X-Git-Url: https://ruderich.org/simon/gitweb/?a=blobdiff_plain;f=shell%2Faliases.in;h=5e9c33a804cf57f77d3cb8ae28d2bbb4ece51e78;hb=8cffd758773fd50b2fafac75795677e7babce7ee;hp=2848f737b02f8249c6cffd9e75723a11339d39ab;hpb=33826e397bdecbdcef6d8d04b944733676b794e1;p=config%2Fdotfiles.git diff --git a/shell/aliases.in b/shell/aliases.in index 2848f73..5e9c33a 100644 --- a/shell/aliases.in +++ b/shell/aliases.in @@ -37,7 +37,7 @@ alias gri='grep -i' alias grr='grep -r' alias grri='grep -ri' alias mc='make clean' -alias mj='make -j' +alias mj='make -j$(nproc)' alias mu=mutt alias rs=reset # like git's reset alias alias sa='ssh-add -t 1h' @@ -45,6 +45,7 @@ alias te=tree # systemd ... (sc is provided as shell script for better completoin) alias jc=journalctl alias lc=loginctl +alias mc=machinectl unalias mv cp 2>/dev/null @@ -120,4 +121,14 @@ info() { command info "$@" 2>/dev/null | less } +# Using su (or sudo) as root to a less privileged user might allow the other +# user to run arbitrary commands as root. See also Debian bugs #628843 and +# #657784. +if test "`id -u`" -eq 0; then + su() { + echo 'never su as root' >&2 + return 1 + } +fi + # vim: ft=sh