The topic that the software list distributed by government officials is `` software list to watch if you are in a child's PC '' is too high level



The ' software list to watch out for on a child's PC ' distributed by British government officials to parents with children has become a hot topic on the Internet because it is too high.

The topic of interest is the following image tweeted by Twitter user

@G_IW .



This is a print from a school distributed by the Walsall Council , a municipality located in Walsall, West Midlands, England. At the bottom of the print are the 'ROCU' and 'NCA' logos. The NCA is the UK's National Crime Agency , and the ROCU is West Midlands ROCU , an organization organized by local police forces, such as Staffordshire, West Midlands, West Marcia and Warwickshire, to fight organized crime throughout the region. In other words, the print was made by a British government agency and distributed via local government to schools where children go.

The title of the print is 'Which is in the child's computer?' For Tor Browser , a web browser that enables anonymous communication, `` Browser used for browsing the dark web '', for virtual machine `` Hide OS such as Kali Linux in a place that is not normally found What can I do ?, Kali Linux for `` OS used for hacking '', Wi-Fi Pineapple for `` a toolkit that can collect confidential computer information via the Internet '', and Gamer's chat system Discord for `` 'A communication platform that is often used to share hacking tips,' and Metasploit as 'a penetration tool that makes hacking simpler.'



@G_IW, who uploaded a photo of this print on Twitter, states, “This complete junk was distributed to schools through the local government's Walsall Council. Too astounding: I'm proud that if I had one of these software on my child's PC, the child would have learned how to use it, except for Discord, because Discord Is software that has nothing to do with hacking. '

_G_IW's tweet has been retweeted about 3000 times and has collected over 8000 likes, but even more interesting comments are gathered in the reply section.

Kali Linux's official Twitter account states, 'I need to admit that it's great to provide a roadmap to show children where to start. The easiest way to get kids to do something is Tell them you can't or shouldn't, and then post a list of things you shouldn't do.The problem is that they didn't list the Kali Linux online manual . ' He pointed out that the prints issued by NCA and ROCU, on the contrary, make children closer to hacking.



The Twitter account GC_and_Tech says, 'I want to meet the 'Genius' who made this print. This print was created for something like 'Heavy Metal Creates Devil Followers' or 'Video Games Create Murder Devil' You must have thoughts, don't let ignorance deal with genres they don't understand! '



'Too ignorant. The skills in working with these software can help build a great career in information security. If I find these softwares on my child's computer, they will help my child It's even better for parents than to find out where their children are using illegal drugs. Learning about information security is great! '



TheDarkTrancer expressed in other examples how out of print the content was: 'gasoline: used for arson, mobile phone: used for terrorist activities, electricity: used for torture'.



'It's more likely you're using Discord for Dungeons and Dragons than to learn about hacking,' he said.



'What a shame, all of these tools are for legitimate uses. For example, virtual machines are a great way for children to learn about Linux (including Kali Linux) and prepare for the high-paid career in computer engineering. It's such a ridiculous ignorance and terrible point! '



'After Brexit, the UK seems to be looking for enemies above the EU. The UK / Tor & Linux & virtual machine UK / Infinity War will soon begin.'



'If you are smart enough to use such software, you should be able to change the icon and hide the software.'



'I watched several hours of' hacking tutorial 'videos on YouTube, as if they were comprehended by someone who came to know what they were. Do some serious research or hire a consultant. Should be. '



Please note that at the end of the print, 'If you have these software on your child's computer or if you feel your child is hacked, please contact us. We will help your child on the right path.' Have been.

in Security, Posted by logu_ii