Platform-specific Desktop Tips
Disable Terminal Emulator Banner
The following greeting banner appears when a terminal shell
bash prompt is opened.
Welcome to Kicksecure!
Kicksecure Copyright (C) 2012 - 2021 ENCRYPTED SUPPORT LP Kicksecure is Freedom Software, and you are welcome to redistribute it under certain conditions; type "kicksecure-license" <enter> for details. Kicksecure is a compilation of software packages, each under its own copyright and license. The exact license terms for each program are described in the individual files in /usr/share/doc/*/copyright.
Kicksecure GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law; for details type "kicksecure-disclaimer" <enter>.
Kicksecure is a derivative of Debian GNU/Linux and based on Tor.
Kicksecure is produced independently from the Tor (r) anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else.
Kicksecure is experimental software by means of concept and design. Do not rely on it for strong anonymity.
Type: "kicksecure" <enter> for help. uwt INFO: Stream isolation for some applications enabled. uwt / torsocks will be automatically prepended to some commands. What is that? See:
To disable the banner, follow these steps.
See also: Disable Virtual Console Banner.
Shut Down Kicksecure ™
To shut down Kicksecure ™, open a terminal and run.
Alternatively, use the menu option:
- Kicksecure ™ for Qubes:
Blue Q button→
- Kicksecure ™:
Using Kicksecure ™ as a Host Operating System
Virtual consoles is a feature inherited from Debian GNU/Linux which is unfamiliar to many users. The following keyboard shortcuts activate the Debian (not Kicksecure ™) feature:
- Text console: Press
Alt + Crtl + F1
- Additional text consoles: Press
Alt + Crtl + F2or
F3and so on.
- Additional text consoles: Press
- Graphical console: Press
Alt + Crtl + F7
Table: Virtual Console Activation
|KVM||The desired virtual console key shortcut can be selected under the |
|Qubes dom0||Qubes dom0 inherited the same feature (|
|Qubes VMs||In order to access VMs in dom0, run:  |
sudo xl console kicksecure
|VirtualBox||The VirtualBox default is |
Due to technical limitations, an easier to understand presentation like
Kicksecure ™ username login: or something similar cannot be shown. 
- Enter your username (this is most likely
user) and press
- Enter your password and press
Disable Virtual Console Banner
This process is similar to Disable Terminal Emulator Banner.
1. Open a virtual console.
2. Run the following command to restore the original bashrc (untested). 
The procedure is complete.
Not very useful inside VMs, see also Login Screen.
1. Open file
/etc/gdm3/daemon.conf in an editor with root rights.
(Kicksecure ™ inside Qubes: In Template)
2. Search for the following.
Out-comment, add a hash symbol ("
#") in front of the two lines. Or replace the content, copy/paste the following which does the same.
Autologin should be disabled after reboot.
Minimal RAM Required
Kicksecure ™ is based on Debian stable releases thus it will use similar Memory and Disk Space Requirements for Debian.
RAM Adjusted Desktop Starter
When booting up, a prompt will appear offering to prevent Xfce from starting. Users can also manually press
Ctrl + C for the same effect.
By default, Kicksecure ™ VMs are configured with 1280 MB virtual RAM. This can be reduced on systems with low available resources.
- If total RAM is more than 512 MB, the default desktop environment (Xfce) is started.
- If total RAM is less than 512 MB (for example, the minimum 256 MB RAM requirement), Xfce is not started.
Users with low RAM resources should find this convenient because Kicksecure ™ RAM can be reduced to 256 MB and still function.
Further, if something needs configuring or checking, 512 MB RAM can be assigned to automatically boot into the graphical Xfce desktop. Additional settings are available in folder
/etc/rads.d to configure this feature: additional RAM can be added (but still not choosing to boot into a desktop environment), different display managers can be used and so on. See file
/etc/rads.d/30_default.conf for configuration examples.
For more information, see RAM Adjusted Desktop Starter.
Use Full-screen Mode
It is recommended to work in full-screen; this feature is also inherited from VirtualBox. To activate and deactivate full-screen mode, press the VirtualBox Host Key + F. The current Host Key is visible in the bottom right corner of VirtualBox. The VirtualBox default is
Right Ctrl + F.
Host key can be changed using
Global Settings →
Full-screen mode leads to the Kicksecure ™ (and Debian) default resolution and color depth of
A number of displays found in high-end laptops and desktops have High Dots Per Inch (HiDPI), providing a high resolution in a relatively small format. High-resolution mode can cause problems with certain software and the following adjustments may be necessary to improve HiDPI presentation in XFCE. 
Table: XFCE Scaling Options
|Fonts||Change the DPI parameter as follows:  |
For example, it is reported that a value of
|gtk2 Menus and Buttons||Follow these steps to change the default icon sizes of gtk2 menus, buttons and so on:  |
gtk-large-toolbar=96,96:gtk-small-toolbar=64,64:gtk-menu=64,64:gtk-dialog=96,96:gtk-button=64,64:gtk-dnd=64,64Note that the "gtk-dnd" parameter is for the icons during drag'n'drop, while the others are self-evident based on their name. Any value supported by the icon theme can be used.
|System Tray Icon Size||Follow these steps to enlarge icons in the system tray:  |
|Task Bar Size||To change the size of the task bar: |
|Window Manager Style||Xfwm has two hidpi themes: Default-hdpi and Default-xhdpi. Change the theme as follows:  |
Default Home Folder Configuration Files Reset
Before following these instructions to wipe the whole Xfce settings folder and restore defaults, it is recommended to backup existing Xfce settings.
Avoid VM Full Screen Mode
It is unrecommended to allow Kicksecure ™ for Qubes or other VMs to completely "own" the full screen. Overriding Qubes' GUI virtualization daemon restrictions means the colored decorations drawn by each VM window will not be visible. In this case, a malicious application might not actually release the full screen (while it appears normal), or the full desktop may be emulated so users are tricked into entering sensitive information inside false "trusted" domains. 
- This is not a real virtual console, but using login.
Inside VirtualBox, the
Alt + Ctrlkeys are already registered by the host operating system. Host key can be changed using
loginprogram unfortunately does not provide this option.
- Please leave feedback if this step works correctly.
3. Run the following command.
sudo unlink /etc/motd