Jump to content

percy3739

Members
  • Content Count

    4
  • Joined

  • Last visited

About percy3739

  • Rank
    Newbie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Abbas Naderi quoted on quora.com: "Depends on the type of hacker. Script kiddies and tool junkies use tool-packed linux distributions, such as Kali, Backtrack and etc. Real hackers (those that create the tools for junkies) use a combination of operating systems, each one has its own advantages and disadvantages. Linux, provides us with many tools and is highly flexible in probing, creating and manipulating systems and information. However, it has a terrible UI and its lack of reliable, enterprise applications make it hard for day to day use (yes, hackers play video games and watch movies too). Windows, which is the required but hated target for most hackers, enables us to work with Windows-only environments, such as .NET framework, Windows-based malware and etc. Many hacking attempts require infecting or hacking a Windows machine, and without having one (or more) to develop and test on, no hacker can get past this blockade. Mac OS X, my favorite, is a combination of both worlds. It comes with a wide range of very rich, carefully designed enterprise applications that enable day to day use of the computer, is a very reliable and stable operating system (I haven’t reinstalled or flashed my Mac OS X machines in 10 years, and I have several under constant use), and is POSIX compatible (read supports Linux programs). Also Mac OS X is not a popular target for malware and hacking attempts, because it is neither the most famous server (Linux) nor the most famous client (Windows), giving hackers that use it a [false] sense of security. (you know how doctors are more afraid of diseases than anyone else, because they know!). I, and most of my hacker friends (given the chance) use a OS X machine as our main, day to day machine, have several different Windows machines, with at least one running on bare metal (not virtualized) to be able to use hardware and GPU directly, and have several Linux virtual machines here and there, for testing, development, analysis and etc." Is that true,then how can install hacking tools in other linux distributions? 9.5k Views · View Upvoters · Answer requested by ZiShan Khan
×
×
  • Create New...