Cybercriminals can exploit the bug to make the bash shell
run virtually any command they want, including full information extractions and dumps.
Later chapters discuss load-balanced clusters, the dynamic host configuration protocol (DHCP), virtualization, bash shell
commands, and tools for backing up data.
This new edition is packed with new and revised content, reflecting the many changes to new Linux versions, including coverage of alternative shells to the default bash shell
This guide explains how to perform tasks under SUSE Linux instead of Windows, introduces the BASH shell
and command line prompts, and provides instructions for playing music and videos, using the OpenOffice.
Exploit Bash shell
features to enhance the command line interface