All language subtitles for 019 Knoppix Puppy linux Jondo live Tiny core linux Window To Go-en

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:01,070 --> 00:00:06,060 Get to go through some of the live operating systems now the first one that you probably will be aware 2 00:00:06,060 --> 00:00:13,260 of is that you can get Windows to be a live CD and if you didn't know that well here's a link to show 3 00:00:13,260 --> 00:00:18,170 you how you can create one if you were to create one. 4 00:00:18,680 --> 00:00:22,900 Windows Live CDs are also available just to straight download. 5 00:00:22,910 --> 00:00:26,330 There's one version here the same ones put together. 6 00:00:26,390 --> 00:00:28,000 You download that. 7 00:00:28,200 --> 00:00:32,610 But that's not really for security it's for recovery when you have problems. 8 00:00:32,690 --> 00:00:41,070 This just shows you you know you can have windows as a Live CD as well as Windows to go which is an 9 00:00:41,070 --> 00:00:48,150 enterprise feature of Windows that enables the creation of a Windows to go workspace that can be booted 10 00:00:48,150 --> 00:00:56,140 from the U.S. B and it's not a specific security build though but you will find things like this. 11 00:00:56,220 --> 00:01:02,520 Eyeing key workspaces on a USP with encryption. 12 00:01:02,520 --> 00:01:08,850 Now I'm not tested this so can't recommend it but if you research it might be something that you might 13 00:01:08,850 --> 00:01:13,990 be interested in an encrypted Windows environment on a USP stick. 14 00:01:14,020 --> 00:01:15,800 You've been away from windows. 15 00:01:15,840 --> 00:01:19,770 Start with the minimal operating systems. 16 00:01:19,770 --> 00:01:23,430 We've got tiny core Linux which you can download here. 17 00:01:23,570 --> 00:01:24,810 It's distribution. 18 00:01:24,860 --> 00:01:27,250 Notable really for its minimalism. 19 00:01:27,250 --> 00:01:35,100 The core is only 10 meg as you can see and is useful if you want to minimize the possible attack surface 20 00:01:35,100 --> 00:01:38,850 of a hacker and it looks like this. 21 00:01:40,150 --> 00:01:45,130 As you can see it boots up and it'll boot up very very quickly. 22 00:01:45,300 --> 00:01:48,320 And there we are that's called Linux. 23 00:01:48,320 --> 00:01:53,680 There's not much to it. 24 00:01:53,730 --> 00:02:00,870 Poppy Linux is a lightweight Linux distribution that focuses on ease of use and minimal memory footprint 25 00:02:00,880 --> 00:02:01,000 . 26 00:02:01,000 --> 00:02:04,380 Entire system can run from RAM with current versions. 27 00:02:04,380 --> 00:02:10,200 Generally taking it to about 210 megabytes allowed the boot media to be removed after the operating 28 00:02:10,200 --> 00:02:11,420 system started. 29 00:02:11,430 --> 00:02:15,870 It isn't security focused though but it can be configured to be so. 30 00:02:16,030 --> 00:02:22,260 If you go to this page here and then download the latest release and find the one that you want to download 31 00:02:22,290 --> 00:02:23,160 Here's the link. 32 00:02:23,160 --> 00:02:29,190 It's a little bit confusing actually to find what it is that you want on here. 33 00:02:29,330 --> 00:02:34,180 And then you need to find the ISO image that relates to the one that you want to download. 34 00:02:34,170 --> 00:02:42,750 You've got there's no P-A and P-A the P.A. bill is for enabling full access to installed RAM and P-A 35 00:02:42,750 --> 00:02:45,530 enabled high memory machines. 36 00:02:45,720 --> 00:02:53,340 So basically that means that no one pays for all the PCs with at least 256 megabytes of RAM so that's 37 00:02:53,340 --> 00:02:54,060 popular. 38 00:02:54,060 --> 00:03:01,470 EXE Knoppix is one of the first Live Linux distributions that run directly from an external disk CD 39 00:03:01,470 --> 00:03:05,540 DVD USP stick or SD card etc.. 40 00:03:05,580 --> 00:03:10,170 And in fact the predecessor to Cali Linux used to room from Knoppix. 41 00:03:10,170 --> 00:03:15,150 The operating system is based on Debian which is excellent because it's good for security and it has 42 00:03:15,150 --> 00:03:15,960 features within it. 43 00:03:15,960 --> 00:03:20,000 They enable you to read and write Windows and other partitions. 44 00:03:20,040 --> 00:03:27,300 It is designed for beginners but offers reasonable security and anonymity against a basic level adversary 45 00:03:27,320 --> 00:03:27,640 . 46 00:03:27,870 --> 00:03:32,510 And this is Knoppix that you see here in front of you. 47 00:03:32,550 --> 00:03:38,300 This is the main Knoppix home page if you want to download just go here. 48 00:03:38,340 --> 00:03:39,690 Roll down. 49 00:03:39,690 --> 00:03:44,760 You need to choose between the CD version or the DVD version. 50 00:03:44,760 --> 00:03:53,040 DVD is the full version and then as with the others you just need to find the ISO image and download 51 00:03:53,040 --> 00:03:59,640 the ISO image burn it to a CD or DVD or put it onto a bootable USP and then you good to go. 52 00:03:59,850 --> 00:04:06,390 Look here on pen drive Linux dot com give you some more information for installing Knoppix to a USP 53 00:04:06,390 --> 00:04:08,870 flash drive and the fact this site is pretty good. 54 00:04:08,870 --> 00:04:17,250 Generally for us b flash drives out of the browser you are seeing here is actually called Ice weazel 55 00:04:17,370 --> 00:04:23,340 and ice weazel is included within Knoppix Plus some of security extensions 56 00:04:28,160 --> 00:04:31,990 which are these some of which I recommend in the section on browsers. 57 00:04:32,280 --> 00:04:35,280 Ice weaselled is a fork of Firefox. 58 00:04:35,280 --> 00:04:40,380 Effectively you can think of it as a rebranded Firefox but I'll talk more about the security of this 59 00:04:40,380 --> 00:04:44,150 browser and browsers generally in that section. 60 00:04:44,340 --> 00:04:48,610 I said easily accessible just by clicking on this here. 61 00:04:49,050 --> 00:04:55,790 You can also get to chromium which is also installed browser. 62 00:04:57,240 --> 00:05:04,410 If you want to install Knoppix to the flash disk for persistence you can use this here and that will 63 00:05:04,410 --> 00:05:05,350 enable you to do that 64 00:05:08,310 --> 00:05:12,480 Knoppix also comes with a number of security related applications. 65 00:05:12,480 --> 00:05:14,420 Virus scanner is here. 66 00:05:14,860 --> 00:05:24,340 Knoppix firewall can run S-sh server and you can also start the TOR proxy from here and access Tor anonymously 67 00:05:24,350 --> 00:05:24,920 . 68 00:05:27,030 --> 00:05:34,050 If you want to use toy you're going to need to enable it within the browser and that's done here by 69 00:05:34,050 --> 00:05:37,110 changing the proxy to the TOR proxy. 70 00:05:38,010 --> 00:05:41,490 And then you can see whether or not you're going via the 71 00:05:44,010 --> 00:05:52,260 network and you can see here where an anonymous proxy exit node or we are going to talk a lot more about 72 00:05:52,260 --> 00:05:58,950 Tor in the section on tour and you can also see here the little onion access the settings for all cheat 73 00:05:58,950 --> 00:06:02,890 codes are also useful when Knoppix boots up. 74 00:06:02,970 --> 00:06:06,110 It gives you the option to enter in these cheat codes. 75 00:06:06,330 --> 00:06:12,110 And this enables you to make certain settings before actually boots up and that's useful if you're going 76 00:06:12,120 --> 00:06:17,730 to have a non-persistent Knoppix and you want to make some changes before it boots up fully. 77 00:06:17,840 --> 00:06:24,240 If you want to access the network settings you go here right click you can edit your connections you 78 00:06:24,240 --> 00:06:27,260 can look at the information about the connection. 79 00:06:27,420 --> 00:06:28,140 Right. 80 00:06:28,490 --> 00:06:37,970 And the like on here and it can change whether or not it's CACP or manual. 81 00:06:38,190 --> 00:06:46,470 And change of DNS servers all the usual things we can disable IP V-6 etc.. 82 00:06:46,980 --> 00:06:51,930 Also from here you can configure VPN connections 83 00:06:58,860 --> 00:07:02,700 open VPN. 84 00:07:03,150 --> 00:07:08,220 And then go through and create all the normal settings that you have to create going to talk more about 85 00:07:08,220 --> 00:07:10,370 that in the section on VPN. 86 00:07:10,680 --> 00:07:12,640 So that's Knoppix. 87 00:07:12,690 --> 00:07:18,420 Next is John Dunham also referred to Tor secure live DVD. 88 00:07:18,420 --> 00:07:23,430 It offers a secure pre-configured environment for anonymous surfing. 89 00:07:23,490 --> 00:07:29,970 It's produced by the organization behind the anonymising service John Dhanam which is different from 90 00:07:29,970 --> 00:07:37,200 peer to peer based anonymity networks like Tor and ITP whose anonymity proxies are anonymous. 91 00:07:37,200 --> 00:07:38,850 John Donne and proxies are not. 92 00:07:39,030 --> 00:07:47,490 But more on this in their section this Live-CD is based on Debian GNU Linux which you're familiar with 93 00:07:47,580 --> 00:07:49,090 and is a good choice. 94 00:07:49,110 --> 00:07:55,770 The live system contains proxy clients for the anonymising So is John Donum. 95 00:07:55,800 --> 00:08:00,200 Tor and mixmaster remailer Jondo Fox comes with it. 96 00:08:00,240 --> 00:08:07,680 Which is a preconfigured Firefox browser for anonymous web surfing and the Tor browser as well is installed 97 00:08:07,680 --> 00:08:08,180 . 98 00:08:08,220 --> 00:08:15,390 You also have Thunderbird for email Pidgen for anonymous instant messaging and chats Matha clean documents 99 00:08:15,420 --> 00:08:18,160 Tor chats etc.. 100 00:08:18,780 --> 00:08:23,690 It works better in virtual box if you're going to use virtualization to access it. 101 00:08:23,850 --> 00:08:26,020 And from what I've seen of it it looks great. 102 00:08:26,030 --> 00:08:30,100 And from what I've tested of it and it's the equivalent of tails. 103 00:08:30,180 --> 00:08:37,650 But I haven't seen any orders for it so it is not scrutinized by the community as perhaps tails is and 104 00:08:37,650 --> 00:08:44,980 probably given it's still embetter that it's that 0.9 shouldn't necessarily be fully relied on. 105 00:08:45,150 --> 00:08:52,260 I would say offers reasonable security and an unlimited options against a basic adversary not suitable 106 00:08:52,350 --> 00:08:54,730 on its own against the nation state. 107 00:08:54,840 --> 00:09:01,410 And as you can see he can just simply download it here and if you don't care got instructions on how 108 00:09:01,410 --> 00:09:09,510 to create a bootable CD ROM DVD or USP stick for Windows and also there's instructions here for how 109 00:09:09,510 --> 00:09:12,380 to do it with Linux and you'll see. 110 00:09:12,390 --> 00:09:18,810 So it's using pen drive Linux dot com and this is what it looks like. 111 00:09:18,810 --> 00:09:24,450 This is what you'll be prompted with when you first boot the operating system gives you three choices 112 00:09:24,450 --> 00:09:31,840 between simple firewall restricted firewall for tall or restricted firewall for John do only. 113 00:09:31,880 --> 00:09:36,400 So the simple file as it says here all connection from outside are blocked. 114 00:09:36,420 --> 00:09:40,720 All local programs can connect to Internet servers. 115 00:09:40,860 --> 00:09:43,350 You can use all anonymizing services. 116 00:09:43,380 --> 00:09:48,750 So essentially if you select this you can begin to be able to use toy going to be able to use John Doe 117 00:09:49,050 --> 00:09:52,840 and you can also be able to just re access the internet. 118 00:09:52,950 --> 00:09:55,670 If you select this one you're going to be able to access Tor. 119 00:09:55,860 --> 00:10:02,130 And it's also going to block all the programs from accessing the internet unless they go via that or 120 00:10:02,130 --> 00:10:03,350 network. 121 00:10:03,450 --> 00:10:09,600 And this one's exactly the same but it only allows other programs to access the Internet via the John 122 00:10:09,600 --> 00:10:11,540 Doe anonymizing network. 123 00:10:11,610 --> 00:10:18,350 And if you like this one or this one it'll switch on the service so switch on tour. 124 00:10:19,170 --> 00:10:24,810 You can enter administrator password here if you want to run administrative commands. 125 00:10:26,040 --> 00:10:30,400 The network connection is disabled by default so you need to enable it. 126 00:10:30,840 --> 00:10:33,470 It's good that it's disabled by default. 127 00:10:33,820 --> 00:10:43,320 You go down here left click then click auto ethernet connection will be established. 128 00:10:43,320 --> 00:10:56,340 Go here to open the Tor browser and carry on the toll network check for all browser updates. 129 00:10:56,440 --> 00:11:02,840 Isn't that the latest version of the applications here. 130 00:11:03,200 --> 00:11:07,640 Could access the Jondo Firefox browser here. 131 00:11:08,850 --> 00:11:17,970 This is configured with a number of security extensions and plugins which you can see here all of which 132 00:11:17,970 --> 00:11:24,650 I recommend you can access your VPN configuration here. 133 00:11:25,980 --> 00:11:38,590 And so I type open VPN create and when all the details you can edit your network here. 134 00:11:39,040 --> 00:11:48,120 Here while we're at it change your IP for maybe disable IP V-6 135 00:11:51,210 --> 00:11:55,200 change to manual if you require etc.. 136 00:11:55,260 --> 00:11:57,700 DNS servers change. 137 00:11:57,940 --> 00:12:05,110 Is a very script here for full description and just the last alert we have here. 138 00:12:05,170 --> 00:12:09,940 Skype wireshark Bitcoin wallet. 139 00:12:09,940 --> 00:12:10,890 So that's John Doe 14887

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.