Skip to main content

Boot Into Linux Without USB or CD/DVD

If you want to try out Linux but you don't have a flash drive or your computer has no ODD, you can try the instructions below.

Please note that this works only if your computer has BIOS. For others with UEFI, there are separate instructions for you. To check if your computer is using BIOS, please do the following:

  1. I would assume that you're using Windows. Press Windows + R simultaneously.
  2. Type in the input box msinfo32 then hit OK.
  3. You will have the System Information window open
  4. Under the System Summary, check if the value of BIOS Mode is Legacy.

If you see the same setup as above, you are good to go.

Before we proceed, you need 2 things first:

  1. UNetbootin - click here to download
  2. You Linux distro image. This can usually just be downloaded from the community website of your chosen distro. - click here to check Ubuntu Desktop as example.
Now, with the two files above downloaded, let's begin!

1. Run UNetbootin as administrator
2. Select Diskimage at the lower part of the window.
3. In the Type dropdown, select Hard Disk and choose a partition.



4. Click on the ellipsis(...) button on the right side of ISO inputbox to select your download Linux distro image (.iso file)

5. Click OK and wait for it to complete the setup.


6. You can restart your computer now. When you do, you will have two options:

  • Boot with your Windows OS (Windows 10 in my case)
  • Boot with UNetbootin
7. You can select UNetbootin.
8. After selecting UNetbootin, you will have to press ESC button to get the Linux boot selection.

Cheers!

Popular posts from this blog

Importing Exploit-DB Exploits into Metasploit in Kali Linux for Offline Access

You're going to need three terminals open for this. Terminal 1 for starting metasploit Terminal 2 for importing the exploit to local Metasploit repository Terminal 3 for searchsploit which we will use to search for the exploit instead of opening your browser and looking in exploitdb. Let's be done with it! 1. First, open the first terminal to run metasploit with the following commands: > service postgresql start > msfconsole  2. Go to Terminal 3 and run the following command to update its database: > searchsploit -u 3. Open Terminal 2, then go to the metasploit modules directory by: > cd .msf4/modules 4. Then create a directory inside the msf4 modules folder: > mkdir exploits 5. Now, back to the Terminal 3. We will to search for an exploit we want to import. Let's first try to look for the explore ms15-100 by typing: > searchsploit msf15-100 After pressing Enter, you should be able to see the search result. It will be a t...

Using Termux in Android to Download Youtube Videos

In termux: apt update && apt upgrade Give termux access to your phone's filesystem via ~/storage/shared termux-setup-storage Install python: packages install python Install youtube-dl pip install youtube-dl Create a folder to store your downloaded videos: mkdir /data/data/com.termux/files/home/storage/shared/Youtube Create youtube-dl config (volume-down key emulates Ctrl in termux): nano ~/.config/youtube-dl/config The contents of my config is as follows: --no-mtime -o /data/data/com.termux/files/home/storage/shared/Youtube/%(title)s.%(ext)s -f "best[height<=480]" (the height<=480 tells youtube-dl to download the best quality version up to 480px in width. You can change to 240, 360, 720 or 1080, etc to suit your needs / bandwidth restrictions. Save with "Volume-down" + O, then close nano with "Vol-down" + X Create "termux-url-opener" in ~/bin to enable one-click download via the "Share" menu i...

Extracting Windows Product Key Using Kali Linux

You may have encountered a problem where you need to format a Windows PC but don't have the Product Key. But you don't know the password of the local admin (because of a number of excuses). If you fortunately have a Live Kali DVD you can boot into, you can try using the chntpw application: To look into the relevant registry file mount the Windows disk and open it like so: chntpw -e /path/to/windisk/Windows/System32/config/RegBack/SOFTWARE Now to get the decoded DigitalProductId enter this command: dpi \Microsoft\Windows NT\CurrentVersion\DigitalProductId