Navigator
Facebook
Search
Ads & Recent Photos
Recent Images
Random images
Welcome To Roj Bash Kurdistan 

95% of the windows machines easy to access/hack

Share information about Computer , Internet, Websites ,Programming and other new technologies

95% of the windows machines easy to access/hack

PostAuthor: Anthea » Mon Sep 29, 2025 7:23 pm

Need to understand the Linux File System Structure?
Alright, strap in. Understanding the Linux file system is like visiting a very confused city run by raccoons with PhDs.

The Linux File System — Explained Like You’re a Lost Tourist
Welcome to Root (/) — the supreme overlord of the city. It’s like Grandma’s attic: everything is stored here whether it belongs or not. From socks to nuclear launch codes — all paths begin here.

/home — Everybody’s Messy Bedroom
Each user gets their own private kingdom of chaos.
This is where you store memes, questionable bash scripts, and that one folder named “New Folder (27)” you’re afraid to open.

/etc — The Secret Government Files
This is where settings live. All the laws of the land are written here.
Wanna change how the entire world works? Edit a file in /etc.
Wanna break everything instantly? Also edit a file in /etc. It’s powerful like that.

/bin & /sbin — The Tool Shed and the Tool Shed With Explosives
• /bin: Regular tools — like ls, cp, and mv. Safe-ish.
• /sbin: Admin-only power tools — like if a chainsaw could also reformat your hard drive.

/usr — Walmart Supercenter
It’s supposed to mean “Userland Software” but realistically it contains EVERYTHING THE DEVELOPERS DIDN’T KNOW WHERE TO PUT.
Executable programs, icons, documentation, leftover burritos — it’s all here.

/var — The Growing Pile of Receipts
Logs, emails, caches — this folder just keeps expanding. It’s like that kitchen drawer full of takeout menus.

/tmp — The Public Toilet of Directories
Anyone can use it. No one wants to stay there. Everything disappears after a while.
You can leave things in /tmp, but morally? You probably shouldn’t.

/dev — The Matrix
Files that aren’t really files but are actually portals to hardware. Want to talk to your keyboard? It’s a file. Want to scream into /dev/null? It’s basically an infinite void. Useful for silencing programs or your feelings.

/proc — Doctor’s Clipboard
This folder is just Linux looking at itself in the mirror like “Is that my memory usage? Yikes.” Everything here changes constantly. Nothing is real.
TL;DR
Linux file system =
Directory
Vibe
/
Grandma’s Attic of Doom
/home
Personalized Goblin Lair
/etc
Constitution + Self-Destruct Button
/bin
Tools
/sbin
Tools But Illegal Without Supervision
/usr
Walmart Megastore
/var
Junk Drawer That Grows Overnight
/tmp
Gas Station Bathroom
/dev
Portal to the Physical Realm
/proc
Existential Crisis Log

Congratulations. You now understand Linux.
Use this knowledge wisely. Or recklessly.
It’s Linux — it won’t stop you either way.
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31236
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 738 times
Nationality: Kurd by heart

95% of the windows machines easy to access/hack

Sponsor

Sponsor
 

Re: Understanding the Linux file system

PostAuthor: Anthea » Tue Oct 07, 2025 1:06 am

Image
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31236
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 738 times
Nationality: Kurd by heart

Re: Understanding the Linux file system

PostAuthor: Anthea » Tue Oct 07, 2025 1:27 am

What is SSH and why is it essential for SysAdmins?

Alright, buckle up, because we’re about to explain SSH — the Secret Sauce of SysAdmins — in a way that even your grandma’s toaster might understand.

So, what the heck is SSH?

SSH stands for Secure Shell, which sounds like a medieval knight’s protective gear, but it’s actually a magic tunnel that lets sysadmins talk to their servers from afar — safely, quietly, and without the internet gremlins listening in.
Imagine a sysadmin sitting at home in fuzzy slippers, sipping cold coffee, typing into their terminal — and boom — they’re controlling a server halfway across the planet like some kind of cyber Gandalf:

“You shall not pass… unless you have the right key!”
In essence, SSH is how sysadmins remote-control computers without having to physically crawl into a data center at 3 a.m. (which, let’s be honest, smells like hot dust and regret).

Why is SSH essential for SysAdmins?

Because without SSH, sysadmins would:
    Have to physically visit servers, probably in a cold, windowless room, lit only by the flickering glow of despair.
    • Send commands through email like it’s 1998. (“Hey, server, please restart yourself. Regards, Bob.”)
    • Or worse… use Telnet — the insecure ancestor of SSH — which basically shouts your passwords across the internet like a drunk at karaoke night
.SSH is like having:
    • A teleportation device for your commands.
    • A secret encrypted tunnel guarded by math ninjas.
    • A digital invisibility cloak, keeping your data safe from the creepers of cyberspace.

Bonus: What SSH lets you do (while pretending you’re a hacker in a movie)
    • Login remotely to servers like, “I’m in.”
    • Copy files securely, so your cat memes and configs stay private.
    • Run commands on multiple machines, which makes you feel like you control an army of obedient robots.

TL;DR
SSH is:
The super-secure, command-line portal that lets sysadmins manage servers from anywhere — without having to wear pants.
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31236
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 738 times
Nationality: Kurd by heart

Re: Understanding the Linux file system

PostAuthor: Anthea » Wed Oct 08, 2025 9:57 pm

White Hat hacker with a 20 year career here
(and retired Digital Forensic Consultant):


Your suspicions are correct:

Windows is far easier to hack out of the box than Linux.

    I can hack/compromise / access user data on 95% of the windows machines on the planet, with just physical access. And only a handful of poorly configured Linux devices. But don't get complacent, Linux hacks can, and have, happened
Here's my tips for securing Linux to be as "unhackable" as possible:

1. Use Ubuntu or something based on it. Everything else will be less secure unless you're a Linux professional capable of securing Linux yourself, manually. And it's the only distribution that supports Secure Boot out of the box, WITH officially licenced Microsoft encryption keys (that I'm aware of, feel free to correct me on this one). That being said, secure boot is increasingly security theater, and you can have a secure Linux system with it disabled. Possibly more secure, depending on what attack surface you're most concerned about.

2. Keep your operating system and software up to date.

3. Enable your free Ubuntu Pro account (free on up to 5 devices)

4. Now that you have Ubuntu pro, you'll want to enable the following Pro features:

    4a. ESM to get 12 years of security updates instead of 5,
    4b. Canonical's security updates for the Universe repo (traditionally Debian and Ubuntu have left this up to the community), but they're now offering official security updates.
    4c. And, most importantly, "livepatch". This will give you the ability to upgrade even the Linux kernel, without needing to reboot (usually). And it's free.
5. Enable full disk encryption at install. It's just a checkbox. It literally couldn't be easier. This is a difference between someone being able to access your personal data with physical access and the right tools, or not.

6. If you install a SSH server, also install Fail2ban. It's in the repos and has no drawbacks. You only really need it if you're opening your SSH server to the outside world via port forwarding, but don't risk forgetting. It could even (hypothetically) protect you from an already compromised device on your local network. Or a compromised router itself.

7. ALWAYS get your software from the repos. Never download and install executable files to get your Linux software. Flatpak and appimage are more secure than traditional package managers, Snaps are more secure than both, but traditional Linux package managers are still incredibly secure. Far more than the Windows approach to software install and management.

Yes, their are outliers and there have been exceptions where malicious software briefly made it through the walled gardens via Linux package managers, but they are literally one out of a million, compared to Windows malware & other infections. And one out of 10,000 compared to Mac malware.

Avoid the multi OS package manager NPM outright, and be very cautious with PIP. If you decide to use the PIP package manager, use pipx to install packages instead. It has additional security and isolation from the system, built right in.

If you can't find the software you want in the repos, find a repo with the software you want and add that to your system. Then you can install the software via your package manager. This ensures that when there's a security flaw that's been patched for any of your user installed software, the mitigation will be installed right along with your normal system updates.

The LastPass hack, one of the worst in history (and one of the few times Linux has been massively compromised), would have been outright stopped if the target had followed this advice when installing Plex on Linux.

On Debian/Redhat/RH clones you'll need to find a compatible repository, add it to your sources, update your sources, and install the software.

On Ubuntu (and Ubuntu based distribution) you can search for a "PPA" for said software (Personal Package Archive) and add that to your system with a single command (it'll be on the PPA page, just copy and paste).

It will even automatically detect your Ubuntu distribution version, and install the correct repo for you (or warn you if there isn't one, and it's incompatible with your system). Then your desired software will be instantly available via your normal package manager.

I may not be as knowledgeable as this person but I can program in about 8 languages, have a BETC NATIONAL IN COMPUTER SCIENCE, I was a Systems Analyst, a computer teacher, also helped people building computers at a time before Plug & Play when we had to solder everything together. And early on I had to write my own training manuals :D
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31236
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 738 times
Nationality: Kurd by heart

Re: 95% of the windows machines easy to access/hack

PostAuthor: Anthea » Thu Oct 23, 2025 8:52 pm

My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31236
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 738 times
Nationality: Kurd by heart

Re: 95% of the windows machines easy to access/hack

PostAuthor: Anthea » Fri Oct 24, 2025 12:39 am

My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31236
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 738 times
Nationality: Kurd by heart

Re: 95% of the windows machines easy to access/hack

PostAuthor: Anthea » Fri Oct 24, 2025 12:41 pm

Look to be my dream laptop
Alienware 16 Area-51


Image

Which Laptop or PC Do You Need to Become a Cyber Security Expert or Ethical Hacker?
If you’re serious about becoming a Cyber Security Expert or Ethical Hacker, then your hardware setup is your first real weapon. A powerful machine helps you run labs, virtual environments, and penetration testing tools smoothly.


Here’s a complete breakdown:
---
Basic Setup – For Beginners / Students
CPU: Quad-core (Intel i5 / AMD Ryzen 5)
RAM: 8 GB minimum
Storage: 256 GB SSD
GPU: Integrated graphics is fine
Network: Ethernet + dual-band Wi-Fi
Why: Perfect for learning fundamentals and running 1 virtual machine (VM).
---
Recommended Setup – For Intermediate Learners
CPU: 6–8 cores (Intel i7 / Ryzen 7)
RAM: 16 GB (for 2–3 VMs simultaneously)
Storage: 512 GB NVMe SSD + external HDD
GPU: Mid-range GPU (optional – for GPU cracking)
Network: Gigabit Ethernet + Wi-Fi adapter supporting monitor mode
Extras: VT-x / AMD-V virtualization support enabled in BIOS
Why: Ideal for building real-world labs, testing Kali/Parrot OS, and running tools like Burp Suite, Nmap, and Wireshark.
---
Professional Setup – For Researchers & Red Teamers
CPU: 8+ cores (Intel i9 / Ryzen 9 / Threadripper)
RAM: 32–64 GB (for heavy virtualization and multiple containers)
Storage: 1 TB NVMe SSD + 2 TB HDD for backups
GPU: NVIDIA RTX series (for password cracking, AI, or ML research)
Network: Multi-NIC setup, Alfa Wi-Fi adapters (monitor + injection support)
Extras: TPM, YubiKey, and virtualization host (VMware ESXi or Proxmox)
Why: Best for advanced pentesting, AI-based threat analysis, and professional red team environments.
---
Key Hardware Features (for All Levels)
Virtualization support (Intel VT-x / AMD-V)
NVMe SSD for speed (avoid old HDDs)
Good cooling and build quality
Multiple USB 3.0 ports
Ethernet port (or USB-Ethernet adapter)
Long battery life for field work
Strong Linux driver compatibility
---
Essential Accessories
External Wi-Fi adapter (supports monitor mode & injection)
USB Ethernet adapter for lab networks
Portable encrypted SSD for backups
Multi-port USB hub, quality headphones, external monitor
YubiKey or hardware 2FA for secure login
---
Software Recommendations
Operating Systems: Ubuntu / Fedora for daily use, Kali Linux / Parrot OS for labs
Virtualization Tools: VirtualBox, VMware Workstation, or Proxmox
Practice Targets: DVWA, Metasploitable, OWASP Juice Shop
Encryption: Use full-disk encryption (LUKS/BitLocker)
Snapshots & Backups: Always snapshot before testing; backup important VMs offline
---
Legal & Ethical Reminder
Always perform penetration testing in authorized environments only.
Unauthorized scanning, sniffing, or data access is illegal.
Practice safely in isolated labs and protect client or user data responsibly.
---
Budget Guide
Student Budget ($400–$700): i5/Ryzen 5, 8–16 GB RAM, 512 GB SSD
Intermediate ($800–$1,500): i7/Ryzen 7, 16–32 GB RAM, NVMe SSD, Wi-Fi adapter
Pro ($1,800+): i9/Ryzen 9, 32–64 GB RAM, RTX GPU, multiple NICs
--
TL;DR (Short Caption)
Dreaming to become an Ethical Hacker?
Start with a laptop that supports virtualization (VT-x/AMD-V), 16 GB RAM, SSD, and an external Wi-Fi adapter.
Upgrade to 32–64 GB and multi-NIC for advanced research.
My Name Is KURDISTAN And I Will Be FREE
User avatar
Anthea
Shaswar
Shaswar
Donator
Donator
 
Posts: 31236
Images: 1151
Joined: Thu Oct 18, 2012 2:13 pm
Location: Sitting in front of computer
Highscores: 3
Arcade winning challenges: 6
Has thanked: 6019 times
Been thanked: 738 times
Nationality: Kurd by heart


Return to Computer & Technology

Who is online

Registered users: Bing [Bot], Google [Bot]

x

#{title}

#{text}