{"id":1466,"date":"2018-05-22T10:00:00","date_gmt":"2018-05-22T10:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/"},"modified":"2018-05-22T10:00:00","modified_gmt":"2018-05-22T10:00:00","slug":"22-essential-linux-security-commands","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/","title":{"rendered":"22 essential Linux security commands"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2018\/05\/penguins-copy-100757612-large.3x2.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>There are many aspects to security on Linux systems \u2013 from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems.<\/p>\n<h2>sudo<\/h2>\n<p>Running privileged commands with sudo \u00a0\u2013 instead of switching user to root \u00a0\u2013 is one essential good practice as it helps to ensure that you only use root privilege when needed and limits the impact of mistakes. Your access to the sudo command depends on settings in the \/etc\/sudoers and \/etc\/group files.<\/p>\n<aside class=\"fakesidebar\"><strong>[ Two-Minute Linux Tips: <a href=\"https:\/\/www.networkworld.com\/video\/series\/8559\/2-minute-linux-tips\">Learn how to master a host of Linux commands in these 2-minute video tutorials<\/a> ]<\/strong><\/aside>\n<pre>\n$ sudo adduser shark\nAdding user `shark' ...\nAdding new group `shark' (1007) ...\nAdding new user `shark' (1007) with group `shark' ...\nCreating home directory `\/home\/shark' ...\nCopying files from `\/etc\/skel' ...\nEnter new UNIX password:\nRetype new UNIX password:\npasswd: password updated successfully\nChanging the user information for shark\nEnter the new value, or press ENTER for the default Full Name []: shark Room Number []: Work Phone []: Home Phone []: Other []:\nIs the information correct? [Y\/n] Y\n<\/pre>\n<p>If you run sudo and ask who you are, for example, you&#8217;ll get confirmation that you&#8217;re running the command as root.<\/p>\n<pre>\n$ sudo whoami\nroot\n<\/pre>\n<p>If you manage the sudo setup for users, you also need to be comfortable with the visudo command.<\/p>\n<h2>visudo<\/h2>\n<p>The visudo command allows you to make changes to the \/etc\/sudoers file by opening the file in a text editor and checking your changes for syntax. Run the command with \u201csudo visudo\u201d and make sure that you understand the syntax. Privileges can be assigned by user or by group. On most Linux systems, the \/etc\/sudoers file will already be configured with groups like those shown below that allow the privileges to be assigned to groups set up in the \/etc\/group file. In those cases, you don\u2019t need to use the visudo command at all \u00a0\u2013 just be familiar with the groups that bestow root privileges in this way, and make your updates to the \/etc\/group file.<\/p>\n<pre>\n%admin ALL=(ALL) ALL\n%sudo ALL=(ALL:ALL) ALL\n%wheel ALL=(ALL:ALL) ALL\n<\/pre>\n<p>Note that group names are preceded by the % sign.<\/p>\n<p>You can probably display the group providing sudo access in your \/etc\/group file like this since it is probably one of these:<\/p>\n<pre>\n$ egrep \"admin|sudo|wheel\" \/etc\/group\nsudo:x:27:shs,jdoe\n<\/pre>\n<p>The easiest way to give someone sudo privilege is to add them to the empowered group in \/etc\/group. However, that means that they can run <em>any<\/em> command as root. If you want some users to have root authority for a limited set of commands (e.g., adding and removing accounts) you can define the commands you want them to be able to run through a command alias like this:<\/p>\n<pre>\nCmnd_Alias ACCT_CMDS = \/usr\/sbin\/adduser, \/usr\/sbin\/deluser\n<\/pre>\n<p>Then give the user or group the ability to run these commands using sudo with a command like one of these:<\/p>\n<pre>\nnemo ALL=(ALL) ACCT_CMDS\n%techs ALL=(ALL:ALL) ACCT_CMDS\n<\/pre>\n<p>The first line allows the user &#8220;nemo&#8221; to run the twp (adduser and deluser) commands with sudo while the second assigns the same privileges to anyone in the &#8220;tech&#8221; group in the \/etc\/group file.<\/p>\n<h2>who and w<\/h2>\n<p>The who and w commands show you who is logged into the system though w shows more information such as where they logged in from, when they logged in and how long they\u2019ve been idle.<\/p>\n<pre>\n$ w 18:03:35 up 9 days, 22:48, 2 users, load average: 0.00, 0.00, 0.00\nUSER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT\njoe tty2 \/dev\/tty2 27Apr18 9days 7:34 0.09s \/usr\/lib\/x86_64-linux\nshs pts\/1 192.168.0.15 09:50 7.00s 0.28s 0.00s w\n<\/pre>\n<p>Use the \u201csudo update-alternatives \u00a0\u2013 config editor\u201d command if you don\u2019t like the default editor that\u2019s called into play when you run the visudo command. It will offer a number of editors as options and change your setting.<\/p>\n<h2>last<\/h2>\n<p>The last command shows you recent logins for users and is often helpful when you\u2019re trying to track down changes or other activity.<\/p>\n<pre>\n$ last nemo\nnemo pts\/1 192.168.0.15 Wed May 2 07:01 - 08:29 (01:27)\nwtmp begins Tue May 1 10:21:35 2018\n<\/pre>\n<p>Nemo hasn&#8217;t logged in for a while. He might be on vacation (maybe fishing?) or have just recently left the company. This kind of information can be useful in deciding whether you need to follow up on this.<\/p>\n<h2>find<\/h2>\n<p>The find command is used for many types of searches. When it comes to security, you might find yourself looking for files that have no owners (no corresponding accounts) or are both world-writable and executable. Find commands are easy to compose but require some familiarity with its many options for defining what you\u2019re looking for. The first of these two commands will find files with no currently defined owners. The second will find files that likely anyone can both run and modify.<\/p>\n<pre>\n$ sudo find \/home -nouser\n$ sudo find \/ -perm -o=wx\n<\/pre>\n<p>Keep in mind that the -o in the second command refers to the \u201cother\u201d group \u2013 not the owner and not the group associated with the files.<\/p>\n<h2>file<\/h2>\n<p>The file command looks at a file and determines what kind of file it is based on its contents, not its name. Many files (like jpeg files) contain identifiers near the beginnings of the files that identify them. The \u201c.jpg\u201d file in the example below is clearly <em>not<\/em> a true jpeg file but an executable\u00a0\u00a0\u2013 in spite of its name.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3272286\/open-source-tools\/22-essential-security-commands-for-linux.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nThere are many aspects to security on Linux systems \u2013 from setting up accounts to ensuring that legitimate users have no more privilege than they need to do their jobs. This is look at some of the most essential security commands for day-to-day work on Linux systems.sudo<br \/>\nRunning privileged commands with sudo \u00a0\u2013 instead of switching user to root \u00a0\u2013 is one essential good practice as it helps to ensure that you only use root privilege when needed and limits the impact of mistakes. Your access to the sudo command depends on settings in the \/etc\/sudoers and \/etc\/group files. [ Two-Minute Linux Tips: Learn how to master a host of Linux commands in these 2-minute video tutorials ]<br \/>\n$ sudo adduser shark<br \/>\nAdding user `shark&#8217; &#8230;<br \/>\nAdding new group `shark&#8217; (1007) &#8230;<br \/>\nAdding new user `shark&#8217; (1007) with group `shark&#8217; &#8230;<br \/>\nCreating home directory `\/home\/shark&#8217; &#8230;<br \/>\nCopying files from `\/etc\/skel&#8217; &#8230;<br \/>\nEnter new UNIX password:<br \/>\nRetype new UNIX password:<br \/>\npasswd: password updated successfully<br \/>\nChanging the user information for shark<br \/>\nEnter the new value, or press ENTER for the default Full Name []: shark Room Number []: Work Phone []: Home Phone []: Other []:<br \/>\nIs the information correct? [Y\/n] Y<\/p>\n<p>If you run sudo and ask who you are, for example, you&#8217;ll get confirmation that you&#8217;re running the command as root.To read this article in full, please click here(Insider Story) READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1467,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[740,493,739,307],"class_list":["post-1466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-idg-insider","tag-linux","tag-open-source","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>22 essential Linux security commands 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"22 essential Linux security commands 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-22T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/22-essential-linux-security-commands.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"22 essential Linux security commands\",\"datePublished\":\"2018-05-22T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/\"},\"wordCount\":756,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/22-essential-linux-security-commands.jpg\",\"keywords\":[\"IDG Insider\",\"Linux\",\"Open Source\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/\",\"name\":\"22 essential Linux security commands 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/22-essential-linux-security-commands.jpg\",\"datePublished\":\"2018-05-22T10:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/22-essential-linux-security-commands.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/22-essential-linux-security-commands.jpg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/22-essential-linux-security-commands\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IDG Insider\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/idg-insider\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"22 essential Linux security commands\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"22 essential Linux security commands 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/","og_locale":"en_US","og_type":"article","og_title":"22 essential Linux security commands 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-22T10:00:00+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/22-essential-linux-security-commands.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"22 essential Linux security commands","datePublished":"2018-05-22T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/"},"wordCount":756,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/22-essential-linux-security-commands.jpg","keywords":["IDG Insider","Linux","Open Source","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/","url":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/","name":"22 essential Linux security commands 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/22-essential-linux-security-commands.jpg","datePublished":"2018-05-22T10:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/22-essential-linux-security-commands.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/22-essential-linux-security-commands.jpg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/22-essential-linux-security-commands\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"IDG Insider","item":"https:\/\/www.threatshub.org\/blog\/tag\/idg-insider\/"},{"@type":"ListItem","position":3,"name":"22 essential Linux security commands"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1466"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1466\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1467"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}