{"id":3731,"date":"2017-07-17T15:01:00","date_gmt":"2017-07-17T15:01:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/"},"modified":"2017-07-17T15:01:00","modified_gmt":"2017-07-17T15:01:00","slug":"unix-how-random-is-random","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/","title":{"rendered":"Unix: How random is random?"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/07\/random-vladimer_shioshvili-100729292-large.3x2.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>On Unix systems, random numbers are generated in a number of ways and random data can serve many purposes. From simple commands to fairly complex processes, the question \u201cHow random is random?\u201d is worth asking.<\/p>\n<h2>EZ random numbers<\/h2>\n<p>If all you need is a casual list of random numbers, the RANDOM variable is an easy choice. Type &#8220;echo $RANDOM&#8221; and you&#8217;ll get a number between 0 and 32,767 (the largest number that two bytes can hold).<\/p>\n<pre>\n$ echo $RANDOM\n29366\n<\/pre>\n<p>Of course, this process is actually providing a &#8220;pseudo-random&#8221; number. As anyone who thinks about random numbers very often might tell you, numbers generated by a program have a limitation. Programs follow carefully crafted steps, and those steps aren\u2019t even close to being truly random. You can increase the randomness of RANDOM&#8217;s value by seeding it (i.e., setting the variable to some initial value). Some just use the current process ID (via $$) for that. Note that for any particular starting point, the subsequent values that $RANDOM provides are quite predictable.<\/p>\n<aside id=\"fsb-855\" class=\"fakesidebar fakesidebar-auto\"><a href=\"https:\/\/www.networkworld.com\/slideshow\/153439\/linux-best-desktop-distros-for-newbies.html#tk.nww-infsb\">MORE ON NETWORK WORLD: Linux: Best desktop distros for newbies<\/a><\/aside>\n<pre>\n$ RANDOM=$$;echo $RANDOM; echo $RANDOM;echo $RANDOM\n7424\n28301\n30566\n$ RANDOM=$$;echo $RANDOM; echo $RANDOM;echo $RANDOM\n7424\n28301\n30566\n<\/pre>\n<p>If you need random numbers fairly frequently, maybe another seed would work better. Here we&#8217;re using the number of seconds since the Unix epoch.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id=\"\"\/>\n<pre>\n$ RANDOM=`date +%s`;echo $RANDOM;echo $RANDOM;echo $RANDOM\n32077\n1397\n32029\n$ RANDOM=`date +%s`;echo $RANDOM;echo $RANDOM;echo $RANDOM\n16116\n16487\n11588\n<\/pre>\n<p>You can also use the <strong>shuf<\/strong> command to generate pseudo-random numbers. In the command below, we&#8217;re generating 10 numbers between 0 and 32,767. The shuf command should start each sequence with a different number (no need for seeding).<\/p>\n<pre>\n$ shuf -i 0-32767 -n 10\n32157\n16611\n24087\n28301\n9088\n4662\n12780\n30518\n7549\n12830\n<\/pre>\n<h2>More complex random data<\/h2>\n<p>For more serious requirements for random data, such as its use in encryption, some more truly random data comes into play. The \/dev\/random and \/dev\/urandom files get beyond the predictability of programming by making use of environmental noise gathered from device drivers and other system sources and stored it in an \u201centropy pool\u201d.<\/p>\n<p>Pseudo-random number generation (often referred to as \u201cPRNG\u201d) on Unix systems makes use of these two files. From the command line, these files look like this:<\/p>\n<aside id=\"fsb-2599\" class=\"fakesidebar fakesidebar-auto fakesidebar-sponsored\"><strong>[ <a href=\"https:\/\/pluralsight.pxf.io\/c\/321564\/424552\/7490?u=https%3A%2F%2Fwww.pluralsight.com%2Fpaths%2Fcertified-information-systems-security-professional-cisspr\" rel=\"nofollow\">Prepare to become a Certified Information Security Systems Professional with this comprehensive online course from PluralSight. Now offering a 10-day free trial!<\/a> ]<\/strong><\/aside>\n<pre>\ncrw-rw-rw- 1 root root 1, 8 Jun 18 13:24 random\ncrw-rw-rw- 1 root root 1, 9 Jun 18 13:24 urandom\n<\/pre>\n<p>Like most, if not all, of the files in \/dev, these files are both zero-length files and, like \/dev\/null, provide a special service that isn\u2019t obvious by looking at a file listing. The \/dev\/random and \/dev\/urandom files can be used to generate numbers that at least approach approximate random values and random numbers are key to encrypting content in order to prevent it from being predictable.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id=\"\"\/>\n<p>Using the stat command, you can get a more descriptive listing than ls provides for either of these files. Here\u2019s the listing for \/dev\/urandom. Notice the zero length and the date stamps. This file was generated when the system last booted.<\/p>\n<pre>\n$ stat \/dev\/urandom File: \/dev\/urandom Size: 0 Blocks: 0 IO Block: 4096 character special file\nDevice: 6h\/6d Inode: 1056 Links: 1 Device type: 1,9\nAccess: (0666\/crw-rw-rw-) Uid: ( 0\/ root) Gid: ( 0\/ root)\nAccess: 2017-07-15 13:24:49.719736172 -0400\nModify: 2017-07-15 13:24:49.719736172 -0400\nChange: 2017-07-15 13:24:49.719736172 -0400 Birth: -\n<\/pre>\n<h2>Examining entropy<\/h2>\n<p>To get an idea how much entropy is available on a system, you can look at the special file named \u201centropy_avail\u201d \u2013 \/proc\/sys\/kernel\/random\/entropy_avail to be more precise. Note that this file lives in the \/proc file system\u2014not a file system like those we generally work in, but a file system related to the kernel and running processes. The entropy_avail file will look like it\u2019s empty, but displaying its contents tell you what you need to know.<\/p>\n<pre>\n-r--r--r-- 1 root root 0 Jul 15 16:01 entropy_avail\n<\/pre>\n<p>To get a feel for how much pseudo-random data is available in your entropy pool, you can run this command:<\/p>\n<pre>\n$ cat \/proc\/sys\/kernel\/random\/entropy_avail\n2684\n<\/pre>\n<p>The number shown appears to represent the number of bits of entropy that have been collected. Even 2,684 might not seem like much in a world in which we routinely speak in terms of terrabytes, but numbers above 100 are said to be a good sign. In addition, the number will change frequently. Check three times in a row, and you might see something like this.<\/p>\n<pre>\n$ cat \/proc\/sys\/kernel\/random\/entropy_avail\n2683\n$ cat \/proc\/sys\/kernel\/random\/entropy_avail\n2684\n$ cat \/proc\/sys\/kernel\/random\/entropy_avail\n2493\n<\/pre>\n<p>The two files \u2014\u00a0\/dev\/random and \/dev\/urandom \u2014 consume the entropy pool and work nearly the same except for one important distinction \u2014\u00a0\/dev\/random will block when it runs out of entropy and might halt a process while \/dev\/urandom will never block, but might have less entropy. The \/dev\/urandom file appears to be the more reliable choice today.<\/p>\n<h2>Randomness vs. entropy<\/h2>\n<p>Now that the word \u201centropy\u201d has entered the discussion, let\u2019s consider the relationship of the words randomness and entropy. While tightly related, they don\u2019t mean exactly the same thing. Entropy is reminiscent of a coin toss and is a measure of the uncertainty of an outcome, while randomness is related to a probabilistic distribution. For computer folk, the terms are often used as if they mean exactly the same thing.<\/p>\n<h2>Generating files with random data<\/h2>\n<p>You can create a file of pseudo-random data if you need one. In this command, we create a 1 gigabyte file called \u201cmyfile\u201d and then examine the first line with an od command just to get a feel for what was created.<\/p>\n<p>Creating the file:<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id=\"\"\/>\n<pre>\n$ head -c 1G &lt; \/dev\/urandom &gt; myfile\n<\/pre>\n<p>Looking at the file:<\/p>\n<pre>\n$ ls -l myfile\n-rw-rw-r-- 1 shs shs 1073741824 Jul 14 15:10 myfile\n$ head -1 myfile | od -bc\n0000000 210 365 102 233 332 203 075 262 302 064 255 110 265 372 365 176 210 365 B 233 332 203 = 262 302 4 255 H 265 372 365 ~\n0000020 274 243 116 012 274 243 N \\n\n<\/pre>\n<h2>Generating random numbers<\/h2>\n<p>You can use \/dev\/urandom to generate pseudo-random numbers on the command line like this.<\/p>\n<pre>\n$ od -vAn -N4 -tu &lt; \/dev\/urandom 2760998497\n<\/pre>\n<p>Commands like this that pull data from \/dev\/urandom and use od to process it can generate nearly random numbers. Run the same command numerous times and you\u2019ll see that you get a range of numbers.<\/p>\n<pre>\n$ od -vAn -N4 -tu &lt; \/dev\/urandom 184254494\n$ od -vAn -N4 -tu &lt; \/dev\/urandom 3081534763\n<\/pre>\n<p>Two of the options used with these of commands are particularly interesting. The -N controls the size of the output as the number in bytes. So, -N4 means the resultant number should be four bytes long. This doesn\u2019t mean the resultant number provided can\u2019t be a small number like 12\u2014just that it will use four bytes. The largest numbers you will see will have ten digits. Switch to -N5 and you\u2019ll get two numbers\u2014one using 4 bytes and one using 1. Omit the -N option, and you\u2019ll get a continuous stream of numbers\u2014at least until you get tired of looking at them and hit ^C.<\/p>\n<pre>\n$ od -vAn -N5 -tu &lt; \/dev\/urandom 823515068 196\n$ od -vAn -tu &lt; \/dev\/urandom 2860283906 3419549082 3207848245 2737687912 1333710913 933348251 2572772980 1418852288 3788708580 870673152 4083922259 1506538622 3772099425 3296232922 692742105 818767715 3576300418 2497391372 3756319951 1357979412 1588018330 740469378 3140770678 958473449 187769983 168320294 393843609 3925659647 1320592631 3858359323 1435946222 2841928818 99971705 1732928020 2292358742 2367929537\n<\/pre>\n<p>Do this same thing with \/dev\/random and you\u2019re likely to run out of steam fairly quickly.<\/p>\n<pre>\n$ od -vAn -tu &lt; \/dev\/random 897129786 2714319998 1496103441 4272099144 99601145 3584433910 2759928205 817917225 1692688250 3711124362 787695563 2107932582 427417199 3136902189 1527656210 2881971698 3895588188 1111869233 1024834659 3486503580 4184363003 3255228299 634631930 2477891792\n^Z\n[1]+ Stopped od -vAn -tu &lt; \/dev\/random\n<\/pre>\n<p>Note that the ^Z was used to suspend the process when it hung on the command line. Also keep in mind that the entropy pool gets used up and regenerates.<\/p>\n<h2>Beyond \/dev\/urandom<\/h2>\n<p>Given the limitations of \/dev\/random and \/dev\/urandom, there are also some interesting options. There are now more than a dozen a hardware random number generators (also known as \u201ctrue random number generators\u201d, often referred to by the acronym \u201cTRNG\u201d) available today. In addition, \u201cEntropy as a Service\u201d (EaaS) is available as an option that could dramatically change the nature of randomness on systems close to you. More on this soon!<\/p>\n<p>To get a quick introduction to EaaS, check out <a href=\"http:\/\/csrc.nist.gov\/projects\/eaas\/\" target=\"_blank\" rel=\"nofollow\">NIST\u2019s introduction<\/a>\u2014and stay tuned for some additional insights here on NetworkWorld.<\/p>\n<div class=\"end-note\">\n<div id=\"\" class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\">LinkedIn<\/a> to comment on topics that are top of mind.<\/div>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3208389\/linux\/unix-how-random-is-random.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nOn Unix systems, random numbers are generated in a number of ways and random data can serve many purposes. From simple commands to fairly complex processes, the question \u201cHow random is random?\u201d is worth asking.EZ random numbers<br \/>\nIf all you need is a casual list of random numbers, the RANDOM variable is an easy choice. Type &#8220;echo $RANDOM&#8221; and you&#8217;ll get a number between 0 and 32,767 (the largest number that two bytes can hold).$ echo $RANDOM<br \/>\n29366<\/p>\n<p>Of course, this process is actually providing a &#8220;pseudo-random&#8221; number. As anyone who thinks about random numbers very often might tell you, numbers generated by a program have a limitation. Programs follow carefully crafted steps, and those steps aren\u2019t even close to being truly random. You can increase the randomness of RANDOM&#8217;s value by seeding it (i.e., setting the variable to some initial value). Some just use the current process ID (via $$) for that. Note that for any particular starting point, the subsequent values that $RANDOM provides are quite predictable.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3732,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[493,307],"class_list":["post-3731","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-linux","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unix: How random is random? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unix: How random is random? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-17T15:01:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"467\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Unix: How random is random?\",\"datePublished\":\"2017-07-17T15:01:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/\"},\"wordCount\":1152,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg\",\"keywords\":[\"Linux\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/\",\"name\":\"Unix: How random is random? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg\",\"datePublished\":\"2017-07-17T15:01:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg\",\"width\":700,\"height\":467},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/linux\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Unix: How random is random?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unix: How random is random? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/","og_locale":"en_US","og_type":"article","og_title":"Unix: How random is random? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2017-07-17T15:01:00+00:00","og_image":[{"width":700,"height":467,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Unix: How random is random?","datePublished":"2017-07-17T15:01:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/"},"wordCount":1152,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg","keywords":["Linux","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/","url":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/","name":"Unix: How random is random? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg","datePublished":"2017-07-17T15:01:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/unix-how-random-is-random.jpg","width":700,"height":467},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/unix-how-random-is-random\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux","item":"https:\/\/www.threatshub.org\/blog\/tag\/linux\/"},{"@type":"ListItem","position":3,"name":"Unix: How random is random?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3731"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3731\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3732"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}