The Beginners Handbook
The Beginners Handbook
Debian 12 Bookworm
arpinux © WTFPL
thebeginnershandbook 1 Contents
Debian? What’s that?
Distribution, free software, community, packages, source code … but what is Debian in
fact?
Debian is an operating system free (as in free speech) and gratis (as in free beer). Debian allows your
computer to function and offers you a full set of Free Software for all the usual practices (surfing the Web,
sending emails, playing multimedia files, doing office kind of tasks), and more …
This collection of Libre Software comes to a large extend from the GNU project, launched in 1983 by
Richard M. Stallman. The Linux kernel developed by Linus Torvalds then came to complete this set of
software to make GNU/Linux.
GNU & Tux, logos of the GNU projet and the Linux kernel by Péhä CC-BY-SA
The Debian GNU/Linux distribution was started by Ian Murdock (rip) in August 1993. Everything started
with a little, but solid, group of free software hackers, which grew up to become a large and well organized
community of developers and end users. Debian is now developed by a thousand of volunteers spread
around the world.
So, Debian is a complete set of free software.
A free software is defined by the 4 freedoms https://www.gnu.org/philosophy/free-sw.en.html : it gives
the end users the freedom of using, studying, sharing and modifying that software, without breaking
the law. To achieve this, it is necessary for the developer to distribute the source code and authorize the
end-user to exercise its rights granted by a free license.
2
In memory of Ian Murdock by Péhä CC-0
One of the major interests of the free software is that it allows skilled people to audit the program code, to
insure notably that it does only what it is supposed to do. So it is an additional barrier to protect your
privacy .
Debian implements this principle in its Social Contract, and particularly in the Free Software Guidelines
according to Debian. This contract states that the Debian project will remain 100% free.
However the contract recognizes that some users might need “non-free” components to run their systems,
like some peripheral drivers, or some applications decoding specific music or video files, for example.
That’s why the distributed software is divided into 4 sections:
Debian is developed very thoroughly. Every new stable version is carefully tested by users before it is
released. And this release happens when it is ready. Hence few maintenance work is required once
the system is installed and facing problems is very rare.
thebeginnershandbook 3 Contents
Like numerous other free distributions, Debian is not very sensitive to malware (like viruses, Trojan horses,
spyware…) and for several reasons:
• This large variety of software is available from repositories hosted on servers controlled by the
project. Therefore, it is not necessary to search programs to be installed on dubious sites which
distribute viruses and unwanted programs in addition to the one you were looking for.
• The administrator and the user rights are clearly separated, which helps a lot in limiting the damages:
In case of a viral infection, only the user’s documents are affected. This clear separation of the rights
limits also the risks of error made between the keyboard and the chair. More details on the rights in
chapter 3.7.
The back-up of you data on a regular basis remains the best insurance to protect them against
potential viruses or technical issues, but also against your own mistakes (chap.9).
Do you need help? The first reflex, if you can, is to consult the documentation. Next come the various
user’s forums, and then a GNU/Linux Group (LUG), if you are lucky enough to be located nearby. There
are also several events dedicated to the free software in various associations: you will be able to schedule
appointments not far from your home by consulting agendas of the Libre software https://en.wikipedia.org/
wiki/List_of_free-software_events.
• The documentation embedded in the system itself: in general, the installed applications include
a manual available from the command line (chap.3.8) by typing ‘man application_name’ and/or from
the graphical menu with the “Help” button of the application.
• The on-line documentation: when you use a GNU/Linux distribution like Debian, you can access
a detailed on-line documentation, with a list of the functionalities of the embedded applications.
Debian provides you an official documentation: https://wiki.debian.org.
• Self-help and support forums: the free software community is divided into a host of forums, sites
and blogs of information. Finding your way in this abundance of communication is sometimes tricky,
and you should rather prefer the sites dedicated to your own environment or distribution. Concerning
Debian, the main self-help forum is available to support you: the Debian User forum (https://forums.
debian.net/). You could get some extra information on the Debian Official Support page: https:
//www.debian.org/support
• Associations and LUGs: if you are lucky, you are living not too far from a Linux users group or an
association where members meet on a regular basis. In this case don’t hesitate to pay them a visit
for a little chat (https://tldp.org/HOWTO/User-Group-HOWTO-3.html)
Debian banner
thebeginnershandbook 4 Contents
1.2.1 About forums, geeks, and the terminal
The self-help and support GNU/Linux community mainly consists of passionate volunteers who
share their knowledge with great pleasure. They are also very technical persons, friendly called the geeks
(usually wearing a beard), with several years of computer practice behind them. This experience leads
them to master the terminal, which is the most efficient tool to manage a GNU/Linux system: therefore,
the very first answers found on the forums will naturally be given in the form of a set of command line
operations. Don’t be scared: in most of the cases a graphical solution (using the mouse within a window)
exists also. Ask kindly and you will get an explanation.
To be able to ask a question on a self-help and support forum you should usually register first.
You need a valid email address to register with, then receive a confirmation request message and, once
registered, the notifications of the answers you got.
Before you ask a question, please remember to look first into the Questions/Answers already solved:
most of the forum include a search function by keyword, which will help you find out if your problem is
already described in there and has a documented solution.
Don’t forget that a forum is usually maintained by volunteers, not to be confused with a post-sales cus-
tomer service organization .
Kali Ma Shakti de
thebeginnershandbook 5 Contents
A simplified introduction to computer
Dev vs users
6
How does a computer work ?
One launches applications, clicks on icons, types some text in … One needs a computer, a screen, a
keyboard, a mouse.
In this handbook, we will show you the basic manipulations in order to use your mouse and your keyboard.
What use for a computer?
It seems difficult to summarize in few sentences the whole scope of the information technology field. How-
ever its usage is somewhat clear :
• watch a movie: whether it is for your summer vacation footage, or a DVD, or a video file downloaded
from Internet, Debian offers you several multimedia players. An example in this manual with VLC
(chap.6.7)
• listen to music: enjoy your audio CD, your direct radio streaming, or your digital music library with
Rhythmbox (chap.6.8) and without any trouble.
• search for something on Internet: browse the Net, visit pages, contribute to Internet, by using
several Debian web applications, let’s take Firefox as an example (chap.6.6).
• read or write electronic mails: communicate with your family, your contacts, using either your
email client or your web browser (chap.6.4)
• work on formatted documents or presentations: Debian includes several applications, but the
LibreOffice suite (chap.6.9) will let you perform all kinds of office work using compatible formats.
• walk through your family pictures: your memories in one click, simply using the image viewers
integrated on all the Debian desktop.
• print documents or images: Debian uses the CUPS printing server, and its common configura-
tion tool (chap.6.2.2), but you can also use an integrated utility for a simplified printer configuration
(chap.6.2.1)
And this is exactly the know-how you are going to acquire with the beginner’s handbook .
Keep in mind that this manual is not cast in stone… Our advices are only suggestions regarding your
computer knowledge …
First of all, you are free!
Importantly, be as honest as possible: we are all beginners in one domain or another (personally, I am
unable to change the injectors in the carburetor of my car) and it is not a fault. The issue is raising only
because computers are taking a large space in our lives, and penalize the newbies. But we are here to
change all that!
The goal of this manual is not to transform you in GNU/Linux sysadmin (short for system administrator),
but simply give you the tools to utilize your computer as you want !
Outright beginner?
You never or rarely used a keyboard? You still wonder why you must “open a window” and what is this
“drag and drop” concept?
thebeginnershandbook 7 Contents
Please continue reading this manual and follow its guidance. You will learn how to use your mouse and
keyboard (the tools to directly interface with the machine), and to recognize the basic elements of your
desktop environment (menus, panels, windows, virtual desktop …)
Then discover Debian and its functionalities.
Novice user?
You are a Windows® user and/or you have a little experience with GNU/Linux, but you never installed it: it
is the right time to choose your flavor of Debian (chap.4) and discover the interface of your future system.
Basic user?
You have already used a Debian derivative and/or another free distribution, and you know exactly what
you need. Let’s jump directly to the serious stuff with the actual installation (chap.5).
The mouse is the physical interface which let you move the pointer on the screen:
the mouse moves are synchronized with those of the little arrow (the pointer) on your desktop.
There are different types of mouse; we will take here the example of the classical mouse with two buttons
and a scrolling wheel.
The left-click (or simple-click) is the most common opearation and is used to point to (or select) either
a folder, or a file or an image, which can then be open with a double-click (pressing twice the mouse
left-button). This left-click is also used to send commands to the computer (by validating a choice) when
one presses on the “button” or something else sensitive to the click (i.e. the cross closing a window).
2.2.2 Right-click
The right-click is used to open a contextual menu (a variable list of options, depending on the software
used and the “object” pointed at by the mouse) in order to modify a file, a folder, a configuration …
2.2.3 Middle-click
The middle-click or scrolling-wheel is used for scrolling and quick copy. If your mouse has neither a
middle button nor a scrolling wheel, the “middle-click” can be emulated by pressing on the two (left and
right) buttons at the same time.
The main action of the mouse is to point out an item to open it (in the case of a document for example) or
to launch it (in the case of a link to an application or a menu entry). For that, nothing very complicated,
just place the pointer on the element and then double-click with the left button of your mouse.
thebeginnershandbook 8 Contents
One thing that you SHOULD NEVER DO is to click several times on a button if you think that nothing
happens. It is very possible that an application won’t start “immediately”, it is very depending on your
hardware and the application being launched. As an example, a web browser takes significantly more
time to start up, than the file manager.
2.2.4.1 Drag-and-drop
To graphically move or copy your data, it is enough to “drag” them across the screen and “drop” them
where you want (this is the graphical equivalent of the mv command).
Example: to move a file you just downloaded into another folder, press the left-button on the file in question,
and while you hold the right-button, you move the mouse into the destination folder and then you release
the mouse button:
thebeginnershandbook 9 Contents
Drag and drop: hold the button while moving the mouse
Drag and drop: move the mouse into the destination folder
thebeginnershandbook 10 Contents
2.2.4.2 Selection of several items
If you need to move, copy or delete several items, you can select them together.
To select a group of contiguous items: press and hold the left-button, move the mouse to drag a
frame around them and release the button when they are all selected. Then you can act on the selection
like explained previously (copy/paste or contextual menu):
• either select each item one by one with a combination of the [Ctrl] key on the keyboard and the
left-button of the mouse: hold the [Ctrl] key down and left-click on each element you want to select.
• or select all the elements and then “remove” the undesirable ones using a combination of the [Ctrl]
key on the keyboard and the left-button of the mouse: hold the [Ctrl] key down and left-click on each
element you want to remove from the selection.
Put the cursor at the beginning or at the end of the text segment you want to select, then hold the left-button,
and move the mouse over the text you want selected. Then release the mouse button.
You can also double-click (click twice quickly on the mouse left-button) on the first word you want to select
and then move the cursor over.
thebeginnershandbook 11 Contents
Text selection with the mouse
If you are fast enough, a triple-click will select the entire line or paragraph.
With the right-button: a right-click will display a contextual menu giving you the choice among several
actions, one of them being the requested copy/paste. Put the cursor within the selected segment, right-
click and choose the “copy” action. Then move the cursor where you want to paste the selected text,
right-click again and choose “paste”.
Copy and paste a text segment: cursor on destination, right-click > paste
With the middle-button: once the text segment is selected, you just need to move the pointer where
you want to paste the selection and do a middle-click. The copy is immediate.
thebeginnershandbook 12 Contents
2.3 The keyboard
The keyboard is the main physical interface to enter data in your computer. But it is not the just the
device which let you enter some words in the Internet search bar, or work with a word processor.
It includes also some special keys, called modifier keys, which allow you to execute quick actions by
modifying the behavior of the “normal” keys.
The combinations of some “special” keys with other “normal” keys form the keyboard shortcuts
(chap.2.3.2).
Default QWERTY keyboard layout
The “non-alphanumeric” keys of the keyboard give you access to extended functionalities during action
or edition phases. From the simple carriage return within a text editor with the [Enter] key, to the launch
of a Help window with the [F1] key, find hereafter some descriptions of these special keys:
• [ENTER] The first “special” key, which is not really a modifier key. This is the most important key
of your keyboard since it let you end a command line, launch a search request. Basically this is the
key saying “Yes” to the computer. When a dialog window opens on the screen, either to confirm a
download or delete an application, take the time to read the message before pressing [Enter].
• [Ctrl] or [Control] Located at the bottom of your keyboard, on both sides of the space bar, it is the
default key used for the shortcuts.
• [Alt] or [Function] By default this key displays the specific shortcuts of an application. Within an
open window, pressing the [Alt] key reveals the shortcuts to navigate through the menus or trigger
some actions. These shortcut keys are identified by an underscore.
• [AltGr] let you use the hidden characters of the keyboard. More information in the dedicated section
(chap.2.3.3).
• [Tab] or [Tabulation] Symbolized by two opposite horizontal arrows. It allows you to complete a
command or navigate through the various fields of a form, or menus of a window.
thebeginnershandbook 13 Contents
• [Shift] or [Uppercase] Key symbolized by a wide up-arrow. let you type capitalized characters, and
sometimes numbers (depending on your keyboard layout), some special characters like “@”,“%”,
“&” etc.
• [CapsLock] or [Capital Lock] Key symbolized by a lock or a larger [Shift], causes all letters to be
generated in capitals until deactivated. Equivalent to a [Shift] key down permanently.
• [ESC] or [Escape] This key cancels the latest entry of a modifier, or closes a dialog box asking the
user to make a choice (equivalent to click on the “Cancel” button in the dialog box).
• [F1], [F2]…[F12] Execute various functions… by definition. The [F1] key is often used to launch the
Help function within applications, [F11] to switch to full-screen mode, for example.
Shortcut Action
Note that some functionalities are not only available on text segments (like copy/paste), but on files also: if
you select several pictures in your ‘Pictures’ folder, make a [Ctrl]+‘c’ and then a [Ctrl]+‘v’ on your desktop,
your selected pictures will be copied there. In the same way, [Ctrl]+mouse-scrolling-wheel will zoom in or
out the content of your Internet navigator, as well as the content of a file manager window.
Keyboards can’t contain as many keys as available characters. In order to write the particular characters
in English, it is necessary to combine the keys like the shortcuts (simultaneously pressing of the keys)
thebeginnershandbook 14 Contents
First, a preview of the QWERTY’s “hidden” keys:
Each symbol is associated with a key combination. So to write “©”, you’ll have to simultaneously press
[AltGr] + ‘c’.
The beginner’s handbook provide you a mouse and keyboard training page.
Right or left click, movement with the mouse, special characters, keyboard selection … enough to get
started with your keyboard and your mouse quickly from a simple online interface:
https://lescahiersdudebutant.arpinux.org/exercices/index-en.html
One of the great strengths of the GNU/Linux systems is their user management. The separation of rights
and responsibilities provides a better security level when executing system administration tasks or ex-
changing data on the net. Small explanation …
thebeginnershandbook 15 Contents
2.5.1 $USER
Generally YOU are the user, of course. Sometimes one talks about the Chair-To-Keyboard
interface (abbreviated CTKI), since it’s very true that you are sitting between the chair and the keyboard,
or the mouse. When you work on your computer, it does not see you. It feels only the actions made by a
user with a login-name and sometimes a password.
Each user is allowed to perform a certain number of actions. Your user can, for example, use the keyboard
and the mouse, read and write some documents (files), but not all of them. We call that rights: to execute
administrative tasks, one must obtain the root administrator rights (chap.3.8.3).
2.5.2 #ROOT
Only one user has all the rights, it is the administrator. This special user is able to exe-
cute some tasks (in particular for the system administration) that other normal users cannot perform by
themselves. But a single mistake in an operation made by this root user could potentially break the whole
system.
At home, on your desktop computer, you can use your system both as a normal user and as an admin-
istrator. Some well defined actions have to take place in order to switch from one role to the other, like
typing the root administrator password (chap.3.8.3).
This clean distinction, which, by the way, does not always exist under other operating sys-
tems, strengthens the stability and security of the Debian GNU/Linux system, as mentioned at the be-
ginning of this manual. When working as simple/normal user you cannot make your computer unusable
(brick it), and the potential viruses cannot infect the whole system.
More details on rights and permissions in the chapter 3.7.
thebeginnershandbook 16 Contents
The graphical environment
Let’s start by looking at the various elements displayed on the screen. On this simple image, you
can already identify the first elements which are explained below in this handbook:
The LXQt desktop with the application menu and the PCManFM file manager
The “panel” or task bar (at the bottom of the screen, in this example, but it can be moved wherever you
wish) which could include the “application menu” listing your installed software, a collection of launchers
(small icons) for your favorite applications, the list of the currently open windows, the time, the notification
area…
A file manager window which displays the folders contained in your home directory.
You will discover other interfaces and layouts in the chapter dedicated to desktop environments
(chap.4.2).
17
3.1 The task bar
The “panel”, the task bar, the notification area… all these words to talk about the information and launcher
interface of your system.
Usually, it is a banner located at the top or the bottom of your screen, displaying several types of infor-
mation, launchers, menus to quickly access your data or your applications, but also informing you (new
email has arrived, what time it is, a USB disk was just plugged in…) via the notification area.
Here after a quick overview of the various “panels” on the Debian desktops: Gnome, Xfce, LXDE, MATE,
Cinnamon, KDE and LXQt:
Gnome-Shell panel
Xfce panel
LXDE panel
Cinnamon panel
KDE panel
LXQt panel
Irrelevant of the type of desktop, the task bar displays, at least, the following elements:
• An application menu, letting you have access to the installed software tools. In general, the appli-
cations are sorted and grouped by categories (Multimedia, Office…) and are launched by a left-click
on their labels or icons.
thebeginnershandbook 18 Contents
• A list of active windows or at least the title of the active windows. Depending on the context,
a left click on the corresponding button will minimize, restore or bring to the foreground the target
application.
• The time with the date also displayed when the cursor hovers on the area. On some desktops an
agenda is open by a left-click on the time.
• A notification area with more or less information, depending on the desktop, intended to display
messages coming from your applications (new email, network connection …)
• An action button to quit the working session, to suspend, stop or restart your computer. Depending
on your configuration you might switch user, with this button, and take advantage of the multi-user
mode of the Debian GNU/Linux systems.
Like almost all the elements of the GNU/Linux desktops, the task bar can be configured and embellished
by plug-ins (little specialized modules) or simply removed !
A right-click on the “panel” opens a drop down menu allowing you to change its configuration (except for
the Gnome-3 desktop). Hereafter an example of configuration for the Xfce panel:
thebeginnershandbook 19 Contents
3.2 Menus
The various applications installed in your system are available through several vectors: launchers on the
desktop, or in the task bars, and more generally using the menus.
In the menus, your programs are listed and sorted by categories. A left-click on the menu icon displays
the application and section entries. A left-click on a program icon launches the corresponding application.
Each desktop has its own specific menu:
thebeginnershandbook 20 Contents
Classic dropdown menus on LXQt or XFCE
thebeginnershandbook 21 Contents
3.3 Windows
Your applications, your data, your USB keys, are usually displayed within a decorated frame. Each desk-
top environment decorates windows its own way, but most of the times they implement the same functions:
• the title bar at the top displays the window title and the action buttons (minimize/maximize/close)
• the decorations around the window, which include two areas at the bottom to resize the window
using a mouse left-click
• the status area: some applications display informations at the bottom of the window (like free
space available in the active partition, size of the file currently pointed at …)
Actions on windows are possible with the keyboard: either directly with a function key, or by using a
keyboard shortcut (chap.2.3.2), but generally your mouse will do the job.
To close a window, left-click on its “close” button, usually symbolized by a cross in the top right corner of
the window.
To move a window on your screen simply move your pointer on the title bar (the top banner of the window)
then press and hold the left-click. The pointer will then change its usual look:
thebeginnershandbook 22 Contents
from to
The window will then follow the mouse motion until you release the left button.
If you don’t have access to the title bar, you can use the special [Alt] key on your keyboard.
Put your pointer on the window you want to move, then press the [Alt] key together with the mouse left-click
to grab and move your window.
Windows are automatically open on the screen with a certain size. To close them, we have seen already
that we need to click on the close button symbolized by a cross.
To resize a window, you need to move your cursor on the borders of the window or, even better, on one
of the bottom corners.
The pointer will then change its usual look:
from to or depending on its left or right position. When the look of the pointer changes,
press the left-button and move the mouse to resize the window like you want.
An alternative solution consists in using the special [Alt] key on your keyboard. Move the pointer inside
the window, then press together the [Alt] key and the right-button of the mouse. Then you will be able to
resize the window.
To maximize the window, double-click (click twice quickly with the mouse left-button) on the title-bar
(when using the GNOME environment) or use the maximize button located next to the close button, if
present (and it is the case on most of the desktops).
To avoid overloading your workspace, the Debian GNU/Linux environments support, since several years,
the virtual desktop concept: the elements displayed on your screen lay upon a “desktop”. You can have
several of them, which means that if you move to another “desktop”, it will be empty at first. If you re-
turn back to the previous desktop, you will find it in the same state as when you left it (with your open
applications on screen).
thebeginnershandbook 23 Contents
the full real estate for the comfort of your navigation.
It is also a nice mean to get organized with your tasks: the first desktop is reserved for the Internet
applications, the second for the multimedia, the third for the office work and so on, allowing you to leave
open your work in progress, for future modifications, without impacting the other activities.
Each environment has its own way to represent the virtual desktops:
• Xfce displays the virtual desktops in its top panel, within frame shapes representing the different
workspaces:
All your data, your videos, your documents, your pictures, are regarded by Debian GNU/Linux as files,
and these files are organized into folders.
Debian is an operating system (the big piece of software making your computer functional) which orga-
nizes the data according to their respective addresses, that is the path to follow, in order to access them,
from the top level starting point (the system root identified by the “/” symbol).
thebeginnershandbook 24 Contents
… the picture of grandma is a “file” having an “address” relative to a “root” ???
Imagine your computer is like your house. If your favorite book is located in a certain place, this
“place” is like an address relative to the “house”. For example, if the book is stored in the second
drawer of your nightstand, one can define its address (the path to follow in order to reach it) like this:
home,bedroom,nightstand,2nd drawer,favorite book.
To separate the various “items” we use the “/” symbol, which gives the following address in computer
language: /home/bedroom/nightstand/2nd drawer/favorite book.
The “root” of the system is symbolized by a simple “/”. The main folder containing all the users data is
symbolized by “/home/”, and your personal folder is named “/home/alice/”.
If we come back to the favorite book example, its address could be:
“/home/alice/Documents/books/my_favorite_book.pdf”
Your personal data are stored within your personal folder, whose address is “/home/your_user_name”.
They are organized within folders to ease the finding and consulting of the various files, by yourself or by
some programs (it is very logical for a photo viewer to look first at the “Pictures” folder).
Some items within your personal folder, relate to your interface configuration, the various fonts you are
using, your passwords stored in Firefox, etc.
thebeginnershandbook 25 Contents
This type of data does not need to be always displayed on the screen when you consult your photos or
documents: this is why these items are usually hidden.
They are identified by the form “/home/your_user_name/.hidden_file”. Please note the “.” (dot) symbol in
front of the file name.
When you want to unveil them, press together [Ctrl]+‘h’ (h obviously for “hidden”), or from the menu of
your file manager window goto “View” > “Show Hidden Files”:
Debian GNU/Linux includes a collection of programs to navigate on the Internet, or inside your personal
folder, or among all your photo albums, etc. These programs are stored inside “system folders”.
These folders are write-protected and some are also read-protected: this means that you can consult
some of them, but you may not modify any of them, as being a simple user.
In order to modify these items, you need to use the system administrator account: “root” (chap.3.8.3).
Thunar is the file manager by default with the Xfce desktop. This program lets you navigate through your
various folders, “Pictures”, “Documents”, etc. by using the mouse (double-click on a folder to look into its
content) or the keyboard (navigate among the folders with the arrows keys, and press [Enter] to open the
selected one).The role of a file manager is to display on screen the content of these folders: your personal
data. Thunar is accessible from the Xfce application menu in the task bar, under the name “file manager”.
Each GNU/Linux desktop environment has its dedicated file manager (otherwise it’s not funny) that has
a slightly different interface than Thunar. However, they all support the same functions of consultation,
thebeginnershandbook 26 Contents
search and modification of the data.
When Thunar displays your personal folder, a number of information and tools are already available:
• #1 The title bar: displays the folder being viewed and the program which was launched. It includes
the “action buttons” allowing you, with a mouse left-click, to minimize the window (then it will be
parked in the task bar), to maximize the window (it will occupy the full screen), to close the window
or any other actions available with the window manager in use.
• #2 The menu bar: each menu gives you the possibility to act on items (copy/paste/delete/rename,
etc.), to change the location, the view style (Icons, Detailed List, Compact List), and even to close
the window, always with a left-click. If the menu bar is hidden, you can display it with the shortcut
“Ctrl”+“m”.
• #3 The location bar: tells you which folder you are currently in, and, if there is enough room, the
latest visited folder(s).
• #4 The tab bar: tells you which folders are open in the active windows. Thunar tabs operate like
those in your Internet navigator.
• #5 The side pane: displays the main folders (personal folder, wastebasket, file system, desktop),
your shortcuts (favorite folders) and the external volumes (USB keys or hard disk drives plugged
as USB devices). A left-click on the label will display the selected folder. A middle-click will open
the folder in a new tab (handy to copy or move data). The side pane can also display the tree
structure of your system, that is the complete set of your folders and files sorted hierarchically. You
can mask/display the side pane with the keyboard shortcut [Ctrl]+‘b’.
thebeginnershandbook 27 Contents
• #6 The main pane: displays the folder content. If this folder includes other folders, they are po-
sitioned before the “simple” files (like photos, PDF documents, etc.) and, by default, sorted by
alphabetic order (you can change the sort type from the menu > View > “sort by”).
• #7 The status bar: displays the number of items in the concerned folder, and the free remaining
space in the current file system, or indicates if one or several items are selected.
Thunar will let you consult your data, sort them, and modify them.
Note that other file managers have a different look and feel (GTK3), like placing the application menu
directly in the title bar like Gnome for example (chap.4.2.1).
Consulting your data is very easy. Launch Thunar which, by default, opens your personal folder. You can
then decide to open another specific folder depending on the type of data you are looking for.
To open or explore a folder, put the mouse pointer over it: a double-click with the left button will open
this folder in the same window. A middle-click will open the folder in a new window tab.
You can also click on the shortcuts located in the left side pane of the Thunar window.
To open a file, put the mouse pointer over it: a double-click with the left button will open this file with
the application assigned to it by default. A right-click will display a contextual menu which, among other
things, allows you to open the file with another application of your choice.
To select several items move the mouse cursor in an empty area of the window, left-click,hold and simply
move over all the items that you want selected. Then release the button.
After this, you can remove one or several items from the selection using the shortcut [Ctrl]+left-click on
each of them.
More details in the simplified initiation (chap.2.2.4.2).
Once selected, you can apply some modifications to these items as detailed in the “Modifications” chapter
below.
thebeginnershandbook 28 Contents
store your downloaded files in the “Downloads” folder, the music player will look into the “Music” folder …
And so on.
Thunar allows you to create shortcuts to ease the access, the classification and thus the retrieving of your
data.
To create a shortcut, just “drag and drop” the desired folder in the side pane. This folder will then be
always accessible with a simple click.
A contextual menu shows up when right-clicking on an item (I.E. either a folder or a file), and then, let you
make a number of actions/modifications on this selected item.
Note that if you selected several items, modifications will then be applied to the whole selection.
• Open with the default application, here the Ristretto image viewer.
• Open with another application: if you choose this option, another window will open and let you
navigate in the system to select a different application (start searching in /usr/bin/‘app-name’).
• Send To is a menu to share this item via email, or create a link on the desktop, or other different
actions depending on the type of item selected.
• Cut: this action will remove the selected item with the goal of pasting it somewhere else. It is
then enough to navigate into the destination folder, to make a right-click on an empty area of the
window and to pick the “Paste” action in the menu.
• Copy: this action leaves the selected item in its original folder, but let you copy (clone) it into the
destination folder, following the same procedure as the one described in the “Cut” action above.
• Move to Wastebasket: this action removes the selected item from its parent folder and move it
directly into the Trash Bin (see next chapter)
thebeginnershandbook 29 Contents
• Rename: this action let you modify the name of the selected item.
• Set as wallpaper: is rather explicit and appears only if a image type file is selected.
• Create Archive: this action allows you to compress one or several selected item(s). In the window
that opens, you can choose the destination folder, by navigating in the side pane, enter a name for
this archive and select its type. Then click on the “New” button to start the archive process.
• Properties: this action let you modify the name of a file, the default application when you open it,
assign an “emblem” (or tag) to it or manage the access rights and “Permissions” of the selected
item.
The famous “Trash bin” (or “Wastebasket”) is reachable directly from the side pane of the Thunar window.
The “full bin” icon indicates that some items are currently in the wastebasket.
To empty the Wastebasket and remove definitively all the items in there, left-click on its proper icon
and select the “Empty Wastebasket” action. You can also use the “File” menu and then click on “Empty
Wastebasket”.
Sometimes the context menu has the “Delete” entry. Be careful because this menu entry will not move
your files to the recycle bin: they will be deleted immediately and definitively.
Debian is a multi-user GNU/Linux system. It is therefore necessary to put in place a mechanism to protect
the items belonging to each user, so that user alice could not modify the “tax & due” list of user arp, for
example.
To achieve this goal, each file and each folder belongs to one owner and to one users group.
For each item, one can give Read, Write and eXecute rights distinctly to its owner, its group or all the
others (I.E. persons which are neither the owner nor a member of the proprietary group).
To display these information, one can use the “ls” (list directory content) command, with the option “-l”,
within a terminal window (that you will discover in the next chapter):
thebeginnershandbook 30 Contents
ls -l
-rw-r----- 1 arp money 1794 Nov 20 14:46 tax-and-due.txt
Here, one can see that the user arp has the “read” and “write” rights, on the file ‘tax-and-due.txt’, while
the members of the money group (which user alice is part of) can only “read” this file, but not modify it,
and the others cannot even open it (“-”, means no right).
The file managers integrated in the various Debian desktops let you also display and/or modify the rights
and permissions of your system folders and files “with the mouse only”. To do so, you need to open the
contextual menu with a right-click on the file/folder you are interested in, and click on “Properties”. In the
new window which opens, click on the “Permissions” tab:
In this example, the file belongs to “Me” (dave), who has the Read and Write access, like my group “dave”,
while the other users have no access at all.
thebeginnershandbook 31 Contents
3.8 The terminal
When you launch an application from the menu, or when you move a file from a folder to another by using
your mouse, you send instructions to your computer in graphical mode.
These instructions can also be sent directly, without going trough a menu or launching an application,
thanks to the Terminal which gives you access to the command line. This tool is more powerful than
the graphical interface because it let you use all the options available in your application. It is also your
last resort when the graphical session is gone.
The only concern is that this little black box, full of strange signs, is somewhat frightening … But we are
going to demystify all this and show you that the terminal can become your new friend .
In case of doubts, don’t hesitate to ask your questions in the support and help forums (chap.1.2).
Never run terminal tests in administrator mode !! : some very useful commands like “rm” (remove)
allow you to bypass the “wastebasket” principle, but could be devastating on the entire system when you
are running them in administrator mode.
3.8.1 Presentation
Terminal presentation
Let’s simply start with what you see written in this terminal window:
• the user, its you, or more exactly the one who is logged in and uses the terminal
• the host name, is the name of the machine on your local network, a name you did enter during the
system installation
• the path, is the place where you are currently located in the file system (here the personal folder
‘/home/arp/’ symbolized by the tilde “~”)
thebeginnershandbook 32 Contents
• the prompt delimiter, (symbolized here by the “$” sign) after which you will type the command
line. Its output (or “feed back”) will be displayed on the following line(s) of the terminal.
The configuration of the full prompt string resides in the ‘~/.bashrc’ (hidden file in your personal folder)
“bash” interpreter configuration file. The bash program is handling the commands entered in the terminal
(to make a long story short); it enables you to send commands, typed in the terminal, to the computer
system in order to give it various instructions or obtain some information back. Please note that you can
also customize the Terminal display with the menu “Edit > Preference”.
To tame the beast, we are going to start with a simple “cd” (standing for “change directory”), which let
you walk through the file system.
When you open a Terminal, you are located by default in the personal folder of the user logged-in (here it
is the /home/arp/ $Home folder). This folder includes the sub-folders Pictures, Downloads, etc.
To go down into the ‘Pictures’ sub-folder, I type in the words “cd Pictures” - without the quotes - (and the
uppercase is of importance here, hence the necessity to clearly identify the item names one is looking
at…) then I press [Enter] to send the command. To reach this ‘Pictures’ folder from anywhere in the file
system, you would need to provide its full path ‘/home/arp/Pictures’ (replace ‘arp’ by your user name):
You can see here that, within the command prompt prefix, the path “~” has been changed to “~/Pictures”,
because you changed the folder you were in, and this is exactly like opening a folder by using your graph-
ical file manager.
However, when you open a folder with the file manager, you “see” all the items in there. Within a terminal
you need to list the items with the “ls” command:
… easy, isn’t it ? See, you did not break anything. Yes, but you are going to tell me that this stuff is rather
useless…
thebeginnershandbook 33 Contents
OK, lets move on to cooler commands:
‘uname -r’ gives the version of the active Linux kernel.
Console : uname -r
‘uptime’ gives the elapsed time, since the system is up and running, how many users are currently logged
in, the system load average for the past 1, 5, 15 minutes, in order to see if the process waiting list is not
too long. If the load is over 1 (for old computers) or 2 (for dual-cores and +) this means that one process
is running while another one is waiting.
Console : uptime
You want to return back in your personal folder ? Just a small and simple ‘cd’ and you are @home.
Console : cd
Your screen is a bit crowded ? A small ‘clear’ will empty the console.
Console : clear
On a GNU/Linux system, an administrator is a user who has the right to manage the system, install or
remove applications and modify “normal” user accounts (among other tasks). You can get administrator
rights via the “root” account or substitute yourself to it thanks to “sudo”.
thebeginnershandbook 34 Contents
3.8.3.1 “root” and “user”
If the Debian installation was done by creating both “root” superuser and “normal” user account
(for a regular system usage), to place an order in administrator mode when the session was opened as a
“normal” user, Debian uses the “su -” command. You are then asked to enter the superuser password,
nothing is displayed on the screen when typing the password in, this is normal.
Example: Debian system opened by the “normal” user: “user”
user@debian-pc:~$ su -
Password:
root@debian-pc:~# apt update
You note that the “$” sign (the command prompt delimiter), as been replaced by the “#” sign, indicating
that you are now using the “root” administrator account.
Once connected as “root” in the terminal session, you can launch system administration commands, for
example here, a package repository update within a Gnome terminal, using the command “apt update”.
If the Debian installation was done with the superuser account disabled (the root password was left
empty during the installation process), the “normal” user is able to gain the superuser privilege by using
the “sudo” command. When using sudo you will be asked to enter your own password.
Looking for update example:
Look again at this package list update example, that is the retrieval of the latest information concerning
packages and potential updates. After the completion of this package list update (verifying the reposito-
ries), we launch “sudo apt upgrade” to execute the available updates for the software you have installed.
This is what you will see in your terminal window :
thebeginnershandbook 35 Contents
Calculating upgrade... Done
The following packages will be upgraded:
bluetooth bluez libicu63
3 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 9374 kB of archives.
After this operation, 3072 B of disk space will be freed.
Do you want to continue? [Y/n] Y
Get :1 http://security.debian.org/debian-securit.....
Get :2 http://security.debian.org/debian-securit.....
Get :3 http://security.debian.org/debian-securit.....
Fetched 9374 kB in 1min 1s (154 kB/s)
Extracting templates from packages: 100%
Preconfiguring packages ...
(Reading database ... 123419 files and directories currently installed.)
Setting up libicu63:amd64 (63.1-6+deb10u1) ...
[...]
Setting up bluez (5.50-1.2~deb10u1) ...
Installing new version of config file /etc/bluetooth/input.conf ...
Setting up bluetooth (5.50-1.2~deb10u1)
Processing triggers for systemd (241-7~deb10u3)
Processing triggers for man-db (2.8.5-2)
Processing triggers for dbus (1.12.16-1)
Processing triggers for libc-bin (2.28-10)
user@debian-pc:~$
If you accept the changes, you will see the complete process of downloading, configuring and installing
the concerned packages. Then the terminal will “give the control back to you” by displaying the command
prompt, “user@debian-pc:~$”
That’s it, you just updated your system using the terminal!
You must be extremely strict when you send commands in administrator mode. To avoid errors, use the
auto-completion feature. This mechanism allows the computer to complete the commands you started
typing (3 characters are enough), or their corresponding arguments. This is accomplished by pressing on
the [Tab] key. If several choices are possible, they will be proposed to you as well.
A short summary of the GNU/Linux commands is proposed at the end of this manual (chap.11).
thebeginnershandbook 36 Contents
Pick your Debian
Debian is an operating system offered in several flavors, and you will need to make a choice depending
on your tastes, your needs and your hardware.
There are a lot of Debian derivatives out there, more or less stable and/or supported (Linux Mint Debian
Edition, AntiX, MXLinux, etc…) . This manual and the indications in there can be used for all the Debian
Stable “Bookworm” derivatives.
The GNU/Linux distributions are not all supported by a community the same way Debian is. Sometime,
a single person handle the entire distribution. The different distributions do not provide the same level of
documentation and support. They also do not offer the same durability. Choosing a “mother” distribution
like Debian insures you to receive stable and regular updates.
If you want to test other distributions based on Debian, we suggest you consult the Debian derivatives of-
ficial page (https://wiki.debian.org/Derivatives/CensusFull). If you want to consult a more comprehensive
list, visit Distrowatch.com which enumerates almost all the available active distributions.
37
4.1 Choosing the architecture
The processor, which is the compute and control unit of your computer, functions under a specific type
of architecture, that is it handles data according to its own type (32 or 64 bits, PowerPC …).
We encourage you to use an ISO image of type “netinst” (chap.5.2.1.1), which gives you access to the
most up-to-date software versions by downloading directly the applications during the installation process
(you need an active and stable Internet connection during the install). This version will let you install the
desktop of your choice.
You can also use an ISO image already including a ready-to-use environment (Gnome, KDE, Xfce …).
But you must choose an ISO corresponding to your processor architecture. In other words, decide be-
tween a 32-bit or a 64-bit version, or again between an i386 or an amd64 version.
Note that the “32-bit” version will run on a “64-bit” computer, but not vice-versa.
• If your computer has a sticker indicating “coreDuo”, “core2duo”, or was built after the year 2005,
you can take an “amd64” ISO.
• If your computer proudly displays the sign “Pentium IV M” or was born before 2003, take an “i386”
version.
• In case of doubts, you can take the 32-bit “i386” version, it functions everywhere.
• In case of a huge doubt, ask the question on a forum (chap.1.2)
Using a GNU/Linux distribution in an autonomous “live” session (chap.5.3.1), open a terminal, and in
order to find out the 32 or 64 bits compatibility, type the following command:
which returns the explicit result, here an example when using an ‘amd64’ processor:
Using a Windows® system, your processor model is displayed in the “General” tab of the menu Start
Button > Configuration Panel > System. It is then necessary to carry out a research on Internet to check
if this processor is compatible with a 64-bit system (for example, the indication under Windows Vista with
the heading “Type of system: 32-bit”, does not mean that the processor is not also compatible with a
64-bit system).
Debian let you adopt one or several desktop environments directly from the installer interface: Gnome,
Gnome Flashback, KDE, Mate, Cinnamon, Xfce, LXDE and LXQt.
thebeginnershandbook 38 Contents
… But why several Gnu/Linux “desktops” ?
The computer is only a tool, and even if we ask you sometime to learn a couple of tricks to make an
effective use of it, it is still your tool, and as such it must be highly adaptable to your taste, your working
habit, and to your own way to have fun.
With this perspective, each desktop has its own organization, its setting method, its various functionalities.
And it is not a superfluous diversity, designed by the brain mazes of some bearded geeks (although…),
but rather a strength of the free software: knowing how to propose rather than to impose!
Hereafter the description of the main characteristics of this various environments, to help you decide which
one to use. And then you will be able to add more of them, according to your needs and preferences.
The two main desktops are Gnome and KDE, but they are also the more “resource-hungry” solutions, so
don’t hesitate to test other environments.
– Integrated applications –
Each desktop environment is designed to offer a minimal functionality for the personal usage of your com-
puter.
So, within all the desktops presented here, you will find the Firefox Internet browser (chap.6.6), a file sys-
tem manager, a text editor, the LibreOffice suite (chap.6.9), a multimedia player (except on MATE DE,
but it’s easy to add one) and an access to a software library in order to maintain, update or make changes
in your installation.
thebeginnershandbook 39 Contents
4.2.1 Gnome
The Gnome-Shell interface is the default desktop for Debian 12 “Bookworm” and offers:
The Activities Overview, which is a separate view designed to enable users to get an overview of their
current activities and to enable effective focus switching. It can be accessed via the activities button at
the left of the top bar or by pressing the “Win” key of the keyboard. This view includes:
• A series of application launchers (that you can easily add or remove using the drag and drop method,
or by using a right-click on the “dock”).
• All the open applications.
• The capability to dispatch the applications to several virtual desktops (visualized under the search
box).
• A search engine for applications, files and even contacts.
The Time manager, at the center of the top bar, has an on click calendar, linked to the mail client,
calendar and contacts.
A system settings manager at the top right, giving access to the different parameters regarding the
screen brightness, the sound, the network, the session, and some other system settings.
thebeginnershandbook 40 Contents
Gnome: Time manager and System menu
Gnome includes a general detailed help mechanism, that you can access via the dock, by default, and
this should reassure all the beginners, and make them a lot more comfortable:
Main applications:
thebeginnershandbook 41 Contents
4.2.2 Gnome Flashback
Gnome Flashback offers a Gnome 3 session that will allow you to experience the user experience of
the Gnome 2 interface. Gnome Flashback offers a simple and clean interface, while retaining the main
features of the Gnome 3 desktop.
Gnome Flashback offers fewer applications than the default Gnome-Shell desktop, but you will find the
essentials softwares for the daily use of your computer.
This session was first offered as an alternative to the Gnome-Shell session in the form of a Classic Gnome
session (chap.7.1.1.4). Although this alternative still exists on Gnome-Shell, Gnome Flashback is now an
independent desktop available upon installation of Debian.
This desktop also features the Gnome Help utility, making getting started with your system particularly
easy.
thebeginnershandbook 42 Contents
A clean interface, of course, but perfectly configurable from the “Tweaks” and “Settings” menu entries:
Main applications:
thebeginnershandbook 43 Contents
4.2.3 KDE
KDE is a project delivering a graphical environment (called “Plasma”) and a full set of applications. KDE
is highly configurable, both in terms of desktop environment and supported applications. KDE has so
many capabilities that some people even find difficult to deal with it. Note that you can use KDE without
any particular configuration tuning. It can be fully functional with its “out-of-the-box” settings.
The KDE environment is visually close to Windows®, and offers:
• KDE Application launcher: the menu giving you access to the entire system.
• Graphical components: the modules you can place anywhere on your desktop to enjoy additional
functionalities.
• Activity manager: a banner which integrates your pending tasks, your appointments… another way
to help you with your daily work.
• Plasma: KDE is delivered with a collection of applications integrated in the “Plasma” desktop, and
providing a fluid and consistent graphical experience.
More than any other GNU/Linux desktop, you can transform KDE according to your needs and desires.
KDE is a very complete environment and has a configuration center, as well as a built-in help center.
To launch the control center, navigate to the main menu > Applications > Configuration > System Settings.
thebeginnershandbook 44 Contents
KDE System Settings on Debian
If you cannot find an application, you can enter its name or function in the search box of the main menu.
KDE uses Konqueror, a file manager that is also able to surf the Web… No need to open several appli-
cations to consult, view, classify, etc. Here after, a split view of Konqueror in action:
KDE, like Gnome, integrates a very comprehensive help center directly available from the main menu
> Applications > Help Centre. So even if KDE is full of widgets, panels, activities… you’ll find your way
around.
thebeginnershandbook 45 Contents
KDE Help Centre launcher
Main applications:
thebeginnershandbook 46 Contents
4.2.4 Mate
MATE is a fork of GNOME 2. This means that this desktop environment was started from a copy of
GNOME 2 and then modified independently.
This is the perfect environment for people who do not want to change all the work habits they acquired
when using GNOME 2. This is also a good system for the computer aided music and the resource-
intensive applications going with.
Mate aims to be lighter than GNOME 3, and as such, is more suitable for aging or resource limited com-
puters. It’s clearly a good compromise between GNOME 3 and Xfce 4.
Mate offers a “traditional” interface with its two task bars:
• The top panel includes, on the left, the main applications, the main folders and the system setting
menu.
• The right part of the top panel is reserved to the notification area and the quick settings (Audio
volume, keyboard configuration, small agenda)
• The bottom panel includes the desktop button (to mask all the application windows), the list of the
active windows, and the virtual desktops selector.
To configure Mate you open the control center (“system” menu > Control Center) and you have access to
the various components of this interface:
thebeginnershandbook 47 Contents
Control Center of the MATE desktop
Mate is a minimal environment which ships with few applications by default. You would be able to pick
your favorite tools later on. However, Mate embeds its own file system manager, Caja, which is a fork of
Nautilus (Gnome file manager), as well as a rather well designed Help Center.
thebeginnershandbook 48 Contents
4.2.5 Cinnamon
Cinnamon is a desktop environment derived from the Gnome-Shell project. It moved away from the all-
in-one interface of this latter, to adopt a more traditional interface (dash board along with a menu where
Icons are sorted by categories).
Cinnamon offers a complete desktop with all the helpful (or not) applications for your daily usage.
Cinnamon uses the Nemo file system manager, a fork from Nautilus, which reinstates some functionalities
removed by the latter: compact view, open in a terminal, open as root, etc.
The Cinnamon configuration is delegated to the system settings pannel which centralized all the system
and user settings:
thebeginnershandbook 49 Contents
Cinnamon is developed by the Linux Mint team (https://linuxmint.com/), and is one of the leading desktop
environments of this specific GNU/Linux distribution.
Cinnamon is a Gnome-Shell derivative and supports extensions which let you decorate your environment
with little gadgets.
Main applications:
thebeginnershandbook 50 Contents
4.2.6 Xfce
Xfce is a lightweight desktop environment for Unix type operating systems. Its goals are to be fast, little
greedy in machine resources, but visually attractive and user friendly. It is expandable, thanks to numer-
ous available plug-ins, and embeds a volume control application (xfce4-mixer), its own window manager
supporting transparency, shades … (xfwm4), an integrated archive manager (thunar-archive-plugin), and
disk, battery network, processor and memory monitoring tools, as well as various themes and miscella-
neous plug-ins.
This interface is clear and traditional: you won’t be surprised during your first encounter with it.
Xfce has the significant advantage of being fully modular, because it is released with different independent
plug-ins. Xfce also allows the integration of applications coming from other environments, and is able to
launch, during the system start-up, the Gnome and/or KDE services by default.
It is a perfect environment for beginners, offering a great stability, a complete graphical handling
(“with the mouse only”), and evolution capabilities with no real limit.
Like the other previously seen environments, Xfce centralizes its configuration settings to ease the cus-
tomization. Note that each elements can also be configured from its specific interface (like a right-click on
the panel to add a new launcher, for example).
thebeginnershandbook 51 Contents
The Xfce setting center on Debian
Main applications:
thebeginnershandbook 52 Contents
4.2.7 LXDE/Openbox
LXDE is a free desktop environment for Unix like systems, and other systems. The LXDE name is the
acronym for “Lightweight X11 Desktop Environment”.
And as its name implies, the goal of this project is to propose a fast and lightweight desktop environment.
As opposed to other desktop environments, the various components are not tightly linked together. In-
stead they are rather independents and each of them can be used without the others, with very few de-
pendencies (packages used during the installation).
LXDE is notably light, making it an ideal solution for small hardware configurations and computers refur-
bishing, but it requires a little more time to learn and use its different elements.
The LXDE design model implies that the configuration of each element needs to go through an interface
designed for this specific application. You will not find a “Control Center” akin to the Gnome one, but
rather a suite of lightweight tools to customize your environment.
thebeginnershandbook 53 Contents
LXDE Appearance and Session configuration panels on Debian
Note that each element being configured, displays its setting modifications on the fly, which makes the
customization very easy.
Main applications:
thebeginnershandbook 54 Contents
4.2.8 LXQt
LXQt is a light desktop environment. It offers a classical but modern and lightweight interface that will
let you work without thinking about it. It comes with a series of specific tools to take advantage of your
favorite data and applications. It is an ideal environment for old and low performance machines.
LXQt is the Qt variant (the graphic rendering engine of KDE) of LXDE (which works with Gtk, another
graphics rendering engine). You will therefore find certain similarities between these two environments.
Its lightness does not prevent it from having a centralized configuration tool allowing you to access the
settings of the main system functions: Menu > Preferences > LXQt Settings> LXQt configuration center.
LXQt configuration
thebeginnershandbook 55 Contents
LXQt is used as alternative environment in the Emmabuntüs Debian derivative (https://emmabuntus.org).
Main applications:
Here is a summary table of the elements offered during the traditional Debian desktop installation.
thebeginnershandbook 56 Contents
Installing Debian
The following sections describe the classical Single-boot installation: Debian will be the only distribu-
tion residing on your hard disk and the install process will be automatic (assisted partitioning, with the
whole Debian system in a single partition).
This manual is intended for beginners, and does not cover all the install capabilities of the Debian
system. If you are in a particular situation not covered here, look at the on-line Debian installation manual
(https://www.debian.org/releases/stable/installmanual).
For installations in a different context (separated /home partition, DualBoot, Logical Volume Management,
Encryption, Multi-boot, etc.) you will find the links to the specific documentations in chapter 5.5.
Most of the users never had to install a system previously (computers are usualy delivered with an oper-
ating system already installed). And that could be a little freaking … Make the time to be well prepared,
take a breath of fresh air, and everything is going to be all right .
One of the first questions when you want to install Debian concerns the hardware compatibility: is Debian
going to run smoothly on my computer??
A fast and simple way to check this out, is to type “Debian” followed by your machine type, within your
favorite search engine: look for “Debian IBM T60”, for example. In case of doubts, don’t hesitate to ask
on a support-and-help forum (chap.1.2).
In order to be really sure, you can use a distribution offering a test capability through a “live” session
(chap.5.3.1).
57
5.1.2 Backing up your data
If you anticipate to overwrite your hard disk with Debian, verify first that none of your personal data is in
there: everything will be lost.
Remember to back-up your data before you start messing with your existing partitions (chap.9).
A Debian distribution occupies 10 GB in average, but you should still plan for a minimum of 15 GB, to be
able to download the updates. For greater safety and if you plan to add few applications, reserve 20 GB
and you will be comfortable.
To install Debian from a “net-install” ISO requires some time because the software is downloaded from
the Debian servers during the process: the time duration needed for the installation then depends on the
speed and quality of your Internet connection and may vary from 40 up to 90 minutes.
To install a derivative from a Debian Live support, takes far less time (around 20 minutes, depending
on your computer power), because the packages are already included within the downloaded ISO image.
However, a system update will then be necessary after the installation, because the embedded packages
are dating back to the time when the ISO image was burned.
If you anticipate to install Debian as the unique operating system on your machine, you don’t have to do
anything special: the embedded installer includes the tools needed to prepare (I.E. to format) the disk(s).
If you anticipate to install Debian next to another operating system, take good care in preparing your hard
disk (like running a defragmentation of the Windows partition for example). More details in the section
dedicated to specific installations (chap.5.5).
Debian ISO images offered for each desktop flavors, in several architecture variations, and supported
by various media like netinst, CD, DVD, … are directly available from its website https://www.debian.org/
distrib/.
Here after the different ways to obtain a Debian ISO image. If you have other questions, read the Debian
FAQ: https://www.debian.org/CD/faq/index.en.html.
thebeginnershandbook 58 Contents
5.2.1.1 Debian Netinst
If your Internet connection is stable, we encourage you to download an ISO image of type “Netinst” which
includes everything you need to install Debian on any modern 32 or 64 bits (i386 or amd64) computer,
with all the desired options: you will be able to choose your main interface during the installation process.
• The advantage of this ISO image is that it will search for applications on the Debian servers during
the installation, allowing you to get a completely up-to-date system.
• The disadvantage is that you will need absolutely a network connection during the installation, either
wired (by cable, recognized natively in most cases) or wireless (Wi-Fi), when it’s recognized.
This is the ISO image used in the installation section of this manual.
To get hold of the “Netinst” ISO image, you can visit this page: https://www.debian.org/CD/netinst/index.
en.html. You will find there the torrent links (to share and relieve the load on the main servers) and the
direct “HTTP” to the ISO images, depending on your architecture. Below the torrent link to a 64-bit ISO
image:
Note that since Debian 12 Bookworm, installation media include specific non-free drivers and firmware
for specific hardware (for a Wi-Fi installation for example).
To obtain a classic bootable ISO image, pre-configured with a specific desktop, you can look at this page:
https://www.debian.org/CD/http-ftp/index.en.html.
This ISO file does not let you test your system, through a “live” session (chap.5.3.1) to check the hardware
compatibility with your PC. It only allows you to install Debian on your computer, which is already cool,
and let you install directly your preferred desktop, without needing a stable Internet connection at your
disposal.
Other images, called “autonomous”, are also available: they let you check your particular environment
through a “live” session. They include also an installation launcher on the desktop, which, once your tests
thebeginnershandbook 59 Contents
are completed, let you install Debian directly from the session you are in. To get hold of a live image, you
can visit this page: https://www.debian.org/CD/live/index.en.html.
More details on the dedicated “live” section (chap.5.3.1).
To relieve the main Debian servers and, at the same time, share your ISO image with other community
members, you can use the BitTorent protocol.
To obtain the list of the available “torrents”, you can visit this page: https://www.debian.org/CD/torrent-cd/
index.en.html.
In order to verify the integrity of the transferred image, Debian computes the “SHA sum” (short form
of “SHA256 check sum”). This check can be used on all kind of data, but is particularly useful when
downloading ISO images.
Note that the SHA256 sums indicated in this manual are only for example purose: remember to check the
real SHAsum of your file on the download site.
The sha256sum checking tool is integrated in almost all the GNU/Linux distributions. To verify the
SHA256 checksum of a file, just type the following command in a terminal emulator, including the path of
the file to be checked:
user@debian-pc: cd ~/Downloads
user@debian-pc:~/Downloads sha256sum debian-12.0.0-amd64-netinst.iso
which will return a result of the type (to be checked against the SHAsum given by the download site.):
ae6d563d2444665316901fe7091059ac34b8f67ba30f9159f7cef7d2fdc5bf8a \
debian-12.0.0-amd64-netinst.iso
thebeginnershandbook 60 Contents
GtkHash: verifying the SA256 checksum
In order to graphically check the SHA256sum on a Windows® system, you can use the HashMyFiles tool
that you can download here: https://www.nirsoft.net/utils/hash_my_files.html. You’ll have to scroll down
to find the download links.
• Download the archive file corresponding to the characteristic of your system : “hashmyfiles.zip” for
a 32-bit system or “hashmyfiles-x64.zip” for a 64-bit system.
• Extract on your hard disk the 3 files included in the zip archive.
• Launch the HashMyFiles.exe file
• From the menu File > Add Files, select the file to be checked, click on Open and wait for the calcu-
lation to complete (Loading xx%)
thebeginnershandbook 61 Contents
HashMyFiles : Debian ISO selection
• Double-click on the line concerning the ISO file to be checked, and the various checksum are dis-
played. All that’s left is comparing them with those specified on the downloading site of the Linux
distribution.
thebeginnershandbook 62 Contents
HashMyFiles : display computed checksums
To burn your Debian ISO file on a CD/DVD using a computer under GNU/Linux, simply open your favorite
burning application, indicate the path of the ‘debian-xx-iso’ downloaded file, and start the media burning.
For the Microsoft® users, read this tutorial made for the Windows® systems: https://www.digitalcitizen.
life/burn-iso-file-windows/
The USB key is the most convenient way to install GNU/Linux distributions, because you can change them
as often as you want and even test several of them in parallel. The key also secures your tests because
once the session is over, no trace is left on the key nor on the computer which booted from it.
Transfer will be done with the terminal, this is the recommended method. However, there is this a graphical
tool, Etcher from Balena https://etcher.balena.io/
Plug your USB key in and launch a terminal in “root” administrator mode (chap.3.8.3). We are going to
identify the USB key to be used, with the command:
blkid
thebeginnershandbook 63 Contents
which returns information of this type:
Here, our key is identified as UUID=“F9B8-E691”, is formated in “vfat” and includes the sdb1 partition.
Note carefully this sdb1 value, to avoid erasing by mistake a partition on your internal hard disk (here
sda1 is another partition on this disk).
The Debian ISO file should be located in the Downloads folder. Let’s move in there to act on this ISO file
(the “$Home” variable replaces the address “/home/your_loginID”):
cd $HOME/Downloads
Now, we are going to transfer the ISO content to the USB key, thanks to the “dd” command. Take good
care of naming the USB key device “sdb” and not “sdb1” (in our example), because it is the disk
device name which is requested, not the partition, and don’t forget to change the xx in the ‘debian-xx.iso’
file by the corresponding real version number.
Within a terminal in “root” administrator mode (chap.3.8.3):
The transfer duration on the USB key is obviously depending on the size of the ISO and on the transfer
rate of your USB port. This operation usually lasts from 10 to 15 minutes without any sign of activity within
the terminal window. Once the transfer is completed, the control will be given back to you, that is a new
command line prompt will be displayed in the terminal.
Note that you can use the minimal cp command to transfer ISO file, but you won’t see the copy progress.
Whithin a terminal in administrator mode:
Win32DiskImager is a bootable media creation utility for Windows®: it will allow you to create a USB key
from which you will then boot your computer in order to install Debian.
To install it on your Windows® system, go to the main project page and download the latest version:
https://sourceforge.net/projects/win32diskimager/
Win32DiskImager installs like other Windows®-compatible software. Once in place, first plug your USB
stick in and note the ID of the new disk displayed (disk “F:” for example). Then run Win32DiskImager.
thebeginnershandbook 64 Contents
Win32DiskImager
• In 1, you will choose the downloaded Debian ISO image: Click on the folder icon to open the file
picker. Win32DiskImager only looks for files of type “.img” by default: remember to set the search
filter to “.iso” instead of “.img” in order to view your debian-xxx.iso file.
• In 2, you will indicate the device to be used: it is the disk mounted when inserting your USB key.
Caution! All data on this key will be deleted during the transfer procedure.
• In 3, you start the ISO image transfer to the key. You can follow the progress of the process directly
in the Win32DiskImager window.
Wait a moment and you will be in possession of a bootable Debian USB key! You still have to restart your
computer from this bootable key and begin the Debian installation.
To proceed now with the Debian installation, using your CD/DVD or USB medium, you need to ask the
computer to boot from this device. If your computer does not boot automatically from the desired installa-
tion medium, you need to access the “Boot menu” or modify the “Boot order” in the BIOS.
Some computers have a function key that let you boot directly from a peripheral device, without having
to modify the BIOS parameters. Usually, pressing the F12 key at start-up gives you access directly to
the boot options. On the other end, to access the BIOS configuration you need to tap one key like DEL,
ESC or F2 during the start-up phase. More information at: https://www.boot-disk.com/manual/index.html#
bios-boot.html
As mentioned above, the key to access the Boot Menu at start-up may vary from one computer to an-
other. This specific key and the key to access the BIOS configuration are usually indicated during the
boot sequence for one or two second:
thebeginnershandbook 65 Contents
Open the boot menu on Toshiba
The boot menu let you select the boot peripheral without going into the BIOS configuration
Use the keyboard direction arrows to select the right peripheral (in this example the USB key is the “Re-
movable Devices”).
When you reach the BIOS settings, you should check if, within the Hard Disk Drive entry, there is a tree
you can expand and where the USB key is showing up. In that case you can move your USB key up to
the first position, by using the F5/F6 keys on your keyboard.
thebeginnershandbook 66 Contents
5.2.5.2 BIOS configuration
If the Boot-order menu is not available, you must modify the Boot priority inside the BIOS.
Once entered in the BIOS settings, the operations to execute are very simple, but you should be extremely
careful to not modify other parameters. Hopefully, in case of mistake, the program let you quit without
recording the changes, by pressing the ESC (or Escape) key. Other keys like F9 or F10 will let you reload
the default parameters, or to record the changes before quitting:
The navigation is done by using the directional arrows on the keyboard. One validate or enter inside an
option using the ENTER key. In most of the BIOS models, you move until the Boot menu is highlighted,
then find the peripheral selection for the boot (boot device, boot sequence, boot priority) and finally put
the various devices in the first, second, third etc … positions, reflecting the boot order you wish to apply.
Hereafter some peripheral names, like they might appear in your BIOS settings:
thebeginnershandbook 67 Contents
5.2.5.3 BIOS/UEFI/Secure Boot configuration
The correct handling of the UEFI SecureBoot is available since Debian 10 Buster, for the AMD64, i386 and
ARM64 architectures. This implies that one can now test and install Debian without the need to disable
the SecureBoot option: https://www.debian.org/releases/buster/amd64/release-notes/ch-whats-new.en.
html#secure-boot
Changing the boot order
You still have to change the boot order so that the computer starts first from the USB (or the DVD). Click
on the “Boot” tab and modify the order, if necessary, so that your medium becomes the first of the list as
explained on the previous chapter (BIOS).
Now, you save your changes and you start the Debian installation.
The best way to make your choice: try the system directly on your computer!
There are two possibilities: you can test a GNU/Linux distribution from a stand-alone “Live” session or
directly from your windows® system thanks to a virtualization software: VirtualBox or VMWare.
thebeginnershandbook 68 Contents
5.3.1 Testing Debian in Live session
Debian provides standalone “Live” images for safe testing a given environment. Their peculiarity is to
change nothing on the computer, everything happens in RAM and is forgotten once the computer is turned
off. These images have a setup launcher on the desktop that allows you, once tested, to install Debian
directly from your session.
To get a live image, visit this page : https://www.debian.org/CD/live/index.html.
The principle of the Live CD is the capability to use/test a distribution on a computer without any risks
for your personal data. The Live also let you check the distribution compatibility with your hardware.
The Debian software is “compressed” within a special file (the ‘squashfs.filesystem’ file) and embedded
in the downloaded ISO image. This same special file is “uncompressed” during the Live utilization, and
will later be copied on your hard disk during the installation process.
Whichever version you choose (Gnome, KDE, Xfce…), you will find on the desktop, and/or within the
“System” menu, an entry to directly install Debian. After having checked your machine compatibility, you
will be able to directly install the selected environment from the “Live” session.
Warning: This installation method is not the one encouraged by default. The Live install involves a risk:
if for one reason or another, the graphical interface freezes, the whole installation process will be compro-
mised.
thebeginnershandbook 69 Contents
if you choose this option, this is the Calamares graphical installer which will be launched in order to set
your system up. Here, within a Live session, you start with your language selection:
The Location tab allows you to set the clock via your time-zone.
thebeginnershandbook 70 Contents
Calamares installer: keyboard selection
The Keyboard tab exhibits an impressive list of options (you may think it’s too much)… In case of doubts,
pick the default keyboard, you will always be able to change it, once the installation is done.
The Partitions tab is the most important one, because it let you modify your computer disk(s) layout : to be
used with extreme care. For a single boot install (Debian will be the only system hosted by the machine),
you can select “Erase disk”. For a dual boot (next to another system), select “Install along side”. In case
of doubt send a question to the forum (chap 1.2).
thebeginnershandbook 71 Contents
Calamares installer : user creation
The Users tab allows you to define your identity on this machine, that is your full name, your login identity
and your password. You can also enable the automatic login (no password request) for this account.
The aptly named Summary tab, is an overview of what will happen during the installation. Please take
some time to review it carefully, because once you click on the “Install” button the partitions formatting
process will start, without any going back possibility. At that point, if you notice an error you can still return
to the settings with the “Back” button.
thebeginnershandbook 72 Contents
Calamares installer : Debian system installation
It’s now time to drink a cup of tea, open the window (a real glass window), while the Calamares installer
is doing its job.
thebeginnershandbook 73 Contents
Launching the Debian GNU/Linux system
thebeginnershandbook 74 Contents
5.4 Installation simple boot
Here comes the long-awaited moment, the actual installation of the Debian GNU/Linux system on your
machine … Are you ready to begin this exciting journey?
Hereafter a visual step by step explanation on how to easily install Debian, using the graphical installer.
This method erases the whole disk and installs Debian as the unique operating system on your ma-
chine. The ISO image is of the type “netinst”.
The Debian installer displays an explanation at every step of the process: with GNU/Linux , there is
no advertising, so please take few seconds of your time to read the little messages which talk about your
future system
Depending on your motherboard model, or if it boots in BIOS mode, the display can slightly change. In all
cases, select “Graphical Install”.
thebeginnershandbook 75 Contents
• The Install mode proposes a text in gray color on a blue background, and cursor moves are possible
only by using the keyboard arrows, or the TAB key, and then the Space bar to tick options on/off.
• The Graphical Install mode offers a prettier interface, enabling the mouse usage.
• Two other modes are specially configured to increase the installer accessibility.
Each installer pane displays a clear explanation message. When you don’t know the answer, take the
default setting. However, pay great attention during the partitioning phase, since this operation
could erase the existing data on your hard disk(s).
Installation: language
Selection of the system language by default: this choice will also modify the installer language itself, which
then will display its own messages in English (if you chose “English”).
thebeginnershandbook 76 Contents
5.4.3 Select your geographical location
Installation: country
This information allows the system to automatically set the date and time of your system, using a remote
time server.
thebeginnershandbook 77 Contents
5.4.4 Configure your keyboard
Installation: keyboard
Here you can define the general layout of your keyboard. Please note that you would be able to fine tune
its definition, once the system is installed.
thebeginnershandbook 78 Contents
5.4.5 System name setting
Installation: hostname
The host name is the “nickname” of your computer. For a domestic usage, you can pick whatever name
you want to call it. If this machine is part of a network, remember to ask your network administrator for
advice.
thebeginnershandbook 79 Contents
5.4.6 Domain name setting (if necessary)
Installation: domain
thebeginnershandbook 80 Contents
5.4.7 Root account creation
Enter the administrator password (twice to confirm). Like indicated in the information message, creating a
“root” administrator account is not mandatory. If you leave these fields empty, the first user will receive all
the rights to perform administrative tasks by using the “sudo” command and entering its own password.
The password is not shown in clear by default, but you can tick the check-boxes to verify that the pass-
words are matching. Do not enter “adminpassword”… please ! More information concerning passswords
in chapter 10.1.3.
thebeginnershandbook 81 Contents
5.4.8 First user account creation
thebeginnershandbook 82 Contents
5.4.9 First user Login
Then enter its identifier, that is the pseudo which will be used during the connection (login) to a session.
You will be able to create more user accounts once the system is installed, and give them, or not, the
system admin rights.
thebeginnershandbook 83 Contents
5.4.10 First user password setting
Like for the administrator account, you need to enter the password twice for confirmation.
thebeginnershandbook 84 Contents
5.4.11 Selecting the guided or manual partitioning scheme
To perform a “single-boot” installation (the computer hosts only one system), you select “use entire disk”.
thebeginnershandbook 85 Contents
5.4.12 Selecting the disk hosting the partition
In our example, there is only one disk. If your configuration is different, make sure you select the “boot
disk”, in general called sda.
thebeginnershandbook 86 Contents
5.4.13 Partitioning scheme selection
Your data will be kept on partitions. With a classic domestic system, you can “store” your data on the
same disk as your system. So you can select “All files in one partition”.
thebeginnershandbook 87 Contents
5.4.14 Modify or finish the partitioning
The partitions scheme is displayed for you to check : you can modify its layout if you think it is necessary,
but the default scheme is generally the right one.
thebeginnershandbook 88 Contents
5.4.15 Partitioning overview and formating process launch
Warning: this is the step during which the installer will format the partitions: the data
on the selected disk will be erased!
Installation
The base system is installed. You will choose your main interface later.
thebeginnershandbook 89 Contents
5.4.16 Analysis of the CD/DVD complementary contents (if necessary)
Optional: Had you opted for a Debian CD set including all the packages needed for the installation, you
would now insert the second CD (and tick the “Yes” option).
If you use an “netinst” ISO, as in our example, you can skip this step.
thebeginnershandbook 90 Contents
5.4.17 Selecting the network mirror country
thebeginnershandbook 91 Contents
5.4.18 Selecting the server hosting the archive mirror
thebeginnershandbook 92 Contents
5.4.19 Configuring a proxy server (if necessary)
thebeginnershandbook 93 Contents
5.4.20 Participating - or not - to the Debian popularity-contest
The popularity contest project is an attempt to map the usage of Debian packages. This site (https:
//popcon.debian.org/) publishes the statistics gathered from report sent by users of the popularity-contest
package. This package sends every week the list of packages installed and the access time of relevant
files to the server via email. Every day the server anonymizes the result and publishes this survey.
Note that participation in Debian statistics does not imply the capture of your personal data or the sending
of advertising emails … you can participate without any fear.
thebeginnershandbook 94 Contents
5.4.21 Selecting software
Now, it is time to select your main desktop interface, as well as the main services to be installed by default.
Note that you can select several desktops in view of directly installing several environments. Hereafter a
summary description of the proposed choices:
• Debian desktop environment let you install, or not, a desktop. The desktop environment instal-
lation can be done later on, or never, and it is not indispensable, for example on a server. But if you
are a beginner, a graphical interface will be easier to master.
In this example, the Gnome environment is used. Please note that you can install several of them:
they will be available from the session manager.
• web server includes a preselection of packages dedicated to Web servers.
• SSH server allows you to activate the ssh protocol, and computer remote control. Warning! En-
abling the SSH service might create a security breach if it is not correctly configured. For experi-
enced users only.
• standard system utilities includes a collection of applications to manage your operating system.
thebeginnershandbook 95 Contents
5.4.22 Packages installation
Time to take a little pause. Downloading and installing the packages may take quite some time, depending
on the power of your computer and the Internet connection bandwidth.
thebeginnershandbook 96 Contents
5.4.23 Installing Grub, the boot loader
Installation: GRUB
GRUB is the “launcher” of your GNU/Linux system. It must be installed to perform the start-up of your
Debian. So, the default answer “Yes” must be kept, except if you know exactly what you are doing.
thebeginnershandbook 97 Contents
5.4.24 Selecting the Grub location
When the system installation is of type “simplified single-boot”, you should install Grub on your machine
main disk, usually identified under the nice “/dev/sda” name.
thebeginnershandbook 98 Contents
5.4.25 Installation complete
Don’t forget to remove the CD or USB key to avoid re-launching the installer during the next boot.
Then complete the installation process by pressing the Continue button.
thebeginnershandbook 99 Contents
5.4.26 Debian first start-up
The entry by default will launch the system, when the advanced options include the “recovery mode”
start-up, which allows you to perform some maintenance tasks, for example when the graphical session
is broken.
Next comes the session opening of the Debian system, here under the Gnome environment, managed by
GDM.
Debian offers more possibilities than just the two methods explained in the previous chapters.
But this manual being intended for the beginners, we kept it simple and the more complex installation
modes are detailed in the official Debian documentation: https://www.debian.org/releases/stable/
installmanual
Just to give you a flavor of the other installation modes:
The Dual-boot mechanism let you install side-by-side two independent operating systems, and doing so,
allows you to select, at boot time, which one you want to launch.
This is not the recommended method: there are inherent risks for your data during the partition re-
sizing. If you choose this solution to get started on Debian, please remember that you can very well test it
first by using a Live session (chap.5.3.1) with no risks for your data.
More information of the Debian Dual-Boot Wiki: https://wiki.debian.org/DualBoot
So, the “Logical Volumes” utilization, replaces straight out the usual disk “partitioning”, and provide a
more flexible way to manage disk space by allowing modifications on them at any point of time.
It is possible, as well, to keep one part of the LVM partition without installed “Logical Volume”, pending
further decisions.
More details on the dedicated Debian LVM Wiki: https://wiki.debian.org/LVM
The confidentiality of personal data is is a pretty hot topic these days. In order to better protect your data,
you can opt for an encrypted installation. With this kind of installation, even in case of theft of your
computer, or removal of its hard disk, no data access is possible without the encrypting password !
The Debain Administrator’s Handbook provides us with more details (https://debian-handbook.info/
browse/en-US/stable/sect.installation-steps.html#sect.install-partman):
To put it simply, LUKS creates a container to host an encrypted volume protected by a password.
For more information and a complete guide, visit the digital self-defense guide: https://ssd.eff.org/en
Wikipedia is my friend …
Please note that the Debian installation in RAID mode, uses the RAID software (thanks to the mdadm
tool) and not the RAID hardware (handled by a physical RAID controller).
For more details and installation tutorial see the official Debian wiki https://wiki.debian.org/SoftwareRAID
or the dedicated section of the Debian Administrator’s HandBook https://debian-handbook.info/browse/
stable/advanced-administration.html#sect.raid-soft
First things to do after installation: Wi-Fi network connection, screen resolution, printer configuration …
everything you’ll need to do before your workstation is ready for operation.
Using either an Ethernet wired connection or a Wi-Fi wireless connection, your Debian system is expected
to access the network. The Ethernet connection is recognized natively. As far as the Wi-Fi is concerned,
it is sometimes necessary to use a non-free driver.
Fortunately, since version 12 “Bookworm”, Debian includes by default a wide range of non-free firmware,
enabling native use of most wireless network cards.
• If your Wi-Fi connection is recognized natively, jump directly to the Network manager sec-
tions (for the Gnome, Mate, Cinnamon or Xfce desktop), ConnMan (for the LXDE desktop) or the
connection editors under KDE or LXQt.
• If you network device is not functioning, you need to go to the “material recognition” section
(chap.6.1.5).
103
6.1.1 Network-manager-gnome
This is the network manager delivered with Gnome, Mate, Cinnamon, and Xfce. It is accessible from its
icon within the notification area (here on Gnome and Xfce):
All the active or inactive connections are listed here, and the Wi-Fi networks are detected as well. Left-
click on the network you want to connect to, and a dialog box will pop up. Select your network then
“Connect”. A password is then required (the one given by your Internet Service Provider). Here on the
Gnome desktop:
You will be able to modify the connection settings, and even “Forget” it:
Network selection
6.1.2 ConnMan
Select the network you want to connect to then click on the “Connect” button. The network passphrase
will be asked.
On KDE, the network connections are managed like on the other desktops: through a graphical interface.
A left-click on the network icon in the notification area gives you access to the list of available networks.
A click on “Connect” and KDE ask you to enter the network Wi-Fi key:
When this is done, you can connect your computer using this Wi-Fi network and/or modify its settings.
LXQt uses a different tool: “ConnMan System Tray” available from the general menu > Internet > Con-
nman UI Setup
The main ConnMan interface opens. Available networks (connected or not) are displayed in the “Ser-
vices” section. To connect to a network, use the “Wireless” tab:
Select your network then click on “Connect”. Then enter the password of the selected network:
An icon did take place in your notification area: when hovering the mouse over it, it displays network
information, and when clicked, it opens the main ConnMan interface.
Drivers are often provided by the manufacturer, and sometime also some Firmware (micro-program)
which needs to be loaded by the kernel inside the WI-FI device itself, using this very same driver. So it is
very important to check that the driver is correctly installed in the system.
To do so, we are going to use the command ip link:
ip link
If an interface named something like “wlp…” does not appear in the list, this means that the Wi-Fi driver is
missing.
If your network connection is not functioning, it is usually a driver issue. In order to select the right one,
we need first to identify the network device.
Within a terminal in user mode, launch the lspci command which lists all the available interfaces. If you
use this command alone, your terminal window will be filled up with all kinds of information. In order to
help you sorting out all these data, we are going to complement the lspci command with a grep and a cut,
like this:
Compatibility
Likewise Wi-Fi devices, printers need external drivers. However their detection by default is much better,
which enables Debian to embed a simplified printer setting interface (detailed in the first section of this
chapter). Methods may vary from one manufacturer to another.
To check your printer compatibility, you can visit the dedicated page of the openprinting.org site: https:
//www.openprinting.org/printers.
Regardless of the chosen method, don’t forget to plug the power cord at both ends, to verify that the paper
The Debian GNU/Linux desktops include the system-config-printer tool, a simplified graphical manager
to add and configure your printer.
If you followed the Debian classic installation procedure, this tool is already present on your system and
can be found usually at “System > Print Settings”, or in the Control Centers for Gnome or KDE. If you don’t
find it, simply open a terminal and launch:
system-config-printer
If a message indicates that the printing service is not available, it is enough to press the “Start the service”
button in the very same message window. You will be asked to enter your password. If this does not
improve the situation, chances are that the CUPS package is not installed.
Within a terminal in admin mode, install the CUPS package :
Click on the “Add” button to get the list of detected printers. If the button is disabled, click on “Unlock”.
Printer selection
If your printer was correctly detected, its driver has been selected for you. You can describe your printer
in the next window. Once you are done with the modifications click on the “Apply” button:
Printer description
The installer then ask you if you want to test the printer:
The printer is now correctly added to your machine. It is available for the printing tasks executed by any
of the installed applications on your system (LibreOffice, Evince (for pdf files), etc.).
To change your printer settings, double-click on its icon:
Printer configuration
Small hint: to change the printer behavior in case of error, go to your printer settings, click on the “Policies”
category, and select the “Abort job” option (instead of “Stop printer”) in the “Error policy” field.
The simplified interface is handy, but the classic CUPS interface is no longer as austere as it used to be.
You can access it from your Internet navigator since CUPS is a print server offering a web interface.
which includes the “Maintenance” and “Administration” menus. Depending on the selected operations,
the administrator password will be requested. (chap.3.8.3).
The terminal, this little box which frightens you so much, whereas it is actually your friend … yes, yes …
your friend.
You want a proof ? Easy: we are going to update the entire system using just one line.
You start by opening a terminal window (usually under the menu “System” of your environment).
If during the Debian install, both the “root” account and a “normal” user account (for the common use
of the system) were created, you have to use the command “su -” in order to execute a command in
administrator mode, when the session was open by the “normal” user. The super-user password is then
requested.
user@debian-pc:~$ su -
Password :
root@debian-pc:~# apt update && apt full-upgrade
On the other end, if during the Debian install, the super-user account was disabled (no password was
entered) , the “normal” user has the opportunity to gain the super-user privileges by using the “sudo”
command. When using sudo, your own password is requested.
The GNU/Linux desktops use Software or the Synaptic package manager on the Gnome, Xfce and
LXDE interfaces, or Discover on the KDE interface, and both tools include a notification function.
Thus, your system checks the repositories on a regular basis (when the network is available, of course),
without even bothering you, and displays a notification at the beginning of a new session when some
updates are available. It is enough to accept the updates, or to click on the notification bubble opening
up, to display the update manager tool integrated in your system.
If you want to manually check for available updates, you can use the terminal and the magic command
apt update in administrator mode:
user@debian:~$ su -
Password :
root@debian:~# apt update
If you have an online messaging service like gmail.com or free.fr, you can access it from your Fire-
fox web browser (launches from the application menus in the “Internet” section). Enter the address of
your online account provider (openmailbox.org, yahoo.fr, orange.fr, google.com …) in the address bar and
launch it by pressing [Enter].
If you do not have an e-mail account, or if you want to create a new e-mail account, we recommend that
you use one of the services that respect your privacy. For example:
If you want to use a local e-mail client, a dedicated software, Debian offers several tools, but all working
on the same model: Gnome uses “Evolution”, KDE includes “KMail” and Xfce integrates Thunderbird.
At first startup, Thunderbird provides temporary configuration interface and a foreground window that
allows you to create an account with two suppliers and partners.
If you want to take advantage of this option, fill the fields in and let you be guided, this configuration is
automatic.
If you are not interested, you can click on “Skip this step and use my existing address”.
Another window opens. Then provide the requested information about your account. You can choose
whether Thunderbird must remember the password. If you leave this option unchecked, you would need
to re-enter your password each time you connect.
Click on “continue”. Thunderbird then searches in its database the specific parameters for your email
account. When finished click on “Done”.
Thunderbird now displays your account details in the right column, starts downloading all your emails and,
depending on your provider, all your contacts (this may take sometime).
The Thunderbird interface is relatively intuitive. In the top tool bar you can check your mail, compose a
new message, open a chat session, access your address book, put a label on a message, or filter your
messages.
At the right of the menu bar you can find the Thunderbird menu, represented by three small horizontal
bars, from which you can set your preferences, and launch various actions.
For example if you click on the Message menu (or right-click on a given message), a list of actions is
proposed, like Reply, Forward, Archive, Mark as Junk, etc.
The right panel is reserved for the “Lightning” calendar, very intuitive: a click on a date will open the
assistant to make new appointments.
If you are looking for a specific message you have several options:
• Type few characters in the search field of the top menu bar;
• Click on one of the column headers (“Subject”, “From”, “Date”, “Attachments”, “Star”, “Tag” if you
tag your messages, Read/Unread status, etc.): your messages will be sorted immediately according
to the selected criterion (defined by the header name), which will let you find quickly an old message
rather than scrolling through an endless list of emails. By clicking a second time on the column
header the sort will be done in reverse order. Thus, by using this tool, you can customize the way
your messages are presented according to your own criteria.
If you have more email accounts you want to access via Thunderbird, click on the main menu (the three
small horizontal bars at the right of the tool bar) and select “New Message” > “Existing Mail Account …”
and continue the Mail Account Setup procedure like explained above.
In the modern presentation of Thunderbird (as well as other communication tools like Firefox and
Chromium, for example) the application menu is defined by three small horizontal bars (sometime called
“burger menu”) at the top right of the window. From this menu you have access to the various parameters
of the application.
If you prefer the classic presentation, with the menu bar at the top of the window, click on this Thunderbird
menu, then on “Preferences” and tick the “Menu Bar” on.
It is advisable to visit the Preferences setting window, where you can define the handling of junk mails,
define a master password for all your account, customize your tag list, among all the settings available in
there.
GNU/Linux systems follow the principle of rights and permissions by default. When you install Debian, a
password is requested for the primary user. This password is requested at the beginning of the session.
If you are using Debian in single-user mode, you can disable this password request in order to begin your
working session directly when the computer is started.
Debian uses three different default connection managers: GDM (on Gnome & Cinnamon), LightDM (on
MATE, LXDE & Xfce) and SDDM (on KDE and LXQt).
GDM3 (https://wiki.debian.org/GDM) is the Gnome Display Manager for the main desktop environment
on Debian. To enable automatic login from the system widget, click on the Gnome settings button:
Gnome settings
In the settings window, select the “Users” section. Unlock the application, the administrative password
will be asked.
LightDM
You can setup LightDM (https://wiki.debian.org/LightDM) by editing its main configuration file. To enable
autologin, you’ll have to edit it with a terminal. Open a terminal and become root with the “su” command
cp /etc/lightdm/lightdm.conf /etc/lightdm/lightdm.conf.bak
nano /etc/lightdm/lightdm.conf
The second command opens the configuration file in the CLI Nano editor. Use arrows to scroll and locate
those lines:
#autologin-user=
#autologin-user-timeout=0
Remove the “#” (uncomment) in front of each line then add your login like this:
autologin-user=my_login
autologin-user-timeout=0
You can close your terminal: your password won’t be asked anymore at login time.
In case of troubles, just enter this command in administrator mode to restore your previous LightDM con-
figuration:
mv -f /etc/lightdm/lightdm.conf.bak /etc/lightdm/lightdm.conf
KDE is a truly complete environment and SDDM (Simple Desktop Display Manager) provides you with
a graphical interface to configure your login screen. The configuration tool will allow you to manage the
wallpaper, the language used, some options and of course, the automatic login.
To access the SDDM configuration, direction the System Settings menu > Startup and Shutdown > Login
Screen (SDDM):
Enable automatic login from the “Behaviour” tab of the SDDM configuration interface:
Select the “Automatic login” checkbox together with the user ID from the “User” drop-down menu. As this
action changes the system settings, you will be prompted for the administrator password. On the next
login, your password won’t be asked.
LXQt uses sddm as KDE but does not offer a graphical configuration interface. To open your LXQt session
without a password, you must go through the terminal and edit the configuration file sddm.conf.
Start by creating the configuration files then edit it with nano within a terminal console in administrator
mode (chap.3.8.3):
Fill in the file by indicating the name of the session (“lxqt.desktop”) and the identifier of the user who will
benefit from the automatic connection:
Save the file using the keys [Ctrl]+x then choose “Y” to confirm the name of the file. Upon restart, you will
take advantage of the automatic connection.
The primary function of a web browser is to let you consult information available on the Web (World Wide
Web). The user gives the browser the web address of the resource to consult. There are three ways to
provide a web address:
• Type yourself the web address in the address bar of the browser,
• Select a entry in your list of bookmarks
• Follow a link on a web page, knowing that each link is associated with a web address.
The browser connects to the web server hosting the target resource. The communication protocol com-
monly used is HTTP or HTTPS (its secure version).
> If the resource is an HTML page, a compatible video file, or a PDF file, the browser display the page.
> If the resource is unknown or not handled by the browser, the choice is yours: download or open the
resource with an external application.
• The tab bar displays the open Internet pages and allows you to switch from one to another with a
single click.
• The tools bar displays: the backward and forward buttons, the address bar, the search field, the
bookmark button, the main Firefox menu.
• the browsing pane displays the web pages contents.
Firefox on Debian
Customize and configure Firefox through its main menu that appears when clicking on the “burger”
icon (at the right end of the tool bar):
• The first line of the menu “Sync and save data” allows you, if you have previously created a Firefox
account, to synchronize your data (like your bookmarks, history, passwords, open tabs and add-ons
installed) on all your different devices.
• “New Tab” opens a tab in the active firefox window.
• “New Window” opens a 2nd window with the Firefox browser.
• “New Private Window” will open a 2nd window but this time, passwords, cookies and history will
be automatically deleted, leaving no trace at the end of the session.
• “Bookmarks” allows you to consult and manage your favorite websites.
• “History” allows you to consult and manage your surf history.
• “Downloads” allows you to consult and manage your downloads history.
To add new features to your Firefox browser, navigate to the main menu > Add-ons and themes. In the
tab that opens, select “Get Add-ons” and choose from the available modules (https://addons.mozilla.org/
fr/firefox/extensions/).
Once your system is installed (or in Live session), a double-click on a video file will open it with the de-
fault player of your DE. For Gnome or Cinnamon, it is the “Videos” player (Totem) which is automatically
launched when double-clicking on a video:
Its use is very simple and intuitive. At the slightest movement of the pointer, the playback menu is dis-
played and allows you to browse the video file, set loop playback (the vertical bar formed by 3 points) or
adjust the volume. The main menu gives you access to other functions.
Each DE integrates its own player, all featuring the same basic functions, largely enough for a first use of
a Debian system.
The Xfce desktop comes with a multi-platform media player widely used by Windows®: VLC (https://
www.videolan.org/vlc/), a way to get started on Debian without changing your habits.
VLC is a free media player and a system capable of playing most multimedia files as well as DVDs, Audio
CDs, VCDs, and various broadcasted protocols.
As usual on Debian, you can add the multimedia software of your choice. I’ll let you visit the list of appli-
cations available on the Debian wiki (https://wiki.debian.org/Multimedia).
Debian GNU/Linux comes with a media player for each DE. Some allow the management of a large mu-
sic collection, including sort management, play lists, cover artwork, etc (such as Amarok or Rhythmbox
described in the following section), others are simple, lightweight and easy to master (Such as Audacious
https://audacious-media-player.org/ or XMMS https://github.com/xmms2/wiki/wiki).
Debian recognizes (among other things) the 4 main default formats (mp3, ogg, flac, wav). If you need to
install codecs or non-free audio software, you will need to modify your repositories (chap.8.1.4) to add the
“contrib” and “non-free” sections.
At first launch, Rhythmbox scans your “Music” folder, but you can add more folders to your music library.
Rhythmbox: menu
Rhythmbox integrates a complete preferences and a plugins system that adds functionality to the player.
Being the default audio player of the Gnome desktop, it benefits from a complete integrated help:
The main desktops also have their own dedicated player, which works with the same principle: a music
library scanned by the application which then offers you to play a single record or a full “playlists”, options,
preferences and plugins.
Let your mouse wander, you do not risk anything: a confirmation will be asked for each action involving
the modification or the deletion of your musical files.
Debian integrates by default the full office suite LibreOffice which allows you to work on documents using
any kind of format coming from different office suites.
If you don’t need such a comprehensive tool suite, you can use the Abiword (https://packages.debian.org/
bookworm/abiword) or Gnumeric (https://packages.debian.org/bookworm/gnumeric) tools, which are
lighter, while maintaining a high level of compatibility.
LibreOffice (https://www.libreoffice.org/) is a free (as in freedom) office suite that offers tools for word
processing (Writer), spreadsheet (Calc), presentation (Impress), drawing (Draw), database (Base) and
editing mathematical formulas (Math).
LibreOffice is the default office suite for Debian and is integrated within the main desktops during the
installation process. There are many possibilities for LibreOffice. The official wiki of the community is
very well done and will provide you with an efficient and complete help (no need to reinvent the wheel …):
https://wiki.documentfoundation.org
Good reading .
the Gimp
The main window pops up and unveils … lots of tools to have fun with …
The tools box (top left) - The tools options (bottom left) - The Gimp menu bar (top center) - The active
picture (centered) - The tabs displaying the tools data(top right) and the layers (bottom right).
• The toolbox contains the icons for the various Gimp tools. You can add or remove them from
the menu bar > Edit > Preferences > Toolbox. The function of each tool is displayed on a pop-up
window, if selected.
• The tool options displays the parameter values of the tool currently used: the size and hardness
of the brush, for example, or the opacity of the filling color…
• The menu bar gives you access to all functions and features of the Gimp.
• The active image is displayed in the main window: the changes made are directly visible.
• The right window contains various tabs that you can modify or mask by clicking on the small arrow
at the top right of the tab.
By default, the first tab displays the active layers in the image.
Have Fun!
One way to discover the Gimp is to test it, try it, and have fun editing your family pictures … Create a
folder to play with Gimp and place your favorite photos or images and start to gimp-it
Tutorials
The Gimp website provides a large choice of tutorials where you could learn how to start playinf with it:
https://www.gimp.org/tutorials/
Print an image
If Gimp prints only white pages, and the preview is desperately showing a blank page too; but you can fix
this problem by installing the gimp-gutenprint package in administrator mode (chap.3.8.3):
Then, to print a image, all you have to do is: “File > Print with Gutenprint”. A page is open where you can
set up your printer and your desired print layout.
Do you feel that you took control of your system ? Now we are going to tweak the configuration of your
workstation.
Basically, you can modify everything you want on the Debian GNU/Linux desktops and tailor your envi-
ronment to make it fit your personal needs and tastes.
The GNU/Linux environments are known for their great flexibility in terms of configuration. However, some
desktop are more flexible than others, because of their main interface.
Grossly speaking, they all work the same way: a “Control Center” to handle almost
all parameters in the same place, and the right-click for the settings of individual elements.
Most of the functionalities have been addressed during the presentation of the desktops (chap.4.2). But
let’s go back to the two main Debian desktops: Gnome and KDE.
Gnome is the default desktop for the Debian installations. This desktop features an “all-in-one” inter-
face which makes it a fluid and intuitive environment.
Gnome-Shell (https://wiki.debian.org/GnomeShell) provides a “uniform” interface: this is what brings this
great fluidity. This means also that you will not be able to modify everything you want, like on the other
desktops built with a modular design. But instead of talking about the few things you cannot make, let’s
talk about all the settings directly available to you.
Let’s take the direction Gnome Activity menu > “Tweaks”.
140
Gnome-Shell config launcher
The opening window includes all the elements of your Gnome-Shell desktop. The changes are applied
and visible immediately.
After few “clicks” on the various categories, you will easily understand how to configure your desktop look,
apply a dark theme or select startup applications.
Gnome-Shell comes with various extensions built in by default. To access it simply, head to the Gnome
> “Extensions” activity menu.
The extension manager displays those that are available directly on your system. You can activate or
deactivate them and some are configurable via the “settings” button under the extension’s name.
To install new extensions, visit extensions.gnome.org. This link will open in a Firefox window listing addi-
tional extensions available online.
To be able to integrate new extensions into your system, you must install the add-on linking Firefox to your
extension manager: follow the link “Click here to install browser extension”.
Then authorize the browser to install the module by following the instructions:
Now, by clicking on the “Gnome” icon in your browser, you access the Gnome online extensions presen-
tation and management page:
To install a new extension, click on its name or search for it using the dedicated field. Here with “Dash
to Panel”, an extension allowing to restore a traditional dashboard on Gnome-Shell: simply click on
“ON/OFF” and the installation will be proposed to you:
Your extension is immediately activated, and available in your Gnome-Shell extension manager:
In order to be more efficient, and even if Debian is “mouse-click-oriented”, we suggest you use the key-
board shortcuts: pressing the “Windows” key, for example, switch between the Activities overview and
Shortcuts Actions
The main “Gnome Settings” tool is available from the Parameter launcher and gives you access to all your
environment settings.
Each entry opens a sub-menu which allows you to make your changes, then returns to the main menu to
continue the customization of your environment.
If you want to use a more “classical” interface, you can take this option during your session sign in: click
on the little gearwheel to select the “Gnome Classic” option before clicking on the “Sign In” button:
Your session then opens with a more conventional version of Gnome, but you keep your main settings
and your tools.
The “Classical” interface is lighter, but offers less visual effects (usefull or useless, depending on your
point of view).
In order to come back to the default Gnome-Shell interface, select the “Gnome” option of the gearwheel
menu, next time you Sign In.
KDE is a historic desktop among various the GNU/Linux environments, which has always put the empha-
sis on its extreme customization. The transition to the Plasma (https://kde.org/plasma-desktop/) render-
This is where you are going to tweak all your computer and Debian system settings.
Network, audio, video, window appearances, default language, as well as the way you sign in, and a lot
more … Virtually everything is configurable from this panel. Even some desktop special effects integrated
in KDE, in Compiz style, can be managed from here.
Each entry is detailed and you will discover as you go along, the configuration possibilities of the KDE-
Plasma environment.
KDE widgets
Plasma allows you to add graphic components to your desktop, sort of small ‘widgets’ that display virtually
anything on your desktop. From the launcher at the top right corner or by right-clicking on the desktop,
select “Add Widgets” and then drag and drop the desired components to your desktop.
To configure the widgets, left-click on the relevant component to bring up its configuration menu. You can
then adjust the component, move it or resize it to your liking.
KDE is an environment with multiple possibilities. I invite you to look at their website, and more particularly
the tutorials page, which is teeming with information: https://userbase.kde.org/Tutorials.
The configuration of your system directly impact you user experience. Instead of writing a complete chap-
ter about the different ethical and technical concepts which led to the Debian software organization, we
are going to examine their consequences on your daily usage.
In the rest of this chapter, you might be asked to activate the “contrib” and/or “non-free” sections of the
Debian repositories, in order to access some “less-free” software. In that case, follow the method docu-
mented in the chapter 8.1.4.
During the installation, Debian ask you to enter the password for the “root” administrator account. This
account is common to all the GNU/Linux systems and allows to execute administrative tasks on the sys-
tem.
However, this account is not mandatory. During the installation process, you can pass over the “root”
account configuration (by leaving empty the root password fields), and doing so, avoid its creation.
In this case, this is the first user registered during the installation who will assume the “root” role.
Then, this changes the way you launch commands to administrate the system: in this manual, every time
we ask you to execute a command in “root” mode, we use the “su” command. But if the “root” account
was not created, you must use instead the “sudo” command, which promotes you as “root”, and type
your own password.
In a nutshell to launch an administrative command:
If the “root” account was created, use “su” + administrator password + command launch:
su
> asking administrative password
apt update && apt upgrade
> command execution
If the “root” account was NOT created, use “sudo + command” + your user password:
The DVDs sold commercially are “copy protected” and usually are not readable by default on free systems.
Your Debian GNU/Linux system is now able to read the “protected” commercial DVDs, and to make
private copies of them.
The Debian GNU/Linux system includes free drivers and some firmware in order to operate the integrated
graphical functions (chipsets) of the motherboard or the external graphical card.
Since version 12 “Bookworm”, Debian has included a series of non-free firmware by default in order to
make it easier to recognize your hardware.
Installing a proprietary driver therefore becomes less and less necessary.
Please note that installing proprietary drivers is a non-free alternative, and as such, not followed by the
Debian developers. If your computer is very recent, don’t hesitate to ask the support of the community
before tinkering with your system (chap.1.2).
If, following a driver installation, you are facing a black screen, you need to restore the previous configu-
ration … Undo the modifs.
At the login prompt, you need to type your username and password (likewise a graphic session) and then
restart cleanly your computer with the “systemctl reboot” command.
Boot in “recovery mode”: from the Grub loader menu, select the “Advanced options” entry and then
the “recovery mode” entry.
The system launches a console and invites you to continue the startup sequence (by using the [Ctrl]+d
short-cut to quit the console) or to enter the administrator password for maintenance, and this is what you
do:
You are asked for your password. Then you fill in the new password for “root”:
New password:
Retype the new password:
And that’s it, the “root” account is now activated, you can start again the operation and enter “recovery
mode”.
Removal of the xorg.conf configuration file: during the installation of the proprietary driver, you cre-
ated an X configuration file located in /etc/X11/xorg.conf and/or in /etc/X11/xorg.conf.d/xxx.conf. It must
be removed. Always within the console and depending on the file created, remove it with the command:
“rm”:
rm /etc/X11/xorg.conf.d/20-nvidia.conf
Here it was the file corresponding to nVidia which was removed, !! to be tailored to your situation !!.
Uninstall the proprietary drivers: the same way you were able to install a driver, you can uninstall it,
here after an example with the nVidia driver, !! to be tailored to your situation !!:
If you are not the only user of your computer, you can create new user account in order to preserve your
own data and preferences. By adding a new user, a new folder will be created in the system. This
folder, named by the new user pseudo (login-ID), will receive the default parameters defined during the
system installation.
It will be readable by you (you can consult the data of the other user) but not writable (you cannot create
or modify its data).
Debian includes a simple graphical tool to execute this task, but you can also use the terminal and the
“adduser” command (described in the next section).
Each desktop offers its own tool to add a new user, and it is usually located in the environment “system”
menu. With Gnome-Shell, the default session under Debian, you can go through the system-menu located
at the top right of the screen and click on the wheel:
In the window which opens, select the “Users” tab in the lef column. You can then modify the parameters
of your account, or create a new account. But you need first to “unlock” the application by clicking on the
lock button at the top-right, and enter the administrator password.
User configuration
You must enter the full name of this new user, as well as its username (the pseudo or login-ID used when
connecting to a new session). On the Gnome system, you can let the user to define its password during
the first connection, or enter it immediately. The user account is created … and here you go:
Users list
Note that if you have set up an automatic connection for the first user, you will need to “exit the session”
or “switch users” in order to log in as the new user.
Open a terminal in administrator mode (see chap.3.8.3) enter the command which creates the new “user-
name” account. Note that you should enter here the login-ID (or pseudo), not the full name which will be
asked later on:
The user account creation process is started and you must enter the password twice (without any echo,
its normal).
Once the account is created, we can enter additional information: full name, room number, work phone,
home phone, and any comments in the “Other” field.
Once done, a confirmation is requested. If these information are correct you can press [Enter] or Y to
finish the account creation process:
This new user will be able to login with its username and password at computer startup. It will be able to
store and manage its data and configure its environment without any risks for your own data and prefer-
ences.
Debian GNU/Linux uses the repository methodology to distribute applications. This methodology allows
the software centralization and the usage of simple interfaces to administrate and upgrade your system:
you have no need to visit the software sites themselves.
The Internet addresses of the Debian repositories are stored in the /etc/apt/sources.list file, as well as
the files of the type /etc/apt/sources.list.d/xxx.list.
To edit and modify your sources.list file, you can use one of those commands (in administrator mode):
apt edit-sources
nano /etc/apt/sources.list
Details concerning the various information found in the ‘sources.list’ file (the lines beginning with a “#” are
just comments):
157
• “deb”: means a binary repository (the compiled software itself)
• “deb-src”: means a source repository (the program code files used to compile the software)
• “http:…” or “https:…”: the Internet address of the repository server
• “bookworm” or “bookworm-security”: the branch in the repository tree
• “main” or “non-free-firmware”: the repository sections.
… why “bookworm” and not “stable” since the system is based on Debian Stable ??
“bookworm” is the precise version name of the installed system. It sets a given version of each packages
included in the “bookworm” repository (the version of the generic kernel, for example).
“stable” is the generic name of the currently stable version.
For the time being, Debian 12 “bookworm” is the “stable” version, thus you could used either designation.
But when the Debian “stable” version becomes Debian 13 “Trixie”, then Debian 12 “bookworm” attribute
will change to “oldstable”.
Using the precise name of your version allows you to control if and when you want to upgrade your sys-
tem to the next version, as opposed to some systems which want to impose their upgrades…
For more detailed information, I invite you to visit the dedicated Debian wiki https://www.debian.org/
releases/index.html
Debian organizes its software packages inside repositories. These repositories are divided into branches
and sections/components. To learn more about the “testing” and “unstable” branches read the chapter
8.9. One word, however, about the sections/components inside the repositories.
There are 4 sections in the official Debian repositories:
DFSG (Debian Free Software Guidelines) : philosophical principles of the “libre software” according to
Debian ( https://www.debian.org/social_contract.html#guidelines)
Only the packages within the main section/component are officially supported by the Debian project and
are 100% free software. Rather, those proposed in contrib, non-free and non-free-firmware are partially
or totally non-free.
Having said that, and depending on your type of hardware, it is very possible that some services won’t
function correctly without using some specific (proprietary) drivers. In that case, you need to modify the
/etc/apt/sources.list file (details in the following chapter)
Debian offers also some special repositories called backports, which contain more recent versions of
some applications. These repositories are not activated by default, but do not present any particular risks
for your system: the “regular” repositories have the highest priority during the update process,
only the applications installed from the backports will look into these specific repositories.
Before you start modifying the software sources of your system, you must be conscious of the risks your
are taking by using the “contrib” or “non-free” components of the archived branch :
Now, that you are aware that the non-free people kill the pink rabbits, let’s move on:
To modify your software sources, it is enough to edit the ‘sources.list’ file. Open a terminal in administrator
mode (chap.3.8.3), and enter:
apt edit-sources
Example of line entry for the free packages and the proprietary packages:
Now you can pick in the 4 package sections and install the non-free codecs and drivers.
Note that you can also modify your software sources by using the graphical Synaptic package manager
(chap.8.3).
The following sections present the basic commands to manage de Debian packages with APT (Advanced
Package Tool) within your terminal emulator.
Debian supports also “aptitude”, another package manager, with a different syntax and behavior. This
manual being intended for beginners, no need to explicit these commands here: to learn more about them,
visit the dedicated Debian Aptitude Wiki: https://wiki.debian.org/Aptitude.
These commands can be executed as simple user, because they do not impact your system.
Command Description
These commands must be executed with the “root” administrator rights, because they impact the system.
To move into the administrator mode from a terminal, type “su -”: the administrator password is requested.
Command Description
For more detailed information and the apt/aptitude equivalence, visit the dedicated page of the Debian
manual: https://www.debian.org/doc/manuals/debian-reference/ch02.html
All-in-One command line (in administrator mode) to update the repositories information + update your
system + clean the packages in cache:
To delete useless packages, unecessary dependencies, and old configuration files in administrator mode:
Which goes to demonstrate that managing your system with a terminal is not that complex.
Software is a simplified manager for Debian applications. It allows you to search, install, delete or update
packages containing your applications. You can find it in the “System” category of your menus or directly
from the Gnome search box by typing “Software”.
Directly by clicking on the search button (the magnifying glass symbol), or by selecting one of the displayed
categories:
You can Install an application simply by clicking on its description area and then on the “Install” button.
The administrator password will be requested. You can follow the installation progress in the main window
and then launch directly the newly downloaded application.
Software: authentication.
Software: the installation was successful, you can launch your application.
You can Uninstall an application simply by visiting the “Installed” category (at the top of the interface)
and then by clicking on the “Remove” button. You will be asked for confirmation:
Software: confirmation
You can Update your system from the dedicated section “Updates” which will indicate the available
and/or already downloaded updates. If no update is available, you can check the repositories by using
the dedicated button at the top left.
In our example, a set of updates including an “operating system update” requires a reboot. We start by
downloading the packet to update:
You then have to restart the system by clicking on the dedicated button.
The “Software” application is rather simple, but still allows you to configure your repositories graphically.
From the menu, choose “Repositories”. You can add “non-free” sources and/or define the frequency of
the repositories updates. The repository adresse information on display are coming from your sources.list
file (chap.8.1.1).
Once your repositories have been modified, you must reload the information packages. A message
prompts you:
To take advantage of your system without worrying about updates, you can activate the automatic
updates mechanism. From the “Software” menu, select “Update Preferences”. The entries are self-
explanatory:
Gnome uses “Software” to manage applications in a simplified way, KDE integrates Discover, an intuitive
and efficient program.
Discover allows you to search, install, remove or update your applications from a single interface. You
can also modify your software sources in order to install - or not - some non-free applications.
Discover is launched simply from the KDE main menu > Applications> System > Software Center:
Discover launcher
Don’t hesitate to browse though the application, you will be asked to confirm any modification done to your
packages.
To find an application, type its name in the dedicated search field or visit the various categories of Discover.
Then a click on the “Install” button is enough:
You will be asked for confirmation for any action on the software together with the administrator password.
The process will then be launched in the background. You can follow the progress of the modifications
within the KDE notification area.
Discover allows you to add additional components to your Plasma environment. To achieve this, visit the
“Plasma add-ons” section.
With Discover, simply visit the “Installed” category then click on “Remove”:
When KDE notifies you of one or more updates, it is “Discover” which performs them. To check updates
“manually”, click on the dedicated button:
Simply click on “Update all” and confirm with the administrator password.
Likewise the software management, you can follow the process within the KDE notification area. And a
message will inform you at the end of the process.
The KDE software library allows you to modify the sources of your applications without using the terminal.
Go to the “Settings” section of Discover, the entries display the repositories adresses of your sources.list:
Synaptic is the comprehensive graphical interface of the Debian package manager. It allows a total vision
of the proposed packages, whether installed or not. It is a lot more detailed than the Software Center, or
Discover (see the previous chapters) since it displays the full set of available packages (including the
libraries).
The Synaptic window is divided into 4 areas: the tool bar at the top, the left pane allowing different ways
of sorting and selecting the packages, the center pane displaying the package list itself, and below it, the
pane hosting the description of the currently selected package (the selection is done by a click).
In front of each package, you notice a little box (white for non-installed packages, green when they are
installed, red when they are broken). Next to this status box, a Debian logo indicates that this package is
“free” (as in freedom).
Don’t hesitate to click on all the different menus to explore Synaptic and become more familiar with it. It
is a good way to discover its numerous functionalities.
Don’t be afraid to break your system since nothing will really happen until you click on the “Apply” button.
On top of that, a message asking for confirmation will always be displayed first.
The very first thing to do when you launch Synaptic, is to click on the “Reload” button in order to
update all the information (metadata) concerning the repositories, the packages and the available appli-
cations.
You’ll notice that the list corresponds to the contents of the /etc/apt/sources.list file mentioned in chapter
8.1.1.
Now, you can modify your repository sources at your entire convenience. Simply click on a source to
modify it, or on the “New” button to add another source.
Once your modifications are validated, the application will invite you to reload the repositories list in order
to take your changes into account.
Note that if you want to use a “check-box-only” simplified interface on one of the Xfce, LXDE or LXQt
desktops, you need to install the “software-properties-gtk” package.
Before updating the system, it is necessary to “Reload” the package list, by clicking on the corresponding
button, or by going in the menu “Edit > Reload Packages Information” (or even [Ctrl]+r if you want to use a
keyboard shortcut). This action checks if the version of the packages residing on your system is the most
recent one or not.
Then click on “Mark All Upgrades” or goto menu “Edit > Mark All Upgrades…”.
If nothing happens, after you clicked on “Upgrade everything”, this means that your system is already
up-to-date. You can close Synaptic.
If some packages to install or update are available, they are specified. You can view them by selecting
the “Status” section > “installed (upgradable)”:
A new window appears with the list of the packages to be upgraded as well as the additional dependen-
cies, if some are required:
You only have to click on the “Add to selection” then “Apply” button, and accept the requested confirma-
tion:
The system updating process begins by downloading the packages, and continues with their installation.
If you know the name of the package or if you are looking precisely for something, click on the search
button (in the top bar) and enter the keywords of your search in the window which opens.
If you don’t know the name of the package you need, you can parse the list using the filtering by
sections, status, origin, etc …
For example, if you are looking for a game, click on Sections in the bottom part of the left pane, scroll
down to the “Games and Amusement” section, click on it, and all the packages concerning games and
amusement are showing up in the center pane.
To install one or several packages, right-click on the little box in front of the package name, and select
the “Mark for Installation” option.
Then, you simply need to click on the “Apply” button, and confirm the summary of the changes to be
applied.
Packages are downloaded and installed. You can follow the whole process within the synaptic interface:
Sometimes we want to re-install a package which is already installed. In that case select the “Mark for
Reinstall” option. This allows, for example, to restore the default configuration for the application if you
modified it.
Like for the installation, right-click on the little box in front of the package name, and select the “Mark for
Removal” option. Then click on “Apply”.
The simple removal keeps the package configuration files on your system, in case you would like to
re-install it, later on.
To remove also the configuration files select the “Mark for Complete Removal” option (equivalent to
the “purge” in a terminal command line)
Often, when software is uninstalled, some packages (the dependencies) remain in the system while no
longer useful, since all the packages needing them are gone. These useless packages can be easily
removed with Synaptic.
All you have to do next is a right-click on each package in the center pane, and select the “Mark for
Complete Removal” option. Once all the packages are marked, click on the “Apply” button.
Although one choose to completely remove a software, some configuration residues might still remain in
the system, but they can also be easily removed with Synaptic.
Click on the “Status” button at the bottom of the left pane. If the category “Not installed (residual config)”
shows up, select it.
All you have to do next is a right-click on each package in the center pane, and select the “Mark for
Complete Removal” option. Once all the packages are marked, click on the “Apply” button.
By clicking on a package, its description is displayed on the bottom center pane of Synaptic. To obtain
even more information on a package, right-click on it, and select Properties, or go to menu “Packages >
Properties”.
Then you will know everything - positively absolutely everything - on this package: dependencies, installed
files, size and version.
“Preferences” is a well-named category, existing in most applications, and which is also present here…
But keep in mind that Synaptic is a very special case: it manages the full set of software installed
on your system. When you remove a program, it does not go in the wastebasket (where you could have
potentially retrieved it) !
After these scary warnings, let’s move to the settings available for Synaptic. the Preferences window
(launched via menu Settings > Preferences) displays 6 different tabs:
• General: the options in there are rather explicit. Note: it is possible to un-check the option “Consider
recommended packages as dependencies”, if that helps you keeping an ultra-light system. But this
could induce problems when installing future new packages. Thus an option to be handled carefully.
Remember: by using a terminal (chap.8.2) you can achieve the same results more quickly and with less
manipulations.
Even if the capacity of hard disks increased dramatically during the last years, you might need some free
space. Several scripts automate the disk cleaning process, however I must confess that I prefer to check
before using the rm command (standing for remove. chap.11.2).
The first thing to do, of course, is to find out the used space on your disk. Several tools are available to
you, starting with your terminal:
– Disk space in terminal mode –
A summary of the disk space usage for each system mount points (disks and partitions) with th df com-
mand:
df -h
Filesystem Size Used Avail Use% MountPoint
udev 983M 0 983M 0% /dev
tmpfs 200M 8,1M 192M 5% /run
/dev/sda1 48G 16G 30G 35% /
tmpfs 998M 0 998M 0% /dev/shm
tmpfs 5,0M 4,0K 5,0M 1% /run/lock
– Ncdu –
A disk space analyzer in console mode. To launch it, simply type “ncdu” in your terminal. To install this
software (in administrator mode):
– Baobab –
A disk space analyzer in graphic mode, integrated in Gnome but available in other environments with:
Apt/aptitude/dpkg are the usual Debian package managers. When you install a package its archive-
source/deb file is stored in your system (in the /var/cache/apt/archives/ folder) to enable a potential re-
installation without Internet connection. To clean the “apt cache” use a simple command in administrator
mode (chap.3.8.3):
apt clean
Once the cache of the installed packages is cleaned, you can also remove the useless packages from
your system, as well as the configuration files. Warning! Remember to check carefully the list of the
packages planed for removal, before accepting the operation:
If you have upgraded your system, it is possible that some packages are no longer available on the new
repositories: they are obsolete. To list and remove these packages, use apt and remember to check
carefully the list of packages planed for removal:
Finally, to list and purge configuration files that have remained in place despite the removal of applications,
you can use these commands:
For the more maniac, you can install the deborphan tool which lists the orphaned packages on your sys-
tem: those that no other package depends on. Warning! Remember to check carefully the list of the
packages planed for removal, before accepting the operation.
rm -Rf ~/.local/share/Trash/*
The administrator wastebasket : /root/.local/share/Trash/ . To empty it with the proper manner, use a
terminal in administrator mode:
rm -Rf /root/.local/share/Trash/*
The external wastebaskets : locates on your external disks, they are usually named ‘/media/y-
our_id/your_disk/.Trash_1000’, where your_id corresponds to your login name.
Some applications use a “cache” folder, where they store images, videos, and miscellaneous information
in order to run faster. Usually these data do not occupy too much disk space, however if (using the tools
described above) you detect that a folder becomes too fat, don’t hesitate to remove it.
rm -Rf ~/.cache/*
Each application has its own way to manage its own cache: some purge it systematically when they close,
others store their data in the /tmp folder, which will be cleared during the session logout, others keep all
their information in a specific folder.
For Firefox, as an example, you can purge the cache from the preferences menu, and even automate this
action every time the application is closed.
Every time you open a folder containing pictures or videos, thumbnails are created to represent these
graphic files. These thumbnails are stored in a specific folder to reuse them, rather than being forced to
recompute them every time you access this kind of files.
The problem raises when you delete a graphic file, because its thumbnail is kept in the system, and this
leads to a certain amount of disk space wasted to store obsolete thumbnails.
To purge them, it is enough to remove their corresponding folder:
rm -Rf ~/.thumbnails
This folder will be created again, the next time the system needs to store a newly generated thumbnail.
Debian GNU/Linux uses the package repository system to better manage the software and increase the
security of your system. But it may happen that you need an external package of the “.deb” format.
GDebi is a graphical utility with allows the installation of external packages of the “.deb” format, while
managing the dependencies.
To install it, look for “gdebi” in your favorite package manager (Synaptic, Discover, Software) or more
simply from a terminal in administrator mode using “su” (chap.3.8.3):
When you download a Debian external package, right-click on it and select “Open with gdebi”.
Within the menu, click on File > Open and enter the path of the “.deb” file:
Then click on “Install Package”. Your password is requested to validate the install.
Dpkg is a software utility handling the packages, like does apt, but without managing the dependencies.
This means that if you use dpkg to install external packages, you need to install the “dependent” packages
one by one from your terminal. Dpkg is integrated in Debian by default, and must be used in administrative
mode.
To install an external package:
dpkg -i package_name.deb
An error message will let you know if some dependencies are missing. Then simply install them the classic
way with apt:
dpkg -i package_name.deb
To take advantage of applications in Flatpak format, you must first install the corresponding package.
From your terminal in administrator mode (chap.3.8.3) :
You can now download and install flatpak packages by visiting one of the websites grouping these appli-
cations like Flathub (https://flathub.org/home). But the simplest way consists to add a repository to your
sources in order to take advantage of the full applications lists without having to search through the site.
To add a repository like Flathub for example, and benefit from an easy search and a simplified installation,
type in your terminal:
You will be asked for the administrator password. And you will have to restart your system to take the
changes into account.
To take advantage of managing flatpaks within your software manager, you must add the plugin cor-
responding to your environment. For Gnome and its simplified software manager, in a terminal and in
administrator mode (chap.3.8.3) :
You can now manage your flatpaks like any other applications (see chap.8.3)
As with other applications, the administrator password will be requested for any installation. Your software
will then be directly available in your applications menu.
To benefit from the management of flatpaks within Discover, under Kde, you must install the appropriate
plugin. In a terminal and in administrator mode (chap.3.8.3):
You can now manage your flatpaks like any other applications (see chap.8.4).
During your search, you must click on the software file. Don’t click immediately on “Install” because Debian
repositories have priority.
Select the flathub repository from the Discover “Sources” menu. Then launch the installation by clicking
on “Install”:
As with other applications, the administrator password will be requested for any installation. Your software
will then be directly available in your applications menu.
Here after, the basic commands to manage your flatpaks from your terminal:
Command Action
Special case: install a flatpak for the current user only with the “--user” option. The files will be placed
in the user directory ($HOME/.local/share/flatpak/).
If you have installed your flatpak graphically from Software or Discover, just delete it from the installed
applications menu from your software manager: look for the flatpak to uninstall then start the removal from
the dedicated button.
Note that if you want to uninstall all dependencies (software installed in addition to the flatpak for its op-
eration), you will have to launch this command in your terminal:
To help you in your research, find hereafter some repositories using the Flatpak format and the com-
mands to execute in order to add their repositories. You can use the “--if-no-exists” option to avoid errors
generated by duplicates:
Flathub repository https://flathub.org/ gathering a large number of applications:
First of all, one must know that several Debian distribution branches exist in parallel.
Namely the oldstable, stable, testing and unstable distributions, as well as an experimental branch.
The Stable distribution is the Debian official distribution, the one released at this moment, which is
maintained and updated by the Debian teams. The only changes made to it concern the security updates
and the bug fixes. It is recommended to favor this version.
The Oldstable distribution is the previous stable version. It is usually supported by the Debian teams
during one year after the release of the new stable version. However it might live longer if enough individ-
uals or companies continue to assure its maintenance. Then it is called a LTS (standing for Long Term
Support) distribution: we extend its life span.
The Testing distribution is the future Stable version. It is used to prepared the next stable version.
When everything is OK, when all the bit and pieces are functioning well together, when all the features
targeted by the Debian teams are included, and after a period of software freeze and bug hunting, then
the Testing version becomes the official new Stable distribution.
The Unstable distribution, nicknamed Sid, is the version which receives all the new packages versions,
and sits at the cutting edge of innovation, but is not very stable: it’s a research lab. Nevertheless some
brave adventurers use it on a daily basis.
The Experimental distribution is not a Debian distribution per se, but rather a repository where alpha
or beta software versions are tested.
All these distributions are given a nickname picked among the characters of the Toy Story® cartoon.
Currently, the name of the stable version is Bookworm, the name of the testing version is Trixie, the
name of the oldstable version is Bullseye, the Experimental as no nickname.
The first version of Debian with a nickname was the Debian-1.1 “Buzz”, released as of June 17th, 1996.
(see https://en.wikipedia.org/wiki/Debian_version_history)
The name of unstable is Sid, but who is this Sid guy?
Sid Phillips is the little boy, in the Toy story® cartoon, who keeps breaking all his toys (https://pixar.fandom.
com/wiki/Sid).
More detailed information on the dedicated Debian Wiki https://wiki.debian.org/DebianUnstable.
sid
No matter where your expertize level is, or what is the current state of your hardware, nobody is immune to
a bad cockpit error, a technical failure, a heavy thunderstorm, a cup of tea/coffee spilled on the keyboard,
or the cat messing around with the central unit …
The hard disk drive capacities are increasing every day and we are tempted to store on them more and
more data (family pictures, videos, private copies of movies, etc). The risk of losing a large amount of
data also increases at the same time, and that’s why we advise you to execute regular backups of your
personal data, as well as your passwords and email messages.
This section will endeavor to provide you with simple keys to avoid the lost of your favorite files during a
hardware or software failure.
The “cloud” is fashionable these days. Several on-line services are at your disposal to save your data on
an external server…
First of all, you are not immune to a server failure, and secondly, you have no real control on what your
data are going to be used for. The “cloud” is actually the computer of someone else, as Bibi (a friendly
Debian user) told us recently.
I strongly advise you, in case of doubts (not all services are subsidiaries of the NSA …) to backup your
data locally, that is on your own physical medium which you fully control.
Backups used to be made on floppy disks, then on CDs and then on DVDs. Even if you can still use this
kind of support, the technology now gives you access to much larger capacities at little cost.
Depending on the amount of the data to backup, you can find external disk from 1GB (USB key type) to
2TB (2000GB), being powered directly over the USB cable, or by an external power supply. The prices
range roughly from 5 to 200 US$, depending on their storage capacity.
197
Of course, if the size of your data is below 700MB, you can still use a CD-RW (re-writable CD-Rom) for
your backups.
Deja-Dup can be found in the Debian repositories. To install it using a terminal in administrator mode
(chap.3.8.3):
Deja-Dup will be accessible from the application menu > “Utilities” > “Backups”.
On first launch, Deja-Dup’s preferences allow you to select which folders to back up, which to ignore, as
well as the location and schedule for the backup.
Its simple and intuitive interface will guide you through the process. Start with “Create my first backup”
and add folders to back up:
Once the included and excluded folders are defines, you need to define the backup location. You can
select:
Once the backup location has been configured, Deja-Dup offers you to secure your data with a password.
You will be asked for it during the restoration.
To automate your backups, click on “Back up automatically” then go to the Already-Dup menu> “Prefer-
ences”:
You can manage the frequency of backups, the archiving duration or modify the files to be taken into
account:
To restore a backup on a newly installed system, for example, simply install Deja-Dup on it, launch it
and select “Restore” in the main window.
A series of simple windows will help you find and then recover your data. As with backup, restore is
intuitive: you can navigate through your backups just like in a file browser.
A drop-down menu at the bottom right allows you to choose the date of the data you want to restore. Once
your data has been selected, click on “Restore”:
If the backup has been encrypted, you will be prompted for the password, and then your data restoration
will begin. A confirmation window will appear once the restore is complete:
Deja-Dup: restoring
If you want to save just one folder or few of them, you can simply use the file system manager, or your
archive manager (to reduce the storage space through compression).
The latter produces “real” archives: for subsequent consultation of these data, you need to decompress
the archive.
From the file manager, select the folders to be saved, then right-click and take the “Compress…” (or
“Archive”) action.
Then you just have to move the archive file on an external medium.
This is the complete solution ensuring a total safety for your data: cloning the entire hard disk.
Clonezilla Live (https://clonezilla.org/) is a Live CD based on the Debian GNU/Linux distribution, which
includes the Clonezilla software. It allows the user to directly execute from its machine:
• A Backup: copy the entire disk copy , or one or several partitions, under the form of an image and
save it on any kind of storage.
• A Restore: restore an image from its storage location (to the same disk, another disk, another
machine, a USB key, a network, etc.).
• A Copy: direct copy from an original disk to another destination disk.
This Clonezilla version is able to connect to different servers: SSH server, Samba server, NFS server …
As its name suggests it, it works like a Live CD (CD-ROM, DVD-ROM) but can also be executed from a
USB key, an external disk, etc. (source Wikipedia).
You can find an English tutorial on this page:
https://www.howtoforge.com/back-up-restore-hard-drives-and-partitions-with-clonezilla-live.
The news are crystal clear: Internet is being wire-tapped. It is not to alarm or frighten you, but you must
realize that the “Internet” is not your private living room, and that each picture or text used on the web is
potentially recoverable.
This is obvious, but let’s say it once and for all: if you want to protect your data, don’t leave your laptop
everywhere! Don’t leave your computer wide open and in self-service at your home!
Your computer hosts your passwords (bank, administration, work …), your documents (administrative
forms, pictures, etc.), your browsing history (the sites you visited and when), etc. You may think that
these information are seemingly harmless, but they allow - for the best - to define your consumer profile,
or - for the worst - to use your computer as a gateway to crack in other persons systems.
If you want to present the distribution you are using, or simply share your resources, we strongly suggest
you create another user account (chap.7.3) that will not be able to access your data, nor to mess with your
system administration.
If your computer is always on the road, we suggest you use the direct encryption during the system
installation like mentioned in the chapter 5.5.3. By this way, even if your computer is lost or stolen, it will
be extremely difficult to extract the data residing on your hard disk.
10.1.2 Updates
The software updates bring new functionalities, fix bugs and, above all, correct potential security
flaws.
This is the big strength of the Libre-Software: the program sources are available, thus when a flaw is
uncovered, it is publicized and fixed immediately.
207
This practice to be opposed to the proprietary systems, whose flaws are being kept secret, and continue
to affect the daily life of all their users.
The security updates should not be considered as optional ones: you must install them as soon as
possible.
10.1.3 Passwords
Each year, tens of thousands of email accounts, Wi-fi access codes, phone PIN … are easily cracked,
because users picked passwords too easy to guess. The top worst password for the year 2013 was
“123456”, but there are other crazy sequences like “QWERTYUIOP”, “0000”, animal names, birthdays
…
All these passwords, far too easy to guess, must be avoided !
And, by the way, putting together two weak passwords, does not create a strong one ! “Indepen-
dance1783” might be difficult to guess for a human being, but a “computer robot” will decipher it in the
blink of an eye.
To increase the robustness of your password, in other words to increase its resistance against de-
ciphering attacks, use as many characters as possible and mix their types (lowercase and uppercase
letters, numbers, special characters).
There are simple tools which allow you to keep and organize your passwords like KeePassX (https://www.
keepassx.org/).
The stronger my password is, the more difficult it is to memorize it. Isn’t it ?
You can use a “pass-phrase. Here we are talking about a long sentence, difficult to uncover, but easy
to remember: few words put together produce a meaningless string, but which has a well defined sense
for yourself.
For example, the sentence “grandma loves French pickles in her soup”, can easily becomes a robust
password: “GrandmaLovesFrenchPicklesInHerSoup” … especially if one replaces few vowels by num-
bers (“i” by “1”, “e” by “3” and o by “0”):
“GrandmaL0v3sFr3nchP1ckl3sInH3rS0up”.
Note that it works with grandpa too .
If you use Debian in “multi-user” mode, the data of the other users are readable by you, and yours too, by
necessity. You may want to restrict the other users access rights to some of your data.
The graphical procedure is easy to execute (no need to open a terminal): right-click on he folder > prop-
erties > “Permissions”. Hereafter an example with the “Documents” folder:
Properties menu
You certainly ran into these warning messages talking about backing up your data …
and this is not for nothing! Please refer to the chapter 9 and get into the habit of saving your data on
an external medium and on a regular basis.
Admittedly, the GNU/Linux systems are much less sensitive to virus attacks, but it is possible to find a
virus on a GNU/Linux machine.
For the time being, updates are the only efficient protections against potential viruses, and adding an
antivirus software on your system does not improve its security. Viruses embedded within documents
originating from proprietary systems do not target the GNU/Linux environments, and as such, are totally
harmless for your data.
However, if you want to monitor and control your data, ClamAv is the reference antivirus software. Note
that it does not run continuously in the background, and the user should explicitly request a folder scan to
verify its contents.
More information on the DebianHelp site https://www.debianhelp.co.uk/clamav.htm
Yes, one can find everything on Internet: the best and the worst, and often inappropriate images and
contents for our children. In order to let them enjoy safely the digital world, you can use different parental
control systems.
However, keep in mind that YOU are the best parental control !
The Internet Service Providers usually propose different parental control software. This method allows
you to control all the devices on your home network, but does not exempt you to activate the parental
control on your Web Browser.
More information on the site https://www.internetmatters.org/parental-controls/
BlockSite is an extension, which automatically blocks websites of your choice. Additionally, this ex-
tension will disable all hyperlinks to these websites, by just displaying the link text without the clicking
functionality. The addon website says: “The data collected is not used to identify individual users.”… Up
to you…
You can find other addons in the Mozilla website: https://addons.mozilla.org/firefox/search/?cat=all&tag=
parental+control
An alternative solution is to use a search engine whis is going to filter the proposed results, like Qwant
Junior: https://www.qwantjunior.com
It is difficult to remain completely anonymous on Internet. Unless you are a well equipped experienced
user, you will always leave a trail behind you.
The most beautiful fingerprint you leave, on a daily basis, is your IP address. In fact, each device
connected to Internet must have an IP address, which allows to know not only your ISP, but also
your precise geographical location … A small test? visit this page to know your public IP address:
https://whatismyipaddress.com/
In addition, even if you are not a great pastry chef, you are giving away a lot of “cookies” to all the sites
you are visiting. Cookies are connection witnesses: they keep, for a given site, information like your
preferences, your identifier, your password, your chosen language, the content of your digital shopping
cart, etc. not only on your computer but also on the servers in the cloud. Thus, when you start a search
request on a site, it is very capable to register this information.
Advertising companies come join the party, and automatically create your profile by looking at your brows-
ing history.
Don’t be alarmed, numerous advises and software tools are at your disposal to easily become discreet.
Remember that the social networks, in their vast majority, are not there to help you, quite the contrary:
they are big advertising agencies which collect everything they find about you. Then, these personal
information are resold to advertisers, in order for them to better target your “needs”.
Intelligence on the social networks does not stop there: they continue to trace you on plenty of sites by
using - for example - the “like” or “G+” buttons.
Furthermore, the latest scandals unveil the fact that personal data can be collected by several govern-
mental intelligence agencies, even if you are not doing anything suspicious.
facebook© addicts…
If you want to surf the Web without leaving traces on your computer, the latest versions of the Internet
navigators include a “private browsing” feature. This mode functions very simply: once launched, the
navigator does not keep the history of the visited sites, nor the cookies distributed by these sites, nor the
passwords entered during this “private” session.
However, the visited sites keep track of your IP address: you don’t navigate in an “anonymous” way.
For Firefox, click on the menu (3-dash button at the top right) then select the “New Private Window” option.
Note: it is very possible that some Internet sites do not function well if some cookies are disable. Thus, it
is best not to use this mode all the time.
The two following Firefox extensions, can also make more difficult the tracking of your internet navigation,
by modifying you navigator “profile” on a regular basis :
• Chameleon https://addons.mozilla.org/en-US/firefox/addon/chameleon-ext/
• CanvasBlocker https://addons.mozilla.org/en-US/firefox/addon/canvasblocker/
The “NoScript Security Suite” extension blocks the “tracking” scripts by automaticallydisabling some spe-
cific scripts. But you must realize that this can generate a lot of problems with numerous internet pages.
To be reserved for the most seasoned! https://addons.mozilla.org/en-US/firefox/addon/noscript/
The Mozilla Foundation lists many modules to improve the safety of your Internet browsing. Do not
hesitate to consult the dedicated page: https://addons.mozilla.org/en-US/firefox/extensions/category/
privacy-security/.
Stop doing like everyone else, even if supposedly “you have nothing to hide”.
Torproject.org
If you want to become anonymous and mask completely your IP address, the best idea is to use TOR
(https://www.torproject.org/index.html). To achieve this, we are going to describe two methods: installa-
tion of the Tor-Browser, and the usage of the Tails anonymous distribution.
Debian offers the TorBrowser in its repository. The Tor navigator is not physically present in this Debian
repository, but it is rather a launcher which will fetch its latest version on the official site and verify the
package signature as well.
The torbrowser-launcher is available in the contrib section of the Debian repositories. To add this
section, use the chapter 8.1.4 method and modify your sources.list to get this result:
apt update
apt install torbrowser-launcher
Once this is done, we can initiate the TorBrowser download via the tor-browser-launcher (here on
Gnome-Shell) :
TorBrowser: installing
Note that Tor proposes its browser as a stand-alone archive (no need for backports repositories nor ad-
ministrative password). You can download the archive from the official website: https://www.torproject.
org/download/.
Decompress the downloaded archive, then navigate in the tree structure to the ./browser/start-tor-browser
file; click on it :). You must leave this directory in place, and “manually” launch the Tor navigator, or drag-
and-drop the “tor-browser.desktop” either on the desktop or within the task bar.
Tails is a GNU/Linux distribution based on Debian. It allows you to be totally anonymous on the net. It
is installed on a DVD or a USB key, and likewise using other Debian Live (autonomous) images, nothing is
saved on your DVD or USB key between two working sessions, and, in addition, you enjoy an anonymous
navigation on Internet.
On the main website, you can read …
Tails is a live (autonomous) operating system that you can start on almost any computer from a DVD, USB
stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:
• use the Internet anonymously and circumvent censorship; all connections to the Internet are
forced to go through the Tor network;
• leave no trace on the computer you are using unless you ask it explicitly;
• use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
For more information, you can visit the Tails download page https://tails.boum.org/install/download/index.
en.html.
Note that the TOR navigation is often slowed down, and that some sites or functionalities will not be
reachable, due to their embedded scripts or their “privacy” policies …
Is it the right time to sort out through all your bookmarks ?
No! You must be aware that internet browsing works thanks to a physical network of connected
machines. A person with physical access to the different “connection points” will be able to observe the
traffic and capture informations immediately, or to store this information for a further consultation.
In addition, computer monitoring is not the only way to identify you and your navigation: video surveillance
of public or private places, labeling of machines “for your safety ” are only examples of all the possibilities
of the authorities and companies to access your valuable data.
It is up to everyone to define his “private life” and not spread it on the web … Or to move on to more political
than technical considerations for the Privacy Protection .
Anonymous
Debian GNU/Linux systems have all the graphical applications needed to perform your daily tasks, so
why to use the command line?
• it’s faster,
• not all options are present in the graphical interfaces,
• using the command line without GUI saves resources,
• it makes learning the Debian GNU/Linux system easier.
This section gathers some basic commands. For a more complete list, visit the Debian documentation:
https://wiki.debian.org/ShellCommands.
#Command #Action
#----------------------------------------------------------------------
pwd Print Working Directory
cd foo Change Directory to foo
cd Change Directory to /home/$USER or ~/
cd .. move up to the parent directory
ls foo List information about file(s) in foo
ls -a ls with hidden files displayed
ls -l ls with size and rights
221
11.2 Action on files or directories
#Command #Action
#----------------------------------------------------------------------
mv source target move the file from source to target
cp source target copy the file from source to target
cp -R source target copy the directory source to target (recursively)
ln source link create a hard link from source to link
ln -s source link create a symbolic link from source to link
touch foo create the file foo or update its
modification date
mkdir dirA create the directory dirA
mkdir -p dirA/dirB mkdir with creation of parent directory if needed
rm foo remove file foo
rm -f file remove the write-protected file
rmdir dirA remove the empty directory dirA
rm -R dirB remove the directory dirB (recursively)
du -h file or dir display size of the file or the dir
#Command #Action
#----------------------------------------------------------------------
wc file Prints byte, word and line counts of file
cat file displays the contents of a file
more file displays file page by page. 'Space'=next page,
'Enter'=next line, 'u'=up
less file displays file with fine navigation
Left/Right/Up/Down/PageUp/PageDown
head -n x file displays 'x' first lines of file
tail -n x file displays 'x' last lines of file
tail -f file dynamicaly displays last line of file
diff file1 file2 Displays differences between two text files
diff -u file1 file2 Displays differences between file1 and file2 (patch syntax)
comp file1 file2 compares two binary files
comp file1 file2 n N compares file1 from the octet n and file2 from octet N
#Command #Action
#----------------------------------------------------------------------
whoami Print the current user id and name
who Print all usernames currently logged in
id Print user and group id's (uid & gid)
11.5 Process
#Command #Action
#----------------------------------------------------------------------
ps Process Status. Lists running process
ps ax Print all running processes
ps aux Print all process identified by users
pstree Print all process in a tree
top List processes running on the system in a
semi-graphical table
kill signal pid kill a process using its pid
pkill signal name kill a process using its name
11.6 Hardware
#Command #Action
#----------------------------------------------------------------------
lsusb Lists connected USB devices
lspci Lists connected PCI devices
cat /proc/cpuinfo Displays processor information
cat /proc/partitions Displays mounted partitions
lspci | egrep "3D|Display|VGA" Display the graphics card model
lspci | grep -i "net" | cut -d: -f3 Show the Wifi card model
11.7 Network
#Command #Action
#----------------------------------------------------------------------
hostname Print or set system name
ping machine Send a ping to a machine on the network
traceroute machine Displays a traceroute through machine
netstat Displays the use of the network by the processes
netstat -a Netstat with the display of the server processes
lsof Detailed list of file and network usage
ip address Displays the config of the interfaces
route Displays the routing table
curl ifconfig.me Displays public IP
ip address show enp0s3 | grep "inet " | tr -s " " ":" | cut -d: -f3
11.8 Search
#Command/Option #Action
#----------------------------------------------------------------------
locate pattern Search for file with a pattern name
updatedb Update locate database
find path options Search for file corresponding to options in path
find -name pattern Search for file with a pattern
find -type f/d/l Search by filetype: f=file, d=directory, l=link
find -exec cmd Execute *cmd* on the found files
Example: search for all png files in the ‘Images’ directory, then copy all files to tmp directory (‘{}’ stands
for found files).
11.9 Archives
11.10 Kernel
Version of the Linux kernel used, its name, the version of the compiler used:
cat /proc/version
uname -r
You can find hereafter a list of the sites providing more detailed information concerning the Free Culture
(in general) and the Free Software (in particular).
https://www.fsf.org/
The Free Software Foundation (FSF) is a non-profit organization with a worldwide mission to promote
computer user freedom. We defend the rights of all software users.
Free software developers guarantee everyone equal rights to their programs; any user can study the
source code, modify it, and share the program. By contrast, most software carries fine print that denies
users these basic rights, leaving them susceptible to the whims of its owners and vulnerable to surveil-
lance.
https://www.gnu.org/
Philosophy of the GNU Project: Free software means that the software’s users have freedom. (The issue
is not about price.) We developed the GNU operating system so that users can have freedom in their
computing experience.
Specifically, free software means users have the four essential freedoms: (0) to run the program, (1) to
study and change the program source code, (2) to redistribute exact copies, and (3) to distribute modified
versions.
Software differs from material objects — such as chairs, sandwiches, and gasoline — in that it can be
copied and changed much more easily. These facilities are why software is useful; we believe a program’s
user should be free to take advantage of them, not solely its developer.
226
12.1.3 The Linux Foundation
https://www.linuxfoundation.org/
The Linux Foundation partners with the world’s leading developers and companies to solve the hardest
technology problems and to accelerate open technology development and commercial adoption.
Founded in 2000, The Linux Foundation today provides tools, training, and events to scale any open
source project, which by teaming all together delivers an economic impact not achievable by any other
company.
12.1.4 ./Play.it
This site is dedicated to one goal: to twist the neck to the most persistent rumor about GNU/Linux.
Of course I alm talking about: “Your linusque there, it sucks, there is no game which can run on it!”.
./play.it is a libre software that automates the build of native packages for multiple distributions from DRM-
free installers for commercial games. The generated packages are then installed using the standard tools
provided by the distribution.
Native Linux games are supported, as well as games developed for other systems, thanks to tools like
WINE, DOSBox and ScummVM.
More detailed descriptions, including installation and usage instructions, are available in the documenta-
tion of the main distributions we support: Debian, Gentoo, Ubuntu (in French only).
Other distributions like Arch Linux are supported, as well as derivatives of these distributions like Manjaro
or Linux Mint.
If your games are anything that still keeps you from getting rid of your dual-boot with Windows, the end of
the tunnel is not that far away!
Homepage : https://legacy.dotslashplay.it/
Supported games list: https://forge.dotslashplay.it/play.it/games
12.2.1 Wikipedia
12.2.2 Wikimedia
12.2.3 Wiktionary
12.2.4 Wikiquote
12.2.5 Wikisource
12.2.6 Wikibooks
12.2.7 Wikijuniors
12.2.9 Wikiversity
12.2.10 Wikispecies
12.2.11 Wikivoyage
12.2.12 Wikinews
12.2.13 Wikidata
wikimedia Meta-wiki, the global community site for the Wikimedia projects https://meta.
wikimedia.org/wiki/Main_Page
Meta (or Wikimedia’s Meta-Wiki) is a wiki-based web site that is auxiliary for coordination of all the
Wikimedia Foundation projects.
Meta currently serves as one of the major avenues of discussion for Wikimedians including Wikipedians,
the others being the mailing lists, the IRC channels, and the talk pages of individual articles and users.
12.2.15 Wiki-incubator
wikimedia incubator, where possible new languages for existing projects are tested https://
incubator.wikimedia.org/wiki/Incubator:Main_Page
The Wikimedia Incubator founded on 2 June 2006, is a wiki-based website hosted by the Wikimedia
Foundation. It serves as a platform where anyone can build up a community in a certain language edition
of a Wikimedia project (Wikipedia, Wiktionary, Wikibooks, Wikinews, Wikiquote and Wikivoyage) that
does not yet have its own sub-domain, provided that it is a recognized language.
This is where potential Wikimedia project Wikis in new language versions can be arranged, written, tested
and proven worthy of being hosted by the Wikimedia Foundation.
12.2.16 MediaWiki
mediawiki, a free software open source Wiki package, supporting all the Wikimedia projects
https://www.mediawiki.org/wiki/MediaWiki
MediaWiki is free server-based software, licensed under the GNU General Public License (GPL). It’s
designed to run on a large server farm for a website that gets millions of hits per day.
12.3.1 Debian
Debian, the universal operating system, aka the “Mother” of numerous children distributions https://www.
debian.org/index.en.html
By the way, Debian provides more than a pure OS: it comes with over 43000 packages, precompiled
software bundled up in a nice format for easy installation on your machine.
12.3.2 Emmabuntüs
12.3.3 Mageia
12.3.4 Fedora
Fedora (https://getfedora.org/) is a polished, easy to use operating system for laptop and desktop com-
puters, with a complete set of tools for developers and makers of all kinds.
Fedora comes with a “Server” release, a powerful, flexible operating system that includes the best and
latest datacenter technologies. It puts you in control of all your infrastructure and services.
https://www.gnu.org/distros/free-distros.fr.html
This page lists the GNU/Linux distributions that are entirely free as in freedom.
The Free Software Foundation seems quite tough in what concerns the real freedom … But can we put
the blame on an organization which is seeking a situation that should be commonplace.
• The Free Software Directory: FSD, or simply Directory is a project of the Free Software Founda-
tion (FSF). We catalog useful free software that runs under free operating systems — particularly
the GNU operating system and its GNU/Linux variants. https://directory.fsf.org/wiki/Main_Page
h.node: This project aims at the construction of a hardware database in order to identify what devices
work with a fully free operating system. The h-node.org website is structured like a Wiki in which all the
users can modify or insert new contents. The h-node project is developed in collaboration and as an
activity of the Free Software Foundation (FSF).
https://h-node.org/home/index/en
13.1 A
13.1.1 Administrator
13.1.2 ADSL
ADSL means broadband Internet. ADSL (Asymmetric Digital Subscriber Line) is practically deployed
throughout most of the industrial countries and allows you to take advantage of speeds up to 30 Megabit-
s/s, which permits you to watch videos, download files and navigate the Web very easily.
13.1.3 ALSA
ALSA (Advanced Linux Sound Architecture) is a Linux kernel module which gather the functionalities of
several different sound drivers into one. It is used to detect sound cards whatever they are; it is very
popular and very efficient. It greatly simplifies the sound management on Linux and is often updated.
13.1.4 Apt
Apt (Advanced Packaging Tool) is the Debian package manager using the .deb package formats. There
are graphical interfaces like Synaptic for those who are not comfortable with the typing of command lines
in the the terminal window.
13.1.5 Aptitude
Aptitude is an alternative to Apt. It offers other options such as the construction of dependency tree, update
of package status and many others. While Apt does not care about broken packages on your system,
Aptitude will try to repair them during the next update or upgrade, by presenting alternative solutions as
235
well as their consequences and let you decide what to do about them.
Finally, it is also interesting to see the behavior of Aptitude when removing software: it computes useless
dependencies and deletes them. On the other end, Apt does only what you clearly ask for.
13.1.6 Arobase @
The “at” symbol ‘@’ is small “a” with a circle curling around it. It is used to form email addresses
(e.g. user@isp.com). This symbol is not used in the web addresses, but only for electronic mail
addresses.
An Audio format is a data format used to represent sounds, music and voices in digital form, with the
purpose of either store or transport them.
13.1.8 Autonomy
Autonomy is the time that a battery enables a mobile unit to operate without having to be recharged by an
electric outlet. The autonomy of a laptop is of few hours and that a mobile phone of few days, in theory.
13.2 B
13.2.1 Beast
13.2.2 BIOS
BIOS stands for Basic Input Output System. The BIOS is the software (firmware) embedded on the
motherboard which allows you to perform basic tasks when you turn the computer on (e.g. read one sector
of a hard disk).
This is the program that launches at startup, allowing the choice of booting the computer with one among
several operating systems. The most popular, Lilo and Grub are usually installed in the MBR (Master
Boot Record) or the GPT (GUID Partition Table) of the hard drive. Although Windows has a similar piece
of software, it is more difficult to use, when implementing a dual-boot Linux/Windows (for example), than
using Grub.
13.2.4 Browser
A bug is an unwanted operation in a computer or a computer program. We are talking about bugs when
the software does not do what you asked, whenb it stops working, or when it does something weird or
shutdown suddently…
13.3 C
13.3.1 C
The computer language (following the A and B languages) which has become one of the most widely used
programming languages of all times.
13.3.2 C++
13.3.3 Chat
Live chat rooms on the Internet are spaces where you share information via text with a group of other
users. The ability to converse with multiple people in the same conversation differentiates chat rooms
from instant messaging programs, which are more typically designed for one-to-one communication.
13.3.4 Click
A click is the action of pressing and releasing (almost) immediately one of the mouse buttons. An unspec-
ified “click” actually means a “left-click”.
13.3.5 Client/Server
Common type of architecture on the Internet and more generally in computer science: A server contains
information, clients connect to it and submit a request. Corresponding treatments are performed by the
server and the results are sent back and displayed on the client computer. The Web is a good example
of client/server application.
Cloud computing is concept gaining wide acceptance: rather than installing a program on our computer,
which is going to take some space, the current trend is to do the work online, without the need to download
the software. This is a way to do office work with Google Docs without installing anything on the computer,
a browser is enough.
to write a program, or to speak the “machine language” (no, it does not mean “make a beep beep beep
sound” …).
The source code is the text file written by the software developer, which can be understood by the compiler
and transformed into a directly executable program. Some source codes are freely available to developers
in particular in the context of free software.
13.3.10 Console
Also named terminal, it is (or not) a graphical window giving access to the shell interpreter allowing you
to type command lines to be executed.
13.3.11 Cookie(s)
Files sent by some websites and stored on your hard drive. On subsequent connections, your computer
let the Web site retrieve the data that you previously entered. Cookies can only be read by the website that
issued them and may contain only data that the user voluntarily provided to the site, or that can be retrieved
from the connection itself (source IP address, etc). They can not read the disks contents nor contain an
executable program. You can set your browser to reject cookies, but you lose then an interesting usability
(like storing your preferences or passwords).
Copy and paste represents the action of duplicating a file from one location to another. The file is cloned
into a new destination. The copy-paste operation is done, for example, by right-clicking on a selected file
and choosing the “Copy” action, and then right-clicking in the destination folder and choosing the “Paste”
action. The keyboard shortcuts for these two actions are the popular [Ctrl]+‘c’ and [Ctrl]+‘v’.
A program crashing under Unix has the effect of copying its entire memory contents into a file named
“core”. Not a good news … but becoming seldom these days.
Cut and paste, moves a file without duplicating it: the file will no longer exists in its original location, but
only in its destination. The keyboard shortcuts for these actions are [Ctrl]+X and [Ctrl]+V.
=> arrow, which you have a hard time to follow the moves on the screen…
The cursor is following on the screen the movements of your mouse. Often symbolized by a slanted arrow
cursor, it lets you point an element: an icon, a menu, a button to click on in order to activate a function.
13.4 D
13.4.1 Debian
13.4.2 Dependencies
It is said that there is a dependency, when a package depends on another one to be installed and/or to
run smoothly.
In the Unix world, a DE is a set of programs that provide a user friendly graphical interface to the operating
system. It usually consists of a window manager and a lot of software that fit well with the environment,
first and foremost file managers, control panels, web browsers, text and image editors, games, and even
office and messaging suites.
13.4.4 Device
A device is a piece of hardware that is connected to a computer. USB key, keyboard, mouse, printer …
are all devices.
13.4.5 Dialog
A dialog box is a small window that appears when the system or an application wants you to make a
choice. You must therefore read the message and click the button that corresponds to your choice (Yes
or No, Save or Cancel, …).
13.4.6 Distribution
Distribution is a GNU/Linux system with a collection of software, which forms a complete operating system,
ranging from the command line up to the graphical environment. The goal is to put together a stable and
coherent set of software aiming at a particular audience. Distribution provides different tools to easily
Drag and drop is the action of moving the cursor on an icon, pressing and holding a mouse button, moving
the mouse cursor to another location, and then releasing the button: the selected file follows the mouse
and moves directly into this new location.
13.5 E
13.5.1 Email
An email can be written in plain text or in HTML format. In the HTML case, some text embellishments
are possible (bold, color, image, tables) but some mail client software (increasingly rare) do not read
messages in HTML format.
13.5.2 Ergonomics
Ergonomics refers to the ease of handling, understanding and using an equipment (e.g. a phone, a soft-
ware or a website). More ergonomic it is, and faster the end user will master it. An ergonomic system is
intuitive.
13.6 F
A file manager or file browser is a computer program that provides an user interface to work with file
systems. The most common operations performed on files or groups of files include creating, opening
(e.g. viewing, playing, editing or printing), renaming, moving or copying, deleting and searching for files,
as well as modifying file attributes, properties and file permissions. Folders and files may be displayed
in a hierarchical tree based on their directory structures. Some file managers contain features inspired
by web browsers, including forward and backward navigational buttons. Some file managers provide
network connectivity.
A file system (FS) , represents the way data are organized in a disk partition. GNU/Linux has its own FS,
called ext2, ext3, ext4, ReiserFS, btrfs … and handles a multitude of file systems from other architectures,
including FAT , VFAT (ie FAT32), NTFS (DOS/Windows file systems), ISO 9660, etc.
A file system is called “journalized” when it keeps a record (log) of the operations being performed, and
13.6.3 Firewall
The firewall is a software protection located at the entry point of a computer, or a local network, to prevent
intrusions from the outside. It controls the inputs and outputs and transmits only the authorized signals.
13.6.4 Firmware
A firmware is a program used to connect smart devices (hard drive, DVD burner, scanner, ADSL modem)
to your computer. It is written in the language understood by the electronic device. We can compare
the firmware of a device to the BIOS of a computer. It is responsible for initializing the device and then
executes the commands received from more advanced programs.
13.6.5 Fonts
A font represents a range of characters with a particular size, weight and style of a typeface.
13.6.6 Fork
It is often used in a figurative sense to designate a “branch” or a “differentiation” from a common root. It
is often through this differentiation process that new Linux distributions emerge. More precisely the whole
idea is to take a basic known kernel or program, to modify it according to some purpose and to redistribute
it.
13.6.7 FTP
File Transfer Protocol. Protocol used to transfer files over the Internet. Also the name of the program
implementing this protocol. It is necessary to have a specialized program in order to access the FTP
servers (Example: Filezilla)
13.7 G
13.7.1 Geek
Although the word may have a broader connotation, a geek is a computer enthusiast, usually passionate
about other subjects (e.g. science fiction) and generally curious. Geek does not mean technology ob-
sessed: geek do not like to only use the technology, they love to understand how that works and they do
have a critical mind.
The graphics card is a component of the central unit responsible for the on-screen display. Powerful
graphics cards also handle the rendering of 3D displays (for video games). The main manufacturers of
graphics cards are Nvidia and ATI.
13.7.3 GUI
The graphical user interface refers to how the software is presented on the screen to the user. It is the
positioning of the elements: menus, buttons, features in the window. A well defined graphical interface is
ergonomic and intuitive: designed in such a smart way that the user understands it immediately.
13.7.4 Gnome
GNOME stands for GNU Network Object Model Environment. It is a user friendly free graphical environ-
ment which goal is to make the GNU operating system usage available to the greatest number of people.
This interface is currently very popular on the GNU/Linux systems and runs also on most of the UNIX-like
systems.
13.7.5 GNU
The GNU project (“GNU’s not Unix”) is a community initiated in 1983 by Richard Stallman to create a free
alternative to the Unix operating system.
GNU is particularly known in the software world because it made major contributions such as the de-
velopment of the GNU compiler collection (GCC), the improvements of existing Unix commands or the
definition of the free GNU General Public License (GPL).
GNU has also worked on a kernel called HURD, but ultimately it is Linux which emerged and became the
kernel enabling the usage of all the other bricks of the project.
13.8 H
An inelegant but effective solution to a computing problem. Sometime also called a workaround.
The hard (disk) drive is an important component of a computer. It is the computer shed, since its role is to
store data. The hard drive contains partitions that contain your installed system and your personal data
=> note : Soft Drive does not exist …
13.8.3 Hardware
The collection of physical elements that comprise a computer system (the beast, cards, chips, drives,
processor, etc.), as opposed to the Software part.
High Definition is the successor of the television set as we knew it before. HDTV is a television sys-
tem providing an audio quality and an image resolution which are substantially higher than those of a
standard-definition television. The difference is really obvious. Video games (PS3 and Xbox360) and
Blu-Ray (successor to the DVD) also benefit from this technology. However you will need some money
and compatible hardware to enjoy it (compatible HDTV set, HDMI cable, Blu-Ray player …).
13.8.5 HDMI
HDMI stands for High-Definition Multimedia Interface. HDMI is a standard for connecting together High
Definition devices. It is replacing the Scart socket. You can connect a Blu-Ray player for example to an
HDTV with an HDMI cable, and even a PS3 or a Xbox 360.
13.9 I
13.9.1 Icon
An icon is a pictogram, accompanied by a name, representing an element: folder, file, software, shortcut …
clicking on an icon will launch a predefined action: open the file, launch the software, display the content…
13.9.2 IM
IM stands for Instant Messaging, and refers to a software where you can communicate directly (or chat)
with friends and family, possibly share files, using the microphone to talk and the webcam to see each
others. Unlike a chat, instant messaging lets you talk with some people of your contact list, and not just
anyone on the web.
13.9.3 Internet
Internet includes all interconnected (wired and wireless) networks in the world and their associated web-
sites. With an Internet access, you can visit all the websites of the world in one click, listen to music,
communicate, watch videos, learn … let it be from your computer, your tablet or your smart phone.
13.9.4 IN/OUT
Inputs/Outputs (or I/O) characterize the exchange of information between the processor and its associated
devices. In practice, within an operating system, the inputs are the keyboard, the mouse, the disks, the
incoming data from the network. When the outputs are the screen, the disks, the printer, the outgoing
data to the network etc …
Single address across the Internet network, to uniquely identify a machine. It is usually represented by a
group of four numbers. If your computer is connected to the Internet, it has an IP address that is usually
provided at the beginning of the connection by your Internet Service Provider (ISP).
13.9.6 ISP
Internet Service Providers which let you enjoy Internet. Each of them provides an interface allowing you
to connect to the Internet, to have an unlimited land-line phone and even access to digital TV programs.
13.9.7 IRC
Internet Relay Chat. Discussion System in real time on the Internet. There are several IRC networks
themselves divided into “channels” themes.
13.10 J
13.10.1 Java
Multi-platform programming language by Sun. The principle is that a program written once in Java can
run on any computer as long as it has the specific runtime environment called “Java Virtual Machine”.
This converts Java virtual machine instructions into specific instructions to your computer while requiring
it to meet certain safety rules.
Java programs can be embedded within web pages, and in that case they are executed while the container
page is being displayed. They are named Applet.
You should be extremely careful, because Java applet can be used as malware on your computer.
13.10.2 JPEG
graphics file format producing an impressive compression ratios compared to previously defined formats,
but at the expense of the image quality. Actually, the compression method is usually lossy, meaning that
some original image information are lost and cannot be restored, possibly affecting image quality. The
corresponding file extension is JPG.
13.11 K
13.11.1 Kernel
The core of an operating system, or simply the kernel, is one (if not the most) important part of the sys-
tem. It manages the computer resources and allows different components - hardware and software - to
communicate with each other.
A keyboard shortcut is a combination of keys pressed simultaneously on the keyboard to perform a specific
action on the computer. The most commonly used keyboard shortcuts are for saving ([Ctrl] + s), to copying
([Ctrl] + c), pasting ([Ctrl] + v), or closing a window ([Alt] + F4) …
13.11.3 Kiss
The KISS principle, “Keep it Simple Stupid”, is a method which advocates seeking simplicity in design
and avoiding unnecessary complexity. Example: Give me a KISS.
13.12 L
13.12.2 Live CD
A live CD (or a live USB key) is a bootable medium. The system starts booting the computer and then
runs the OS without installation. It actually uses the volatile memory (RAM) to run, and does not affect the
permanent memory (hard disk).
“Free Software” is a concept of free applications and operating systems, whose source codes are left open
by the developers, in order for everybody to inspect and improve them. One example is the GNU/Linux
initiative which regroups free and gratis operating systems like Debian, but also the LibreOffice suite, the
free alternative to Microsoft™ Office, or Firefox and Chromium the free alternatives to Microsoft™ Internet
Explorer.
Sentence used by the computer people to say that they still have 2 hours to finish (the time to compile,
test, fix, compile, test, fix, compile …)
13.13 M
13.13.1 Mail
mail refers to a letter sent by Internet via email software (e.g. Icedove). The mails are free, usually limited
to 10MB, which can be accompanied by attachments (images, documents …) and sent to recipient(s) (At
:) and potentially people in copy (CC :). Unwanted mails are called junk or spam.
A memory card is a small device able to permanently store digital data, likewise a USB key. The memory
card is intended to be plugged into digital cameras or camcorders. It can store photos and movies, and
can be read back by computer featuring a memory card slot. Among the most popular formats, we find the
MemoryStick card for Sony devices, and SD for most others. A recent memory card can store thousands
of photos.
13.13.3 Motherboard
The motherboard is the main component of the CPU. Its role is to centralize and process all the data
exchanged between the processor and the peripherals. The motherboard therefore manages the hard
disk, the CD/DVD drive, the keyboard, the mouse, the network, the various USB ports …
13.14 N
13.14.1 No Life
Nolife is an insane geek or nerd so passionate by his computer activity that he/she spends all his time
with his/her passion neglecting everything else and in consequence has no (or very few) social life. No
comment …
13.14.2 Noob
The “Noob” term (derived from “newbie” or novice) refers to a computer novice. It is not necessarily a
pejorative term.
The notification area is usually located at the right of the taskbar. You can usually find in there, the time, the
network indicator, the sound volume. This is where the messages appear when the system has something
to tell you (e.g. the battery is running empty, updates are available …)
13.15 O
This is the set of software that manages the computer hardware and provides common services for the
application programs. By extension, it is also viewed as the main interface with the end users.
Some examples of operating systems : GNU/Linux, Windows, Mac OS X, FreeBSD.
13.15.2 OS
Operating System.
A package manager is the software which installs, updates and uninstalls the system packages. On
Debian, Synaptic is the graphical front-end of the APT Debian package manager.
13.16.2 Partition
To use certain media such as hard disks, we need to structure them, to break them down into rather
large subsets: partitions. In turn, each partition is then structured as a separate file system. Splitting a
hard drive into multiple partitions allows, for example, the coexistence, on the same disk, of two different
operating systems like GNU/Linux and Windows, which use different file systems.
13.16.3 Phishing
Phishing is a scam practice which tricks an user by sending him an email with a forged sender address
and including a link to a fake website mimicking its bank site, or an e-commerce site, and asking him to
update its information … If the user get trapped (or phished) then his sensitive information (private data,
bank account details, …) can be used to evil ends.
13.16.4 Pixel
a Pixel is the smallest controllable element of a picture represented on the screen. A pixel can display one
color at a time. Thus the screen is composed with million of these pixels, spread in both directions (height
and width), and they come together to form the screen image. A pixel is so small that you can barely see
it with the naked eye. The more pixels compose an image and the sharper it is.
13.16.5 Plugin
A plugin is a software component that adds a specific feature to an existing computer program. Allowing
for example a web browser to read more image, video, animation or sound formats. Sometimes also
called “add-on”.
PS/2 port represents a couple of plugs located in the rear of the system unit. The purple plug connects
the keyboard, while the green one connects the mouse.
Having said that, we should mention that the PS/2 port is not used very often these days and replaced
by the universal USB ports. One of the big disadvantage of this port is that it is not a hot-plug : a device
connected after the computer startup won’t be recognized.
The processor, also named Central Processing Unit (CPU), is the electronic circuitry within a computer
that carries out the instructions of a computer program by performing the basic arithmetic, logical, control
and input/output (I/O) operations specified by the instructions.
In particular, it handles the data exchanges between the various components of the system (hard drive,
memory, mouse, graphics card …) and performs all the computation needed to interact with the you
through the data displayed on the screen.
There is also the Graphics Processor Unit (GPU) which is a special component of the graphics card which
accelerates the creation of images in a frame buffer intended for output to a display.
13.17 Q
13.17.1 Queue
Used in the sense of “waiting in line”. For example different files to be printed are put first in the printer
spool queue.
Terminate the execution of a program. Example : give me a pay raise or a quit my job.
13.18 R
13.18.1 RAM
RAM stands for Random-Access Memory. It is the computer volatile data storage. Its major advantage is
the speed at which one can read from or write to it, as opposed to other direct access data storage media
where the time required to read and write data items varies, depending on their locations and/or some
mechanical limitations such as the media rotation speeds and arm movement delays.
13.18.2 Right-click
A right-click is the action of pressing and releasing (almost) immediately the mouse right button. A right-
click will display a contextual menu corresponding to the pointed element. In particular, it allows to copy,
move, delete and rename the pointed element when it is a file or a folder.
13.18.3 RTFM
Means “Read The Fucking Manual”. This is an abbreviation that is thrown wildly at the head of someone
asking a question, to encourage him to do first his home work in reading the documentation.
This is because people sometimes ask trivial questions, whose answers are readily available in the man
pages or on the Internet, and often these people are not used to the power of the documentation in the
Unix world.
A search engine is a large software system, hosted by a website and which is designed to search for
information on the World Wide Web. It lets you ask questions or type some key words to be searched for.
The engine will then return the most relevant results.
13.19.2 Shortcut
A shortcut is an icon placed anywhere and providing a quick access to a software or a location on your
computer. Most of the time a shortcut is used to launch a program. Deleting a shortcut does not uninstall
the program it is associated with, and does not delete either the linked file.
13.19.3 Software
Everything that makes a computer running, except the hardware part. Applications are software, for ex-
ample.
13.20 T
13.20.1 Tab/Tabulation
Generally present in modern Internet browsers, tabs allow to browse multiple sites simultaneously. To
switch from one site to another, you just have to click on its corresponding tab. Tabs are represented like
tabs in a workbook.
13.20.2 Terminal
We call a terminal, the command line console which is available and essential in all GNU/Linux distribu-
tions.
Even though many GUIs are available for virtually any application, nothing is more efficient, for example,
than updating your entire system by typing one single command line.
Note : a terminal is a very useful tool to debug a program.
13.20.3 Troll
In the world of Usenet, forums of all kinds, mailing lists, IRC, and all these places open to online dis-
cussions, a troll is a person who sows discord by starting arguments or upsetting people, by posting
inflammatory, extraneous, or off-topic messages with the intent of provoking readers into an emotional
response. By extension the subject of the argument itself.
Known examples : “GNU/Linux or Windows”, “Women in Free Software”.
For a desktop, the central unit is the box containing all the electronic equipment that allows the computer
to operate. The Keyboard, mouse, monitor, speakers etc. are all connected to it. The hard disk drive is
located in this central unit, for example.
For a laptop, there is no Central Unit. All the electronic components are grouped under the Keyboard.
13.21.2 Unix
Unix is a multitasking, multi-user computer OS. The original Unix system was developed in 1969. Several
versions were created later on, and today, GNU/Linux is taking its inspiration from this family and contin-
ues with the same philosophy.
Unix systems are characterized by a modular design that is sometimes called the “Unix philosophy,”
meaning that the OS provides a set of tools, each of which performing a well-defined function, and an
unified file system to perform complex work-flows.
The main Unixes (or Unices) are : the BSD family (NetBSD, FreeBSD, OpenBSD), AIX, Solaris, HP-UX,
Mac Os X.
13.21.3 Update
An update is a new version of a program that fix a problem existing in its the previous version. The update
may fix a security hole, add a new functionality, solve an algorithm error …
13.21.4 URL
The URL (Uniform Ressource Locator) points to the address of a website like “https://www.debian.org”.
By typing an URL in the browser address bar, you go directly to the desired site, without having to go
through a search engine. You never need to type the %%“https://www.”%% address header, simply
enter “debian.org”.
13.21.5 USB
USB stands for Universal Serial Bus. It is the cable with a rectangular connector that wants to be universal:
almost all current hardware devices are connected to your computer via USB. Computers now have USB
ports on the back, on the front of the Central Unit, and even sometimes on your monitor.
It usually requires 3 steps to plug an USB connector: try to plug it in a first try, it does not work. Turn over
the connector and retry, it does not work too. Retry with the initial position and the connector will fit in.
This is as mysterious as the sock which disappears in the washer…
It is the full set of the workspaces available on a GNU/Linux desktop. It is like having on hand several
desktops (with task bar and included windows). Very handy to get organized !
13.22.2 VGA
Video Graphics Array (VGA) refers to the display hardware first introduced with the IBM PS/2 in 1987.
The term can also mean either an analog computer display standard, the 15-pin D-subminiature VGA
connector or the 640x480 resolution itself. While this resolution was superseded in the personal computer
market in the 1990s, mobile devices have only caught up in the last few years.
13.22.3 VPN
Stands for Virtual Private Network, and refers to an encrypted network on the Internet, which allows a
company whose premises are geographically dispersed to communicate and share documents in a com-
pletely secure manner, as if they were all connected in a local area network.
13.23 W
13.23.1 Web
Web is the most common Internet network and refers to all the interconnected networks that run across
the whole world and connect computers together in the manner of a spider web.
Surfing the Web means : browse the Internet.
An Internet browser is a software application that allows you to visit websites, download files and make
some research.
13.23.3 Wiki
A wiki (Hawaiian word meaning “quick”) is a web site whose pages are editable by visitors, enabling the
creation of collaborative contents. (And aren’t you afraid to give the keys to strangers ?).
13.23.4 Window
A window is a rectangular area that appears on the screen to display, for example, the contents of a folder,
or a text file, or some software output. The window can take all the space (full-screen) or only a part of
the screen real estate. It is possible to view multiple windows simultaneously and drag items from one to
another using the drag and drop technique.
The window manager is the X (graphical) client software that controls the placement and appearance
of windows (title bar, framing, moving, resizing, etc..) within a windowing system in a graphical user
interface. Most window managers are designed to help provide a desktop environment.
Applications, handle the inside of the window they created and manage their content and the interaction
with the user.
It is possible to change the window manager and see all the look and feel of the screen change completely.
When the window manager can do many other things in addition to what has been described here, it is a
desktop environment like XFCE.
13.23.6 WWW
13.24 X
13.24.1 X Window
X Window System, commonly called X Windows, X11 or just X is the graphics subsystem of GNU/Linux.
X Window is not only a driver for the video card, it is mainly an interface (API) for applications, so that they
appear on the screen and receive input from the keyboard and mouse.
13.24.2 X Org
13.25 Y
Yes we can make you understand your computer, use it to do what you want and share knowledge…
13.26 Z
13.26.1 Zen
“Stay zen”, means keep calm. Zen Buddhism has always been appreciated by hackers. This is a funda-
mental virtue of good programmer, especially in the debugging phase …
A very popular file compression format. Requires a specific program for decoding (expanding) the com-
pressed file.
13.26.3 Zombie
Program that ended but whose father, informed of its death, does nothing (in keeping with the quilt analogy,
he is not concerned by the funeral nor the administrative procedures). It does not exist anymore but is
not deleted from the system process list, so it is still a bit alive … In turn, a program whose father was
destroyed is an orphan.
13.27 Links
14.2 References
The beginner’s handbook scribbled by arpinux under free license WTFPLv2 (https://en.wikipedia.org/
wiki/WTFPL) unless otherwise stated.
English translation by Saby43, member of the Emmabuntüs community (https://emmabuntus.org/
a-propos/).
This manual integrates logos (Debian, Firefox, etc.) under copyright (each one its own, otherwise it’s not
funny) as well as some images and texts under license CC-BY-SA (https://creativecommons.org/licenses/
by-sa/3.0/) (specified and credited under images and texts concerned)
254
The icons used come from the Gnome themes: https://commons.wikimedia.org/wiki/GNOME_Desktop_
icons & Tango: https://commons.wikimedia.org/wiki/Tango_icons
Debian : Copyright © 1997-2023 SPI (https://www.spi-inc.org/) and others; See license terms (https:
//www.debian.org/license)
Debian is a registered trademark (https://www.debian.org/trademark) of Software in the Public Interest,
Inc.
Since Debian 8, the beginner’s handbook were made with the kind contributions of humans. Thanks
to… bendia, nIQnutn, Atapaz, Severian, deuchdeb, martinux_qc, mercredi, nazmi, chalu, bruno-legrand,
Thuban, Starsheep, smolski, Trefix, desmoric, nono47, yanatoum, PengouinPdt, èfpé, fiche, BibiSky51,
titiasam, Firepowi, dcpc007, rhyzome, Péhä, kyodev, Saby43, Otyugh, fiche, JCE, ubub, captnfab,
vv222, Switch_T, raleur, gtalbot, Caribou22 & samtux ;).
Thanks to saby43 for the english translation,
and to my wife <3
Special thx 2 Péhä for his drawings (under CC-BY-SA) and his free spirit
https://noroanka.art/.
255
Contents
5 Installing Debian 57
5.1 Before installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.1.1 Hardware compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.1.2 Backing up your data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
5.1.3 Disk space requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
5.1.4 Installation time duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
5.1.5 Preparing the hard disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
5.2 Downloading Debian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
5.2.1 Which image to download? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
5.2.1.1 Debian Netinst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.2.1.2 Debian on CD/DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.2.1.3 Debian live . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
5.2.1.4 Debian torrent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.2.2 Verifying the ISO image integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.2.2.1 Checking SHA256 on GNU/Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
5.2.2.2 Verifying SHA256 on Windows® . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
5.2.3 ISO transfer on a CD/DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
5.2.4 ISO transfer on a USB key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
5.2.4.1 From a GNU/Linux system with the terminal . . . . . . . . . . . . . . . . . . . . . . 63
5.2.4.2 From a Windows® system with Win32DiskImager . . . . . . . . . . . . . . . . . . 64
5.2.5 Booting from the CD/DVD or the USB device . . . . . . . . . . . . . . . . . . . . . . . 65
5.2.5.1 The Boot Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
5.2.5.2 BIOS configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
5.2.5.3 BIOS/UEFI/Secure Boot configuration . . . . . . . . . . . . . . . . . . . . . . . . . 68
5.3 Testing Debian safely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
13 Glossary 235
13.1 A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.1.1 Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.1.2 ADSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.1.3 ALSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.1.4 Apt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.1.5 Aptitude . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
13.1.6 Arobase @ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
13.1.7 Audio Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
13.1.8 Autonomy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
13.2 B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
13.2.1 Beast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
13.2.2 BIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
13.2.3 Boot manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
13.2.4 Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
13.2.5 Bug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.3 C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.3.1 C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.3.2 C++ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.3.3 Chat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.3.4 Click . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.3.5 Client/Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.3.6 Cloud Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
13.3.7 Code (to) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.3.8 Code (Source) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.3.9 Compile (to) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.3.10 Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.3.11 Cookie(s) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.3.12 Copy and paste . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.3.13 Core dump . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.3.14 Cut and paste . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
13.3.15 Cursor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.4 D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.4.1 Debian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.4.2 Dependencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.4.3 Desktop Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.4.4 Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.4.5 Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.4.6 Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
13.4.7 Drag and drop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
13.5 E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
13.5.1 Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
13.5.2 Ergonomics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
13.6 F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
13.6.1 File Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
13.6.2 File system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
1.1 GNU & Tux, logos of the GNU projet and the Linux kernel by Péhä CC-BY-SA . . . . . . 2
1.2 In memory of Ian Murdock by Péhä CC-0 . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 logo Debian “debian” . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Debian banner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.5 Kali Ma Shakti de . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1 The LXQt desktop with the application menu and the PCManFM file manager . . . . . . 17
3.2 Gnome-Shell panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.3 Xfce panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.4 LXDE panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.5 MATE up & down panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.6 Cinnamon panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.7 KDE panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.8 LXQt panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.9 Accessing the Xfce panel configuration with a right-click . . . . . . . . . . . . . . . . . . 19
3.10 The 3 tabs of the Xfce panel configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.11 Menu grouped by category on Cinnamon . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.12 Classic dropdown menus on LXQt or XFCE . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.13 Full-screen menu on Gnome-Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.14 The Firefox web browser and the file manager on Gnome . . . . . . . . . . . . . . . . . . 22
3.15 Closing a window with the mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.16 Gnome virtual desktops . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.17 Xfce and 4 virtual desktops shown in the panel . . . . . . . . . . . . . . . . . . . . . . . . 24
3.18 The file manager PCManFM, on LXQt, with two opened tabs . . . . . . . . . . . . . . . . 25
3.19 Hiddden files on display with PCManFM on LXQt . . . . . . . . . . . . . . . . . . . . . . 26
3.20 Presentation of the Thunar file manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.21 Contextual menu in Thunar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.22 Empty the Wastebasket using the sidebar icon . . . . . . . . . . . . . . . . . . . . . . . . 30
265
3.23 Rights and permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.24 Contextual menu: properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.25 Terminal presentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.26 Using “cd” to navigate the file system in the Terminal console . . . . . . . . . . . . . . . 33
3.27 List of existing folders and files with “ls” . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3.28 Console : uname -r . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.29 Console : uptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.30 Console : cd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.31 Console : clear . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34