Название: Linux: 2 Books in 1: Linux for Beginners + Kali Linux Hacking: The Comprehensive Step-by-Step Guide to Learn the Fundamentals of Cyber Security, Penetration Testing, Networking and Computer Hacking. Include Exercises and Self-Evaluation Tests Автор: Ethem Mining Издательство: Amazon.com Services LLC Год: 2020 Страниц: 442 Язык: английский Формат: pdf, epub Размер: 10.1 MB
If you have picked up this book, you are inevitably interested in Linux, at least to some degree. You may be interested in understanding the software, or debating whether it is right for you. However, especially as a beginner, it is easy to feel lost in a sea of information. How do you know what version of Linux to download? Or how to even go about downloading it, to begin with? Is Linux even right for you to begin with? All of those are valid questions, and luckily for you, "Linux: 2 Books in 1" is here to guide you through all of it.
THIS BOOK INCLUDES 2 MANUSCRIPTS:
Book 1: Linux for Beginners - A Practical and Comprehensive Guide to Learn Linux Operating System and Master Linux Command Line. Contains Self-Evaluation Tests to Verify Your Learning Level Book 2: Kali Linux Hacking - A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts
Some of the versions of Linux, known as Linux distributions, or more commonly shortened to “Linux distros,” will be easy enough to hop right in to using, while others could be your worst nightmare immediately upon installing it, such as Gentoo, which requires all programs, including the kernel, to be built from source.
Nmap stands for network mapper—it is an incredibly popular tool that is used to discover that is available to you. As with all of the tools provided to you within the Kali Linux distribution, this is free to use and secure. When you use Nmap, you are able to map out networks, allowing yourself to see inventories and find open ports as well. It is quite simple to use—it brings up a terminal that you are able to enter your commands and scripts within, allowing you to do whatever you would like within the system once you have gotten in.
This tool is able to work through firewalls and routers, it can bypass an IP filter, and it is able to navigate into systems. While it was designed to be capable of getting through massive networks, it can also be used on smaller scales as well. It is primarily used for port scanning, version detection, operating system detection, and using ping sweeps.
Скачать Linux: 2 Books in 1:The Comprehensive Step-by-Step Guide to Learn the Fundamentals of Cyber Security, Penetration Testing, Networking and Computer Hacking. ... Include Exercises and Self-Evaluation Tests
|