{"id":2141,"date":"2020-12-14T13:48:47","date_gmt":"2020-12-14T11:48:47","guid":{"rendered":"https:\/\/www.virtono.com\/community\/?p=2141"},"modified":"2020-12-10T08:17:50","modified_gmt":"2020-12-10T06:17:50","slug":"disposable-linux-set-up-a-secure-system-for-guests","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/disposable-linux-set-up-a-secure-system-for-guests\/","title":{"rendered":"Disposable Linux: Set up a secure system for guests"},"content":{"rendered":"\n<p>A live system is ideal if guests want to use the Internet or the youngsters do not yet have their own PC to look at holiday photos.&nbsp;It does not allow system changes and is therefore also a candidate for secure banking.<\/p>\n\n\n\n<p>A live system, and even better a personally adapted live system, is a nice, carefree system for second or old devices that are quickly used by different people.&nbsp;User administration becomes unnecessary, the system boots immediately to the desktop without logging in, changes in the running system are possible, but will not survive the next restart, any hard drive in the device remains untouched and can be used entirely as data storage, and finally is the system can also be switched to the next hardware quickly and mobile.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/disposable-linux-set-up-a-secure-system-for-guests\/#Live_systems_off_the_shelf\" title=\"Live systems off the shelf\">Live systems off the shelf<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/disposable-linux-set-up-a-secure-system-for-guests\/#Adapted_live_systems\" title=\"Adapted live systems\">Adapted live systems<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" id=\"s1sub\"><span class=\"ez-toc-section\" id=\"Live_systems_off_the_shelf\"><\/span>Live systems off the shelf<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The classic live system is\u00a0<a rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"http:\/\/www.knopper.net\/knoppix\/\" target=\"_blank\">Knoppix<\/a>\u00a0.\u00a0Due to its primary focus as a mobile admin tool, however, it is not necessarily the first choice for a secondary domestic system.\u00a0Currently, however, practically every well-known Linux distribution appears in the form of a live system that you can try out as you wish before installing it on your hard drive using the install link on the desktop &#8211; or not.\u00a0These live systems with installation options are practically all suitable for use as frozen second and guest systems.\u00a0Whether you have a more sophisticated\u00a0<a href=\"https:\/\/ubuntu.com\/#community\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Ubuntu<\/a>\u00a0or\u00a0<a href=\"https:\/\/linuxmint.com\/download.php\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Mint<\/a>\u00a0or a smaller\u00a0<a rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"http:\/\/lubuntu.net\/\" target=\"_blank\">Lubuntu<\/a>\u00a0,\u00a0<a rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"http:\/\/antix.mepis.org\/index.php?title=Main_Page\" target=\"_blank\">Antix<\/a>\u00a0,\u00a0<a rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"http:\/\/pointlinux.org\/\" target=\"_blank\">Point Linux<\/a>\u00a0or\u00a0<a rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/elementary.io\/de\/\" target=\"_blank\">Elementary OS<\/a>\u00a0The choice depends on taste and, above all, on the hardware used: Antix can revive very old devices (with CPUs without PAE capability, Lubuntu, Point Linux or Elementary OS are &#8211; in this ascending order &#8211; suitable for older or less equipped devices.<\/p>\n\n\n\n<p>For frequent use as a second system, a DVD however too slow and also not accessible for devices like netbooks (without optical drive).\u00a0Therefore you should transfer the respective ISO image to a USB stick.\u00a0As soon as you have downloaded the required ISO files, the best way to transfer them to a stick is in the terminal with dd (example):<\/p>\n\n\n\n<p><code>dd if=pointlinux-mate-core 3.0-32.iso of=\/dev\/sdc<\/code><\/p>\n\n\n\n<p>You must adapt the identification of the target device (here \u201c\/ dev \/ sdc\u201d) so that it refers to the USB stick.\u00a0If you\u00a0use\u00a0the\u00a0<a rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"http:\/\/sourceforge.net\/projects\/win32diskimager\/\" target=\"_blank\">Win 32 Disk Imager<\/a>\u00a0for the transfer under Windows\u00a0, carefully check the drive letter of the target device in the top right corner.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"s2sub\"><span class=\"ez-toc-section\" id=\"Adapted_live_systems\"><\/span>Adapted live systems<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A ready-made live system off the shelf offers, depending on the selection, an attractive desktop and sufficient software equipment.&nbsp;It does not require any maintenance, is unchanged after every reboot and starts directly on the desktop of the generic &#8220;Live User&#8221; without logging in.&nbsp;However, some live systems ask for the system language every time they boot or ask whether you want to &#8220;install&#8221; or &#8220;try it out&#8221;.&nbsp;What is of course completely missing is the ability to add or remove programs.&nbsp;And even more restrictive: control centers&nbsp;such as browsers, mail clients or messengers cannot be configured individually, which at best still seems reasonable for the browser.<\/p>\n\n\n\n<p>The ideal live system costs some setup time, but then offers a perfectly adapted environment with an individually configured&nbsp;.&nbsp;How to proceed:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.tecchannel.de\/i\/detail\/artikel\/3284883\/1\/2730121\/EL_mediaN100C3\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/images.tecchannel.de\/bdb\/2730121\/840x473.jpg?w=750&#038;ssl=1\" alt=\"You can completely dispense with login controls and general user administration.\" title=\"You can completely dispense with login controls and general user administration.\"\/><\/a><figcaption>You can completely dispense with login controls and general user administration.<\/figcaption><\/figure>\n\n\n\n<p><strong>Step 1:<\/strong>\u00a0You install the system suitable for the target hardware using an image from the Internet.\u00a0With some distributions you can choose an &#8220;automatic login&#8221; during installation.\u00a0This will start the system later directly to the desktop without a login dialog.\u00a0If this is not the case, activate the option later in the respective user administration.\u00a0A secure password is still useful to keep other users\u00a0away\u00a0from apt commands or programs such as\u00a0Gparted.<\/p>\n\n\n\n<p><strong>Step 2:<\/strong>The most complex part is customizing the system.&nbsp;This can be limited to only setting up a browser synchronization for the bookmarks or an account in the mail client.&nbsp;The detour via the installed system only becomes really worthwhile if you carefully remove unnecessary software ballast from the future live system (also under the &#8220;start programs&#8221;), install additional programs or, for example, prepare the file manager in detail for access to home network shares (through bookmarks and passwords).&nbsp;The \u201cenergy management\u201d options should also be used if the live system is to run frequently or permanently later.&nbsp;You have to take the time to check to what extent the hardware is playing along and actually waking up from a hibernation.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.tecchannel.de\/i\/detail\/artikel\/3284883\/1\/2730122\/EL_mediaN100FC\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/images.tecchannel.de\/bdb\/2730122\/840x473.jpg?w=750&#038;ssl=1\" alt=\"The system (Ubuntu Mate) that was temporarily installed on the hard drive and optimized there is now written to the USB stick as a live system.\" title=\"The system (Ubuntu Mate) that was temporarily installed on the hard drive and optimized there is now written to the USB stick as a live system.\"\/><\/a><figcaption>The system (Ubuntu Mate) that was temporarily installed on the hard drive and optimized there is now written to the USB stick as a live system.<\/figcaption><\/figure>\n\n\n\n<p><strong>Step 3:<\/strong>\u00a0Now copy the optimized system\u00a0as a live\u00a0system using the\u00a0<a rel=\"noreferrer noopener\" class=\"rank-math-link\" href=\"https:\/\/wiki.ubuntuusers.de\/Baustelle\/Systemback\" target=\"_blank\">Systemback<\/a>\u00a0tool\u00a0.\u00a0At this point we limit ourselves to a brief introduction to the &#8220;Create Live System&#8221; function.\u00a0In this dialog, by clicking on \u201cCreate new\u201d, an image of the running system is created in the \u201c\/ home\u201d directory.\u00a0When the process is complete, this image appears in the window under \u201cCreate Live Images\u201d (meaning: \u201cCreated\u201d, ie finished images).<\/p>\n\n\n\n<p>Here you mark the image you just created and a previously inserted USB stick under \u201cWrite target\u201d (\u201cWrite target\u201d is again unhappily translated and means the \u201cwrite target\u201d, ie the target device).&nbsp;The copying process begins by clicking on \u201cWrite to the destination\u201d.<\/p>\n\n\n\n<p><strong>Step 4:<\/strong>&nbsp;If the USB stick is set as the primary boot device in the BIOS settings, the live system boots, with Systemback using its own boot environment with boot selection.&nbsp;You can then delete the system temporarily installed on the hard disk by formatting the partition or the hard disk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A live system is ideal if guests want to use the Internet or the youngsters do not yet have their own PC to look at holiday photos.&nbsp;It does not allow system changes and is therefore also a candidate for secure banking. A live system, and even better a personally adapted<\/p>\n","protected":false},"author":4,"featured_media":2142,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5,3],"tags":[],"class_list":["post-2141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase","category-tutorial-how-to"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/xenialpup.jpg?fit=800%2C450&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-yx","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":714,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/tips-to-make-your-server-secure\/","url_meta":{"origin":2141,"position":0},"title":"Tips To Make your Server Secure","author":"Daniel Draga","date":"October 21, 2016","format":false,"excerpt":"Use secure password \u2022 Insecure passwords are the most common security vulnerability. > Use minimum 8 character passwords with alphanumeric ,grammatical symbols, etc Never use a significant date and dictionary words. \u2022Secure SSH Move SSH access to a different port to deter anyone without specific knowledge of your server from\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/10\/secure-server.jpg?fit=504%2C260&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":844,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/securing-the-clouds\/","url_meta":{"origin":2141,"position":1},"title":"Securing The Clouds","author":"Daniel Draga","date":"January 9, 2017","format":false,"excerpt":"Technology is massively integrated with modern business, but many of those businesses still lack a modern security solution which helps protect against vulnerabilities in each layer of organisation. With the Protection Service for Business (PSB), this changes everything. It is a unique breakthrough on technology which provides total protection yet\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/cloud-security.jpg?fit=767%2C538&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/cloud-security.jpg?fit=767%2C538&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/cloud-security.jpg?fit=767%2C538&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/cloud-security.jpg?fit=767%2C538&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":214,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/secure-socket-layer-ssl\/","url_meta":{"origin":2141,"position":2},"title":"Secure Socket Layer (SSL)","author":"Daniel Draga","date":"July 30, 2016","format":false,"excerpt":"SSL stands for Secure Socket Layer. Secure Socket Layer (SSL) technology allows web browsers and web servers to communicate over a secure connection Originally developed by Netscape, SSL has been universally accepted on the World Wide Web for authenticated and encrypted communication between clients and servers. Responsible for the emergence\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/2.jpg?fit=376%2C286&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":942,"url":"https:\/\/www.virtono.com\/community\/news-announcements\/web-pages-not-served-via-https-will-be-marked-not-secure-in-google-chrome-and-mozilla-firefox-are-you-prepared\/","url_meta":{"origin":2141,"position":3},"title":"Web pages not served via HTTPS will be marked \u2018not secure\u2019 in Google Chrome and Mozilla Firefox. Are you prepared?","author":"Virtono","date":"May 18, 2017","format":false,"excerpt":"Browsers are changing, are you prepared? Web pages not served via HTTPS will be marked \u2018not secure\u2019 in Google Chrome and Mozilla Firefox. Could your website be one of them? As the world's most popular browsers, this will affect nearly 70% of global internet traffic and other browser companies will\u2026","rel":"","context":"In &quot;Announcements&quot;","block_context":{"text":"Announcements","link":"https:\/\/www.virtono.com\/community\/category\/news-announcements\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/05\/https.png?fit=1197%2C854&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/05\/https.png?fit=1197%2C854&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/05\/https.png?fit=1197%2C854&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/05\/https.png?fit=1197%2C854&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/05\/https.png?fit=1197%2C854&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":876,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/linux-security-the-user-and-superuser-concept-and-how-and-why-it-keeps-your-computer-secure\/","url_meta":{"origin":2141,"position":4},"title":"Linux security : The user and superuser concept and how and why it keeps your computer secure","author":"Daniel Draga","date":"January 24, 2017","format":false,"excerpt":"Security is an important but complex topic. So I'll be doing a series of articles, focusing on the principles and working of security of Linux. The challenge is that it\u2019s an ever-changing idea. Software we think of as secure can become insecure as hackers figure out how to break though\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/unnamed-file.jpg?fit=500%2C590&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":230,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/steps-to-install-ssl-certificate-on-apache-web-server\/","url_meta":{"origin":2141,"position":5},"title":"Steps to Install SSL Certificate on Apache Web Server","author":"Daniel Draga","date":"July 30, 2016","format":false,"excerpt":"SSL stands for Secure Socket Layer. Secure Socket Layer (SSL) technology allows web browsers and web servers to communicate over a secure connection. What is a Certificate? A certificate is a digitally-signed statement from one entity (person, company, etc.), saying that the public key (and some other information) of some\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic.jpg?fit=1200%2C628&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic.jpg?fit=1200%2C628&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic.jpg?fit=1200%2C628&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic.jpg?fit=1200%2C628&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/ic.jpg?fit=1200%2C628&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/2141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=2141"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/2141\/revisions"}],"predecessor-version":[{"id":2143,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/2141\/revisions\/2143"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/2142"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=2141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=2141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=2141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}