Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,070 --> 00:00:06,060
Get to go through some of the live operating systems now the first one that you probably will be aware
2
00:00:06,060 --> 00:00:13,260
of is that you can get Windows to be a live CD and if you didn't know that well here's a link to show
3
00:00:13,260 --> 00:00:18,170
you how you can create one if you were to create one.
4
00:00:18,680 --> 00:00:22,900
Windows Live CDs are also available just to straight download.
5
00:00:22,910 --> 00:00:26,330
There's one version here the same ones put together.
6
00:00:26,390 --> 00:00:28,000
You download that.
7
00:00:28,200 --> 00:00:32,610
But that's not really for security it's for recovery when you have problems.
8
00:00:32,690 --> 00:00:41,070
This just shows you you know you can have windows as a Live CD as well as Windows to go which is an
9
00:00:41,070 --> 00:00:48,150
enterprise feature of Windows that enables the creation of a Windows to go workspace that can be booted
10
00:00:48,150 --> 00:00:56,140
from the U.S. B and it's not a specific security build though but you will find things like this.
11
00:00:56,220 --> 00:01:02,520
Eyeing key workspaces on a USP with encryption.
12
00:01:02,520 --> 00:01:08,850
Now I'm not tested this so can't recommend it but if you research it might be something that you might
13
00:01:08,850 --> 00:01:13,990
be interested in an encrypted Windows environment on a USP stick.
14
00:01:14,020 --> 00:01:15,800
You've been away from windows.
15
00:01:15,840 --> 00:01:19,770
Start with the minimal operating systems.
16
00:01:19,770 --> 00:01:23,430
We've got tiny core Linux which you can download here.
17
00:01:23,570 --> 00:01:24,810
It's distribution.
18
00:01:24,860 --> 00:01:27,250
Notable really for its minimalism.
19
00:01:27,250 --> 00:01:35,100
The core is only 10 meg as you can see and is useful if you want to minimize the possible attack surface
20
00:01:35,100 --> 00:01:38,850
of a hacker and it looks like this.
21
00:01:40,150 --> 00:01:45,130
As you can see it boots up and it'll boot up very very quickly.
22
00:01:45,300 --> 00:01:48,320
And there we are that's called Linux.
23
00:01:48,320 --> 00:01:53,680
There's not much to it.
24
00:01:53,730 --> 00:02:00,870
Poppy Linux is a lightweight Linux distribution that focuses on ease of use and minimal memory footprint
25
00:02:00,880 --> 00:02:01,000
.
26
00:02:01,000 --> 00:02:04,380
Entire system can run from RAM with current versions.
27
00:02:04,380 --> 00:02:10,200
Generally taking it to about 210 megabytes allowed the boot media to be removed after the operating
28
00:02:10,200 --> 00:02:11,420
system started.
29
00:02:11,430 --> 00:02:15,870
It isn't security focused though but it can be configured to be so.
30
00:02:16,030 --> 00:02:22,260
If you go to this page here and then download the latest release and find the one that you want to download
31
00:02:22,290 --> 00:02:23,160
Here's the link.
32
00:02:23,160 --> 00:02:29,190
It's a little bit confusing actually to find what it is that you want on here.
33
00:02:29,330 --> 00:02:34,180
And then you need to find the ISO image that relates to the one that you want to download.
34
00:02:34,170 --> 00:02:42,750
You've got there's no P-A and P-A the P.A. bill is for enabling full access to installed RAM and P-A
35
00:02:42,750 --> 00:02:45,530
enabled high memory machines.
36
00:02:45,720 --> 00:02:53,340
So basically that means that no one pays for all the PCs with at least 256 megabytes of RAM so that's
37
00:02:53,340 --> 00:02:54,060
popular.
38
00:02:54,060 --> 00:03:01,470
EXE Knoppix is one of the first Live Linux distributions that run directly from an external disk CD
39
00:03:01,470 --> 00:03:05,540
DVD USP stick or SD card etc..
40
00:03:05,580 --> 00:03:10,170
And in fact the predecessor to Cali Linux used to room from Knoppix.
41
00:03:10,170 --> 00:03:15,150
The operating system is based on Debian which is excellent because it's good for security and it has
42
00:03:15,150 --> 00:03:15,960
features within it.
43
00:03:15,960 --> 00:03:20,000
They enable you to read and write Windows and other partitions.
44
00:03:20,040 --> 00:03:27,300
It is designed for beginners but offers reasonable security and anonymity against a basic level adversary
45
00:03:27,320 --> 00:03:27,640
.
46
00:03:27,870 --> 00:03:32,510
And this is Knoppix that you see here in front of you.
47
00:03:32,550 --> 00:03:38,300
This is the main Knoppix home page if you want to download just go here.
48
00:03:38,340 --> 00:03:39,690
Roll down.
49
00:03:39,690 --> 00:03:44,760
You need to choose between the CD version or the DVD version.
50
00:03:44,760 --> 00:03:53,040
DVD is the full version and then as with the others you just need to find the ISO image and download
51
00:03:53,040 --> 00:03:59,640
the ISO image burn it to a CD or DVD or put it onto a bootable USP and then you good to go.
52
00:03:59,850 --> 00:04:06,390
Look here on pen drive Linux dot com give you some more information for installing Knoppix to a USP
53
00:04:06,390 --> 00:04:08,870
flash drive and the fact this site is pretty good.
54
00:04:08,870 --> 00:04:17,250
Generally for us b flash drives out of the browser you are seeing here is actually called Ice weazel
55
00:04:17,370 --> 00:04:23,340
and ice weazel is included within Knoppix Plus some of security extensions
56
00:04:28,160 --> 00:04:31,990
which are these some of which I recommend in the section on browsers.
57
00:04:32,280 --> 00:04:35,280
Ice weaselled is a fork of Firefox.
58
00:04:35,280 --> 00:04:40,380
Effectively you can think of it as a rebranded Firefox but I'll talk more about the security of this
59
00:04:40,380 --> 00:04:44,150
browser and browsers generally in that section.
60
00:04:44,340 --> 00:04:48,610
I said easily accessible just by clicking on this here.
61
00:04:49,050 --> 00:04:55,790
You can also get to chromium which is also installed browser.
62
00:04:57,240 --> 00:05:04,410
If you want to install Knoppix to the flash disk for persistence you can use this here and that will
63
00:05:04,410 --> 00:05:05,350
enable you to do that
64
00:05:08,310 --> 00:05:12,480
Knoppix also comes with a number of security related applications.
65
00:05:12,480 --> 00:05:14,420
Virus scanner is here.
66
00:05:14,860 --> 00:05:24,340
Knoppix firewall can run S-sh server and you can also start the TOR proxy from here and access Tor anonymously
67
00:05:24,350 --> 00:05:24,920
.
68
00:05:27,030 --> 00:05:34,050
If you want to use toy you're going to need to enable it within the browser and that's done here by
69
00:05:34,050 --> 00:05:37,110
changing the proxy to the TOR proxy.
70
00:05:38,010 --> 00:05:41,490
And then you can see whether or not you're going via the
71
00:05:44,010 --> 00:05:52,260
network and you can see here where an anonymous proxy exit node or we are going to talk a lot more about
72
00:05:52,260 --> 00:05:58,950
Tor in the section on tour and you can also see here the little onion access the settings for all cheat
73
00:05:58,950 --> 00:06:02,890
codes are also useful when Knoppix boots up.
74
00:06:02,970 --> 00:06:06,110
It gives you the option to enter in these cheat codes.
75
00:06:06,330 --> 00:06:12,110
And this enables you to make certain settings before actually boots up and that's useful if you're going
76
00:06:12,120 --> 00:06:17,730
to have a non-persistent Knoppix and you want to make some changes before it boots up fully.
77
00:06:17,840 --> 00:06:24,240
If you want to access the network settings you go here right click you can edit your connections you
78
00:06:24,240 --> 00:06:27,260
can look at the information about the connection.
79
00:06:27,420 --> 00:06:28,140
Right.
80
00:06:28,490 --> 00:06:37,970
And the like on here and it can change whether or not it's CACP or manual.
81
00:06:38,190 --> 00:06:46,470
And change of DNS servers all the usual things we can disable IP V-6 etc..
82
00:06:46,980 --> 00:06:51,930
Also from here you can configure VPN connections
83
00:06:58,860 --> 00:07:02,700
open VPN.
84
00:07:03,150 --> 00:07:08,220
And then go through and create all the normal settings that you have to create going to talk more about
85
00:07:08,220 --> 00:07:10,370
that in the section on VPN.
86
00:07:10,680 --> 00:07:12,640
So that's Knoppix.
87
00:07:12,690 --> 00:07:18,420
Next is John Dunham also referred to Tor secure live DVD.
88
00:07:18,420 --> 00:07:23,430
It offers a secure pre-configured environment for anonymous surfing.
89
00:07:23,490 --> 00:07:29,970
It's produced by the organization behind the anonymising service John Dhanam which is different from
90
00:07:29,970 --> 00:07:37,200
peer to peer based anonymity networks like Tor and ITP whose anonymity proxies are anonymous.
91
00:07:37,200 --> 00:07:38,850
John Donne and proxies are not.
92
00:07:39,030 --> 00:07:47,490
But more on this in their section this Live-CD is based on Debian GNU Linux which you're familiar with
93
00:07:47,580 --> 00:07:49,090
and is a good choice.
94
00:07:49,110 --> 00:07:55,770
The live system contains proxy clients for the anonymising So is John Donum.
95
00:07:55,800 --> 00:08:00,200
Tor and mixmaster remailer Jondo Fox comes with it.
96
00:08:00,240 --> 00:08:07,680
Which is a preconfigured Firefox browser for anonymous web surfing and the Tor browser as well is installed
97
00:08:07,680 --> 00:08:08,180
.
98
00:08:08,220 --> 00:08:15,390
You also have Thunderbird for email Pidgen for anonymous instant messaging and chats Matha clean documents
99
00:08:15,420 --> 00:08:18,160
Tor chats etc..
100
00:08:18,780 --> 00:08:23,690
It works better in virtual box if you're going to use virtualization to access it.
101
00:08:23,850 --> 00:08:26,020
And from what I've seen of it it looks great.
102
00:08:26,030 --> 00:08:30,100
And from what I've tested of it and it's the equivalent of tails.
103
00:08:30,180 --> 00:08:37,650
But I haven't seen any orders for it so it is not scrutinized by the community as perhaps tails is and
104
00:08:37,650 --> 00:08:44,980
probably given it's still embetter that it's that 0.9 shouldn't necessarily be fully relied on.
105
00:08:45,150 --> 00:08:52,260
I would say offers reasonable security and an unlimited options against a basic adversary not suitable
106
00:08:52,350 --> 00:08:54,730
on its own against the nation state.
107
00:08:54,840 --> 00:09:01,410
And as you can see he can just simply download it here and if you don't care got instructions on how
108
00:09:01,410 --> 00:09:09,510
to create a bootable CD ROM DVD or USP stick for Windows and also there's instructions here for how
109
00:09:09,510 --> 00:09:12,380
to do it with Linux and you'll see.
110
00:09:12,390 --> 00:09:18,810
So it's using pen drive Linux dot com and this is what it looks like.
111
00:09:18,810 --> 00:09:24,450
This is what you'll be prompted with when you first boot the operating system gives you three choices
112
00:09:24,450 --> 00:09:31,840
between simple firewall restricted firewall for tall or restricted firewall for John do only.
113
00:09:31,880 --> 00:09:36,400
So the simple file as it says here all connection from outside are blocked.
114
00:09:36,420 --> 00:09:40,720
All local programs can connect to Internet servers.
115
00:09:40,860 --> 00:09:43,350
You can use all anonymizing services.
116
00:09:43,380 --> 00:09:48,750
So essentially if you select this you can begin to be able to use toy going to be able to use John Doe
117
00:09:49,050 --> 00:09:52,840
and you can also be able to just re access the internet.
118
00:09:52,950 --> 00:09:55,670
If you select this one you're going to be able to access Tor.
119
00:09:55,860 --> 00:10:02,130
And it's also going to block all the programs from accessing the internet unless they go via that or
120
00:10:02,130 --> 00:10:03,350
network.
121
00:10:03,450 --> 00:10:09,600
And this one's exactly the same but it only allows other programs to access the Internet via the John
122
00:10:09,600 --> 00:10:11,540
Doe anonymizing network.
123
00:10:11,610 --> 00:10:18,350
And if you like this one or this one it'll switch on the service so switch on tour.
124
00:10:19,170 --> 00:10:24,810
You can enter administrator password here if you want to run administrative commands.
125
00:10:26,040 --> 00:10:30,400
The network connection is disabled by default so you need to enable it.
126
00:10:30,840 --> 00:10:33,470
It's good that it's disabled by default.
127
00:10:33,820 --> 00:10:43,320
You go down here left click then click auto ethernet connection will be established.
128
00:10:43,320 --> 00:10:56,340
Go here to open the Tor browser and carry on the toll network check for all browser updates.
129
00:10:56,440 --> 00:11:02,840
Isn't that the latest version of the applications here.
130
00:11:03,200 --> 00:11:07,640
Could access the Jondo Firefox browser here.
131
00:11:08,850 --> 00:11:17,970
This is configured with a number of security extensions and plugins which you can see here all of which
132
00:11:17,970 --> 00:11:24,650
I recommend you can access your VPN configuration here.
133
00:11:25,980 --> 00:11:38,590
And so I type open VPN create and when all the details you can edit your network here.
134
00:11:39,040 --> 00:11:48,120
Here while we're at it change your IP for maybe disable IP V-6
135
00:11:51,210 --> 00:11:55,200
change to manual if you require etc..
136
00:11:55,260 --> 00:11:57,700
DNS servers change.
137
00:11:57,940 --> 00:12:05,110
Is a very script here for full description and just the last alert we have here.
138
00:12:05,170 --> 00:12:09,940
Skype wireshark Bitcoin wallet.
139
00:12:09,940 --> 00:12:10,890
So that's John Doe
14887
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.