{"id":7651,"date":"2024-09-23T01:06:00","date_gmt":"2024-09-23T05:06:00","guid":{"rendered":"https:\/\/www.both.org\/?p=7651"},"modified":"2024-09-19T12:23:11","modified_gmt":"2024-09-19T16:23:11","slug":"5-linux-commands-you-should-never-run-and-why","status":"publish","type":"post","link":"https:\/\/www.both.org\/?p=7651","title":{"rendered":"5 Linux commands you should never run (and why)"},"content":{"rendered":"<div class=\"pld-like-dislike-wrap pld-template-1\">\r\n    <div class=\"pld-like-wrap  pld-common-wrap\">\r\n    <a href=\"javascript:void(0)\" class=\"pld-like-trigger pld-like-dislike-trigger  \" title=\"\" data-post-id=\"7651\" data-trigger-type=\"like\" data-restriction=\"cookie\" data-already-liked=\"0\">\r\n                        <i class=\"fas fa-thumbs-up\"><\/i>\r\n                <\/a>\r\n    <span class=\"pld-like-count-wrap pld-count-wrap\">    <\/span>\r\n<\/div><\/div>\n<p>Sometimes we run into articles on other sites that we wish we&#8217;d written. This one on <a href=\"https:\/\/www.zdnet.com\/\" data-type=\"link\" data-id=\"https:\/\/www.zdnet.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNET<\/a> is an excellent example.<\/p>\n\n\n\n<p>There are some commands that should never be run. As SysAdmins we should know what they are. The ZDNET article, <a href=\"https:\/\/www.zdnet.com\/article\/5-linux-commands-you-should-never-run-and-why\" data-type=\"link\" data-id=\"https:\/\/www.zdnet.com\/article\/5-linux-commands-you-should-never-run-and-why\" target=\"_blank\" rel=\"noreferrer noopener\">5 Linux commands you should never run (and why)<\/a>, covers five of them. <\/p>\n\n\n\n<p>I have to admit to running most of them myself. However, I did learn a lot while I recovered.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sometimes we run into articles on other sites that we wish we&rsquo;d written. This one on ZDNET is<\/p>\n","protected":false},"author":2,"featured_media":3469,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[100,5],"tags":[472],"class_list":["post-7651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-command-line","category-linux","tag-linux-commands"],"modified_by":"David Both","_links":{"self":[{"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts\/7651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7651"}],"version-history":[{"count":5,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts\/7651\/revisions"}],"predecessor-version":[{"id":7666,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/posts\/7651\/revisions\/7666"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=\/wp\/v2\/media\/3469"}],"wp:attachment":[{"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.both.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}