15 Linux Commands That Can Destroy Your System – How to Avoid Disastrous Mistakes
This article lists fifteen dangerous Linux commands—from rm -rf and fork bombs to disk‑wiping utilities—explaining their destructive effects and offering practical advice to prevent accidental system crashes or data loss.
1. rm -rf command
This command can cause irrecoverable system damage.
rm -rf / # force delete everything under root rm -rf * # force delete all files in current directory rm -rf . # force delete current folder and subfoldersAlways think carefully before running rm -rf; many data‑loss incidents stem from misuse.
2. Fork bomb
:() { :|:& };:When executed, it exhausts system resources, eventually causing “-bash: fork: Cannot allocate memory” and crashes the system.
3. echo "" > /dev/sda
Overwrites all data blocks on the block device, resulting in total data loss.
4. mv folder /dev/null
Moves files to /dev/null, discarding them; this does not guarantee unrecoverable deletion.
5. Execute downloaded file immediately
wget http://rumenz.com/rumenz.sh -O- | shIf the script is malicious, it can compromise the system; always inspect scripts before execution.
6. mkfs.ext3 /dev/sdb
Formats the block device, rendering the disk unusable.
7. Redirect output to a file
> > rumenz.txtThis command clears a file or records command output; use with caution.
8. Disk zeroing with dd
The dd command can copy and alter disk partitions; misuse can be dangerous.
dd if=/dev/hda of=/dev/hdb dd if=/dev/hda of=/dev/sdb dd if=something of=/dev/hda dd if=something of=/dev/sda dd if=/dev/zero of=/dev/hadNever run these commands without understanding their impact.
9. Executing disguised malicious code
Hex‑encoded payloads can hide commands like rm -rf that erase the root partition; only run such code in a virtual machine.
10. Decompression bomb
A small compressed file that expands to hundreds of gigabytes can fill the disk and cause a crash; only extract trusted archives.
11. Malicious source code
Compiling untrusted source may contain hidden malicious code; only compile from trusted sources.
12. Tar bomb
Extracting a tar archive without a dedicated directory can flood the current directory with many files.
13. ^foo^bar command correction
Using the caret syntax to quickly edit previous commands can be risky if misused.
14. kill / killall
killallterminates all processes with a given name; using kill without flags is safer.
killall firefo # no process found killall firefox killall -9 firefox15. Interrupting fsck
When hardware is damaged, running fsck may cause more harm; use tools like dd_rescue to image the disk first.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Efficient Ops
This public account is maintained by Xiaotianguo and friends, regularly publishing widely-read original technical articles. We focus on operations transformation and accompany you throughout your operations career, growing together happily.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
