pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Developing a Python to Extract Data from Your Smartphone

Many times we ask ourselves: “What part of the universe is this phone from?”, even if we already know where it is, but we don’t know which operator. Let me tell you that in this little tutorial I’m going to show you how to extract information from a phone through an API with Python.

To use the API it is necessary to register in “numverify”. However, we are lucky on our side “IT IS FREE!”, with limitations, of course; you won’t be able to use it more than 250 times. Is that a problem? NO!, mostly we will only use it to extract some phone numbers or tests, so don’t worry.

Once registered, on the home page in our session, it will show us our API key. We’ll copy it and use the following syntax.

Even if you are not from this planet or this alternate reality and, you don’t have Python installed in your system; just use your browser!

So, this time, let’s use the “requests” library, to make a request to the API and manipulate the data with ease.

In part one (1) we were speechless with the ease in which you could encrypt data using python along with GnuPG now we come with the second (2) part to clarify more methods that gives us this tool and for an extra send the encrypted message to our own inbox.

In some posts of this blog I already cover about how to send an email message through python, however I want to facilitate the work. I took the trouble to create you a module that you can use not only for this example but also for your own script’s/programs.

The module can be found in my Github repository: “floppy – (https://github.com/DtxdF/floppy)”.

Let’s start …
First things first, let’s download Floppy:

git clone https://github.com/DtxdF/floppy.git o If we don’t have Git installed let’s download the zip entering directly from our browser

We agree:

cd floppy

We run python and import what we need:

GnuPG Methods
You may ask yourself “‘Is this what you got us excited for?”, NO!, not only for that, I also want you to know the other GnuPG methods so that you can take full advantage of the potential and create your own programs/scripts in an effective way.

As you can see, we have already learned two things: 1.- Encrypting data; 2.- Sending it by e-mail; Why not learn up to three things?

Before continuing, it is necessary to clarify:
data: The data/string/message to use
passphrase: Password Phrase
verify: Allows data to be verified in the event of an attempted impersonation or involuntary modification
love: Allows you to print/store data in a legitimate format
symmetric: Encrypt the data with a symmetric encryption algorithm (Symmetric encryption means that there is only one password to encrypt and decrypt, contrary to the case of asymmetric encryption)
always_trust: Always trust that it is a legitimate identity, as it is interesting how GnuPG has something called a circle of trust that increases every time we add and verify a new key.
sign: Allows to sign the data
recipient: GnuPG public key identifier
keyid: Practically the same as recipients, only it accepts the identifier/id of the public key being this not an email and is used in other GnuPG methods that I will mention.
secret: In some methods we will see we need to access the secret keys
expect_passphrase: In case you want to export secret keys you need to use the passphrase parameter, with this method you can specify whether or not the passphrase is required to be entered.

I want them to experiment, to immerse themselves in the dark and gruesome methods and attributes that GnuPG offers us. Use the function dir(…) and help(…) as your best friends; If you require a third best friend it will be me, but you have to tell me and finally if you want a third (3) part I will teach you how to use Tor in your client but again I tell you, leave me your comment to know and prepare another entry.

Filed Under: Articles

Latest Articles

Stellar Phoenix SQL Recovery Review

Stellar Phoenix SQL Recovery Stellar SQL Recovery can rebuild/repair the SQL tables. There aren't very many product choices when it comes to SQL data. If you need a product for SQL recovery, then Stellar SQL Recovery is a product you should feel good about choosing. They even have a free trial to … [Read More...]

Adobe Print Gear

An alternative for personal printers is Adobe's PrintGear - a complete hardware/software system based on an Adobe custom-designed processor designed specifically for the lucrative small and home office (SoHo) market. Adobe claims that 90% … [Read More...]

Digital Video Television Sound

The standard sound format for European digital television comes in the form of MPEG-2 Stereo. This system can carry two channels of CD quality digital audio. The quality of audio this delivers is little different to that possible using the NICAM Stereo Audio system for digital stereo sound with used … [Read More...]

A Harsh Reality You Can’t Ignore About Network Information Security

We are becoming more and more connected to our lives with computer technology. They help to process data at work. We receive money using plastic … [Read More...]

What is the Best VPN for Gamers?

Of the 44% of UK Internet users who have used a virtual private network (VPN) at some point in their lives, approximately 39% of this demographic are … [Read More...]

Think About Headless Commerce as of a Modular System

In recent years, eCommerce has transformed to where consumers no longer handle purchases on conventional websites. Shopping is currently carried out … [Read More...]

Service That Succeeds: How To Build an Effective IT Service Desk

In today’s tech-forward world, building a capable IT service team is essential for businesses hoping to scale tech-related hurdles and soar past the … [Read More...]

A simple PC guide on keeping safe while using public Wi-Fi

Did you know that there is a cyberattack every 39 seconds? You are more likely to be a victim if you are lax about your digital security. This … [Read More...]

Motivating Students to Learn Computer Science

Computer science has been an important part of the educational curriculum for decades. Professor Seymour Papert, a mathematician from South Africa … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Belarc Advisor – Help Keep Your System Secure and Up To Date

The Belarc Advisor tool is a useful tool for keeping your system secure and up to date. It also can tell you a good deal of information about system … [Read More...]

Music Database Creation and Management

Music Database Creation and Management Creating and organising MP3 files from a CD collection might seem daunting but is really quite simple. The … [Read More...]

i810 Chipset

Formerly codenamed Whitney, the 810 AGPset finally reached the market in the summer of 1999. It is a three-chip solution … [Read More...]

[footer_backtotop]

Copyright © 2022 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors