Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
The traditional meaning of 'hacking' is simply the extensive, maybe even obsessive, usage of a computer. It rather relates to the hacking of the keyboard. In this sense about any application that requires keyboard input is a hackers tool.
Thanks to some mainstream journalists with no IT skills the term has commonly mutated into attempts of taking control on remote PC's with rather criminal intent.
What is it exactly that you want to discuss here? How to take over other people' PC's? Getting other people's passwords and credit card info's? How to reverse engineer binary applications? I don't think this is the site for such discussions.
That what i want to know, everyones opinion, different understanding about hacking and what software there are using. idont cae about there intentions what i care is there concept and what tools that different people use.
You asked for opinions: my opinion is that you actually SHOULD care about intentions when it comes to this topic. You still haven't made clear what your motivation is for this specific topic, but you seem to be very obsessive about it, as you have started multiple question-threads on hacking.
Distribution: Debian /Jessie/Stretch/Sid, Linux Mint DE
Posts: 5,195
Rep:
If you mean "hacking" in the positive way, that is, trying to dig deep into the internals of how programs work, you don't find that out by dropping a few posts on LQ with one-liner questions. If you know what hacking means it should be pretty obvious to you.
If you intend to do malicious hacking, this forum is not for you.
If you had a legitimate purpose, it would be normal to suggest what that purpose was; as you have been asked for clarification in several threads without suggesting a legitimate purpose, many people will have drawn their own conclusion.
Considering that abrenar has threads asking about keyloggers, cracking passwords, etc., it is probably safe to assume that the question isn't about legit uses.
Considering that abrenar has threads asking about keyloggers, cracking passwords, etc., it is probably safe to assume that the question isn't about legit uses.
Yes, I agree, and I reported his posts as such, but it's up to the mods.
My preferred hacking tool is my brain. It is 1) free, 2) freely available, and 3) not hooked up to comcast and their stupid network policies. One or all of these may change, however if the Republicans get their way.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.