What is
Linux and why it is used?
Which Linux
OS is best?
Why do
hackers use Linux?
How do I
install Linux?
Which OS do
hackers use?
What
language do hackers use in linux?
What is Linux and why is it used?
The Linux
is - with the simplest expression - an operating system. Operating systems are
software programs that allow applications and users to access computers to
perform the required operation. An operating system moves a command from an
application, for example, to a computer processor. The wizard then performs the
required task, and then sends the results to the application through the
operating system. The operating system thus serves as the link between
different computer parts.
From the
above definition, Linux is very similar to any other operating system such as
Windows “” and OS X. In fact, there is a difference that distinguishes Linux
from other operating systems. In 2008, the Linux operating system formed a $25
billion system.
Since its
inception in 1991, Linux has expanded into a powerful force in computing.
Everything from the New York Stock Exchange to mobile phones and end up with
giant consumer computers.
Because
Linux is an open operating system, it is developed collaboratively, meaning
that no single company is solely responsible for developing or supporting the
Linux system. Companies that contribute to the economic share of Linux share
the costs of research and development with their partners and competitors.
Thus, the distribution of the development burden of the Linux system among
companies and individuals has contributed positively to the creation of a
large, effective development environment and many unannounced software
innovations.
Every new
version of the Linux kernel shares over 1,000 developers in more than 100
different companies. In the past two years alone, more than 3,200 developers
from 200 companies have participated in the development of the Linux kernel,
which is - the kernel - which is only a small part of the Linux system.
Where is Linux used?
One of the
hallmarks of Linux is "where we can use Linux." Windows and OS X are
often used in PCs such as desktop and laptop computers, while other operating
systems, such as Symbian, are used in small devices such as mobile phones and
PDAs. Supercomputers in academic labs and large companies use specialized
operating systems such as as as as as/400 and Cray OS.
Linux, on
the other hand, started as a server operating system and then proved its
quality as a desktop operating system, and today Linux can be used in many
machines ranging from hours to supercomputers.
Which Linux OS is best?
The Linux
system was built on the Unix system, which was very popular in the 1970s and was
used by many software developers, so many different distributions of Linux all
use the Linux kernel, which can be considered the beating heart For Linux
operating system and then the various distributions are built with different
desktop designs for each distribution.the best Linux distributions are designed
and programd for specific user categories, for example, Ubuntu is one of the
easiest distributions of the Linux system designed for modern Linux users.
Opposite is the Arch distribution designed for experienced Linux users who can
easily use the Terminal command window.
1- ElementaryOS
If you want
a beautiful, distinctive design and don't give the impression that you are a
rogue Linux user category who most of the time uses the command window, the
Elementary OS distribution is the one you're looking for. These are the most
attractive distributions similar to MacOS Mac OS. The distribution comes in a
Gnome-based Pantheon desktop environment.
The latest
version of the Elemental OS distribution is called Loki Lucy, more beautiful
than the previous version. It has its own application installation interface
called APPCEnter, which is the best way to install applications without using
the command window.
The
distribution comes with pre-installed programs such as EppHany, the Geary Email
Client, and some tools for the operating system. You may need to install some
additional software but it is not a difficult task with this distribution.
If you want
a beautiful, distinctive design and don't give the impression that you are a
rogue Linux user category who most of the time uses the command window, the
Elementary OS distribution is the one you're looking for. These are the most
attractive distributions similar to MacOS Mac OS. The distribution comes in a
Gnome-based Pantheon desktop environment.
The latest
version of the Elemental OS distribution is called Loki Lucy, more beautiful
than the previous version. It has its own application installation interface
called APPCEnter, which is the best way to install applications without using
the command window.
The
distribution comes with pre-installed programs such as EppHany, the Geary Email
Client, and some tools for the operating system. You may need to install some
additional software but it is not a difficult task with this distribution.
2-Manjaro
Manjaro is one of the best Linux distributions for easy use on desktop computers, and is based on the Arch Linux distribution. Key features of this distribution include easy installation, automatic hardware detection and driver loading, stable and stable version, ability to install kernels, and special bash text for extensive graphics driver management and desktop configuration.
Next to
that, Manjaro has a community forum for Manjaro users that provides ongoing
support for users.
3-Linux Mint
Linux Mint
Distribution is ideal for new Linux users. It comes with many programs you'll
need when you switch from Windows, Mac or OS such as the open source
LibreOffice program, which is an ideal alternative to Microsoft Office
programs. Distribution also supports many video and audio formats, enabling you
to play videos, DVDs and listen to music without worrying about the operating
system's ability to play them.
You can
download 3 different flavors of the Mint 19 desktop environment, where
environments vary in shape, design, window shape, and menus. Currently the most
popular environment is Cinnamon, but you can choose the Mate or XFCE
environment.
The
distribution includes Timeshift version 18.3 which allows users to restore
computers to a previous point in case of any operating system problem. All
desktop environments offer many features and customization options, so don't
hesitate to run any of them.
4- ArchLinux
This
distribution is intended for experienced users or veterans of Linux users. The
Arch distribution allows packets for distribution to be customized using the
Terminal command window. It is easy for developers who have an old experience
and do not want to install unnecessary packages on their operating system.there
is a distribution similar to Arch, called Antergos (image above) It comes with
more definitions of the hardware, software installed, and desktop environment
for easy control of the operating system, but is based primarily on the Arch
distribution
5-Ubuntu
Ubuntu is
one of the most popular Linux distributions many consider to be one of the best
Linux distributions since the advent of the Linux operating system and is
strongly recommended for new users of the system Linux for ease of use.New
versions of Ubuntu are released every six months, the latest of which is Ubuntu
version 18.04. Every year the Canadian developer releases an LTS version of
Ubuntu, including five years of security updates and general maintenance.
The current
version of LTS Ubuntu18.04 uses the GNOME 3 desktop environment. Which may be
less familiar to Windows users or Mac OS users. There are versions of Ubuntu
that use different office environments such as Lubuntu. Uses a light LXDE-based
desktop environment and a choice of fast applications that reduce stress on
system resources.
6-Tails
The Linux
Tails distribution is one of the most exclusive and aims to hide your location
and identity as much as possible so that Edward Snowden uses it.the
distribution uses Tor to direct Operating system communications over the
Internet, designed to prevent data interception and analysis. Distributed on
Debian Linux and using the GNOME desktop environment, this distribution has a
clear, easy-to-use desktop.Tails Distribution is not for all users unless you
are looking for a premium operating system that provides privacy and
convenience you should use.
Why do hackers use Linux?
Do you know
why true hackers prefer Linux distribution on Mac, Windows, and other operating
systems?
We may be
able to say that the availability of many piracy tools and the nature of open
sources for Linux is the main reason that hackers are driving Linux. But it is
not.
Hackers
choose Linux for many reasons. In this article we will mention these reasons:
Why do real hackers use Linux?
1-who are
the Pirates? :
A hacker is
the person seeking and exploiting vulnerabilities in a computer system or
network and obtaining unauthorized access to your data.
The motive
behind the infiltrators may be many reasons, such as profit, protest,
challenge, And enjoy them or assess these weaknesses to help eliminate them.
Maybe we
can say that the shaker is a "smart programr". Because
real Hashemite
always enjoys learning details in a programming or system language. Because
they like programming rather than looking at it.
So from the
point mentioned above, Obviously, a hacker needs an operating system that
provides them with maximum security to test their skills and those that make
them safer to do their activities.
Back again
why the true hackers would prefer Linux distribution:
True
hackers or piracy groups such as: Anonymous, Lizard Squad and others use Linux
for piracy purposes. The choice of these Linux violators clearly says Linux’s
power over the world. Regardless of Linux piracy, almost all of the giant
computers that operate today are powerful.
Yes, I know
– you are waiting for this list why hackers use Linux. So let's go.
Why do real
pirates prefer Linux over the other operating system?
Open
Source: Yes, this is the first reason.
Are hackers
using windows?, are hackers using Mac? — No, real-time hacker uses Linux
because Linux is a free and open software for development and distribution.
What is an
open source program? : a program with the original source code provided free of
charge and can be redistributed and modified.
The Linux
distribution is similar to a fully controlled personal operating system.
Because the Linux source code is at your fingertips, you can easily modify the
Linux distribution source code according to your need, and most applications
running on this operating system are also open source, making it more useful.
Neither Windows nor Mac provides this type of power and Linux.
2-Privacy
and Security:
Have you
ever wondered why Linux does not require antivirus software?
We all use
additional antivirus software in addition to pre-installed Windows Defender –
why? Because we don't trust that Windows has virus protection. So we're worried
about our online security.
On the
other hand, Linux does not require antivirus protection because Linux is the
most secure operating system because it contains too few vulnerabilities.
The next
important feature is that Linux comes with security and privacy - all hackers
want to stay in the dark. So being anonymous is an important program for all
hackers. With the help of some tools in Linux, the hacker can remain under the
entire hood.
Yes now you
will say: It is also possible in Windows with a good VPN service. But the fact
is that even if you are using a good VPN, you can't hide it from spyware
3-Compatibility
Linux
distrias supports all UNIX software packages and can support all of its common
file formats. So you can run Windows programs with the help of a good emulator.
4-easy and
quick to install:
It may be
difficult for beginners.
For
pirates, Linux is useful – because hackers always convert their operating
system from time to time – and Linux distribution is always easy to install.
Linux is installed faster than other operating systems. The boot time for this
operating system is faster than some operating systems.
How do I install Linux?
After
loading one of Lenex's distributions.
Create
a new dummy device
By pressing
a new button, a screen appears to name the imaginary device that will appear to
us in the list and name it Linux or whatever you want.
We will
select the OS type from the drop-down menu, Since the distribution is based on
Debian architecture, it is Linux, and then its version we can choose which one
of them we choose Debian 64 bit because its distribution structure is 64 bit.
Select
RAM
Then we'll
click Next, The selection of RAM for this imaginary device is then displayed.
This
depends, of course, on how much of the rum is on your PC on which you installed
the VirtualBox.
I have
large memory, so I'll put 2 GB of RAM depending on your device. It is best to
have the lowest RAM size of 4 gigabits so you can rest in giving phantom
devices their own vowels.
Create
a Hard Disk
We press
next, and we leave the default option of creating a Hard Disk. There are three
options.
If you have
downloaded the version of the Virtual Box for any operating system, you can
choose the last option, browse the browser, and choose the Hard Disk you
choose.
I'll
install it from scratch and click create Virtual Hard Disk now.
In the next
window I'll leave it with the default option, Because there are more than one
type of Virtual Hard Disk.
From AMK
VMDK running on VMware VirtualBox and other shell system building systems.
In the
following window I will make Hard Disk dynamically constructed or scale
dynamically rather than fixed. Press Next:
Create
the system folder
In the next
window, he will give me what I call the special folder on which to install the
Kali Linux operating system and the Hard Disk size.
I'll make
the Hard Disk 32 GB and you can choose where you'll install Kali Linux, and
I'll leave it with the default option. Then press create.
So far we
have created Virtual Machine but we haven't installed Kali Linux so we have to
do a few things.
Select
screen Crate
Right-click,
select settings, and we see Virtual Machine options. It's also USB if we don't
want to use USB, NAT, bridge, or host only.
In the
previous lesson, we talked about the differences between the three types. And
about the kinds of the network cards, and we will talk about them later with
the permission of God Almighty.
I can now
leave Bridge to engage on the inside network I am now on.
Name
the imaginary device
In the
Device Label window in Network Settings, such as Technology Spacebar.
In the
following window, choose the password for the root user, who has all the
permissions on the operating system, and is similar to the Administrator on
Windows.
Then I set
the password which is very important and you need to save it. I'll type TWR,
which is the word to use in linuxand then press continue.
Finally
take off the appliance and enter the distribution
Which operating system does hackers use?
The most
popular and best Linux operating systems used by security experts:
Kali Linux
Developed
by Offensive Security as a rewriting of the obsolete BackTrack distribution,
Bac-Turks tops the list of the best operating system for security and security
purposes, built on a Debian distribution plus more than 600 hacking test tools
and access 800 tools for all systems, whether websites, applications or
personal devices, whether mobile, computer, or security systems such as
cameras, etc., are pre-installed with the system and you can update and add
much more from the distribution center. This distribution is available for all
devices There are also versions of VMware's imaginary use and also support arm
to download from here.
Parrot Security OS
This
cloud-based parrot Security OS was developed by the Frozenbox team for ethical
hacking, hacking testing, criminal analytics, encryption and other tools used
in this field. Compared to other systems, it is much lighter and more efficient
In addition to the many legally recognized tools and if you are professional in
using this assembly, you can easily find a job opportunity in many places and
you can also act as a breach of ethics while at home and your identity is
unknown, knowing that the distribution is a combination of the Frozenbox
operating system and Kali Linux the system uses Linux servers to update its
tools as well as its own servers with its own tools the system comes with two
user interfaces, Mate and Gnome 2, to download from here
BlackArch Linux
I may be
too prescribing this distribution but it is the first competitor, and even
surpasses this distribution to Kali Linux Complete toolkit for security
researchers and protection experts with more than 1,400 tools and up to 1,600
tools that come with them in advance (i.e., auto-humidification during system
installation) It is constantly updated and has added many tools to make it the
first choice for security and security professionals and built on the Arch
Linux distribution for download here
What language does Hacker use in Linux
Ruby programming language
I think that
the Ruby programming language is the best that you should start by learning if
you want to get into the world of penetration, some will tell you the opinion
and say that the Python is the first place and is the best, but I do not agree
and strongly. The Ruby programming language is strong enough to program and
make any hacking application or code capable of making a simple or complex
hacking, and we do not forget that the largest hacking project, the Metasploit,
started with Ruby and included multiple codes and codes in excess of half in
Ruby programming. To share other projects within it between the Python and the
Perl. For the Ruby programming language and also its framework Rails have many
strong characteristics, Ruby may be a little difficult to understand or
manipulate, but it is worth using and is extremely smart and powerful in the
field.
Python programming language
For Python
programming language, many uses are involved in programming; It can be used in
the creation of Discovery software, or web software, even in data analysis,
data science and many other areas, and it may be mentioned that it is also used
in the field of penetration, as the Python is essential in the world of
penetration to provide it for several packages to detect the lines of software
and platforms that target it. And detect its thaw and collect data about the
target platform. This is not just the case, but there are packages in the
Python programming language that enable you to make powerful hacking software
capable of breaking the security barrier of many software. You'll need strong
courses to learn to use, of course, but your learning will provide you with a
strong experience in your software industry that can target any platform.
learning Python language online for free
Java Language
The dry
language is also liberalized and widely used on the web, on the Dyscotop and on
the mobile, and we do not forget that Java can be used on the data science and
structural analysis, in general. Your learning will help you uncover gaps,
problems and such threats to Java-based software, as Java is a wide range of
programs, your knowledge of the amount of candy you have made will enable you
to change its flavor or detect the flavors that spoil your candy.
Uses of java language, learning requirements, java features and best platforms
I hope I would tell you if you have any questions I leave in a comment.
2 Comments
Thanks. Please ask for permission before posting special links
ReplyDeleteUse this diet hack to drop 2 lb of fat in just 8 hours
ReplyDeleteAt least 160,000 women and men are utilizing a easy and SECRET "liquid hack" to lose 2 lbs each and every night as they sleep.
It is simple and it works on anybody.
Here's how to do it yourself:
1) Grab a clear glass and fill it up half the way
2) Then use this awesome HACK
so you'll be 2 lbs skinnier the next day!
Post a Comment