Bourne shell

Results: 67



#Item
31Risk / Cyberwarfare / Hacking / Software testing / Vulnerability / Bash / Redirection / Social vulnerability / Debian / Computing / Software / Scripting languages

Critical Vulnerability in the Bourne Again Shell (BASH) aka ShellShock This advisory was updated on 29 September 2014 to include additional details of 3 new vulnerabilities (CVE[removed], CVE[removed], CVE[removed]a

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-01-04 06:04:56
32Computer network security / System administration / Hacking / Software testing / Vulnerability / Ps / Id / Computer security / Operating system / Software / Computing / Unix

STEPS FOR BUSINESS TO PROTECT AGAINST BASH BUG 26 September 2014 Businesses are urged to protect their IT systems against the Bourne Again Shell (BASH) vulnerability that could allow unauthorised users to access and mani

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2014-12-10 16:01:52
33Computer network security / Crime prevention / National security / Data security / Information security / Vulnerability / Social vulnerability / Exploit / Federal Financial Institutions Examination Council / Security / Computer security / Cyberwarfare

Federal Financial Institutions Examination Council[removed]Fairfax Drive • Room B7081a • Arlington, VA[removed] • ([removed] • FAX[removed] • http://www.ffiec.gov Bourne-Again Shell (Bash) ‘Shellsho

Add to Reading List

Source URL: www.ncua.gov

Language: English - Date: 2014-09-26 18:00:35
34Computer network security / Crime prevention / National security / Data security / Information security / Vulnerability / Social vulnerability / Exploit / Federal Financial Institutions Examination Council / Security / Computer security / Cyberwarfare

Federal Financial Institutions Examination Council[removed]Fairfax Drive • Room B7081a • Arlington, VA[removed] • ([removed] • FAX[removed] • http://www.ffiec.gov Bourne-Again Shell (Bash) ‘Shellsho

Add to Reading List

Source URL: www.ffiec.gov

Language: English - Date: 2014-09-26 17:44:38
35Computer network security / System administration / Hacking / Software testing / Vulnerability / Ps / Id / Computer security / Operating system / Software / Computing / Unix

STEPS FOR BUSINESS TO PROTECT AGAINST BASH BUG 26 September 2014 Businesses are urged to protect their IT systems against the Bourne Again Shell (BASH) vulnerability that could allow unauthorised users to access and mani

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2014-12-10 12:32:18
36Alias / Bash / Find / Bourne shell / Test / Command-line interface / AWK / Shell script / Environment variable / Computing / Software / Scripting languages

Bourne Shell Programming in One Hour Ben Pfaff 1 Aug 1999 1

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-11-24 21:25:58
37C shell / Redirection / Command-line interface / Find / Shell script / Pipeline / Filename / Path / Bourne shell / Computing / Software / Scripting languages

-- -- An Introduction to the C shell William Joy

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2001-11-20 17:00:00
38Unix shells / C shell / Tcsh / Find / Alias / Shell / Command-line interface / History / Bourne shell / Computing / Software / Scripting languages

Preface UNIX systems usually provide several shells from which you can choose, either vendor-supplied or available from other sources. This handbook focuses on two of them. The first is the C shell (csh), a popular comm

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2001-11-20 17:00:00
39Bash / Shell script / C shell / Shebang / Bourne shell / Command-line interface / Batch file / Alias / AWK / Computing / Software / Scripting languages

Advanced Bash-Scripting Guide An in-depth exploration of the art of shell scripting Mendel Cooper

Add to Reading List

Source URL: fossies.org

Language: English - Date: 2014-03-06 21:27:57
40Unix shells / Scripting languages / System administration / Unix / POSIX / Shell / Bourne shell / Command-line interface / Bash / Software / Computing / System software

Tour of the Terminal: Using Unix or Mac OS X Command-Line hostabc.princeton.edu% date Mon May 5 09:30:00 EDT 2014 hostabc.princeton.edu% who | wc –l 12

Add to Reading List

Source URL: opr.princeton.edu

Language: English - Date: 2014-05-12 14:51:22
UPDATE