Thursday, November 23, 2023

Level of Snooping and Government Surveillance

Every time one hits the web browser, you are exposed to the algorithm of Government Surveillance.

I think best surveillance is in Russia.

The worse is in America.

Ukraine is in between.

Everything Ukraine does in monitored both  at physical and digital level.

There are Linux playbook answers to penetration testing but Kali is the worst Linux distribution.

Python is the longest but most exposed system.

This is not about hacking but a summary of a Linux Guys activity.

Hackers, privacy experts and freebies are trying to address this issue.

Number one caution is do not buy a second hand laptop. It is already hacked that is why somebody has dumped it in E-Bay.

Just think of son of President Biden's plight. His laptop was hacked, I believe by a Chinese guy.

We will not hear about this ultimate saga for another 20 years.

Outcome

Biden is the first in US history who could not run for a second term.

I think former President Trump had to pay his legal team a lot for his defense for his simple negligence, not necessarily the foul mouth.

Freedom of Speech is ingrained in American politics but F.B.I infiltration is known from J.F.K. regime.

Even Mafia is not immune but their ploy is termination (their legal term for brutal killing).

Please note I am not a hacker.

If my government (Ceylon) tries to snooze on my computer, I would lead them astray!

What is the perfect laptop for hacking?

1. Hacking is 80% human.

2. Hacking is 20% machine.

3. A Linux Gamer needs a greatest and latest but a Linux hacker can do that with a USB stick.

4. So do not let a guy or girl use your laptop when you are having a conversation with a friend or having a lunch break.

5. The computer should go to security mode within few minutes.

6. Build your skill set on a cheap laptop to begin with.

7. By the way, Maru Sira's web site was hacked by an amateur!

8. CPU is not critical except password hacking.
Investment in CPU is not a good investment for hacking.

9. GPU is necessary for complicated password hacking.

So invest the money on the GPU.

10. Linux tools are light weight.

11. Penetration Testing and Hacking are not simple processes.

12.   RAM is important.

13. Multiple Virtual Machines needs lot of RAM.

14. 4G is the minimum and more is better.

15. Good WiFi adaptor for wireless hacking.

16. Rubber duckies and WiFi Pineapple are not all that important.

17. VM Ware VM Ware Work Station.

18. Virtual Box is free but VM Ware are expensive.

19. The paradox of hacking is illegal but your government does it on daily basis on nano second intervals.

20. Does not matter the host system

Windows
Linux
MacOs

Every Unit can be hacked.

21. Some Hacker applications are incompatible with Apple and Windows but Bare Metal Linux can accommodate them.

22. For a Training session Kali Linux is OK.

23. Parrot Linux is another but I have never use it.

24. Dragon OS is not listed in www.distrowatch.com.
I do not recommend it.
By the way, it is Debian derived.

One should notice Linux developers are colossal guys and girls and we do not encourage illegal mechanisms.

25. Cloud can be used for Penetrating Systems.

26. There are other B.S.D. derivatives for penetration testing.

I started my work with an old B.S.D. to erase my laptop of Windows.

27. TrueNAS

TrueNAS is a Network Attached Storage system which stores files, blocks and docker containers.

It is a WEB File Server platform that supports Linux, Windows and Apple files.

It has Free version and Enterprise version which include hardware.

It has both Linux and B.S.D. components.


No comments:

Post a Comment