Computer IT

Sunday, 7 April 2013

Linux Distribution

The following distributions are available for free (without cost):
  • aLinux
  • Alpine Linux
  • ALT Linux
  • Annvix
  • Arch Linux
  • Asianux
  • BackTrack
  • BLAG Linux and GNU
  • Bodhi Linux
  • Caixa Mágica
  • CentOS
  • Chakra
  • CRUX
  • Damn Small Linux
  • Debian
  • DeLi Linux
  • Devil-Linux
  • dyne:bolic
  • EasyPeasy
  • Edubuntu
  • Elive
  • EnGarde Secure Linux
  • Fedora
  • Finnix
  • Foresight Linux
  • Freespire
  • Frugalware
  • Gentoo
  • gNewSense
  • gnuLinEx
  • GoboLinux
  • Gobuntu
  • Impi Linux
  • Instant WebKiosk
  • Kali Linux
  • Kanotix
  • Knoppix
  • KnoppMyth
  • Kubuntu
  • Kurumin
  • Linux Mint
  • Lunar Linux
  • Mageia
  • Micro Core Linux
  • MintPPC
  • Musix GNU/Linux
  • Network Security Toolkit
  • NimbleX
  • NUbuntu
  • openSUSE
  • Pardus
  • Parsix
  • PCLinuxOS
  • Platypux
  • Porteus
  • Puppy Linux
  • Oracle Linux
  • Sabayon Linux
  • Scientific Linux
  • sidux
  • Salix OS
  • Slackware
  • Slax
  • SliTaz GNU/Linux
  • Source Mage GNU/Linux
  • Symphony OS
  • SYS
  • Tails
  • Tiny Core Linux
  • Tor-ramdisk
  • Trustix
  • Ubuntu
  • Ututo
  • Super OS
  • Xubuntu
  • XBMC Live
  • Yoper
  • Zenwalk
  • OpenWrt
Posted by Unknown at 06:41
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ▼  2013 (33)
    • ▼  April (33)
      • Mobiles operating systems
      • System software and Application software
      • Software engineering IT
      • Movie On hacking
      • Laptop Addiction
      • Apple iphone IOS Based on LinUX
      • CLI mode and World With IT
      • Mobile hacking
      • Linux Distribution
      • Mobile Security
      • Linux Best OS for SYSTEM ADministration
      • Social Engineering Certification
      • Vulnerability
      • Best Social Engineers
      • Social engineering (hacking)
      • Programming Requirements
      • Kevin Mitnick Social Engineer
      • Vulnerability Eavesdropping Exploits Trojans...
      • Vulnerability Computing
      • Hacking Attacks
      • Types of hackers
      • Internet protocol suite
      • Wireless Network Wan
      • Creation of cryptoviruses
      • Cryptovirology
      • Examples of viruses with cryptography and ransom c...
      • Game semantics
      • Artificial intelligence
      • Human computer interaction
      • Cryptography engineering
      • TOp programming languages To study
      • Programming languages popularity
      • System administration

About Me

Unknown
View my complete profile
Awesome Inc. theme. Theme images by Bim. Powered by Blogger.