How to use Zoom’s advanced sharing options to share more than just your screen


Image: SARINYAPINNGAM, Getty Images/iStockphoto

If you use Zoom, you probably already know that you can share your screen, either a specific window or app, or the entire screen. But Zoom also offers advanced options for sharing more than just your screen. By tapping into these advanced options, you can share a portion of a screen. You can share just the audio and not the video from your computer. And if your system is outfitted with more than one camera, you can share content using that second camera. Here are the steps.

SEE: How to secure your zoom conference line from hackers (free PDF) (TechRepublic) 

In your Zoom meeting, open a file, document, or window for which you want to share a specific section or area. Click the Share Screen button. At the screen to select a window or application to share, click the section for Advanced. Select the first icon for Portion of Screen and then click the Share button (Figure A).

Figure A

A green frame appears. Make sure it’s on top of the file or window you wish to share. Move the frame so it covers only the portion you want to share. As you move the frame, it turns orange, which means that sharing is paused and inactive. When you stop moving the frame, it turns back to green, indicating that sharing is on and active again. If the frame is the wrong size, you can resize it by any of the four corners or four sides (Figure B). When you’re finished, click the Stop Share button at the top.

Figure B

Next, maybe you want to share just the audio for the other participants to hear music or sounds played from your computer without any video. At the Advanced section in the sharing window, click the icon for Music or Computer Sound Only and then click the Share button (Figure C). You can now play the audio from your computer so that everyone can hear it.

Figure C

Finally, you can share the screen using a second camera if your system has more than one camera. For example, you may have a dedicated document camera. Back at the Advanced section in the sharing window, click the icon for Content from 2nd Camera and then click the Share button (Figure D). From the Share window, click the Switch Camera button in the upper left corner to switch back and forth between your primary camera and your secondary camera.

Figure D

Cloud and Everything as a Service Newsletter

This is your go-to resource for XaaS, AWS, Microsoft Azure, Google Cloud Platform, cloud engineering jobs, and cloud security news and tips.
Delivered Mondays

Sign up today

Also see

Advanced Observability for Red Hat OpenShift Webinar On-demand


Top performing organisations know that they must build and run new software at speed and scale — and migrate strategic workloads to the cloud — as quickly as possible to meet increasing demands for more features, faster. While this is imperative to be competitive, there are challenges along the way as companies look to build new cloud-native apps, refactor monolithic apps, containerize legacy apps, or a combination of approaches.

Watch the joint Red Hat & Dynatrace On-Demand webinar as they share how to scale your OpenShift workload with confidence using Dynatrace’s full-stack monitoring platform to:

  • Move more app workloads to the cloud with less risk, costs and downtime.
  • Improve DevOps cycle of your organisation and transform your pipelines into a robust and scalable flow

The On-Demand webinar is hosted by Myrvin Yap, Cloud Strategist at Dynatrace, and joined by Hendra Sutanto, OpenShift Technical Marketing Manager at Red Hat.

How to use the Whonix advanced security and privacy distribution


Whonix is a Linux desktop dedicated to absolute security and privacy. Find out how to use this unique take on the desktop operating system.

Image: iStockphoto/marchmeena29

In today’s world, security and privacy have become incredibly important to both businesses and consumers. For some, it doesn’t seem to matter what we do as there’s always a security risk lurking around the corner. To that end, we go to all lengths to secure the desktop platforms we use. Sometimes it works, sometimes it doesn’t.

If you’ve reached the point where you have tasks that require the most secure and private desktop you can find, where do you turn? You could give Whonix a try. Whonix takes a very different approach to desktop security. Instead of a single operating system, you actually work with two virtual machines—one as a gateway and the other as a desktop. The gateway works with the Tor network to ensure security and privacy. With this one-two punch, you can be sure everything you do on the desktop is anonymized.

How do you make this work? I’m going to show you.

SEE: Security Awareness and Training policy (TechRepublic Premium)

What you’ll need

The trick to using Whonix is by way of VirtualBox–in order to use Whonix, you’ll need VirtualBox installed. The platform you use to host VirtualBox doesn’t matter.

How to import the virtual appliance

The first thing you must do is import the virtual appliance into VirtualBox. This is actually quite easy. All you need to do is head over to the Whonix download page and download the OVA file. Upon clicking the file, you should be prompted what to do with the download (Figure A).

Figure A

Downloading the Whonix OVA in Firefox.

Make sure to select Open with and then choose VirtualBox from the drop-down. Click OK and the download will begin. Once the download completes, you’ll be prompted to import the appliance into VirtualBox (Figure B). 

Figure B

Importing the OVA into VirtualBox.

Don’t change any of the appliance settings, just click Import and agree to two EULAs. Once you’ve agreed to the licenses, the import will complete.

How to run Whonix

The appliance import will wind up with two virtual machines:

  • Whonix-Gateway

  • Whonix-Workstation

It is important that you only start the Gateway first as it must connect to the Tor network. Once you start the Gateway, it’ll land on the Anon connection Wizard (Figure C).

Figure C

The Whonix Anon Connection Wizard.

Click Next and, in the resulting window, click Next again (Figure D).

Figure D

The Connection Wizard Summary is good to go.

When the connection to the Tor network is made, you’ll eventually see a warning that Whonix needs to be upgraded. Close that warning, open a terminal window, and issue the command:

sudo apt-get-update-plus dist-upgrade

You will not be prompted for a sudo password. The upgrade will start and complete. 

After that, issue the following command:

sudo apt-get update && sudo apt-get upgrade -y

For this command, you will be prompted for a password. The default sudo password is changeme.

When this completes, leave the Gateway running and start the Whonix Workstation from VirtualBox. When the desktop finally loads, you will need to “agree” both license windows, by checking Understood and clicking Next (Figure E).

Figure E

The Whonix Workstation license.

The Whonix Workstation will then check for any available updates. Should there be any, run through the same process as you did with the Gateway.

Changing the default passwords

You’ll want to change the default passwords on both the Gateway and the Workstation. To do that, open a terminal window and issue the command:

passwd user

You will be prompted for the current password and then asked to type and verify the new password. 

At this point, you can now start using the Whonix Workstation as a secure and private desktop session. You must remember, however, that any time you want to use this desktop, you must start the Gateway first.

Cybersecurity Insider Newsletter

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
Delivered Tuesdays and Thursdays

Sign up today

Also see