Skip to main content

Software (Example) - Kali Linux

Now I would be showing an example of how to use Kali Linux. Kali Linux is mainly a command-line OS so what you can see down here is a terminal which is where you enter the commands. There is an example of a command I entered in the terminal contained in the YELLOW BOX the purpose of the command is to change the user from user perfect to user root which is an admin user with all access.

The area contained in a RED BOX tells you the current user mode you are in and your current directory.



Now to File, when you click on the files button as shown below it brings many options to choose from like open a new tab, close the tab or quit.



The next is Actions, when you click on the actions button it also brings options like clear active terminal, find, split terminal horizontally or vertically, and so on.


The next is Edit, which allows you to choose from options like copy, paste and zoom. Although all these can be done with command shortcuts these are alternatives.


The View button, as shown below allows you to hide the window border, show tab, change to Fullscreen, adjust layouts and more.


Finally, the Help button provides links to documents which you can read for help with a command or doing something on the command line.





Comments

Popular posts from this blog

Case Study - Method

Source: https://www.google.co.uk/url?sa=i&url=https%3A%2F%2Fwww.facebook.com%2Fmethoduk%2F&psig=AOvVaw1TjPOsSrMz-Vs9czJ_mxRc&ust=1685998095949000&source=images&cd=vfe&ved=0CBAQjRxqFwoTCJCq48K-qv8CFQAAAAAdAAAAABAj Method The methodology employed in the case study described in the book "Cyber Security: Case Study" reflects a systematic and meticulous approach to ethical hacking. This section outlines the key steps and processes undertaken by the ethical hacking team to assess the organization's cybersecurity measures. The first step in the methodology involved the selection of a qualified and experienced ethical hacking team. The team's expertise in various aspects of cybersecurity, such as network security, web application security, and social engineering, ensured a comprehensive assessment across different attack vectors. Careful consideration was given to the team's certifications, qualifications, and track record of successful engagements...

Initial Project Plan(Gantt Chart Update)

 BEFORE CONTINOUS ASSESSMENT AFTER CONTINOUS ASSESSMENT I used the Gantt chart above to plan and monitor all the blogs I had to write for this module. It was a rewarding experience to explore these topics and share my insights with you. The chart also helped me stay focused and motivated by showing me my progress and achievements. REFERENCE https://online.officetimeline.com/app/#/file/5cacb847-5749-4e92-9d55-25480acdc8b4/gantt-view [Accessed Date: 4th June 2023]

ESSAY (MAIN BODY)

Hi, in this blog I would be showing you my essay's main body. The body talks more about AI in endpoint security and its functionalities/application in endpoint security. It also touches on the benefits of AI in endpoint security.