The MySQL server maintains many system variables that configure its operation. Each system variable has a default value. System variables can be set at server startup using options on the command line or in an option file. Most of them can be changed dynamically at runtime using the SET statement, which enables you to modify operation of the server without having to stop and restart it. You can also use system variable values in expressions.
How to Run SQL Text File on MySQL Command Prompt
MySQL: Run Query from Bash Script or Linux Command Line - ShellHacks
Shell scripting provides an easy and powerful programming method to help you save time by automating a lot of your repeated manual tasks. So we came up with twenty frequently asked Shell scripting questions that you should prepare to answer during interviews. Being a Shell script programmer, you should be aware of the different shells available on the Linux OS. And before even writing or executing a shell script, you must make sure that you are using the right Shell where the script is intended to run. So keeping a tab on the Shell environment will help you avoid any hassle that could have appeared at runtime. Also, if you are serious about preparing for a Linux interview, then do read the below posts to give full throttle to your preparations. Linux Commands.
Shell Script to Create Mysql User (Interactive Way)
It supports interactive and non-interactive use. When used non-interactively for example, as a filter , the result is presented in tab-separated format. The output format can be changed using command options. If you have problems due to insufficient memory for large result sets, use the --quick option.
This exercise explains how you can, from a SQL injection, gain access to the administration console, then in the administration console, how you can run commands on the system. This course details the exploitation of SQL injection in a PHP based website and how an attacker can use it to gain access to the administration pages. Then, using this access, the attacker will be able to gain code execution on the server. Fingerprinting can be done using multiple tools.