Which of the following commands will do this?
In Linux, the three most common commands that hackers usually attempt to Trojan are: