| DistroWatch Weekly
|DistroWatch Weekly, Issue 775, 6 August 2018
Welcome to this year's 32nd issue of DistroWatch Weekly!
The wide range of open source operating systems offers a great deal of variety and flexibility in the way we can use our computers. Linux distributions can be designed to be ultra stable, portable, fast or customizable. This week we look at some of the flexibility which can be achieved through open source platforms. We begin with a look at Secure-K OS, a Linux distribution which is designed to be run from a USB thumb drive to provide portable, secure on-line communication. In our Opinion Poll we ask if our readers use portable, live operating systems like Secure-K and Puppy Linux. Then, in our News section, we discuss a Korora community member stepping forward to provide a spin of the dormant, Fedora-based distribution running the Xfce desktop. Plus we cover elementary OS hiring a full-time contributor and ReactOS gaining the ability to boot from Btrfs storage volumes. Our second article this week discusses whether Linux is "about choice" and, if so, what that means for its users. Plus we are happy to share the new releases of the past week and list the torrents we are seeding. Finally, we are pleased to welcome the YunoHost distribution to our database. We wish you all a fantastic week and happy reading!
- Review: Secure-K OS 18.5
- News: Korora tests community spin, elementary OS hires developer, ReactOS boots from Btrfs
- Opinion: Linux is about choice
- Released last week: IPFire 2.21 Core 122, OPNsense 18.7, Ubuntu 16.04.5
- Torrent corner: KDE neon, Kubuntu, Lubuntu, Netrunner, Pinguy, Runtu, SwagArch, Ubuntu, Ubuntu GNOME, Ubuntu Kylin, Ubuntu MATE, Xubuntu
- Opinion poll: Portable operating system on a thumb drive
- New additions: YunoHost
- Reader comments
|Feature Story (by Jesse Smith)
Secure-K OS 18.5
Secure-K OS is a Debian-based distribution which runs from a live USB. The distribution is designed to provide secure communication and anonymous web browsing using applications such as the Tox messaging client and Tor Web Browser. Secure-K features the GNOME Shell desktop environment and is developed by the Mon-K organization.
The Secure-K distribution is available in three editions: Enterprise, Personal and Lite. The first two are commercial offerings while Lite is free to download and try. I decided to experiment with the Lite flavour which is available as a 7.3GB image file that can be written to a USB thumb drive.
The first time we boot from the Secure-K USB drive the system brings up a graphical screen and walks us through a few configuration steps. We are asked to provide our time zone, create a username and password for ourselves and accept the project's license agreement. The license is mostly standard material, though I did note it includes a section on information Secure-K will send to its developers, including hardware, kernel and time zone information. The password we set for ourselves must be long and complex, otherwise the configuration wizard will not proceed. I would have liked if there was an override option to allow simple passwords as the first four or five I tried were not deemed good enough.
When the first-run wizard is finished, we are presented with a lightly modified GNOME Shell desktop. GNOME is set up with two panels (at the top and bottom of the screen). This gives us the Activities menu and system tray at the top of the screen, along with an icon that offers quick access to the file manager. At the bottom of the screen are icons for opening the application menu and launching secure communication tools, like the Tor Web Browser and the Evolution e-mail client. I will come back to these tools later.
Secure-K OS 18.5 -- The welcome window
(full image size: 572kB, resolution: 1366x768 pixels)
Once the desktop loads a welcome window opens. The welcome screen mentions some extra features which are available through the Personal edition of the distribution and displays links to a tutorial and on-line documentation. I found the documentation to be brief and mostly dealing with how to set up the operating system, but I found little on how to use Secure-K once it is set up.
I tried running the desktop tutorial. It started off well by labelling elements of the desktop and prompting me to click on an element to learn more about it. Clicking on the labels caused the tutorial to lock up and crash the welcome window.
While the first time we launch Secure-K it guides us through a first-run wizard, future boots present us with a graphical login screen. The operating system remembers our settings, username and password. While the persistent storage may be less secure than a read-only live distribution, having the system remember our settings does makes work more convenient.
Secure-K ships with a fairly standard collection of open source applications. The distribution includes Firefox, the Chromium web browser, LibreOffice 5 and the Evolution e-mail application. The KeePass password manager is available along with the Rhythmbox music player and the VLC media player. The application menu features a PDF document viewer, an image viewer and the Pidgin instant messaging software. In the background we find the systemd init software and version 4.14 of the Linux kernel.
Secure-K OS 18.5 -- The application menu
(full image size: 386kB, resolution: 1366x768 pixels)
Secure-K ships with a handful of tools for securely or anonymously communicating over the Internet. One of these tools is an e-mail key manager. When we first run the key manager, it asks us to provide us with our name and e-mail address. Once this information is entered, we are told keys have been generated and synchronized with a remote server. The key manager then reports we will receive an e-mail with more information. I never did receive an e-mail concerning my security keys or Secure-K account.
Another utility included in Secure-K is DigitalArx. This application opens and asks us to accept a license agreement which looks to be very similar to the one we agree to during the initial configuration of the operating system. We are then asked to sign into our account with a username and password. At first I was not sure what account DigitalArx was talking about, or what the application is designed to do. According to the project's wiki it seems DigitalArx provides on-line storage, if we have an account. I did not sign up for an account and cannot comment on how well DigitalArx works.
The distribution features the Tor Web Browser. While Firefox and Chromium connect directly with the Internet and provide fast connection speeds, the Tor browser routes connections through the slower (but theoretically anonymous) Tor network. The Tor browser worked well for me, it is basically Firefox with automatic integration with Tor which is a good combination, in my opinion. My only concern with it was, when the Tor browser opens, it reports the browser is out of date. The Tor browser will offer to update itself, but the update process fails with the browser reporting it is unable to verify the package it downloads.
Secure-K OS 18.5 -- The Tor browser
(full image size: 186kB, resolution: 1366x768 pixels)
One package I was hoping to find and did not was a meta data remover. Some other security-oriented distributions, such as Tails, make it easy to remove meta data from images and documents. As far as I could tell, Secure-K does not have a similar tool.
After using Secure-K for a while it occurred to me I had not received any notification about software updates being available. This was slightly concerning considering the Tor browser had already told me it was out of date. Looking through the application menu I found Secure-K ships with GNOME Software for installing and upgrading applications. GNOME Software is a friendly, modern software centre and it makes browsing categories of desktop programs easy.
GNOME Software includes a tab for listing updates. This tab showed no available updates, even after I clicked the software centre's refresh button.
My next step was to switch to a terminal and use the APT command line tools to check for new packages. This check failed as I did not have administrator access. I then also discovered my user account did not have sudo access. To make matters worse, I did not get to set a root password during the initial system configuration and the root account was protected.
Secure-K OS 18.5 -- Trying to run sudo
(full image size: 178kB, resolution: 1366x768 pixels)
I searched the Secure-K documentation for mentions of passwords, sudo, the root account and software updates and found no relevant information. This further concerned me as it seems there is no way to upgrade existing packages, install new applications, or mount local drives.
If I had been able to get the APT tools working, I would have been pulling most software from Debian's Stable repositories. There are also two non-standard repositories: a Java PPA and a repository of Secure-K software.
I tried running Secure-K on my laptop and found the distribution worked well on the hardware. Secure-K automatically detected my wireless card and set screen resolution to its maximum level. Audio worked, though the volume was muted by default. The GNOME desktop worked well with my laptop, offering a fairly responsive environment.
My one concern relating to hardware was how quickly Secure-K drained my laptop's battery. Typically this (ageing) laptop provides me with around two hours of battery, enough to stream a movie on Netflix. Secure-K drained about 40% of the battery in 15 minutes from just signing in, opening a few programs and looking up information in the project's wiki. After that, battery usage slowed down a little, but I still struggled to get a full hour out of use out of the distribution.
Secure-K used about 500MB of RAM when signed into GNOME Shell. The distribution is not designed to be run from a hard drive, instead working off a USB thumb drive. The distribution requires a USB stick that is 8GB or larger in size.
Secure-K OS 18.5 -- Links to support resources
(full image size: 101kB, resolution: 1366x768 pixels)
I like the idea behind Secure-K. Being able to easily set up a distribution on a USB thumb drive so I can take my operating system with me in my pocket is very appealing. Having secure communication and quick access to the Tor network is also handy. I think the Secure-K developers are basically trying to provide an operating system that is like Tails, but more geared toward general purpose use. Tails is typically seen as a utility specifically for secure on-line communication, but probably not a platform for day-to-day use. Secure-K seems to be coming from the other direction and providing a day-to-day operating system that can also be used for secure communication and anonymous web browsing.
In theory, this is a good concept and I can see how it would appeal, especially if people want easy access to on-line storage and persistent settings.
Secure-K OS 18.5 -- The settings panel
(full image size: 662kB, resolution: 1366x768 pixels)
There are three main areas where I feel Secure-K runs into problems. The first is documentation. There were a couple of times when I wondered "What does this application do?", "How does this tool work?" or "What is the default root password?" and couldn't find the answer. I had to either work around issues on my own or figure things out by trial and error.
The second issue was my main user account not having sudo access. This gets in the way of installing software updates, configuring printers, and mounting local drives. So much of Secure-K seems to be set up with convenience in mind, but this was a big obstacle I kept running into.
The final concern I had wasn't with the software, but the license agreement. The license states the operating system sends information home to the developers about our system. Not a lot, but any data sent home largely defeats the purpose of having a system designed for secure and anonymous communication. It's like passing encoded notes in a dark alleyway while whistling loudly.
I think Secure-K has some good ideas, but it may take more time to get the wrinkles out and flesh out the documentation.
* * * * *
Hardware used in this review
My physical test equipment for this review was a de-branded HP laptop with the following
- Processor: Intel i3 2.5GHz CPU
- Display: Intel integrated video
- Storage: Western Digital 700GB hard drive
- Memory: 6GB of RAM
- Wired network device: Realtek RTL8101E/RTL8102E PCI Express Fast
- Wireless network device: Realtek RTL8188EE Wireless network card
* * * * *
Visitor supplied rating
Secure-K OS has a visitor supplied average rating of: 3.5/10 from 2 review(s).
Have you used Secure-K OS? You can leave your own review of the project on our ratings page.
|Miscellaneous News (by Jesse Smith)
Korora tests community spin, elementary OS hires developer, ReactOS boots from Btrfs
Back in May the Korora team announced it would be taking a break and the project would not be publishing a new version based on Fedora 28. Since then a volunteer has stepped forward, offering a spin of Korora that is based on Fedora 28 and features the Xfce desktop. "A past contributor, JMiahMan, has produced an Xfce ISO based on Fedora 28 and including the usual Korora additions. There are more details on this Engage item. You might find this blog post interesting too. There are plans to produce ISOs of the other desktops once Xfce is sorted. So even if you don't use Xfce it would be helpful if you could test this system on a live system or in a VM. Remember these are community produced, beta releases and not designed for day to day use (yet!) so we don't recommend installing them on a production system." More details and instructions for leaving feedback can be found in the project's blog post.
* * * * *
Some good news came out of the elementary OS camp this week. elementary OS is an Ubuntu-based distribution featuring the Pantheon desktop environment. The elementary team has gained a new full-time contributor, Cassidy James. He has been working for System76 and volunteering spare time to elementary OS for a while now, but is making a shift to working for the elementary distribution full-time. "Thanks to the continued support from our community as well as a large private contribution, I now have the opportunity to do all of this full time as my career. I plan to continue to focus on the areas I've been working on as a volunteer, plus dedicate time to working with OEMs, app developers, and other parties to help keep elementary financially sustainable." More on this transition and the work Cassidy James will be doing for elementary OS can be found in this blog post.
* * * * *
Fans of ReactOS, an open source operating system which strives for binary compatibility with Microsoft Windows, will be happy to learn file system support for ReactOS is expanding. One of the project's Google Summer of Code (GSoC) efforts is to get ReactOS to boot from a Btrfs storage volume. Btrfs is typically only used on Linux, but ReactOS can now read and boot from Btrfs partitions. "Freeloader is now able to read files and follow symlinks from Btrfs partition. One major issue is left here - case sensitivity. Btrfs is case-sensitive file system, so paths like /ReactOS/System32, /reactos/system32, /ReactOS/system32 are different here. But in Windows world most software is written assuming that case does not matter during path lookup. This thing is solved in WinBtrfs driver, but for Freeloader it can be a bit tricky. Right now I've implemented a hack for this, we will handle this later." Details can be found in the project's blog post.
* * * * *
These and other news stories can be found on our Headlines page.
|Opinion (by Jesse Smith)
Linux is about choice
When discussing the world's Linux distributions and applications, many of which have overlapping goals, a common phrase which keeps coming up is "Linux is about choice". The "choice" meme is often used to explain why there are so many Linux distributions - people can make their operating system into whatever form they wish, so they do.
The "Linux is about choice" line is also frequently used in the context of users insisting on the implementation (or removal) of one feature or another. A few examples which come to mind are: "Why does my password need to be longer than one character, isn't Linux supposed to be about choice?" and "This application doesn't let me run it as root, but Linux is supposed to be about choice!"
Before going further, I want to clarify I'm using "Linux" here as it usually is in this context: as a short-hand to refer to the GNU/Linux family of distributions, not just the Linux kernel.
Is Linux somehow about choice though and, if so, what does that mean? If you type the phrase "Is Linux about choice?" into a web search, chances are the first result you get will be a website with a giant "NO" banner at the top and an e-mail from Adam Jackson in which he strongly states his objection to the concept: "As a consumer, yes, you have lots of choices in which Linux you use. This does not mean Linux is in any sense about choice, any more than because there are so many kinds of cars you can buy that cars are about choice."
In Jackson's case though he is explaining why it is not practical for developers to ship multiple pieces of technology which might perform the same task. He points out distributions do not have the resources to ship infinite package options like the Firefox web browser alongside the Chromium and Falkon browsers. It's a good point, but I think it dodges the core concept people who see Linux as being about choice have. Most people will probably be comfortable downloading extra software packages post-install; that is not usually what the "Linux is about choice" proponents are worried about. Typically they are concerned with software working the way they want it to. They want to be able to tweak things, override default settings and not be told by their computer's software how it is to be used.
In short, when Linux users say that their operating system should be about choice, what they are hoping for is the developer of a given application or distribution will make it work the way they want it to work. And I think this indicates that the significance behind the phrase "Linux is about choice" has been altered, or even lost, over time.
I feel it is important to remember that in the early days of Linux the various distributions were created largely by and for computer enthusiasts. Many, if not most, of the Linux users of the 1990s were either developers or system administrators, accustomed to compiling code, writing scripts and working from a command line. This set Linux apart from commercial offerings from Apple and Microsoft whose operating systems were mostly proprietary and targeting mass markets. These days the open source nature of Linux may not seem unusual, but in the 90s Linux stood out from most other widely available operating systems. Today we have the BSDs, Haiku, OpenIndiana, parts of macOS are open source, and even Microsoft is releasing tools under open licenses. However, back in the 90s Linux's open source license was in strong contrast to its competitors like Solaris, Mac OS and Windows.
It is difficult to properly convey how much of a contrast the open nature of Linux distributions presented to the closed source standards of the time. With proprietary software, when you encountered a bug or wanted a new feature, your best bet was to contact the vendor and hope they addressed your concern. Then, if they made the change you wanted, it might take a few weeks to a few months for the floppy disk with the upgrade to arrive in the mail. The process was slow and entirely in the control of the software vendor. Linux, and its close cousins like the BSDs, introduced a huge change for developers and system administrators because we had the ability to download a program's source code and fix it ourselves right away.
Minor software tweaks and easy bug fixes were no longer available at the whim (and on the time table) of a distant company, they could often be implemented in a few hours. Not only that, but if you shared a problem with others, sometimes another developer would step in and help solve it with you so both parties would benefit. It was a big leap forward.
When I came into the Linux community in the late 90s, Linux did have a reputation for being about choice. Not just because there were a variety of distributions we could use, multiple desktop environments that could be installed, and a dozen different text editors. Those existed and did indeed provide a buffet of choice. But when most of us talked about Linux being about choice we were talking about the power and freedom to fix things ourselves. If you didn't like something, you could change it, given enough skill and time. The Linux community was largely made up of people who saw the open source nature of the ecosystem as an opportunity to customize it, fix it and add features as we saw fit. We had the choice to craft our software as we desired and it was a revolutionary step forward compared to using closed systems where we had to use what was sold to us.
Over time Linux distributions became more popular and gained interest from a larger audience. More polished desktop products like Red Hat Linux, SuSE and, eventually, Ubuntu did a lot to bring mass appeal to Linux. The community was no longer primarily made up of developers and tinkerers, but also included more mainstream users and businesses. With this shift in the community there also came a shift in attitude with regards to software. More and more software became viewed as something to be consumed rather than something to be cooperatively maintained.
While the growth of the Linux community brought along many advantages (more third-party vendor support, more hardware drivers, more purchasing options) there were some unfortunate changes too. The phrase "Linux is about choice" stayed with us, but I believe half of its meaning has been lost. People still expect the same level of customization Linux has always offered, but without the implied responsibility of implementing the changes they want to see on their own. Linux is about choice because we have the freedom to craft it to suit ourselves, not because someone else is going to customize it for us.
To me, the open source nature of Linux distributions is a bit like having a garden plot. I like having the freedom to grow whatever I want in it. Planting the seeds I like and weeding the rows takes effort, but I end up with the crop I want at harvest time. My operating system, like my garden, is always a product of my needs, skill and effort. Unfortunately, a vocal minority of the Linux community expects their garden to grow exactly what they want without taking time to plant seeds or do any maintenance. They are often disappointed because while they have the freedom to completely customize as they like, they have not contributed to the process.
Something I notice when spending time in the BSD communities is that they are still at a point where the end user is expected to work toward the features or fixes they want to see. One of the more common responses to requests for a new program or port is to direct people to the relevant documentation so they can get started. There is a more prevalent do-it-yourself attitude in BSD circles which seems to be increasingly rare in the Linux community
Luckily Linux is still about choice, but we should remind ourselves that freedom must be paired with the will to act in order to be useful. Having choice without the motivation to get involved will leave users living with the choices others made for them.
|Released Last Week
IPFire 2.21 Core 122
IPFire is a Linux distribution for firewalls which offers a range of security tools and is designed to be easy to set up. The distribution's developers have released IPFire 2.21 Core Update 122, which features an upgraded Linux kernel and a corresponding removal of the grsecurity patches. "The distribution was rebased from our old long-term supported kernel to the new kernel 4.14.50. Most importantly, this kernel improves the security of the system, increases performance and makes the core of IPFire more up to date and modern again. This update also enables mitigation against Meltdown and Spectre on some architectures. On Intel-based platforms, we update the microcode of the CPUs when the system boots up to avoid any performance penalties caused by the mitigation techniques. Unfortunately, grsecurity is incompatible with any newer kernels and has been removed. This is connected to the decision of the grsecurity project to no longer open source their patches. Luckily the kernel developers have backported many features so that this kernel is still hardened and secure. ARM systems won't be able to install this update due to the kernel change which also requires changes on some bootloaders." Further details can be found in the release announcement.
OPNsense is a FreeBSD-based specialist operating system designed for firewalls and routers. The project has released OPNsense 18.7 which introduces better IPv6 support, improved routing, a pluggable backup framework that features an Nextcloud option, and the ability to boot from a ZFS root volume. "These are the most prominent changes since version 18.1: improved WAN DHCPv6 and SLAAC connectivity and tracking; functional IPv6 Rapid Deployment (6RD) support; improved default route handling and gateway switching; OpenVPN default setup improvements for IPv6 and RADIUS attribute support; Dpinger gateway monitoring integration; password policies for local authentication and coupled TOTP; Monit core integration to eventually replace the legacy notifications; OpenSSH access via group and shell selection instead of privilege; pluggable backup framework with new Nextcloud option; sytem tunables are now also used as loader tunables; unrestricted VLAN usage for e.g. Xen; QinQ interface removal; firmware GUI speedup, improved error parsing and console reboot hint; ZFS on root boot support (installer support is pending, but opnsense-bootstrap works)..." Further details can be found in the release announcement.
The Ubuntu team has announced the availability of a new point release for the distribution's 16.04 long term support branch. Ubuntu 16.04.5, along with its community editions, features updated packages, security fixes and additional hardware support. "Like previous LTS series', 16.04.5 includes hardware enablement stacks for use on newer hardware. This support is offered on all architectures except for 32-bit PowerPC, and is installed by default when using one of the desktop images. Ubuntu Server defaults to installing the GA kernel, however you may select the HWE kernel from the installer bootloader. As usual, this point release includes many updates, and updated installation media has been provided so that fewer updates will need to be downloaded after installation. These include security updates and corrections for other high-impact bugs, with a focus on maintaining stability and compatibility with Ubuntu 16.04 LTS." Further information can be found in the project's release announcement and in the release notes.
Netrunner 2018.08 "Rolling"
The Netrunner team has published a new snapshot of the distribution's Manjaro-based Rolling edition. The new snapshot, Netrunner 2018.08 "Rolling", features updated KDE Plasma packages, improves GTK+ application integration into the default Plasma desktop and upgrades the Krita drawing software. "GTK Apps now use Kwin borders integrating nicely with the rest of the Plasma desktop environment. Krita is shipped as 4.x release, which got some nice overhauls and features compared to previous version. System Settings - Plasma Tweaks: Using the new sidebar Layout, we sorted all the revamped UI-related KCM modules into one section called 'Plasma Tweaks' for easy configuring Plasma to your liking. 2018.08 comes with some new Plasma Theme that has some transparency built in to allow for experimenting with the new Blur options. It also features a new default wallpaper style, because why not." The release announcement includes a list of key package upgrades and screen shots.
Netrunner 2018.08 "Rolling" -- Netrunner featuring the KDE Plasma desktop
(full image size: 1.2MB, resolution: 1920x1080 pixels)
* * * * *
Development, unannounced and minor bug-fix releases
The table below provides a list of torrents DistroWatch is currently seeding. If you do not have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found in our Torrent Archive. We also maintain a Torrents RSS feed for people who wish to have open source torrents delivered to them. To share your own open source torrents of Linux and BSD projects, please visit our Upload Torrents page.
Torrent Corner statistics:
- Total torrents seeded: 971
- Total data uploaded: 20.9TB
|Upcoming Releases and Announcements
Summary of expected upcoming releases
Portable operating system on a thumb drive
This week we shared a review of Secure-K OS, an operating system which is designed to be run from a USB thumb drive. We would like to find out how many of our readers use such an operating system. Do you have a distribution such as Secure-K OS, Tails, or Puppy that you carry around with you on a removable drive? If so let us know which one you prefer in the comments.
You can see the results of our previous poll on upgrading software packages from source code in last week's edition. All previous poll results can be found in our poll archives.
Portable operating system on a thumb drive
|I carry a removable drive with a live distro with me: ||597 (28%)|
| I have live distros on a removable drive at home: ||984 (46%)|
| I do not run live distros from a removable drive: ||540 (25%)|
New projects added to database
YunoHost is a Debian-based distribution which strives to make it easy to quickly set up a server and host web applications. The distribution can be managed through a custom command line utility or through a web-based administration panel.
YunoHost 3.0 -- The web-based administration panel
(full image size: 102kB, resolution: 1239x1024 pixels)
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 13 August 2018. Past articles and reviews can be found through our Article Search page. To contact the authors please send e-mail to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews/submissions, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, donations, comments)
- Bruce Patterson (podcast)
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip.
(Tips this week: 0, value: US$0.00)
|Linux Foundation Training
|• Issue 777 (2018-08-20): YunoHost 18.104.22.168, limiting process resource usage, converting file systems on Fedora, Debian turns 25, Lubuntu migrating to Wayland|
|• Issue 776 (2018-08-13): NomadBSD 1.1, Maximum storage limits on Linux, openSUSE extends life for 42.3, updates to the Librem 5 phone interface|
|• Issue 775 (2018-08-06): Secure-K OS 18.5, Linux is about choice, Korora tests community spin, elementary OS hires developer, ReactOS boots on Btrfs|
|• Issue 774 (2018-07-30): Ubuntu MATE & Ubuntu Budgie 18.04, upgrading software from source, Lubuntu shifts focus, NetBSD changes support policy|
|• Issue 773 (2018-07-23): Peppermint OS 9, types of security used by different projects, Mint reacts to bugs in core packages, Slackware turns 25|
|• Issue 772 (2018-07-16): Hyperbola GNU/Linux-libre 0.2.4, UBports running desktop applications, OpenBSD auto-joins wi-fi networks, boot environments and zedenv|
|• Issue 771 (2018-07-09): Linux Lite 4.0, checking CPUs for bugs, configuring GRUB, Mint upgrade instructions, SUSE acquired by EQT|
|• Issue 770 (2018-07-02): Linux Mint 19, Solus polishes desktop experience, MintBox Mini 2, changes to Fedora's installer|
|• Issue 769 (2018-06-25): BunsenLabs Helium, counting Ubuntu users, UBports upgrading to 16.04, Fedora CoreOS, FreeBSD turns 25|
|• Issue 768 (2018-06-18): Devuan 2.0.0, using pkgsrc to manage software, the NOVA filesystem, OpenBSD handles successful cron output|
|• Issue 767 (2018-06-11): Android-x86 7.1-r1, transferring files over OpenSSH with pipes, LFS with Debian package management, Haiku ports LibreOffice|
|• Issue 766 (2018-06-04): openSUSE 15, overview of file system links, Manjaro updates Pamac, ReactOS builds itself, Bodhi closes forums|
|• Issue 765 (2018-05-28): Pop!_OS 18.04, gathering system information, Haiku unifying ARM builds, Solus resumes control of Budgie|
|• Issue 764 (2018-05-21): DragonFly BSD 5.2.0, Tails works on persistent packages, Ubuntu plans new features, finding services affected by an update|
|• Issue 763 (2018-05-14): Fedora 28, Debian compatibility coming to Chrome OS, malware found in some Snaps, Debian's many flavours|
|• Issue 762 (2018-05-07): TrueOS 18.03, live upgrading Raspbian, Mint plans future releases, HardenedBSD to switch back to OpenSSL|
|• Issue 761 (2018-04-30): Ubuntu 18.04, accessing ZFS snapshots, UBports to run on Librem 5 phones, Slackware makes PulseAudio optional|
|• Issue 760 (2018-04-23): Chakra 2017.10, using systemd to hide files, Netrunner's ARM edition, Debian 10 roadmap, Microsoft develops Linux-based OS|
|• Issue 759 (2018-04-16): Neptune 5.0, building containers with Red Hat, antiX introduces Sid edition, fixing filenames on the command line|
|• Issue 758 (2018-04-09): Sortix 1.0, openSUSE's Transactional Updates, Fedora phasing out Python 2, locating portable packages|
|• Issue 757 (2018-04-02): Gatter Linux 0.8, the UNIX and Linux System Administration Handbook, Red Hat turns 25, super long term support kernels|
|• Issue 756 (2018-03-26): NuTyX 10.0, Neptune supplies Debian users with Plasma 5.12, SolydXK on a Raspberry Pi, SysV init development|
|• Issue 755 (2018-03-19): Learning with ArchMerge and Linux Academy, Librem 5 runs Plasma Mobile, Cinnamon gets performance boost|
|• Issue 754 (2018-03-12): Reviewing Sabayon and Antergos, the growing Linux kernel, BSDs getting CPU bug fixes, Manjaro builds for ARM devices|
|• Issue 753 (2018-03-05): Enso OS 0.2, KDE Plasma 5.12 features, MX Linux prepares new features, interview with MidnightBSD's founder|
|• Issue 752 (2018-02-26): OviOS 2.31, performing off-line upgrades, elementary OS's new installer, UBports gets test devices, Redcore team improves security|
|• Issue 751 (2018-02-19): DietPi 6.1, testing KDE's Plasma Mobile, Nitrux packages AppImage in default install, Solus experiments with Wayland|
|• Issue 750 (2018-02-12): Solus 3, getting Deb packages upstream to Debian, NetBSD security update, elementary OS explores AppCentre changes|
|• Issue 749 (2018-02-05): Freespire 3 and Linspire 7.0, misunderstandings about Wayland, Xorg and Mir, Korora slows release schedule, Red Hat purchases CoreOS|
|• Issue 748 (2018-01-29): siduction 2018.1.0, SolydXK 32-bit editions, building an Ubuntu robot, desktop-friendly Debian options|
|• Issue 747 (2018-01-22): Ubuntu MATE 17.10, recovering open files, creating a new distribution, KDE focusing on Wayland features|
|• Issue 746 (2018-01-15): deepin 15.5, openSUSE's YaST improvements, new Ubuntu 17.10 media, details on Spectre and Meltdown bugs|
|• Issue 745 (2018-01-08): GhostBSD 11.1, Linspire and Freespire return, wide-spread CPU bugs patched, adding AppImage launchers to the application menu|
|• Issue 744 (2018-01-01): MX Linux 17, Ubuntu pulls media over BIOS bug, PureOS gets endorsed by the FSF, openSUSE plays with kernel boot splash screens|
|• Issue 743 (2017-12-18): Daphile 17.09, tools for rescuing files, Fedora Modular Server delayed, Sparky adds ARM support, Slax to better support wireless networking|
|• Issue 742 (2017-12-11): heads 0.3.1, improvements coming to Tails, Void tutorials, Ubuntu phasing out Python 2, manipulating images from the command line|
|• Issue 741 (2017-12-04): Pop!_OS 17.10, openSUSE Tumbleweed snapshots, installing Q4OS on a Windows partition, using the at command|
|• Issue 740 (2017-11-27): Artix Linux, Unity spin of Ubuntu, Nitrux swaps Snaps for AppImage, getting better battery life on Linux|
|• Issue 739 (2017-11-20): Fedora 27, cross-distro software ports, Ubuntu on Samsung phones, Red Hat supports ARM, Parabola continues 32-bit support|
|• Issue 738 (2017-11-13): SparkyLinux 5.1, rumours about spyware, Slax considers init software, Arch drops 32-bit packages, overview of LineageOS|
|• Issue 737 (2017-11-06): BeeFree OS 18.1.2, quick tips to fix common problems, Slax returning, Solus plans MATE and software management improvements|
|• Issue 736 (2017-10-30): Ubuntu 17.10, "what if" security questions, Linux Mint to support Flatpak, NetBSD kernel memory protection|
|• Issue 735 (2017-10-23): ArchLabs Minimo, building software with Ravenports, WPA security patch, Parabola creates OpenRC spin|
|• Issue 734 (2017-10-16): Star 1.0.1, running the Linux-libre kernel, Ubuntu MATE experiments with snaps, Debian releases new install media, Purism reaches funding goal|
|• Issue 733 (2017-10-09): KaOS 2017.09, 32-bit prematurely obsoleted, Qubes security features, IPFire updates Apache|
|• Issue 732 (2017-10-02): ClonOS, reducing Snap package size, Ubuntu dropping 32-bit Desktop, partitioning disks for ZFS|
|• Issue 731 (2017-09-25): BackSlash Linux Olaf, W3C adding DRM to web standards, Wayland support arrives in Mir, Debian experimenting with AppArmor|
|• Issue 730 (2017-09-18): Mageia 6, running a completely free OS, HAMMER2 file system in DragonFly BSD's installer, Manjaro to ship pre-installed on laptops|
|• Issue 729 (2017-09-11): Parabola GNU/Linux-libre, running Plex Media Server on a Raspberry Pi, Tails feature roadmap, a cross-platform ports build system|
|• Issue 728 (2017-09-04): Nitrux 1.0.2, SUSE creates new community repository, remote desktop tools for GNOME on Wayland, using Void source packages|
|• Issue 727 (2017-08-28): Cucumber Linux 1.0, using Flatpak vs Snap, GNOME previews Settings panel, SUSE reaffirms commitment to Btrfs|
|• Issue 726 (2017-08-21): Redcore Linux 1706, Solus adds Snap support, KaOS getting hardened kernel, rolling releases and BSD|
|• Full list of all issues|
|Random Distribution |
Underground Desktop was a GNU/Linux distribution targeted at the desktop user. It was based on Arch Linux. Its main features are ease of installation, kernel optimisation for modern processors (i686), and the KDE desktop.