answersLogoWhite

0

No. Hacking, depending on your definition, can be done from almost any operating system.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

When was Hack - Unix video game - created?

Hack - Unix video game - was created in 1982.


When did Hack - Unix video game - happen?

Hack - Unix video game - happened in 1982.


How can you hack into other wireless routers from your Nintendo Wii which have a secure access point which have passwords?

If you can run a form of Linux/UNIX then download and run reaver. After that you should be fine


Which free hack is the best?

John the Ripper is free software for password cracking which was initially designed for the Unix Operating System. At present, it can keep running on 15 Operating systems which includes 11 different versions of UNIX, Win32, DOS and BeOS. It has the potential to combine several password crackers into a single package which has made it one of the most popular cracking tools for hackers.


What are the troubles computers can cause when you deal with computers in order to register for a class pay a bill or get a loan?

It's not always the safest or the smartest. Depending on your security setup and/or operating system, etc. anyone can hack into your system and retrieve your personal information even if you have already deleted it. Just a hint: hackers tend to stay away from Linux because that is what they use. They don't want to bother with something they already have! Go Linux!


How do you make iPod into iPod Linux hack?

google OpeniBoot


What are some good reasons for using Linux in a corporate environment?

The security of Linux, no Viruses, harder to hack than Windows.


Can you get Angry Birds on tocco lite?

Yes you can if you hack as the samsung toco has no android or iOS itself, its a phone operating with it's own system which isn't that good and has no good apps. So you have to hack it, check videos on youtube to see how to hack it :)


Was Bill Gates a hacker?

Yes, him and three other students at MIT use to hack Unix systems alot.One of those Unix Hacks ended up being MSDOS


Should I root my phone?

"Rooted, or rooting, is a rather new term primarily for Linux-based smart phones. In every version of unix, linux, SunOS, AIX, HPUX, etc, there are several user id's that are set up by default. Some of them run things, others are mostly just a holding and controlling place. The root id, has a UID (userid) of zero. It is all powerful. If you have the password to the root id, you can use it. I've honestly not read how they're getting into the various phones, there could be some other things "wrapped" on top of root to hide it, or the normal ways to hack into it, nevertheless, this is the goal, to get full access to the root id. What does this do? If you're not a coder or sysadmin, this may seem like not much, but it is everything due to the way the operating system manages permissions. In a nutshell, root has, or can assign to itself, permission to all files and directories, and all users. EVERYTHING in unix/linux can be treated as a file to an extent, so if you have access to every file, you have access to every possible function now or added in the future, as long as it is part of the Linux operating system that root controls. There can be some things that are hardcoded into electronics/chips on the phone that are not under Linux, and therefore root, control. But anything you think of as a program or application is, and some that you may not realize are programs are. So with root, you can add, own, edit, delete, ANY file on the system, and control who else (what other user id's) have access to what files (programs, apps, functions)."


How do you get carates?

you hack the system


Craftsman tools model 108.1502 power hack saw?

I have the factory Operating Instructions and Parts List for the Craftsman Power Hack Saw Model # 108.1502. What is your question?