Pretty Polly
The latest release of Parrot Security OS has some extremely colorful plumage, which will appeal to both hackers and lay users interested in their systems' safety.
|
Prin Pattawaro – 123RF.com
The latest release of Parrot Security OS has some extremely colorful plumage, which will appeal to both hackers and lay users interested in their systems' safety.
Parrot Security OS, which recently celebrated its 4th birthday [1], comes from the Frozenbox Network, an Italian network dedicated to hacking, IT security, and programming [2]. It follows in the footsteps of already mighty security-focused OSs such as CAINE [3] and WeakerThan [4] both of which were also developed in Italy.
The OS doesn't follow an official release frequency but since 2014 has released versions on roughly a monthly basis.
Version 3.1, code-named Defcon, was released in July and is based on Debian jessie. It is available both for 32-bit and 64-bit architectures, as well as ARM and IoT images, including the Raspberry Pi and Cubieboard 4 (CC80). Visitors to the Parrot Security OS website can download either the Full or the Lite version of the ISO from a variety of mirrors. Alternatively, the ISO can be downloaded via BitTorrent.
[...]
Pages: 4
The developers introduced version 2.0 of Kali Linux in mid-August. It is a distribution that specializes in system and network security. This is not limited to cosmetic changes – in fact, Kali actually features many important innovations.
Sluggish network connections can be nerve-wracking. Checking live statistics about network traffic can help pinpoint the problem. Iftop is a command-line system monitoring tool that can help you identify bandwidth hogs and keep traffic moving.
Finding weak points and problematic configurations in an intranet typically takes a lot of time and effort. Thanks to careful integration into Kali Linux, the OpenVAS and Nmap tools can be genuinely helpful.
SiriKali, formerly known as cryfs-gui, delivers a graphical interface for four file encryption tools that the user would otherwise have to operate from the command line.
© 2025 Linux New Media USA, LLC – Legal Notice