skip to main content
10.1145/1099435.1099439acmconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
Article

Automation is a breeze with AutoIt

Published: 06 November 2005 Publication History

Abstract

AutoIt is a free scripting language for Microsoft Windows that simulates Windows commands, mouse movements, and mouse-clicks; sends keystrokes to applications; and works with the clipboard to cut and paste text, among other tasks. Unlike many other scripting languages, AutoIt is able to interact with programs the same way that your users do - by actually using the mouse and keyboard shortcuts. The Solution Center has created several automated programs using AutoIt that perform many of the tasks repeated each day. Saving time, reducing error, and adding ease to report options are just some of the ways the Solution Center at Iowa State University has exploited AutoIt's features. AutoIt has allowed us to better serve our students and faculty members by reducing the amount of time it takes to complete a scripted task, removing human error, and eliminating some repetitive tasks for staff. This session is intended for all levels of user support staff.

References

[1]
AutoIt Website - http://www.autoitscript.com/autoit3/
[2]
AutoIt Forums http://www.autoitscript.com/forum/
[3]
AutoIt SciTE - http://www.autoitscript.com/autoit3/scite/
[4]
Blat - http://www.blat.net/
[5]
Crystal Reports - http://www.businessobjects.com/
[6]
Cygwin - http://www.cygwin.com/
[7]
FrontRange HEAT - http://www.frontrange.com/
[8]
OpenSSH for Windows - http://sshwindows.sourceforge.net/
[9]
PuTTY - http://www.chiark.greenend.org.uk/~sgtatham/putty/
[10]
RealVNC - http://www.realvnc.com/

Cited By

View all
  • (2023)ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networksThe Journal of Supercomputing10.1007/s11227-023-05764-580:6(7876-7905)Online publication date: 10-Nov-2023
  • (2022)Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control SystemsAd Hoc Networks10.1016/j.adhoc.2022.102930134(102930)Online publication date: Sep-2022
  • (2021)Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features SetInternational Journal of Digital Crime and Forensics10.4018/IJDCF.30213613:6(0-0)Online publication date: Nov-2021
  • Show More Cited By

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGUCCS '05: Proceedings of the 33rd annual ACM SIGUCCS conference on User services
November 2005
482 pages
ISBN:1595932003
DOI:10.1145/1099435
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AutoIt
  2. automation
  3. customer service
  4. help desk
  5. scripting
  6. windows

Qualifiers

  • Article

Conference

SIGUCCS Fall05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 192 of 261 submissions, 74%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)ICS-IDS: application of big data analysis in AI-based intrusion detection systems to identify cyberattacks in ICS networksThe Journal of Supercomputing10.1007/s11227-023-05764-580:6(7876-7905)Online publication date: 10-Nov-2023
  • (2022)Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control SystemsAd Hoc Networks10.1016/j.adhoc.2022.102930134(102930)Online publication date: Sep-2022
  • (2021)Web Bot Detection System Based on Divisive Clustering and K-Nearest Neighbor Using Biostatistics Features SetInternational Journal of Digital Crime and Forensics10.4018/IJDCF.30213613:6(0-0)Online publication date: Nov-2021
  • (2021)Creación de pacientes internacionales automatizado con AutoIt: un caso de aplicaciónLámpsakos10.21501/21454086.2809(74)Online publication date: 16-Mar-2021
  • (2021)Unknown Payload Anomaly Detection Based on Format and Field Semantics Inference in Cyber-Physical Infrastructure SystemsIEEE Access10.1109/ACCESS.2021.30800819(75542-75552)Online publication date: 2021
  • (2019)Online Measurement System in Reaction Monitoring for Determination of Structural and Elemental Composition Using Mass SpectrometrySLAS Technology10.1177/247263031881383824:3(330-341)Online publication date: Jun-2019
  • (2019)HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA SystemsIEEE Access10.1109/ACCESS.2019.29258387(89507-89521)Online publication date: 2019
  • (2017)Integration of a micro reactor system to a ICP mass spectrometer2017 IEEE International Instrumentation and Measurement Technology Conference (I2MTC)10.1109/I2MTC.2017.7969876(1-6)Online publication date: May-2017
  • (2017)Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN.2017.34(261-272)Online publication date: Jun-2017
  • (2016)Combining thread‐level speculation and just‐in‐time compilation in Google's V8 JavaScript engineConcurrency and Computation: Practice and Experience10.1002/cpe.382629:1Online publication date: 6-May-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media