Skip to main content

Software (Example) - Kali Linux

Now I would be showing an example of how to use Kali Linux. Kali Linux is mainly a command-line OS so what you can see down here is a terminal which is where you enter the commands. There is an example of a command I entered in the terminal contained in the YELLOW BOX the purpose of the command is to change the user from user perfect to user root which is an admin user with all access.

The area contained in a RED BOX tells you the current user mode you are in and your current directory.



Now to File, when you click on the files button as shown below it brings many options to choose from like open a new tab, close the tab or quit.



The next is Actions, when you click on the actions button it also brings options like clear active terminal, find, split terminal horizontally or vertically, and so on.


The next is Edit, which allows you to choose from options like copy, paste and zoom. Although all these can be done with command shortcuts these are alternatives.


The View button, as shown below allows you to hide the window border, show tab, change to Fullscreen, adjust layouts and more.


Finally, the Help button provides links to documents which you can read for help with a command or doing something on the command line.





Comments

Popular posts from this blog

INITIAL IDEA 1 - ENDPOINT SECURITY

Source: https://www.42gears.com/wp-content/uploads/2021/04/featured.jpg What is Endpoint Security? My initial idea pertains to endpoint security, which is an essential module in my cybersecurity path. Endpoint security is a cybersecurity approach used to defend endpoints such as desktops, laptops, and mobile devices from malicious activities (Crowdstrike, n.d.). According to Crowdstrike, a top endpoint security company, protecting endpoints is crucial in cybersecurity, from small businesses to large corporations. Why Secure Your Endpoints? The Ponemon Institute conducted a study that found 68% of organizations have experienced one or more endpoint attacks that successfully compromised data and/or their IT infrastructure (Expert Insights, 2021). Endpoints provide a large attack surface, and implementing endpoint security solutions can help reduce those attack surfaces. While it's impossible to completely eliminate cyberattacks, reducing the possibilities or chances of an attack occu...

ESSAY (MAIN BODY)

Hi, in this blog I would be showing you my essay's main body. The body talks more about AI in endpoint security and its functionalities/application in endpoint security. It also touches on the benefits of AI in endpoint security. 

MAJOR PROJECT THEME - ETHICAL HACKING

Source: https://www.softwaretestinghelp.com/wp-content/qa/uploads/2020/06/Ethical-Hacking.png Ethical hacking is a practice in which cybersecurity professionals use their skills to identify vulnerabilities in computer systems and networks. This approach helps organizations proactively detect and fix potential security issues before malicious hackers exploit them. Ethical hacking is a vital tool in today's world where cyber threats constantly evolve and become more sophisticated. The concept of ethical hacking is based on the idea that the best defence against cyber attacks is a good offence. Organizations can identify and fix vulnerabilities before malicious actors can exploit them by conducting controlled and authorised attacks on their own systems. Ethical hacking also helps to improve the overall security posture of an organization, making it more resilient against future cyber attacks. However, ethical hacking is not a license to conduct attacks indiscriminately. Ethical hacker...