• Installation of Linux Distros
  • Essentials for installation
  • What is Linux Distro for Hackers?




    Download 6,34 Mb.
    Pdf ko'rish
    bet150/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   146   147   148   149   150   151   152   153   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    What is Linux Distro for Hackers? 
    As said before Linux provides the capability of creating Distros which are
    predefined systems. Some professional Hacker communities who wanted to
    give back to the community have created backtrack Distro for hackers. It
    has been a huge success and has become a pathway for novice hackers.


    Backtrack provided a lot of open-source hacking tools pre-loaded in the
    system along with a lot of editing tools and IDE's. After a few years
    backtrack has discontinued and evolved in a new form as Kali Linux which
    is now one of the most used Operating systems by Hackers. It has a lot of
    hacking tools neatly organized. Apart from Kali Linux, there are also
    Distros like Parrot Linux that are used by hackers. In this book, we will use
    Kali Linux as default Distro to explain the concepts for a wide overview. In
    the next section, we will explain how to install Kali Linux in detail. Follow
    along to understand things easily. Let's go.
    Installation of Linux Distros
    In this section, we will discuss how to install any Linux Distro with step by
    step instructions. We will also give a detailed analysis of topics like
    partition, boot loader, and others to get a good overview of the Linux
    essentials. Let us start now! 
    Essentials for installation
    Step 1:
    Get the Boot ISO file of the Linux Distro you need to install on your
    system. You can download it from the websites to load into a bootable CD
    or USB.
    Step 2:
    If you are interested to use windows at the same time in your system you
    can use double boot option to choose the operating system at boot up time.
    Anyone of them will be selected to boot according to your choice.
    Step 3:
    You can also use a virtual machine software like VMware in windows to
    boot into Linux. This is the most preferable way by hackers because it
    becomes tough to track when you are using a virtual system.
    By this explanation, we have understood the different ways we can use
    Linux. Now in this section, we will look at the step by step installation of


    any Linux Distro. We will assume for our convenience as Kali Linux as we
    are learning about hacking.

    Download 6,34 Mb.
    1   ...   146   147   148   149   150   151   152   153   ...   203




    Download 6,34 Mb.
    Pdf ko'rish