All language subtitles for 018 Introduction to live operating systems-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,610 --> 00:00:10,720 A live operating system can be booted from an external disk CD DVD USP stick or SD card to boot the 2 00:00:10,720 --> 00:00:12,200 live operating system. 3 00:00:12,210 --> 00:00:19,590 A person would connect or plug the stick or disk into the machine confirm within the BIOS that the machine 4 00:00:19,590 --> 00:00:27,180 will boot the operating system on the device first before the internal hard drive then power on the 5 00:00:27,180 --> 00:00:34,800 machine the operating system on the USPO stick with them rebooted instead of the operating system on 6 00:00:34,800 --> 00:00:36,370 the internal hard drive. 7 00:00:36,510 --> 00:00:41,730 And these live operating systems are also referred to by the media they're on so they can be called 8 00:00:42,240 --> 00:00:50,820 Live CD or a live DVD or live USP etc. they enable you to run an operating system from this external 9 00:00:50,820 --> 00:00:58,770 device without permanently installing it on the internal hard drive live operating systems can also 10 00:00:58,770 --> 00:01:01,300 be booted in virtual machines too. 11 00:01:01,470 --> 00:01:06,040 Which is great for testing and virtual security isolation. 12 00:01:06,300 --> 00:01:08,400 And this is a big advantage for security. 13 00:01:08,400 --> 00:01:15,030 And while you might want to use one if you boot an entirely separate operating system this lets you 14 00:01:15,030 --> 00:01:22,290 create a separate security domain to enable security and privacy through isolation from your standard 15 00:01:22,290 --> 00:01:24,460 security domain or environment. 16 00:01:24,810 --> 00:01:31,680 They can also enable anonymity if the live operating system supports anonymizing services. 17 00:01:31,920 --> 00:01:39,040 For example you might want to do a live USP on your laptop to access Tor live operating. 18 00:01:39,060 --> 00:01:49,890 I think that useful for security and or with looking at our tails Knoppix Popey Linux Jondo Tor secure 19 00:01:49,900 --> 00:01:54,190 live DVD and tiny colonics Linux. 20 00:01:54,270 --> 00:01:58,590 Most of these live operating systems kohm as ISO files. 21 00:01:58,770 --> 00:02:09,380 You need to then burn this to a disk CD DVD or create a bootable USP or SD card from the iso image. 22 00:02:09,390 --> 00:02:17,040 So if you look here here's an example of the ISO image for tails you would download that and use the 23 00:02:17,040 --> 00:02:20,790 ISO image if you want to burn that image onto a disk. 24 00:02:20,800 --> 00:02:31,650 It's very very simple in windows all you need to do is find the image right click on it and the disk 25 00:02:31,650 --> 00:02:34,440 image and select where you want to burn it to. 26 00:02:34,470 --> 00:02:42,120 Obviously you need a CD or DVD drive that will do the writing click burn and then you'll have a CD or 27 00:02:42,120 --> 00:02:51,050 DVD with which you can boot from if you want to create a bootable us B or SD card with the ISO you're 28 00:02:51,060 --> 00:02:54,770 going to need to use some piece of software to do that. 29 00:02:54,870 --> 00:03:00,570 Now while I would recommend is rufous And if you follow the instructions on here this will walk you 30 00:03:00,570 --> 00:03:02,490 through how to do it. 31 00:03:02,550 --> 00:03:09,660 Basically you download the software and you select the ISO image put in the USP stick and it does it 32 00:03:09,870 --> 00:03:11,420 for you. 33 00:03:11,430 --> 00:03:17,000 Another one that is useful is this one here Pen Drive Linux dot com. 34 00:03:17,040 --> 00:03:19,020 This does pretty much the same thing. 35 00:03:19,230 --> 00:03:26,640 And this will also walk you through it and if using other operating systems that tails website has some 36 00:03:26,730 --> 00:03:34,950 instructions here on how to create bootable USPS and SD cards and some of the live operating systems 37 00:03:35,220 --> 00:03:44,400 such as Knoppix and have functionality within them to allow you to run them from USP or SD cards you 38 00:03:44,400 --> 00:03:46,230 don't need to go through this process. 39 00:03:46,410 --> 00:03:49,330 But of course you do need to run the operating system. 40 00:03:49,410 --> 00:03:54,700 So with tails is an example you would burn it onto a CD or DVD. 41 00:03:54,720 --> 00:04:00,300 Start the operating system using that and then within the operating system it has some options for you 42 00:04:00,300 --> 00:04:04,870 to then put the operating system on a USP or SD card. 43 00:04:04,890 --> 00:04:12,540 Once you have a bootable CD USP stick or SD card you need to boot from that in order to do that in the 44 00:04:12,540 --> 00:04:14,530 right setting in the BIOS. 45 00:04:14,580 --> 00:04:20,400 If you're not sure how to do that then this page here might help you out what you need to find is a 46 00:04:20,400 --> 00:04:21,710 function key. 47 00:04:21,770 --> 00:04:24,710 You need to press when your machine starts. 48 00:04:24,780 --> 00:04:30,330 In order for you to get into the BIOS if you look on this page here you might find your machine's function 49 00:04:30,330 --> 00:04:32,980 key nodes get into the BIOS. 50 00:04:33,180 --> 00:04:34,890 And here's an example of the BIOS. 51 00:04:34,890 --> 00:04:37,970 For me it was EF 2 to get into the BIOS. 52 00:04:38,040 --> 00:04:44,150 You need to search through here to find something like boot and the Phoenix bias is quite a common bias 53 00:04:44,150 --> 00:04:44,190 . 54 00:04:44,190 --> 00:04:49,020 You might even have the same one and you can see they've got removeable devices you'll have some sort 55 00:04:49,020 --> 00:04:55,590 of equivalent and you need to move that to the top or to have that as a higher priority is your internal 56 00:04:55,590 --> 00:04:58,070 drive which is hard drive here. 57 00:04:58,230 --> 00:05:01,850 Or if you booting from the CD ROM you need to have that moved up further. 58 00:05:01,860 --> 00:05:07,980 If you want to boot them from a virtual machine you just have to select the ISO as a disk in the virtual 59 00:05:07,980 --> 00:05:09,350 CD drive. 60 00:05:09,350 --> 00:05:11,040 Now show you how you might do that. 61 00:05:12,500 --> 00:05:17,750 You will need to create a template for the live operating system here. 62 00:05:17,880 --> 00:05:20,680 So mine is going to be tails. 63 00:05:20,830 --> 00:05:29,900 So I know that tails is Linux Debian next next and you can just select defaults here but if you want 64 00:05:29,900 --> 00:05:36,680 it to be a non-persistent then you want do not add virtual disk and if you want the option of it being 65 00:05:36,680 --> 00:05:40,780 persistent then you want to create a virtual hard drive. 66 00:05:40,790 --> 00:05:46,920 I'll talk about the difference between persistent and non-persistent in a second. 67 00:05:46,980 --> 00:05:50,770 So then we have a template for tails settings 68 00:05:52,820 --> 00:05:57,760 storage select the drive that you want to mount it from. 69 00:05:57,750 --> 00:06:01,150 So CD drive and select. 70 00:06:01,160 --> 00:06:04,940 So you're going to go and choose where the disk is. 71 00:06:04,940 --> 00:06:11,800 There's more details disk open and you can select here that it's a live CD. 72 00:06:11,810 --> 00:06:17,810 When that's checked virtual disk will not be removed when the guest system rejects it. 73 00:06:18,000 --> 00:06:19,130 Rick here. 74 00:06:19,120 --> 00:06:20,160 OK. 75 00:06:20,460 --> 00:06:27,280 And then when I start that tails will start just as if you've booted it from your regular machine. 76 00:06:27,320 --> 00:06:34,370 So as I mentioned live operating systems can be persistent non-persistent each having advantages and 77 00:06:34,370 --> 00:06:36,060 disadvantages. 78 00:06:36,110 --> 00:06:42,840 Persistence means that you can make changes within the operating system download files onto the stick 79 00:06:42,840 --> 00:06:43,050 . 80 00:06:43,190 --> 00:06:48,830 And these changes would persist the next time you boot the operating system they will be saved. 81 00:06:48,830 --> 00:06:55,070 The disadvantage of persistence is an attacker with physical access to your device or through an exploit 82 00:06:55,310 --> 00:07:01,550 could take control of the operating system and that would persist to the live operating systems designed 83 00:07:01,550 --> 00:07:09,530 for security like tails being configured with security in mind which is good but with persistence someone 84 00:07:09,530 --> 00:07:14,780 who doesn't know what they're doing can make changes to configuration and make it less secure. 85 00:07:14,790 --> 00:07:19,500 With persistence you must also keep the software up to date with security patches. 86 00:07:19,700 --> 00:07:21,980 So you'll need to check for patches. 87 00:07:21,980 --> 00:07:23,870 If you don't use it very often. 88 00:07:23,870 --> 00:07:31,000 On the positive side persist in operating systems can often be upgraded without having to download the 89 00:07:31,000 --> 00:07:34,460 full ISO again which is really useful. 90 00:07:34,750 --> 00:07:37,910 And you have Gnome persistence which is really the opposite. 91 00:07:37,910 --> 00:07:39,620 So no changes are saved. 92 00:07:39,620 --> 00:07:47,990 Everything is lost when you shut down a DVD for example would by its nature be Read-Only so be non-persistent 93 00:07:48,000 --> 00:07:48,090 . 94 00:07:48,200 --> 00:07:55,490 If the OS allows for it all media forms can be non-persistent so you can make a non-persistent us be 95 00:07:55,710 --> 00:07:59,060 all live us be in live SD card. 96 00:07:59,060 --> 00:08:05,730 The advantage of non-persistent is being that no evidence will be retained after the OS is shut down 97 00:08:05,990 --> 00:08:12,010 and any hacker who has compromised the machine cannot persist as everything is lost. 98 00:08:12,110 --> 00:08:14,190 Which is a key security control. 99 00:08:14,360 --> 00:08:20,120 If you want to force it on persistence you can do this at the hardware level as well by buying one of 100 00:08:20,120 --> 00:08:24,850 those right lock USP sticks and SD cards. 101 00:08:24,850 --> 00:08:30,380 I probably might run into though is if you have an older machine that you're wanting to use so you're 102 00:08:30,380 --> 00:08:33,490 wanting to use an on machine as a secure laptop. 103 00:08:33,530 --> 00:08:39,920 You may not be able to start from USP or SD card as it's not always support on these older machines 104 00:08:39,940 --> 00:08:40,220 . 105 00:08:40,220 --> 00:08:43,380 You might have compatibility issues with the old hardware. 106 00:08:43,490 --> 00:08:51,130 On the positive side USP sticks and SD cards are small transportable and give you a physical security 107 00:08:51,130 --> 00:08:55,110 domain so you can easily hide and store them securely. 108 00:08:55,260 --> 00:09:00,360 But on the other hand they can be easily lost which means encryption is required. 109 00:09:00,500 --> 00:09:05,320 If you're going to be transporting them around and if anything private is stored on them while operating 110 00:09:05,330 --> 00:09:12,380 systems can be used as virtual houses were shown to create separate security domains through virtual 111 00:09:12,380 --> 00:09:20,300 isolation for example using tails as a guest so as to access Tor like we said or using Knoppix to surf 112 00:09:20,300 --> 00:09:28,430 the web providing increased security through Nahm persistence in the section on isolation and compartmentalisation 113 00:09:28,420 --> 00:09:35,600 we'll go further into more detail on what is best for security privacy and anonymity in relation to 114 00:09:35,600 --> 00:09:39,040 virtualization and live operating systems. 115 00:09:39,050 --> 00:09:44,930 If you're wondering about what sort of USP stick to use and if you don't have on this is actually one 116 00:09:44,920 --> 00:09:49,070 that I have and I do recommend is very very tiny. 117 00:09:49,120 --> 00:09:52,500 You see here you can see just how tiny it is. 118 00:09:52,820 --> 00:09:57,150 You want to use B-3 search pretty fast and definitely recommend this. 119 00:09:57,150 --> 00:10:00,900 It runs hot but I have a couple of them and they do work well. 120 00:10:00,910 --> 00:10:04,290 SD card wise this one has worked just fine for me. 121 00:10:04,310 --> 00:10:10,910 The security are interpreted live Wes's will offer software encryption but you could look to get an 122 00:10:10,900 --> 00:10:13,830 extra layer of encryption at the hardware layer. 123 00:10:13,860 --> 00:10:21,080 Now when it comes to USPS the offer encryption what you'll usually find is that the encryption is provided 124 00:10:21,080 --> 00:10:25,490 by software so they are restricted as to what can be on there. 125 00:10:25,520 --> 00:10:32,660 Say you you little you put the USPS in and then something on there will run in say Windows to decrypt 126 00:10:32,720 --> 00:10:37,320 that USP so that's no good for you with a live operating system. 127 00:10:37,490 --> 00:10:48,290 But you do have some hardware based encryption USPO devices one is here and you can see that you literally 128 00:10:48,350 --> 00:10:51,510 tie pin the pin code to decrypt it. 129 00:10:51,740 --> 00:10:53,120 I haven't tried this. 130 00:10:53,120 --> 00:10:58,670 All I know is that this is available and it's saying the right things such as a Fips standard and a 131 00:10:58,660 --> 00:11:04,390 yes to 5:6 with X TS but obviously that could be implementation failures. 132 00:11:04,390 --> 00:11:10,100 Personally if it really mattered to me and the consequences were high I'd have this poster have an extra 133 00:11:10,100 --> 00:11:15,980 layer of encryption on the device and have some sort of encryption that enabled plausible deniability 134 00:11:16,040 --> 00:11:17,260 but that's just me. 135 00:11:17,270 --> 00:11:22,030 No other option is here and this one is by metrics. 136 00:11:22,100 --> 00:11:25,110 It encrypts and decrypts by a fingerprint. 137 00:11:25,180 --> 00:11:31,500 I believe in the US when the key disclosure laws you do have to provide biometrics but just bear that 138 00:11:31,520 --> 00:11:32,270 in mind. 139 00:11:32,370 --> 00:11:35,890 I'll talk more about key disclosure laws later on 15485

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.