Compliance

  • Page 0 – Home: Hero section with Kali Linux logo, and a visual introduction to the Kali Team.
  • Page 1 – Introduction: Includes Kali logo, student name (Yuri Bertozzi), student ID (G00439350@atu.ie), and a short overview.
  • Page 2 – History of Kali Linux: Timeline and images showing evolution from BackTrack to modern Kali Linux.
  • Page 3 – Unique Features: Details on network defaults, kernel patches, repository signing, multilingual support, ARM and virtualization compatibility.
  • Page 4 – Market Statistics: Graphs and tables about cybersecurity market growth and Kali’s role.
  • Page 5 – Pros & Cons: Clear evaluation of Kali Linux with 8 key strengths and 4 realistic limitations.
  • Page 6 – Compliance: This page is dedicated to demonstrating that all the requirements outlined in the assignment have been fully satisfied, with clear references to where each criterion is addressed throughout the website.
  • Page 7 – Conclusion: Final analysis and closing thoughts (no inline references).
  • Page 8 – References: Full Harvard-style bibliographic entries.
  • Page 9 – Anecdotes / User Experiences: Hands-on reviews from professionals and learners showing how Kali Linux improves security testing, workflow efficiency, and cybersecurity skills development.
  • Page 10 – Competitor Comparison: Practical differentiation between Kali Linux and alternatives like Parrot OS, BlackArch, and Ubuntu — focusing on toolkit scope, stability, learning path, and deployment roles.
  • Page 11 – Public Perception: How Kali Linux is viewed by security experts, learners, and mainstream media — addressing trust, ethics, and misconceptions about lawful penetration testing.

Kali Linux Logo

  • The site uses the Astra WordPress theme that matches Kali Linux branding: dark backgrounds, blue accents, and sans-serif fonts similar to the official logo.
  • The layout is clean, with clear spacing, boxes, and well-defined sections.
Kali Linux Desktop
  • Images, screenshots, diagrams, and original videos are used throughout the site to illustrate key concepts and maintain engagement.
  • The Introduction, History, and Unique Features pages include original videos demonstrating system usage and historical footage.
  • Interactive components such as charts and statistical graphs are present in the Market Statistics page, while the Pros & Cons page features comparative tables and visual cards for enhanced readability.
  • Visual navigation elements include icons, card layouts, and a JavaScript carousel showcasing installed applications.
BlockUsed

The website uses more than five plugins to improve performance, usability, analytics, and media handling:

PluginPurpose
ElementorPage building & design
TablePressStructured tables (used in History page)
GraphinaGraphs & charts (Market Statistics page)
Image OptimizerPerformance improvement
Connect MatomoVisitor tracking & data privacy
SuperBlankTemplate enhancement for speed/structure
Complianz | GDPR/CCPA Cookie ConsentComplianz Privacy Suite for GDPR, CaCPA, DSVGO, AVG with a conditional cookie warning and customized cookie policy

Plugins

The site includes multiple block elements across pages:
  • Headings
  • Image galleries
  • Text editors
  • Video embeds
  • Buttons
  • HTML code blocks (used for carousel, flip cards and reviews)
  • Accordion (History and Conclusion pages usability enhancement)
  • Alerts and Quotes elements used for emphasis
  • Icons (used in Unique Features)
BlockUsed

Matomo Analytics Integration

Below are screenshots from the Matomo analytics dashboard, showing how website activity is tracked. The images display page view statistics and traffic trends for the Kali Linux site, confirming that analytics have been correctly configured and are actively monitoring user interactions. Privacy features such as IP anonymization and role-based exclusions are enabled to ensure compliance with data protection standards.
To expand user engagement and provide deeper context beyond the required pages, three additional sections were developed:
Anecdotes
A dedicated page collecting real reviews from cybersecurity professionals, offering authentic feedback on the strengths and weaknesses of Kali Linux in practical environments.
Competitor Comparisons
A structured comparison between Kali Linux and similar cybersecurity-oriented systems, highlighting differences in:
  • target users
  • preinstalled tools
  • usability
  • licensing
  • learning curve
This helps readers evaluate alternatives based on their needs.
Public Perception
This page explores how Kali Linux is viewed by the broader cybersecurity community and general public. To enhance the experience, CSS-powered flip cards are used, allowing users to interactively view positive and critical opinions.
Research Challenges
Some sources only provided partial access to user reviews, requiring additional effort in browsing and retrieving information from multiple perspectives to ensure the Anecdotes section remained well-supported and diverse. Extra

Website Walkthrough Video

Below you will find a screencast that demonstrates the main features and structure of this WordPress site. In the video, I navigate through each page, explain how the requirements have been met, showcase the use of plugins and widgets, and highlight the design choices made to match Kali Linux branding. This walkthrough provides a clear overview of the site’s functionality, compliance, and user experience.