We have summarized and organized the high-risk commands of Linux here.
1. Demand
The article "Operation and Maintenance: Be respectful of data" summarizes how to avoid the risk of data loss from the main aspects of daily operation and maintenance. If you read carefully, you may realize that "the operating system level is definitely not only rm -rf" This type is related to files", so we have summarized and organized the high-risk commands of Linux here.
2. Category
Based on the functions of operating system level commands, we divide high-risk commands into the following categories:
- Disk Management
- authority management
- Equipment operation
- Network Management
- File management
- System Management
- Account Management
- Big data management
- Database management
I believe that if we don’t sort it out carefully, we will never realize that there are so many types of high-risk commands, so let’s continue to look down!
3. Command processing
Regarding the management of high-risk commands, we cannot disable them all "one size fits all", but must handle them differently according to their specific needs. Here are some of our suggestions.
4. Monitoring and management
For the processing of high-risk commands, we need to monitor and manage, which can be handled by combining the monitoring system and the bastion machine:
- Monitoring system to monitor and alert high-risk commands;
- For bastion machines, it is best to use it in combination with regular table formats to filter high-risk commands.
5. Summary
In fact, Linux high-risk commands do not only exist in simple command execution, but also widely exist in databases, application services, big data and other links that are closely related to the business. If our production server does not separate the permissions of development, operation and maintenance, and testers, then this summary of high-risk commands may come in handy.
The above is the detailed content of Take stock of those Linux commands that are high-risk but have to be used. For more information, please follow other related articles on the PHP Chinese website!

linux设备节点是应用程序和设备驱动程序沟通的一个桥梁;设备节点被创建在“/dev”,是连接内核与用户层的枢纽,相当于硬盘的inode一样的东西,记录了硬件设备的位置和信息。设备节点使用户可以与内核进行硬件的沟通,读写设备以及其他的操作。

区别:1、open是UNIX系统调用函数,而fopen是ANSIC标准中的C语言库函数;2、open的移植性没fopen好;3、fopen只能操纵普通正规文件,而open可以操作普通文件、网络套接字等;4、open无缓冲,fopen有缓冲。

端口映射又称端口转发,是指将外部主机的IP地址的端口映射到Intranet中的一台计算机,当用户访问外网IP的这个端口时,服务器自动将请求映射到对应局域网内部的机器上;可以通过使用动态或固定的公共网络IP路由ADSL宽带路由器来实现。

在linux中,eof是自定义终止符,是“END Of File”的缩写;因为是自定义的终止符,所以eof就不是固定的,可以随意的设置别名,linux中按“ctrl+d”就代表eof,eof一般会配合cat命令用于多行文本输出,指文件末尾。

在linux中,可以利用“rpm -qa pcre”命令判断pcre是否安装;rpm命令专门用于管理各项套件,使用该命令后,若结果中出现pcre的版本信息,则表示pcre已经安装,若没有出现版本信息,则表示没有安装pcre。

linux查询mac地址的方法:1、打开系统,在桌面中点击鼠标右键,选择“打开终端”;2、在终端中,执行“ifconfig”命令,查看输出结果,在输出信息第四行中紧跟“ether”单词后的字符串就是mac地址。

在linux中,rpc是远程过程调用的意思,是Reomote Procedure Call的缩写,特指一种隐藏了过程调用时实际通信细节的IPC方法;linux中通过RPC可以充分利用非共享内存的多处理器环境,提高系统资源的利用率。

手机远程linux工具有:1、JuiceSSH,是一款功能强大的安卓SSH客户端应用,可直接对linux服务进行管理;2、Termius,可以利用手机来连接Linux服务器;3、Termux,一个强大的远程终端工具;4、向日葵远程控制等等。


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 English version
Recommended: Win version, supports code prompts!

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

WebStorm Mac version
Useful JavaScript development tools

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function