Ah, the animal computer books of my childhood, lol.
My parents (both in tech fields) had a library of these before they split up.
Somehow I wound up in IT as a career, no one saw that coming, I assure you /s
Ah, the animal computer books of my childhood, lol.
My parents (both in tech fields) had a library of these before they split up.
Somehow I wound up in IT as a career, no one saw that coming, I assure you /s
Kali was built out as a penetration testing distro, though it does contain some diagnostic tools.
Not a bad place to start if you’re used to Debian, but it is a rolling release so it may break unexpectedly, or have new bugs introduced with each update.
A persistent USB with just Debian could have all the same tools installed but have a longer support scope on releases so you don’t have to update daily (bleeding edge) which is nice to reduce read/writes to the flash drive it’s on.
That being said, I keep a Kali live image (persistent) but thats becauae its home - my first introduction to Linux was 5 minutes with Red Hat, but aside from a brief intro in highschool, I really started with Linux in Backtrack, offensive security’s predecessor to Kali.
Yes, I have to learn things the hard way lol.
Sadly this.
Any personal matters I may have attended to during work hours were done on a personal device, through a VPN, preferably borrowing some other WiFi signal than one run by any company I work for.
If its even more personal, just drop WiFi I don’t control all together. Either use the phones data plan for 10 minutes, or tether it to a computer and do the same.
So possibly, in a thousand years or so, we could have parasites that improve our lives in every conceivable way.
Just need to eat an egg salad sandwich from a truckstop restroom coin op machine.
Edit: I’m a little busy at work, so maybe I read the replies wrong - but this was a Futurama reference.
I found a script for bypassing captive portals on Linux back in the day…
The full functionality of how it works escapes me at the moment, but essentially it searches the network for a host that possibly already connected through the captive portal and spoofs their MAC address.
This isn’t the one I originally found, but its the same principal and a Kali tool, so it may be considered more secure than the original bash script I copied back in the day:
https://en.kali.tools/?p=724