15==
 +
 +This entry marks the last week of classes for the semester and therefore the last blog post for UNIX. It’s been a crazy, whirlwind semester filled with sharp twists and mind bending (numbing) experiences. Entering the course with much trepidation at the suggestion of a higher power I initially expected to flail and run. Over the course of the last 14 weeks I’ve gained what feels like an enormous amount of knowledge about a new OS. My skill level is still firmly planted in beginner mode, but I can at least nod and say I know about the super powers of the dd command. 
 +
 +I am still working on the EoCE. Progress has slowed or come to a screeching halt as I needed to focus on other courses, but with most other projects behind me I can return to puzzle boxes and scripting. 
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
 +
  
  
blog/spring2016/hheath/journal.1456807799.txt.gz · Last modified: 2016/03/01 04:49 by hheath