The Activities button [[!img lib/activities.png class="symbolic" link="no" alt=""]]
11
To hear screen elements spoken to you, turn on the **Screen Reader** fromChoose **Accessibility Settings** in the accessibility menu (in the top bar, the[[!img lib/accessibility.png alt="" class="symbolic" link="no"]]). icon that looks like a person.
Choose **Accessibility Settings** in the accessibility menu in the top bar, the [[!img lib/accessibility.png alt="" class="symbolic" link="no"]] icon that looks like a person.
12
Such encrypted volumes are not hidden.<p>An attacker in possession of the device can know that there is an encrypted
volume on it. Take into consideration that you can be forced or tricked to give
out its passphrase.</p>
<p>An attacker in possession of the device can know that there is an encrypted volume on it. Take into consideration that you can be forced or tricked to give out its passphrase.</p>
In the **Authentication Required** dialog, enter your administration password.
14
When startopening *Thunderbird* for the first time, an assistant appears to guide you through the process of configuring *Thunderbird* to access your email account.
When opening *Thunderbird* for the first time, an assistant appears to guide you through the process of configuring *Thunderbird* to access your email account.
<p>To startopen this assistant again in the future from the main window of <i>Thunderbird</i>, choose <b>[[!img lib/open-menu.png alt="Menulink="no" class="symboliclink=no" alt="Menu"]] ▸ Account Settings</b> and then, from the <b>Account Settings</b> dialog, choose <b>Account Actions</b> ▸ <b>Add Mail Account…</b>.</p>
<p>To open this assistant again in the future from the main window of <i>Thunderbird</i>, choose <b>[[!img lib/open-menu.png link="no" class="symbolic" alt="Menu"]] ▸ Account Settings</b> and then, from the <b>Account Settings</b> dialog, choose <b>Account Actions</b> ▸ <b>Add Mail Account</b>.</p>
17
<p>If your usual operating system is in hibernation, accessing it might corrupt your file system. Only access your disk if your system was shut down properentirely.</p>
<p>If your usual operating system is in hibernation, accessing it might corrupt your file system. Only access your disk if your system was shut down entirely.</p>
17
**[*Cheese[*GNOME Camera*](https://wikiapps.gnome.org/Apps/Cheese)**Snapshot/), from the `gnome-snapshot` package, an application to take pictures and videos from your webcam.
[*GNOME Camera*](https://apps.gnome.org/Snapshot/), from the `gnome-snapshot` package, an application to take pictures and videos from your webcam.
21
<p>The packages included in Tails are carefully tested for security. Installing additional packages might break the security built into Tails. For example, installing OpenVPN might modify the firewall rules that Tails uses to force network traffic to go through Tor.So, be careful with what you install.</p>
<p>The packages included in Tails are carefully tested for security. Installing additional packages might break the security built into Tails. For example, installing OpenVPN might modify the firewall rules that Tails uses to force network traffic to go through Tor.</p>