BackTrack is considered by everyday computer users and IT security experts alike to be one of the premiere Linux live distributions ever made. It's mostly concentrated on penetration testing, and is viewed by many in the industry as one of the most useful pen test tools presently available. There's no need to install BackTrack into your PC in order to make it work; like any self-respecting diagnostic application, you can startup the analysis platform directly from the disk it's contained in, and it's fully accessible to you within mere minutes to boot.
The BackTrack tool had been developed by integrating two other separate yet popular Linux distributions—the Auditor Security Collection and Whax—together to form one of the most useful pen testing programs to date.By joining the very best of Whax's and the Auditor Security Collection's respective capabilities and replacing these products with a superior application, BackTrack has acquired an enormous amount of popularity, which culminated with it being awarded the Number One Live Security Distribution in 2006 by the Insecure.org website.
Without a doubt, BackTrack is assuredly the security expert's toolset of choice. Both cyber security professionals and regular IT security administrators the world over can depend on BackTrack's comprehensive features when it comes to testing your system for bugs, vulnerabilities, security holes, and so on that many a cyber criminal would readily take advantage of if given the chance. In any event, this protective software has a long and involved history beyond the fact that it has the Auditor Security Collection and Whax as its "parents" of sorts.
To be more precise, BackTrack was based on many other Linux distributions aside from the two already cited, such as the Live-CD scripts made by Tomas M. as well as the Slackware product. Every last script, kernel configuration, and package has been designed, modified, and perfected for optimum use by the industry's best penetration testers. At present, BackTrack includes more than three hundred varying tools that are reasonably built in accordance to the workflow requirements of all security professionals.