the Linux File System explained in 1,233 seconds // Linux for Hackers // EP 2



Do you believe obtaining into someones facebook account or google account is called hacking? In computer networking, Hacking is any type of technological initiative to control behavior of network connections as well as linked systems.

Hacking is historically referred to positive, brilliant technological work that was not always pertaining to computer systems. When did hacking originate? MIT engineers in 1960s performed some harmless technical experiments as well as fun learning activities. These were so called hacks. Prior to the internet, several cyberpunks in US try out techniques to change telephones for making ‘FREE’ long range calls over the phone network unlawfully.

As computer system networking as well as internet blew up in popularity, data networks came to be the most usual target of cyberpunks. Malicious attacks on computer networks are formally known as breaking, while hacking truly applies just to activites having great purposes. Nonetheless, A lot of non technical individuals fail to make this distinction. Hacking on local area network is typically done with scripts or various other network programming.

These programs usually manipulate data travelling through a network connection in ways designed to obtain even more info about just how the target system functions.

A few highly knowledgeable hackers function for business firms with the task to safeguard that company’s software and data from outside hacking. Breaking techniques on networks consist of developing worms, starting rejection of solution (DoS) attacks, or establishing unapproved remote accessibility links to a device.

If you similar to this video clip, please offer it a thumbs up. For even more such video clips, just struck the subscribe switch. And also as always many thanks for enjoying.

Do you think getting into someones facebook account or google account is called hacking? In computer networking, Hacking is any kind of technical effort to adjust practices of network connections and connected systems.

Hacking is historically referred to constructive, smart technical job that was not necessarily relevant to computer system systems. Harmful strikes on computer system networks are officially known as breaking, while hacking truly uses only to activites having good purposes.

Hacking

#Linux #File #System #explained #seconds #Linux #Hackers

FREE Linux Hacking Lab: https://bit.ly/3uAFUiz

💯💯Think you’re smart?? Take the quiz: https://bit.ly/3fXv6ag (FREE)
Watch the entire series: http://bit.ly/linuxforhackers

*Sponsored by HTB Academy
—————————————————
Sign up for the Hacker Academy: https://bit.ly/3uAFUiz
Check out HackTheBox: https://bit.ly/3wJCagH

Linux for Hackers (and everyone) EP 2 — In this episode, we’re going deeper into Linux!! If you want to learn Linux, you HAVE to know where things are! Network settings? Application settings? Linux Commands? (we may delete a few of these, just to see what happens). We will explore the Linux file system to find out where stuff is. And along the way, we’re learning 7 new FRESH linux cli commands.

*Disclaimer: The Linux foundations course from HTB Academy is a Tier 0 course, allowing me to show the course content in this video series.

SUPPORT NETWORKCHUCK
—————————————————
➡️Become a YouTube Member: https://bit.ly/join_networkchuck
☕☕ COFFEE and MERCH: https://NetworkChuck.coffee

Check out my new channel, https://bit.ly/nc_clips

🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch

READY TO LEARN??
—————————————————
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna

FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord

0:00 ⏩ Intro
0:55 ⏩ access your FREE HACKING LAB (linux)
1:39 ⏩ NEW COMMAND: whoami?
2:02 ⏩ 10 second review
2:28 ⏩ the ROOT of the File System
2:45 ⏩ NEW COMMAND: clear
3:03 ⏩ EVERYTHING is a file!!
3:40 ⏩ /bin
4:49 ⏩ NEW COMMAND: cat
5:43 ⏩ NEW COMMAND: cp
7:12 ⏩ NEW COMMAND: rm
7:25 ⏩ i DELETED a command!!!
8:48 ⏩ /sbin
9:27 ⏩ NEW COMMAND: adduser
10:11 ⏩ /usr
11:32 ⏩ NEW COMMAND: which
12:47 ⏩ /boot
12:52 ⏩ /var
12:58 ⏩ /tmp
13:04 ⏩ /lib
13:12 ⏩ /home
13:40 ⏩ /root
14:10 ⏩ /dev
15:33 ⏩ /etc
17:11 ⏩ /mnt and /media
19:24 ⏩ CHALLENGE

AFFILIATES & REFERRALS
—————————————————

(GEAR I USE…STUFF I RECOMMEND)

My network gear: https://geni.us/L6wyIUj

Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck

Buy a Raspberry Pi: https://geni.us/aBeqAL

#linuxforeveryone #linux #linuxforhackers

linux file system,linux for hackers,linux for everyone,linux for hackers ep 2,linux directories,linux fhs,parrot os,kali linux,linux tutorial,learn linux,linux course,linux beginner tutorial,linux file system hierarchy,linux file system types,linux file system explained,linux directory structure,linux tutorial for beginners,gnu/linux,linux file system commands,linux for beginners,directory structure,linux

00:20:33

1617979664

432284

4.94