<div class="linux"> For example, you can press the <b>Super</b> ([[!img lib/start.png class="symbolic" link="no" alt=""]]) key, then typeenter <code>disks</code> and chooseselect <b>Disks</b>. </div> <div class="upgrade"> Choose <b>Applications ▸ Utilities ▸ Disks</b>. </div>
<div class="linux"> For example, you can press the <b>Super</b> ([[!img lib/start.png class="symbolic" link="no" alt=""]]) key, then enter <code>disks</code> and select <b>Disks</b>. </div> <div class="upgrade"> Choose <b>Apps ▸ Utilities ▸ Disks</b>. </div>
4
When you shut down Tailith both techniques, all the data stored in [[!wikipedia Random-access_memory
desc="RAM"]] is securelyerased to protect you from [[cold boot attacks|doc/advanced_topics/cold_boot_attacks]].
With both techniques, all the data stored in [[!wikipedia Random-access_memory desc="RAM"]] is securely erased to protect you from [[cold boot attacks|doc/advanced_topics/cold_boot_attacks]].
Click on the system menu in the upper right corner of the screen.
6
[[!img password-prompt.pnglink="no" class="screenshot" alt="Authentication required: amnesia password (also called *administration password* or *root password*)"]] <!-- Note for translators: the alt tag is useful for SEO. -->
[[!img password-prompt.png class="screenshot" alt="Authentication required: amnesia password (also called *administration password* or *root password*)"]] <!-- Note for translators: the alt tag is useful for SEO. -->
7
a.If you are notrunning Tails[[!inline pages="inc/stable_amd64_version" raw="yes" sort="age"]]then you can continue with the next step. , click **Check for Upgrades**.
Browse locally with the *Synaptic Package Manager*:
7
Some ideas (were borrowed from Liberté Linux,in particular the improvements to the [[contribute/design/memory_erasure]] procedure) were borrowed from Liberté Linux.
Newer Mac computers with an Appleprocessor (M1, M2, and so on)
7
Your Internet service provider (ISP) and local network can see that you connect to the Tor network. They stillBut, they cannot know whatich sites you visit.To alsohide that you connect to Tor,you can use a [[Tor bridge|doc/anonymous_internet/tor]].
Your Internet service provider (ISP) and local network can see that you connect to the Tor network. But, they cannot know which sites you visit.To also hide that you connect to Tor, use a [[Tor bridge|doc/anonymous_internet/tor]].
7
This page describes some of the security measures built into Tails to protect from such attacks and explains how to access some types of resources on the local network.
This page describes some of the security measures built into Tails to protect from such attacks and explains how to access some types of resources on the local network.
7
To startopen *Electrum*, choose **Applications ▸ Internet ▸ Electrum Bitcoin Wallet**.
To open *Electrum*, choose **Apps ▸ Internet ▸ Electrum Bitcoin Wallet**.
7
[[!img desktop/accessibility.pnglink="no" class="screenshot" alt="Accessibility menu with the following options, all disabled by default: High Contrast, Zoom, Large Text, Screen Reader, Screen Keyboard, Visual Alters, Sticky Keys, Slow Keys, Bounce Keys, and Mouse Keys"]]
[[!img desktop/accessibility.png class="screenshot" alt="Accessibility menu with the following options, all disabled by default: High Contrast, Zoom, Large Text, Screen Reader, Screen Keyboard, Visual Alters, Sticky Keys, Slow Keys, Bounce Keys, and Mouse Keys"]]