Skip to main content

Posts

Showing posts with the label kali

TAMPILAN KALI LINUX LENGKAP

TAMPILAN KALI LINUX LENGKAP TAMPILAN KALI LINUX LENGKAP alhamdulilah akhirnya KALI LINUX BISA TERINSTALL DI NOTEBOOKKU.. walaupun nunggunya lama banget.. dari jam 11 malam sampai jam 1 malam.. gara-gara ada kesalahan teknis.. hehe 1. ini tampilan awal linux KALI   2.tampilan browser KALI LINUX (siapa tau mau internetan ^_^) 3. menu-menu accesories KALI LINUX 4. TAMPILAN FOLDER 5.Mendengarkan lagu di KALI LINUX 6. menonton video di KALI LINUX 7.download disini untuk procesor intel http://repo.unnes.ac.id/iso/kali/kali-latest/i386/kali-linux-1.0.5-i386.iso untuk AMD http://repo.unnes.ac.id/iso/kali/kali-latest/amd64/kali-linux-1.0.5-amd64.iso download  file  now

To Be In Secure on Kali Linux

To Be In Secure on Kali Linux Kali Linux is developed based on Debian 7 (Wheezy). Kali is designed for Penetration Testing and it is running in root privilege. However, almost all the Kali Linux users will also use it as a primary operating system. When it is using as a Penetration Testing toolkit, the root privilege is in use. When it is using as a primary operating system, the non-root privilege is a good practice. Therefore, a sudoer will be a good choice. However, be keep in mind that sudoer will not guarantee your sudoer account will not be compromised if it equipped with a weak password and easy guess user name. Penetration Testers or Information Security Researchers will use their browser most of the time as same as other general users. Kali Linux equipped with Iceweasel, which is based on Firefox, and it can use Firefox add-ons. In the BackTracks old days, we will use "NoScript" Firefox add-on. However, almost all the web sites nowadays are using javascript. It is...

TOR for Kali Linux

TOR for Kali Linux Tor (used to stand for " The Onion Router ", but its no longer considered an abbreviation, so its just " Tor "), is an anonymity network, used to surf the web (and more) anonymously. Basically, anyone running the Tor software on their computer runs a proxy, and traffic gets passed (encrypted) from one person running Tor to another person running Tor, multiple times through many users, until it gets to the page that you requested. Hence the term " Onion " used to describe it, since it works in " layers ". Each person running Tor on their computer is called a " Node ". To the page (and anyone logging requests to that page, such as the website owner for example) they can only see the IP address of the last Node (called the "end node"). Any communication along the way, between you, when you request the website page, and the final destination, is encrypted, and cannot be analyzed. However, the last Node in the ch...