Common Kicksecure ™ CLI Commands

From Kicksecure


There are a number of common command line operations that are performed by users of all skill levels in the Kicksecure ™ environment. This wiki page is intended to serve as a quick and handy reference guide for locating these, but it is not a substitute for reading relevant wiki entries that provide detailed instructions for various activities. [1] Additional, useful commands will be added here over time.

Table: Kicksecure ™ Common Commands

Category Commands
Change Keyboard Layout
  • To change the keyboard layout:
    • sudo dpkg-reconfigure keyboard-configuration
    • sudo dpkg-reconfigure console-data
  • Make the reconfigured keyboard-configuration change take effect:
    • sudo setupcon
Connection Wizard (Enable/Disable Tor)

Not yet available in Kicksecure ™. This notice might be outdated.

  • lxsudo anon-connection-wizard
  • sudo setup-wizard-dist
Default Username and Password.
  • Default username: user
  • Default password: changeme
Important Logs Not yet available in Kicksecure ™. This notice might be outdated.
  • sudo tail -f /var/log/syslog
  • sudo sdwdate-log-viewer
  • tail -f /var/run/tor/log
Nyx: Tor Command Line Monitor [2]
  • Launch Nyx:


  • Restart sdwdate:

sudo sdwdate-clock-jump


Not yet available in Kicksecure ™. This notice might be outdated.

  • General system check, Network Time Synchronization and Tor Connection Check:


  • Report the date in UTC:

date -u

  • Manually set the system clock:

sudo date -s "17 FEB 2019 24:00:00" && sudo hwclock -w

  • Randomize the time: [3] [4]
    • clock-random-manual-gui: a randomized clock setting (in UTC) is entered via a GUI.
    • clock-random-manual-cli: a randomized clock setting (in UTC) is entered on the command line. For example:
      echo "Wed Dec 04 06:20:13 UTC 2019" | /usr/bin/clock-random-manual-cli
  • Restart Network:

sudo service networking restart

  • Restart Tor:

sudo service tor restart

  • Stop Tor:

sudo systemctl stop tor@default

  • Check the Tor version:


  • Check the Tor configuration:

sudo -u debian-tor tor --verify-config

Virtual Consoles
  • Text console: Press Alt + Crtl + F1
    • Additional text consoles: Press Alt + Crtl + F2 or F3 and so on.
  • Graphical console: Press Alt + Crtl + F7
VM Operations
  • Reboot:

sudo reboot

  • Power off:

sudo poweroff

Kicksecure ™ Version
  • Kicksecure ™ version:

cat /etc/kicksecure_version

DNS Resolution Functionality Test
  • nslookup
GnuPG (OpenPGP)
  • Retrieve keys (example):
  • Display key fingerprint (example):

sudo apt-key adv --fingerprint A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89

  • Check file signatures (example):

gpg --verify tor-browser-linux64-8.5_en-US.tar.xz.asc tor-browser-linux64-8.5_en-US.tar.xz

  • Reset HexChat identity:


Network Restart
  • sudo service networking restart
OS Updates / Software Installation
  • upgrade-nonroot
  • sudo apt update && sudo apt full-upgrade
  • Install the package-name package.

sudo apt install package-name

  • Install the package-name package from Debian backports. Requires enabling backports repository.

sudo apt -t bullseye-backports install package-name


  1. This entry has been inspired by the relatively unknown kicksecure command, which already lists common Kicksecure ™ command line operations.
  2. This is a Tor Controller which runs as a console application.
  3. A non-zero exit codes signifies an error, while 0 means it succeeded.
  4. Also see:
    man clock-random-manual-gui
    man clock-random-manual-cli

Unfinished: This wiki is a work in progress. Please do not report broken links until this notice is removed, use Search Engines First and contribute improving this wiki.