| DistroWatch Weekly
|DistroWatch Weekly, Issue 732, 2 October 2017
Welcome to this year's 40th issue of DistroWatch Weekly!
A lot of server work these days is handled by virtual environments, either lightweight containers or virtual machines. One operating system which is trying to make working with virtual servers easier is ClonOS. The ClonOS platform is based on FreeBSD and features web-based administrative controls. We explore ClonOS further in our Feature Story. In our News section we discuss reducing the size of Snap packages for GNOME applications, Ubuntu's plans to phase out 32-bit installation media and we cover highlights from FreeBSD's Quarterly Status Report. Our Questions and Answers column this week talks about partitioning disks with ZFS. Plus we share a list of the distributions released last week and provide links for the torrents we are seeding. Our Opinion Poll this week asks how many of our readers feel comfortable running non-free web browsers verses entirely open source browsers. Finally, we are pleased to welcome the BeeFree OS distribution to our database. We wish you all a fantastic week and happy reading!
- Review: Managing virtual environments with ClonOS 12
- News: Reducing Snap size, Ubuntu Desktop to drop 32-bit media, FreeBSD's Quarterly Status Report
- Questions and answers: Partitioning disks for ZFS
- Released last week: SparkyLinux 5.1, KNOPPIX 8.1
- Torrent corner: 4MLinux, feren OS, KNOPPIX, Nitrux, Sparky, SystemRescueCd, Tails
- Upcoming releases: FreeBSD 10.4, Fedora 27 Beta
- Opinion poll: Web browsers and non-free DRM
- DistroWatch.com news: Mobile app for getting distro news
- New additions: BeeFree OS
- New distributions: eXtern, Advanced Persistent Security
- Reader comments
Listen to the Podcast edition of this week's DistroWatch Weekly in OGG (23MB) and MP3 (28MB) formats.
|Feature Story (by Jesse Smith)
Managing virtual environments with ClonOS 12
ClonOS is one of the latest operating systems to be entered into the DistroWatch database. The project's website describes ClonOS as follows:
ClonOS is a free, open-source FreeBSD-based platform for virtual environment creation and management.
The operating system uses FreeBSD's development branch (12.0-CURRENT) as its base. ClonOS uses ZFS as the default file system and includes web-based administration tools for managing virtual machines and jails. The project's website also mentions the availability of templates for quickly setting up new containers and web-based VNC access to jails. Puppet, we are told, can be used for configuration management.
ClonOS can be downloaded as a disk image file (IMG) or as an optical media image (ISO). I downloaded the ISO file which is 1.6GB in size. Booting from ClonOS's media displays a text console asking us to select the type of text terminal we are using. There are four options and most people can probably safely take the default, xterm, option.
The ClonOS installer then launches. The installer presents us with simple text menus were we are tasked with configuring our network interface (providing an IP address and Internet gateway), selecting which hard drive should be used to install ClonOS and creating administrator passwords. We are asked to come up with two passwords, one for the operating system's root account and one for accessing the web-based control panel. As I found out later, it does not matter what passwords we provide during the installation. With these three sets of questions answered, the installer copies its files to our hard drive, taking over the entire disk. We are then prompted to restart the computer to begin using our new copy of ClonOS.
When the freshly installed copy of ClonOS boots, it brings us to a text console and automatically signs us in as the root user. If we log out of the command line interface, ClonOS automatically logs us back in. Presumably, it is assumed the ClonOS server will be kept in a locked room to protect the operating system from people walking by the terminal.
The operating system, on the surface, appears to be a full installation of FreeBSD 12. The usual collection of FreeBSD packages are available, including manual pages, a compiler and the typical selection of UNIX command line utilities. The operating system uses ZFS as its file system and uses approximately 3.3GB of disk space. ClonOS requires about 50MB of active memory and 143MB of wired memory before any services or jails are created.
ClonOS 12 -- Checking the task logs
(full image size: 88kB, resolution: 1240x1004 pixels)
Web-based control panel
Most of the key features of ClonOS, the parts which set it apart from vanilla FreeBSD, can be accessed through a web-based control panel. When we connect to this control panel, over a plain HTTP connection, using our web browser, we are not prompted for an account name or password.
The web-based interface has a straight forward layout. Down the left side of the browser window we find categories of options and controls. Over on the right side of the window are the specific options or controls available in the selected category. At the top of the page there is a drop-down menu where we can toggle the displayed language between English and Russian, with English being the default.
ClonOS 12 -- Browsing jail templates
(full image size: 201kB, resolution: 1240x1004 pixels)
There are twelve option screens we can access in the ClonOS interface and I want to quickly give a summary of each one:
- Overview - this page shows a top-level status summary. The page lists the number of jails and nodes in the system. We are also shown the number of available CPU cores and available RAM on the system.
- Jail containers - this page allows us to create and delete jails. We can also change some basic jail settings on this page, adjusting the network configuration and hostname. Plus we can click a button to open a VNC window that allows us to access the jail's command line interface.
- Template for jails - provides a list of available jail templates. Each template is listed with its name and a brief description. For example, we have a Wordpress template and a bittorrent template. We can click a listed template to create a new jail with a vanilla installation of the selected software included. We cannot download or create new templates from this page.
- Bhyve VMs - this page is very much like the Jails containers page, but concerns the creation of new virtual machines and managing them.
- Virtual Private Network - allows for the management of subnets
- Authkeys - upload security keys for something, but it is not clear for what these keys will be used.
- Storage media - upload ISO files that will be used when creating virtual machines and installing an operating system in the new virtual environment.
- FreeBSD Bases - I think this page downloads and builds source code for alternative versions of FreeBSD, but I am unsure and could not find any associated documentation for this page.
- FreeBSD Sources - download source code for various versions of FreeBSD.
- TaskLog - browse logs of events, particularly actions concerning jails.
- SQLite admin - this page says it will open an interface for managing a SQLite database. Clicking link on the page gives a file not found error.
- Settings - this page simply displays a message saying the settings page has not been implemented yet.
While playing with ClonOS, I wanted to perform a couple of simple tasks. I wanted to use the Wordpress template to set up a blog inside a jail. I wanted a generic, empty jail in which I could play and run commands without harming the rest of the operating system. I also wanted to try installing an operating system other than FreeBSD inside a Bhyve virtual environment. I thought this would give me a pretty good idea of how quick and easy ClonOS would make common tasks.
First, I tried to create a Wordpress jail using the provided template. Clicking the Wordpress template brings up a screen where we are asked to provide some configuration details. Basically, we are given the chance to select passwords for the blogging software's database and administrator login. We are then taken to the jails management page where we can see our new Wordpress instance being created. The set up process just takes a minute and then the jail automatically launches.
ClonOS 12 -- The VNC console for accessing jails
(full image size: 116kB, resolution: 1240x1004 pixels)
On the surface, it looks like nothing happens as the jail runs silently in the background. We can click the VNC icon on the jail management screen to open a terminal window inside the Wordpress jail. The first hurdle I ran into was the jail was not connected to the network. I tried to bring the jail's network on-line, but kept running into “permission denied” errors. I later found jails are created in what is essentially read-only mode and deactivating this made it possible to adjust jail settings. At that point I could get on-line, but network options had to be set manually; the DHCP client software failed to acquire an address from the network.
I ran into a similar problem when I set up a generic, empty jail. The jail itself was created successfully, but it was unable to connect automatically to the network. This resulted in some fiddling to try to get the jail on-line. I have run into this issue before and it seems to be a problem with certain specific jail managers. Some jail management tools set up networking that functions automatically, while others leave us to tweak the jail manually to get a working network connection.
One last problem I ran into with jails was I had set both jails to automatically start when ClonOS booted. Despite this setting being selected, neither jail would start when the host operating system came on-line. Each jail had to be started manually.
The final task I had set for myself was to install an operating system on ClonOS using the Bhyve virtual machine manager. To make things easy on myself, I decided to install OpenBSD, which is a relatively small download of 209MB and OpenBSD has a simple system installer. I downloaded the ISO to my workstation and then tried to upload it to ClonOS using the storage management panel. The upload failed and I was shown an error saying the file I was uploading was too large. Since OpenBSD has one of the smaller ISO files available (apart from niche systems like Tiny Core Linux and a few net-install options) this limitation rules out most open source server platforms I might wish to install. This meant I didn't get to test Bhyve as most ISO files I could download would not get by ClonOS's upload size limitation.
ClonOS 12 -- Trying to upload an ISO file
(full image size: 84kB, resolution: 1240x1004 pixels)
One set of features I felt was missing from the ClonOS control panel were methods for managing the underlying operating system. I found no button for rebooting the computer, checking for software updates or checking process information. We can turn to the local terminal and its command line for these features if need be. During my trial there were 753 software updates available for ClonOS's FreeBSD base system and these updates totaled 657MB in size. The updates installed cleanly using FreeBSD's pkg command line package manager and the system continued to work the same way once package update had been installed.
ClonOS appears to be in its early stages of development, more of a feature preview or proof-of-concept than a polished product. A few of the settings pages have not been finished yet, the web-based controls for jails are unable to create jails that connect to the network and I was unable to upload even small ISO files to create virtual machines.
The project's website mentions working with Puppet to handle system configuration, but I did not encounter any Puppet options. There also does not appear to be any documentation on using Puppet on the ClonOS platform.
One of the biggest concerns I had was the lack of security on ClonOS. The web-based control panel and terminal both automatically login as the root user. Passwords we create for our accounts are ignored and we cannot logout of the local terminal. This means anyone with physical access to the server automatically gains root access and, in addition, anyone on our local network gets access to the web-based admin panel. As it stands, it would not be safe to install ClonOS on a shared network.
Some of the ideas present are good ones. I like the idea of jail templates and have used them on other systems. The graphical Bhyve tools could be useful too, if the limitations of the ISO manager are sorted out. But right now, ClonOS still has a way to go before it is likely to be safe or practical to use.
* * * * *
Visitor supplied rating
ClonOS has a visitor supplied average rating of: N/A from 0 review(s).
Have you used ClonOS? You can leave your own review of the project on our ratings page.
|Miscellaneous News (by Jesse Smith)
Reducing Snap size, Ubuntu Desktop to drop 32-bit media, FreeBSD's Quarterly Status Report
Snaps are software packages which can be installed and run on any Linux distribution which supports the Snap software. The Snap packages are portable and bundle their dependencies, which reduces reliance on the operating system's default libraries. Bundling dependencies can make Snap packages quite large, but this may be changing for packaged GNOME applications. Experimenting at the Ubuntu Rally has reduced Snap packages down to less than 20% of their original size. "At Ubuntu Rally we put Snaps on a snapdiet. GNOME Calculator Snap is down from 17.4MiB to 1.6MiB. gedit is down from 26.3MiB to 3.3MiB." This will make downloading and installing new Snap packages faster and reduce disk space requirements.
With the release of Ubuntu 17.10 coming up in a few weeks it looks as though one significant change will be the removal of 32-bit installation media for Ubuntu's Desktop edition. John Ledkov wrote on the Ubuntu Release mailing list: "Please action the below and remove Ubuntu Desktop i386 daily-live
images from the release manifest for Beta and Final milestones of
17.10 and therefore do not ship ubuntu-desktop-i386.iso artifact for
17.10. As a follow-up to this thread it has been confirmed that argumentation
below is sound, and furthermore there is no longer any effective QA or
testing of the desktop product on actual i386 hardware (explicitly non
* * * * *
The FreeBSD project has released their latest Quarterly Status Report detailing recent updates and improvements to the venerable operating system. New changes coming to FreeBSD include using the LLVM linker more, slowly replacing the previously used GNU tools. The GNOME and KDE ports on FreeBSD are also getting some important updates: "After the X.Org and GNOME ports teams, the KDE on FreeBSD team has moved its development repository to GitHub. This should make it easier for others to collaborate with us via pull requests, and by basing all our changes on top of the official ports tree we also hope this reduces the amount of conflicts and churn we need to deal with when landing big updates across the tree. We would like to thank iXsystems for hosting and supporting our area51 Subversion repository for many years. FreeBSD has finally joined KDE's CI (Continuous Integration) system as a tier-1 platform. KDE CI builds all the KDE sources - 70 frameworks, the KDE Plasma Desktop and a plethora of KDE Applications - continuously, straight from KDE's git repositories. There is strong commitment from upstream and the downstream KDE-FreeBSD team to reduce the amount of patching in the KDE ports to as little as possible."
* * * * *
These and other news stories can be found on our Headlines page.
|Questions and Answers (by Jesse Smith)
Partitioning disks for ZFS
Exploring-a-new-file-system asks: I have heard of the benefits to using ZFS and I want to put a ZFS partition on my disk. How do I format a partition for ZFS on Linux? There isn't an option for ZFS when I use GParted.
DistroWatch answers: One of the convenient characteristics of ZFS is the file system does not require you to format the partition or device where the file system will reside. When creating a ZFS storage pool, the zpool command will accept the name of any storage device, partition or even file and automatically take care of the low-level details for you, including formatting.
Should you find yourself using a partition manager that insists you format your partition with a file system, feel free to format the disk with any popular file system you like, such as FAT or ext4. When you instruct ZFS to take over the partition, ZFS will adjust the partition to suit its needs.
Once you have initialized the ZFS pool, assigning it the partitions or disks you want to use, you do not need to add ZFS entries to the operating system's fstab like you would with other file systems. ZFS automatically seeks out and mounts ZFS volumes for you when the operating system boots.
Before you get started using ZFS, I recommend reading a quick overview of its features. The FreeBSD Handbook has a great section on ZFS. Though the device names used in the guide are specific to FreeBSD, the ZFS commands shown use the same syntax and keywords across operating systems, so the same instructions will work on Linux and Solaris.
* * * * *
More answers can be found in our Questions and Answers archive.
|Released Last Week
SparkyLinux is a Debian-based lightweight and fast Linux distribution designed to run on both old and new computers. The project's latest release, SparkyLinux 5.1, is based on Debian's Testing branch, codename Buster and offers a rolling release upgrade path. "Changes between version 5.0 and 5.1: full system upgrade from Debian testing repos as of September 25, 2017; Linux kernel 4.12.13 as default (4.13.3-sparky is available in Sparky 'unstable' repo); gcc 6 removed from the live media, the default compiler is gcc 7; - obmenu-generator updated up to version 0.80 (MinmalGUI edition), what speeded up launching the menu with SVG icons; the default system installer Calamares updated up to version 3.1.4; added new tool for installing a web browser: Sparky Web Browser Installer; new desktop environment added to Sparky repos: Manokwari; live system's memtest86+ issue has been fixed." Further information can be found in the project's release announcement.
Klaus Knopper has announced the release of KNOPPIX 8.1, the latest stable version from he project that pioneered the concept of an easy-to-use Linux live CD with complete hardware support. This release comes with LXDE (default desktop), KDE Plasma 5.8 and GNOME 3.24: "Version 8.1 of KNOPPIX is based on the usual picks from Debian stable (Stretch), testing (Buster) and unstable (Sid) for newer graphics drivers or desktop software packages. It uses Linux kernel 4.12.7 and X.Org 7.7 (Core 1.19.3) for supporting current computer hardware. New in 8.1: BFQ (Budget Fair Queue) scheduler, now included in the standard kernel within the multi-path scheduler, automatically activated for slow disks, kernel and system software (Debian Stretch + Buster) updated; LibreOffice 5.4.1, GIMP 2.8.20; Chromium 60.0.3112.78 and Firefox 55 web browser with Ublock Origin and NoScript security plugin; automatic expansion of overlay partition on USB flash without reboot after 1:1 copy of ISO hybrid image on USB flash...." Continue to the detailed release notes for a full list of changes.
KNOPPIX 8.1 -- Running the LXDE desktop
(full image size: 1.2MB, resolution: 1280x1024 pixels)
Version 3.2 of Tails (The Amnesic Incognito Live System), a Debian-based live DVD/USB with the goal of providing complete Internet anonymity for the user, has been released. This is mostly a security update, although it also comes with some component upgrades, including Linux kernel 4.12: "Tails 3.2 is out. This release fixes many security issues and users should upgrade as soon as possible. New features: we added support for PPPoE and dial-up Internet connections, please tell us if this still doesn't work for you; we installed BookletImposer to convert linear PDF documents into booklets and vice-versa; we added GNOME Screen Keyboard to replace Florence, the previous virtual keyboard, which had many issues. Upgrades and changes: upgraded Linux to 4.12.12, this should improve the support for newer hardware, especially NVIDIA Maxwell graphics card; upgraded Thunderbird from 45.8 to 52.3. This version requires an 8 GB USB stick to install Tails, any 4 GB USB sticks that are already installed can still be upgraded." Read the rest of the release announcement for further information, screenshots and known issues.
* * * * *
Development, unannounced and minor bug-fix releases
The table below provides a list of torrents DistroWatch is currently seeding. If you do not have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found in our Torrent Archive. We also maintain a Torrents RSS feed for people who wish to have open source torrents delivered to them. To share your own open source torrents of Linux and BSD projects, please visit our Upload Torrents page.
Torrent Corner statistics:
- Total torrents seeded: 586
- Total data uploaded: 15.8TB
|Upcoming Releases and Announcements
Summary of expected upcoming releases
Web browsers and non-free DRM
Last week we discussed the W3C declaring non-free DRM would become a web standard to allow compliant browsers to play DRM-protected media content. The new standard will require web browsers to include non-free modules in their code, posing a dilemma for free and open source web browsers.
We would like to find out how our readers feel about their web browsers including non-free code. Would you use a browser with non-free modules, do you require that your browser be entirely open source? Let us know your thoughts in the comments.
You can see the results of our previous poll on open source desktops running on mobile devices in last week's edition. All previous poll results can be found in our poll archives.
Web browsers and non-free DRM
|I already use a non-free browser: ||448 (26%)|
| I will use non-free browsers: ||207 (12%)|
| I will not use non-free browsers: ||721 (42%)|
| Unsure/Other: ||334 (20%)|
Mobile app for getting distro news
For a while now DistroWatch has had a mobile-friendly website. This allows people with smaller screens to check up on the latest news, events and our Weekly newsletter.
Last week Md. Emran Hossain published an Android app which enables Android users to use a streamlined app to check on the latest distribution releases, new open source package versions and news Headlines. The app is still in its early stages and is intended to give our readers quick access to new developments while they are on the go, it's not designed to be a full replacement for the mobile edition of our website.
The Android app is called LinTree and is currently available through Google Play. If you like the app, please send feedback to its author. Md. Emran Hossain has generously offered to share any proceeds from the app with the DistroWatch team to help us keep this site running.
* * * * * *
New projects added to database
BeeFree OS is a Linux distribution based on Linux Mint. BeeFree OS features the Cinnamon desktop environment, a Unity theme and an application menu which resembles the Windows 7 Start menu. BeeFree OS features the BeeBEEP secure LAN instant messaging software and the ability to install portable, off-line applications from the CenterFree.cf store.
BeeFree OS 18.1.2 -- Running the Cinnamon desktop
(full image size: 790kB, resolution: resolution: 1280x1024 pixels)
* * * * *
Distributions added to waiting list
- EterTICs GNU/Linux. EterTICs GNU/Linux is a libre distribution for radio stations in Latin America. It is based on Devuan.
- Advanced Persistent Security. Advanced Persistent Security is a Linux distribution designed for secure and anonymous web browsing.
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 9 October 2017. Past articles and reviews can be found through our Article Search page. To contact the authors please send e-mail to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews/submissions, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, donations, comments)
- Bruce Patterson (podcast)
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip.
(Tips this week: 1, value: US$10.00)
|Linux Foundation Training
|• Issue 746 (2018-01-15): deepin 15.5, openSUSE's YaST improvements, new Ubuntu 17.10 media, details on Spectre and Meltdown bugs|
|• Issue 745 (2018-01-08): GhostBSD 11.1, Linspire and Freespire return, wide-spread CPU bugs patched, adding AppImage launchers to the application menu|
|• Issue 744 (2018-01-01): MX Linux 17, Ubuntu pulls media over BIOS bug, PureOS gets endorsed by the FSF, openSUSE plays with kernel boot splash screens|
|• Issue 743 (2017-12-18): Daphile 17.09, tools for rescuing files, Fedora Modular Server delayed, Sparky adds ARM support, Slax to better support wireless networking|
|• Issue 742 (2017-12-11): heads 0.3.1, improvements coming to Tails, Void tutorials, Ubuntu phasing out Python 2, manipulating images from the command line|
|• Issue 741 (2017-12-04): Pop!_OS 17.10, openSUSE Tumbleweed snapshots, installing Q4OS on a Windows partition, using the at command|
|• Issue 740 (2017-11-27): Artix Linux, Unity spin of Ubuntu, Nitrux swaps Snaps for AppImage, getting better battery life on Linux|
|• Issue 739 (2017-11-20): Fedora 27, cross-distro software ports, Ubuntu on Samsung phones, Red Hat supports ARM, Parabola continues 32-bit support|
|• Issue 738 (2017-11-13): SparkyLinux 5.1, rumours about spyware, Slax considers init software, Arch drops 32-bit packages, overview of LineageOS|
|• Issue 737 (2017-11-06): BeeFree OS 18.1.2, quick tips to fix common problems, Slax returning, Solus plans MATE and software management improvements|
|• Issue 736 (2017-10-30): Ubuntu 17.10, "what if" security questions, Linux Mint to support Flatpak, NetBSD kernel memory protection|
|• Issue 735 (2017-10-23): ArchLabs Minimo, building software with Ravenports, WPA security patch, Parabola creates OpenRC spin|
|• Issue 734 (2017-10-16): Star 1.0.1, running the Linux-libre kernel, Ubuntu MATE experiments with snaps, Debian releases new install media, Purism reaches funding goal|
|• Issue 733 (2017-10-09): KaOS 2017.09, 32-bit prematurely obsoleted, Qubes security features, IPFire updates Apache|
|• Issue 732 (2017-10-02): ClonOS, reducing Snap package size, Ubuntu dropping 32-bit Desktop, partitioning disks for ZFS|
|• Issue 731 (2017-09-25): BackSlash Linux Olaf, W3C adding DRM to web standards, Wayland support arrives in Mir, Debian experimenting with AppArmor|
|• Issue 730 (2017-09-18): Mageia 6, running a completely free OS, HAMMER2 file system in DragonFly BSD's installer, Manjaro to ship pre-installed on laptops|
|• Issue 729 (2017-09-11): Parabola GNU/Linux-libre, running Plex Media Server on a Raspberry Pi, Tails feature roadmap, a cross-platform ports build system|
|• Issue 728 (2017-09-04): Nitrux 1.0.2, SUSE creates new community repository, remote desktop tools for GNOME on Wayland, using Void source packages|
|• Issue 727 (2017-08-28): Cucumber Linux 1.0, using Flatpak vs Snap, GNOME previews Settings panel, SUSE reaffirms commitment to Btrfs|
|• Issue 726 (2017-08-21): Redcore Linux 1706, Solus adds Snap support, KaOS getting hardened kernel, rolling releases and BSD|
|• Issue 725 (2017-08-14): openSUSE 42.3, Debian considers Flatpak for backports, changes coming to Ubuntu 17.10, the state of gaming on Linux|
|• Issue 724 (2017-08-07): SwagArch 2017.06, Myths about Unity, Mir and Ubuntu Touch, Manjaro OpenRC becomes its own distro, Debian debates future of live ISOs|
|• Issue 723 (2017-07-31): UBOS 11, transferring packages between systems, Ubuntu MATE's HUD, GNUstep releases first update in seven years|
|• Issue 722 (2017-07-24): Calculate Linux 17.6, logging sudo usage, Remix OS discontinued, interview with Chris Lamb, Debian 9.1 released|
|• Issue 721 (2017-07-17): Fedora 26, finding source based distributions, installing DragonFly BSD using Orca, Yunit packages ported to Ubuntu 16.04|
|• Issue 720 (2017-07-10): Peppermint OS 8, gathering system information with osquery, new features coming to openSUSE, Tails fixes networking bug|
|• Issue 719 (2017-07-03): Manjaro 17.0.2, tracking ISO files, Ubuntu MATE unveils new features, Qubes tests Admin API, Fedora's Atomic Host gets new life cycle|
|• Issue 718 (2017-06-26): Debian 9, support for older hardware, Debian updates live media, Ubuntu's new networking tool, openSUSE gains MP3 support|
|• Issue 717 (2017-06-19): SharkLinux, combining commands in the shell, Debian 9 flavours released, OpenBSD improving kernel security, UBports releases first OTA update|
|• Issue 716 (2017-06-12): Slackel 7.0, Ubuntu working with GNOME on HiDPI, openSUSE 42.3 using rolling development model, exploring kernel blobs|
|• Issue 715 (2017-06-05): Devuan 1.0.0, answering questions on systemd, Linux Mint plans 18.2 beta, Yunit/Unity 8 ported to Debian|
|• Issue 714 (2017-05-29): Void, enabling Wake-on-LAN, Solus packages KDE, Debian 9 release date, Ubuntu automated bug reports|
|• Issue 713 (2017-05-22): ROSA Fresh R9, Fedora's new networking features, FreeBSD's Quarterly Report, UBports opens app store, Parsix to shut down, SELinux overview|
|• Issue 712 (2017-05-15): NixOS 17.03, Alpha Litebook running elementary OS, Canonical considers going public, Solus improves Bluetooth support|
|• Issue 711 (2017-05-08): 4MLinux 21.0, checking file system fragmentation, new Mint and Haiku features, pfSense roadmap, OpenBSD offers first syspatch updates|
|• Issue 710 (2017-05-01): TrueOS 2017-02-22, Debian ported to RISC-V, Halium to unify mobile GNU/Linux, Anbox runs Android apps on GNU/Linux, using ZFS on the root file system|
|• Issue 709 (2017-04-24): Ubuntu 17.04, Korora testing new software manager, Ubuntu migrates to Wayland, running Nix package manager on alternative distributions|
|• Issue 708 (2017-04-17): Maui Linux 17.03, Snaps run on Fedora, Void adopts Flatpak, running Android apps on GNU/Linux, Debian elects Project Leader|
|• Issue 707 (2017-04-10): PCLinuxOS 2017.03, Canonical stops Unity development, OpenBSD on a Raspberry Pi, setting up a VPN for privacy|
|• Issue 706 (2017-04-03): Super Grub2 Disk, Snap packages of deepin applications, Subgraph OS routes network traffic for one application, announcements from Linux Mint|
|• Issue 705 (2017-03-27): Minimal Linux Live, sharing control of the operating system, new KaOS features, Uplos32 provides 32-bit fork of PCLinuxOS|
|• Issue 704 (2017-03-20): ToarusOS 1.0.4, Linux Mint's security record, Debian starts Project Leader election, Ubuntu 12.04 reaches end-of-life|
|• Issue 703 (2017-03-13): SolydXK 201701, CloudReady, Solus announces new features, KDE Connect sends text messages from desktop, openSUSE's YaST module for Let's Encrypt|
|• Issue 702 (2017-03-06): Fatdog64 Linux, elementary OS bundled with new netbook, Haiku announces new features, security and the size of a distro's development team|
|• Issue 701 (2017-02-27): OBRevenge 2017.02, Mageia 6 delays, NetBSD reproducible builds, questions about swap space, trying to steam video on a Raspberry Pi|
|• Issue 700 (2017-02-20): RaspBSD, Debian replaces Icedove with Thunderbird, Fedora's licensing guidlines, tips for switching shells, finding battery charge, getting IP address and killing processes|
|• Issue 699 (2017-02-13): Clear Linux, GhostBSD network utility ported to FreeBSD, Ubuntu coming to Fairphone, elementary OS crowd funding an app store|
|• Issue 698 (2017-02-06): Solus 2017.01.01, comparing containers with portable applicatins, Tails dropping 32-bit support, Debian Stretch enters freeze|
|• Issue 697 (2017-01-30): Subgraph OS 2016.12.30, running Ubuntu on an Android phone, Arch Linux phasing out 32-bit support, Linux Mint testing updated LMDE media|
|• Issue 696 (2017-01-23): GoboLinux 016, remotely running desktop applications, Solus adopting Flatpak, KDE neon using Calamares, TrueOS tests OpenRC|
|• Issue 695 (2017-01-16): Zorin OS 12, Peppermint team fixes installer bug, Debian refreshes Jessie media, Ubuntu improves low graphics mode, Exciting things coming in 2017|
|• Full list of all issues|
|Random Distribution |
Voodoo Linux employs a customized version of the Red Hat Anaconda installer with enhanced hardware support and the Ext3 Journaling file system. Our focus has been to implement our own Windows(r) API layer, to seamlessly use Windows(r) based applications. We understand that the majority of new Linux users have investments in such applications and to make the switch to Linux easier we have come up with a working way to get this done. So don't give away your Windows software just yet!