4 EXPLORING DATASETS IN THE TERMINAL
In this chapter, you’ll build on the command line skills you’ve learned so far and begin investigating real datasets. You’ll use for loops to unzip the BlueLeaks files, then search the files to determine which fusion centers have the most data and which documents contain the keywords antifa and Black Lives Matter. I’ll also give an overview of the mysterious encrypted data in the dataset and describe my hypothesis of how the hacker collected the data.
You’ll also learn to create Linux cloud servers and connect to them securely for faster internet and extra disk space. As practice, you’ll use a remote server to download and briefly examine hacked data from the Oath Keepers militia, a far-right extremist ...
Get Hacks, Leaks, and Revelations now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.