University of Kali Linux
University of Kali Linux

University of Kali Linux


4 best Linux Smartphone Operating Systems for Android


Top 6 Search Engine for Hackers

4 cool Android Browser with VPN

1 w ·Translate ·Youtube

history- GNU History Library

Many programs read input from the user a line at a time. The GNU History library is able to keep track of those lines, associate arbi‐trary data with each line, and utilize information from previous lines in composing new ones.

The history library supports a history expansion feature that is identical to the history expansion in bash. This section describes what
syntax features are available.

History expansions introduce words from the history list into the input stream, making it easy to repeat commands, insert the arguments
to a previous command into the current input line, or fix errors in previous commands quickly.

History expansion is usually performed immediately after a complete line is read. It takes place in two parts. The first is to deter‐
mine which line from the history list to use during subs****ution. The second is to select portions of that line for inclusion into the
current one. The line selected from the history is the event, and the portions of that line that are acted upon are words. Various mod‐
ifiers are available to manipulate the selected words. The line is broken into words in the same fashion as bash does when reading in‐
put, so that several words that would otherwise be separated are considered one word when surrounded by quotes (see the description of
history_tokenize() below). History expansions are introduced by the appearance of the history expansion character, which is ! by de‐
fault. Only backslash (\) and single quotes can quote the history expansion character.

$ history

😍Follow these videos-
1. How to Forensics old Deleted files-
2. How to signup Apk apps manually-
3. Hack the Browser data using DumpZilla-
4. Hack the Browser Data using BeEF-
5. Recover permanently deleted files-


Thanks for watching this video.

#history #cybersecurity #ethicalhacking #hacking #anonymous