buyed sandisk 16 gb ultrafit, Yumi for freebsd 11+solaris 11.3 ? or Xboot
freebsd at edvax.de
Mon Dec 26 12:23:31 UTC 2016
On Sun, 25 Dec 2016 20:35:02 +0100, swjatoslaw gerus wrote:
> 1.buyed sandisk 16 gb ultrafit, Yumi for freebsd 11+solaris 11.3 ? or
For installation media, this should be okay. FreeBSD does
not require more than 5 GB on the installation media.
> suspect to author situation related SD Card Images
> must be downloaded all files ?
You only need to install the image file corresponding to
the system you want to install to, usually deciding between
the 32 bit (called i386) and the 64 bit (called amd64) version
(which should be the standard today).
To install from USB, use the installer image and write it
to the USB stick you want to install from.
The 11.0-RELEASE 64 bit images are located here:
You'd select FreeBSD-11.0-RELEASE-amd64-mini-memstick.img
for use with an USB stick.
> ... to date performed without help and without root sudo su
> installation of NRL tor in user account
> it is work
You can use TOR with FreeBSD, no problem.
> but only limited graphics as in
Modern browsers such as Firefox and Chrome should play video without
any problem. On some sites, "Flash" may be needed.
Regarding graphics: Identify the graphics unit in your system
and install the appropriate driver; it's usually one of Intel,
AMD/ATI, or nVivia. More information here:
> no yotube
As I said, "YouTube" should work fine with Firefox and Chrome
without "Flash". Also keep in mind there's youtube-dl, a program
that lets you download "YouTube" video and play it with your
favorite media player, whenever you want, offline. ;-)
Example from above:
% wget http://www.sandia.gov/RADAR/_assets/videos/eubankgateandtrafficvideosar.mp4
% mplayer eubankgateandtrafficvideosar.mp4
This doesn't even need a web browser. All you need in this
specific case is to install wget and mplayer.
> and not software of author demand
What software would that be? Always remember that FreeBSD
does not install software automatically "just in case". You
have to install it yourself, using the pkg tool, usually
just "pkg install <name of software>". THe Ports Collection
offers several 10,000s of ported applications, and you can
also run software written for Linux and "Windows" without
having to use those systems.
> as tails https://tails.boum.org/ related to tor can expect equal
Tails is an excellent Linux distribution for safe browsing,
especially the version that can be booted directly from CD.
Doesn't leave a trace. :-)
Regading your other question
"Is it safe to use Tails on a compromised system?"
I'd say: no.
In general: It depends on _how_ the system is compromized.
For example, if there is already a hardware keylogger, or
some creepy malware in the BIOS/UEFI component, it's more
or less game over, and Tails won't help you much. However,
if the system is compromized in software _only_, i. e. a
"Windows" installation that is full of spyware, _not_ using
that software, and instead booting Tails, is going to work.
Especially when you can burn Tails to optical media, it
adds some security because the OS and programs you're going
to run cannot be changed. This is different when you boot
from a USB stick, and maybe have that USB stick inserted
to a compromized system that can change the stick's content.
That's why a _trusted_ system is absolutely needed.
On Mon, 26 Dec 2016 00:47:40 +0100, swjatoslaw gerus wrote:
> linux community more as freebsd solaris,linux as base sytem-more
> Is it safe to use Tails on a compromised system?
> Tails runs independently from the operating system installed on the
> computer. So, if the computer has only been compromised by software,
> running from inside your regular operating system (virus, trojan, etc.),
> then it is safe to use Tails. This is true as long as Tails itself has
> been installed using a trusted system.
> If the computer has been compromised by someone having physical access
> to it and who installed untrusted pieces of hardware, then it might be
> unsafe to use Tails.
> If the BIOS of the computer has been compromised, then it might also be
> unsafe to use Tails.
With Linux gaining more and more usage share, "evildoers" will
also pay more attention to that platform and target it, of course.
Luckily, Linux's design doesn't make it _that_ easy. But always
remember that the weakest part of the security chain is the user,
and as soon as you have some of today's modern installer concepts
like "wget && ./install.sh" or ²curl | sudo bash", it can also
cause trouble. That's why a packaging system such as FreeBSD's
adds security, because sofware isn't being downloaded arbitrarily
from some web page, but instead obtained using a secure connection
and verified with checksums, and of course managed centrally for
the whole system.
PS. You need to send questions to the freebsd-questions at freebsd.org
mailing list in order to obtain answers. Keep in mind there are
users who may be able to help, and other readers could also gain
knowledge from the conversation.
Happy FreeBSD user since 4.0
Andra moi ennepe, Mousa, ...
More information about the freebsd-questions