| DistroWatch Weekly
|DistroWatch Weekly, Issue 767, 11 June 2018
Welcome to this year's 24th issue of DistroWatch Weekly!
Passing information between computers, whether it is downloading files, viewing web pages or streaming video, is a big part of modern computing. There are a lot of tools for transferring files between computers, but few are as flexible as OpenSSH. This week we share tips on copying files and using pipes with OpenSSH's secure shell. Android is typically used as a mobile operating system, but ports of it can be run on x86 workstations and laptops. This week we begin with a look at Android-x86 and report on how it runs on a laptop computer. Plus we link to a tutorial on getting Debian-style package management on Linux From Scratch and report on TrueOS's new plans. We also share stories about how OpenMediaVault and pfSense are reacting to Europe's GDPR rules, and ArchLabs leaving GitHub. This week we also celebrate Haiku getting a port of LibreOffice working. Plus we share the releases of the past week and provide a list of the torrents we are seeding. Speaking of torrents, we have made some improvements to our Torrent Archive page and the details can be found below. We wish you all a terrific week and happy reading!
- Review: Android-x86 7.1-r1
- News: Running Linux From Scratch with Debian package management, TrueOS changes course, OpenMediaVault and pfSense react to GDPR, ArchLabs leaves GitHub, Haiku ports LibreOffice
- Tips and tricks: OpenSSH, pipes and file transfers
- Released last week: Devuan 2.0.0, GeckoLinux 150
- Torrent corner: Archman, AUSTRUMI, Berry, Clonezilla, Devuan, Gecko, Live Raizo, Omarine, PCLinuxOS, SmartOS, Tails
- Opinion poll: Running Android on a desktop/laptop computer
- DistroWatch.com news: Navigating to a distribution's page from our Torrent Archive
- New distributions: Olu, Quick-Save-Live
- Reader comments
|Feature Story (by Jesse Smith)
Android-x86 is a port of the Android operating system for 32-bit and 64-bit x86 computers. In theory, Android-x86 make it possible to run the same Android operating system on a workstation or laptop computer as we might run on our phone. Android uses a version of the Linux kernel, much like GNU/Linux operating systems, but features different userland utilities and a different graphical user interface.
The latest release of Android-x86 (hereafter simply referred to as Android) is version 7.1-r1 which is available as a 809MB download. I grabbed a copy of this release in order to give it a test run in a VirtualBox virtual machine and on my laptop. When booting from the Android media, a boot menu is displayed, offering us the chance to try a live environment or install the operating system. My experiment with VirtualBox got off to a rocky start as Android failed to launch the live graphical environment. Sometimes the system would simply reboot when the live desktop option was selected and other times the system would lock up.
Taking the install option from Android's boot menu brought up a text console with a menu-driven interface. The installer asks us to partition the hard drive and tells us we should set up a partition with at least 4GB of disk space, though 8GB is recommended. Disk partitioning is handled by the cfdisk text-based partition manager. Once a partition has been created, we are asked to select a file system (FAT, ext4 and NTFS are supported). We are then asked if we want to install the GRUB boot loader to handle starting the operating system.
When the installer is finished we can restart the computer to try out our fresh copy of Android. Unfortunately, I could not get Android to boot and display a graphical interface in my virtual machine. I was able to get Android to boot in debug mode, but launching the system in debug mode would only get me to a minimal command line interface where I could run a few commands, like ls and top. From the command line I was unable to connect to any networks or launch the desktop environment.
Running Android on my laptop went more smoothly. The operating system was able to run its installer and boot without any tweaking on my part. Launching the new copy of Android the first time walked me through some configuration options. I was given the chance to select my preferred language, connect to a wireless network and optionally sign into a Google account to synchronize settings and contacts. With these steps completed we are presented with Android's desktop interface.
Android-x86 7.1 -- The default desktop
(full image size: 174kB, resolution: 1366x768 pixels)
The Android interface is roughly divided into four parts. There is a notification bar at the top of the screen which we can click to access recent notifications and settings. The bulk of the display is taken up with an empty desktop space where application icons can be placed. Below this empty space is a button that opens an application drawer. When the draw is open it shows us a large grid of icons for installed applications. At the bottom of the display are Android's customary Back, Home and Show Open Windows buttons.
Android-x86 7.1 -- The application drawer
(full image size: 122kB, resolution: 1366x768 pixels)
The interface was responsive on my laptop, but inconsistent in its appearance. Some buttons and icons were large while anything in the notification area was very small. The fonts in most applications are large and easy to read, but text in the settings area was very small. This gives the Android interface an imbalanced look. I found some pieces could be made to look smoother through the settings panel.
On the subject of settings, one issue I struggled with was Android uses inverse vertical scrolling. (Scrolling down takes us up the page, scrolling up moves down a page.) I found this jarring since it's the opposite of how most desktop environments respond.
Android-x86 7.1 -- The settings panel
(full image size: 43kB, resolution: 1366x768 pixels)
Another problem I had with the mouse pointer was items I moved the mouse over often got activated as though I had clicked on them. This resulted in a lot of apps and options being opened by accident. At first I thought this was due to an option which causes the interface to register a click after pointer movement, but this feature was turned off by default. In my case the mouse was just super sensitive.
Another issue which kept coming up was about once a every minute or two, a pop-up would appear, telling me the Play Services program had crashed. This did not appear to affect my tasks or my ability to install applications, but it did constantly interfere with my web browsing and typing.
One of my key concerns when I run Android on a desktop x86 computer instead of its native, mobile ARM environment is how well applications will run. The good news was I found that most programs included with Android (the photo gallery, application store, settings panel and so on) worked. Using them was sometimes awkward as they are designed to be run on small, touch-enabled displays. Attempting to navigate these apps with a mouse and keyboard is awkward at best.
Android-x86 7.1 -- Browsing the web with Chrome
(full image size: 549kB, resolution: 1366x768 pixels)
Trying to download and run additional software gave mixed results. Some programs worked as expected, others would crash at start-up. There does not appear to be any way to easily identify which programs will work and which will not, other than downloading and trying them.
One example of struggling with Android's software came about when I tried to watch Netflix. The Chrome browser which ships with Android worked really well for most things. I could browse websites, watch YouTube videos and check e-mail with it. But when signing into Netflix, any attempt to watch videos in the browser brought up a page telling me I had to use the Android app to watch Netflix. The Netflix app could be installed, but failed to launch, effectively blocking access to the streaming platform.
Android-x86 7.1 -- Installing an app from the Play store
(full image size: 243kB, resolution: 1366x768 pixels)
Android ships with a terminal application for those of us who like to work from the command line. Many common UNIX utilities are included, making it easy to browse directories, monitor processes and manipulate files. One problem I ran into though was I could not get the secure copy (scp) and secure file transfer (sftp) programs to work. The former would always exit with an error saying “-x” was not a valid parameter (the -x flag was not being used). The latter program would not give any meaningful error, just exit. However, the secure shell (ssh) program did work and allowed me to login and manage remote machines. This left me in the weird position of performing file transfers through a pipe over secure shell rather than using the typical scp and sftp programs.
Android-x86 7.1 -- Monitoring processes from the terminal
(full image size: 154kB, resolution: 1366x768 pixels)
Android 7.1 ships with version 4.9.80 of the Linux kernel. This is a relatively modern kernel, not much older than the one I typically run on this laptop for work. However, while recent versions of Linux Mint, Ubuntu and MX Linux have typically provided me with two hours of battery life when listening to music or watching a movie, Android could not provide me with more than 40-50 minutes minutes of battery when browsing the web and adjusting settings. This puts Android at a disadvantage when we are on the go.
Android-x86 is a project which I think is interesting for its goal of getting Android onto more platforms and I can certainly see how it would be appealing for people who want to test Android applications across several types of devices. Unfortunately, Android is geared toward small, mobile devices and its interface, controls, applications and hardware support just do not translate well to larger personal computers. To me, trying to use Android on a laptop computer feels out of place, much like trying to use a word processor or virtual terminal feels out of place on a small, mobile device. It's possible to use, but not ideal and not entirely practical.
I think the Android-x86 team deserves a great deal of credit for getting Android working as well as it does - the system does boot, run and can launch several applications on my laptop. But the regular notifications of crashes, short battery life and limited number of applications make this operating system unappealing for daily use. I think Android-x86 is a good test platform for trying out Android and its apps on different sized screens and hardware, but it's not great for common desktop tasks.
* * * * *
Hardware used in this review
My physical test equipment for this review was a de-branded HP laptop with the following
- Processor: Intel i3 2.5GHz CPU
- Display: Intel integrated video
- Storage: Western Digital 700GB hard drive
- Memory: 6GB of RAM
- Wired network device: Realtek RTL8101E/RTL8102E PCI Express Fast
- Wireless network device: Realtek RTL8188EE Wireless network card
* * * * *
Visitor supplied rating
Android-x86 has a visitor supplied average rating of: 7.3/10 from 34 review(s).
Have you used Android-x86? You can leave your own review of the project on our ratings page.
|Miscellaneous News (by Jesse Smith)
Running Linux From Scratch with Debian package management, TrueOS changes course, OpenMediaVault and pfSense react to GDPR, ArchLabs leaves GitHub, Haiku ports LibreOffice
Linux From Scratch (LFS) is a project which provides step-by-step instructions for creating a minimal operating system from source code. While LFS can be used to create a small, Linux-based operating system, running LFS is not practical for most users, in part because the operating system lacks a package manager. This means LFS users end up compiling their software and manually handling dependencies. A new project, called Debian From Scratch offers a solution. The Debian From Scratch documentation shows users how to set up Debian's package management tools on a new LFS install, greatly automating software management and future upgrades. "This project intends to be a community resource to help those interested in creating their own custom system from the ground up, while fully taking advantage of the Debian suite of package management, dpkg and apt, in order to solve the problems of package dependency installation and management."
* * * * *
TrueOS is an operating system for desktops and servers based on FreeBSD's development branch. TrueOS uses FreeBSD at its core and is perhaps best known for making it possible to quickly install a FreeBSD-based desktop system. The focus of TrueOS is changing now, with the project forking further from FreeBSD. "TrueOS will become a downstream fork that will build on FreeBSD by integrating new software technologies like OpenRC and LibreSSL. Work has already begun which allows TrueOS to be used as a base platform for other projects, including JSON-based manifests, integrated Poudriere / pkg tools and much more. We're planning on a six month release cycle to keep development moving and fresh, allowing us to bring you hot new features to ZFS, bhyve and related tools in a timely manner. This makes TrueOS the perfect fit to serve as the basis for building other distributions." In the place of TrueOS's desktop edition, the team has reported a separate project, called Project Trident will become available. Further information ca be found in the project's blog post.
* * * * *
Last week we shared a story in which, in an effort to avoid coming into conflict with the European Union's General Data Protection Regulation (GDPR), the Bodhi Linux team shut down their support forum. At the time, Bodhi users were advised they could still get support on social media sites, such as Reddit. This week, OpenMediaVault took similar action, deactivating their Facebook page where users could keep up with announcements and request support. The decision follows a court ruling which states administrators of Facebook pages share responsibility with Facebook in complying with the GDPR. OpenMediaVault continues to maintain a support forum on their website.
* * * * *
On June 4th the popular source repository and development platform GitHub announced they were being purchased by Microsoft. The news was generally not welcomed by open source developers, many of whom feared vendor lock-in or mistreatment from Microsoft. Several projects quickly made plans to move to other web-based development platforms. The ArchLabs team, for example, immediately transitioned to BitBucket. Meanwhile, pfSense moved in the other direction, taking documentation from their wiki and placing it on GitHub's servers. The pfSense announcement lists several reasons for the move, the first one being trying to find a way to comply with the GDPR. "Ultimately, we made the switch because it was the right thing to do. Specifically, there were several reasons for this move, including: GDPR Compliance - We don't have to worry about storing any personal information about contributors and contributors don't have to worry about creating an account with a limited use case (assuming they use their GitHub account for other projects)."
* * * * *
The Haiku team had lots of progress to report in their latest monthly newsletter. There were a number of upgrades to the Haiku build system and more drivers were imported from FreeBSD to provide better hardware support. The most visual change though was the port of the LibreOffice productivity suite to Haiku: "There are still a few caveats and bug fixes still going on; for details see this forum thread. But it is entirely usable for day-to-day work. As of writing, it's already in the x86_64 package repository, and hopefully coming soon to the 32-bit one."
* * * * *
These and other news stories can be found on our Headlines page.
|Tips and Tricks (by Jesse Smith)
OpenSSH, pipes and file transfers
In a few recent articles I have referred using the secure shell (ssh) command with a pipe to transfer data or files from one computer to another. For those not familiar with these two pieces of technology, let's start with a quick overview.
A pipe is a way for two programs to communicate, with one handing data to the other. One program creates a pipe and sends information into the pipe. Another program can then open the pipe and read this same information in the order it was sent. Pipes allow us to string a series of commands together to share and manipulate data. For example, the grep command finds lines matching a pattern in a text file and the sort command rearranges lines in alphabetical order. Using a pipe, we can use grep to find something, like names in an address book, and then use sort to put those names in order. Here is an example of a pipe gathering up the information from a search of an address book and passing the names to the sort command:
grep "Name:" address-book.txt | sort
The OpenSSH secure shell program is typically used to log into a remote computer and interactively run commands on the remote machine. In its simplest form, the secure shell (ssh) command accepts our username and the name of the remote computer we are going to log into and then runs a normal, interactive shell session over the network. Running ssh typically looks like this:
Sometimes, if we just want to run one command on the remote computer and then immediately quit, we can specify the command to run at the end of the line. For example, here we get the amount of time the remote computer has been running using the uptime program:
ssh firstname.lastname@example.org uptime
One very nice feature of ssh is that we can pass information from it through a pipe on our local computer. For example, if the address-book.txt file I mentioned earlier is on the remote computer, we can search through it for names on the remote computer and then sort the results locally. For instance:
ssh email@example.com grep "Name:" address-book.txt | sort
Using pipes we can also run commands locally and then send the output to a file on another computer. Here we get a list of processes running on the local computer using the ps command and then save it in a log file on a remote computer for safe keeping. This works because secure shell passes the piped information from ps to the cat command running on the remote computer. The data is finally dumped into logfile.
ps aux | ssh firstname.lastname@example.org 'cat > logfile'
Note the command we run on the remote computer is placed inside single-quote marks. This separates the command run remotely from what we are doing locally. Without the single-quotes we would end up creating logfile on our local computer.
Apart from passing small pieces of information from local commands to remote commands, the ssh utility can be used to transfer files from one computer to another. Normally, we would use a command like secure copy (scp) to transfer a file from one place to another. However, if we do not have access to scp or we want to do some processing on a file's contents during the transfer, ssh becomes very useful. Here is an example where we perform a straight forward transfer from the local computer to a remote computer, backing up a tar archive:
dd if=archive.tar.gz | ssh email@example.com dd of=backup-archive.tar.gz
In the above example, we use the dd command, which copies data from one location or file to another. Here, the dd command loads archive.tar.gz as its input file (if) and sends the file over a pipe to the remote computer. On the remote machine we use the dd command again to create an output file (of) called backup-archive.tar.gz. This simple copy works, but is more cumbersome than the more commonly used scp version of the same action, which requires just the name of the file to copy and its destination. Using scp, the process would look like this:
scp archive.tar.gz firstname.lastname@example.org:backup-archive.tar.gz
Where using ssh with pipes really shines is when we want to perform an action on data during the transfer. For instance, what if there is a log file on a remote server and we want to compress it and then download a copy of the compressed log, all in one action? We can use pipes on the remote computer to compress a log file using gzip and then pass the compressed file through dd to our local computer. The command looks like this:
ssh email@example.com 'cat /var/log/error.log | gzip | dd ' | dd of=error.log.gz
Once again we see the string of commands on the remote computer is placed in single-quotes to isolate the remote processes from commands performed locally. After the above command runs, we end up with a compressed copy of the error log file.
Some people might look at the above example and wonder why the first instance of the dd command is run without any parameters. It seems somewhat pointless when gzip can compress the data and pass it along to our local computer. The reason for the empty dd command is gzip will refuse to dump compressed data to the console (aka standard output) as it would look terrible. However, gzip will pass compressed data out to another pipe. In the above example, the first dd command is there just to accept the compressed data from one pipe and then pass it along to the next step so that gzip will agree to run in this unusual set up. Once the data comes through the pipe to our local computer, the second dd command writes the compressed information to an output file (of) called error.log.gz.
These are just a few examples of how we can pass information and files from one computer to another using pipes and secure shell. There are lots of other ways to string commands together to get data from one computer to another over secure shell. These methods may look more complicated than using a simple copy command, but it's one way to string programs together to form one big command line rather than breaking data processing and file transfers into separate processes.
* * * * *
More tips can be found in our Tips and Tricks archive.
|Released Last Week
GeckoLinux is a distribution based on openSUSE with a focus on providing a friendly, desktop platform with multimedia codecs out of the box. The project has published two new versions: Static 150 which is based on openSUSE's stable Leap edition, and GeckoLinux Rolling 999 which is based on openSUSE's rolling release Tumbleweed edition. "The GeckoLinux project is pleased to release updated spins of both Rolling and Static editions. GeckoLinux spins are based on the openSUSE distribution, with a focus on polish and out-of-the-box usability on the desktop. A large variety of customized desktop options are available in Static (based on openSUSE Leap) and Rolling (based on openSUSE Tumbleweed) editions. After installation to the hard disk, a GeckoLinux system will continue to receive updates from the openSUSE and Packman infrastructures. An installed system can even be upgraded smoothly to future openSUSE releases while at the same time retaining its unique GeckoLinux configuration." There are several desktop spins and a BareBones minimal spin of each edition. More information on both editions can be found in the release announcements (Static, Rolling).
Devuan GNU+Linux 2.0.0
The "Veteran UNIX Admins" have announced the release of Devuan GNU+Linux 2.0.0, a new stable build from the project that forked Debian in late 2014 to build a systemd-free variant of the popular community distribution. Devuan's second release is based on Debian 9.0 and carries a code name of "ASCII": "We are happy to announce that Devuan GNU+Linux 2.0 ASCII stable is finally available. Devuan 2.0 ASCII runs on several architectures. Installer CD and DVD images, as well as desktop live and minimal live ISO images, are available for i386 and amd64. Ready-to-use images can be downloaded for a number of ARM platforms and SOCs, including Raspberry Pi, BeagleBone, OrangePi, BananaPi, OLinuXino, Cubieboard, Nokia and Motorola mobile phones several Chromebooks, as well as for VirtualBox, QEMU and Vagrant. The Devuan 2.0 ASCII installer ISOs offer a variety of desktop environments including Xfce, KDE, MATE, Cinnamon, LXQt, with others available post-install." Read the release announcement and release notes for full details.
Devuan GNU+Linux 2.0.0 -- Running the Xfce desktop
(full image size: 83kB, resolution: 1280x1024 pixels)
* * * * *
Development, unannounced and minor bug-fix releases
The table below provides a list of torrents DistroWatch is currently seeding. If you do not have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found in our Torrent Archive. We also maintain a Torrents RSS feed for people who wish to have open source torrents delivered to them. To share your own open source torrents of Linux and BSD projects, please visit our Upload Torrents page.
Torrent Corner statistics:
- Total torrents seeded: 889
- Total data uploaded: 20.1TB
|Upcoming Releases and Announcements
Summary of expected upcoming releases
Running Android on a desktop/laptop computer
This week we talked about Android-x86, a port of the Android operating system for consumer desktop and laptop computers. We would like to know what our readers think of running the Android operating system, typically used on phones and tablets, on a laptop or workstation. Would it be helpful to you to have a mobile-style OS running on desktop hardware, or is Android's design unsuited to your workstation habits?
You can see the results of our previous poll on openSUSE's key features in last week's edition. All previous poll results can be found in our poll archives.
Running Android on a desktop/laptop computer
|I like the idea of having Android on my workstation/laptop: ||312 (17%)|
| I prefer a desktop-oriented OS for my workstation/laptop: ||1348 (75%)|
| No strong preference: ||149 (8%)|
Navigating to a distribution's page from our Torrent Archive
For a while now DistroWatch has maintained an archive of distributions' torrents. These torrents are mostly ones we have seeded and shared with the world, but also include torrents other people are seeding on behalf of a distribution. Up until now, the Torrent Archive simply listed the available torrents and the date they were uploaded.
This past week we updated the Torrent Archive page. Now each torrent is listed along with the date it was uploaded, the name of the distribution which provided the media and a link to the distribution's information page. This is intended to make it easier to find more details on a distribution before downloading its torrent. Our system tries to find a distribution match for a torrent based on information in the torrent, which works most of the time, but a few unusually named ISO files or inactive projects may not be recognized.
* * * * *
Distributions added to waiting list
- Olu. Olu is a re-spin of Ubuntu which features the Unity 7 desktop environment in place of GNOME Shell.
- Quick-Save-Live. Quick-Save-Live is a minimal (50MB) live CD with a graphical interface which can be used to rescue files or repair an operating system. It is based on Tiny Core Linux.
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 18 June 2018. Past articles and reviews can be found through our Article Search page. To contact the authors please send e-mail to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews/submissions, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, donations, comments)
- Bruce Patterson (podcast)
|Linux Foundation Training
|• Issue 824 (2019-07-22): Hexagon OS 1.0, Mageia publishes updated media, Fedora unveils Fedora CoreOS, managing disk usage with quotas|
|• Issue 823 (2019-07-15): Debian 10, finding 32-bit packages on a 64-bit system, Will Cooke discusses Ubuntu's desktop, IBM finalizes purchase of Red Hat|
|• Issue 822 (2019-07-08): Mageia 7, running development branches of distros, Mint team considers Snap, UBports to address Google account access|
|• Issue 821 (2019-07-01): OpenMandriva 4.0, Ubuntu's plan for 32-bit packages, Fedora Workstation improvements, DragonFly BSD's smaller kernel memory|
|• Issue 820 (2019-06-24): Clear Linux and Guix System 1.0.1, running Android applications using Anbox, Zorin partners with Star Labs, Red Hat explains networking bug, Ubuntu considers no longer updating 32-bit packages|
|• Issue 819 (2019-06-17): OS108 and Venom, renaming multiple files, checking live USB integrity, working with Fedora's Modularity, Ubuntu replacing Chromium package with snap|
|• Issue 818 (2019-06-10): openSUSE 15.1, improving boot times, FreeBSD's status report, DragonFly BSD reduces install media size|
|• Issue 817 (2019-06-03): Manjaro 18.0.4, Ubuntu Security Podcast, new Linux laptops from Dell and System76, Entroware Apollo|
|• Issue 816 (2019-05-27): Red Hat Enterprise Linux 8.0, creating firewall rules, Antergos shuts down, Matthew Miller answers questions about Fedora|
|• Issue 815 (2019-05-20): Sabayon 19.03, Clear Linux's developer features, Red Hat explains MDS flaws, an overview of mobile distro options|
|• Issue 814 (2019-05-13): Fedora 30, distributions publish Firefox fixes, CentOS publishes roadmap to 8.0, Debian plans to use Wayland by default|
|• Issue 813 (2019-05-06): ROSA R11, MX seeks help with systemd-shim, FreeBSD tests unified package management, interview with Gael Duval|
|• Issue 812 (2019-04-29): Ubuntu MATE 19.04, setting up a SOCKS web proxy, Scientific Linux discontinued, Red Hat takes over Java LTS support|
|• Issue 811 (2019-04-22): Alpine 3.9.2, rsync examples, Ubuntu working on ZFS support, Debian elects new Project Leader, Obarun releases S6 tools|
|• Issue 810 (2019-04-15): SolydXK 201902, Bedrock Linux 0.7.2, Fedora phasing out Python 2, NetBSD gets virtual machine monitor|
|• Issue 809 (2019-04-08): PCLinuxOS 2019.02, installing Falkon and problems with portable packages, Mint offers daily build previews, Ubuntu speeds up Snap packages|
|• Issue 808 (2019-04-01): Solus 4.0, security benefits and drawbacks to using a live distro, Gentoo gets GNOME ports working without systemd, Redox OS update|
|• Issue 807 (2019-03-25): Pardus 17.5, finding out which user changed a file, new Budgie features, a tool for browsing FreeBSD's sysctl values|
|• Issue 806 (2019-03-18): Kubuntu vs KDE neon, Nitrux's znx, notes on Debian's election, SUSE becomes an independent entity|
|• Issue 805 (2019-03-11): EasyOS 1.0, managing background services, Devuan team debates machine ID file, Ubuntu Studio works to remain an Ubuntu Community Edition|
|• Issue 804 (2019-03-04): Condres OS 19.02, securely erasing hard drives, new UBports devices coming in 2019, Devuan to host first conference|
|• Issue 803 (2019-02-25): Septor 2019, preventing windows from stealing focus, NetBSD and Nitrux experiment with virtual machines, pfSense upgrading to FreeBSD 12 base|
|• Issue 802 (2019-02-18): Slontoo 18.07.1, NetBSD tests newer compiler, Fedora packaging Deepin desktop, changes in Ubuntu Studio|
|• Issue 801 (2019-02-11): Project Trident 18.12, the meaning of status symbols in top, FreeBSD Foundation lists ongoing projects, Plasma Mobile team answers questions|
|• Issue 800 (2019-02-04): FreeNAS 11.2, using Ubuntu Studio software as an add-on, Nitrux developing znx, matching operating systems to file systems|
|• Issue 799 (2019-01-28): KaOS 2018.12, Linux Basics For Hackers, Debian 10 enters freeze, Ubuntu publishes new version for IoT devices|
|• Issue 798 (2019-01-21): Sculpt OS 18.09, picking a location for swap space, Solus team plans ahead, Fedora trying to get a better user count|
|• Issue 797 (2019-01-14): Reborn OS 2018.11.28, TinyPaw-Linux 1.3, dealing with processes which make the desktop unresponsive, Debian testing Secure Boot support|
|• Issue 796 (2019-01-07): FreeBSD 12.0, Peppermint releases ISO update, picking the best distro of 2018, roundtable interview with Debian, Fedora and elementary developers|
|• Issue 795 (2018-12-24): Running a Pinebook, interview with Bedrock founder, Alpine being ported to RISC-V, Librem 5 dev-kits shipped|
|• Issue 794 (2018-12-17): Void 20181111, avoiding software bloat, improvements to HAMMER2, getting application overview in GNOME Shell|
|• Issue 793 (2018-12-10): openSUSE Tumbleweed, finding non-free packages, Debian migrates to usrmerge, Hyperbola gets FSF approval|
|• Issue 792 (2018-1203): GhostBSD 18.10, when to use swap space, DragonFly BSD's wireless support, Fedora planning to pause development schedule|
|• Issue 791 (2018-11-26): Haiku R1 Beta1, default passwords on live media, Slax and Kodachi update their media, dual booting DragonFly BSD on EFI|
|• Issue 790 (2018-11-19): NetBSD 8.0, Bash tips and short-cuts, Fedora's networking benchmarked with FreeBSD, Ubuntu 18.04 to get ten years of support|
|• Issue 789 (2018-11-12): Fedora 29 Workstation and Silverblue, Haiku recovering from server outage, Fedora turns 15, Debian publishes updated media|
|• Issue 788 (2018-11-05): Clu Linux Live 6.0, examining RAM consumpion, finding support for older CPUs, more Steam support for running Windows games on Linux, update from Solus team|
|• Issue 787 (2018-10-29): Lubuntu 18.10, limiting application access to specific users, Haiku hardware compatibility list, IBM purchasing Red Hat|
|• Issue 786 (2018-10-22): elementary OS 5.0, why init keeps running, DragonFly BSD enables virtual machine memory resizing, KDE neon plans to drop older base|
|• Issue 785 (2018-10-15): Reborn OS 2018.09, Nitrux 1.0.15, swapping hard drives between computers, feren OS tries KDE spin, power savings coming to Linux|
|• Issue 784 (2018-10-08): Hamara 2.1, improving manual pages, UBports gets VoIP app, Fedora testing power saving feature|
|• Issue 783 (2018-10-01): Quirky 8.6, setting up dual booting with Ubuntu and FreeBSD, Lubuntu switching to LXQt, Mint works on performance improvements|
|• Issue 782 (2018-09-24): Bodhi Linux 5.0.0, Elive 3.0.0, Solus publishes ISO refresh, UBports invites feedback, Linux Torvalds plans temporary vacation|
|• Issue 781 (2018-09-17): Linux Mint 3 "Debian Edition", file systems for SSDs, MX makes installing Flatpaks easier, Arch team answers questions, Mageia reaches EOL|
|• Issue 780 (2018-09-10): Netrunner 2018.08 Rolling, Fedora improves language support, how to customize Kali Linux, finding the right video drivers|
|• Issue 779 (2018-09-03): Redcore 1806, keeping ISO downloads safe from tampering, Lubuntu makes Calamares more flexible, Ubuntu improves GNOME performance|
|• Issue 778 (2018-08-27): GuixSD 0.15.0, ReactOS 0.4.9, Steam supports Windows games on Linux, Haiku plans for beta, merging disk partitions|
|• Issue 777 (2018-08-20): YunoHost 126.96.36.199, limiting process resource usage, converting file systems on Fedora, Debian turns 25, Lubuntu migrating to Wayland|
|• Issue 776 (2018-08-13): NomadBSD 1.1, Maximum storage limits on Linux, openSUSE extends life for 42.3, updates to the Librem 5 phone interface|
|• Issue 775 (2018-08-06): Secure-K OS 18.5, Linux is about choice, Korora tests community spin, elementary OS hires developer, ReactOS boots on Btrfs|
|• Issue 774 (2018-07-30): Ubuntu MATE & Ubuntu Budgie 18.04, upgrading software from source, Lubuntu shifts focus, NetBSD changes support policy|
|• Issue 773 (2018-07-23): Peppermint OS 9, types of security used by different projects, Mint reacts to bugs in core packages, Slackware turns 25|
|• Full list of all issues|
Star Labs - Laptops built for Linux.
View our range including the Star Lite, Star LabTop and more. Available with a choice of Ubuntu or Linux Mint pre-installed with many more distributions supported. Visit Star Labs for information, to buy and get support.
|Random Distribution |
Damn Vulnerable Linux
Damn Vulnerable Linux (DVL) was a Slackware and Slax-based live DVD. The distribution, purposefully stuffed with broken, ill-configured, outdated and exploitable software, began life as a training system used during the author's university lectures. Its primary goal was to design a Linux system that was as vulnerable as possible -- in order to teach and demonstrate a variety of security topics, including reverse code engineering, buffer overflows, shell code development, web exploitation, and SQL injection.