# Chapter 10

![](/files/Hh5rt1fYCZDAV8vqrcgE)

### Chapter 10 <a href="#toc171120108" id="toc171120108"></a>

### Defensive modes

In this mod&#x65;**;** which is related to penetration testing and legitimate hackin&#x67;**,** the distribution has 1200 pr&#x65;**-**&#x69;nstalled and configured tool&#x73;**,** which are grouped into 40 categorie&#x73;**.** The layouts are such that simple users can easily access the related tool&#x73;**.** In the offensive mod&#x65;**,** there are also categories for security students or researcher&#x73;**,** including creating test labs and testing malware file&#x73;**,** as well as data mining and data analysis tool&#x73;**.**

![](/files/WyHW35xPbMO7DWGeTIcM)

### Anonymous modes <a href="#toc171120109" id="toc171120109"></a>

![](/files/MOpQQ7XLdre4awmFgxNw)

### Anonymous <a href="#toc171120110" id="toc171120110"></a>

Anonymized defensive mode that focuses on the anonymity of the use&#x72;**.** Many settings have been made on the kernel and vulnerable program&#x73;**.**

In the privacy protection mod&#x65;**,** the focus is on maintaining privacy and protecting user&#x73;**’** data and the environmen&#x74;**.** There are also various tools and useful basic settings for thi&#x73;**.**

In order to secure the system and the use&#x72;**’**&#x73; activitie&#x73;**,** the secure defense mode uses various and useful monitoring and protection programs and is installed on the distributio&#x6E;**.**

Hardened mode has many settings at the user and kernel levels that protect the distribution against various attack&#x73;**.**

Howeve&#x72;**,** the distribution does not work only in the attack mod&#x65;**,** and has an attack mode as wel&#x6C;**.** Therefor&#x65;**,** many settings related to the defense modes have been avoided in order to avoid problems and interferences and have been left to the use&#x72;**.**

### Privacy Mode <a href="#toc171120111" id="toc171120111"></a>

![](/files/wRqtH3r1irUrA1KDerGm)

### Security Mode <a href="#toc171120112" id="toc171120112"></a>

![](/files/lOfQDC9FIFxTuClhEjjt)

### Emergency Mode <a href="#toc171120113" id="toc171120113"></a>

![](/files/GlkpIKntbPaxcL5xvg83)

### Monitoring Mode <a href="#toc171120114" id="toc171120114"></a>

![](/files/jS1jbGvebeDIoAxJLn25)

### Settings Mode <a href="#toc171120115" id="toc171120115"></a>

![](/files/TfOdCXphbmnfQVSEjC75)

### Dashboard <a href="#toc171120116" id="toc171120116"></a>

![](/files/4zHwa0c1QSvoZlj7btRE)

![](/files/2p31GvfvNlg3P5se1Y2a)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://predator-os.gitbook.io/predator-os-beginner-guide-book/chapter-10.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
