Showing posts with label kali linux. Show all posts
Showing posts with label kali linux. Show all posts

10 Reasons : Why should we use Linux? | Padsa Information


Bored using windows or any other server in your computing experience? Linux has been designed to offer you smooth and effective experience. Whether you want to use it for business or any other home operations, Linux offers the most reliable system to adopt. Linux has become one of the most adopted systems by many users in and around the world. Most of the world’s largest data centers across the globe use Linux. There are various reasons that answer why should we use Linux, keep on reading.

Why Should we use Linux?

1. Linux is free of charge and in case you still doubt, then know that it is.
In case you want to get rid of all the restrictions in terms of patents of any other form of restriction, then this would be the best switch for you. Linux can be edited in terms of the source code by most of the innovative business owners. It is, therefore, the best system to be adopted by a large number of business owners who want to simplify their business operations.
2. Linux is more secure than any other server
Linux is a dependable server that offers excellent security to the user. Linux community offers the security fixes for any technical or security threat that encounters. Moreover, Linux users also offer regular kernel updates and regular security patches. In this regard, it is not mandatory for you to have an anti-virus program for your system. With Linux, you can save a lot of dollars you could have spent buying an antivirus program.
3. It has a wide compatibility to several hardware
Most of the other servers do constraint you with a lot of features. Take for instance windows 7 and 8 do require at least 1GB RAM for your system to operate well. However, Linux is such a lightweight operating system and hence does not constrain you in terms of a memory capacity of your system. It can thus be used by any of your systems. It is designed for everyone and can be used by anyone.
4. Easy to Operate
Ideally, one does not have to go for intensive training for them to know how to operate Linux operating system. Besides, it comes with all the necessary functionality that is included in windows OS. If you are looking for a system that is reliable and can be used by anyone in your business, then this could be the best system to adopt.
5. It comes inclusive of drivers
Ever experienced some difficulties when using windows only to be told that some of the drivers are missing in your system? Linux saves you a time you have to spend moving from one shop to another for drivers. It saves you money as well. Most of the drivers are included in Linux operating system. No need to hassle and stress for drivers.
6. Smooth and easy Updating Process
Updating windows can be very challenging and stressful. Linux updates both the OS and the applications that are installed in your system. Besides, when compared to windows that need your system to shut down Linux updates are just a matter of click.
7. Linux is speedy
Since Linux is lightweight, it is therefore far much speedy compared to any other operating system. Windows has a bloated software and therefore huge to operate. In any business operation or gaming experience, time is the most crucial factor. Linux is the best system to adopt as windows get slower days after days.
8. Linux has a community support
One of the best things about Linux is the fact that you have a sense of belonging. You have a platform where you can share everything with fellow users. You get to know more through the frequently asked questions. Moreover, any question that you have can be dropped and get the answers that you need.
9. Linux features a powerful word processing program
Libre Office is a powerful word processing program that comes with Linux. You can use it for free in editing, opening and send Microsoft documents. You, therefore, save more and more dollars you could spend buying such a program.
10. Linux offers you a chance to download a lot of free tools
By just a click of a button, you can get access to thousands of tools and programs. This is a big added advantage over the windows operating system. It is the best way to transform your serving experience.
Don't forget to comment below if you have any question .

How To Pick Your First Programming Language (4 Different Ways)

Learning coding from scratch could be a tough task and it could take years of hard work to master a language. So here I am going to address the biggest problem a beginner faces: How to pick up my first programming language?
Recently I came across with a very enriching infographic that addressed the same question. Udacity has utilized the date of the top ten programming languages in the US (provided by IEEE Spectrum) to pick the best programming language for you as a beginner.
The basis on which this infographic is made varies from location, your lifestyle and the potential growth in career after selecting that particular language.
Based on the flexibility, Python or C++ comes first as it allows you work on the variety of fields such as gaming to making of embedded systems. JS or PHP prepares you for a web development career. Similar observations and trends are made based on the average pay per year, geography and popularity.
Take a look at the infographic below:

Did you find this infographic helpful? Share this article with your friends.

What are the some of the best programming tips and tricks | Padsa Information

  • Readability is the path to more interesting projects within a career.
  • Readability is the path to knowing what you wrote 5 years ago, and makes code reuse actually viable
  • Readability is the path to acquiring protégées that can learn from your style.
  • Readability that is understandable by others allows people to appreciate your code at a level of architecture, not just functional.
  • Readability is the path of lease resistance when you have a bug in your code.
  • Readability is the how you put ideas into understandable text and syntax, much like writing a paragraph in natural language.
  • Readability is somehow not a priority for most other developers, however it’s probably pretty important to your development director, if you work for one.
  • Readability is more important than most believe. With moore’s law, it’s even more important to focus on readability than pre-mature optimization.
Here’s more:
  • Most schools and colleges teach computer science like trade school skills. How to fix a car. How to be a dental assistant. How to be an admin.
  • Most schools and colleges don’t realize there’s a difference between Computer Science and Programming. These are different.
  • Most of the people applying for job in California are Programmers, when the job actually requires a Computer Scientist.
  • Most people only know one or three programming languages. I personally believe you need to know between 7–8 of them to really master the idea of programming.
Psychology wise?
  • Most programmers are very insecure about their programming skills and end up in bandwagon debates over which programming language is better.
  • Following that, most don’t realize that each programming language is just a tool that’s better at something while other is better at something else… Like speaking Spanish while in Spain, or knowing Chinese in the middle of China down. Right tools for the job.
  • Most programmers are habituated to just google everything, that’s how they were taught.
  • Most insecure programmers rave about how “compact” their code is. Which serves very little purpose on compiled languages.
  • Most insecure programmers focus on hyper tuning a few lines of code. Good programmers focus on delivering functional and useable software.
Habits….
  • Most programmers follow the syntax and structure of the style they were taught. Very few question the style they were taught. Examples are {’s on the if-statement line, or on the next line vertically aligned with the }.
  • Most programmers don’t make diagrams before they begin experimenting. Many just copy some existing example and start their modifications from there (which runs the risk of adopting bugs from existing examples).
  • Most programmers don’t unit test. They believe they are better than that, or they are lazy.
  • Most programmers read xkcd.
  • Programmers that are computer scientists are better at computational problems.
What most don’t realize about computer science (as opposed to only programming.)
  • You can merge sort your socks.
  • You can apply scalability methods of algorithms to work labor level processes to improve business efficiency.
  • You can learn other fields and industries because CS is a catalyze for industries like physics, chemistry, rendering, etc…
  • You can apply CS methods to accounting, management, logistics, market trends, human resource management, workflow processing engineering, etc…
  • Computer science has philosophies within it that can change your mode of thinking.
Lots and lots. It’s amazing what you can do if you pay attention to the computer science bit, rather than only how to program software.
Computer science includes:
  • Hardware
  • Software
  • Programming
  • Algorithms
  • Problem solving
  • Efficiency measurement methods
  • Stability methods
  • Integration concepts
  • Computer architecture
And most importantly….
  • Computer Science History
You learn to appreciate these things when you take in CS and listen in beyond only the programming trade skill.
Either you are a viable employee… Or you’re an amazing one that could hold a position of technical leadership.
Take your time to comment on this article.

Here is How to run Kali Linux on your Android device | Padsa Information

This tutorial mainly created for Linux fans. Follow the given steps below to install Kali Linux on your Android phone.
Step 1: Install Linux Depoly on your Android Mobile.
Step 2: Now launch “Linux Depoly” and click download icon
Step 3: In Depol tab click and change the Distribution to Kali Linux
Step 4: Now Change the VNC settings according to your mobile screen.
Step 5: Once done click Install(Start GNU/Linux installation).
Note: This might take few minutes to be completed.
Tips: Recommended to do it on a Wi-Fi.
Step 6:  After installing Kali Linux now click Reconfiguration button. After that hit Start.
Step 7: Now download and install Android-Vnc-Viewer and enter the details. Once every goes smooth then you can start using Kali Linux.
Don't forget to comment below .

Arch Linux 2017.01.01 Released, ISO Files And Torrents Available For Download | Padsa Information

Thanks to the hard-working Arch Linux developers, the first Arch Linux ISO images of 2017 are available for download. The latest release, i.e., Arch Linux 2017.01.01, is powered by Linux kernel 4.8.13. While the first time users can grab the ISO images and torrents from Arch’s website, the existing users can update their systems using `pacman -Syu.’
Arch Linux installation isn’t something that involves simply clicking next and skip buttons. It includes multiple steps like partitioning the hard drive, formatting them, enabling swap, mounting partition as root file system, and manually downloading and installing the base OS. The user also needs to run various commands for setting up various things.
There’s no denying the fact that getting an Arch Linux machine up and running needs a little more time and commitment — as compared to other Linux distributions like Fedora or Ubuntu. But, this practical approach teaches you many things and it appeals lots of hardcore Linux enthusiasts.

Arch Linux 2017.01.01 — first ISO spin of 2017

As a great news for Linux enthusiasts, the first ISO snapshot, i.e. Arch Linux 2017.01.01, has been made available for download. This means that the devs have been working hard in the holidays to bake this Linux treat.
Contrary to what many of you would’ve expected, Arch Linux 2017.01.01 is powered by Linux kernel 4.8 series, version 4.8.13 to be precise. The size of the latest ISO image is 867MB.
As this image is intended for the new installations only, the users can burn this on a DVD, mount it as ISO, or write it to a USB drive using some utility.

Arch Linux 2017.01.01 download and update

New users can grab the ISO images and torrents by visiting the Arch Linux download page.
The existing Arch Linux users can update their systems using the following command:
So, are you going to try out the latest release of Arch Linux by updating your system? Don’t forget to share your views and feedback.

What Is The Difference Between Sudo And Su In Linux? | Padsa information

Many of you might be using sudo and su in terminal every day to accomplish different tasks. While sudo runs a single command with root privileges, su launches another shell instance with the privileges of the intended user. Both, sudo and su, are use to grant root privileges to the users in different manners.
ALinux user comes across sudo and su in terminal very often. If you are a new Linux user, you might be fascinated by the things you can do with sudo and su. Last week, I also told you about a Windows command that you can use to get sudo-like functionality. Sudo and su  provide root privileges in two different ways. But, how are they different? Here, I’ll try to answer this query.
Before telling you the difference, let me tell you the meaning of a root user. The root user in a Linux system has the maximum permissions and he/she can do anything to the systems. Apart from letting a normal user install/delete some package, root user permissions also act as an extra security layer.
Important: One should also note that these functions are used in a different way in different Linux-based operating systems. Most of the things we’ll discuss here are applicable to Ubuntu and its derivatives. They might differ a little bit in other Linux distributions.

Key differences between sudo and su

The su command stands for super user or root user. It executes on a Linux system with no additional options. The user just needs to add root account password. In the terminal, su also lets you access any other user account using the required password. That’s why su also stands for substitute user or switch user. Simply type su followed by the user account name, e.g., sudo fossbytes, and you’ll enter the password for fossbytes. After completing the job, you can exit the root shell by typing exit. Overall, su basically starts another shell instance with the privileges of the intended user.
On the other hand, sudo runs a single command with root permissions. When a user runs a command with sudo, e.g., sudo command, he/she needs to enter the current user account password to run it as root user. Sudo uses a config file (/etc/sudoers) to define the rights of different users. For detailed information on sudo, you can read our detailed article written by Devin — Sudo in Linux
Comparing the both, sudo lets one use the user account password to run system command. On the other hand, su forces one to share the root passwords to other users. Also, sudo doesn’t activate the root shell and runs a single command.

Using sudo and su in Linux distros

Ubuntu was the first widely used Linux distribution that adopted sudo-only approach by default. When one installs Ubuntu Linux, the root account is created without any password. One needs to assign a password to the root account to log in as root. In Ubuntu and many other Debian-based distros, the user needs to remember just a single password. This way, Ubuntu encourages a user to avoid logging in as a root user. In distros like Fedora, a person needs to create different passwords for root and user accounts.
There’s an often-used combination sudo su that Linux users find helpful. First, sudo asks for your password, and, if it’s provided, it runs the next command as a root user. Also, to run a single command as a root user using su, one needs to use this syntax: su -c ‘command’.
Did you find this article helpful? Don’t forget to drop your feedback in the comments section below.

Why The First Windows Drive Letter Is Always C? Why Doesn’t It Start With A Or B? | Padsa Information

The various logical drives in Windows are assigned a drive letter. Generally, the drive letter for the first logical drive is C followed by D, E, F. Well, A and B are also alphabets. These drive letters are kept in reserve for some special purpose. Here is the reason.
In the case of Windows and many other operating systems, a physical hard drive–used to install OS files and store data–is divided into partitions. In Windows, these partitions can be formatted using file systems like NTFS, FAT32, etc. These partitions are then known as logical drives and they are assigned a drive letter.
As far as my tech knowledge is concerned, it started to sprout in the mid-2000s. My first computer came with Windows and, obviously, or as some sort of a tradition, the first drive letter was C. In the beginning, I was told not to put any stuff in the C drive. Later, when a repair guy fixed my desktop, he installed Windows to the D drive. It seemed a bit unusual and it was a dilemma for me, whether I should keep my data on the C drive or not.
Even though I was a little bit uncomfortable with the changed drive letter, I actually never thought why the first drive letter was C, why not an A or a B, or a Z. It was years later, in fact, recently, when I asked the question to Google–Why is C the first Windows drive?
It was not the case that the people who assigned the drive letters didn’t know that A and B also existed as an alphabet. It was done to prefer an old technology with is nowhere to be seen now, the floppy disk.
The drive letters are assigned according to a preference scheme for different kinds of media attached to the computer. These letter date back to the time when IBM ruled the PC market. Then, PCs didn’t have a hard drive, sounds strange? But you might be aware of the fact that the floppy drives were used as primary storage in earlier computers. So, they were given a special preference while assigning the drive letters.
IBM’s VM family member CP/CMS took the help of drive letters to identify minidisks attached to a user session. The file reference (pathname) comprised of the drive letter, file name, and file letter. For example, A:MYFILE.TXT. The drive letter system was later visible in other operating systems including Microsoft’s MS-DOS and later in Windows.
Earlier, computers had two floppy drives for running programs and storing data. The hardware had support for two floppies. Thus, the preference for them was built into the OS itself. The hard drives came at a later stage and were assigned the letter C. Initially, the physical drives were assigned letters. As they got bigger in size, the logical volumes came up which are now assigned the drive letter. Starting from C, it makes room for floppy drives to be added at a later stage.
This thing doesn’t have a practical application anymore. But if you connect a floppy drive, it’ll be assigned the letter A and B for the next one. If you don’t have a floppy drive connected to your machine, you use the reserved letters A and B.
If you have something to add, tell us in the comments below.

The Best Top 10 Wifi Hacking Tools in Kali Linux

How to hack WiFi is second popular search after how to hack a Facebook. Most of the routers are not correctly configured and are susceptible to various kinds of attacks.
A lot of the router manufacturers and ISPs are still turning on WPS by default on their routers which makes the wireless security and penetration testing an even more important. Using the below Top 10 Wifi Hacking Tools you will be able to test your own wireless networks to find potential security issues.

1 Aircrack-ng

Aircrack is one of the very popular tools for WPA/WPA2/WEP cracking. The Aircrack-ng suite contains tools that help to capture packets and handshakes, de-authenticate connected clients and generate traffic and also tools to perform brute force and dictionary attacks. Aicrack-ng is an all-in-one suite that contains the following tools and many others:
– Aireplay-ng to generate traffic and client de-authentication
– Aircrack-ng for wireless password cracking
– Airbase-ng to configure fake access points
– Airodump-ng for packet capturing
If you wish to use this tool, make sure your Wifi card is capable of packet injection.

2 Reaver

Reaver is definitely second one in the top 10 Wifi hacking tools. Reaver is a very popular tool for hacking wireless networks. Reaver targets specifically the WPS vulnerabilities. The Reaver performs brute force attacks on WPS (Wifi Protected Setup) registrar PINs to recover the WPA2/WPS passphrase. Since there are many router manufacturers who turn on the ISPs by default, a lot of routers are vulnerable to this  attack out of the box.

3 Pixiewps

PixieWPS is a new tool included in Kali Linux. Pixiewps also targets a WPS vulnerability. PixieWPS is written in C and it is used to brute force WPS PINs offline and exploits the low or non-existing entropy of vulnerable access points. This is also called a pixie dust attack. PixieWPS needs a modified version of Wifite or Reaver to work with. Considering the recent growth of this tool, itstood 3rd in our list.

4 Wifite

Wifite is an automated tool and expects a very little work form the user. When start-up it asks a few parameters to work with and then it will  do all the hard work. Wifite attacks multiple wireless networks that use encryptions like with WEP/WPA/WPA2 and WPS. It captures the WPA handshakes, spoof your MAC address and safe the cracked passwords, automatically de-authenticate connected clients.

5 Wireshark

Wireshark is one of the top network security analyzing tools available online. Using Wireshark you can analyse a network to with a great detail and see what’s happening inside.

6 oclHashcat

oclHashcat is not a dedicated Wifi hacking tool and it also does  not come with  Kali Linux. But it can do brute force attacks and dictionary attacks on captured handshakes at a very high speeds  using the raw power of GPU. Comparing to other tools like Aircrack-ng suite, oclHashcat  is fast since it is using  a GPU instead of a CPU. An average GPU can do upto  50,000 combinations per second with oclHashcat.

7 Fern Wifi Cracker

Fern Wifi Cracker is a wireless security auditing and attack tool and it is written in Python. It is the first tool in this list to have a graphical user interface.

8 Wash

Wash is a tool to determine whether an access point has WPS enabled or not.

9 Crunch

Crunch is a great and easy to use tool for generating custom wordlists which can be used for dictionary attacks.

10 Macchanger

Last but not least in this top 10 Wifi Hacking Tools is Macchanger. Macchanger is a little utility which can be used to spoof your MAC address to a random MAC address or you can make up your own.
What is your favorite tool?
Would you agree with our list?
Share your thoughts and suggestions in the comments section below.