1 00:00:00,240 --> 00:00:03,040 Hey, everyone, welcome to this new video. 2 00:00:03,480 --> 00:00:10,360 In this video, we will discuss why every hacker should know and use Linux as their main operating system. 3 00:00:11,130 --> 00:00:14,460 The first topic is Linux is open source. 4 00:00:15,000 --> 00:00:17,910 Unlike Windows, Linux is open source. 5 00:00:18,060 --> 00:00:24,600 What that means for us is that the source code of the Linux operating system is available to us. 6 00:00:25,080 --> 00:00:28,960 As such, we can change and manipulate it as we want. 7 00:00:29,760 --> 00:00:37,260 If you are trying to make a system operate in the way it was not intended, but being able to manipulate 8 00:00:37,260 --> 00:00:39,360 the source code is essential. 9 00:00:39,810 --> 00:00:42,050 You can think of it this way. 10 00:00:42,660 --> 00:00:49,200 Could you imagine Microsoft giving us the permission of whatever to manipulate or change the kernel 11 00:00:49,200 --> 00:00:51,070 of Windows for tracking purposes? 12 00:00:51,420 --> 00:00:52,410 Of course not. 13 00:00:54,140 --> 00:01:01,670 The second point is transparency of Linux to hack effectively, you must know and understand your operating 14 00:01:01,670 --> 00:01:05,450 system and the operating system that you are going to attack. 15 00:01:06,420 --> 00:01:08,530 The clinic is totally transparent. 16 00:01:08,790 --> 00:01:14,820 That means we can see and manipulate all its working parts, but not with Windows. 17 00:01:15,000 --> 00:01:22,290 Microsoft tries hard to make it as difficult or impossible to know the inner workings of their operating 18 00:01:22,290 --> 00:01:22,790 system. 19 00:01:23,220 --> 00:01:29,280 As a result, when working with Windows, you are working with a shadow of what you are thinking is 20 00:01:29,280 --> 00:01:36,660 going to under the hood, whereas in Linux you have the spotlight shining directly at each and every 21 00:01:36,660 --> 00:01:38,910 component of the operating system. 22 00:01:39,270 --> 00:01:46,350 It goes without saying, I think this makes working with Linux more effective and efficient. 23 00:01:47,380 --> 00:01:53,560 The next Windows Linux offers granular control, Linux is granular. 24 00:01:53,770 --> 00:02:00,370 That means we have almost infinite amount of control over the operating system in windows. 25 00:02:00,490 --> 00:02:04,330 You can only control what Microsoft allows you to control. 26 00:02:04,360 --> 00:02:11,800 But in Linux, everything can be controlled by the terminal in the most meniscal to the most micro level. 27 00:02:12,370 --> 00:02:18,780 In addition, Linux make scripting in any of these scripting language simple and very effective. 28 00:02:20,060 --> 00:02:27,530 The next point is most of the hacking tools are written for Linux, well over 90 percent of all hacking 29 00:02:27,530 --> 00:02:29,210 tools are written for Linux. 30 00:02:29,420 --> 00:02:36,280 Of course, there are some exceptional cases as well, but those exceptions simply emphasize the rules. 31 00:02:36,980 --> 00:02:44,690 Even some hacking tools are posted for windows, but not all the capabilities transfer from Linux. 32 00:02:45,890 --> 00:02:50,190 The next point is the future belongs to Linux or Unix. 33 00:02:50,930 --> 00:02:59,780 This seems like a radical statement, but I firmly believe that future belongs to Linux and Unix from 34 00:02:59,780 --> 00:03:05,720 the beginning of the Internet, Linux and Unix has been the operating system of choice for observer 35 00:03:05,840 --> 00:03:08,310 or its stability and reliability. 36 00:03:09,080 --> 00:03:15,800 Even today, Linux and Unix dominates the world of Web servers, with well over two thirds of the market 37 00:03:15,800 --> 00:03:16,190 share. 38 00:03:17,230 --> 00:03:24,490 If you believe that the future of computing lies in mobile devices such as tablets and phones, then 39 00:03:24,490 --> 00:03:29,320 over 80 percent of mobile devices are running Unix or Linux. 40 00:03:29,650 --> 00:03:36,160 iOS is based on Unix and is based on Linux, Microsoft Windows. 41 00:03:36,160 --> 00:03:39,660 All mobile devices have just seven percent of this market. 42 00:03:40,800 --> 00:03:48,060 Hacking is an elected profession among the I.T. field, such as it requires extensive and detailed understanding 43 00:03:48,060 --> 00:03:50,190 of I.T. concepts and technologies. 44 00:03:50,430 --> 00:03:58,080 At the most fundamental level, Lileks is required if you want to make hacking and information security 45 00:03:58,080 --> 00:03:59,110 as your career. 46 00:03:59,670 --> 00:04:05,340 I strongly suggest you invest time and energy to using and understanding Linux. 47 00:04:06,420 --> 00:04:13,440 Here are just some of the big names that have come to use Linux since its development, first is Google 48 00:04:13,440 --> 00:04:22,380 and Facebook, NASSA, Amazon, Twitter, McDonald's, IBM, U.S. Department of Defense and New York 49 00:04:22,380 --> 00:04:23,320 Stock Agency. 50 00:04:23,910 --> 00:04:26,680 These are only some of the names that use Linux. 51 00:04:26,940 --> 00:04:29,400 There are so many big companies as well. 52 00:04:30,200 --> 00:04:31,470 So in the next video.