All phishing attack and awareness templates are tested and supported in the following browsers:
Please, note that the administration from a mobile device with a low resolution is not possible.
Virtualization Software like Vmware or Virtualbox can be installed on most common operating systems. Please check your vendor's documentation for more info.
Our awareness courses are optimized for all types of mobile devices
The installer file (install.sh) is build with "Docker". Docker containers wrap up a piece of software in a complete filesystem that contains everything it needs to run: code, runtime, system tools, system libraries – anything you can install on a server. This guarantees that it will always run the same, regardless of the environment it is running in.
About containers: Containers running on a single machine all share the same operating system kernel so they start instantly and make more efficient use of RAM. Images are constructed from layered filesystems so they can share common files, making disk usage and image downloads much more efficient. Containers include the application and all of its dependencies, but share the kernel with other containers. They run as an isolated process in userspace on the host operating system. They’re also not tied to any specific infrastructure – Docker containers run on any computer, on any infrastructure and in any cloud.
Open Standard: Docker containers are based on open standards allowing containers to run on all major Linux distributions and Microsoft operating systems with support for every infrastructure:
Please note, that LUCY Security does not recommend installing LUCY Software on cloud storage solutions.