What is Linux and why it is used?
Which Linux OS is best?
Why do hackers use Linux?
How do I install Linux?
Which OS do hackers use?
What language do hackers use in linux?
logo


What is Linux and why is it used?

The Linux is - with the simplest expression - an operating system. Operating systems are software programs that allow applications and users to access computers to perform the required operation. An operating system moves a command from an application, for example, to a computer processor. The wizard then performs the required task, and then sends the results to the application through the operating system. The operating system thus serves as the link between different computer parts.
From the above definition, Linux is very similar to any other operating system such as Windows “” and OS X. In fact, there is a difference that distinguishes Linux from other operating systems. In 2008, the Linux operating system formed a $25 billion system.
Since its inception in 1991, Linux has expanded into a powerful force in computing. Everything from the New York Stock Exchange to mobile phones and end up with giant consumer computers.
Because Linux is an open operating system, it is developed collaboratively, meaning that no single company is solely responsible for developing or supporting the Linux system. Companies that contribute to the economic share of Linux share the costs of research and development with their partners and competitors. Thus, the distribution of the development burden of the Linux system among companies and individuals has contributed positively to the creation of a large, effective development environment and many unannounced software innovations.
Every new version of the Linux kernel shares over 1,000 developers in more than 100 different companies. In the past two years alone, more than 3,200 developers from 200 companies have participated in the development of the Linux kernel, which is - the kernel - which is only a small part of the Linux system.

    Where is Linux used?

Which OS do hackers use
One of the hallmarks of Linux is "where we can use Linux." Windows and OS X are often used in PCs such as desktop and laptop computers, while other operating systems, such as Symbian, are used in small devices such as mobile phones and PDAs. Supercomputers in academic labs and large companies use specialized operating systems such as as as as as/400 and Cray OS.
Linux, on the other hand, started as a server operating system and then proved its quality as a desktop operating system, and today Linux can be used in many machines ranging from hours to supercomputers.

Which Linux OS is best?

The Linux system was built on the Unix system, which was very popular in the 1970s and was used by many software developers, so many different distributions of Linux all use the Linux kernel, which can be considered the beating heart For Linux operating system and then the various distributions are built with different desktop designs for each distribution.the best Linux distributions are designed and programd for specific user categories, for example, Ubuntu is one of the easiest distributions of the Linux system designed for modern Linux users. Opposite is the Arch distribution designed for experienced Linux users who can easily use the Terminal command window.

1- ElementaryOS

If you want a beautiful, distinctive design and don't give the impression that you are a rogue Linux user category who most of the time uses the command window, the Elementary OS distribution is the one you're looking for. These are the most attractive distributions similar to MacOS Mac OS. The distribution comes in a Gnome-based Pantheon desktop environment.
The latest version of the Elemental OS distribution is called Loki Lucy, more beautiful than the previous version. It has its own application installation interface called APPCEnter, which is the best way to install applications without using the command window.
The distribution comes with pre-installed programs such as EppHany, the Geary Email Client, and some tools for the operating system. You may need to install some additional software but it is not a difficult task with this distribution.
If you want a beautiful, distinctive design and don't give the impression that you are a rogue Linux user category who most of the time uses the command window, the Elementary OS distribution is the one you're looking for. These are the most attractive distributions similar to MacOS Mac OS. The distribution comes in a Gnome-based Pantheon desktop environment.
The latest version of the Elemental OS distribution is called Loki Lucy, more beautiful than the previous version. It has its own application installation interface called APPCEnter, which is the best way to install applications without using the command window.
The distribution comes with pre-installed programs such as EppHany, the Geary Email Client, and some tools for the operating system. You may need to install some additional software but it is not a difficult task with this distribution.

2-Manjaro

Manjaro is one of the best Linux distributions for easy use on desktop computers, and is based on the Arch Linux distribution. Key features of this distribution include easy installation, automatic hardware detection and driver loading, stable and stable version, ability to install kernels, and special bash text for extensive graphics driver management and desktop configuration.

Next to that, Manjaro has a community forum for Manjaro users that provides ongoing support for users.

 3-Linux Mint

Linux Mint Distribution is ideal for new Linux users. It comes with many programs you'll need when you switch from Windows, Mac or OS such as the open source LibreOffice program, which is an ideal alternative to Microsoft Office programs. Distribution also supports many video and audio formats, enabling you to play videos, DVDs and listen to music without worrying about the operating system's ability to play them.
You can download 3 different flavors of the Mint 19 desktop environment, where environments vary in shape, design, window shape, and menus. Currently the most popular environment is Cinnamon, but you can choose the Mate or XFCE environment.
The distribution includes Timeshift version 18.3 which allows users to restore computers to a previous point in case of any operating system problem. All desktop environments offer many features and customization options, so don't hesitate to run any of them.

4- ArchLinux

archlinux
  This distribution is intended for experienced users or veterans of Linux users. The Arch distribution allows packets for distribution to be customized using the Terminal command window. It is easy for developers who have an old experience and do not want to install unnecessary packages on their operating system.there is a distribution similar to Arch, called Antergos (image above) It comes with more definitions of the hardware, software installed, and desktop environment for easy control of the operating system, but is based primarily on the Arch distribution

5-Ubuntu

Ubuntu is one of the most popular Linux distributions many consider to be one of the best Linux distributions since the advent of the Linux operating system and is strongly recommended for new users of the system Linux for ease of use.New versions of Ubuntu are released every six months, the latest of which is Ubuntu version 18.04. Every year the Canadian developer releases an LTS version of Ubuntu, including five years of security updates and general maintenance.
The current version of LTS Ubuntu18.04 uses the GNOME 3 desktop environment. Which may be less familiar to Windows users or Mac OS users. There are versions of Ubuntu that use different office environments such as Lubuntu. Uses a light LXDE-based desktop environment and a choice of fast applications that reduce stress on system resources.

6-Tails

The Linux Tails distribution is one of the most exclusive and aims to hide your location and identity as much as possible so that Edward Snowden uses it.the distribution uses Tor to direct Operating system communications over the Internet, designed to prevent data interception and analysis. Distributed on Debian Linux and using the GNOME desktop environment, this distribution has a clear, easy-to-use desktop.Tails Distribution is not for all users unless you are looking for a premium operating system that provides privacy and convenience you should use.

   Why do hackers use Linux?

Do you know why true hackers prefer Linux distribution on Mac, Windows, and other operating systems?
We may be able to say that the availability of many piracy tools and the nature of open sources for Linux is the main reason that hackers are driving Linux. But it is not.
Hackers choose Linux for many reasons. In this article we will mention these reasons: Why do real hackers use Linux?
1-who are the Pirates? :
A hacker is the person seeking and exploiting vulnerabilities in a computer system or network and obtaining unauthorized access to your data.
The motive behind the infiltrators may be many reasons, such as profit, protest, challenge, And enjoy them or assess these weaknesses to help eliminate them.
Maybe we can say that the shaker is a "smart programr". Because
real Hashemite always enjoys learning details in a programming or system language. Because they like programming rather than looking at it.
So from the point mentioned above, Obviously, a hacker needs an operating system that provides them with maximum security to test their skills and those that make them safer to do their activities.
Back again why the true hackers would prefer Linux distribution:
True hackers or piracy groups such as: Anonymous, Lizard Squad and others use Linux for piracy purposes. The choice of these Linux violators clearly says Linux’s power over the world. Regardless of Linux piracy, almost all of the giant computers that operate today are powerful.
Yes, I know – you are waiting for this list why hackers use Linux. So let's go.
Why do real pirates prefer Linux over the other operating system?
Open Source: Yes, this is the first reason.
Are hackers using windows?, are hackers using Mac? — No, real-time hacker uses Linux because Linux is a free and open software for development and distribution.
What is an open source program? : a program with the original source code provided free of charge and can be redistributed and modified.
The Linux distribution is similar to a fully controlled personal operating system. Because the Linux source code is at your fingertips, you can easily modify the Linux distribution source code according to your need, and most applications running on this operating system are also open source, making it more useful. Neither Windows nor Mac provides this type of power and Linux.
2-Privacy and Security:
Have you ever wondered why Linux does not require antivirus software?
We all use additional antivirus software in addition to pre-installed Windows Defender – why? Because we don't trust that Windows has virus protection. So we're worried about our online security.
On the other hand, Linux does not require antivirus protection because Linux is the most secure operating system because it contains too few vulnerabilities.
The next important feature is that Linux comes with security and privacy - all hackers want to stay in the dark. So being anonymous is an important program for all hackers. With the help of some tools in Linux, the hacker can remain under the entire hood.
Yes now you will say: It is also possible in Windows with a good VPN service. But the fact is that even if you are using a good VPN, you can't hide it from spyware
3-Compatibility
Linux distrias supports all UNIX software packages and can support all of its common file formats. So you can run Windows programs with the help of a good emulator.
4-easy and quick to install:
It may be difficult for beginners.
For pirates, Linux is useful – because hackers always convert their operating system from time to time – and Linux distribution is always easy to install. Linux is installed faster than other operating systems. The boot time for this operating system is faster than some operating systems.

How do I install Linux?


 After loading one of Lenex's distributions.
Create a new dummy device
By pressing a new button, a screen appears to name the imaginary device that will appear to us in the list and name it Linux or whatever you want.
We will select the OS type from the drop-down menu, Since the distribution is based on Debian architecture, it is Linux, and then its version we can choose which one of them we choose Debian 64 bit because its distribution structure is 64 bit.
Select RAM
Then we'll click Next, The selection of RAM for this imaginary device is then displayed.
This depends, of course, on how much of the rum is on your PC on which you installed the VirtualBox.
I have large memory, so I'll put 2 GB of RAM depending on your device. It is best to have the lowest RAM size of 4 gigabits so you can rest in giving phantom devices their own vowels.
Create a Hard Disk
We press next, and we leave the default option of creating a Hard Disk. There are three options.
If you have downloaded the version of the Virtual Box for any operating system, you can choose the last option, browse the browser, and choose the Hard Disk you choose.
I'll install it from scratch and click create Virtual Hard Disk now.
In the next window I'll leave it with the default option, Because there are more than one type of Virtual Hard Disk.
From AMK VMDK running on VMware VirtualBox and other shell system building systems.
In the following window I will make Hard Disk dynamically constructed or scale dynamically rather than fixed. Press Next:
Create the system folder
In the next window, he will give me what I call the special folder on which to install the Kali Linux operating system and the Hard Disk size.
I'll make the Hard Disk 32 GB and you can choose where you'll install Kali Linux, and I'll leave it with the default option. Then press create.
So far we have created Virtual Machine but we haven't installed Kali Linux so we have to do a few things.
Select screen Crate
Right-click, select settings, and we see Virtual Machine options. It's also USB if we don't want to use USB, NAT, bridge, or host only.
In the previous lesson, we talked about the differences between the three types. And about the kinds of the network cards, and we will talk about them later with the permission of God Almighty.
I can now leave Bridge to engage on the inside network I am now on.
Name the imaginary device
In the Device Label window in Network Settings, such as Technology Spacebar.
In the following window, choose the password for the root user, who has all the permissions on the operating system, and is similar to the Administrator on Windows.
Then I set the password which is very important and you need to save it. I'll type TWR, which is the word to use in linuxand then press continue.
Finally take off the appliance and enter the distribution

Which operating system does hackers use?

The most popular and best Linux operating systems used by security experts:

Kali Linux

kali linuxDeveloped by Offensive Security as a rewriting of the obsolete BackTrack distribution, Bac-Turks tops the list of the best operating system for security and security purposes, built on a Debian distribution plus more than 600 hacking test tools and access 800 tools for all systems, whether websites, applications or personal devices, whether mobile, computer, or security systems such as cameras, etc., are pre-installed with the system and you can update and add much more from the distribution center. This distribution is available for all devices There are also versions of VMware's imaginary use and also support arm to download from here.

Parrot Security OS

This cloud-based parrot Security OS was developed by the Frozenbox team for ethical hacking, hacking testing, criminal analytics, encryption and other tools used in this field. Compared to other systems, it is much lighter and more efficient In addition to the many legally recognized tools and if you are professional in using this assembly, you can easily find a job opportunity in many places and you can also act as a breach of ethics while at home and your identity is unknown, knowing that the distribution is a combination of the Frozenbox operating system and Kali Linux the system uses Linux servers to update its tools as well as its own servers with its own tools the system comes with two user interfaces, Mate and Gnome 2, to download from here

BlackArch Linux

I may be too prescribing this distribution but it is the first competitor, and even surpasses this distribution to Kali Linux Complete toolkit for security researchers and protection experts with more than 1,400 tools and up to 1,600 tools that come with them in advance (i.e., auto-humidification during system installation) It is constantly updated and has added many tools to make it the first choice for security and security professionals and built on the Arch Linux distribution for download here

What language does Hacker use in Linux

Ruby programming language

I think that the Ruby programming language is the best that you should start by learning if you want to get into the world of penetration, some will tell you the opinion and say that the Python is the first place and is the best, but I do not agree and strongly. The Ruby programming language is strong enough to program and make any hacking application or code capable of making a simple or complex hacking, and we do not forget that the largest hacking project, the Metasploit, started with Ruby and included multiple codes and codes in excess of half in Ruby programming. To share other projects within it between the Python and the Perl. For the Ruby programming language and also its framework Rails have many strong characteristics, Ruby may be a little difficult to understand or manipulate, but it is worth using and is extremely smart and powerful in the field.

Python programming language

For Python programming language, many uses are involved in programming; It can be used in the creation of Discovery software, or web software, even in data analysis, data science and many other areas, and it may be mentioned that it is also used in the field of penetration, as the Python is essential in the world of penetration to provide it for several packages to detect the lines of software and platforms that target it. And detect its thaw and collect data about the target platform. This is not just the case, but there are packages in the Python programming language that enable you to make powerful hacking software capable of breaking the security barrier of many software. You'll need strong courses to learn to use, of course, but your learning will provide you with a strong experience in your software industry that can target any platform.

learning Python language online for free

Java Language

The dry language is also liberalized and widely used on the web, on the Dyscotop and on the mobile, and we do not forget that Java can be used on the data science and structural analysis, in general. Your learning will help you uncover gaps, problems and such threats to Java-based software, as Java is a wide range of programs, your knowledge of the amount of candy you have made will enable you to change its flavor or detect the flavors that spoil your candy.

Uses of java language, learning requirements, java features and best platforms


I hope I would tell you if you have any questions I leave in a comment.