Questions And Answers Related To Cyber Security, Ethical Hacking, Linux

 Questions And Answers Related To Cyber Security, Ethical Hacking And Linux

Image By Mika Baumeister Form Unsplash 


1.Will linux run windows programs?

Linux Can Run Windows Programs, More Specifically executables But To Only A Limited Extent. WineLutrisPlayonLinux etc can be used to Run Windows Programs. Alternatively Dual Booting Linux Alongside Windows Works, However  Windows 10 Has A  Subsystem for Linux. 
(Note : To See If The Application In Compatible With Wine Visit https://appdb.winehq.org/
Image By Rawdanits
2.Are linux and unix the same?

Linux Is Not Unix But Similar To-Clone Of Unix, Unix Is A Category Of Operating Systems, For More Information See This

3.Where Are Passwords Stored In Linux?

etc/passwd and in etc/shadow

4.Are cyber security jobs in demand?-Why is cyber security important?  

Generally People Should Be Aware About Subsisting And Incipient Cyber Threats And How To Avert-Prevent Them,such as Securing vulnerable systems, personal information, etc. 
Many Cyber Security Jobs Are In Demand, Such As Forensics Inspector, Systems Administrator, Cyber security analysts, security engineers, Network analysts etc.Due to the incremented reliance on computers, phones different systems, networks, WiFi etc, Hiring Professionals In The Fields Of Cybersecurity To maintain different countermeasures, and organising approaches to addressing and managing different vulnerabilitys-implementation is Becoming more And More Indispensable And Important. 
Image By Gursimrat Ganda Form Unsplash 

4.When is hacking Legitimate or Legal? 

Ethical Hacking In A Legal Environment Is Legitimate, But The Laws May Differ Form Country To Country.Such As : Using DVWA (http://www.dvwa.co.uk/) To Test Tools And Techniques In A Legal Environment,White Hat Hacking Etc. 

6.What's An IP Address? 
Image by Alina Grubnyak Form Unsplash 


IP addresses are a type of "label" assigned to a Device connected to a network that utilizes that IP address, there are two types of ip addresses (IPv4) and (IPv6), IP addresses are assigned either dynamically or statically.You Can Find Your Public IP By Googleing "What's My IP" 

6.What's Reconnaissance/Footprinting?
Image by Caspar Camille Rubin Form Unsplash 



Footprinting Is A Way Were An Attacker Uses Different Techniques And Utilizes Different Tools To Find Out All Important Information About The Target Before Exploiting.

7.Hacking Vs Ethical Hacking :

Hacking Usually Means Using A Malicious Way Of Entering And Breaking, Spying, Exploiting Vulnerabilities etc. While Ethical Hacking Means White Hat Hacking Or Testing Hacking In a Legal Environment. 

-Thanks For Reading - 

Comments