When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Pentoo - Wikipedia

    en.wikipedia.org/wiki/Pentoo

    It features packet injection patched Wi-Fi drivers, GPGPU cracking software, and many tools for penetration testing and security assessment. The Pentoo kernel includes grsecurity and PAX hardening and extra patches - with binaries compiled from a hardened toolchain with the latest nightly versions of some tools available.

  3. Linux Desktop Testing Project - Wikipedia

    en.wikipedia.org/wiki/Linux_Desktop_Testing_Project

    The Linux Desktop Testing Project (LDTP) is a testing tool that uses computer assistive technology [7] to automate graphical user interface (GUI) testing. [8] The GUI functionality of an application can be tested in Linux , macOS , Windows , Solaris , FreeBSD , and embedded system environments. [ 9 ]

  4. Debian configuration system - Wikipedia

    en.wikipedia.org/wiki/Debian_configuration_system

    It is developed for the Debian Linux distribution, and is closely integrated with Debian's package management system, dpkg. When packages are being installed, debconf asks the user questions which determine the contents of the system-wide configuration files associated with that package.

  5. List of digital forensics tools - Wikipedia

    en.wikipedia.org/.../List_of_digital_forensics_tools

    Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing, formerly known as BackTrack. [2] Parrot Security OS is a cloud-oriented Linux distribution based on Debian and designed to perform security and penetration tests, do forensic analysis, or act in anonymity. It uses the MATE Desktop ...

  6. BackTrack - Wikipedia

    en.wikipedia.org/wiki/BackTrack

    BackTrack was a Linux distribution that focused on security, based on the Knoppix Linux distribution aimed at digital forensics and penetration testing use. [4] In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux.

  7. Ian Murdock - Wikipedia

    en.wikipedia.org/wiki/Ian_Murdock

    While a college student, Murdock founded the Debian project in August 1993, and wrote the Debian Manifesto in January 1994. Murdock conceived Debian as a Linux distribution that embraced open design, contributions, and support from the free software community. He named Debian after his then-girlfriend (later wife) Debra Lynn Roundy, and himself ...

  8. John the Ripper - Wikipedia

    en.wikipedia.org/wiki/John_the_Ripper

    One of the modes John can use is the dictionary attack. [6] It takes text string samples (usually from a file, called a wordlist, containing words found in a dictionary or real passwords cracked before), encrypting it in the same format as the password being examined (including both the encryption algorithm and key), and comparing the output to the encrypted string.

  9. BlackArch - Wikipedia

    en.wikipedia.org/wiki/BlackArch

    BlackArch is similar in usage to both Parrot OS and Kali Linux when fully installed, with a major difference being BlackArch is based on Arch Linux instead of Debian. BlackArch only provides the Xfce desktop environment in the "Slim ISO" but provides multiple preconfigured Window Managers in the "Full ISO".