Tagged articles
19 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Oct 18, 2025 · Operations

Master Linux Permissions: Root, Users, Groups, chmod & chown Explained

This guide explores Linux system management fundamentals, detailing the role of the root user, how to create and modify users and groups, examine file permission structures, and use essential commands such as sudo, chmod, and chown to control access and ownership on files and directories.

$rootLinuxPermissions
0 likes · 8 min read
Master Linux Permissions: Root, Users, Groups, chmod & chown Explained
Lin is Dream
Lin is Dream
May 29, 2025 · Operations

Why Should You Install Software as Root but Run It as a Non‑Root User?

The article explains that software on a server should be installed using the root account to place executables in system directories, while the actual processes should run under a non‑root user to limit privileges, and provides practical tips for configuring file permissions and avoiding security risks.

$rootNon-rootPermissions
0 likes · 4 min read
Why Should You Install Software as Root but Run It as a Non‑Root User?
Laravel Tech Community
Laravel Tech Community
May 8, 2023 · Information Security

Destructive Linux Commands and Their Effects

The article lists several dangerous Linux commands—including rm -rf, fork bomb, direct disk writes, and disguised payloads—explaining how each can irreversibly damage system files, consume resources, or erase data, and warns readers to understand and avoid executing them.

$rootDestructiveCommandsLinux
0 likes · 5 min read
Destructive Linux Commands and Their Effects
Liangxu Linux
Liangxu Linux
Mar 28, 2023 · Fundamentals

Why Use sudo Instead of Direct root Access? A Linux Guide

This tutorial explains the differences between the root account and the sudo command on Linux, covering what each provides, how to configure and use sudo, the sudoers file, and why following the principle of least privilege makes sudo a safer choice than a root shell.

$rootLinuxPermissions
0 likes · 7 min read
Why Use sudo Instead of Direct root Access? A Linux Guide
Full-Stack Trendsetter
Full-Stack Trendsetter
Nov 18, 2021 · Frontend Development

Four Methods to Define Global Functions in Vue.js

The article outlines four practical ways to create global functions in Vue—mounting on Vue.prototype, using Vue.use with a plugin, applying a global mixin, and leveraging the $root event bus—while noting each method's advantages and limitations.

$rootMixinVue.js
0 likes · 3 min read
Four Methods to Define Global Functions in Vue.js
Liangxu Linux
Liangxu Linux
Jul 13, 2021 · Information Security

Why Running Docker Containers as Root Is Dangerous and How to Avoid It

Running Docker containers as root or with the --privileged flag can expose the host to unnecessary risks; this article explains the differences, demonstrates root usage in common images, and provides practical methods—such as specifying non‑root users in Dockerfiles or using security contexts—to securely run containers.

$rootContainer SecurityKubernetes
0 likes · 7 min read
Why Running Docker Containers as Root Is Dangerous and How to Avoid It
MaGe Linux Operations
MaGe Linux Operations
May 17, 2021 · Information Security

How to Harden Linux: Essential Security Settings and Best Practices

This comprehensive guide walks you through selecting a secure Linux distribution, configuring kernel and sysctl parameters, applying boot‑time hardening, managing network and firewall rules, restricting root access, enabling MAC policies, sandboxing applications, and employing advanced memory and entropy techniques to dramatically improve system privacy and resilience against attacks.

$rootHardeningLinux
0 likes · 55 min read
How to Harden Linux: Essential Security Settings and Best Practices
Open Source Linux
Open Source Linux
May 11, 2021 · Information Security

Ultimate Guide to Hardening Linux: Boost Security & Privacy

This comprehensive guide explains how to dramatically improve Linux security and privacy by selecting hardened distributions, configuring kernel and boot parameters, applying sysctl tweaks, disabling unnecessary services, using MAC frameworks, sandboxing applications, hardening memory allocation, and following best‑practice system administration steps.

$rootHardeningLinux
0 likes · 59 min read
Ultimate Guide to Hardening Linux: Boost Security & Privacy
Laravel Tech Community
Laravel Tech Community
Mar 5, 2021 · Backend Development

PHP chroot() Function: Changing the Root Directory

The PHP chroot() function changes the current process's root directory to a specified path, works only on supported systems in CLI/CGI/embedded SAPI with root privileges, returns TRUE on success or FALSE on failure, and is illustrated with a simple example.

$rootSystem Callchroot
0 likes · 2 min read
PHP chroot() Function: Changing the Root Directory
Liangxu Linux
Liangxu Linux
Sep 19, 2020 · Operations

Enable or Disable Ubuntu’s Root Account in Minutes

Learn step‑by‑step how to activate the root user on Ubuntu, assign a password, configure sudo for password‑less access, and later lock or disable the root account by expiring its password, with clear command examples and safety tips.

$rootLinuxSudo
0 likes · 4 min read
Enable or Disable Ubuntu’s Root Account in Minutes
MaGe Linux Operations
MaGe Linux Operations
Oct 5, 2017 · Information Security

Which Linux Commands Can Destroy Your System? Safety Tips Inside

This article warns that seemingly harmless Linux commands—such as recursive rm, mkfs, dd, fork loops, malicious scripts, and arbitrary data writes—can irreversibly destroy filesystems, and offers practical advice like avoiding root for daily tasks, understanding commands before execution, verifying sources, and regularly backing up data.

$rootdangerous-commandssystem security
0 likes · 7 min read
Which Linux Commands Can Destroy Your System? Safety Tips Inside