Bash scripting essentials

Bash scripts are very helpful in doing time-consuming tasks in very little time, the unix “bash” terminal .first let's write a sample bash script all bash scripts start with #!/bin/bash, so we can point the system to the right place

CYHAMS

The Cyprus Amateur Radio Society (CARS) is the national membership organisation for Amateur Radio enthusiasts. The society was first founded in 1975. The CARS looks after the interests of the…

METEO APRS

Meteo APRS uses the Cyprus Meteorological Center's API to query and push data to the APRS Network. It downloads the XML file and converts it to JSON and queries the data for specific Stations. They are then pushed to the APRS network using TCP/IP.

Minesweeper ARM

Our Minesweeper variant is played on a eight by eight grid, of which eight squares are filled with mines (represented by the letter ‘M’). The eight mines are distributed randomly on the board, and then each square is covered up by a ‘*’. A

Adventures of Vman

The Adventures of V man is a simple platforming shooter game that calls upon the player to shoot up oncoming enemies until they reach the end of the level where they are faced with the big boss battle.

APRS_SENDER

Ever had that one guy on APRS who just likes to list fake repeaters? No worries, I Got you covered. If anything you can always use this little script to update your location via APRS-IS using python. Just fill in your details and away you go.

Detecting Spoof Emails with Information Fusion

With the internet becoming an ever evolving technology, ways to protect ourselves from malicious attacks have become ever so important. Everyday these attacks become more and more intelligent in trying to trick not only the user but also current spam protection systems. This illustrates that most current implementations lack in detecting the hijacking of already "trusted" email addresses. Having a system capable of analysing and detecting such malicious attacks would be of great use. This project aims to create such a system and explore the multiple ways in which Artificial Intelligence and strict filtering rules can leverage advancements in the field of Cyber security and Datascience .