Sometimes, after an automatic upgrade, your Tails USB stick might either:
2
<p>Running Tails inside a virtual machine has [[various security
implications|virtualization#security]]. Depending on the host operating system and your security
needs, running Tails in a virtual machine might be dangerous.</p>
<p>Running Tails inside a virtual machine has [[various security implications|virtualization#security]]. Depending on the host operating system and your security needs, running Tails in a virtual machine might be dangerous.</p>
2
If your Wi-Fi interface is not working, for exampleyou might experience the following:
If your Wi-Fi interface is not working, you might experience the following:
2
**The content of the USB stick will beis lost in the operation,** but an attacker might still be able to tell that Tails was installed on that USB stick using [[data recovery techniques|encryption_and_privacy/secure_deletion]] unless you [[securely clean all the available disk space|doc/encryption_and_privacy/secure_deletion#usb_and_ssd]] afterwards. ]].
The content of the USB stick is lost in the operation, but an attacker might still be able to tell that Tails was installed on that USB stick using [[data recovery techniques|doc/encryption_and_privacy/secure_deletion]].
In the Welcome Screen, keep the Persistent Storage locked.
3
To configure a printer or manage your printing jobs, choose <span class="menuchoice"> **Applications****Apps ▸ **System Tools** ▸ **Settings**</span> ▸ **Printers**</span>. .
You can connect to a local network using a wired, Wi-Fi, or mobile data connection:
4
***[GIMP](https://www.gimp.org/)*** is an advanced picture editor.You can use it*GIMP* to edit, enhance, and retouch photos and scans, createdrawings, and make your own images.
This can be achieved using a technique called <span class="definition">[[!wikipedia Cold_boot_attack desc="[[!wikipediacold boot attack"]]</span>. To prevent thissuch attacks, the data in RAM is overwritten by random data when youshutting down Tails.This erases all traces from your session on that computer.
This can be achieved using a technique called [[!wikipedia cold boot attack]]. To prevent such attacks, the data in RAM is overwritten by random data when you shut down Tails.