From owner-freebsd-questions@freebsd.org Mon Dec 26 12:23:31 2016 Return-Path: Delivered-To: freebsd-questions@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4AD7EC64283 for ; Mon, 26 Dec 2016 12:23:31 +0000 (UTC) (envelope-from freebsd@edvax.de) Received: from mailrelay12.qsc.de (mailrelay12.qsc.de [212.99.163.153]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.antispameurope.com", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C4A0018CE for ; Mon, 26 Dec 2016 12:23:30 +0000 (UTC) (envelope-from freebsd@edvax.de) Received: from mx01.qsc.de ([213.148.129.14]) by mailrelay12.qsc.de; Mon, 26 Dec 2016 13:25:16 +0100 Received: from r56.edvax.de (port-92-195-28-64.dynamic.qsc.de [92.195.28.64]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx01.qsc.de (Postfix) with ESMTPS id 3D08D3CC3F; Mon, 26 Dec 2016 13:22:39 +0100 (CET) Received: from r56.edvax.de (localhost [127.0.0.1]) by r56.edvax.de (8.14.5/8.14.5) with SMTP id uBQCMcLn002773; Mon, 26 Dec 2016 13:22:38 +0100 (CET) (envelope-from freebsd@edvax.de) Date: Mon, 26 Dec 2016 13:22:38 +0100 From: Polytropon To: swjatoslaw gerus Cc: freebsd-questions@freebsd.org Subject: Re: buyed sandisk 16 gb ultrafit, Yumi for freebsd 11+solaris 11.3 ? or Xboot Message-Id: <20161226132238.15c40d7d.freebsd@edvax.de> In-Reply-To: <1482694502.371338.829363393.0D87C11B@webmail.messagingengine.com> References: <1482694502.371338.829363393.0D87C11B@webmail.messagingengine.com> Reply-To: Polytropon Organization: EDVAX X-Mailer: Sylpheed 3.1.1 (GTK+ 2.24.5; i386-portbld-freebsd8.2) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable X-cloud-security-sender: freebsd@edvax.de X-cloud-security-recipient: freebsd-questions@freebsd.org X-cloud-security-Virusscan: CLEAN X-cloud-security-disclaimer: This E-Mail was scanned by E-Mailservice on mailrelay12.qsc.de with 5B2816A35D4 X-cloud-security-connect: mx01.qsc.de[213.148.129.14], TLS=1, IP=213.148.129.14 X-cloud-security: scantime:.3575 X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 26 Dec 2016 12:23:31 -0000 On Sun, 25 Dec 2016 20:35:02 +0100, swjatoslaw gerus wrote: > 1.buyed sandisk 16 gb ultrafit, Yumi for freebsd 11+solaris 11.3 ? or > Xboot=20 For installation media, this should be okay. FreeBSD does not require more than 5 GB on the installation media. > 2.https://www.freebsd.org/where.html#download >=20 > suspect to author situation related SD Card Images =20 > must be downloaded all files ? You only need to install the image file corresponding to the system you want to install to, usually deciding between the 32 bit (called i386) and the 64 bit (called amd64) version (which should be the standard today). To install from USB, use the installer image and write it to the USB stick you want to install from. The 11.0-RELEASE 64 bit images are located here: ftp://ftp.freebsd.org/pub/FreeBSD/releases/amd64/amd64/ISO-IMAGES/11.0/ You'd select FreeBSD-11.0-RELEASE-amd64-mini-memstick.img for use with an USB stick. > ... to date performed without help and without root sudo su=20 > installation of NRL tor in user account=20 >=20 > it is work=20 > https://www.torproject.org/ You can use TOR with FreeBSD, no problem. > but only limited graphics as in=20 > http://www.sandia.gov/RADAR/video/index.html > http://www.sandia.gov/RADAR/_assets/videos/eubankgateandtrafficvideosar.m= p4 Modern browsers such as Firefox and Chrome should play video without any problem. On some sites, "Flash" may be needed. Regarding graphics: Identify the graphics unit in your system and install the appropriate driver; it's usually one of Intel, AMD/ATI, or nVivia. More information here: https://wiki.freebsd.org/Graphics > no yotube =20 As I said, "YouTube" should work fine with Firefox and Chrome without "Flash". Also keep in mind there's youtube-dl, a program that lets you download "YouTube" video and play it with your favorite media player, whenever you want, offline. ;-) Example from above: % wget http://www.sandia.gov/RADAR/_assets/videos/eubankgateandtrafficvideo= sar.mp4 % mplayer eubankgateandtrafficvideosar.mp4 This doesn't even need a web browser. All you need in this specific case is to install wget and mplayer. > and not software of author demand What software would that be? Always remember that FreeBSD does not install software automatically "just in case". You have to install it yourself, using the pkg tool, usually just "pkg install ". THe Ports Collection offers several 10,000s of ported applications, and you can also run software written for Linux and "Windows" without having to use those systems. > as tails https://tails.boum.org/ related to tor can expect equal > result... Tails is an excellent Linux distribution for safe browsing, especially the version that can be booted directly from CD. Doesn't leave a trace. :-) Regading your other question "Is it safe to use Tails on a compromised system?" I'd say: no. In general: It depends on _how_ the system is compromized. For example, if there is already a hardware keylogger, or some creepy malware in the BIOS/UEFI component, it's more or less game over, and Tails won't help you much. However, if the system is compromized in software _only_, i. e. a "Windows" installation that is full of spyware, _not_ using that software, and instead booting Tails, is going to work. Especially when you can burn Tails to optical media, it adds some security because the OS and programs you're going to run cannot be changed. This is different when you boot from a USB stick, and maybe have that USB stick inserted to a compromized system that can change the stick's content. That's why a _trusted_ system is absolutely needed. On Mon, 26 Dec 2016 00:47:40 +0100, swjatoslaw gerus wrote: > linux community more as freebsd solaris,linux as base sytem-more > risk >=20 > https://tails.boum.org/support/faq/index.de.html#compromised_system >=20 > Is it safe to use Tails on a compromised system? > Tails runs independently from the operating system installed on the > computer. So, if the computer has only been compromised by software, > running from inside your regular operating system (virus, trojan, etc.), > then it is safe to use Tails. This is true as long as Tails itself has > been installed using a trusted system. >=20 > If the computer has been compromised by someone having physical access > to it and who installed untrusted pieces of hardware, then it might be > unsafe to use Tails. >=20 > If the BIOS of the computer has been compromised, then it might also be > unsafe to use Tails. Fully correct. With Linux gaining more and more usage share, "evildoers" will also pay more attention to that platform and target it, of course. Luckily, Linux's design doesn't make it _that_ easy. But always remember that the weakest part of the security chain is the user, and as soon as you have some of today's modern installer concepts like "wget && ./install.sh" or =B2curl | sudo bash", it can also cause trouble. That's why a packaging system such as FreeBSD's adds security, because sofware isn't being downloaded arbitrarily from some web page, but instead obtained using a secure connection and verified with checksums, and of course managed centrally for the whole system. PS. You need to send questions to the freebsd-questions@freebsd.org mailing list in order to obtain answers. Keep in mind there are users who may be able to help, and other readers could also gain knowledge from the conversation. --=20 Polytropon Magdeburg, Germany Happy FreeBSD user since 4.0 Andra moi ennepe, Mousa, ...