WHERE TO GET AN URGENT HACKER

Start from the beginning
                                        

What Operating System Should My Computer Use

If you are running as the host operating system, you are going to need hardware that will run a currently supported version of Windows. You will also have to factor in the cost of a . You can use a license but you will be rebuilding your host every 90 to 180 days because the license will expire. This is fine for a virtual machine guest but it is a real pain to have to rebuild your host every few months.You can avoid the Windows licensing issue by running as the host operating system. I recommend using a version. If you do not know which Linux to pick, use Ubuntu. I use , which is what is based on. Once you get to know Linux, you can branch out and try other Linux distributions.Windows is more resource intensive that Linux. This applies to the virtual machine host and well as guests. Despite this, I recommend you learn to use both operating systems as they constitute the majority of systems used.

Which virtual machine software should you use

There are three primary software vendors in the market, , , and . VMware and VirtualBox support more guest operating system types and will run on a or host. Hyper-V only runs on a Windows host so I will not be covering it.VMWare is the most full featured, however it is expensive. VMWare comes in three versions, , , and .ESXi is meant to run on bare metal. Workstation requires a host operating system and Player is used to run virtual machine appliances built using VMWare Workstation.VMWare Player is free but if you want to build your own virtual machine guests, you are going to need VMWare Workstation.Oracle VirtualBox is free bit it is not as full featured as VMWare. I have used VMware for many years but moved to VirtualBox exclusively in the last few years and have found that it is well up to the task. is under active development so they are regularly adding new features.VMWare and VirtualBox Documentation

Learn Advanced Search Engine Techniques

Knowing how to use a is a hacker superpower.The Internet is a treasure trove of information if you know how to dig for it. Search engines such as have advanced search directives that can make it much easier to find what you are looking for.Google Hacking (Dorking) References

Learn Basic Systems Administration

The better your skills the better you will be at hacking. You will need to be able to install and configure basic . There are plenty of free online resources for learning systems administration. You will also find these skills are essential for reusing the free hardware you have been getting (see Where to get equipment to play with?).You will need to learn how to modify the system configuration using the , , and how to use services.Learn to embrace the (CLI). Some of the most powerful tools for systems administration and hacking do not have a interface. Often your on a system will only be through a CLI. When you exercise a and find yourself with a that that is not a fully interactive your skill with the command line will let you easily overcome the problem. See "" for Linux and Windows command line tutorials.Systems Administration Training Resources

Learn How to Install, Configure, and Harden the LAMP/WAMP Stack

Learn the Built-in Text Editors

The default on all modern versions of is so learn how to use it.Virtually all come with installed by default. On some systems, vi is an to . All the vi commands also work in vim. If you learn how to use vi, you will be able to use vim as well.Editor Training Resources

Learn About Networking Devices

Originally, had a single function such as a router, gateway, hub, switch, or firewall. The reason was that the equipment was expensive. Costs have come down significantly and miniaturization has allowed manufactures to build multi-function devices.Today you can commonly find sub $100 dollar devices that are a WiFi access point, gateway, router, switch, firewall, web server, file, and print server.You need to learn what each of these devices do and more importantly what they do when connected together to form a network.

You've reached the end of published parts.

⏰ Last updated: Nov 30, 2020 ⏰

Add this story to your Library to get notified about new parts!

URGENT HACKER (AUTOMICHACKERSCREW@GMAIL.COM)Where stories live. Discover now