
301
Chapter 13, Build a Security System
Now, we’ll write a batch file that uses the ECHO command to create a text
file, and then calls the FTP command. It would be nice to create a log of the
movies that we uploaded, so we’ll echo the filename, date, and time to a text
file. Save this file as
C:\homehacking\security\sendfile.bat.
echo open ftp.northrup.org> upload-movie.txt
echo SecurityUpload>> upload-movie.txt
echo MyP@55w0rd>> upload-movie.txt
echo binary>> upload-movie.txt
echo send %1>> upload-movie.txt
echo close>> upload-movie.txt
echo quit>> upload-movie.txt
ftp -s:upload-movie.txt
echo File %1 sent at %date% %time%>>C:\homehacking\security\ftplog.txt
Again, replace the hostname, port number (2121 in the example), user-
name, and password with the values you created earlier in this phase. Now,
you can upload the file to your friend’s computer with a single command,
such as:
C:\homehacking\security\Sendfile.bat movie.mpg
Arming
The challenge of security is striking a balance between denying access to
unauthorized users while minimizing the inconvenience imposed upon
authorized users. In the context of home security, you need to allow your
family to arm the alarm system when they leave the house or go to bed, and
disarm it when they enter the house or wake up in the morning. Traditional
alarm systems use a digital keypad, and when someone needs to arm or
disarm