Downloading Debian

Posted on 2004-11-11
Last Modified: 2013-12-15
I am trying to download debian (woody) from the net, i am doing
this from a MS OS (Server 2003) and i am using jigdo for the download. I find the documentation a bit confusing.

Firstly i have downloaded a template and jigdo file for each CD of Debian
eg woody-i386-1.jigdo and woody-i386-1.template

But i dont understand how to get the ISO for each CD, i think i must be dumb because the docs  are not to clear to me.

Can some one please give me some advice
Question by:mustekkzn
    LVL 95

    Expert Comment

    by:Lee W, MVP
    No, I found it confusing as hell too - though on my third try of downloading the DVDs I succeeded - I'd suggest looking at for links to download pre-made ISO images and not through debian's web site directly.
    LVL 2

    Expert Comment

    LVL 38

    Expert Comment


       The following is all the mirror sites for ISO images download. Find the faster one for you:

    LVL 8

    Assisted Solution

    jigdo is a special system to build and update cd's, it's more meant for dev's or ppl who frequently need new cd's to reduce download sizes.
    I'd suggest you just do a net install and download what you need as you go along
    if you still want woody you go here:
    for a netinstall:
    for a full cd iso set

    if you'd rather go for sarge (the beta new version)
    you go here:
    and download their net installer or businesscard image
    LVL 10

    Accepted Solution

    Hi mustekkzn

    if you need debian for non-production server I suggest download Debian GNU/Linux 3.1 "Sarge" I'm using it now without problems. Do not download all cd's you will need max 2 and then apt-get tool will do the rest. Or download just netinstall iso wich have 110.4 MB and rest of installation will be from internet

    for production server woody best choice is ofcouse woody. Also download just max 2 cd's from link above or do network installation only.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    The purpose of this article is to demonstrate how we can use conditional statements using Python.
    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
    Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now