Configuring the virtual machine
Once installed, there are several configuration steps necessary for the Kali Linux virtual machine. These steps allow for greater functionality and usability.
推薦閱讀
- 網絡安全保障能力研究
- Practical Network Scanning
- 白帽子講Web安全(紀念版)
- INSTANT Windows PowerShell
- Learning Veeam? Backup & Replication for VMware vSphere
- 模糊測試:強制發掘安全漏洞的利器
- Testing and Securing Android Studio Applications
- 可信計算3.0工程初步(第二版)
- 情報驅動應急響應
- 先進云安全研究與實踐
- Learning Pentesting for Android Devices
- 網絡安全大數據分析與實戰
- CTF快速上手:PicoCTF真題解析(Web篇)
- 聯邦學習原理與算法
- 云安全深度剖析:技術原理及應用實踐