0% found this document useful (0 votes)
89 views

Linux Fundamentals 2

Linux distributions are operating systems based on the Linux kernel that are used for various purposes. Some popular examples include Ubuntu, Fedora, CentOS, Debian, and Red Hat Enterprise Linux. Many users choose Linux for desktop computers because it is free, open source, and customizable. Linux is also widely used as a server operating system because it is secure, stable, and reliable. For cybersecurity specialists, popular Linux distributions include ParrotOS, BackBox, BlackArch, Raspberry Pi OS, CentOS, and Kali Linux.

Uploaded by

Francisco
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
89 views

Linux Fundamentals 2

Linux distributions are operating systems based on the Linux kernel that are used for various purposes. Some popular examples include Ubuntu, Fedora, CentOS, Debian, and Red Hat Enterprise Linux. Many users choose Linux for desktop computers because it is free, open source, and customizable. Linux is also widely used as a server operating system because it is secure, stable, and reliable. For cybersecurity specialists, popular Linux distributions include ParrotOS, BackBox, BlackArch, Raspberry Pi OS, CentOS, and Kali Linux.

Uploaded by

Francisco
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

󰨇 Dashboard 󰂽 Modules 󰴠 Paths 􏆲

  Purchase Cubes 󰊓 nosredna 󰅀

LINUX FUNDAMENTALS    Page 2 / Linux Distributions

Linux Distributions 􏅜
 Cheat Sheet

Linux distributions - or distros - are operating systems based on the Linux kernel. They are used for various purposes, from servers and
embedded devices to desktop computers and mobile phones. Each Linux distribution is di erent, with its own set of features, packages, Table of Contents
and tools. Some popular examples include: Introduction

Linux Structure
Ubuntu 􏅊

Linux Distributions
Fedora
Introduction to Shell
CentOS
The Shell
Debian
Prompt Description
Red Hat Enterprise Linux
Getting Help

Many users choose Linux for their desktop computers because it is free, open source, and highly customizable. Ubuntu and Fedora are two 􏆲
   System Information
popular choices for desktop Linux and beginners. It is also widely used as a server operating system because it is secure, stable, and
Work ow
reliable and comes with frequent and regular updates. Finally, we, as cybersecurity specialists, often prefer Linux because it is open source,
meaning its source code is available for scrutiny and customization. Because of such customization, we can optimize and customize our 􏆲
   Navigation

Linux distribution the way we want and con gure it for speci c use cases only if necessary. 􏆲
   Working with Files and Directories

We can use those distros everywhere, including (web) servers, mobile devices, embedded systems, cloud computing, and desktop 􏆲
   Editing Files

computing. For cyber security specialists, some of the most popular Linux distributions are but are not limited to: 􏆲
   Find Files and Directories

􏆲
   File Descriptors and Redirections

ParrotOS Ubuntu Debian


􏆲
   Filter Contents

Raspberry Pi OS CentOS BackBox 􏆲


   Regular Expressions

BlackArch Pentoo 􏆲
   Permission Management

The main di erences between the various Linux distributions are the included packages, the user interface, and the tools available. Kali System Management
Linux is the most popular distribution for cyber security specialists, including a wide range of security-focused tools and packages. Ubuntu 􏆲
   User Management
is widespread for desktop users, while Debian is popular for servers and embedded systems. Finally, red Hat Enterprise Linux and CentOS
􏆲
   Package Management
are popular for enterprise-level computing.
􏆲
   Service and Process Management

Debian 􏆲
   Task Scheduling

􏆲
   Network Services
Debian is a widely used and well-respected Linux distribution known for its stability and reliability. It is used for various purposes, including
desktop computing, servers, and embedded system. It uses an Advanced Package Tool (apt) package management system to handle 􏆲
   Working with Web Services

software updates and security patches. The package management system helps keep the system up-to-date and secure by automatically 􏆲
   Backup and Restore
downloading and installing security updates as soon as they are available. This can be executed manually or set up automatically.
􏆲
   File System Management

Debian can have a steeper learning curve than other distributions, but it is widely regarded as one of the most exible and customizable 􏆲
   Containerization
Linux distros. The con guration and setup can be complex, but it also provides excellent control over the system, which can be good for
advanced users. The more control we have over a Linux system, the more complex it feels to become. However, it just feels that way Linux Networking

compared to the options and possibilities we get. Without learning it with the required depth, we might spend way more time con guring 􏆲
   Network Con guration

“easy” tasks and processes than when we would learn to use a few commands and tools more in-depth. We will see it in the Filter Remote Desktop Protocols in Linux
Contents and Find Files and Directories sections.
Linux Hardening
Stability and reliability are key strengths of Debian. The distribution is known for its long-term support releases, which can provide updates
Linux Security
and security patches for up to ve years. This can be especially important for servers and other systems that must be up and running 24/7.
􏆲
   Firewall Setup
It has had some vulnerabilities, but the development community has quickly released patches and security updates. In addition, Debian has
a strong commitment to security and privacy, and the distribution has a well-established security track record. Debian is a versatile and 􏆲
   System Logs and Monitoring

reliable Linux distribution that is widely used for a range of purposes. Its stability, reliability, and commitment to security make it an
Linux Distributions vs Solaris
attractive choice for various use cases, including cyber security.
Solaris

Tips & Tricks


 Previous Next   Mark Complete & Next
Shortcuts

My Workstation

OFFLINE

􏅄  Start Instance

1 / 1 spawns left

Powered by  

You might also like