The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Why is Linux preferred by hackers??

    Discussion in 'Linux Compatibility and Software' started by DR650SE, Dec 8, 2009.

  1. DR650SE

    DR650SE The Whiskey Barracuda

    Reputations:
    7,383
    Messages:
    8,222
    Likes Received:
    182
    Trophy Points:
    231
    I've never used Linux, but was thinking about setting up a dual boot when I get my new laptop (M17X) which is in the mail. But Waaay back in the day I used to read about hacking and things of that sort. Without ever using Linux I always wondered why it was the prefered OS for hackers. Can anyone shed some light on this for me? :confused: Thanks guys
     
  2. moral hazard

    moral hazard Notebook Nobel Laureate

    Reputations:
    2,779
    Messages:
    7,957
    Likes Received:
    87
    Trophy Points:
    216
    I don't know, maybe because it's open source?
     
  3. afhstingray

    afhstingray Notebook Prophet

    Reputations:
    351
    Messages:
    4,662
    Likes Received:
    2
    Trophy Points:
    105
    they can tweak the code if they want to?
     
  4. surfasb

    surfasb Titles Shmm-itles

    Reputations:
    2,637
    Messages:
    6,370
    Likes Received:
    0
    Trophy Points:
    205
    It's smaller and open source.
     
  5. Charr

    Charr Notebook Deity

    Reputations:
    415
    Messages:
    1,564
    Likes Received:
    0
    Trophy Points:
    55
    Constructive hackers use Linux because it allows them to work more easily. Destructive hackers use Linux because there are more tools available.
     
  6. Kdawgca

    Kdawgca rotaredoM repudrepuS RBN

    Reputations:
    5,855
    Messages:
    8,609
    Likes Received:
    2
    Trophy Points:
    206
    http://www.adequacy.org/stories/2001.12.2.42056.2147.html :p


    Yep, they will probably use what ever makes it easier for them. A hacker and cracker(destructive hacker) can use any "hacking" tool or OS for a variety of different reasons...For example, a packet sniffer can be used for malice or network performance analysis.

    http://searchenterprisedesktop.techtarget.com/tip/0,289483,sid192_gci998037,00.html
     
  7. helikaon

    helikaon Notebook Consultant

    Reputations:
    269
    Messages:
    288
    Likes Received:
    0
    Trophy Points:
    30
    8. Is your son obsessed with "Lunix"? ..........

    rofl, i really had to laugh hard with this .... :))))

    btw, i lately taken interested in wifi security - if anyone interested, start reading about 'kismet' :)
     
  8. rm2

    rm2 Notebook Consultant

    Reputations:
    107
    Messages:
    275
    Likes Received:
    0
    Trophy Points:
    30
  9. crazycanuk

    crazycanuk Notebook Virtuoso

    Reputations:
    1,354
    Messages:
    2,705
    Likes Received:
    3
    Trophy Points:
    56
    Ok I almost fell off my chair here LUnix was a UNIX type OS developed for the C64 !!!!

    http://lng.sourceforge.net/

    think they mean Linux and Linus Torvalds who is NOT Russian but Finnish

    http://en.wikipedia.org/wiki/Linus_Torvalds
    http://en.wikipedia.org/wiki/LINUX

    Telnet was written by this hacker group ... nah http://en.wikipedia.org/wiki/Telnet

    and come on LILO was easy to remove, I wiped many a hard drive after Linux installs in the 80's and 90's


    that little article was PURE FUD and funny as heck, thanks Kdawgca that was an excellent read and definatly heading for my bookmark list.


    and why do both white hat and blackhat hackers like Linux/UNIX/POSIX well its flexable and has support for most every network protocol, system, server and database available to them. its not a minor desktop OS like its nutered friend OSX or limited by cute GUI like the windows desktop versions ( server is as powerful for testing and locating network penitrations.
     
  10. DEagleson

    DEagleson Gamer extraordinaire

    Reputations:
    2,529
    Messages:
    3,107
    Likes Received:
    30
    Trophy Points:
    116
    Well, if you are a hacker, you dont want to get hacked back, so Windows is not an option. xD
     
  11. E30kid

    E30kid Notebook Deity

    Reputations:
    38
    Messages:
    899
    Likes Received:
    0
    Trophy Points:
    30
    It was a satirical article. They purposefully got those key things incorrect.
     
  12. BrandonSi

    BrandonSi Notebook Savant

    Reputations:
    571
    Messages:
    1,444
    Likes Received:
    0
    Trophy Points:
    55
    It's sad when you have to point out satire to others.. :(
     
  13. wearetheborg

    wearetheborg Notebook Virtuoso

    Reputations:
    1,282
    Messages:
    3,122
    Likes Received:
    0
    Trophy Points:
    105
  14. osomphane

    osomphane Notebook Evangelist

    Reputations:
    81
    Messages:
    426
    Likes Received:
    0
    Trophy Points:
    30
    this thread is full of lol
     
  15. ALLurGroceries

    ALLurGroceries  Vegan Vermin Super Moderator

    Reputations:
    15,730
    Messages:
    7,146
    Likes Received:
    2,343
    Trophy Points:
    331
    If you use Linux you turn into a 1337 h4x0r. I submit my evidence below:

    [​IMG]
    From http://xkcd.com/456/
     
  16. Bog

    Bog Losing it...

    Reputations:
    4,018
    Messages:
    6,046
    Likes Received:
    7
    Trophy Points:
    206
    The open source nature of the OS allows an intruder far greater control over hardware and software. Enough said.
     
  17. The_Moo™

    The_Moo™ Here we go again.....

    Reputations:
    3,973
    Messages:
    13,930
    Likes Received:
    0
    Trophy Points:
    455
    every one says hacker ......


    It's cracker :

    and i second what Bog said ;)
     
  18. $immond$

    $immond$ Notebook Consultant

    Reputations:
    257
    Messages:
    279
    Likes Received:
    0
    Trophy Points:
    30
    http://www.remote-exploit.org/backtrack.html

    Thats why allot of hackers prefer Linux lol! jk

    Actually I use Linux more often then Windows. I am yet to try this distro though but it I hear its a decent security analyzer. One of my friends whom's a system engineer recommended this one.
     
  19. Ch00kz

    Ch00kz Notebook Consultant

    Reputations:
    1
    Messages:
    109
    Likes Received:
    0
    Trophy Points:
    30
    Terminal is much more powerful than command prompt. ~another reason
     
  20. $immond$

    $immond$ Notebook Consultant

    Reputations:
    257
    Messages:
    279
    Likes Received:
    0
    Trophy Points:
    30

    yea but allot is becoming so automated, with a software manager and synaptic manager rarely do you need to use the terminal.
     
  21. $immond$

    $immond$ Notebook Consultant

    Reputations:
    257
    Messages:
    279
    Likes Received:
    0
    Trophy Points:
    30
    Hacker is a term used to describe different types of computer experts. A person who enjoys exploring the details of computers and how to stretch their capabilities. A person who delves into software more deeply than an average PC user. Hackers are not Crackers.


    http://www.hellboundhackers.org/whatishacking.php
     
  22. BrandonSi

    BrandonSi Notebook Savant

    Reputations:
    571
    Messages:
    1,444
    Likes Received:
    0
    Trophy Points:
    55
    Fix that for you Bog. :)
     
  23. Bog

    Bog Losing it...

    Reputations:
    4,018
    Messages:
    6,046
    Likes Received:
    7
    Trophy Points:
    206
    This is merely a matter of semantics, but to begin with hackers were just that. Early hacking was done on the telephone system, and eventually these hackers began to use them for less than innocent purposes. That's why we have terms such as "white hat", "grey hat", and "black hat" hacker to signify the legality of what they are doing in their line of work. Of course, these terms also serve to demonstrate that some hackers work as security consultants who work to preserve network/system integrity.

    So no, a hacker isn't just a person who enjoys fiddling with computers. That's really an oversimplification that ignores the history of hacking and the fact that many hackers have been people who penetrated well-known computer networks.

    EDIT: the website you linked to even has a news page that discusses hackers in various news articles who have broken in to this network or stolen that information. They're just trying to shake off a well deserved stigma.
     
  24. $immond$

    $immond$ Notebook Consultant

    Reputations:
    257
    Messages:
    279
    Likes Received:
    0
    Trophy Points:
    30
    I never said a hacker was just a person fiddling with computers, nor was that stated in my quote.
     
  25. ALLurGroceries

    ALLurGroceries  Vegan Vermin Super Moderator

    Reputations:
    15,730
    Messages:
    7,146
    Likes Received:
    2,343
    Trophy Points:
    331
    So this thread turned serious again -- and there's no mention of ESR anywhere. What gives?

    Read, please:
    http://www.catb.org/~esr/faqs/hacker-howto.html#what_is

    IRL I haven't heard anyone say cracker in a very long time, I read it on /. all the time but that should be a reason NOT to use it... People these days say whitehat, blackhat, or the illusive grayhat. The cracker thing never really caught on, because it happens to be a racial slur in some areas, and there was a movie called HACKERS, maybe that had something to do with mainstream usage of the word... :p :p :p
     
  26. Ch00kz

    Ch00kz Notebook Consultant

    Reputations:
    1
    Messages:
    109
    Likes Received:
    0
    Trophy Points:
    30
    Well it depends what you are doing. I use Terminal quite alot. I barely use synaptic, only when im trying ot find some package Im not sure of the exact name/version number..etc. Fact is you never will never be able to be more efficient and more powerful than a command line interface.

    Another thing is most distro's offer a live cd. So if someone password protects windows or w/e OS and I can't bother using some .tif exploit or something of the sort (lol just speculating never done anything like that before). You can just slip in the live cd mount there drive and you should have unlimited access to the files.

    I remember when a partition resize went horribly wrong thanks to a power outage. If i never have a live cd all my precious data would be gone :(.
     
  27. $immond$

    $immond$ Notebook Consultant

    Reputations:
    257
    Messages:
    279
    Likes Received:
    0
    Trophy Points:
    30
    The terms "Cracker" originated in Britain. It has many meanings from racial slurs to outlaws. eg.) Safe Cracker "One whom breaks into safes" Cracker is a pretty broad term but generally derogative. However the whitehat, blackhat and greyhat may narrow down the persona of hacker much better. I generally think very low of blackhats anyways.
     
  28. pixelot

    pixelot Notebook Acolyte

    Reputations:
    3,732
    Messages:
    6,833
    Likes Received:
    0
    Trophy Points:
    205
    Good point. I use "crackers" occasionally, but "blackhat" more predominantly. :rolleyes:
     
  29. ALLurGroceries

    ALLurGroceries  Vegan Vermin Super Moderator

    Reputations:
    15,730
    Messages:
    7,146
    Likes Received:
    2,343
    Trophy Points:
    331
    wb.. nice to see u around again :)

    cheers
     
  30. pixelot

    pixelot Notebook Acolyte

    Reputations:
    3,732
    Messages:
    6,833
    Likes Received:
    0
    Trophy Points:
    205
    Thanks! I'm on break right now, so I have more time to haunt the interwebs (while getting ahead on schoolwork, of course). I've also been trying out KDE, and next I'm planning to mess with conky. :rolleyes:
     
  31. titod420

    titod420 Notebook Enthusiast

    Reputations:
    30
    Messages:
    15
    Likes Received:
    0
    Trophy Points:
    5
    haha roflmao..... read the whole article from your link.... AMD is a third world processor company preferred by hackers and use child labor (?)...

    lol @ whole article.....
     
  32. de.1337

    de.1337 Notebook Evangelist

    Reputations:
    373
    Messages:
    491
    Likes Received:
    0
    Trophy Points:
    30
    I need to start doing that. Does solve the term problem... "Whad you call me?!??