- Back to Home »
- Why Hackers choose Linux
Posted by : Unknown
Wednesday, September 3, 2014
Why
Hackers Choose Linux ? However, in terms of hacking, programming or any other
related Geeky stuffs, Linux is at the top a good overview with this is because
Linux use is growing at an amazing rate. This operating system, which has no
public relations department, advertising, or government lobby, is being used
widely in homes and server rooms alike. It’s also free, and 100% open source,
meaning anyone can look at each and every line of code in the Linux kernel.
Linux
is a true multiuser operating system, and has been since the very first
version. It is powerful in it’s simplicity. Linux use is growing at an amazing
rate. This operating system, which has no public relations department,
advertising, or government lobby, is being used widely in homes and server
rooms alike. It’s also free, and 100% open source, meaning anyone can look at
each and every line of code in the Linux kernel. Linux is a true multiuser
operating system, and has been since the very first version. It is powerful in
it’s simplicity. Though there are robust graphical environments and tools, you can
still do everything you could possibly need with just a keyboard and a shell
prompt. Since you have the code, you could even make Linux do things it was
never meant to. That’s one of the things that draws both the gurus and the
attackers alike. When deciding on an operating system to cover in depth, we had
a variety to choose from: Windows 95/98/NT/2000/ME/etc, MacOS, OpenBSD, NetBSD,
FreeBSD, Solaris, HPUX, AIX, IRIX, and many others. So how did Linux win our
favor?
Features
:
·
It’s use is on the
rise.
·
It’s an Open Source
operating system.
·
It’s available to
everyone at a great price — free.
·
It comes in many
flavors (aka distributions.)
·
It is too commonly
broken into due to out of date packages, poor system configuration, and its
ubiquity.
·
Hackers use Linux.
·
We feel that Linux
can be secured.
The
power and flexibility of Linux makes it the hacker’s playground. They use it,
learn it, and understand it intimately. And that means that if there’s an
insecurity, they’re going to find it. The black-hats have thronged to Linux. It
allows them the control they require to do strange and ingenious things. If
they want to experiment with new or invalid network packets, they can do so
easily without relying on undocumented (or non-existant) API support from the
vendor. Millions of lines of code have been written for Linux applications and
libraries, usually in an extremely modular manner, which allows it to be
integrated into widely diverse projects. For example a library that allows you
to sniff the network for proactive performance monitoring could be used as part
of network hijacking code. The power and flexibility of Linux makes it the
hacker’s playground. They use it, learn it, and understand it intimately. And
that means that if there’s an insecurity, they’re going to find it. However the
very reasons the hackers like Linux are the same reasons more folks are
installing it on their own systems today. The ability to look at each and every
line of Linux code, and patch it when problems arise, means that Linux can be
secured not just by a few programmers locked away in some corporate
headquarters, but by any user at any time. However the very reasons the hackers
always like Linux are the same reasons more folks are installing it on their
own systems today. The ability to look at each and every line of Linux code,
and patch it when problems arise, means that Linux can be secured not just by a
few programmers locked away in some corporate headquarters, but by any user at
any time.