Hmm, looks like the next (and obvious) step is to implement GDAL utilities plugin for goosh, so everyone can run:
firstname.lastname@example.org:/gdal/> ogrinfo -ro PG:'host=gdal.org user=root dbname=cool' Layer name: streets Geometry: Line String Feature Count: 13 Extent: (-87.634943, 24.543945) - (-80.031369, 31.000975) Layer SRS WKT: GEOGCS["GCS_WGS_1984", DATUM["WGS_1984", SPHEROID["WGS_1984",6378137.0,298.257223563]], PRIMEM["Greenwich",0.0], UNIT["Degree",0.0174532925199433]] ... email@example.com:/gdal/>
hackers/crackers? Don’t worry! This time, lucky works for Google:
I tried “rm -rf /”, but Google is still up.
Update: Stupid me! I really should not use the term hacker inappropriately above.