Get a Pentest and security assessment of your IT network.

Cyber Security

Boot from USB: Privacy & Security

TL;DR

If you’re worried about spyware or want to securely wipe a computer, booting from a live USB drive lets you run an operating system without using the hard drive. This avoids any software hidden on your machine.

How to Boot From a Live USB Drive

  1. Download a Linux Distribution: Ubuntu, Mint, and Tails are popular choices. Tails is specifically designed for privacy. Download the ISO file from their official website.
  2. Create a Bootable USB Drive: You’ll need a USB drive (at least 4GB, preferably 8GB or larger) and software to write the ISO file onto it.
    • Rufus (Windows): Download from https://rufus.ie/. Select your USB drive, choose the downloaded ISO file, and use default settings for most options.
    • Etcher (Windows, macOS, Linux): Download from https://etcher.balena.io/. Select your ISO file, select your USB drive, and flash it.
  3. Change Boot Order in BIOS/UEFI: This is the trickiest part.
    1. Restart Your Computer: As it starts up, press a key to enter the BIOS or UEFI settings. Common keys include Delete, F2, F10, F12, Esc (check your computer’s manual).
    2. Find Boot Order Settings: Look for options like “Boot”, “Boot Order”, or “Startup”. The exact wording varies.
    3. Change the Boot Order: Move your USB drive to the top of the list. Use arrow keys and +/- keys, or drag-and-drop if available.
    4. Save Changes and Exit: Usually by pressing F10. The computer will restart.
  4. Boot from USB: If you’ve done everything correctly, your computer should now boot into the Linux distribution on the USB drive.

What Can You Do Once Booted?

  1. Check for Malware: Use a tool like ClamAV (usually pre-installed or easily installable) to scan your hard drive.
    sudo apt update && sudo apt install clamav
  2. Wipe Your Hard Drive: Be *extremely* careful with this! Tools like DBAN (Darik’s Boot and Nuke) can securely erase all data.
    • Download DBAN ISO from https://www.dban.org/
    • Create a bootable USB drive with DBAN (similar to creating the Linux USB).
    • Boot from the DBAN USB and follow its instructions. This will delete everything on your hard drive!
  3. Use Privacy-Focused Tools: If using Tails, you’ll have access to Tor Browser and other tools for anonymous browsing.

Important Considerations

  • BIOS/UEFI Variations: The BIOS/UEFI interface differs greatly between manufacturers. Consult your computer’s manual or search online for specific instructions for your model.
  • Data Loss Warning: Wiping a hard drive is permanent! Back up any important data before proceeding.
  • cyber security: Always download software from official sources to avoid malware.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation