Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




Download 6,34 Mb.
Pdf ko'rish
bet125/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   121   122   123   124   125   126   127   128   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

Chapter 2:
Linux Installation


Kali Linux Installation Requirements
Before you jump into the bandwagon, you need to understand that Kali
Linux is not everyone’s cup of tea. Just because it delivered amazing results
for someone does not mean it will do the same for you. just because
someone else found it hectic or irritating does not mean you will have
similar experiences. It boils down to your needs and knowledge. Kali Linux
has become popular over the years, and there is a good explanation for it. 
Nowadays people find hacking cool thanks to TV series and the thrill that
comes with it. More people are becoming hacking experts in the comfort of
their homes. The strange thing is that people with barely any knowledge in
the computer of Linux are using Kali as the main Linux distribution. There
are many Kali Linux tools used for hacking, and they are increasing every
day. However, Kali was not meant for that purpose. What many people do
not realize is that it is not a must for them to use Kali. On the contrary, it is
a distribution tool that makes a specific task easier.
Now that you know how amazing Linux is, you must be eager to install it.
However, you need to keep in certain things in mind before you rush into
installing the software. You must know its hardware requirements and
challenges. Everything has benefits and drawbacks. Understand that Linux
was developed by users which means that users have access to its hardware.
Another challenge is that many firms have decided to keep the hardware
interface propriety. This is a challenge to Linux volunteer developers who
cannot write drivers for such devices. Firms that choose to keep their
proprietary interfaces write their drivers for OS and users know nothing
about the interface. Something can be done about the situation in some
cases. Hackers have tried to write drivers by examining assumptions about
the interface.
Linux consists of particular features reserved for laptops, such as APM and
PCMCIA with drivers to support the devices. The majority of hardware
support for Linux is still being developed. Therefore, some distributions
may or may not existing features. Users should keep an eye on hardware
suppliers who change the latest version of a system component without
considered what was ordered. If you want to install Linux, there are CPU
and motherboard requirements to consider. Currently, Linux supports


systems with intel 80486, Pentium Pro, and Pentium. It has also been ported
to non-intel architectures such as Motorola, MIPS, AXP, and SPARC. 
Some ports are naturally more mature than others. People who have intel
80386 and beyond should use math coprocessors to make work easier. 
Moreover, the system motherboard should employ EISA, ISA, and PCI bus
layout. It is important to pay attention to these terms because they
determine how the system interface will look like.
You also need to pay attention to memory requirements before you install
Linux. Linux is preferred by many because it needs little memory to
operate, compared to other operating systems. This means less hassle to get
a big memory for installation. You only need 8MB of RAM, and you will
be good to go. To be on the safe side, have at least 16 MB. While a big
memory is not needed, having more space will cause the system to run
faster. Having more memory equals to having a processor that works fast. 
If it is for personal use, 16 megabytes is enough. Linux users assign a
portion of the hard drive as a space to be used as a virtual RAM. It is proper
to use a swap space even if you have sufficient physical space. 
Although swipe space cannot replace physical RAM, it enables the system
to run big applications by removing inactive parts of the code disk. Several
factors influence the amount of swap space you allocate. There are hard
drive controller requirements you need to keep in mind. Floppy is more
than enough to run Linux. It is not a must that you have a hard drive to run
Linux. However, the standard way of doing things is to use a Linux with a
hard drive. Linux must support important IDE controllers, and if it is
possible to access the drive from Windows, the same should apply to Linux.
You need to create space on the hard drive to install Linux. The space
required depends on the amount of software you are installing at a time.
Your needs also influence the amount of space needed. Moreover, you
should create space on the hard drive for virtual RAM.
For those who are pursuing a career in information security, having a
security-oriented operating system is crucial. An effective operating system
helps in doing tedious duties on time. There are numerous Linux-based
operating systems, but Kali Linux is still the best of them all. It is used for
ethical hacking. Network security assessment and penetration tests. The
best Linux distribution so far is Kali Linux for several reasons. Regarding
hacking, penetration testing, and ethical hacking, Kali Linux is the best


option. It is loved by many because it comes pre-packaged with several
command hacking tools. It is arguably the best tool for ethical hacking
around the world.

Download 6,34 Mb.
1   ...   121   122   123   124   125   126   127   128   ...   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

Download 6,34 Mb.
Pdf ko'rish