The topic that the software list distributed by government officials is “ software list to watch if you are in a child's PC '' is too high level


The topic that the software list distributed by government officials is “ software list to watch if you are in a child's PC '' is too high level

British government officials distributed to parents with children “Software list to watch if you are in your child's PCHas become a hot topic on the Internet because it is too high.

The topic of interest is Twitter users@G_IWThe following image tweeted by.

Local government in Walsall, West Midlands, United KingdomWalsall CouncilBut it is one print that was distributed at school. At the bottom of the print are the "ROCU" and "NCA" logos. NCA is BritishNational Crime Control Agency, ROCU has organized police forces in regions such as Staffordshire, West Midlands, West Marcia and Warwickshire to fight organized crime throughout the region.West Midlands ROCU" In other words, the print was made by a British government agency and distributed via local government to schools where children go.

The title of the print is "Which is in the child's computer?" Web browsers that allow anonymous communicationTor BrowserAbout "the browser used to browse the dark web",Virtual machineabout"Kali LinuxCan hide the PC's OS in places that are not normally found, "Kali Linux's" OS used for hacking, "Wi-Fi PineappleAbout "a toolkit that can collect confidential computer information via the Internet", a chat system for gamersDiscordAbout "a communication platform that is frequently used to share hacking tips"MetasploitIs described as "a penetration tool that makes hacking simpler."

@G_IW, who uploaded a photo of this print on Twitter, states, “This complete junk was distributed to schools through the local government's Walsall Council. Too astounding: I'm proud that if I had one of these software on my child's PC, the child would have learned how to use it, except for Discord, because Discord Is software that has nothing to do with hacking. "

_G_IW's tweet has been retweeted about 3000 times and has collected over 8000 likes, but even more interesting comments are gathered in the reply section.

Kali Linux's official Twitter account states, "I need to admit that it's great to provide a roadmap to show children where to start. The easiest way to get kids to do something is Tell them you can't or shouldn't, and then post a list of things you shouldn't do.Kali Linux Online ManualWas not included in the list. "He tweeted, pointing out that the prints issued by NCA and ROCU make children more likely to be hacked.

TwitterGC_and_Tech's Twitter account says, “I want to meet the 'Genius' who made this print. This print was created for something like 'Heavy Metal Creates Devil Followers' or 'Video Games Create Murder Devil' You must have thoughts, don't let ignorance deal with genres they don't understand! "

"Too ignorant. The skills in working with these software can help build a great career in information security. If I find these softwares on my child's computer, they will help my child It's even better for parents than to find out where their children are using illegal drugs. Learning about information security is great! "

TheDarkTrancer expressed in other examples how out of print the content was: "gasoline: used for arson, mobile phone: used for terrorist activities, electricity: used for torture".

"Rather than learning about hacking,Dungeons & DragonsIt's more likely that you're using Discord for that. "

"What a shame, all of these tools are for legitimate uses. For example, virtual machines are a great way for children to learn about Linux (including Kali Linux) and prepare for the high-paid career in computer engineering. It's such a ridiculous ignorance and terrible point! "

"After Brexit, the UK seems to be looking for enemies above the EU. The UK / Tor & Linux & virtual machine UK / Infinity War will soon begin."

"If you are smart enough to use such software, you should be able to change the icon and hide the software."

"I watched several hours of" hacking tutorial "videos on YouTube, as if they were comprehended by someone who came to know what they were. Do some serious research or hire a consultant. Should be. "

Please note that at the end of the print, "If you have these software on your child's computer or if you feel your child is hacked, please contact us. We will help your child on the right path." Have been.

Copy the title and URL of this article

Source link

Do you like this article??

Show More

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button