Language Selection

English French German Italian Portuguese Spanish

Run your Linux LiveCD in Windows with one click

Filed under
Linux

MobaLiveCD is a freeware Windows application that will run your Linux LiveCD on Windows thanks to the excellent emulator called "Qemu". MobaLiveCD allows you to test your Linux LiveCD with a single click : after downloading the ISO image file of your favorite LiveCD, you just have to start it in MobaLiveCD and here you are, without the need to burn a CD-Rom or to reboot your computer.

MobaLiveCD key features:
+ No need to burn the CD-Rom anymore
+ You can use the right-click menu for an easy and fast start
+ Program without installation that you can start from an USB stick
+ A clear and easy to use interface
+ Light and portable application, packaged in a single executable of 1.6MB only

1- download MobaLiveCD, go to http://mobalivecd.mobatek.net/en/ and follow the download link. Save the MobaLiveCD executable somewhere on your hard drive.

2- Start MobaLiveCD right away by simply clicking on the executable - it's a standalone application, i.e., it doesn't need to be installed:

3-.. and select the ISO image of a Linux Live-CD from your hard drive (e.g. PCLinuxOS, Mepis, Mandriva One):

4- If you want to save changes that you make in the Linux live system, create a hard disk image for the virtual machine, otherwise select No:

5- If you have chosen to create a hard disk image, specify its location:

6-Afterwards the Live-CD starts and boot the Linux system. Click into the window to move the mouse pointer of the Linux system or to press keys inside the Linux system. To release the mouse pointer, press CTRL+ALT.

MobaLiveCD also lets you add a menu entry to the right-click menu of ISO images so that you can directly run the ISO image from the right-click menu. To set up the menu entry, click on the Right-click menu button in MobaLiveCD:

Now when you right-click on an ISO image, you see the entry Test this with MobaLiveCD in the right-click menu. Select this if you want to start the ISO image in MobaLiveCD:

If you want to remove the entry from the right-click menu, click on the Uninstall button in MobaLiveCD:

http://www.pclinuxos.com

More in Tux Machines

Leftovers: OSS

Security Leftovers

  • Security updates for Thursday
  • OpenSSL patches two high-severity flaws
    OpenSSL has released versions 1.0.2h and 1.0.1t of its open source cryptographic library, fixing multiple security vulnerabilities that can lead to traffic being decrypted, denial-of-service attacks, and arbitrary code execution. One of the high-severity vulnerabilities is actually a hybrid of two low-risk bugs and can cause OpenSSL to crash.
  • Linux Foundation Advances Security Efforts via Badging Program
    The Linux Foundation Core Infrastructure Initiative's badging program matures, as the first projects to achieve security badges are announced.
  • Linux Foundation tackles open source security with new badge program
  • WordPress Plugin ‘Ninja Forms’ Security Vulnerability
    FOSS Force has just learned from Wordfence, a security company that focuses on the open source WordPress content management platform, that a popular plugin used by over 500,000 sites, Ninja Forms, contains serious security vulnerabilities.
  • Preparing Your Network for the IoT Revolution
    While there is no denying that IP-based connectivity continues to become more and more pervasive, this is not a fundamentally new thing. What is new is the target audience is changing and connectivity is becoming much more personal. It’s no longer limited to high end technology consumers (watches and drones) but rather, it is showing up in nearly everything from children’s toys to kitchen appliances (yes again) and media devices. The purchasers of these new technology-enabled products are far from security experts, or even security aware. Their primary purchasing requirements are ease of use.
  • regarding embargoes
    Yesterday I jumped the gun committing some patches to LibreSSL. We receive advance copies of the advisory and patches so that when the new OpenSSL ships, we’re ready to ship as well. Between the time we receive advance notice and the public release, we’re supposed to keep this information confidential. This is the embargo. During the embargo time we get patches lined up and a source tree for each cvs branch in a precommit state. Then we wait with our fingers on the trigger. What happened yesterday was I woke up to a couple OpenBSD developers talking about the EBCDIC CVE. Oh, it’s public already? Check the OpenSSL git repo and sure enough, there are a bunch of commits for embargoed issues. Pull the trigger! Pull the trigger! Launch the missiles! Alas, we didn’t look closely enough at the exact issues fixed and had missed the fact that only low severity issues had been made public. The high severity issues were still secret. We were too hasty.
  • Medical Equipment Crashes During Heart Procedure Because of Antivirus Scan [Ed: Windows]
    A critical medical equipment crashed during a heart procedure due to a timely scan triggered by the antivirus software installed on the PC to which the said device was sending data for logging and monitoring.
  • Hotel sector faces cybercrime surge as data breaches start to bite
    Since 2014, things have become a lot more serious with a cross section of mostly US hotels suffering major breaches during Point-of-Sale (POS) terminals. Panda Security lists a string of attacks on big brands including on Trump Hotels, Hilton Worldwide, Hyatt, Starwood, Rosen Hotels & Resorts as well two separate attacks on hotel management outfit White Lodging and another on non-US hotel Mandarin Oriental.

Android Leftovers

today's howtos