Table of Contents
All phishing attack and awareness templates are tested and supported in the following browsers:
- IE 11
- Microsoft Edge
- Microsoft Edge
Please, note that the administration from a mobile device with a low resolution is not possible.
Supported OS for Virtualization Software
Virtualization Software like Vmware or Virtualbox can be installed on most common operating systems. Please check your vendor's documentation for more info.
Awareness Content on mobile devices
Our awareness courses are optimized for all types of mobile devices
Supported OS for the Installer (install.sh)
The installer file (install.sh) is build with "Docker". Docker containers wrap up a piece of software in a complete filesystem that contains everything it needs to run: code, runtime, system tools, system libraries – anything you can install on a server. This guarantees that it will always run the same, regardless of the environment it is running in.
About containers: Containers running on a single machine all share the same operating system kernel so they start instantly and make more efficient use of RAM. Images are constructed from layered filesystems so they can share common files, making disk usage and image downloads much more efficient. Containers include the application and all of its dependencies, but share the kernel with other containers. They run as an isolated process in userspace on the host operating system. They’re also not tied to any specific infrastructure – Docker containers run on any computer, on any infrastructure and in any cloud.
Open Standard: Docker containers are based on open standards allowing containers to run on all major Linux distributions and Microsoft operating systems with support for every infrastructure:
- Amazon EC2 Installation
- Arch Linux
- Microsoft Azure platform
- Installation from binaries
- CRUX Linux
- Install on Joyent Public Cloud
- Mac OS X
- Oracle Linux
- Rackspace Cloud
- Red Hat Enterprise Linux
- IBM SoftLayer
- openSUSE and SUSE Linux Enterprise
Please note, that LUCY Security does not recommend installing LUCY Software on cloud storage solutions.