Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,240 --> 00:00:05,520
Before we actually proceed to creating our virtual machine that we will use for hacking, I believe
2
00:00:05,520 --> 00:00:12,380
most of you are wondering why Linux, why are we installing Linux operating system on a virtual machine?
3
00:00:13,320 --> 00:00:16,710
Can't we hack using Windows or Mac OS?
4
00:00:17,640 --> 00:00:21,600
Well, yes, but Linux is something far better for that.
5
00:00:22,540 --> 00:00:24,670
So what were the benefits for Lennix?
6
00:00:25,660 --> 00:00:30,190
First thing that's great about Lennox is that it is an open source operating system.
7
00:00:31,240 --> 00:00:38,080
This means we can inspect the code of it and see how it is made and what programs or functions it runs,
8
00:00:38,810 --> 00:00:45,340
it can be used for any type of work, not only for hacking, but many programmers also use Linux.
9
00:00:45,880 --> 00:00:49,180
Many servers all over the world are running on Linux.
10
00:00:49,810 --> 00:00:55,730
And another great thing about it is that most of the Linux districts are free of cost.
11
00:00:56,500 --> 00:01:04,450
Maybe some of you have heard about Ubuntu, Linux, Mint or Debian, while to, for example, use an
12
00:01:04,450 --> 00:01:06,540
updated Windows operating system.
13
00:01:06,970 --> 00:01:09,400
You must pay for a key or license.
14
00:01:10,180 --> 00:01:13,450
Linux, on the other hand, is free to download for anyone.
15
00:01:14,020 --> 00:01:22,690
And not only that, but it also due to it being an open source, it allows the users to edit, copy
16
00:01:22,720 --> 00:01:30,190
or distribute various aspects of Linux based operating system without violating any copyright law or
17
00:01:30,190 --> 00:01:31,570
terms and conditions.
18
00:01:32,320 --> 00:01:38,800
This is one of the main reasons hackers use Linux because they can easily develop software is used for
19
00:01:38,800 --> 00:01:45,250
hacking and penetration testing, and they can change and edit the operating system for their needs.
20
00:01:46,150 --> 00:01:53,470
Another good thing is that it is also very light requires less disk space consumes less ram in order
21
00:01:53,470 --> 00:02:00,300
to run so it can be easily ran alongside any other operating system like Windows and Mac OS.
22
00:02:01,000 --> 00:02:07,870
And last but not least, is that, as we mentioned, due to Linux being an open source and allowing
23
00:02:07,870 --> 00:02:14,950
anyone to change and interact with the operating system, it allows people to create an operating system
24
00:02:15,100 --> 00:02:20,890
that will specifically be made for one purpose, such as for ethical hacking or penetration testing
25
00:02:21,580 --> 00:02:24,850
and learning systems like that already exist.
26
00:02:25,270 --> 00:02:32,020
There are Linux distro called Linux, Perret Backtrack and others that are specially made for penetration
27
00:02:32,020 --> 00:02:38,380
testing and checking for security loopholes, and all of them are widely being used by hackers.
28
00:02:39,100 --> 00:02:45,520
In this course we will be using Linux, one of the Linux bistro's specially created for hackers and
29
00:02:45,520 --> 00:02:46,630
penetration testers.
30
00:02:47,600 --> 00:02:54,440
What's great about it is that it automatically comes after installation with a bunch of different tools
31
00:02:54,830 --> 00:03:01,490
used by penetration testers for hacking, and we're going to cover those tools and go step by step through
32
00:03:01,490 --> 00:03:01,740
them.
33
00:03:02,090 --> 00:03:05,930
Plus, we'll be installing tools created by other people.
34
00:03:06,170 --> 00:03:11,840
And at the advanced parts of this course, we will be creating our own hacking tools.
35
00:03:12,690 --> 00:03:13,820
How cool will that be?
36
00:03:14,730 --> 00:03:20,340
So now that we know exactly which Linux distro are we going to install and what are the benefits of
37
00:03:20,340 --> 00:03:25,510
Linux in the next few videos, we can create our virtual hacking lab.
38
00:03:26,040 --> 00:03:26,610
See you there.
4265
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.