To configure a printer or manage your printing jobs, choose **Apps ▸ System Tools ▸ Settings ▸ Printers**.
3
<p>Reporting errors is a great way of helping us improve Tails.Even if we are not able to reply to every report, we analyze all reportsto improve Tails.</p> .
If you are running Tails [[!inline pages="inc/stable_amd64_version" raw="yes" sort="age"]], continue with the next step.
7
a.If you are notrunning Tails[[!inline pages="inc/stable_amd64_version" raw="yes" sort="age"]]then you can continue with the next step. , click **Check for Upgrades**.
<p>If you are not connected to the Tor network yet, your cannot send us your report from Tails.</p>
11
To hear screen elements spoken to you, turn on the **Screen Reader** fromChoose **Accessibility Settings** in the accessibility menu (in the top bar, the[[!img lib/accessibility.png alt="" class="symbolic" link="no"]]). icon that looks like a person.
Choose **Accessibility Settings** in the accessibility menu in the top bar, the [[!img lib/accessibility.png alt="" class="symbolic" link="no"]] icon that looks like a person.
11
Execute the <span class="command">create partition primary</span> commaThis volume corresponds to create a new primarythe Tails system partition on the USB stick.
Such encrypted volumes are not hidden.<p>An attacker in possession of the device can know that there is an encrypted
volume on it. Take into consideration that you can be forced or tricked to give
out its passphrase.</p>
<p>An attacker in possession of the device can know that there is an encrypted volume on it. Take into consideration that you can be forced or tricked to give out its passphrase.</p>
12
1.Choose <span class="menuchoice"> **Applications** ▸ ****Apps ▸Tails** ▸ **Tails Cloner** </span> to startto open *Tails Cloner*.
After you started Tails, copy one of the bridge lines from this other USB stick into *Tor Connection*.
17
[Tor](https://torproject.org/) is the best anonymity network available. TorTor has partnered with leading research institutions and has been subjected tointensive academic research. Tor has received awards from institutionssuch as the [EFF](https://www.eff.org/awards/pioneer/2012) and the [FreeSoftwareFoundation](https://www.fsf.org/news/2010-free-software-awards-announced).Even the NSA qualified Tor as "[the King of high secure, low latency InternetAnonymity](https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)."
Tor has partnered with leading research institutions and has been subjected to intensive academic research. Tor has received awards from institutions such as the [EFF](https://www.eff.org/awards/pioneer/2012) and the [Free Software Foundation](https://www.fsf.org/news/2010-free-software-awards-announced). Even the NSA qualified Tor as "[the King of high secure, low latency Internet Anonymity](https://www.theguardian.com/world/interactive/2013/oct/04/tor-high-secure-internet-anonymity)."
17
Even someone who knows your bridge cannot know what you are doing online from Tails.