<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5957666542740923869</id><updated>2026-04-03T09:13:00.115-07:00</updated><category term="Linux Distributions"/><category term="Linux Live Cd"/><category term="Graphic Tools"/><category term="Multimedia"/><category term="Ubuntu"/><category term="Guides and Tutorials"/><category term="Software Packages"/><category term="Audio"/><category term="Repository"/><category term="System"/><category term="Security"/><category term="Ubuntu Derivatives"/><category term="Debian"/><category term="Utility"/><category term="Science"/><category term="Fedora"/><category term="Video"/><category term="Databases"/><category term="BSD (Berkeley Software Distribution)"/><category term="Education"/><category term="Games"/><category term="Servers"/><category term="Desktop Environment"/><category term="Math"/><category term="Arch Linux"/><category term="Backup"/><category term="Music"/><category term="Web Browsers"/><category term="CentOS"/><category term="KDE"/><category term="Accessible Applications"/><category term="Apps"/><category term="Advertising and Marketing"/><category term="Slackware"/><category term="Android"/><category term="Infographics"/><category term="Programming Software"/><category term="Apple"/><category term="Cd-Dvd Burning"/><category term="Gentoo"/><category term="Office"/><category term="Red Hat"/><category term="Window Manager"/><category term="Zorin"/><category term="File Manager"/><category term="Compiz Fusion"/><category term="Computational biology"/><category term="Data storage"/><category term="X Window System"/><category term="Blogger"/><category term="Chat"/><category term="Google"/><category term="Mandriva"/><category term="Programming Language"/><category term="Statistical Software"/><category term="Web Tools"/><category term="Miscellaneous"/><category term="Scientific Distributions"/><category term="Tutorials"/><category term="Xubuntu"/><category term="Burning"/><category term="Docks Manager"/><category term="Ham Radio"/><category term="Web Resources"/><category term="Weblog Applications"/><category term="Library"/><category term="Manjaro"/><category term="Mobile"/><category term="Mozilla"/><category term="Mozilla Thunderbird"/><category term="Others System Operating"/><category term="Statistics"/><category term="Text Editors"/><category term="Xfce"/><category term="Gnome"/><category term="Mail Client"/><category term="Mozilla Firefox"/><category term="Puppy Linux"/><category term="Editors Blog"/><category term="FTP"/><category term="Linux Mint"/><category term="News Aggregator"/><category term="OpenSUSE"/><category term="Windows"/><category term="Kernel"/><category term="Social Bookmarks"/><category term="Knoppix"/><category term="Kubuntu"/><category term="P2P"/><category term="Unity"/><category term="Unix"/><category term="Virtualization"/><category term="eSpeak"/><category term="Development Release"/><category term="Mac"/><category term="Maps"/><category term="Netbook"/><category term="Networking"/><category term="To-Do List Manager"/><category term="Web Search Engine"/><category term="Window System"/><category term="Digital Marketing"/><category term="Hardware"/><category term="Linus Torvalds"/><category term="Manuals and Tutorials"/><category term="Medical Research Labs"/><category term="Mepis"/><category term="Newsreaders"/><category term="Operating System"/><category term="PCLinuxOS"/><category term="Solaris"/><category term="Version Control System"/><category term="GPS"/><category term="Internet Tools"/><category term="LXDE"/><category term="Mageia"/><category term="Mozilla Addons"/><category term="Mozilla SeaMonkey"/><category term="News"/><category term="Routing"/><category term="Technology"/><category term="Updates"/><category term="Internet Cafès"/><category term="Linux From Scratch"/><category term="MATE"/><category term="Medical software"/><category term="Microsoft"/><category term="Package Manager"/><category term="Social Networks"/><category term="Tablets"/><title type='text'>Linuxlandit &amp;amp; The Conqueror Penguin</title><subtitle type='html'>The free world is the new continent in cyberspace that we have built so we can live here in freedom. It&#39;s impossible to live in freedom in the old world of cyberspace, where every program has its feudal lord that bullies and mistreats the users. So, to live in freedom we have to build a new continent. Because this is a virtual continent, it has room for everyone, and there are no immigration restrictions. - Richard Stallman -</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default?start-index=26&amp;max-results=25'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>940</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-7333270249289214747</id><published>2026-04-03T09:13:00.000-07:00</published><updated>2026-04-03T09:13:00.111-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Installing Kali Linux on desktops &amp; laptops using &quot;.ISO&quot; files (x64/x86) Bare-bones Kali</title><content type='html'>&lt;p&gt;&lt;img src=&quot;https://i0.wp.com/9to5linux.com/wp-content/uploads/2025/06/kl252.webp?fit=1920%2C1080&amp;amp;ssl=1&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;h4&gt;Bare-bones Kali&lt;/h4&gt;  &lt;p&gt;Kali traditionally has been solely recommended as a penetration testing distribution, and for good reason. However, through the years Kali has become more stable and evolved into something that users can use no matter what their reasoning is. While still primarily a penetration testing distribution, we accept that many users may not even be in the cybersecurity field. For those users wanting to install Kali, but may not need the tools or just want the UI, this guide is for you.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/installation/barebone-kali/#installing-a-bare-bones-kali&quot;&gt;   &lt;h4&gt;Installing a bare-bones Kali&lt;/h4&gt; &lt;/a&gt;  &lt;p&gt;To get a Kali without any tools is quite easy. We will be following the &lt;a href=&quot;https://www.kali.org/docs/installation/hard-disk-install/&quot;&gt;hard disk install&lt;/a&gt;for the most part. The important part is to select the following packages:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://www.kali.org/docs/installation/barebone-kali/bare-bones-install.png&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.kali.org/docs/installation/barebone-kali/bare-bones-install.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;Of course, you can select whichever desktop environment you wish. It is worth mentioning now that KDE has great support for Wacom tablets! Be careful not to mix KDE with another desktop distribution however, as there are some bugs that can occur when this happens.&lt;/p&gt;  &lt;p&gt;Now that we are installed and logged in, there are a few things we should do. Keep in mind, these should always be done, not just for a daily use case! Let’s first change the root user’s password:&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;kali@kali:~$ sudo su
[sudo] password for kali:
root@kali:/home/kali#
root@kali:/home/kali# passwd
New password:
Retype new password:
passwd: password updated successfully

root@kali:/home/kali#
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;After this we can make sure our system is up-to-date:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;kali@kali:~$ sudo apt update &amp;amp;&amp;amp; sudo apt full-upgrade -y
....
kali@kali:~$
kali@kali:~$ [ -f /var/run/reboot-required ] &amp;amp;&amp;amp; sudo reboot -f
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;We can now finish off our setup by making sure kali-tweaks is configured properly:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;kali@kali:~$ kali-tweaks
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;What we are looking for are changes required in ‘Hardening’, unchecking any options to make our system more secure.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/7333270249289214747/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/04/installing-kali-linux-on-desktops.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/7333270249289214747'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/7333270249289214747'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/04/installing-kali-linux-on-desktops.html' title='Installing Kali Linux on desktops &amp; laptops using &quot;.ISO&quot; files (x64/x86) Bare-bones Kali'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-3162785964525861009</id><published>2026-03-27T09:11:00.000-07:00</published><updated>2026-03-27T09:11:00.121-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Kali Press Release</title><content type='html'>&lt;p&gt;&lt;img src=&quot;https://cdn.mos.cms.futurecdn.net/v2/t:0,l:377,cw:2410,ch:1356,q:80,w:2410/sUzkmun633rPA8zjZkWpYe.png&quot; /&gt;&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/press-release/#introducing-kali-linux&quot;&gt;   &lt;h5&gt;Introducing Kali Linux&lt;/h5&gt; &lt;/a&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/press-release/#free-all-in-one-solution-for-professional-security-auditing&quot;&gt;   &lt;h6&gt;Free All-in-One Solution for Professional Security Auditing&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;&lt;strong&gt;&lt;em&gt;Popular BackTrack Linux Evolves Into Mature, Enterprise-Ready Penetration Testing Toolkit.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;Black Hat Europe, Amsterdam – 13th March 2013 – &lt;a href=&quot;https://www.offsec.com/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs&quot;&gt;OffSec (previously known as Offensive Security)&lt;/a&gt;today announced the availability of &lt;a href=&quot;https://www.offsec.com/blog/kali-linux-released/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs&quot;&gt;Kali Linux&lt;/a&gt;, the evolution of its popular &lt;a href=&quot;https://www.backtrack-linux.org/&quot;&gt;BackTrack Linux&lt;/a&gt;, a free security auditing operating system and toolkit. Showcased at &lt;a href=&quot;https://www.blackhat.com/eu-13/&quot;&gt;Black Hat Europe&lt;/a&gt; in Amsterdam, Kali Linux incorporates more than &lt;a href=&quot;https://www.kali.org/docs/policy/kali-linux-relationship-with-debian/&quot;&gt;300&lt;/a&gt;penetration testing and security auditing programs with a Linux operating system, delivering an all-in-one solution that enables IT administrators and security professionals to test the effectiveness of risk mitigation strategies.&lt;/p&gt;  &lt;p&gt;“For IT professionals, an experiment is worth a thousand theories. Applied to security, it means that simulating attacks to assess the defenses protecting your organization is the only sure way to understand their effectiveness and the impact of an attack,” said &lt;a href=&quot;https://www.kali.org/about-us/&quot;&gt;Mati Aharoni&lt;/a&gt;, Lead Trainer and Developer, OffSec. “That’s why we created Kali Linux; we’ve developed the most advanced penetration testing and security auditing toolkit available to help IT administrators and security professionals put themselves in the shoes of potential attackers.”&lt;/p&gt;  &lt;p&gt;The new Kali Linux offers a smoother, easier penetration testing experience, making it more accessible to IT generalists as well as security specialists. The new infrastructure incorporates &lt;a href=&quot;https://www.kali.org/docs/policy/kali-linux-relationship-with-debian/&quot;&gt;Debian development standards&lt;/a&gt;to provide a more familiar environment for IT administrators. The result is a more robust solution that can be updated more easily. Users can also customize the operating system to tailor it to their needs and preferences.&lt;/p&gt;  &lt;p&gt;All the programs packaged with the operating system were evaluated for suitability and effectiveness before being included. They include &lt;a href=&quot;https://www.kali.org/tools/metasploit-framework/&quot;&gt;Metasploit-Framework&lt;/a&gt;for network penetration testing, &lt;a href=&quot;https://www.kali.org/tools/nmap/&quot;&gt;Nmap&lt;/a&gt;for port and vulnerability scanning, &lt;a href=&quot;https://www.kali.org/tools/wireshark/&quot;&gt;Wireshark&lt;/a&gt;for monitoring network traffic, and &lt;a href=&quot;https://www.kali.org/tools/aircrack-ng/&quot;&gt;Aircrack-ng&lt;/a&gt;for testing the security of wireless networks.&lt;/p&gt;  &lt;p&gt;“When it comes to security, the best defense is offense; you need to test the effectiveness of your own security practices before a real intruder does it for you,” said HD Moore, Chief Architect for Metasploit at Rapid7. “We built Metasploit to level the playing field for defenders; arming them with the same tools the attackers have. OffSec takes this even further, bringing hundreds of such tools together in Kali Linux to streamline security auditing.” Additionally, Kali Linux can now run on a wide variety of hardware and is compatible with numerous wireless and USB devices. It also introduced support for &lt;a href=&quot;https://www.kali.org/docs/arm/&quot;&gt;ARM devices&lt;/a&gt;– typically miniature, battery-powered computers – which are becoming more prevalent and inexpensive. More information on which devices are supported, as well as other documentation, is available on the &lt;a href=&quot;https://www.kali.org/docs/&quot;&gt;Kali Linux documentation site&lt;/a&gt;.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/press-release/#pricing-and-availability&quot;&gt;   &lt;h5&gt;Pricing and Availability&lt;/h5&gt; &lt;/a&gt;  &lt;p&gt;Like its &lt;a href=&quot;https://www.kali.org/docs/introduction/kali-linux-history/&quot;&gt;predecessors&lt;/a&gt;, Kali Linux is completely free and always will be. OffSec is committed to supporting the &lt;a href=&quot;https://www.kali.org/docs/policy/kali-linux-open-source-policy/&quot;&gt;Open-source&lt;/a&gt;community with the ongoing development of Kali Linux. The development tree and &lt;a href=&quot;https://gitlab.com/kalilinux&quot;&gt;all sources&lt;/a&gt; are available for those who wish to tweak and rebuild packages. Kali Linux is available immediately for download from &lt;a href=&quot;https://www.kali.org/get-kali/&quot;&gt;kali.org/get-kali/&lt;/a&gt;.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/press-release/#about-kali-linux&quot;&gt;   &lt;h5&gt;About Kali Linux&lt;/h5&gt; &lt;/a&gt;  &lt;p&gt;&lt;a href=&quot;https://www.kali.org/&quot;&gt;Kali Linux&lt;/a&gt;&lt;em&gt;(formerly known as &lt;a href=&quot;https://www.backtrack-linux.org/&quot;&gt;BackTrack Linux&lt;/a&gt;)&lt;/em&gt; is an &lt;a href=&quot;https://www.kali.org/docs/policy/kali-linux-open-source-policy/&quot;&gt;open-source&lt;/a&gt;, &lt;a href=&quot;https://www.kali.org/docs/policy/kali-linux-relationship-with-debian/&quot;&gt;Debian-based Linux&lt;/a&gt;distribution aimed at advanced Penetration Testing and Security Auditing. Kali Linux contains &lt;a href=&quot;https://www.kali.org/docs/policy/penetration-testing-tools-policy/&quot;&gt;several hundred tools&lt;/a&gt;targeted towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux is a multi platform solution, accessible and freely available to information security professionals and hobbyists.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/press-release/#about-offsec&quot;&gt;   &lt;h5&gt;About OffSec&lt;/h5&gt; &lt;/a&gt;  &lt;p&gt;Founded in 2007, Offensive Security was born out of the belief that the only way to achieve sound defensive security is through an &lt;a href=&quot;https://www.offsec.com/organizations/penetration-testing/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs&quot;&gt;offensive approach&lt;/a&gt;. The team is made up of security professionals with extensive experience of attacking systems to see how they respond. They share this information through &lt;a href=&quot;https://www.offsec.com/courses/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs&quot;&gt;trainings&lt;/a&gt;, &lt;a href=&quot;https://www.offsec.com/community/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs#projects&quot;&gt;free tools&lt;/a&gt; and publications. With the motto “&lt;a href=&quot;https://www.offsec.com/blog/say-try-harder/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs&quot;&gt;Try Harder&lt;/a&gt;”, the Company’s trainings and &lt;a href=&quot;https://www.offsec.com/courses/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs&quot;&gt;certifications&lt;/a&gt; are well-respected and considered amongst the most rigorous available, creating a model adopted across the industry. In addition, the &lt;a href=&quot;https://www.exploit-db.com/&quot;&gt;Exploit Database&lt;/a&gt;, &lt;a href=&quot;https://www.vulnhub.com/&quot;&gt;VulnHub&lt;/a&gt;, &lt;a href=&quot;https://www.offsec.com/metasploit-unleashed/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs&quot;&gt;Metasploit Unleashed&lt;/a&gt; and &lt;a href=&quot;https://www.backtrack-linux.org/&quot;&gt;BackTrack Linux&lt;/a&gt;community projects are highly-regarded and used by security teams in governmental and commercial organizations across the world. In March 2023 &lt;a href=&quot;https://www.offsec.com/blog/experience-the-refreshed-offsec/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs&quot;&gt;Offensive Security was renamed to OffSec&lt;/a&gt;. For more information about OffSec, please visit &lt;a href=&quot;https://www.offsec.com/?utm_source=kali&amp;amp;utm_medium=web&amp;amp;utm_campaign=docs&quot;&gt;offsec.com&lt;/a&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/3162785964525861009/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/03/kali-press-release.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/3162785964525861009'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/3162785964525861009'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/03/kali-press-release.html' title='Kali Press Release'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-4452064648264959821</id><published>2026-03-20T09:10:00.000-07:00</published><updated>2026-03-20T09:10:00.116-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Kali Undercover</title><content type='html'>&lt;p&gt;&lt;strong&gt;Kali Undercover&lt;/strong&gt; is a set of scripts that change the theme of your Kali Linux to a &lt;strong&gt;Windows 10&lt;/strong&gt; alike theme.&lt;/p&gt;  &lt;p&gt;It was released with &lt;a href=&quot;https://www.kali.org/blog/kali-linux-2019-4-release/&quot;&gt;&lt;strong&gt;Kali Linux 2019.4&lt;/strong&gt;&lt;/a&gt;with an important concept in mind, &lt;em&gt;to hide in plain sight&lt;/em&gt;.&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/kali-undercover/kali-undercover-1.gif&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.kali.org/docs/introduction/kali-undercover/kali-undercover-1.gif&quot; /&gt;&lt;/a&gt;&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/kali-undercover/#going-undercover&quot;&gt;   &lt;h6&gt;Going “undercover”&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;Switching to undercover mode is pretty simple, just run the following command:&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;kali@kali:~$ kali-undercover
kali@kali:~$
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;or, you could also look for &lt;strong&gt;“Kali Undercover Mode”&lt;/strong&gt; from the menu of your desktop and launch it from there.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Swoosh!&lt;/strong&gt; Now, you are &lt;em&gt;(almost)&lt;/em&gt; invisible to most indiscreet eyes by having a theme that would make most people think you are using Windows 10.&lt;/p&gt;


&lt;a href=&quot;https://www.kali.org/docs/introduction/kali-undercover/#reverting-back&quot;&gt;
  &lt;h6&gt;Reverting Back&lt;/h6&gt;
&lt;/a&gt;

&lt;p&gt;Now, to &lt;strong&gt;revert&lt;/strong&gt; back into your previous Kali Linux theme just re-enter the previous command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;kali@kali:~$ kali-undercover
kali@kali:~$
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;&lt;strong&gt;Ta-da!&lt;/strong&gt; Welcome back! Now, all your desktop settings should be restored.&lt;/p&gt;

&lt;hr /&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/kali-undercover/#purpose-of-undercover-mode-in-kali-linux&quot;&gt;
  &lt;h6&gt;Purpose of Undercover Mode in Kali Linux&lt;/h6&gt;
&lt;/a&gt;

&lt;p&gt;The main purpose of introducing &lt;strong&gt;Kali Undercover&lt;/strong&gt; mode is &lt;strong&gt;to prevent any unnecessary attention&lt;/strong&gt; while using Kali Linux in &lt;em&gt;public&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Let’s imagine a scenario: you are ethically pentesting your client and you are in their office or reception doing reconnaissance or something that involves the use of &lt;strong&gt;Kali Linux&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Someone from your client’s office or some random on-looker spots the desktop environment/wallpaper of Kali Linux, so they might think you are doing something mischievous even though you are doing it &lt;em&gt;ethically&lt;/em&gt; and warn the authority. All the hard work that you did from the beginning to become stealthy will go in vain. And that’s because of what? A &lt;strong&gt;wallpaper&lt;/strong&gt;! For a client who requested you to become stealthy, this is not what you would want.&lt;/p&gt;

&lt;p&gt;Hence, to prevent any kind of unwanted attention from public it’s better to go &lt;strong&gt;“Undercover!”&lt;/strong&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/4452064648264959821/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/03/kali-undercover.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/4452064648264959821'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/4452064648264959821'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/03/kali-undercover.html' title='Kali Undercover'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-5568624487237906132</id><published>2026-03-13T09:09:00.000-07:00</published><updated>2026-03-13T09:09:00.136-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Kali&#39;s Default Credentials</title><content type='html'>&lt;p&gt;&lt;img src=&quot;https://www.bleepstatic.com/content/hl-images/2022/02/14/kali-bright.jpg&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Kali changed to a &lt;a href=&quot;https://www.kali.org/docs/policy/kali-linux-user-policy/&quot;&gt;non-root user policy&lt;/a&gt;by default &lt;a href=&quot;https://www.kali.org/blog/kali-default-non-root-user/&quot;&gt;since the release of &lt;strong&gt;2020.1&lt;/strong&gt;&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;This means:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;p&gt;During the installation of &lt;a href=&quot;https://www.kali.org/docs/installation/&quot;&gt;&lt;strong&gt;amd64&lt;/strong&gt; images&lt;/a&gt;, it will prompt you for a standard user account to be created.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Any default operating system credentials used during &lt;strong&gt;Live Boot&lt;/strong&gt;, or &lt;strong&gt;pre-created image&lt;/strong&gt; (like &lt;strong&gt;&lt;a href=&quot;https://www.kali.org/docs/virtualization/&quot;&gt;Virtual Machines&lt;/a&gt;&lt;/strong&gt; &amp;amp; &lt;strong&gt;&lt;a href=&quot;https://www.kali.org/docs/arm/&quot;&gt;ARM&lt;/a&gt;&lt;/strong&gt;) will be:&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;User: &lt;code&gt;kali&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Password: &lt;code&gt;kali&lt;/code&gt;&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;strong&gt;Vagrant&lt;/strong&gt; image &lt;em&gt;(based on their &lt;a href=&quot;https://www.vagrantup.com/docs/boxes/base.html&quot;&gt;policy&lt;/a&gt;)&lt;/em&gt;:&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;Username: &lt;code&gt;vagrant&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Password: &lt;code&gt;vagrant&lt;/code&gt;&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;a href=&quot;https://www.kali.org/docs/cloud/aws/&quot;&gt;Amazon &lt;strong&gt;EC2&lt;/strong&gt;&lt;/a&gt;:&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;User: &lt;code&gt;kali&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Password: &lt;code&gt;&amp;lt;ssh key&amp;gt;&lt;/code&gt;&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt; &lt;/ul&gt; &lt;a href=&quot;https://www.kali.org/docs/introduction/default-credentials/#default-tool-credentials&quot;&gt;   &lt;h4&gt;Default Tool Credentials&lt;/h4&gt; &lt;/a&gt;  &lt;p&gt;Some tools shipped with Kali, will use their own default hardcoded credentials (others will generate a new password the first time its used). The following tools have the default values:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;p&gt;&lt;a href=&quot;https://www.kali.org/tools/beef-xss/&quot;&gt;BeEF-XSS&lt;/a&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;Username: &lt;code&gt;beef&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Password: &lt;code&gt;beef&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Configuration File: &lt;code&gt;/etc/beef-xss/config.yaml&lt;/code&gt;&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;MySQL&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;User: &lt;code&gt;root&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Password: &lt;code&gt;&lt;/code&gt;&lt;em&gt;(blank)&lt;/em&gt;&lt;/li&gt;        &lt;li&gt;Setup Program: &lt;code&gt;mysql_secure_installation&lt;/code&gt;&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;a href=&quot;https://www.kali.org/tools/gvm/&quot;&gt;OpenVAS&lt;/a&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;Username: &lt;code&gt;admin&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Password: &lt;code&gt;&amp;lt;Generated during setup&amp;gt;&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Setup Program: &lt;code&gt;openvas-setup&lt;/code&gt;&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;a href=&quot;https://www.kali.org/tools/metasploit-framework/&quot;&gt;Metasploit-Framework&lt;/a&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;Username: &lt;code&gt;postgres&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Password: &lt;code&gt;postgres&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Configuration File: &lt;code&gt;/usr/share/metasploit-framework/config/database.yml&lt;/code&gt;&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;PowerShell-Empire/Starkiller&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;Username: &lt;code&gt;empireadmin&lt;/code&gt;&lt;/li&gt;        &lt;li&gt;Password: &lt;code&gt;password123&lt;/code&gt;&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;hr /&gt;  &lt;p&gt;For versions of Kali Linux older than &lt;a href=&quot;https://www.kali.org/blog/kali-linux-2020-1-release/&quot;&gt;2020.1&lt;/a&gt;, here is our &lt;a href=&quot;https://www.kali.org/docs/introduction/kali-linux-default-passwords/&quot;&gt;previous credential information&lt;/a&gt; and &lt;a href=&quot;https://www.kali.org/docs/policy/kali-linux-root-user-policy/&quot;&gt;root policy&lt;/a&gt;information.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/5568624487237906132/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/03/kalis-default-credentials.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/5568624487237906132'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/5568624487237906132'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/03/kalis-default-credentials.html' title='Kali&#39;s Default Credentials'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-7340156098679515655</id><published>2026-03-06T08:07:00.000-08:00</published><updated>2026-03-06T08:07:00.118-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Download Kali Linux Images Securely</title><content type='html'>&lt;p&gt;&lt;img alt=&quot;Kali Linux, una &amp;quot;navaja suiza&amp;quot; para unos héroes que no merecemos: los  hackers éticos&quot; src=&quot;https://cdn.computerhoy.com/sites/navi.axelspringer.es/public/media/image/2025/02/kali-linux-4293862.jpg?tf=3840x&quot; /&gt;&lt;/p&gt;  &lt;p&gt;When you download an image, be sure to download the &lt;strong&gt;SHA256SUMS&lt;/strong&gt; and &lt;strong&gt;SHA256SUMS.gpg&lt;/strong&gt; files that are next to the downloaded image (i.e. in the same directory on the &lt;a href=&quot;http://cdimage.kali.org/&quot;&gt;Kali Linux Download Server&lt;/a&gt;). Before verifying the checksums of the image, you must ensure that the SHA256SUMS file is the one generated by Kali. That’s why the file is signed by Kali’s official key with a detached signature in SHA256SUMS.gpg. Kali’s official key can be downloaded like so:&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;$ wget -q -O - https://archive.kali.org/archive-key.asc &lt;b&gt;|&lt;/b&gt; gpg --import
# or...
$ gpg --keyserver hkps://keyserver.ubuntu.com --recv-key 827C8569F2518CC677FECA1AED65462EC8D5E4C5
# ...and verify that the displayed fingerprint matches the one below
$ gpg --fingerprint 827C8569F2518CC677FECA1AED65462EC8D5E4C5
pub   rsa4096 2025-04-17 [SC] [expires: 2028-04-17]
      827C 8569 F251 8CC6 77FE  CA1A ED65 462E C8D5 E4C5
uid           [ unknown] Kali Linux Archive Automatic Signing Key (2025) 
&amp;lt;/DEVEL@KALI.ORG&amp;gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Once you have downloaded both &lt;strong&gt;SHA256SUMS&lt;/strong&gt; and &lt;strong&gt;SHA256SUMS.gpg&lt;/strong&gt;, you can verify the signature as follows:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ wget -q https://cdimage.kali.org/current/SHA256SUMS{.gpg,}
$ gpg --verify SHA256SUMS.gpg SHA256SUMS
gpg: Signature made Sun 20 Apr 2025 16:00:00 GMT
gpg:                using RSA key 827C8569F2518CC677FECA1AED65462EC8D5E4C5
gpg: Good signature from &amp;quot;Kali Linux Archive Automatic Signing Key (2025) &amp;lt;devel@kali.org&amp;gt;&amp;quot; [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;If you don’t get that “Good signature” message or if the key ID doesn’t match, then you should stop the process and review whether you downloaded the images from a legitimate Kali mirror.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/7340156098679515655/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/03/download-kali-linux-images-securely.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/7340156098679515655'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/7340156098679515655'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/03/download-kali-linux-images-securely.html' title='Download Kali Linux Images Securely'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-2001756119383976218</id><published>2026-02-27T08:04:00.000-08:00</published><updated>2026-02-27T08:04:00.115-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Downloading Kali Linux</title><content type='html'>&lt;p&gt;&lt;img src=&quot;https://www.kali.org/blog/kali-linux-modern-wsl/images/kali-linux-modern-wsl.jpg&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;IMPORTANT! Never download Kali Linux images from anywhere other than the official sources. Always be sure to verify the SHA256 checksums of the file you’ve downloaded against our &lt;a href=&quot;https://www.kali.org/docs/introduction/download-images-securely/&quot;&gt;official values&lt;/a&gt;. It would be easy for a malicious entity to modify a Kali installation to contain exploits or malware and host it unofficially.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#where-to-get-official-kali-linux-images&quot;&gt;   &lt;h6&gt;Where to Get Official Kali Linux Images&lt;/h6&gt; &lt;/a&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#iso-files-for-intel-based-pcs&quot;&gt;   &lt;h6&gt;ISO Files for Intel-based PCs&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;In order to run Kali “Live” from a &lt;a href=&quot;https://www.kali.org/docs/usb/&quot;&gt;USB drive&lt;/a&gt;on standard Windows and Apple PCs, you’ll need a Kali Linux &lt;a href=&quot;https://www.kali.org/docs/installation/&quot;&gt;bootable ISO image&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;The Kali Linux images are available as directly downloadable “.iso/.img” files or via “.torrent” files.&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;&lt;a href=&quot;https://www.kali.org/get-kali/&quot;&gt;Official Kali ISOs for Intel-based PCs&lt;/a&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Building your own Kali Linux ISO, standard or customized, is &lt;a href=&quot;https://www.kali.org/docs/development/live-build-a-custom-kali-iso/&quot;&gt;a very simple process&lt;/a&gt;.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#virtual-machines-images&quot;&gt;   &lt;h6&gt;Virtual Machines Images&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;If you want to run Kali Linux as a “guest” under &lt;a href=&quot;https://www.kali.org/docs/virtualization/&quot;&gt;VMware or VirtualBox&lt;/a&gt;, Kali Linux is available as a pre-built virtual machines with any guest tools already installed.&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;&lt;a href=&quot;https://www.kali.org/get-kali/#kali-virtual-machines&quot;&gt;Official Kali Linux VMware and VirtualBox Images&lt;/a&gt;&lt;/li&gt; &lt;/ul&gt; &lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#arm-images&quot;&gt;   &lt;h6&gt;ARM Images&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;The hardware architectures of &lt;a href=&quot;https://www.kali.org/docs/arm/&quot;&gt;ARM-based devices&lt;/a&gt;vary considerably, so it is not possible to have a single image that will work across all of them. Pre-built Kali Linux images for the &lt;a href=&quot;https://www.kali.org/get-kali/&quot;&gt;ARM architecture&lt;/a&gt; are available for a wide range of devices.&lt;/p&gt;  &lt;p&gt;Scripts for building your own ARM images locally are also &lt;a href=&quot;https://gitlab.com/kalilinux/build-scripts/kali-arm&quot;&gt;available on GitLab&lt;/a&gt;. For more details, see the articles on &lt;a href=&quot;https://www.kali.org/docs/development/arm-cross-compilation-environment/&quot;&gt;setting up an ARM cross-compilation environment&lt;/a&gt; and &lt;a href=&quot;https://www.kali.org/docs/development/kali-linux-arm-chroot/&quot;&gt;building a custom Kali Linux ARM chroot&lt;/a&gt;.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#verifying-your-downloaded-kali-image&quot;&gt;   &lt;h6&gt;Verifying Your Downloaded Kali Image&lt;/h6&gt; &lt;/a&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#why-do-i-need-to-do-this&quot;&gt;   &lt;h6&gt;Why do I need to do this?&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;Before you run Kali Linux Live, or install it to your hard disk, you want to be very sure that what you’ve got actually &lt;em&gt;is&lt;/em&gt; Kali Linux, and not an imposter. Kali Linux is a professional penetration testing and forensics toolkit. As a professional penetration tester, having absolute confidence in the integrity of your tools is critical: if your tools are not trustworthy, your investigations will not be trustworthy, either.&lt;/p&gt;  &lt;p&gt;Moreover, as the leading penetration testing distribution, Kali’s strengths mean that a bogus version of Kali Linux could do &lt;em&gt;a tremendous amount of damage&lt;/em&gt; if it were deployed unwittingly. There are plenty of people with plenty of reason to want to stick very sketchy stuff into something that &lt;em&gt;looks&lt;/em&gt; like Kali, and you absolutely do not want to find yourself running something like that.&lt;/p&gt;  &lt;p&gt;Avoiding this is simple:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;&lt;em&gt;Only&lt;/em&gt; download Kali Linux via the official download page at &lt;a href=&quot;https://www.kali.org/get-kali/&quot;&gt;kali.org/get-kali/&lt;/a&gt; - you will not be able to browse to these pages without SSL; encrypting the connection makes it much harder for an attacker to use a “man-in-the-middle” attack to modify your download. There are a few potential weaknesses to even these sources - see the sections on verifying the download with the SHA256SUMS file and its signature against the official Kali Development team private key for something much closer to absolute assurance. &lt;/li&gt;    &lt;li&gt;Once you’ve downloaded an image, and &lt;em&gt;before you run it&lt;/em&gt;, &lt;em&gt;always&lt;/em&gt; validate that it really &lt;em&gt;is&lt;/em&gt; what it’s supposed to be by verifying its checksum using one of the procedures detailed below.&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;There are several methods for verifying your download. Each provides a certain level of assurance, and involves a corresponding level of effort on your part. We list 3 of these methods below:&lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;     &lt;p&gt;You can download an ISO image from an official Kali Linux “Downloads” mirror, calculate the ISO’s SHA256 hash and compare it by inspection with the value listed on the Kali Linux site. This is quick and easy, but potentially susceptible to subversion via a &lt;a href=&quot;https://en.wikipedia.org/wiki/DNS_spoofing#Cache_poisoning_attacks&quot;&gt;DNS poisoning&lt;/a&gt;: it assumes that the site to which, for example, the domain “kali.org” resolves is in fact the actual Kali Linux site. If it somehow were not, an attacker could present a “loaded” image and a matching SHA256 signature on the fake web page. See the section “Manually Verify the Signature on the ISO (Direct Download)”, below.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;You can download an ISO image through the torrents, and it will also pull down a file - unsigned - containing the calculated SHA256 signature. You can then use the shasum command (on Linux and macOS) or a utility (on Windows) to automatically verify that the file’s computed signature matches the signature in the secondary file. This is even easier than the “manual” method, but suffers from the same weakness: if the torrent you pulled down is not really Kali Linux, it could still have a good signature. See the section “Verify the Signature on the ISO Using the Included Signature File (Torrent Download)”, below.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;To be as close to absolutely certain as possible that the Kali Linux download you’ve obtained is the real thing, you can download both a cleartext signature file and and version of the same file that has been signed with the official Kali Linux private key and use GNU Privacy Guard (GPG) to first, verify that the computed SHA256 signature and the signature in the cleartext file match and second, verify that the signed version of the file containing the SHA256 hash has been correctly signed with the official key.&lt;/p&gt;   &lt;/li&gt; &lt;/ol&gt;  &lt;p&gt;If you use this more complicated process and successfully validate your downloaded ISO, you can proceed with pretty complete assurance that what you’ve got is the official image and that it has not been tampered with in any way. This method, while the most complex, has the advantage of providing independent assurance of the integrity of the image. The only way this method can fail is if the official Kali Linux private key is not only subverted by an attacker, but also not subsequently revoked by the Kali Linux development team. For this method, see the section on verification using the SHA256SUMS file.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#_what_-do-i-need-to-do-this&quot;&gt;   &lt;h6&gt;&lt;em&gt;What&lt;/em&gt; do I need to do this?&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;If you’re running on Linux, you probably already have &lt;a href=&quot;https://www.gnupg.org/&quot;&gt;GPG&lt;/a&gt; (GNU Privacy Guard) installed. If you’re on Windows or macOS, you’ll need to install the appropriate version for your platform.&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;If you’re on a PC running Windows, download and install GPG4Win from &lt;a href=&quot;https://gpg4win.org/download.html&quot;&gt;here&lt;/a&gt;. &lt;/li&gt;    &lt;li&gt;If you’re on a Macintosh running macOS, download and install GPGTools from &lt;a href=&quot;https://gpgtools.org/&quot;&gt;here&lt;/a&gt;. Alternatively, if you have &lt;a href=&quot;https://brew.sh/&quot;&gt;Homebrew&lt;/a&gt;installed, just run &lt;code&gt;brew install gnupg&lt;/code&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Once you’ve installed GPG, you’ll need to download and import a copy of the Kali Linux official key. Do this with the following command:&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;$ wget -q -O - https://archive.kali.org/archive-key.asc | gpg --import
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;or the command&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ gpg --keyserver hkps://keys.openpgp.org --recv-key 827C8569F2518CC677FECA1AED65462EC8D5E4C5
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Your output should look like this:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;gpg: key ED65462EC8D5E4C5: public key &amp;quot;Kali Linux Archive Automatic Signing Key (2025) &amp;lt;devel@kali.org&amp;gt;&amp;quot; imported
gpg: Total number processed: 1
gpg:               imported: 1  (RSA: 1)
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Verify that the key is properly installed with the command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ gpg --fingerprint 827C8569F2518CC677FECA1AED65462EC8D5E4C5
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;The output will look like this:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;pub   rsa4096 2025-04-17 [SC] [expires: 2028-04-17]
      827C 8569 F251 8CC6 77FE  CA1A ED65 462E C8D5 E4C5
uid           [ unknown] Kali Linux Archive Automatic Signing Key (2025) &amp;lt;devel@kali.org&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;You’re now set up to validate your Kali Linux download.&lt;/p&gt;


&lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#how-do-i-verify-my-downloaded-image&quot;&gt;
  &lt;h6&gt;How Do I Verify My Downloaded Image?&lt;/h6&gt;
&lt;/a&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#manually-verify-the-signature-on-the-iso-direct-download&quot;&gt;
  &lt;h6&gt;Manually Verify the Signature on the ISO (Direct Download)&lt;/h6&gt;
&lt;/a&gt;

&lt;p&gt;If you downloaded the ISO directly from the downloads page, verify it using the following procedure.&lt;/p&gt;

&lt;p&gt;On Linux, or macOS, you can generate the SHA256 checksum from the ISO image you’ve downloaded with the following command (assuming that the ISO image is named “kali-linux-2025.2-live-amd64.iso”, and is in your current directory):&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ shasum -a 256 kali-linux-2025.2-live-amd64.iso
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;The output should look like this:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;68f1117052bb0a6aa0fc0dee3b6525de1f5bccbd74c275fb050fe357a3f318a7  kali-linux-2025.2-live-amd64.iso
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;On Windows, you can open the command prompt and run&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;certutil -?
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;If certutil is available, you can run:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;certutil -hashfile kali-linux-2025.2-live-amd64.iso sha256
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;To verify your download. Certain versions of Windows do not have the native ability to calculate SHA256 checksums. If you do not have &lt;code&gt;certutil&lt;/code&gt; installed, you can use a utility such as &lt;a href=&quot;http://www.microsoft.com/en-us/download/details.aspx?id=11533&quot;&gt;Microsoft File Checksum Integrity Verifier&lt;/a&gt;or &lt;a href=&quot;http://implbits.com/products/hashtab/&quot;&gt;Hashtab&lt;/a&gt;to verify your download.&lt;/p&gt;

&lt;p&gt;The resulting SHA256 signature:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;68f1117052bb0a6aa0fc0dee3b6525de1f5bccbd74c275fb050fe357a3f318a7
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Can be seen to match the signature displayed in the “sha256sum” section on the official download page for the 64-bit Intel architecture Kali Linux 2025.2 ISO image:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/kali-download-iso-2025-2.png&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/kali-download-iso-2025-2.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;


&lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#verify-the-signature-on-the-iso-using-the-included-signature-file-torrent-download&quot;&gt;
  &lt;h6&gt;Verify the Signature on the ISO Using the Included Signature File (Torrent Download)&lt;/h6&gt;
&lt;/a&gt;

&lt;p&gt;If you downloaded your copy of the Kali Linux ISO image via the torrents, in addition to the ISO file (e.g. kali-linux-2025.2-live-amd64.iso), there will be a second file containing the computed SHA256 signature for the ISO, with the extension “.txt.sha256sum” (e.g. kali-linux-2025.2-live-amd64.txt.sha256sum).&lt;/p&gt;

&lt;p&gt;You can use this file to verify the authenticity of your download on Linux or macOS with the following command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ grep kali-linux-2025.2-live-amd64.iso kali-linux-2025.2-live-amd64.txt.sha256sum | shasum -a 256 -c
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;If the image is successfully authenticated, the response will look like this:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;kali-linux-2025.2-live-amd64.iso: OK
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;For Windows, provided you have &lt;code&gt;certutil&lt;/code&gt; you can use the command above and then manually check the contents of the txt file to see if the two SHA256 sums match. If &lt;code&gt;certutil&lt;/code&gt; is not available, any of the tools stated above would be able to provide you the SHA256 sum of your download.&lt;/p&gt;

&lt;p&gt;IMPORTANT! If you are unable to verify the authenticity of the Kali Linux image you have downloaded as described in the preceding section, do NOT use it! Using it could endanger not only your own system, but any network you connect to as well as the other systems on that network. Stop, and ensure that you have downloaded the images from a legitimate Kali Linux mirror.&lt;/p&gt;


&lt;a href=&quot;https://www.kali.org/docs/introduction/download-official-kali-linux-images/#verify-the-iso-using-the-sha256sums-file&quot;&gt;
  &lt;h6&gt;Verify the ISO Using the SHA256SUMS File&lt;/h6&gt;
&lt;/a&gt;

&lt;p&gt;If using Powershell on Windows you may receive a fully uppercase result. This can cause an error when comparing the two sums. Send this result through a &lt;a href=&quot;https://convertcase.net/&quot;&gt;converter&lt;/a&gt;to get a proper result.&lt;/p&gt;

&lt;p&gt;This is a more complex procedure, but offers a much higher level of validation: it does not rely on the integrity of the web site you downloaded the image from, only the official Kali Linux development team key that you install independently. To verify your image this way for an Intel architecture version of Kali, you will need to download three files from the &lt;a href=&quot;http://cdimage.kali.org/current/&quot;&gt;Kali “Live CD Image” site for the current release&lt;/a&gt; (v2025.2, as of this writing):&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;The ISO image itself (e.g. kali-linux-2025.2-live-amd64.iso) &lt;/li&gt;

  &lt;li&gt;The file containing the calculated SHA256 hash for the ISO, SHA256SUMS &lt;/li&gt;

  &lt;li&gt;The signed version of that file, SHA256SUMS.gpg&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Before verifying the checksums of the image, you must ensure that the SHA256SUMS file is the one generated by Kali Linux. That’s why the file is signed by Kali’s official key with a detached signature in SHA256SUMS.gpg. If you have not already done so, Kali’s official key can be downloaded and imported into your keychain with this command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ wget -q -O - https://archive.kali.org/archive-key.asc | gpg --import
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;or this command&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ gpg --keyserver hkps://keys.openpgp.org --recv-key 827C8569F2518CC677FECA1AED65462EC8D5E4C5
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Your output should look like this:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;gpg: key ED65462EC8D5E4C5: public key &amp;quot;Kali Linux Archive Automatic Signing Key (2025) &amp;lt;devel@kali.org&amp;gt;&amp;quot; imported
gpg: Total number processed: 1
gpg:               imported: 1  (RSA: 1)
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;You should verify that the key is properly installed with the command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ gpg --fingerprint 827C8569F2518CC677FECA1AED65462EC8D5E4C5
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;The output will look like this:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;pub   rsa4096 2025-04-17 [SC] [expires: 2028-04-17]
      827C 8569 F251 8CC6 77FE  CA1A ED65 462E C8D5 E4C5
uid           [ unknown] Kali Linux Archive Automatic Signing Key (2025) &amp;lt;devel@kali.org&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Once you have downloaded both SHA256SUMS and SHA256SUMS.gpg, you can verify the signature as follows:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ gpg --verify SHA256SUMS.gpg SHA256SUMS
gpg: Signature made Sun Apr 20 16:00:00 2025 EDT
gpg:                using RSA key 827C8569F2518CC677FECA1AED65462EC8D5E4C5
gpg: Good signature from &amp;quot;Kali Linux Archive Automatic Signing Key (2025) &amp;lt;devel@kali.org&amp;gt;&amp;quot; [unknown]
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;If you do not get that “Good signature” message or if the key ID does not match, then you should stop and review whether you downloaded the images from a legitimate Kali Linux mirror. The failed verification strongly suggests that the image you have may have been tampered with.&lt;/p&gt;

&lt;p&gt;If you did get the “Good signature” response, you can now be assured that the checksum in the SHA256SUMS file was actually provided by the Kali Linux development team. All that remains to be done to complete the verification is to validate that the signature you compute from the ISO you’ve downloaded matches the one in the SHA256SUMS file. You can do that on Linux or macOS with the following command (assuming that the ISO is named “kali-linux-2025.2-live-amd64.iso” and is in your working directory):&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ grep kali-linux-2025.2-live-amd64.iso SHA256SUMS | shasum -a 256 -c
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;If the image is successfully authenticated, the response will look like this:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;kali-linux-2025.2-live-amd64.iso: OK
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;If you do not get “OK” in response, then stop and review what’s happened: the Kali image you have has apparently been tampered with. Do NOT use it.&lt;/p&gt;

&lt;p&gt;Once you’ve downloaded and verified your image, you can &lt;a href=&quot;https://www.kali.org/docs/usb/live-usb-install-with-windows/&quot;&gt;proceed to create a bootable “Kali Linux Live” USB drive&lt;/a&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/2001756119383976218/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/02/downloading-kali-linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/2001756119383976218'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/2001756119383976218'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/02/downloading-kali-linux.html' title='Downloading Kali Linux'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-4451339759451424902</id><published>2026-02-20T08:02:00.000-08:00</published><updated>2026-02-20T08:02:00.132-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><title type='text'>Kali Linux: Which Image Should I Download?</title><content type='html'>&lt;p&gt;&lt;img alt=&quot;Novedades de Kali Linux 2024.2&quot; src=&quot;https://www.redeszone.net/app/uploads-redeszone.net/2024/06/novedades-kali-linux-2024-2.jpg?x=500&amp;amp;y=295&amp;amp;quality=80&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;In this section, we will describe the process of installing Kali Linux on 64-bit hardware using the images published on the &lt;a href=&quot;https://www.kali.org/get-kali/&quot;&gt;Kali Linux download page&lt;/a&gt;.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/#content&quot;&gt;   &lt;h6&gt;Content&lt;/h6&gt; &lt;/a&gt;  &lt;ul&gt;   &lt;li&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/#which-image-to-choose&quot;&gt;Which image to choose&lt;/a&gt;&lt;/li&gt;    &lt;li&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/#which-desktop-environment-and-metapackages-to-choose-during-installation&quot;&gt;Which desktop environment and software collection to choose during installation&lt;/a&gt;&lt;/li&gt; &lt;/ul&gt;  &lt;hr /&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/#which-image-to-choose&quot;&gt;   &lt;h6&gt;Which Image to Choose&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;The &lt;a href=&quot;https://www.kali.org/get-kali/&quot;&gt;Kali Linux download page&lt;/a&gt;offers different image types (&lt;strong&gt;Installer&lt;/strong&gt;, &lt;strong&gt;NetInstaller&lt;/strong&gt; and &lt;strong&gt;Live&lt;/strong&gt;) for download, each available for the x86-64 (ie. 64-bit) architecture. Additionally, there is an &lt;strong&gt;Everything&lt;/strong&gt; flavor of the &lt;em&gt;Installer&lt;/em&gt; and &lt;em&gt;Live&lt;/em&gt; images.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;If in doubt, use the “Installer” image&lt;/strong&gt;.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/#installer&quot;&gt;   &lt;h6&gt;Installer&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;&lt;strong&gt;This is the recommended image to install Kali Linux&lt;/strong&gt;. It contains a local copy of the &lt;a href=&quot;https://www.kali.org/docs/general-use/metapackages/&quot;&gt;(meta)packages&lt;/a&gt;listed (top10, default &amp;amp; large) so it can be used for &lt;strong&gt;complete offline installations&lt;/strong&gt; without the need of a network connection.&lt;/p&gt;  &lt;p&gt;This image &lt;strong&gt;cannot be used to boot a live system&lt;/strong&gt; &lt;em&gt;(such as directly running Kali from a USB)&lt;/em&gt;. It is &lt;strong&gt;only&lt;/strong&gt; an installer image.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/#netinstaller&quot;&gt;   &lt;h6&gt;NetInstaller&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;This image can be used if you want the latest package &lt;strong&gt;every time you install&lt;/strong&gt; Kali Linux or the standard installer image is too big to download. This image is very small because it does not contain a local copy of &lt;a href=&quot;https://www.kali.org/docs/general-use/metapackages/&quot;&gt;(meta)packages&lt;/a&gt;to install. They will all be downloaded during installation, so as a result this requires a network connection which will slow down the installation time.&lt;/p&gt;  &lt;p&gt;Only use this image if you have reasons not to use the standard installer image above.&lt;/p&gt;  &lt;p&gt;This image &lt;strong&gt;cannot be used to boot a live system&lt;/strong&gt; &lt;em&gt;(such as directly running Kali from a USB)&lt;/em&gt;. It is &lt;strong&gt;only&lt;/strong&gt; an installer image.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/#live&quot;&gt;   &lt;h6&gt;Live&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;This image is for &lt;strong&gt;running Kali Linux without installing it first&lt;/strong&gt; so it is perfect for running off a &lt;a href=&quot;https://www.kali.org/docs/usb/&quot;&gt;USB drive&lt;/a&gt;&lt;em&gt;(or a CD/DVD)&lt;/em&gt;.&lt;/p&gt;  &lt;p&gt;You are able to install Kali Linux in its default configuration from this image but &lt;strong&gt;you will not be able to choose&lt;/strong&gt; between &lt;strong&gt;desktop environments&lt;/strong&gt; or to specify &lt;strong&gt;additional &lt;a href=&quot;https://www.kali.org/docs/general-use/metapackages/&quot;&gt;(meta)packages&lt;/a&gt;&lt;/strong&gt;to install.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/#everything&quot;&gt;   &lt;h6&gt;Everything&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;This image is meant for offline scenarios, when you want to use Kali Linux in a place that has no network connectivity. The image is &lt;em&gt;huge&lt;/em&gt; (more than 9GB), as it contains nearly all of Kali’s tools already. It can be downloaded via BitTorrent only.&lt;/p&gt;  &lt;p&gt;Kali “everything” is not exactly an image, it’s a flavor. You can download either the &lt;strong&gt;Installer Everything&lt;/strong&gt; image or the &lt;strong&gt;Live Everything&lt;/strong&gt; image. In both case, all the tools are already there, no need for an Internet connection.&lt;/p&gt;  &lt;hr /&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/#which-desktop-environment-and-metapackages-to-choose-during-installation&quot;&gt;   &lt;h6&gt;Which Desktop Environment and (Meta)Packages to Choose During Installation:&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;Each Kali Linux installer image &lt;em&gt;(not live)&lt;/em&gt; allows the user to select the preferred “Desktop Environment (DE)” and software collection (&lt;a href=&quot;https://www.kali.org/docs/general-use/metapackages/&quot;&gt;metapackages&lt;/a&gt;) to be installed with operating system (Kali Linux).&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;We recommend sticking with the default selections and add further packages after the installation as required&lt;/strong&gt;. &lt;code&gt;Xfce&lt;/code&gt; is the default desktop environment, and &lt;code&gt;kali-linux-top10&lt;/code&gt; and &lt;code&gt;kali-linux-default&lt;/code&gt; are the tools which get installed at the same time.&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/what-image-to-download/setup-default-metapackages.png&quot;&gt;&lt;img alt=&quot;&quot; src=&quot;https://www.kali.org/docs/introduction/what-image-to-download/setup-default-metapackages.png&quot; /&gt;&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;At this screen, you may wish to not install a desktop environment, then Kali Linux becomes “headless” (no graphic interface) which uses less system resources up and commonly found on servers, dropboxes, low powered ARM devices, and the cloud. This is meant for people who are completely comfortable with the command line. You are able to install multiple Desktop Environments, allowing you to switch, we wouldn’t recommend it. You may change your mind and &lt;a href=&quot;https://www.kali.org/docs/general-use/switching-desktop-environments/&quot;&gt;switch desktop environments&lt;/a&gt; at a later date.&lt;/p&gt;  &lt;p&gt;May wish to not to install any of the pre-defined software packages/bundles/collections (&lt;a href=&quot;https://www.kali.org/docs/general-use/metapackages/&quot;&gt;metapackages&lt;/a&gt;), giving you a finer degree of control of manually installing exactly what software you want. Alternatively you may want to be more prepared and install more than the default toolset. Please be aware, that there are more tools available in Kali which has be manually installed after the setup (as they all cannot be stored in the setup image).&lt;/p&gt;  &lt;p&gt;Overall, these extra choices are for a more efficient installation experience, meant for advanced users. Please be aware of their pitfalls.&lt;/p&gt;  &lt;hr /&gt;  &lt;p&gt;The following sections in the “Kali Documentation Installation” of this documentation, will be using the “Installer” image for the guides unless stated otherwise.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/4451339759451424902/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/02/kali-linux-which-image-should-i-download.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/4451339759451424902'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/4451339759451424902'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/02/kali-linux-which-image-should-i-download.html' title='Kali Linux: Which Image Should I Download?'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-1921453773668084724</id><published>2026-02-13T08:01:00.000-08:00</published><updated>2026-02-13T08:01:00.117-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Should I Use Kali Linux?</title><content type='html'>&lt;p&gt;&lt;img src=&quot;https://www.redeszone.net/app/uploads-redeszone.net/2020/11/kali-linux-2020-4.jpg&quot; /&gt;&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/should-i-use-kali-linux/#whats-different-about-kali-linux&quot;&gt;   &lt;h6&gt;What’s Different About Kali Linux?&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;Kali Linux is specifically geared to meet the requirements of professional penetration testing and security auditing. To achieve this, several core changes have been implemented in Kali Linux which reflect these needs:&lt;/p&gt;  &lt;ol&gt;   &lt;li&gt;     &lt;p&gt;&lt;strong&gt;Network services disabled by default:&lt;/strong&gt; Kali Linux contains systemd hooks that &lt;a href=&quot;https://www.kali.org/docs/policy/kali-linux-network-service-policy/&quot;&gt;disable network services&lt;/a&gt;by default. These hooks allow us to install various services on Kali Linux, while ensuring that our distribution remains secure by default, no matter what packages are installed. Additional services such as Bluetooth are also blocklisted by default.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;strong&gt;Custom Linux kernel:&lt;/strong&gt; Kali Linux uses an upstream kernel, patched for wireless injection.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;strong&gt;A &lt;em&gt;minimal&lt;/em&gt; and &lt;em&gt;trusted&lt;/em&gt; set of repositories:&lt;/strong&gt; given the aims and goals of Kali Linux, maintaining the integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream software sources which Kali uses is &lt;a href=&quot;https://www.kali.org/docs/general-use/kali-linux-sources-list-repositories/&quot;&gt;kept to an absolute minimum&lt;/a&gt;. Many new Kali users are tempted to add additional repositories to their &lt;strong&gt;sources.list&lt;/strong&gt;, but doing so runs a &lt;em&gt;very serious risk&lt;/em&gt; of breaking your Kali Linux installation.&lt;/p&gt;   &lt;/li&gt; &lt;/ol&gt; &lt;a href=&quot;https://www.kali.org/docs/introduction/should-i-use-kali-linux/#is-kali-linux-right-for-you&quot;&gt;   &lt;h6&gt;Is Kali Linux Right For You?&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;As the distribution’s developers, you might expect us to recommend that everyone should be using Kali Linux. The fact of the matter is, however, that Kali is a Linux distribution specifically geared towards professional penetration testers and security specialists, and given its unique nature, it is &lt;strong&gt;NOT&lt;/strong&gt; a recommended distribution if you’re unfamiliar with Linux or are looking for a general-purpose Linux desktop distribution for development, web design, gaming, etc.&lt;/p&gt;  &lt;p&gt;Even for experienced Linux users, Kali can pose some challenges. Although Kali is an &lt;a href=&quot;https://www.kali.org/docs/policy/kali-linux-open-source-policy/&quot;&gt;open source project&lt;/a&gt;, it’s not a &lt;em&gt;wide&lt;/em&gt;-open source project, for reasons of security. The &lt;a href=&quot;https://www.kali.org/about-us/&quot;&gt;development team&lt;/a&gt;is small and trusted, packages in the repositories are signed both by the individual committer and the team, and - importantly - the set of upstream repositories from which updates and new packages are drawn is very small. Adding repositories to your software sources which have not been tested by the Kali Linux development team is a good way to cause problems on your system.&lt;/p&gt;  &lt;p&gt;While Kali Linux is architected to be &lt;a href=&quot;https://www.kali.org/docs/development/live-build-a-custom-kali-iso/&quot;&gt;highly customizable&lt;/a&gt;, do not expect to be able to add random unrelated packages and repositories that are “out of band” of the regular Kali software sources and have it Just Work. In particular, there is absolutely no support whatsoever for the apt-add-repository command, LaunchPad, or PPAs. Trying to install &lt;em&gt;&lt;strong&gt;Steam&lt;/strong&gt;&lt;/em&gt; on your Kali Linux desktop is an experiment that will not end well. Even getting a package as mainstream as NodeJS onto a Kali Linux installation can take &lt;a href=&quot;http://www.acme-dot.com/stupid-problems-deserve-stupid-solutions/&quot;&gt;a little extra effort and tinkering&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;If you are unfamiliar with Linux generally, if you do not have at least a basic level of competence in administering a system, if you are looking for a Linux distribution to use as a learning tool to get to know your way around Linux, or if you want a distro that you can use as a general purpose desktop installation, &lt;em&gt;Kali Linux is probably not what you are looking for&lt;/em&gt;.&lt;/p&gt;  &lt;p&gt;In addition, misuse of security and penetration testing tools within a network, particularly without specific authorization, may cause irreparable damage and result in significant consequences, personal and/or legal. “Not understanding what you were doing” is not going to work as an excuse.&lt;/p&gt;  &lt;p&gt;However, if you’re a professional penetration tester or are studying penetration testing with a goal of becoming a certified professional, there’s no better toolkit - at any price - than Kali Linux.&lt;/p&gt;  &lt;p&gt;Kali Linux is able to be used even if you are new to Linux. However, if you’re interested in getting hands-on with the internals of Linux, take a look at the &lt;a href=&quot;http://www.linuxfromscratch.org/&quot;&gt;Linux From Scratch&lt;/a&gt;project. Linux From Scratch is a great resource to start your Linux journey with.&lt;/p&gt;   &lt;a href=&quot;https://www.kali.org/docs/introduction/should-i-use-kali-linux/#summary&quot;&gt;   &lt;h6&gt;Summary&lt;/h6&gt; &lt;/a&gt;  &lt;p&gt;So, after having read this you should have figured out if &lt;strong&gt;Kali Linux&lt;/strong&gt; is the distribution you were looking for or at least got an idea about your choice.&lt;/p&gt;  &lt;p&gt;If still you have not figured it out, here is a summary that will hopefully remove your remaining doubts:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Kali Linux is made with &lt;strong&gt;pentesters&lt;/strong&gt; and &lt;strong&gt;pentesting&lt;/strong&gt; in mind so, expecting it to fit with your necessity &lt;em&gt;might&lt;/em&gt; not be as simple even though it’s completely possible. &lt;/li&gt;    &lt;li&gt;If you are new to &lt;strong&gt;Linux&lt;/strong&gt; or have less experience with &lt;strong&gt;command line&lt;/strong&gt; you might find Kali Linux to be not so user-friendly, even though our developers try to make it as user-friendly as possible some things might be intimidating to you if you are new. &lt;/li&gt;    &lt;li&gt;The developers always try to make Kali Linux as much hardware compatible as possible but, still some hardware/s &lt;em&gt;might not work&lt;/em&gt; as &lt;em&gt;expected&lt;/em&gt; or &lt;em&gt;not work at all&lt;/em&gt;. So, its better to &lt;strong&gt;research hardware compatibility&lt;/strong&gt; beforehand rather than breaking your computer later. &lt;/li&gt;    &lt;li&gt;If you are installing Kali Linux for the first time, it is recommended to install first in Virtual Machine then, after getting familiar with it, you can install it in your own hardware.&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Hopefully, now you know if you need to install &lt;strong&gt;Kali Linux&lt;/strong&gt; or not. If you have decided to install &lt;strong&gt;Kali Linux&lt;/strong&gt; then, we welcome you to our community.&lt;/p&gt;  &lt;p&gt;If not, then see you later, and remember always &lt;strong&gt;“Try Harder”&lt;/strong&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/1921453773668084724/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/02/should-i-use-kali-linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/1921453773668084724'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/1921453773668084724'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/02/should-i-use-kali-linux.html' title='Should I Use Kali Linux?'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-5821210917136336852</id><published>2026-02-06T07:56:00.000-08:00</published><updated>2026-02-06T07:56:00.113-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>What is Kali Linux?</title><content type='html'>&lt;img src=&quot;https://www.kali.org/images/notebook-kali-2024.1.jpg&quot; /&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/5821210917136336852/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/02/what-is-kali-linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/5821210917136336852'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/5821210917136336852'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/02/what-is-kali-linux.html' title='What is Kali Linux?'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-1392982398222868384</id><published>2026-01-30T10:41:00.000-08:00</published><updated>2026-01-30T10:41:00.115-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Debian"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>How to install Wireguard VPN in Debian?</title><content type='html'>&lt;p&gt;&lt;img src=&quot;https://cdn.mos.cms.futurecdn.net/Vo6wb23SMpP2HF3QQmAAmc.jpg&quot; /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/1392982398222868384/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/how-to-install-wireguard-vpn-in-debian.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/1392982398222868384'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/1392982398222868384'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/how-to-install-wireguard-vpn-in-debian.html' title='How to install Wireguard VPN in Debian?'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-131021796456923805</id><published>2026-01-23T10:39:00.000-08:00</published><updated>2026-01-23T10:39:00.120-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Graphic Tools"/><category scheme="http://www.blogger.com/atom/ns#" term="KDE"/><title type='text'>KDE Plasma 6.3 – Pixel Perfect!</title><content type='html'>&lt;p&gt;&lt;img src=&quot;https://www.linuxadictos.com/wp-content/uploads/Plasma-6.3.webp&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Plasma 6 aims to be the best desktop ever, and after a year of work, overcoming initial problems, fixing and perfecting, here&#39;s everything new and exciting this version brings.&lt;/p&gt;  &lt;p&gt;KDE Plasma aims to be the best platform for creativity and digital art, and Plasma 6.3 takes the next step in that direction by providing features that help artists optimize and customize their drawing tablets to their liking. The settings page has been revamped, split into multiple tabs for better organization, and new configuration options have been added to each section:&lt;/p&gt;  &lt;h4&gt;Digital art&lt;/h4&gt;  &lt;ul&gt;   &lt;li&gt;You can assign a specific area of the tablet screen to the entire screen area.&lt;/li&gt;    &lt;li&gt;The tablet calibration feature has been refined to produce more accurate calibrations&lt;/li&gt;    &lt;li&gt;The pen test function displays information about tilt and pressure&lt;/li&gt;    &lt;li&gt;Customize the pressure curve and range of a pencil to cut high and/or low parts&lt;/li&gt;    &lt;li&gt;You can also reassign or swap the functions of the pen buttons.&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Once you&#39;ve finished setting up your tablet, you can see the changes you&#39;ve made using the &#39;Highlight Changed Settings&#39; feature in System Settings, which is compatible with most sections of the drawing tablet.&lt;/p&gt;  &lt;h4&gt;Graphic appearance&lt;/h4&gt;  &lt;p&gt;The biggest news regarding graphics is a major overhaul of how fractional scaling works. In Plasma 6.3, KWin is better able to fit elements to the screen&#39;s pixel grid, greatly reducing blurring and producing sharper, more defined images.&lt;/p&gt;  &lt;p&gt;Display colors are now more accurate when using the Night Light feature with or without ICC profiles. KWin offers the option to choose the display color accuracy, although this may sometimes affect system performance.&lt;/p&gt;  &lt;p&gt;Widgets on the desktop are slightly translucent, as are pop-up windows for widgets on the dashboard.&lt;/p&gt;  &lt;h4&gt;Monitoring&lt;/h4&gt;  &lt;p&gt;The resource monitoring system provides more accurate information on CPU usage while consuming fewer resources. FreeBSD now also supports GPU usage monitoring.&lt;/p&gt;  &lt;p&gt;It&#39;s also much easier to monitor printers, as each printer&#39;s print queue is displayed directly in the widget. The widget also shows a small indicator on any printer currently printing, so you can see at a glance which ones are in use.&lt;/p&gt;  &lt;p&gt;Plasma already includes a variety of background services that let you know when something has gone wrong and what to do about it. New in Plasma 6.3 is a service that detects when the kernel has terminated an application because the system ran out of memory. The service displays a notification explaining what happened and suggesting ways to avoid this problem in the future.&lt;/p&gt;  &lt;h4&gt;Tools&lt;/h4&gt;  &lt;p&gt;Regarding specific tools:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;p&gt;&lt;strong&gt;KRunner&lt;/strong&gt; allows you to jump between categories using the Page Up/Page Down keys and the Ctrl+Up/Ctrl+Down key combinations.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;strong&gt;Discover&lt;/strong&gt; (Plasma App Store/Software Management). A security enhancement coming to Discover highlights sandboxed apps whose permissions have been changed after an update. This allows you to verify these changes in case you suspect any suspicious behavior. Similarly, you can now see whether apps are packaged directly by their developer or verified by a third party.&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;strong&gt;Weather widget&lt;/strong&gt; now supports Deutscher Wetterdienst as a source for weather data&lt;/p&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;h4&gt;Usability&lt;/h4&gt;  &lt;p&gt;If you use a mouse on your laptop, you can set the touchpad to automatically turn off. Additionally, if you set your computer as a network access point, Plasma generates a random password so you don&#39;t have to think of one.&lt;/p&gt;  &lt;p&gt;Finding help is easier in Plasma 6.3. A “Help” category has been added to the launcher (the menu typically on the left side of the panel), and we’ve completely removed the Settings category. Its contents have been merged into the System category, reducing the number of categories that don’t offer meaningful grouping.&lt;/p&gt;  &lt;p&gt;The default start menu changes categories only when you click on them, unlike the old behavior of changing them on mouse over, although the old behavior can also be enabled.&lt;/p&gt;  &lt;p&gt;The “Show Target” option has been added to the context menu for symbolic links.&lt;/p&gt;  &lt;p&gt;The Digital Clock widget displays all your planned events for the next 5 days (giving you a complete overview of your upcoming commitments).&lt;/p&gt;  &lt;p&gt;The notification system has been improved. When you exit Do Not Disturb mode, Plasma 6.3 will no longer overwhelm you with a torrent of notifications. Instead, it will show you the number of unreviewed notifications.&lt;/p&gt;  &lt;p&gt;To avoid overwhelming you with too much information, when notifications arrive while Plasma&#39;s Do Not Disturb mode is on, exiting Do Not Disturb mode displays the number of missed notifications instead of sending them all in one giant stream.&lt;/p&gt;  &lt;p&gt;Another subtle but important change is when you drag a file out of a window that&#39;s partially underneath other windows, it no longer jumps to the top, which could obscure the location you intended to drag it to. This means the destination window always has focus.&lt;/p&gt;  &lt;h4&gt;Personalization&lt;/h4&gt;  &lt;p&gt;It&#39;s now possible to clone panels, change their transparency, and change the screen they appear on via scripts, which adds a certain level of automation to your setup.&lt;/p&gt;  &lt;p&gt;It is now possible to change the icons for categories displayed in the menu using the menu editor, thus making the change introduced in Plasma 6.2 more flexible.&lt;/p&gt;  &lt;p&gt;The “Edit Application…” action you run from the start menu opens the menu editor, instead of showing you the file properties.&lt;/p&gt;  &lt;p&gt;If you&#39;ve ever lost a widget while customizing your system, you&#39;ll love this new feature: in Plasma 6.3, the Widget Browser gives you the ability to delete every instance of a widget, including those that have gone missing or are only present on disconnected screens.&lt;/p&gt;  &lt;p&gt;The Widget Explorer now gives you the ability to remove every instance of a widget, including those that have gone missing or are only present on disconnected screens, allowing for a cleaner setup.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/131021796456923805/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/kde-plasma-63-pixel-perfect.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/131021796456923805'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/131021796456923805'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/kde-plasma-63-pixel-perfect.html' title='KDE Plasma 6.3 – Pixel Perfect!'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-6660239712151558714</id><published>2026-01-16T10:29:00.000-08:00</published><updated>2026-01-16T10:29:00.112-08:00</updated><title type='text'>HeliumOS innovative atomic operating system releases version 10</title><content type='html'>&lt;p&gt;&lt;img alt=&quot;Laptop Mockup&quot; src=&quot;https://www.heliumos.org/static/www/images/mockup-laptop-color.svg&quot; /&gt;&lt;/p&gt;  &lt;p&gt;HeliumOS, an innovative atomic operating system that combines container technologies with immutable distros, is based on AlmaLinux and GNOME.&lt;/p&gt;  &lt;h4&gt;Key points&lt;/h4&gt;  &lt;p&gt; HeliumOS introduces a different paradigm in atomic operating systems.   &lt;br /&gt; Based on Alma Linux, it guarantees 10 years of enterprise support.    &lt;br /&gt; It uses innovative container technology called BootC.    &lt;br /&gt; It implements an immutable system that restricts modifications to critical directories.    &lt;br /&gt; It is available for installation from its website, with a process similar to Alma Linux.    &lt;br /&gt; It allows updates via containerized images.    &lt;br /&gt;️ It brings a GNOME desktop environment with familiar tools and applications.&lt;/p&gt;  &lt;h4&gt;Essential ideas&lt;/h4&gt;  &lt;p&gt; Installation Innovation: HeliumOS uses containerized images to simplify installation, eliminating the need for a base operating system. This makes it easier to deploy in virtualized and bare metal environments. ️   &lt;br /&gt;️ Combination of Technologies: By integrating container technologies with an atomic approach, HeliumOS introduces a new paradigm that can improve system management and updating. This combination holds promise for the future of desktop distributions.     &lt;br /&gt; Alpha Status: Although HeliumOS is functional, it is in an alpha state, meaning users should be aware of potential bugs and limitations. This suggests that it is still in development and may evolve. ⚠️    &lt;br /&gt;️ Installation Limitations: Due to its immutable nature, users can only install applications via Flatpak, which can be restrictive for those who prefer other installation methods.     &lt;br /&gt; Limited Documentation Access: Currently, documentation for HeliumOS is sparse, making it difficult to fully understand its features and operation. This can be a barrier for new users.     &lt;br /&gt; Immutability Philosophy: The immutability philosophy used in Helium OS ensures that the operating system does not degrade over time, but it may also deviate from traditional Unix principles. ⚖️    &lt;br /&gt; Embedded Systems Outlook: HeliumOS technology could be especially beneficial in managing embedded system updates, simplifying software deployment and maintenance on devices. &lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://distrowatch.com/heliumos&quot;&gt;HeliumOS&lt;/a&gt;is an atomic and immutable distribution which is built upon AlmaLinux OS. The project has published HeliumOS 10 which uses Btrfs as the default filesystem, zsh for the shell, and offers version 6.12 of the Linux kernel. &amp;quot;HeliumOS 10 has released with some notable changes from earlier alpha releases: Version 6.12 of the Linux kernel from AlmaLinux, signed for secure boot. zsh as default shell, with a polished and minimal configuration. BTRFS as default filesystem, with an option for LUKS full-disk encryption in the installer. Docker is installed by default, see our documentation for more details. HeliumOS build sources were migrated from a collection of Bash scripts to Ansible yaml. These are built using Podman into Bootable Container images... Two critical bugs were found and fixed during the HeliumOS 10 alpha + beta: fixed a bug through the use of HeliumOS &#39;Edge&#39; edition, some devices using NVIDIA GPUs previously experienced stuttering; automatically recovers from kernel panics resulting from a bug where systemd-remount-fs.service does not function properly on bootc systems.&amp;quot;&lt;/p&gt;  &lt;p&gt;&lt;iframe title=&quot;HeliumOS sistema operativo atómico innovador&quot; height=&quot;438&quot; allowfullscreen=&quot;allowfullscreen&quot; src=&quot;https://www.youtube.com/embed/3lc4uOXYqr4&quot; frameborder=&quot;0&quot; width=&quot;779&quot; referrerpolicy=&quot;strict-origin-when-cross-origin&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot;&gt;&amp;#160;&lt;/iframe&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://www.heliumos.org/&quot;&gt;source&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/6660239712151558714/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/heliumos-innovative-atomic-operating.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/6660239712151558714'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/6660239712151558714'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/heliumos-innovative-atomic-operating.html' title='HeliumOS innovative atomic operating system releases version 10'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/3lc4uOXYqr4/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-640856277852493867</id><published>2026-01-09T10:24:00.000-08:00</published><updated>2026-01-09T10:24:00.114-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Gnoppix AI Linux 25_8 released</title><content type='html'>&lt;p&gt;&lt;img alt=&quot;Dashboard image&quot; src=&quot;https://www.gnoppix.org/_astro/dashboard.CxHiVHei.jpg&quot; /&gt;    &lt;br /&gt;&lt;/p&gt;  &lt;p&gt;Gnoppix AI is a Debian-based Linux distribution that can be run from a DVD, USB drive, or local hard drive. It is designed to offer a privacy-focused, secure, powerful, intelligent, and easy-to-use experience, with pre-installed Artificial Intelligence (AI) frameworks, libraries, and development tools. It uses several popular desktop environments, including GNOME, KDE Plasma, and Xfce. The project is an attempt to revive a Knoppix-based live distribution running the GNOME desktop that was first released in 2005. Additionally, it offers services like Gnoppix DoH (DNS over HTTPS) to enhance online privacy and security.&lt;/p&gt;  &lt;p&gt;Andreas Mueller has announced the release of Gnoppix AI Linux 25_8, a major new update of the project&#39;s Debian-based distribution with focus on privacy and security, and with integrated artificial intelligence frameworks, libraries and development tools: &amp;quot;Gnoppix 25.8 is built on the foundation of Debian 13 &#39;Trixie&#39; and incorporates new features and improvements from the latest Gnoppix beta release. This new version brings significant updates in security, privacy and performance. Core system enhancements: Gnoppix 25.8 inherits the stability and updated packages from Debian 13, this includes over 11,294 new packages and updated versions for key software; new security hardening features against ROP and COP/JOP attacks are included; this release adds HTTP boot support for compatible UEFI and U-Boot firmware; the system now includes next-generation AI integration and has replaced the Bottles application with Lutris to address security concerns; Gnoppix now prioritizes privacy by default; Firefox-ESR as the main web browser; search-us.gnoppix.org is now the default anonymous search engine....&amp;quot;&lt;/p&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;h4&gt;OpenSource AI Agents are the way to go&lt;/h4&gt;  &lt;p&gt;OSS AI Agents represents the most viable and forward-thinking approach, fostering innovation, transparency, and collaboration while democratizing access to cutting-edge technology. Our focus is not on building a company centered around an AI solution, but rather on delivering a customized solution for your business that seamlessly aligns with and integrates into your existing workflows.&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;p&gt;&amp;lt;?XML:NAMESPACE PREFIX = &amp;quot;[default] http://www.w3.org/2000/svg&amp;quot; NS = &amp;quot;http://www.w3.org/2000/svg&amp;quot; /&amp;gt;&lt;/p&gt;      &lt;p&gt;Sustainability&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Compliance&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Seamless integrations&lt;/p&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;img alt=&quot;Feature image 1&quot; src=&quot;https://www.gnoppix.org/_astro/feature1.BSQPYE4g.jpg&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&lt;img alt=&quot;Feature image 2&quot; src=&quot;https://www.gnoppix.org/_astro/feature2.B877JAQ3.jpg&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&lt;img alt=&quot;Feature image 3&quot; src=&quot;https://www.gnoppix.org/_astro/feature3._FkwJo-D.jpg&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&lt;img alt=&quot;Feature image 4&quot; src=&quot;https://www.gnoppix.org/_astro/feature4.BKixjFKI.jpg&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&lt;img alt=&quot;Feature image 5&quot; src=&quot;https://www.gnoppix.org/_astro/feature5.C4bUztaB.jpg&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&lt;img alt=&quot;Feature image 6&quot; src=&quot;https://www.gnoppix.org/_astro/feature6.BIbncynQ.jpg&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Secure your investments&lt;/p&gt;  &lt;h4&gt;Handling Sensitive Data&lt;/h4&gt;  &lt;p&gt;Never input confidential, proprietary, or personally identifiable information (PII) into public AI tools, as this could lead to data leaks or breaches. We all know even OpenAI experienced a data breach—do you really want to upload your company secrets to a vendor whose core business revolves around data?&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;p&gt;Transparency and Trust&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Customizability and Flexibility&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;No Vendor Lock-In&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Enhanced Security&lt;/p&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Support and Training&lt;/p&gt;  &lt;h4&gt;Build &amp;amp; Launch without problems&lt;/h4&gt;  &lt;p&gt;Our Reliable IT support and training ensure seamless operations, boost productivity, and empower clients to leverage technology effectively, minimizing downtime and maximizing business potential.&lt;/p&gt;  &lt;p&gt;Get Started&lt;/p&gt;  &lt;p&gt;&lt;img alt=&quot;Feature image&quot; src=&quot;https://www.gnoppix.org/_astro/featuresdiagonal.DZzAYC16.jpg&quot; /&gt;&lt;/p&gt;  &lt;h4&gt;Gnoppix 23 Core Free&lt;/h4&gt;  &lt;p&gt;This is the Gnoppix community version, you can compare it with the PRO version but you have no access to our services.&lt;/p&gt;  &lt;p&gt;-free-&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Community Support &lt;/li&gt;    &lt;li&gt;Shared Download &lt;/li&gt;    &lt;li&gt;Basic AI support &lt;/li&gt;    &lt;li&gt;Based on Debian stable! &lt;/li&gt;    &lt;li&gt;Basic Images with tweaks from the PRO Version &lt;/li&gt;    &lt;li&gt;Basic privacy and security &lt;/li&gt;    &lt;li&gt;Unlimited installation&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;a href=&quot;https://sourceforge.net/projects/gnoppixng/files/releases/core/&quot;&gt;Get Gnoppix Free&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;By clicking here, I state that I have read and understood the terms and conditions.&lt;/p&gt;  &lt;h4&gt;Gnoppix ULTIMATE 25 Donation&lt;/h4&gt;  &lt;p&gt;Unlock Gnoppix Services. Your donation supports the community and continuous development.&lt;/p&gt;  &lt;p&gt;$ 39.99&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Early Access to all Gnoppix images (incl. Development XFCE, Gnome, KDE) &lt;/li&gt;    &lt;li&gt;Dedicated Download &lt;/li&gt;    &lt;li&gt;All Gnoppix Services included (e.g., VPN) &lt;/li&gt;    &lt;li&gt;Focused on your privacy and Indestructible &lt;/li&gt;    &lt;li&gt;You support the Gnoppix community &lt;/li&gt;    &lt;li&gt;LTS Support till 07/2030&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&lt;a href=&quot;https://gnoppix.org/downloadpro&quot;&gt;Gnoppix PRO&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;By clicking here, I state I have read and understood the terms and conditions.&lt;/p&gt;  &lt;p&gt;   &lt;br /&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://www.gnoppix.org/&quot;&gt;Source&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/640856277852493867/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/gnoppix-ai-linux-258-released.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/640856277852493867'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/640856277852493867'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/gnoppix-ai-linux-258-released.html' title='Gnoppix AI Linux 25_8 released'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-3696117226467816014</id><published>2026-01-02T10:18:00.000-08:00</published><updated>2026-01-02T10:18:00.117-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Ubuntu"/><title type='text'>Ubuntu 24.04.3 LTS arrives with Linux 6.14 from Ubuntu 25.04 and the latest patches</title><content type='html'>&lt;ul&gt;   &lt;li&gt;Ubuntu 24.04.3 LTS includes Linux kernel 6.14 and Mesa 25.0.7 for modernized hardware support.&lt;/li&gt;    &lt;li&gt;All security updates and bug fixes released to date are incorporated.&lt;/li&gt;    &lt;li&gt;The update includes notable fixes and improvements to graphics compatibility for AMD and Intel.&lt;/li&gt;    &lt;li&gt;Available for direct download and BitTorrent on the official website, also for other Ubuntu variants.&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;&amp;#160;&lt;/p&gt;  &lt;p&gt;&lt;img alt=&quot;Ubuntu 24.04&quot; src=&quot;https://www.linuxadictos.com/wp-content/uploads/Ubuntu-24.04.png&quot; width=&quot;1200&quot; height=&quot;651&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Ubuntu 24.04.3 LTS&lt;/strong&gt; is now officially available for download as the latest maintenance update for Canonical&#39;s popular distribution , specifically designed for those looking to install Ubuntu on new computers or create ready-to-use operating systems, comes with a full set of cumulative improvements and recent patches, eliminating the need to manually download and apply a large number of updates after the initial installation.&lt;/p&gt;  &lt;p&gt;Among the key features, the update integrates renewed hardware support thanks to its &lt;strong&gt;Linux 6.14 kernel&lt;/strong&gt; and the &lt;strong&gt;Mesa 25.0.7&lt;/strong&gt; graphics stack , both from Ubuntu 25.04. This is key for those with recent systems, as it adds improved drivers for both AMD Radeon graphics (via AMDGPU and RADV) and Intel devices through support for Vulkan 1.4 and AV1 playback in ANV.&lt;/p&gt;  &lt;h4&gt;Relevant updates and improvements in Ubuntu 24.04.3 LTS&lt;/h4&gt;  &lt;p&gt;This release, as is typical with Ubuntu LTS point releases, &lt;strong&gt;brings together all the security updates and bug fixes&lt;/strong&gt; released since the previous version, enabling rapid and secure deployment in desktop, server, and cloud environments. If you&#39;re already using Ubuntu 24.04 LTS and staying up to date with updates, there&#39;s no need to reinstall anything: your system already benefits from these improvements.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Mesa-amber&lt;/strong&gt; , a dedicated package , has been introduced to expand support for older graphics cards no longer supported in the main Mesa branch. Common bugs such as issues with the install button in the software updater, thumbnail previews, issues with touchscreens, and workarounds for Bluetooth audio connections have also been fixed.&lt;/p&gt;  &lt;h4&gt;Extended support and lifecycle&lt;/h4&gt;  &lt;p&gt;Ubuntu 24.04.3 LTS &lt;strong&gt;remains officially supported for five years&lt;/strong&gt; (until June 2029), with the option to extend this to ten years or even longer through services like Ubuntu Pro. This long-term maintenance guarantee makes it a highly recommended option for both home users and professionals who require long-term stability and consistency.&lt;/p&gt;  &lt;p&gt;The update also includes &lt;strong&gt;updated packages&lt;/strong&gt; such as LibreOffice 24.8.7 (from backports), Snapd 2.68.5, and Mozilla Firefox 141, along with other critical patches and security improvements for key system components. Elements such as PipeWire, dracut, u-boot, Mutter, GTK4, Xorg, Bluez, OpenSSH, and NVIDIA drivers receive direct improvements in this point release.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/3696117226467816014/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/ubuntu-24043-lts-arrives-with-linux-614.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/3696117226467816014'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/3696117226467816014'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2026/01/ubuntu-24043-lts-arrives-with-linux-614.html' title='Ubuntu 24.04.3 LTS arrives with Linux 6.14 from Ubuntu 25.04 and the latest patches'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-2438272232553466082</id><published>2025-12-29T14:21:00.000-08:00</published><updated>2025-12-30T06:08:09.192-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guides and Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Nvidia GPU driver configuration in Parrot Security distribution.</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpJXWdIjBbzrLwGdGKLtNkjYsgxlC7zh9i9Pt5sYHTRrMgDVEi9bMWE7Ww1skxtoRMsZ1gnKGBMfrZc5PVESjH10vV1u3npe5pnSzMoW-LoHVpI0AATb5GpYC-jhwSFDqAUicqpiEYs6ODfutCI6X-7rCLFVL4QTjEnFp_ueCbZhiQvERzDC_BcCsYW7q-/s1280/Nvidia.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;nvidia&quot; border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;1280&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpJXWdIjBbzrLwGdGKLtNkjYsgxlC7zh9i9Pt5sYHTRrMgDVEi9bMWE7Ww1skxtoRMsZ1gnKGBMfrZc5PVESjH10vV1u3npe5pnSzMoW-LoHVpI0AATb5GpYC-jhwSFDqAUicqpiEYs6ODfutCI6X-7rCLFVL4QTjEnFp_ueCbZhiQvERzDC_BcCsYW7q-/w640-h360/Nvidia.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Initially, Parrot uses the Nvidia &lt;b&gt;nouveau open source drivers&lt;/b&gt;, since they support most Nvidia cards. These guarantee good stability and allow you to use your gpu without problems for everyday use.&lt;/p&gt;  &lt;p&gt;However, it may be necessary to use other drivers that give greater compatibility with different software and make the most of your GPU. For this reason, you can install &lt;b&gt;Nvidia&#39;s official (closed source) drivers&lt;/b&gt;.&lt;/p&gt;  &lt;p&gt;You have two ways to install, either via &lt;a href=&quot;https://parrotsec.org/docs/configuration/nvidia-drivers.html#install-the-driver-via-the-parrot-repositories&quot;&gt;the Parrot repository&lt;/a&gt;&amp;nbsp;for &lt;a href=&quot;https://parrotsec.org/docs/configuration/nvidia-drivers.html#install-the-driver-from-the-official-nvidia-website&quot;&gt;from the official Nvidia website&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;Note&lt;/p&gt;  &lt;p&gt;Please note the driver installation and configuration may be different for laptop or desktop computers. For example, the user could have a CPU with an iGPU (integrated GPU) and a dGPU (dedicated GPU). The user must choose which to use based on the context.&lt;/p&gt;  &lt;p&gt;&lt;/p&gt;  &lt;p&gt;Every step described here has been tested, so it is highly recommended that you read everything in this document very carefully.&lt;/p&gt; 
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Content &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Install the driver via the Parrot repositories.&lt;/h3&gt;  &lt;p&gt;If you don&#39;t know your GPU model, open the terminal and type this command:&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;lspci | grep VGA&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;1&quot; height=&quot;52&quot; src=&quot;https://parrotsec.org/docs/assets/images/1-42e4b93b4f13217b2e9709d7a990210b.png&quot; width=&quot;542&quot; /&gt;&lt;/p&gt;

&lt;p&gt;It will show your GPU model and its architecture. For further information use:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;inxi -F&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;This will show your computer information, including the GPU model and also the type of driver used.&lt;/p&gt;

&lt;p&gt;Once you have ascertained that you are using the nouveau driver and you want to use the proprietary driver instead, for reasons of driver conflict, you must first disable the nouveau driver.&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo nano /etc/modprobe.d/blacklist-nouveau.conf&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Add the following lines and save the file.&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;blacklist nouveau&lt;br /&gt;options nouveau modeset=0&lt;br /&gt;alias nouveau off&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Once the file has been saved, proceed with the installation of the Nvidia driver using the following command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo apt update &amp;amp;&amp;amp; sudo apt install nvidia-driver&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Note&lt;/p&gt;

&lt;p&gt;From kernel 5.16, for compatibility problems, it may be necessary to install the drivers with the following command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo apt install nvidia-driver -t lory-backports&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;This completes the installation, but we recommend that you check that everything went well. To do this, you can use the official utility from Nvidia called &lt;a href=&quot;https://developer.nvidia.com/nvidia-system-management-interface&quot;&gt;nvidia-smi&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Install it by running:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo apt install nvidia-smi&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Start it with the following command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;nvidia-smi&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Nvidia in Parrot Security&quot; height=&quot;338&quot; src=&quot;https://parrotsec.org/docs/assets/images/2-461aaf9201e141b813f6f47f1e981688.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;In addition, the settings manager will be automatically installed together with the drivers. From here you can change parameters such as the resolution and refresh rate of your monitor.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Security Nvidia&quot; height=&quot;495&quot; src=&quot;https://parrotsec.org/docs/assets/images/3-26f5a422bc5dddc4f9484d78710bd037.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;h5&gt;Nvidia Driver on a computer with iGPU and dGPU&lt;/h5&gt;

&lt;p&gt;Most modern computers come with an integrated video card in the CPU (iGPU, like an Intel Graphic Card or AMD in most cases) and a dedicated video card (dGPU, Nvidia).&lt;/p&gt;

&lt;p&gt;In this guide we&#39;ll deal with the drivers for both video cards and show how to switch between them.&lt;/p&gt;

&lt;h6&gt;Step 1 - Install NVIDIA Drivers and CUDA Toolkit&lt;/h6&gt;

&lt;p&gt;Open a terminal window and type:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo apt update &lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;pre&gt;&lt;code&gt;sudo apt install bumblebee-nvidia primus-nvidia primus-vk-nvidia nvidia-smi nvidia-cuda-dev nvidia-cuda-toolkit&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Security Nvidia configuration&quot; height=&quot;466&quot; src=&quot;https://parrotsec.org/docs/assets/images/7-62363c33ee4813db3a3d6b8aaae92ae1.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Wait for the installation to proceed. When a warning notifying &lt;b&gt;nouveau&lt;/b&gt; driver conflicting with &lt;b&gt;nvidia&lt;/b&gt; driver appears, click &lt;b&gt;ok&lt;/b&gt;:&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Security Nvidia1&quot; height=&quot;466&quot; src=&quot;https://parrotsec.org/docs/assets/images/8-c709d8276a544a567ec973df385dc70f.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;h6&gt;Step 2 - Blacklist Nouveau&lt;/h6&gt;

&lt;p&gt;Note&lt;/p&gt;

&lt;p&gt;if you have already followed &lt;a href=&quot;https://parrotsec.org/docs/configuration/nvidia-drivers.html#install-the-driver-via-the-parrot-repository&quot;&gt;the nvidia installation via the Parrot repo&lt;/a&gt;you can go to &lt;a href=&quot;https://parrotsec.org/docs/configuration/nvidia-drivers.html#step-3---configure-bumblebee&quot;&gt;step 3&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;After the installation has finished, it&#39;s time to blacklist the &lt;b&gt;nouveau&lt;/b&gt; driver in order to make the nvidia driver work.&lt;/p&gt;

&lt;p&gt;In the terminal, type:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo nano /etc/modprobe.d/blacklist-nouveau.conf&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;And add:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;blacklist nouveau&lt;br /&gt;options nouveau modeset=0&lt;br /&gt;alias nouveau off&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Security Nvidia2&quot; height=&quot;466&quot; src=&quot;https://parrotsec.org/docs/assets/images/9-bfc012cbf75d8337d79f1ea5021188a6.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Save the file and reboot.&lt;/p&gt;

&lt;h6&gt;Step 3 - Configure Bumblebee&lt;/h6&gt;

&lt;p&gt;Now it&#39;s time to tell &lt;b&gt;bumblebee&lt;/b&gt; which driver should be used.&lt;/p&gt;

&lt;p&gt;In the terminal open &lt;b&gt;bumblebee.conf&lt;/b&gt;:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo nano /etc/bumblebee/bumblebee.conf&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Look for the string &lt;b&gt;Driver=&lt;/b&gt; and add &lt;b&gt;nvidia&lt;/b&gt;, then look for the string &lt;b&gt;KernelDriver=&lt;/b&gt; and add &lt;b&gt;nvidia-current&lt;/b&gt;.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Security Nvidia4&quot; height=&quot;466&quot; src=&quot;https://parrotsec.org/docs/assets/images/10-17816d285b9f03e9f880bd9d9971915b.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Security Nvidia5&quot; height=&quot;466&quot; src=&quot;https://parrotsec.org/docs/assets/images/11-7df2bbd6ad40435a92ba2b8dcf63a294.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Save the file and reboot.&lt;/p&gt;

&lt;h6&gt;Step 4 - Testing the Drivers&lt;/h6&gt;

&lt;p&gt;Open a terminal and type:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;watch nvidia-smi&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;In a new terminal enter the following command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;optirun hashcat -b -d 1&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;The result should be similar to this:&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;12&quot; height=&quot;240&quot; src=&quot;https://parrotsec.org/docs/assets/images/12-f86152703d7bb83e6c33dbdec2b0bfaa.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;In &lt;code&gt;nvidia-smi&lt;/code&gt; interface, &lt;code&gt;hashcat&lt;/code&gt; should appear running using your Nvidia video card.&lt;/p&gt;

&lt;p&gt;Note&lt;/p&gt;

&lt;p&gt;Launching application with &lt;b&gt;primusrun&lt;/b&gt; will use PRIMUS Technology, while using &lt;b&gt;optirun&lt;/b&gt; will use VirtualGL.&lt;/p&gt;

&lt;h4&gt;Install the driver from the official Nvidia website&lt;/h4&gt;

&lt;p&gt;As mentioned at the beginning of this document, drivers can also be installed from Nvidia website.&lt;/p&gt;

&lt;p&gt;You can download the latest driver directly from &lt;a href=&quot;https://www.nvidia.com/en-us/drivers/unix/&quot;&gt;here&lt;/a&gt;, where there are also older drivers for old GPUs.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;4&quot; height=&quot;280&quot; src=&quot;https://parrotsec.org/docs/assets/images/4-ca80d2b30e28d221fbc6bd33d99ca629.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;OR&lt;/b&gt;&lt;/h4&gt;

&lt;p&gt;Select the model of your GPU, the operating system (Linux 64 bit) and the branch &lt;a href=&quot;https://www.nvidia.com/Download/index.aspx?lang=en-us&quot;&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;From the Nvidia website.&lt;/h4&gt;

&lt;p&gt;&quot;&lt;i&gt;Production Branch&lt;/i&gt;: Production Branch drivers provide ISV certification and optimal stability and performance for Unix customers. This driver is most commonly deployed at enterprises, providing support for the sustained bug fix and security updates commonly required.&lt;/p&gt;

&lt;p&gt;&lt;i&gt;New Feature Branch&lt;/i&gt;: New Feature Branch drivers provide early adopters and bleeding edge developers access to the latest driver features before they are integrated into the Production Branches.&quot;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;5&quot; height=&quot;309&quot; src=&quot;https://parrotsec.org/docs/assets/images/5-7984095b73f139322c07ffc00d0e0c74.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Click on &lt;b&gt;download&lt;/b&gt;, and a file with this name will be downloaded:&lt;/p&gt;

&lt;p&gt;&lt;code&gt;NVIDIA-Linux-x86_64-&amp;lt;driver version&amp;gt;.run&lt;/code&gt; (about 260 mb)&lt;/p&gt;

&lt;p&gt;To avoid conflicts with the X graphics server, we will have to use Parrot without a graphical interface (we will have to drop to &lt;a href=&quot;https://en.wikipedia.org/wiki/Runlevel&quot;&gt;Runlevel 3&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;We can do this simply via systemd, with the systemctl command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo systemctl set-default multi-user.target&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Note&lt;/p&gt;

&lt;p&gt;If by any chance you want to go back and reuse Parrot with MATE, use the following commands:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo systemctl set-default graphical.target &lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;pre&gt;&lt;code&gt;reboot&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;To avoid conflicts with the installation of the new driver, remember to blacklist the nouveau driver:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo nano /etc/modprobe.d/blacklist-nouveau.conf&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Add these lines then save the file:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;blacklist nouveau&lt;br /&gt;options nouveau modeset=0&lt;br /&gt;alias nouveau off&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Run the following command to regenerate the initramfs image.&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo update-initramfs -u&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;The last step is to disable nouveau drivers by rebooting the machine:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;reboot&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Now navigate to the folder where you downloaded the &lt;b&gt;.run&lt;/b&gt; file and give it execute permissions:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo chmod +x NVIDIA-Linux-x86_64-&amp;lt;driver version&amp;gt;.run&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Note&lt;/p&gt;

&lt;p&gt;If you don&#39;t remember what chmod does, it is recommended that you read the &lt;a href=&quot;https://parrotsec.org/docs/configuration/file-and-directory-permissions&quot;&gt;File and Directory permissions&lt;/a&gt;document.&lt;/p&gt;

&lt;p&gt;After that you can start the &lt;b&gt;.run&lt;/b&gt; file:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo ./NVIDIA-Linux-x86_64-&amp;lt;driver version&amp;gt;.run&lt;/code&gt;&lt;/pre&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;The installation wizard,&lt;/h4&gt;

&lt;p&gt;The installation wizard process will start and the drivers will be installed along with all utilities (including Nvidia Driver X Settings).&lt;/p&gt;

&lt;p&gt;Return to MATE via the command:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo systemctl set-default graphical.target&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;You will go from Runlevel 3 to Runlevel 5, and finally you will be able to use the nvidia driver.&lt;/p&gt;

&lt;p&gt;To verify that everything went well, start nvidia-smi (already installed through &lt;i&gt;.run&lt;/i&gt; file):&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;nvidia-smi&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;6&quot; height=&quot;329&quot; src=&quot;https://parrotsec.org/docs/assets/images/6-836f1102aaf460d338d98e542833cdbd.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Notice that in this case the latest Nvidia (470.57.02) driver was installed.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://parrotsec.org/docs/configuration/file-and-directory-permissions&quot;&gt;
    &lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/2438272232553466082/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution_01614732602.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/2438272232553466082'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/2438272232553466082'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution_01614732602.html' title='Nvidia GPU driver configuration in Parrot Security distribution.'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpJXWdIjBbzrLwGdGKLtNkjYsgxlC7zh9i9Pt5sYHTRrMgDVEi9bMWE7Ww1skxtoRMsZ1gnKGBMfrZc5PVESjH10vV1u3npe5pnSzMoW-LoHVpI0AATb5GpYC-jhwSFDqAUicqpiEYs6ODfutCI6X-7rCLFVL4QTjEnFp_ueCbZhiQvERzDC_BcCsYW7q-/s72-w640-h360-c/Nvidia.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-8117879686161634277</id><published>2025-12-22T14:18:00.000-08:00</published><updated>2025-12-23T06:23:38.987-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guides and Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>The Essential Guide to Optimizing Parrot OS: Software Management.</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYKPoQyOjDx5x_Z_HbK3cDji2AJ6xPcEqWiJyoguFQrIG9JYpquNGBfDjWy_fyUlSRvSdI17Bc6fkGimqsghAEvdUzXImz9CtJU-sFAGiIhpHS206zKcYo3eXWcurLsG4628AeUFf6dh5hpEGWLtfN4OIgM6x9JshHdPv9MuyOD5pwWiadABRl8F_oJ-YB/s1044/Parrot-software-manager.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Parrot-software-manager&quot; border=&quot;0&quot; data-original-height=&quot;859&quot; data-original-width=&quot;1044&quot; height=&quot;526&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYKPoQyOjDx5x_Z_HbK3cDji2AJ6xPcEqWiJyoguFQrIG9JYpquNGBfDjWy_fyUlSRvSdI17Bc6fkGimqsghAEvdUzXImz9CtJU-sFAGiIhpHS206zKcYo3eXWcurLsG4628AeUFf6dh5hpEGWLtfN4OIgM6x9JshHdPv9MuyOD5pwWiadABRl8F_oJ-YB/w640-h526/Parrot-software-manager.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;  &lt;p&gt;In this chapter, we will introduce the &lt;b&gt;apt&lt;/b&gt; package manager for Parrot. A program is a series of instructions written in programming languages such as C, Go, Nim or Rust (to name a few). These instructions are stored in text files called sources.&amp;nbsp;&lt;/p&gt;&lt;p&gt;To work in our systems, they must be converted to machine language. This step is called compilation. The compilation generates one or several files, understandable by the system, called binaries.&lt;/p&gt;
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Content.  &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Parrot Software Management.&amp;nbsp;&lt;/h3&gt;  &lt;p&gt;The user does not need to compile the sources of each program as the developers are responsible for compiling and generating the respective binaries. A program can carry not only the executable but a series of files.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The developers combine such software into a file called a package. Two of the most well-known are &lt;b&gt;.rpm&lt;/b&gt; packages and &lt;b&gt;.deb&lt;/b&gt; packages. &lt;b&gt;.rpm&lt;/b&gt; was developed by Red Hat and &lt;b&gt;.deb&lt;/b&gt; by Debian. Parrot uses the &lt;b&gt;.deb&lt;/b&gt; format.&lt;/p&gt;  &lt;p&gt;To compile programs, often 3rd party libraries and other programs are necessary. If we tried to compile a program that had dependencies with other libraries and other programs, we would install these &quot;dependencies&quot; before its compilation. Likewise, if we want to install a binary we will need to have installed the necessary dependencies for its correct operation.&lt;/p&gt;  &lt;p&gt;To manage these dependencies and the &lt;i&gt;package&lt;/i&gt; installation, package managers have been created.&amp;nbsp;&lt;/p&gt;&lt;p&gt;There are numerous package managers, some graphical and others via the command line. In this chapter, we will see one of the most famous, created by the Debian developers, and the one used by Parrot: &lt;b&gt;apt&lt;/b&gt;.&lt;/p&gt;  &lt;p&gt;The main functions of a package manager must be:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Software searching &lt;/li&gt;    &lt;li&gt;Software installation &lt;/li&gt;    &lt;li&gt;Software update &lt;/li&gt;    &lt;li&gt;System update &lt;/li&gt;    &lt;li&gt;Dependency management &lt;/li&gt;    &lt;li&gt;Software removal&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;The package manager must check in a given location (it can be a local directory or a network address) for the availability of such software. The locations are called repositories. The system maintains configuration files to check repository locations.&lt;/p&gt;  &lt;h4&gt;List of Repositories.&lt;/h4&gt;  &lt;p&gt;Although in Parrot it is not necessary (nor recommended) to add new repositories or modify existing ones, we will see where we can configure them. In the file system, under the path &lt;i&gt;/etc/apt/sources.list.d&lt;/i&gt;, we find the file &lt;b&gt;parrot.list&lt;/b&gt;. The content of this file should be:&lt;/p&gt;  &lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Stable repository.&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;deb &lt;a href=&quot;http://deb.parrot.sh/parrot&quot;&gt;http://deb.parrot.sh/parrot&lt;/a&gt;lory main contrib non-free non-free-firmware #deb-src &lt;a href=&quot;http://deb.parrot.sh/parrot&quot;&gt;http://deb.parrot.sh/parrot&lt;/a&gt;lory contrib non-free non-free-firmware&lt;/p&gt;  &lt;p&gt;With this, we make sure we have the correct repository list. In this location the Parrot developers keep the packages updated.&lt;/p&gt;  &lt;h4&gt;Package Manager.&lt;/h4&gt;  &lt;p&gt;The Parrot package manager is &lt;b&gt;apt&lt;/b&gt;. Amongst other things,this manager is responsible for installing packages, checking dependencies, and updating the system. Let&#39;s see what we can do with it. We will see the most common options below. For more in-depth instructions, view the man pages for each of the following commands: &lt;i&gt;apt&lt;/i&gt;, &lt;i&gt;apt-cache&lt;/i&gt;, &lt;i&gt;dpkg&lt;/i&gt;, etc...&lt;/p&gt;  &lt;p&gt;Search for a package or text string:&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;apt search &amp;lt;package/text_string&amp;gt;&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Show package information:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt show &amp;lt;package&amp;gt;&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Show package dependencies:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt depends &amp;lt;package&amp;gt;&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Show the names of all the packages installed in the system:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt list --installed&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Install a package:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt install &amp;lt;package&amp;gt;&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Uninstall a package:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt remove &amp;lt;package&amp;gt;&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Delete a package including its configuration files:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt purge &amp;lt;package&amp;gt;&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Delete automatically those packages that are not being used (be careful with this command, due to apt&#39;s hell dependency it may delete unwanted packages):&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt autoremove&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Update the repositories information:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt update&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Update a package to the last available version in the repository:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt upgrade &amp;lt;package&amp;gt;&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Update the full distribution. It will update our system to the next available version:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo parrot-upgrade&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Clean caches, downloaded packages, etc:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;apt clean &amp;amp;&amp;amp; apt autoclean&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;These are just some examples. If more information is required, you should check the manual page (man apt).&lt;/p&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/8117879686161634277/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution_01373271474.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/8117879686161634277'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/8117879686161634277'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution_01373271474.html' title='The Essential Guide to Optimizing Parrot OS: Software Management.'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYKPoQyOjDx5x_Z_HbK3cDji2AJ6xPcEqWiJyoguFQrIG9JYpquNGBfDjWy_fyUlSRvSdI17Bc6fkGimqsghAEvdUzXImz9CtJU-sFAGiIhpHS206zKcYo3eXWcurLsG4628AeUFf6dh5hpEGWLtfN4OIgM6x9JshHdPv9MuyOD5pwWiadABRl8F_oJ-YB/s72-w640-h526-c/Parrot-software-manager.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-2388070233869084191</id><published>2025-12-19T15:11:00.000-08:00</published><updated>2025-12-19T15:47:02.368-08:00</updated><title type='text'>The Strategic Rise of Intelligent Automation in Today’s Organizations</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4Hbn0k6zpkgqJ7BtUm89hBT4FKVzls0qjjroBy_QQ7Y6BouFjMAyo3J3LIdjv2bOscbmcYHVKysuU0In2ASnOokAK6cH0sJGKRdM-aBwBCBZn0sO23xofSFNxFY6OfrrWNKK4nLSmxyBI7XiPfHCoqaYK7-h7UgB8p8JieYbcmL5SOh8QAa0Fuy6sLI09/s1125/Uzinakod.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;UzinaKod&quot; border=&quot;0&quot; data-original-height=&quot;750&quot; data-original-width=&quot;1125&quot; height=&quot;426&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4Hbn0k6zpkgqJ7BtUm89hBT4FKVzls0qjjroBy_QQ7Y6BouFjMAyo3J3LIdjv2bOscbmcYHVKysuU0In2ASnOokAK6cH0sJGKRdM-aBwBCBZn0sO23xofSFNxFY6OfrrWNKK4nLSmxyBI7XiPfHCoqaYK7-h7UgB8p8JieYbcmL5SOh8QAa0Fuy6sLI09/w640-h426/Uzinakod.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;In today’s fast-paced business environment, intelligent automation is no longer a luxury—it&#39;s a strategic imperative. By combining artificial intelligence with robotic process automation, organizations are streamlining operations, reducing costs, and enhancing decision-making. This transformation is reshaping the landscape of business automation, enabling companies to be more agile, accurate, and competitive. As enterprises strive to stay ahead, intelligent automation emerges as a cornerstone of digital success and long-term growth.&lt;/p&gt;&lt;h2 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_ro8x4jol2j10&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 17pt;&quot;&gt;A Paradigm Shift in Organizational Efficiency&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;The advent of intelligent automation is reshaping how companies operate across industries. Integrating&amp;nbsp;&lt;a href=&quot;https://www.uzinakod.com/en/services/software-development/business-process-automation&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;&lt;u&gt;business automation&lt;/u&gt;&lt;/span&gt;&lt;/a&gt;&amp;nbsp;enhances accuracy, reduces costs, and increases operational speed. Organizations are harnessing this shift to stay competitive in rapidly evolving markets. Legacy systems are being replaced or integrated with smart technologies to elevate productivity. Automation now drives innovation across departments and breaks down previously inefficient silos.&lt;/p&gt;
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Contents. &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;
&lt;h3 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_8j3fbpxe6v9f&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 13pt;&quot;&gt;Evolving Beyond Traditional Automation Tools&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Standard automation tools execute rule-based tasks but lack adaptability. Intelligent automation combines artificial intelligence with automation to make autonomous decisions based on real-time data. This dynamic capability allows systems to learn from interactions and improve continuously. As a result, operational workflows become more adaptable to changing business conditions. Algorithms handle complex scenarios without constant human oversight, saving both time and revenue.&lt;/p&gt;&lt;h2 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_i4f6mpu9ia6v&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 17pt;&quot;&gt;The Building Blocks of Intelligent Automation&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Core elements of intelligent automation include machine learning, natural language processing, and robotic process automation. Each component contributes to decision-making that mimics human cognition. For example, chatbots now comprehend and resolve inquiries beyond scripted responses. Predictive maintenance systems spot anomalies before breakdowns occur. By aligning technical architecture with these tools, organizations streamline and expand their capabilities.&lt;/p&gt;&lt;h3 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_ekbrxqjnjji8&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 13pt;&quot;&gt;Enhancing Decision Quality at Scale&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Data-driven insights emerge effortlessly from intelligent platforms. Systems process large volumes of structured and unstructured data in seconds. This speed aids managers in making strategic choices backed by evidence. Automating repetitive decision-making frees executives to focus on innovation and growth. Consistency also improves, reducing the margin of human error across analytical processes.&lt;/p&gt;&lt;h2 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_h9it8nijf5x0&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 17pt;&quot;&gt;Transforming the Workforce Landscape&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Intelligent automation is not just a technological upgrade—it’s a workforce redefinition. While repetitive roles get automated, new positions emerge focused on oversight and design. Team members now require hybrid skills to manage both processes and technology. Training programs are evolving to match this demand. Collaboration between human workers and machines fosters a new model of productivity.&lt;/p&gt;&lt;h3 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_jil4yz32ycbj&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 13pt;&quot;&gt;Empowering Employees Through Automation&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Rather than replacing staff, intelligent systems eliminate repetitive burdens. Employees reallocate time toward tasks that require empathy, strategy, and creativity. This shift improves job satisfaction and business outcomes. Automated systems also provide real-time guidance, enabling less experienced team members to perform like experts. Empowered workers contribute more value, nurturing both innovation and loyalty.&lt;/p&gt;&lt;h2 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_ea3c9uedkmhj&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 17pt;&quot;&gt;A Strategic Imperative for Future Growth&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Organizations investing in intelligent automation are building resilience. These technologies help scale operations quickly in response to market shifts. Business continuity improves as workflows stabilize and optimize through AI learning. Resilient enterprises recover faster from disruptions and maintain service excellence. Intelligent automation is no longer optional—it’s essential for long-term survival.&lt;/p&gt;&lt;h3 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_88mm1wglfh7v&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 13pt;&quot;&gt;Measurable Returns on Strategic Investments&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Quantifiable benefits include faster processing times, improved compliance, and reduced operational risks. Companies experience shorter decision cycles and significantly lower error rates. Automation also increases speed to market for new products or services. Every efficiency gained reflects positively on the bottom line. Investments in this area yield both immediate and compounding returns over time.&lt;/p&gt;&lt;h2 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_ouq76pulyndk&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 17pt;&quot;&gt;How can intelligent systems streamline enterprise operations?&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;By integrating advanced technologies like artificial intelligence and machine learning, companies can significantly reduce manual tasks, errors, and inefficiencies. Intelligent systems enhance decision-making by providing real-time data insights, automate repetitive processes, and ultimately increase productivity across various departments, from customer service to supply chain management.&lt;/p&gt;&lt;h2 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_oqa11fq8fzf7&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 17pt;&quot;&gt;What are the key benefits of digital process transformation?&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Digital transformation in processes allows organizations to optimize resource usage, reduce operational costs, and improve service delivery. It empowers teams to respond quickly to market changes and customer expectations through streamlined workflows, increased visibility, and agility. This shift also creates opportunities for innovation and continuous improvement across business functions.&lt;/p&gt;&lt;h2 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_cttidpgu9hso&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 17pt;&quot;&gt;Which sectors are leading the adoption of smart automation?&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Industries like finance, healthcare, manufacturing, and retail have rapidly embraced automation to enhance scalability and accuracy. Financial institutions use it for fraud detection and transaction processing, while manufacturers depend on robotics for precision and efficiency. These sectors gain competitive advantages by leveraging smart systems to reinvent traditional operations.&lt;/p&gt;&lt;h2 style=&quot;break-after: auto; break-inside: auto;&quot;&gt;&lt;a name=&quot;_4glq8r5ditvj&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 17pt;&quot;&gt;What challenges arise when implementing automated solutions?&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;line-height: 22.1px; margin-bottom: 0.17in; margin-top: 0.17in;&quot;&gt;Introducing automated technologies often involves cultural resistance, high initial costs, and integration complexities with legacy systems. Organizations may struggle with employee upskilling and aligning new tools with existing processes. Nonetheless, with proper planning and change management, these obstacles can be mitigated, paving the way for long-term operational success.&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/2388070233869084191/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/the-strategic-rise-of-intelligent.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/2388070233869084191'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/2388070233869084191'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/the-strategic-rise-of-intelligent.html' title='The Strategic Rise of Intelligent Automation in Today’s Organizations'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4Hbn0k6zpkgqJ7BtUm89hBT4FKVzls0qjjroBy_QQ7Y6BouFjMAyo3J3LIdjv2bOscbmcYHVKysuU0In2ASnOokAK6cH0sJGKRdM-aBwBCBZn0sO23xofSFNxFY6OfrrWNKK4nLSmxyBI7XiPfHCoqaYK7-h7UgB8p8JieYbcmL5SOh8QAa0Fuy6sLI09/s72-w640-h426-c/Uzinakod.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-5164289143264870742</id><published>2025-12-15T14:16:00.000-08:00</published><updated>2025-12-21T08:02:00.248-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guides and Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>A Security-Focused Guide to Linux Parrot: UBS Persistent Partition.</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_45FAFtDCEm0889wwqOS9FoAGTN7C0LcWwtic-EbPpulF7X8NpJ5wqvt3rbYPnuwdV8UuG4ox8fNqAfYa6-9lu6VxcxZ9PyhvnYkTSl_vfBy-XboPW_bwdTFMRmvzRwsfZiuCKjtEjcGzm6kkxQuR30xcsb8OLkRZO5orjIogr7TkBH7j6f3Dxoqcq7bg/s1920/parrot.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Parrot Linux&quot; border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1920&quot; height=&quot;360&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_45FAFtDCEm0889wwqOS9FoAGTN7C0LcWwtic-EbPpulF7X8NpJ5wqvt3rbYPnuwdV8UuG4ox8fNqAfYa6-9lu6VxcxZ9PyhvnYkTSl_vfBy-XboPW_bwdTFMRmvzRwsfZiuCKjtEjcGzm6kkxQuR30xcsb8OLkRZO5orjIogr7TkBH7j6f3Dxoqcq7bg/w640-h360/parrot.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://parrotsec.org/&quot; target=&quot;_blank&quot;&gt;Parrot OS&lt;/a&gt;&lt;/b&gt; (formerly Parrot Security OS) is a Debian-based Linux distribution designed for penetration testing, digital forensics, reverse engineering, and privacy protection.&amp;nbsp;&lt;/p&gt;
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Content. &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Parrot Security Guide: UBS Persistent Partition.&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;It comes preloaded with hundreds of security tools, a lightweight desktop environment, and strong anonymity features, making it a go-to system for cybersecurity professionals and enthusiasts&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;Persistent partition.&lt;/h4&gt;  &lt;p&gt;This guide shows how to create a persistent partition inside USB with ParrotOS. To do this we will use the &lt;a href=&quot;https://github.com/sudodus/tarballs&quot;&gt;&lt;b&gt;mkusb&lt;/b&gt;&lt;/a&gt;tool.&lt;/p&gt;  &lt;h4&gt;Install mkusb.&lt;/h4&gt;  &lt;p&gt;After downloading the ParrotOS &lt;i&gt;.iso&lt;/i&gt; file from our website, download &lt;i&gt;mkusb&lt;/i&gt; from the &lt;a href=&quot;https://github.com/sudodus/tarballs&quot;&gt;repository&lt;/a&gt;.&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;git clone https://github.com/sudodus/tarballs.git&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Navigate to the downloaded folder and unpack &lt;b&gt;dus-plus.tar.xz&lt;/b&gt; with &lt;i&gt;tar&lt;/i&gt;:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;cd tarballs &amp;amp;&amp;amp; tar -xf dus-plus.tar.xz&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;Note&lt;/p&gt;

&lt;p&gt;Why only &lt;b&gt;dus-plus.tar.xz&lt;/b&gt; instead of &lt;b&gt;dus.tar.xz&lt;/b&gt;? In short, it contains the &lt;i&gt;usb-pack-efi&lt;/i&gt; package needed to boot the partition.&lt;/p&gt;

&lt;p&gt;Go inside the newly extracted &lt;i&gt;dus-tplus&lt;/i&gt; folder, and install the tool by typing:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;cd dus-tplus/ &amp;amp;&amp;amp; sudo ./dus-installer i&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;In the same terminal session, type dus (or open &lt;i&gt;guidus&lt;/i&gt; from Parrot&#39;s menu) and it will start:&lt;/p&gt;

&lt;p&gt;Note&lt;/p&gt;

&lt;p&gt;dus will ask to install the &lt;i&gt;guidus&lt;/i&gt; GUI as well, the functionality will remain the same.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot-1&quot; height=&quot;341&quot; src=&quot;https://parrotsec.org/docs/assets/images/1-51ba492491142376dc6cf9d50be8abe7.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;This tool can also be used to make a USB bootable, restore, format and other interesting things.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot-2&quot; height=&quot;372&quot; src=&quot;https://parrotsec.org/docs/assets/images/2-9672578b68cd3832206a0e83c2b9ebd4.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;h4&gt;Create the persistent partition.&lt;/h4&gt;

&lt;p&gt;Select &lt;i&gt;install (make a boot device)&lt;/i&gt;. Then, &lt;b&gt;Persistent-live&lt;/b&gt; option.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot-3&quot; height=&quot;398&quot; src=&quot;https://parrotsec.org/docs/assets/images/3-74d60455e6c550d973c4e4a478212133.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Select &lt;b&gt;dus-Persistent&lt;/b&gt; from the menu to choose the method to create the persistent partition.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot-4&quot; height=&quot;401&quot; src=&quot;https://parrotsec.org/docs/assets/images/4-e21b38e36178fd0dd726508e66839577.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Now select the &lt;i&gt;.iso&lt;/i&gt; to install:&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot-5&quot; height=&quot;556&quot; src=&quot;https://parrotsec.org/docs/assets/images/5-32a7bbb707ad4fb286eaec6d0b882e8e.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Select the USB where you want to install Parrot (we recommend using at least a 4GB USB key).&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot-6&quot; height=&quot;284&quot; src=&quot;https://parrotsec.org/docs/assets/images/6-a9f31dcee66d30298ab7b268fdd0890e.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Select the &lt;i&gt;upefi&lt;/i&gt; package and click &lt;i&gt;ok&lt;/i&gt;.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot-7&quot; height=&quot;254&quot; src=&quot;https://parrotsec.org/docs/assets/images/7-6d64818fbc55a8817fe07496c16abca0.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;You can allocate as much space as you like for the persistent partition from this window:&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;8&quot; height=&quot;167&quot; src=&quot;https://parrotsec.org/docs/assets/images/8-c9e2d4e4915286f775bccb0e3ceee5c9.png&quot; width=&quot;467&quot; /&gt;&lt;/p&gt;

&lt;p&gt;From here, click &lt;i&gt;Go&lt;/i&gt; to confirm the operation. The persistent partition will be ready in a few minutes.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot-9&quot; height=&quot;426&quot; src=&quot;https://parrotsec.org/docs/assets/images/9-a12cb0f80dc09964f371f714f96ede75.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot-10&quot; height=&quot;215&quot; src=&quot;https://parrotsec.org/docs/assets/images/10-e488fa3f48643026cdab09e12ff8d3fe.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/5164289143264870742/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution_040078598.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/5164289143264870742'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/5164289143264870742'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution_040078598.html' title='A Security-Focused Guide to Linux Parrot: UBS Persistent Partition.'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_45FAFtDCEm0889wwqOS9FoAGTN7C0LcWwtic-EbPpulF7X8NpJ5wqvt3rbYPnuwdV8UuG4ox8fNqAfYa6-9lu6VxcxZ9PyhvnYkTSl_vfBy-XboPW_bwdTFMRmvzRwsfZiuCKjtEjcGzm6kkxQuR30xcsb8OLkRZO5orjIogr7TkBH7j6f3Dxoqcq7bg/s72-w640-h360-c/parrot.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-965116269267222858</id><published>2025-12-08T14:14:00.000-08:00</published><updated>2025-12-22T13:41:45.652-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guides and Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>A Security-Focused Guide to Linux Parrot: How to create a bootable USB drive.</title><content type='html'>&lt;p style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFBR9ryt0VyjDLguvwhMABBt1UPZFPGaCeD-LjQ9jfoDzGQm7GVHlD6x8ZpDuzvdjrc0Hjvyd-Mzns87bxnsVATpfstFsCHQeEIlk8uFi4Uf7mSeFaC4p47kRNOcLRTz0dglVX39aOCiRJFxekjGJ-leK9IujJinQAzPVCGTr57kHmN4q8urGUAlVp9z6/s726/parrot.install.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Parrot install&quot; border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;726&quot; height=&quot;448&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFBR9ryt0VyjDLguvwhMABBt1UPZFPGaCeD-LjQ9jfoDzGQm7GVHlD6x8ZpDuzvdjrc0Hjvyd-Mzns87bxnsVATpfstFsCHQeEIlk8uFi4Uf7mSeFaC4p47kRNOcLRTz0dglVX39aOCiRJFxekjGJ-leK9IujJinQAzPVCGTr57kHmN4q8urGUAlVp9z6/w640-h448/parrot.install.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;To create a bootable USB drive with Parrot OS (updated to 2025 versions such as 6.3), follow these steps using the tools recommended in the official documentation.&lt;/p&gt;
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Content. &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;
&lt;h3&gt;Create a bootable USB to Linux Parrot.&lt;/h3&gt;  &lt;p&gt;First of all, you need to download the latest ISO file from &lt;a href=&quot;https://parrotsec.org/download/&quot;&gt;website&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;Then you can burn the iso to a flash drive using &lt;a href=&quot;https://www.balena.io/etcher/&quot;&gt;Balena Etcher&lt;/a&gt;, &lt;a href=&quot;http://wiki.rosalab.ru/en/index.php/ROSA_ImageWriter&quot;&gt;ROSA ImageWriter&lt;/a&gt;, or &lt;a href=&quot;https://rufus.ie/en/&quot;&gt;Rufus&lt;/a&gt;. Balena Etcher and ROSA ImageWriter both work on Linux, macOS and Windows, while Rufus is only available for Windows 8 or later.&lt;/p&gt;  &lt;p&gt;For users on Linux or macOS, we recommend using Etcher, but you can also use the &lt;b&gt;DD command line tool&lt;/b&gt; if you prefer. For users on Windows 8 or later, we recommend using Etcher or Rufus.&lt;/p&gt;  &lt;p&gt;The Parrot .iso file uses the &lt;a href=&quot;https://docs.kernel.org/filesystems/isofs.html&quot;&gt;ISO 9660 standard&lt;/a&gt; (also known as ISOHybrid). It is a special ISO format that contains not only the partition content, but also the partition table.&lt;/p&gt;  &lt;p&gt;Some ISO writing programs do not write the iso bit-per-bit into the usb drive at a low level. They create a custom partition table and just copy the file in the USB drive in an unofficial and non-standard way. This behavior is against what the ISOHybrid was created for, and may break core system functionalities and make the system uninstallable from such USB drives.&lt;/p&gt;  &lt;p&gt;It is &lt;b&gt;highly recommended that you do not&lt;/b&gt; use &lt;i&gt;unetbootin&lt;/i&gt;, or any program that is not ISOHybrid compliant.&lt;/p&gt;  &lt;p&gt;You will need a USB drive with a minimum size of 8 GB for the Security Edition and 4 GB for the Home Edition.&lt;/p&gt;  &lt;p&gt;A quick summary of which tools you can use to create your Parrot USB:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Balena Etcher.&lt;/li&gt;    &lt;li&gt;DD Command Line Tool.&lt;/li&gt;    &lt;li&gt;ROSA Image Writer.&lt;/li&gt;    &lt;li&gt;Rufus USB Formatting Utility.&lt;/li&gt; &lt;/ul&gt;  &lt;h4&gt;Balena Etcher.&lt;/h4&gt;  &lt;p&gt;Plug your USB stick into your USB port and launch &lt;b&gt;Balena Etcher&lt;/b&gt;. Download and unzip it.&lt;/p&gt;  &lt;p&gt;Click on &lt;i&gt;.AppImage file&lt;/i&gt;.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Etcher&quot; height=&quot;215&quot; src=&quot;https://parrotsec.org/docs/assets/images/etcher0-55dd3dfae41d34c870069e867e3dd218.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Click on &lt;b&gt;Flash from file&lt;/b&gt;. Select the Parrot ISO and verify that the USB drive you are going to overwrite is the right one.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Etcher&quot; height=&quot;412&quot; src=&quot;https://parrotsec.org/docs/assets/images/etcher1-080d9cbbf1afb88d43bc6d37b661ff31.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Then click on &lt;b&gt;Flash!&lt;/b&gt; and the formatting process will start.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Etcher&quot; height=&quot;411&quot; src=&quot;https://parrotsec.org/docs/assets/images/etcher2-c2c9e53737210f0d3cbc39b097fbdcf7.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Once the burning is complete, you can use the USB stick as the boot device for your computer and boot Parrot OS.&lt;/p&gt;  &lt;h4&gt;DD command line tool.&lt;/h4&gt;  &lt;p&gt;&lt;b&gt;dd&lt;/b&gt; (and its derivatives) is a command line tool integrated in every UNIX and UNIX-like system, and it can be used to write the ISO file into a block device bit per bit. Due to the potential to brick your system, if you are not familiar with Linux we strongly recommend using Etcher instead.&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;sudo dd status=progress if=Parrot-&amp;lt;edition&amp;gt;-&amp;lt;version&amp;gt;_amd64.iso of=/dev/sdX&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;dd&quot; height=&quot;188&quot; src=&quot;https://parrotsec.org/docs/assets/images/dd-fe2930fbbe9978d2cc0feecf3f7f8509.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;h4&gt;ROSA image writer.&lt;/h4&gt;

&lt;p&gt;Another tool you can use is ROSA image writer to create your USB with Parrot. Download it from the website and extract all files. Then, click on &lt;b&gt;RosaImageWriter&lt;/b&gt;:&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;ROSA&quot; height=&quot;274&quot; src=&quot;https://parrotsec.org/docs/assets/images/rosa0-7feed00a885eda3daa9df73a611a9999.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Select the ISO and USB.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;ROSA&quot; height=&quot;243&quot; src=&quot;https://parrotsec.org/docs/assets/images/rosa1-be318050973fbb9f6496f2d46cc079fa.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Click on &lt;b&gt;Write&lt;/b&gt; and wait for the writing procedure to finish.&lt;/p&gt;

&lt;h4&gt;Rufus USB formatting utility.&lt;/h4&gt;

&lt;p&gt;For those running a Windows 8 or later host, Rufus is the preferred USB formatting utility. Simply download the executable from the website and run it – no installation is necessary.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Note.&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;Note: Before using Rufus, please read the following from the Rufus FAQ regarding DD mode and ISO mode for ISOHybrid images:&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Why doesn&#39;t Rufus recommend DD mode over ISO mode for ISOHybrid images? Surely DD is better!&lt;/b&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Initial configuration&quot; height=&quot;640&quot; src=&quot;https://parrotsec.org/docs/assets/images/rufus1-dded5454c9b67b8b89b44db3ac956c04.png&quot; width=&quot;483&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Select the USB drive from the Device menu and the ISO from the Boot selection menu. Then choose DD mode.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Selecting DD mode&quot; height=&quot;364&quot; src=&quot;https://parrotsec.org/docs/assets/images/rufus2-7632d2930e0850cb2c79494a5a82073c.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Click on &lt;i&gt;START&lt;/i&gt; and wait for the writing procedure to finish.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Writing image&quot; height=&quot;640&quot; src=&quot;https://parrotsec.org/docs/assets/images/rufus3-bf3b3e3c36268322b9effbbe76862f90.png&quot; width=&quot;479&quot; /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFBR9ryt0VyjDLguvwhMABBt1UPZFPGaCeD-LjQ9jfoDzGQm7GVHlD6x8ZpDuzvdjrc0Hjvyd-Mzns87bxnsVATpfstFsCHQeEIlk8uFi4Uf7mSeFaC4p47kRNOcLRTz0dglVX39aOCiRJFxekjGJ-leK9IujJinQAzPVCGTr57kHmN4q8urGUAlVp9z6/s726/parrot.install.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;508&quot; data-original-width=&quot;726&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFBR9ryt0VyjDLguvwhMABBt1UPZFPGaCeD-LjQ9jfoDzGQm7GVHlD6x8ZpDuzvdjrc0Hjvyd-Mzns87bxnsVATpfstFsCHQeEIlk8uFi4Uf7mSeFaC4p47kRNOcLRTz0dglVX39aOCiRJFxekjGJ-leK9IujJinQAzPVCGTr57kHmN4q8urGUAlVp9z6/s320/parrot.install.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/965116269267222858/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution_01589325852.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/965116269267222858'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/965116269267222858'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution_01589325852.html' title='A Security-Focused Guide to Linux Parrot: How to create a bootable USB drive.'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFBR9ryt0VyjDLguvwhMABBt1UPZFPGaCeD-LjQ9jfoDzGQm7GVHlD6x8ZpDuzvdjrc0Hjvyd-Mzns87bxnsVATpfstFsCHQeEIlk8uFi4Uf7mSeFaC4p47kRNOcLRTz0dglVX39aOCiRJFxekjGJ-leK9IujJinQAzPVCGTr57kHmN4q8urGUAlVp9z6/s72-w640-h448-c/parrot.install.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-2612135491229336686</id><published>2025-12-01T14:12:00.000-08:00</published><updated>2025-12-24T11:49:29.964-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guides and Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Guide to Parrot, a Linux distribution focused on computer security: UTM.</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ0rFdIvPSsMkcymF32iU36Kdq2LMxY68_MtwJoazj7D09N7I8jyGZopd5TIKTgJLnNPCmNVZzqMlrfOtXrMG2pvaeBBz9IETsIHAqDFLVayTR6qpDQ_eN678q4NWFvkDpLmRe9kmSeP1c2zwyKo9VB0d_oTDk1-0XSuuPFz0t3MhIshwo6Bp9Vn4CCq7u/s912/Parrot-UTM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Parrot UTM&quot; border=&quot;0&quot; data-original-height=&quot;551&quot; data-original-width=&quot;912&quot; height=&quot;386&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ0rFdIvPSsMkcymF32iU36Kdq2LMxY68_MtwJoazj7D09N7I8jyGZopd5TIKTgJLnNPCmNVZzqMlrfOtXrMG2pvaeBBz9IETsIHAqDFLVayTR6qpDQ_eN678q4NWFvkDpLmRe9kmSeP1c2zwyKo9VB0d_oTDk1-0XSuuPFz0t3MhIshwo6Bp9Vn4CCq7u/w640-h386/Parrot-UTM.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;The OS is also available to be virtualized on Apple platforms with M1/M2/M3(and its variants) CPUs. Specifically, Parrot can be used through the &lt;a href=&quot;https://mac.getutm.app/&quot;&gt;open source UTM software&lt;/a&gt;.&lt;/p&gt;
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Content.  &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Why is UTM so popular with Parrot OS?&lt;/h3&gt;&lt;p&gt;UTM is the preferred tool for Mac users (especially those with M1/M2/M3 chips) who want to virtualize Parrot OS.&lt;br /&gt;&lt;br /&gt;Parrot OS offers a specific version (.utm) on its official website, optimized for this application.&lt;br /&gt;&lt;br /&gt;If you&#39;re on a Mac, simply download the .utm file, open it with UTM, and the system will be pre-configured.&amp;nbsp;&lt;/p&gt;  &lt;p&gt;Once you download and install UTM, you will see this screen:&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Psrrot UTM&quot; height=&quot;348&quot; src=&quot;https://parrotsec.org/docs/assets/images/1-87176d222f410f6f29d20bf8212fca05.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;The format we provide to users has the &lt;b&gt;.utm&lt;/b&gt; extension, so it is already compatible with UTM itself, which is why, once you download the file from our website, all you have to do is go to the folder where you downloaded Parrot and extract the &lt;i&gt;.utm&lt;/i&gt; file.&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;How to Install the &quot;UTM Equivalent&quot; on Parrot/Linux.&lt;/h4&gt;&lt;p&gt;Since UTM uses QEMU as its engine, you can install QEMU&#39;s professional graphical interface on Linux called virt-manager.&lt;br /&gt;&lt;br /&gt;To install it on Parrot OS, open a terminal and run:&lt;br /&gt;&lt;br /&gt;Bash&lt;br /&gt;&lt;br /&gt;sudo apt update&lt;br /&gt;sudo apt install virt-manager qemu-kvm libvirt-clients libvirt-daemon-system bridge-utils&lt;br /&gt;Then, add your user to the libvirt group to manage virtual machines without requiring the root password each time:&lt;br /&gt;&lt;br /&gt;Bash&lt;br /&gt;&lt;br /&gt;sudo adduser $USER libvirt&lt;br /&gt;sudo adduser $USER kvm&amp;nbsp;&lt;/p&gt;  &lt;p&gt;After correctly extracting the &lt;i&gt;.utm&lt;/i&gt; file, simply drag and drop it inside UTM.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;utm2&quot; height=&quot;323&quot; src=&quot;https://parrotsec.org/docs/assets/images/2-a632cac64a47f2f23247e946ea1e8d6c.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;The OS will be immediately recognized and by clicking on the Play icon you can immediately use Parrot in your system with MacOS.&lt;/p&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/2612135491229336686/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/2612135491229336686'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/2612135491229336686'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/12/guide-to-parrot-linux-distribution.html' title='Guide to Parrot, a Linux distribution focused on computer security: UTM.'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ0rFdIvPSsMkcymF32iU36Kdq2LMxY68_MtwJoazj7D09N7I8jyGZopd5TIKTgJLnNPCmNVZzqMlrfOtXrMG2pvaeBBz9IETsIHAqDFLVayTR6qpDQ_eN678q4NWFvkDpLmRe9kmSeP1c2zwyKo9VB0d_oTDk1-0XSuuPFz0t3MhIshwo6Bp9Vn4CCq7u/s72-w640-h386-c/Parrot-UTM.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-6323554723414569606</id><published>2025-11-24T14:11:00.000-08:00</published><updated>2025-12-25T05:49:19.765-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guides and Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtualization"/><title type='text'>Guide to Parrot, a Linux distribution focused on computer security:  VMware</title><content type='html'>&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT5yIHYAic5L8wekN2EtaUuZKwvYc6q4SEbLnIa0KoINSBeQhpgOS2R-oMOMpXySaVRUpoenA75EqajEWiiofVO22DoD_u82kZdoejpgxFzZ3rul7lXQaTpOHNlPpB7UMrQcnmHylBqGv-YHRF6WyN39GH3xnmmMqbBL5tC3w1bxeTDS4nuLa50NYbHzHw/s713/Parrot-VMWare.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Parrot VMWare&quot; border=&quot;0&quot; data-original-height=&quot;658&quot; data-original-width=&quot;713&quot; height=&quot;590&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT5yIHYAic5L8wekN2EtaUuZKwvYc6q4SEbLnIa0KoINSBeQhpgOS2R-oMOMpXySaVRUpoenA75EqajEWiiofVO22DoD_u82kZdoejpgxFzZ3rul7lXQaTpOHNlPpB7UMrQcnmHylBqGv-YHRF6WyN39GH3xnmmMqbBL5tC3w1bxeTDS4nuLa50NYbHzHw/w640-h590/Parrot-VMWare.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;a href=&quot;https://parrotsec.org/&quot; target=&quot;_blank&quot;&gt;Parrot OS&lt;/a&gt;&lt;/b&gt; on VMware by installing the VMware software (Workstation or Player), downloading the Parrot OS ISO image, creating a new virtual machine, selecting the ISO as the installation disk, following the guided steps to configure the minimum requirements (CPU, RAM, disk space), and finally installing the Guest operating system.&lt;/p&gt;&lt;p&gt;It is possible to use the OS on VMware in all its editions (Workstation Player, Workstation Pro and also on MacOS, Fusion Player and Fusion Pro).&lt;/p&gt;
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Content.  &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;How to Run Parrot OS on VMware.&amp;nbsp;&lt;/h3&gt;  &lt;p&gt;This guide will allow the user to create a Virtual Machine on VMware Workstation Player. Since the other editions are extensions of the free version of Workstation Player, in the setup and installation procedure, not much will change.&lt;/p&gt;  &lt;p&gt;Follow this step by step guide, it will go from installing VMware to creating the Virtual Machine.&lt;/p&gt;  &lt;h5&gt;Download &amp;amp; install VMware Workstation&lt;/h5&gt;  &lt;p&gt;Once you have downloaded VMware from the &lt;a href=&quot;https://www.vmware.com/&quot;&gt;official website&lt;/a&gt;, go to the folder where you downloaded it, and open a terminal. Give execution permissions with&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;sudo chmod +x ./VMware-Workstation-$edition-$architecture.bundle&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;and then, again from the terminal, start it:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo ./VMware-Workstation-$edition-$architecture.bundle&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;the installer will complete the installation operation and in the Parrot menu you will find your VMware edition ready for use.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare&quot; height=&quot;498&quot; src=&quot;https://parrotsec.org/docs/assets/images/6-9369bc5e9b77351ddd6b55b7ba68246f.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;&amp;nbsp;Create a new Virtual Machine.&lt;/h4&gt;

&lt;p&gt;Go to the File tab, and click on &lt;b&gt;Create a New Virtual Machine&lt;/b&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare-1&quot; height=&quot;498&quot; src=&quot;https://parrotsec.org/docs/assets/images/7-a53aba69f485e18c232b980bbd6497f5.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;A new &quot;Virtual Machine Wizard&quot; window will open which will guide you to create the VM, select &lt;b&gt;Use ISO image&lt;/b&gt; and enter the path of the Parrot iso you downloaded in our website, then click on &lt;i&gt;Next&lt;/i&gt; button:&lt;/p&gt;

&lt;p&gt;Note&lt;/p&gt;

&lt;p&gt;VMware&#39;s automatic recognizer will recognize the system as Debian 5 64-bit, this is incorrect and not a problem, it can be changed very easily in the next steps.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare-2&quot; height=&quot;616&quot; src=&quot;https://parrotsec.org/docs/assets/images/8-83e5ec79420406a620c4277db4e89dde.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Select the type of operating system you are installing on your VM (then Linux, Debian 10 64-bit), so give the Virtual Machine a name:&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare-3&quot; height=&quot;616&quot; src=&quot;https://parrotsec.org/docs/assets/images/9-1b26be0023d8794ccd4262f5591e08b4.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare-5&quot; height=&quot;616&quot; src=&quot;https://parrotsec.org/docs/assets/images/10-2c2723861e2ddc93040f8e61d3cf2908.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;and click on &lt;i&gt;Next&lt;/i&gt;.&lt;/p&gt;

&lt;p&gt;Based on the Parrot edition downloaded, it is advisable to consult the minimum system requirements, generally 20 gb for a Virtual Machine may be fine for the Home Edition, but for a more complete edition such as the Security Edition, at least 40 gb of dedicated space are recommended.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare-6&quot; height=&quot;616&quot; src=&quot;https://parrotsec.org/docs/assets/images/11-717564e19fbf061511ba41589e96897d.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;The next screen will make a summary of the technical specifications of the newly created Virtual Machine. At least &lt;i&gt;4 GB of RAM&lt;/i&gt; is recommended. It is possible to customize other aspects of the VM by clicking on &lt;b&gt;Customize Hardware&lt;/b&gt;.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare-6&quot; height=&quot;616&quot; src=&quot;https://parrotsec.org/docs/assets/images/12-42a8e1189eabbdc9d566264c065b72bc.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare-8&quot; height=&quot;616&quot; src=&quot;https://parrotsec.org/docs/assets/images/13-b5171dc836fe51ebeb3c6ace9d1ec804.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;h4 style=&quot;text-align: left;&quot;&gt;Install Parrot on your Virtual Machine.&lt;/h4&gt;

&lt;p&gt;The Virtual Machine is ready to use, just start it and grub will start with the various modes to run Parrot.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare-9&quot; height=&quot;591&quot; src=&quot;https://parrotsec.org/docs/assets/images/14-f3e2ba0cb4967ceac2151ada2ce2de3a.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot VMWare-10&quot; height=&quot;559&quot; src=&quot;https://parrotsec.org/docs/assets/images/15-75a75ca6647c985e47212f13679bf31c.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;From here on, follow the usual installation procedure to install Parrot on your VM.&lt;/p&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/6323554723414569606/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/11/guide-to-parrot-linux-distribution_01904364302.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/6323554723414569606'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/6323554723414569606'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/11/guide-to-parrot-linux-distribution_01904364302.html' title='Guide to Parrot, a Linux distribution focused on computer security:  VMware'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT5yIHYAic5L8wekN2EtaUuZKwvYc6q4SEbLnIa0KoINSBeQhpgOS2R-oMOMpXySaVRUpoenA75EqajEWiiofVO22DoD_u82kZdoejpgxFzZ3rul7lXQaTpOHNlPpB7UMrQcnmHylBqGv-YHRF6WyN39GH3xnmmMqbBL5tC3w1bxeTDS4nuLa50NYbHzHw/s72-w640-h590-c/Parrot-VMWare.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-8652012375719572731</id><published>2025-11-17T14:09:00.000-08:00</published><updated>2025-12-28T07:44:57.096-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guides and Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtualization"/><title type='text'>A Security-Focused Guide to Linux Parrot: VirtualBox Guest Additions.</title><content type='html'>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibIgx51cpT8MQjtS8piZMonf7eEPzDs1H__tXvNeUKwzU3DpyuucO0Q9RLearlpPCBM-sBABNaSOZt1YTjw64hybfaq-A02W60gxOVmJ9ngQ_RONH3aGmcjc638nNPsogdBntiYBcsd1SgJ6nmvAnUz9hmUO5gkCIp_lLNt_vjzKmC8WzoXVh-shgo5ndX/s866/Parrot-VirtualBox-guest_additions.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Linux Parrot: VirtualBox Guest Additions.&quot; border=&quot;0&quot; data-original-height=&quot;677&quot; data-original-width=&quot;866&quot; height=&quot;500&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibIgx51cpT8MQjtS8piZMonf7eEPzDs1H__tXvNeUKwzU3DpyuucO0Q9RLearlpPCBM-sBABNaSOZt1YTjw64hybfaq-A02W60gxOVmJ9ngQ_RONH3aGmcjc638nNPsogdBntiYBcsd1SgJ6nmvAnUz9hmUO5gkCIp_lLNt_vjzKmC8WzoXVh-shgo5ndX/w640-h500/Parrot-VirtualBox-guest_additions.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The Guest Additions are designed to be installed inside a virtual machine after the guest operating system has been installed. They consist of device drivers and system applications that optimize the guest operating system for better performance and usability.&lt;/p&gt;  
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Content.  &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Features of Virtualbox Guest Additions&lt;/h3&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;p&gt;&lt;b&gt;Mouse pointer integration&lt;/b&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;Pressing the Host key is no longer required to &quot;free&quot; the mouse from being captured by the guest OS.&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;b&gt;Shared folders&lt;/b&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;Shared folders between Host and Parrot.&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;b&gt;Better video support&lt;/b&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;While the virtual graphics card which VirtualBox emulates for any guest operating system provides all the basic features, the custom video drivers that are installed with the Guest Additions provide you with extra high and non-standard video modes as well as accelerated video performance.&lt;/li&gt;     &lt;/ul&gt;      &lt;p&gt;&lt;b&gt;(Generally used for changing monitor resolution)&lt;/b&gt;&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;b&gt;Seamless windows&lt;/b&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;With this feature, the individual windows that are displayed on the desktop of the virtual machine can be mapped on the host&#39;s desktop, as if the underlying application was actually running on the host.&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;b&gt;Generic host/guest communication channels&lt;/b&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;The Guest Additions enable you to control and monitor guest execution in ways other than those mentioned above. The so-called &quot;guest properties&quot; provide a generic string-based mechanism to exchange data bits between a guest and a host, some of which have special meanings for controlling and monitoring the guest.&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;b&gt;Time synchronization&lt;/b&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;Synchronize date and time from host to Parrot.&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;&lt;b&gt;Shared clipboard&lt;/b&gt;&lt;/p&gt;      &lt;ul&gt;       &lt;li&gt;Shared clipboard from host to Parrot.&lt;/li&gt;     &lt;/ul&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;For more infomations, check the &lt;a href=&quot;https://www.virtualbox.org/manual/ch04.html&quot;&gt;VirtualBox manual&lt;/a&gt;.&lt;/p&gt;  &lt;h3 style=&quot;text-align: left;&quot;&gt;Guest Additions Installation(s)&lt;/h3&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Method 1 (Easiest)&lt;/b&gt;&lt;/h4&gt;  &lt;p&gt;&lt;b&gt;1.&lt;/b&gt; Open a terminal and update your packages list from the repository with&lt;/p&gt;  &lt;pre&gt;&lt;code&gt;sudo apt update&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;&lt;b&gt;2.&lt;/b&gt; Install the Guest Additions from Parrot OS repository with&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo apt install virtualbox-guest-utils&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;&lt;b&gt;3.&lt;/b&gt; And install the last package with&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo apt install virtualbox-guest-x11&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;&lt;b&gt;4.&lt;/b&gt; When the installation is completed, you can reboot your machine with&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo reboot&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;&lt;b&gt;5.&lt;/b&gt; Check if Guest Additions are correctly installed by running&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;sudo /usr/sbin/VBoxService -V&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;h4&gt;Method 2 (From ISO)&lt;/h4&gt;

&lt;p&gt;&lt;b&gt;1.&lt;/b&gt; On Virtual Machine menu bar, select &lt;code&gt;Devices &amp;gt; Insert Guest Additions CD image...&lt;/code&gt;.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Linux Parrot: VirtualBox Guest Additions-install&quot; height=&quot;277&quot; src=&quot;https://parrotsec.org/docs/assets/images/guest_additions1-fc55aadc736fedcdc129964a98bfe084.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;b&gt;2.&lt;/b&gt; VirtualBox will not automatically find the Guest Additions, instead it will ask you to download them (Click on &lt;i&gt;Download&lt;/i&gt;). We recommend adding an additional secondary optical drive, because once the guest additions are downloaded, they will be mounted on a second drive.&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Linux Parrot: VirtualBox Guest Additions-1&quot; height=&quot;500&quot; src=&quot;https://parrotsec.org/docs/assets/images/guest_additions2-66b672e59405c7ece83b393cb2d5f6c4.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;3&quot; height=&quot;214&quot; src=&quot;https://parrotsec.org/docs/assets/images/guest_additions3-09e1e5fe3de6ad6e3af311253d0bfe8e.png&quot; width=&quot;533&quot; /&gt;&lt;/p&gt;

&lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;4&quot; height=&quot;267&quot; src=&quot;https://parrotsec.org/docs/assets/images/guest_additions4-e626677ebf9e92cc92a8a3d77416b8b4.png&quot; width=&quot;425&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Click on &quot;&lt;b&gt;insert&lt;/b&gt;&quot;. If it returns an error (maybe it can&#39;t mount the iso you just downloaded, then turn off the virtual machine, and return to the main VirtualBox screen, go to &lt;i&gt;Setting &amp;gt; Storage&lt;/i&gt;, here add another optical drive and make sure it is secondary so as not to give problems in booting the distro).&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;Linux Parrot: VirtualBox Guest Additions-2&quot; height=&quot;416&quot; src=&quot;https://parrotsec.org/docs/assets/images/guest_additions5-69317b6cf14f888fb5fd11905be5ee98.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;b&gt;3.&lt;/b&gt; Then go to the Guest Addition ISO folder, open a terminal and type&lt;/p&gt;

&lt;p&gt;sudo chmod +x VBoxLinuxAdditions.run&lt;/p&gt;

&lt;p&gt;Once done, execute&lt;/p&gt;

&lt;p&gt;sudo ./VBoxLinuxAdditions.run&lt;/p&gt;

&lt;p&gt;&lt;b&gt;4.&lt;/b&gt; Wait for the installation to finish. Once completed, reboot the virtual machine with&lt;/p&gt;

&lt;p&gt;&lt;img alt=&quot;Linux Parrot: VirtualBox Guest Additions-4&quot; height=&quot;261&quot; src=&quot;https://parrotsec.org/docs/assets/images/guest_additions6-d08ab5f55efeaaae3c692c50125cda3d.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;

&lt;p&gt;sudo reboot&lt;/p&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/8652012375719572731/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/11/guide-to-parrot-linux-distribution_01297934292.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/8652012375719572731'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/8652012375719572731'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/11/guide-to-parrot-linux-distribution_01297934292.html' title='A Security-Focused Guide to Linux Parrot: VirtualBox Guest Additions.'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibIgx51cpT8MQjtS8piZMonf7eEPzDs1H__tXvNeUKwzU3DpyuucO0Q9RLearlpPCBM-sBABNaSOZt1YTjw64hybfaq-A02W60gxOVmJ9ngQ_RONH3aGmcjc638nNPsogdBntiYBcsd1SgJ6nmvAnUz9hmUO5gkCIp_lLNt_vjzKmC8WzoXVh-shgo5ndX/s72-w640-h500-c/Parrot-VirtualBox-guest_additions.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-1208392922707065823</id><published>2025-11-15T13:45:00.000-08:00</published><updated>2025-12-29T10:11:13.038-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fedora"/><title type='text'>Fedora Linux 43 is here: the main new features and the Wayland revolution!</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-WuSAtMjAhAgfLh2jN72YkBVICxpl1rMvBqzQk0XdnRfJTyX35qv05Gx4caDEiNHM9RN5VSRIslLHCDynSKa0qhoRBL0dY3rT_Jj7wX8i9QFI_N9fFauMy973YDJ53FRAEN_0r9eKVi2999jlIdHMSGmVZmc31rhr9WVIbhpqSLJ-S6YjIjtz0Bv71iNl/s816/Fedora_linux_43_release.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Fedora Linux 43&quot; border=&quot;0&quot; data-original-height=&quot;345&quot; data-original-width=&quot;816&quot; height=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-WuSAtMjAhAgfLh2jN72YkBVICxpl1rMvBqzQk0XdnRfJTyX35qv05Gx4caDEiNHM9RN5VSRIslLHCDynSKa0qhoRBL0dY3rT_Jj7wX8i9QFI_N9fFauMy973YDJ53FRAEN_0r9eKVi2999jlIdHMSGmVZmc31rhr9WVIbhpqSLJ-S6YjIjtz0Bv71iNl/w640-h270/Fedora_linux_43_release.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;  &lt;p&gt;The Fedora community has &lt;b&gt;&lt;a href=&quot;https://translate.google.com/website?sl=auto&amp;amp;tl=en&amp;amp;hl=it&amp;amp;u=https://fedoramagazine.org/announcing-fedora-linux-43/&quot;&gt;announced&lt;/a&gt;&lt;/b&gt;the release of &lt;b&gt;Fedora Linux 43.&lt;/b&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;This is the 43rd Fedora release, and marks a significant milestone for the community, being the first announced by the new Fedora Project Leader.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The Leader expressed gratitude for the opportunity to lead this collaboration and looks forward to shaping the project&#39;s future directions.&lt;/p&gt;
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Content. &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;Fedora Linux 43 released: the changes most visible to users.&lt;/h3&gt;  &lt;p&gt;Fedora Linux 43 brings a multitude of changes and improvements.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Let&#39;s take a look at some of the more significant changes users should expect.&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;The new installer for Spins.&lt;/h4&gt;  &lt;p&gt;If you&#39;re performing a fresh installation of &lt;b&gt;Fedora Linux 43 Spins,&lt;/b&gt; you&#39;ll be greeted by a new installation user interface: the &lt;b&gt;Anaconda WebUI&lt;/b&gt; .&amp;nbsp;&lt;/p&gt;&lt;p&gt;This interface was already the default installer for Fedora Workstation 42, but it&#39;s now the default user interface for Spins as well.&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;GNOME relies on Wayland.&lt;/h4&gt;  &lt;p&gt;One of the most notable changes for desktop users is that &lt;b&gt;GNOME is now Wayland-only&lt;/b&gt; in Fedora Linux 43. The upstream GNOME project deprecated X11 support and disabled it by default at compile time in GNOME 49. Future plans include completely removing X11 support in GNOME 50.&lt;/p&gt;  &lt;h4&gt;Significant updates.&lt;/h4&gt;  &lt;p&gt;In addition to the visible changes, there are some very impactful structural improvements, even if most end users won&#39;t notice them directly.&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;RPM 6.0 and post-quantum security.&lt;/h4&gt;  &lt;p&gt;Fedora Linux 43 is the first release to include &lt;b&gt;RPM 6.0&lt;/b&gt; . While it may go unnoticed by users, this is a significant change. RPM 6.0 provides exciting security improvements, such as &lt;b&gt;multiple package signing&lt;/b&gt; . This will help future-proof package signing as we transition to post-quantum-crypto OpenPGP keys in future releases.&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;The Evolution of Fedora CoreOS (FCOS).&lt;/h4&gt;  &lt;p&gt;We&#39;re working on enabling &lt;code&gt;bootc&lt;/code&gt;. &lt;b&gt;Fedora CoreOS (FCOS)&lt;/b&gt; can now be built from a &lt;code&gt;bootc&lt;/code&gt;Fedora base image using a Containerfile, eliminating the need for custom composition tools. This means anyone can &lt;code&gt;podman&lt;/code&gt;build an FCOS image.&lt;/p&gt;  &lt;p&gt;Additionally, FCOS is changing the way it distributes updates:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;FCOS updates will be distributed &lt;b&gt;exclusively as&lt;/b&gt; Open Container Initiative (OCI) images.&lt;/li&gt;    &lt;li&gt;Unlike FCOS 42, which provided both the OSTree repository and OCI registry for the transition, OSTree updates have been &lt;b&gt;disabled entirely&lt;/b&gt; in FCOS 43.&lt;/li&gt; &lt;/ul&gt;  &lt;h3 style=&quot;text-align: left;&quot;&gt;How to Get Fedora Linux 43.&lt;/h3&gt;  &lt;p&gt;Whether you&#39;re upgrading or installing from scratch, there are simple options available.&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;Upgrading from an existing system.&lt;/h4&gt;  &lt;p&gt;Upgrading to Fedora Linux 43 is simple. In most cases, it&#39;s not much different than a reboot for regular updates, though you&#39;ll have a little more time to get a coffee.&lt;/p&gt;  &lt;p&gt;It is essential to ensure that your system is &lt;b&gt;fully updated&lt;/b&gt; before attempting the upgrade.&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;&lt;b&gt;Fedora Workstation:&lt;/b&gt; The &lt;b&gt;Software&lt;/b&gt; application will display a graphical notification. Clicking it or going to the &lt;b&gt;Updates&lt;/b&gt; panel will start the upgrade process.&lt;/li&gt;    &lt;li&gt;&lt;b&gt;Fedora KDE: The &lt;/b&gt;&lt;b&gt;Discover&lt;/b&gt; application will display a prompt to initiate the update.&lt;/li&gt;    &lt;li&gt;&lt;b&gt;Other Installations:&lt;/b&gt; For all other Fedora Linux installations, the recommended method is to use the &lt;b&gt;DNF System Upgrade plugin&lt;/b&gt; via the command line.&lt;/li&gt; &lt;/ul&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;Installation from scratch.&lt;/h4&gt;  &lt;p&gt;If this is your first time using Fedora Linux or you simply want a fresh start, you can &lt;b&gt;&lt;a href=&quot;https://translate.google.com/website?sl=auto&amp;amp;tl=en&amp;amp;hl=it&amp;amp;u=https://fedoraproject.org/%23editions&quot;&gt;download installation media&lt;/a&gt;&lt;/b&gt;for the main &lt;b&gt;Editions (Workstation, KDE Plasma Desktop, Cloud, Server, CoreOS, IoT), the &lt;/b&gt;&lt;b&gt;Atomic Desktops&lt;/b&gt; (Silverblue, Kinoite, Cosmic, Budgie, Sway), or alternative desktop options (such as Cinnamon, Xfce, Sway, or others)&lt;/p&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/1208392922707065823/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/10/fedora-linux-43-is-here-main-new.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/1208392922707065823'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/1208392922707065823'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/10/fedora-linux-43-is-here-main-new.html' title='Fedora Linux 43 is here: the main new features and the Wayland revolution!'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-WuSAtMjAhAgfLh2jN72YkBVICxpl1rMvBqzQk0XdnRfJTyX35qv05Gx4caDEiNHM9RN5VSRIslLHCDynSKa0qhoRBL0dY3rT_Jj7wX8i9QFI_N9fFauMy973YDJ53FRAEN_0r9eKVi2999jlIdHMSGmVZmc31rhr9WVIbhpqSLJ-S6YjIjtz0Bv71iNl/s72-w640-h270-c/Fedora_linux_43_release.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-3079620510139405433</id><published>2025-11-10T14:07:00.000-08:00</published><updated>2025-12-31T04:17:17.750-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Guides and Tutorials"/><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtualization"/><title type='text'>Guide to Parrot, a Linux distribution focused on computer security: VirtualBox.</title><content type='html'>&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDldjqx9Zxfhy-R8aIWBNk5asmC7pmNsHsenrm0mBr9twN_Ac41igRU4A8EM8NZZFsF65_9t-fGjulsjyZ0kmiDmXfakIpunE8Rrb5OaAWkSZcoW8-9B6fXLEKf0kbSFaWTr8qPck24jGy-IqTbrTXf94UEugQ8sp95059zthkVFrt1d6p8-sK2GbZxdW6/s1920/VirtualBox-Parrot.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;VirtualBox Parrot&quot; border=&quot;0&quot; data-original-height=&quot;946&quot; data-original-width=&quot;1920&quot; height=&quot;316&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDldjqx9Zxfhy-R8aIWBNk5asmC7pmNsHsenrm0mBr9twN_Ac41igRU4A8EM8NZZFsF65_9t-fGjulsjyZ0kmiDmXfakIpunE8Rrb5OaAWkSZcoW8-9B6fXLEKf0kbSFaWTr8qPck24jGy-IqTbrTXf94UEugQ8sp95059zthkVFrt1d6p8-sK2GbZxdW6/w640-h316/VirtualBox-Parrot.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;text-align: left;&quot;&gt;You can easily run &lt;a href=&quot;https://parrotsec.org/&quot; target=&quot;_blank&quot;&gt;Parrot Linux&lt;/a&gt; in VirtualBox by downloading the Parrot OS ISO (or OVA appliance), creating a new VM in VirtualBox, configuring its settings (RAM, disk size), attaching the ISO, and then running the installation or importing the OVA.&amp;nbsp;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&amp;nbsp;Key steps involve enabling virtualization in your host&#39;s BIOS/UEFI and installing VirtualBox Guest Additions within the VM after setup for better performance, often using sudo apt install virtualbox-guest-utils virtualbox-guest-x11 on Parrot OS.&amp;nbsp;&lt;/p&gt;
&lt;div class=&quot;mbtTOC2&quot;&gt; 
&lt;button&gt;Table of Content. &lt;span&gt;[&lt;a onclick=&quot;mbtToggle2()&quot;  id=&quot;Tog&quot;&gt;hide&lt;/a&gt;]&lt;/span&gt;&lt;/button&gt; 
&lt;div id=&quot;mbtTOC2&quot;&gt;&lt;/div&gt; 
&lt;/div&gt;

&lt;h3 style=&quot;text-align: left;&quot;&gt;How to install Parrot Security in VirtualBox step by step.&amp;nbsp;&lt;/h3&gt;&lt;h4&gt;This guide will cover the following steps:&lt;/h4&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;p&gt;Create a new Virtual Machine&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Create a new Virtual disk (VDI, dynamic allocation etc...)&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Modifying VirtualBox settings (allocating physical and Video memory, selecting OS Type, CPU acceleration etc.)&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Loading Parrot Security ISO&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Booting Parrot Security ISO (initial info, location, timezone etc.)&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Parrot Security disk partitioning&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;Finalizing installation and running Parrot Security on VirtualBox.&lt;/p&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;h4&gt;Things you need to install.&lt;/h4&gt;  &lt;p&gt;If the OS you are using is Windows or MacOS, here is the link to the &lt;a href=&quot;https://www.virtualbox.org/wiki/Downloads&quot;&gt;VirtualBox&lt;/a&gt;installer.&lt;/p&gt;  &lt;p&gt;On GNU/Linux it is the same, but you can install it via CLI:&lt;/p&gt;  &lt;p&gt;sudo apt install virtualbox&lt;/p&gt;  &lt;p&gt;Follow the same steps &lt;b&gt;EXACTLY&lt;/b&gt; to install and run Parrot via VirtualBox in your machine.&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;Create a new Virtual Machine.&lt;/h4&gt;  &lt;p&gt;Before proceeding, make sure you have successfully installed VirtualBox. On GNU/Linux you can check this by opening a terminal and typing &lt;code&gt;virtualbox&lt;/code&gt; and/or the icon to start VirtualBox will be visible in the menu. For other operating systems there will be a similar icon to start it.&lt;/p&gt;  &lt;p&gt;Once you’ve installed VirtualBox:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Open it. &lt;/li&gt;    &lt;li&gt;Click on New to create a New Virtual Machine.&lt;/li&gt; &lt;/ul&gt;  &lt;h5&gt;Step 1.1 - Enter a name for your Virtual Machine.&lt;/h5&gt;  &lt;p&gt;Enter &lt;b&gt;Parrot Security&lt;/b&gt; as the name. Load Parrot Security ISO (click on the arrow at your right, and search for the ISO in the download folder.) and proceed, &lt;b&gt;Type&lt;/b&gt; and &lt;b&gt;Version&lt;/b&gt; will be detected automatically.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Important&lt;/b&gt;: if your disk size is mismatched, you might have a corrupt disk. Refer to Parrot Security &lt;a href=&quot;https://parrotsec.org/docs/introduction/download-parrot&quot;&gt;chapter&lt;/a&gt;through this documentation for size related info. You can also do a SHA1 check to ensure your disk is not corrupted.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Virtual Box&quot; height=&quot;354&quot; src=&quot;https://parrotsec.org/docs/assets/images/1-89359e305c6a8ddb259aa9fdb0c5c927.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 1.2 - Allocate RAM and CPU.&lt;/h5&gt;  &lt;p&gt;The OS can run on machines with 512 MB of RAM and 2 cores, but at least &lt;b&gt;2 GB&lt;/b&gt; and &lt;b&gt;2 cores&lt;/b&gt; are strongly recommended for both Parrot Security and Home Editions.&lt;/p&gt;  &lt;p&gt;Choose the best setting for your machine, check &quot;&lt;b&gt;Enable EFI&lt;/b&gt;&quot; checkbox and click &lt;i&gt;Next&lt;/i&gt;.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Virtual Box1&quot; height=&quot;354&quot; src=&quot;https://parrotsec.org/docs/assets/images/2-4413900fe702100a13ddbc8ed591014f.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 1.3 - Create a Virtual Hard Drive.&lt;/h5&gt;  &lt;p&gt;On the next screen select &lt;b&gt;Create a Virtual Hard Disk Now&lt;/b&gt;. Set the disk size at &lt;b&gt;20 GB for Home Edition&lt;/b&gt; and &lt;b&gt;40 GB for Security Edition&lt;/b&gt;&lt;/p&gt;  &lt;p&gt;This will create a &lt;b&gt;Dinamically Allocated Disk&lt;/b&gt;, if you want to have the entire disk size, check &quot;&lt;b&gt;Pre-Allocated Full Size&lt;/b&gt;&quot;&lt;/p&gt;  &lt;p&gt;Click &lt;i&gt;Next&lt;/i&gt; and proceed.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Virtual Box2&quot; height=&quot;354&quot; src=&quot;https://parrotsec.org/docs/assets/images/3-d0f44c75a21549ae21a1e499649492ad.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Double-check your settings in the screen similar to this and click &lt;i&gt;Finish&lt;/i&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Virtual Box&quot; height=&quot;354&quot; src=&quot;https://parrotsec.org/docs/assets/images/4-665645aa3a2cba946396ec50174d5fbe.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;Modify VirtualBox settings.&lt;/h4&gt;  &lt;p&gt;So far, we’ve done the following, checklist for you:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Created a New Virtual Machine &lt;/li&gt;    &lt;li&gt;Created Virtual Hard disk &lt;/li&gt;    &lt;li&gt;Fiddled with disk properties, type and size.&lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;At this point you should see the following screen:&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Virtual Box&quot; height=&quot;439&quot; src=&quot;https://parrotsec.org/docs/assets/images/5-eb7ece85f37973f34a7c4ef55ae70aa4.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 2.1 - Enable shared Clipboard and Drag ’n’ Drop feature.&lt;/h5&gt;  &lt;p&gt;Select &lt;i&gt;General &amp;gt; Advanced TAB&lt;/i&gt; and change &lt;b&gt;Shared Clipboard&lt;/b&gt; and &lt;b&gt;Drag ’n’ Drop&lt;/b&gt; to Bidirectional. This will allow you to copy paste files from your HOST machine on the fly. Confirm by clicking &lt;i&gt;OK&lt;/i&gt;.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;Parrot Virtual Box4&quot; height=&quot;434&quot; src=&quot;https://parrotsec.org/docs/assets/images/6-6c881682857d74de99291bf54602d51d.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 2.2 - Update number of Processors and enable PAE/NX.&lt;/h5&gt;  &lt;p&gt;As we already said, 2 cores works well. With 4, 6, and so on, performance will be much better.&lt;/p&gt;  &lt;p&gt;You should not configure virtual machines to use more CPU cores than are available physically. This includes real cores, with no hyperthreads. See &lt;a href=&quot;https://www.virtualbox.org/manual/ch03.html#settings-processor&quot;&gt;processor tab&lt;/a&gt;on VirtualBox website.&lt;/p&gt;  &lt;p&gt;Check the box for &lt;b&gt;Enable PAE/NX&lt;/b&gt;.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;7&quot; height=&quot;465&quot; src=&quot;https://parrotsec.org/docs/assets/images/7-22a2f5d3c1984f3b0f860b98bf8c535f.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 2.3 - Update Virtual Motherboard options.&lt;/h5&gt;  &lt;p&gt;Select &lt;i&gt;System &amp;gt; Motherboard&lt;/i&gt;, un-check Floppy (who has a floppy anymore?) and check the box to &lt;a href=&quot;https://www.virtualbox.org/manual/ch03.html#settings-motherboard&quot;&gt;&lt;b&gt;Enable I/O APIC&lt;/b&gt;&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;Note that you can change base memory allocation in the same screen. We’ve set it to 2048 MB previously. If your machine got 8.00 GB RAM, it means that you can allocate a lot more to make Parrot Security respond faster as a virtual machine.&lt;/p&gt;  &lt;p&gt;If you feel your Virtualized Parrot Security is slow, you should increase this Base Memory allocation.&lt;/p&gt;  &lt;p&gt;The calculations are as follows:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;     &lt;p&gt;1.00 GB = 1024 MB&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;2.00 GB = 2048 MB&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;3.00 GB = 3072 MB&lt;/p&gt;   &lt;/li&gt;    &lt;li&gt;     &lt;p&gt;4.00 GB = 4096 MB&lt;/p&gt;      &lt;p&gt;and so on.&lt;/p&gt;   &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Multiply 1024 with the amount of Memory/RAM you want and put the value here.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;6&quot; height=&quot;384&quot; src=&quot;https://parrotsec.org/docs/assets/images/13-4b05c0dff9e44a2465a4008d7d7947d6.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 2.4 - Allocate Video memory and 3D acceleration.&lt;/h5&gt;  &lt;p&gt;Select &lt;b&gt;Display &amp;gt; Screen &amp;gt; set Video Memory to 128 MB&lt;/b&gt;. This allows for a good responsive desktop environment.&lt;/p&gt;  &lt;p&gt;Also check the box for &lt;i&gt;Enable 3D Acceleration&lt;/i&gt;.&lt;/p&gt;  &lt;p&gt;If you have more than one monitor, you can change your settings here too.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;10&quot; height=&quot;465&quot; src=&quot;https://parrotsec.org/docs/assets/images/8-c0d4e753cb8754947bcc929434490be5.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 2.5 - Update Parrot Security ISO Loading Settings.&lt;/h5&gt;  &lt;p&gt;Select &lt;b&gt;Storage &amp;gt; Controller: IDE&lt;/b&gt; and highlight Empty CD icon. Now on your right, you should be able to click on the little CD icon (it should be CD/DVD Drive: IDE Secondary Master already, if not change it) and select your downloaded ISO.&lt;/p&gt;  &lt;p&gt;Once you select your downloaded ISO (in this case, it’s Parrot Security 6.0 ISO. See the properties and information’s changes accordingly.&lt;/p&gt;  &lt;p&gt;Note&lt;/p&gt;  &lt;p&gt;if you want to test Parrot in live mode, check the &lt;i&gt;&quot;Live CD/DVD&quot;&lt;/i&gt; box&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;8&quot; height=&quot;359&quot; src=&quot;https://parrotsec.org/docs/assets/images/12-9f3ddb8d8ae54addf35d7f3c0510a38a.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;Select Network connection type.&lt;/h4&gt;  &lt;p&gt;If your computer is connected to the internet, select NAT on &lt;i&gt;Network &amp;gt; Adapter 1&lt;/i&gt;. You can enable more network adapters if you feel you want to do so.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;9&quot; height=&quot;465&quot; src=&quot;https://parrotsec.org/docs/assets/images/9-8a38822e8a51e61bbc8deeea65b60030.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 3.1 - Enable USB 2.0 and 3.0 Controllers.&lt;/h5&gt;  &lt;p&gt;Firstly, make sure you have installed the &lt;i&gt;extension pack&lt;/i&gt;, or you will not be able to enable USB 2.0 and 3.0 controllers.&lt;/p&gt;  &lt;p&gt;If you have not installed it, you can download it &lt;a href=&quot;https://download.virtualbox.org/virtualbox/6.1.22/Oracle_VM_VirtualBox_Extension_Pack-6.1.22.vbox-extpack&quot;&gt;here&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;Then go to &lt;b&gt;files &amp;gt; preferences &amp;gt; extensions&lt;/b&gt;, on the right there will be a &lt;code&gt;+&lt;/code&gt; button where you can install the extension.&lt;/p&gt;  &lt;p&gt;In GNU/Linux, you could also install it from the terminal with &lt;code&gt;sudo apt install virtualbox-ext-pack&lt;/code&gt;&lt;/p&gt;  &lt;p&gt;Once installed, it will enable VirtualBox Remote Desktop Protocol (VRDP) support and Host webcam passthrough support.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;10&quot; height=&quot;465&quot; src=&quot;https://parrotsec.org/docs/assets/images/10-44005660e4b79df5ddd7ad212ef57666.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;It&#39;s all set up?.&lt;/h4&gt;  &lt;p&gt;Finally, by clicking on your new virtual machine, this is what you should see:&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;12&quot; height=&quot;439&quot; src=&quot;https://parrotsec.org/docs/assets/images/11-c70a83e27d86910a4738181d0ac597cd.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;You can always change the configuration the way you prefer.&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;Booting Parrot Security ISO.&lt;/h4&gt;  &lt;p&gt;From VirtualBox Main Screen, click on Start and boot Parrot Security.&lt;/p&gt;  &lt;h5&gt;Step 5.1 - choose Install.&lt;/h5&gt;  &lt;p&gt;From VirtualBox Main Screen, it will boot Parrot Security, click in the Virtual Machine, select &lt;i&gt;Try/Install&lt;/i&gt; and then click Enter.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;16&quot; height=&quot;478&quot; src=&quot;https://parrotsec.org/docs/assets/images/10-a4ba568741ce671143c3602e67e7be06.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 5.2 - Choose the default Installer (Calamares).&lt;/h5&gt;  &lt;p&gt;Here you can test the OS in its entirety, then you can proceed with the installation.&lt;/p&gt;  &lt;p&gt;Click on &lt;b&gt;Install Parrot&lt;/b&gt;:&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;17&quot; height=&quot;317&quot; src=&quot;https://parrotsec.org/docs/assets/images/11-df151b2b63dca5c5120afb809d51ecf6.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;and the default installer, Calamares, will start.&lt;/p&gt;  &lt;h5&gt;Step 5.3 - Select language.&lt;/h5&gt;  &lt;p&gt;In this example we have chosen American English. Click on &lt;i&gt;Next&lt;/i&gt;.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;18&quot; height=&quot;350&quot; src=&quot;https://parrotsec.org/docs/assets/images/12-bd7087d65b02e36d298ac845a5bed0de.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 5.4 - Select location&lt;/h5&gt;  &lt;p&gt;Here we have selected America and New York zone. Click on &lt;i&gt;Next&lt;/i&gt;.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;19&quot; height=&quot;350&quot; src=&quot;https://parrotsec.org/docs/assets/images/13-a888fa8989c1524576fd6f5bf1e8f171.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 5.5 - Select keyboard layout.&lt;/h5&gt;  &lt;p&gt;Select the layout that best suits your keyboard, you can also test the keyboard&#39;s key where it says &lt;i&gt;type here to test your keyboard&lt;/i&gt;. Click on &lt;i&gt;Next&lt;/i&gt;.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;20&quot; height=&quot;350&quot; src=&quot;https://parrotsec.org/docs/assets/images/14-9611f25231f447c3448535356496f7e2.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 5.6 - Parrot Security disk partitioning.&lt;/h5&gt;  &lt;p&gt;As this is all Virtualized, you can choose anything you want to.&lt;/p&gt;  &lt;p&gt;We think that guided partitioning for less experienced users is recommended, 40 GB or more are enough, unless you are going to install a lot more programs or keep more files on your hard drive.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;21&quot; height=&quot;350&quot; src=&quot;https://parrotsec.org/docs/assets/images/15-bcab58fa253767aa4e0e071de24e5101.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Here you can decide whether to enable swap or not. For more information about swap:&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://wiki.debian.org/Swap&quot;&gt;https://wiki.debian.org/Swap&lt;/a&gt;&lt;/p&gt;  &lt;p&gt;&lt;a href=&quot;https://www.kernel.org/doc/html/latest/power/swsusp.html&quot;&gt;https://www.kernel.org/doc/html/latest/power/swsusp.html&lt;/a&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;22&quot; height=&quot;350&quot; src=&quot;https://parrotsec.org/docs/assets/images/16-b30e006873bd056da0f4b7c015b1e8a5.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&lt;i&gt;If you want&lt;/i&gt;, you can also encrypt the system by adding a passphrase:&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;23&quot; height=&quot;350&quot; src=&quot;https://parrotsec.org/docs/assets/images/17-eea5c3f0128bb8fbe365d6e0aa3e3927.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h5&gt;Step 5.7 - Creating a new user account.&lt;/h5&gt;  &lt;p&gt;You will be asked to create a new user, for simplicity we have chosen a &lt;b&gt;user&lt;/b&gt;. You can enter any name in here.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;24&quot; height=&quot;350&quot; src=&quot;https://parrotsec.org/docs/assets/images/18-e8ba6429db8a4dabc7c57628c148e6a2.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Then, click on &lt;i&gt;Next&lt;/i&gt;&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;Completing the installation process.&lt;/h4&gt;  &lt;p&gt;Finally, a summary of the choices made during the procedure:&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;25&quot; height=&quot;397&quot; src=&quot;https://parrotsec.org/docs/assets/images/19-63d224124d23cd80b40f22f1411dc5a2.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;You can decide whether to change the chosen settings, and then go back, or proceed with the installation of the system. Click on &lt;b&gt;Install&lt;/b&gt;.&lt;/p&gt;  &lt;p&gt;Confirm by clicking &lt;b&gt;Install now&lt;/b&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;26&quot; height=&quot;393&quot; src=&quot;https://parrotsec.org/docs/assets/images/20-1b66236a7ea62ec414f39e68c0316894.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;And wait for the installation to complete!&lt;/p&gt;  &lt;p&gt;With an SSD (SATA), it takes a few minutes.&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;27&quot; height=&quot;397&quot; src=&quot;https://parrotsec.org/docs/assets/images/21-af0446d44d47d92aeeeeef45e556d5b8.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;Well done! You have successfully installed ParrotOS on your computer!&lt;/b&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;28&quot; height=&quot;397&quot; src=&quot;https://parrotsec.org/docs/assets/images/22-698f019e90a6a249bfb9f619fe13e50e.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;h4 style=&quot;text-align: left;&quot;&gt;Login to Parrot Security for the first time.&lt;/h4&gt;  &lt;p&gt;Enter your Password:&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;29&quot; height=&quot;399&quot; src=&quot;https://parrotsec.org/docs/assets/images/23-de3941d4d27661797cbe16ec2a056aa8.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;  &lt;p&gt;&lt;b&gt;You just installed Parrot Security! Congrats!&lt;/b&gt;&lt;/p&gt;  &lt;p style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;30&quot; height=&quot;315&quot; src=&quot;https://parrotsec.org/docs/assets/images/24-a677c6a915145279fb0b9e556b45e0ff.png&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;
&lt;script&gt;mbtTOC2();&lt;/script&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/3079620510139405433/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/11/guide-to-parrot-linux-distribution_02060113007.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/3079620510139405433'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/3079620510139405433'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/11/guide-to-parrot-linux-distribution_02060113007.html' title='Guide to Parrot, a Linux distribution focused on computer security: VirtualBox.'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjDldjqx9Zxfhy-R8aIWBNk5asmC7pmNsHsenrm0mBr9twN_Ac41igRU4A8EM8NZZFsF65_9t-fGjulsjyZ0kmiDmXfakIpunE8Rrb5OaAWkSZcoW8-9B6fXLEKf0kbSFaWTr8qPck24jGy-IqTbrTXf94UEugQ8sp95059zthkVFrt1d6p8-sK2GbZxdW6/s72-w640-h316-c/VirtualBox-Parrot.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5957666542740923869.post-4769016153419756307</id><published>2025-11-03T14:06:00.000-08:00</published><updated>2025-11-03T14:06:00.111-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Linux Distributions"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Guide to Parrot, a Linux distribution focused on computer security: Raspberry Pi</title><content type='html'>&lt;p&gt;This version is available in all the variants offered by Parrot: &lt;a href=&quot;https://parrotsec.org/download/?version=raspberry&quot;&gt;Core, Home and Security editions&lt;/a&gt;.&lt;/p&gt;  &lt;h4&gt;Installation process&lt;/h4&gt;  &lt;p&gt;To proceed with the installation, you will need to get a microSD card of at least 8 GB (the Core edition however can also be installed on a 4 GB microSD).&lt;/p&gt;  &lt;p&gt;Note&lt;/p&gt;  &lt;p&gt;This procedure applies to any edition of Parrot on Raspberry Pi. Currently ParrotOS has been successfully tested on a Raspberry Pi 3B, 4B, 400, and 5.&lt;/p&gt;  &lt;p&gt;Now, download the ParrotOS edition of your choice from our &lt;a href=&quot;https://parrotsec.org/&quot;&gt;website&lt;/a&gt;.&lt;/p&gt;  &lt;p&gt;Then, insert the micro sd into your computer, and in the meantime, download the Raspberry Pi Imager or Balena Etcher. We will need one of these two to install the system in the microSD.&lt;/p&gt;  &lt;p&gt;&lt;img alt=&quot;imager&quot; src=&quot;https://parrotsec.org/docs/assets/images/1-6567374a591ba4e6436ef78b3fe2eded.png&quot; width=&quot;1414&quot; height=&quot;941&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Click on &lt;em&gt;Choose OS&lt;/em&gt; and select &lt;strong&gt;Use custom&lt;/strong&gt;.&lt;/p&gt;  &lt;p&gt;&lt;img alt=&quot;imager&quot; src=&quot;https://parrotsec.org/docs/assets/images/2-7ef5c75bbf7251e426216e150da6a33e.png&quot; width=&quot;1414&quot; height=&quot;944&quot; /&gt;&lt;/p&gt;  &lt;p&gt;Now a window will open where you can select the downloaded ParrotOS edition. It is a compressed &lt;strong&gt;img.xz&lt;/strong&gt; file.&lt;/p&gt;  &lt;p&gt;Then select your micro sd by clicking on &lt;em&gt;Choose Storage&lt;/em&gt;.&lt;/p&gt;  &lt;p&gt;Everything is ready, click on &lt;em&gt;Write&lt;/em&gt; and the writing procedure on the micro sd will start. Once finished, you can insert your microSD into your Raspberry Pi. &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://linuxlandit.blogspot.com/feeds/4769016153419756307/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://linuxlandit.blogspot.com/2025/11/guide-to-parrot-linux-distribution.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/4769016153419756307'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5957666542740923869/posts/default/4769016153419756307'/><link rel='alternate' type='text/html' href='https://linuxlandit.blogspot.com/2025/11/guide-to-parrot-linux-distribution.html' title='Guide to Parrot, a Linux distribution focused on computer security: Raspberry Pi'/><author><name>Hugo Luis Alberto Repetto</name><uri>http://www.blogger.com/profile/07244392241311725660</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilwVomTqkOKvXZ9YBOCfy2dPetoVx0QjQVJs0VPP1QEBSlniwgdnqnJjamnffdlVzdj2VGSVmgndr5w0BeuSxuW1mYVny-hqR3ueQE_J1FFg7oDFYViymRoFCrbVP_pCklHNRIHgFybiX7CZIgf9CbUbWStgXyzGiP4KkvQ9TeWGtAtFY/s220/tux-templier.png'/></author><thr:total>0</thr:total></entry></feed>