If an attacker had smuggled a batch file named "ping. The person who sets up a server also defines the types of connections it is made for. You can read more about this in Chapter Attack phase: viruses do destructive things such as deleting files, erasing data on a hard disk, sending random emails or slowing down the processor by sending millions of looped instructions. Another typical example is the Cross-compilation of the FreePascal Compiler or the Lazarus IDE on one platform such as Linux for use on another platform such as Windows or on the Macintosh computer using a totally different processor.
nest...