Securing Your System: Restricting Access to Commands for Enhanced Security