With great power comes great responsibility.
Over the course of the Luminarium, you have learned how to navigate, manipulate, and control a Linux machine. Before we send you off into the wild, it is only fair that we end with some words of caution—and a little mayhem.
Below is a non-exhaustive collection of seemingly innocent actions that, when executed on a real system, can lead to catastrophic data-loss, denial of service, or even unrecoverable system corruption. All are recoverable on pwn.college (by restarting your container), but they are very real dangers on an unsuspecting computer.
Practice them, marvel at them, do not run them on anything that matters.