Search the [Debian website](https://www.debian.org/distrib/packages#search_packages).
25
Some software might, for example, modify the firewall and break the security built into Tails. But other software like games or office tools are probably fine.
Some software might, for example, modify the firewall and break the security built into Tails. But other software like games or office tools are probably fine.
38
Replace <span class="command-placeholder">lang</span> with the code for your language. For example, <span class="command">es</span> for Spanish or <span class="command">de</span> for German`vi` for Vietnamese.
Replace <span class="command-placeholder">lang</span> with the code for your language. For example, `vi` for Vietnamese.
40
for <span class="application">LibreOffice</span>: <span class="command"*LibreOffice* language package: <code>libreoffice-l10n-<span class="command-placeholder">lang</span></spancode>
*LibreOffice* language package: <code>libreoffice-l10n-<span class="command-placeholder">lang</span></code>
42
for <span class="application">Thunderbird</span>: <span class="command"*Thunderbird* language package: <code>thunderbird-l10n-<span class="command-placeholder">lang</span></spancode>
The <span class="command">hunspell</span>*Hunspell* dictionaries are used for spell-checking by <span class="application">Tor Browser</span>, <span class="application">LibreOffice</span>, <span class="application">*Tor Browser*, *LibreOffice*, *Thunderbird</span>*, and many other applications.
<p>Configuring additional APT repositories might break the security built into Tails and might install software that has not even been approved by Debian. Be even more careful with what you install.</p>
<p>Configuring additional APT repositories might break the security built into Tails and might install software that has not even been approved by Debian. Be even more careful with what you install.</p>
125
Correct the ownership and permissions of your additional `sources.list` files to be owned by `root` and only readable by others. For example:, execute the following commands.
Correct the ownership and permissions of your additional `sources.list` files to be owned by `root` and only readable by others. For example, execute the following commands.