| DistroWatch Weekly
|DistroWatch Weekly, Issue 452, 16 April 2012
Welcome to this year's 16th issue of DistroWatch Weekly! Network-attached storage might not be the most glamorous of topics to cover on these pages, but there is no doubt that a highly specialised operating for sharing files on a local network can be a perfect solution in many scenarios. Today we launch what should become a series of articles on these useful operating systems, starting with a first-look review of FreeBSD-based FreeNAS. In the news section, Stefano Zacchiroli becomes the first Debian Project Leader to assume office for the third consecutive year, Kubuntu finds a new sponsor in a mysterious Germany company called Blue Systems, and Mandriva seeks feedback from users hinting at a new community-oriented beginning. Also in this issue, an overview of DoudouLinux, a Debian-based distribution with a simplified user interface designed for very young children, and a tips and tricks section dealing with timeless classics - cron and crontab. Happy reading!
Listen to the Podcast edition of this week's DistroWatch Weekly in OGG (17MB) and MP3 (18MB) formats
Join us at irc.freenode.net #distrowatch
|Feature Story (by Jesse Smith)
A look at FreeNAS 8.0.4|
A few weeks ago I asked if readers would be interested in seeing reviews of network-attached storage (NAS) projects. The feedback was really positive and so I present the first of what I hope to be a series of reviews covering NAS solutions. This week we will be looking at FreeNAS, a FreeBSD-based project sponsored by iXsystems.
Before we get started I think it's only fair that we address the question of why we might want to run a dedicated NAS operating system rather than a generic server system. For instance, this week we're looking at FreeNAS, what motivation do we have for using it instead of FreeBSD or a popular Linux server distribution? The answer is largely one of specialization. People looking at network-attached storage are looking for a place to store files (usually a lot of files) and aren't interested in other features a server operating system might provide. A NAS box will be focused on storing and transferring files, it's probably not going to serve up e-mails or websites or provide DNS services. With that in mind, a NAS should come with all the tools we might need to easily add new disks, take snapshots, perform backups and, being focused on these tasks exclusively, it can cut out any extras, providing a lightweight solution.
The FreeNAS project is based on the FreeBSD 8.2 operating system and comes in 32-bit and 64-bit builds. The project's ISO file is a 94 MB download and booting off the disc will bring up a menu asking if we'd like to run the system installer, drop to a command-line shell or shutdown/reboot the machine. Launching the installer runs us through a series of text-based menus. First we're asked on which disk we want to install FreeNAS. A word of warning here, installing FreeNAS on a hard disk will erase all other partitions, the destination disk should be a small drive used only for storing the FreeNAS operating system. All user data is stored on separate devices. Because of this arrangement it's recommended that users install FreeNAS on a USB thumb drive rather than a normal hard disk as the latter option wastes a lot of space. Once we've provided the installer with a destination disk it immediately goes to work partitioning and copying over files. The process is quite short, taking only a few minutes. Then we reboot the machine.
When we boot into the locally installed copy of FreeNAS we're presented with a text-based menu offering a number of configuration options, the ability to reboot/shutdown the machine and the ability to switch to a command-line shell. Under the menu we're shown the machine's IP address which can be used to access the box's web interface. We'll cover the web control panel later, but for now let's examine some aspects of the FreeNAS console.
When logged in to the NAS box locally we can choose to use the configuration menu to change our DNS settings, reset to the web login credentials, configure the network or reset the entire operating system to its pristine, "factory", state. Really the menu isn't designed to do much except make sure the NAS is on-line and that we can access its web interface. It's assumed we'll use the web interface for everything else. Should we need more flexibility we can launch a shell session which gives us basic command-line tools, a text editor and the ability to peek under the hood. When we're accessing the machine physically we're automatically granted root access without a password. The operating system is pretty lean, using just 50 MB of RAM (before we add disks and enable optional services). There's no compiler, no manual pages and few services. The lighttpd web server is running, providing our web-based interface, the Python language is installed, as are some low-level tools such as awk.
The FreeBSD package management utilities (pkg_add, pkg_delete, etc) are included, but I couldn't get them to work. All attempts to install software from the FreeBSD repositories failed and the update tool, freebsd-update, isn't on the system. In short, we're stuck with the software we're given and there doesn't appear to be any way to install security updates until the FreeNAS project issues a service pack. Another interesting characteristic, which we'll touch on later, is that the system assumes that new user accounts and their home directories will be placed on separate drives under the /mnt directory; there isn't any local /home directory. I bring these points up to illustrate that while FreeNAS bears a resemblance to FreeBSD and its Linux cousins, the operating system has been stripped down and altered to focused specifically on file storage and most interaction with the system is intended to be done through the web portal.
The web interface has a nice, clean design with all the controls and menus on one page. Down the left side of the page we see an expandable tree of options. Top-level categories include user account management, adding and managing storage, creating network shares, configuring services and monitoring the system. Clicking on these categories expands the tree, showing us more specific categories. Over on the right side of the screen we see all of the individual options in the selected category. In the top-right corner of the window there's a log off button, a button for bringing up the account manager, a button for connecting us to the FreeNAS project website and a status "light". The status indicator flashes red when something needs our attention and glows a steady green when everything is working properly. When we first log in the light is red and clicking on it brings up a window suggesting that we set an administrative password. Something I found curious is that the web interface works using the insecure HTTP protocol rather than the secure HTTPS protocol, which isn't available under the default installation -- something to keep in mind if you're using FreeNAS on a shared network.
FreeNAS 8.0.4 - adding a new volume
(full image size: 126kB, screen resolution 1366x768 pixels)
The first task we probably want to accomplish after signing into the web interface is setting up disks to use as storage. Going to the Storage menu on the left and selecting Volumes we're able to bring up the file system handling screen. Here we can add new disks, opt to format them as either UFS or ZFS volumes and select a mount point for them. All new volumes are mounted under the system's /mnt directory and owned by the root user. Once a new volume is added to the control panel we're able to change its permissions, enable periodic snapshots and manage any existing ZFS pools. The interface is really slick, and the options clearly labeled. I suspect people who haven't used ZFS at all before will be able to create and manage ZFS partitions and snapshots without any problems.
Another area we can work with is creating new users. Though non-admin accounts can't access the web interface we can give users access to services like rsync and secure file transfers. New user accounts are placed on data volumes and don't share the same partition as the operating system, keeping data and FreeNAS itself separate. One problem I ran into setting up accounts is that FreeNAS offers to let us set public key authentication, but when I installed a key on the FreeNAS box I wasn't able to use it to login.
FreeNAS 8.0.4 - enabling system services
(full image size: 124kB, screen resolution 1366x710 pixels)
FreeNAS comes with a number of different services we can enable and configure. Some of them include tying in with a local Active Directory or LDAP server. Secure shell is available, as are rsync, CIFS (Windows) shares, NFS shares and Apple network shares. The SMART disk monitor is there to make sure our hardware is working properly. There's also a UPS monitoring service which will let us check our electrical situation and cleanly shut down the NAS if it appears that the system is on battery power. There is a module for connecting to dynamic DNS providers including dyndns.org, easydns.com, no-ip.com and others, making it possible to connect to our NAS box even when it doesn't have a static IP address. We can also alter our network settings through the web interface, selecting whether we want a static IP address or to use DHCP, and we can set DNS information and gateways. By default FreeNAS uses DHCP and sets these items for us automatically and we can fine tune things as we see fit.
One last feature I really liked was the monitoring option. FreeNAS provides us with the ability to monitor processes and see dynamic graphs detailing CPU usage, memory consumption, swap usage and network traffic. It's nice to be able to bring up a single web page and get an immediate idea of what kind of load the NAS is under.
FreeNAS 8.0.4 - monitoring processes and network traffic
(full image size: 194kB, screen resolution 1366x710 pixels)
The FreeNAS project, being based on FreeBSD 8.2, should support all of the same hardware as its parent. One reader asked if I could point out NAS hardware which is known to work or would be supported. On the FreeNAS website they provide links to two NAS solutions, both made available by the project's sponsor, iXsystems. For home and small business users they suggest the FreeNAS Mini and for enterprises they provide an array of higher end NAS hardware. If you're interested in FreeNAS and want a supported solution, that's a good place to start. People experimenting at home will probably find that most common hardware is supported by the underlying FreeBSD kernel and, in a pinch, it's possible to install FreeNAS in a virtual machine.
Let's look at some pros and cons. What I like about running FreeNAS is that it is really straightforward to set up. The install is all of about five minutes, the documentation is helpful and the system doesn't have any clutter. The web interface is top notch, being both very easy to navigate and powerful. When we stick a new disk in our NAS box it's a matter of just a few mouse clicks to format it with either the UFS or ZFS file systems, add it to a pool and enable snapshots. We can enable rsync modules, secure shell and network shares in seconds. The system is stable, uses very few resources and I like the status "light" and accompanying alert messages in the upper-right corner of the web interface. FreeNAS probably provides the easiest way to handle ZFS pools and snapshots I've seen to date.
FreeNAS 8.0.4 - creating periodic snapshots
(full image size: 127kB, screen resolution 1366x710 pixels)
There were some concerns too. The big one for me was security. There doesn't appear to be any way to patch software such as OpenSSH or the web server between service packs. The web interface is served up over plain HTTP and there's no secure connection option in the default install. It's easy to enable secure shell to check on items remotely, but it's not as convenient. Though not strictly necessary, it would have been nice if adding new packages would have worked in order to add a specific FTP client, for example. Sadly all of the FreeBSD packages I tried to add failed to install.
In short, I think FreeNAS has a great interface, is quick to get up and running and, using the FreeBSD kernel and ZFS technology, will handle huge amounts of data reliably. I've heard rumours that later versions will support adding software using PBI modules, which will be a welcome addition. I'd like to see more focus on security. Secure HTTP connections out of the box would be great, as would allowing some users limited edit access or read-only access to parts of the web interface. FreeNAS offers a good, simple way to back up our data, it has lots of useful built in services and I didn't run into any show-stopping problems.
|Miscellaneous News (by Ladislav Bodnar)
Stefano Zacchiroli re-elected as DPL, new sponsor for Kubuntu, Mandriva seeks community feedback, DoudouLinux overview
The annual Debian Project Leader (DPL) elections held last week confirmed Stefano Zacchiroli as the leader of the world's largest Linux distribution project for another year: "In accordance with its constitution, the Debian project has just re-elected Stefano Zacchiroli for a third year as Debian Project Leader. More than 80% of voters put him as their first choice (or equal first) on their ballot papers. This is the first time in the history of the project that a candidate wins in three consecutive years. Stefano's large majority over his opponents shows how satisfied the Debian project is with his work so far, and its wish for him to represent the project during one last term -- Stefano has already announced he won't be seeking re-election again next year. Wouter Verhelst and Gergely Nagy also gained a lot of support from Debian project members, both coming hundreds of votes ahead of the "None of the above" ballot choice. Stefano has been a Debian developer since March 2001 and was a long-term contributor to several core services such as Debian's package tracking system and its quality assurance team. He became Debian Project Leader in 2010, then in 2011 was re-elected unopposed."
* * * * *
Following Canonical's recent announcement about the termination of funding for Kubuntu's lead developer Jonathan Riddell, some fans and users of the distribution began to wonder about the future of their favourite project. Luckily, last week's news about Blue Systems stepping in to take over the distro's sponsorship should alleviate any remaining worries: "Kubuntu will have a new sponsor in Blue Systems from the 12.10 cycle starting in May. Kubuntu is a community-led project to create a KDE flavour as part of Ubuntu. Our sponsor since it started has been Canonical who are now moving to focus on their Unity flavour. Blue Systems sponsors a number of KDE projects and will encourage Kubuntu to follow the same successful formula as it has always had - community-led, KDE-focused, Ubuntu flavour. Kubuntu roll-outs include the world's largest Linux desktop in Brazil. Kubuntu is one of the most successful communities within the Ubuntu project, home to a number of flavours. With the new Kubuntu Active flavour forthcoming as the first Ubuntu flavour designed for tablets there are many exciting possibilities for the project."
* * * * *
Mandriva Linux has been slowly falling off the radar of its user and developer community, following (yet another) round of financial troubles that emerged last year. But the company is not dead yet. In a somewhat unexpected announcement published last week on the official blog, Mandriva COO Jean-Manuel Croset called on the distro's community to take a more active role in the distribution: "The purpose of this post is to get the opinion and ideas of the community, as well as to feel how strong you are. The desktop distribution is our historical product, it has evolved from the early times and have experienced all the ups and downs of Mandriva. I would not like to judge whether the orientations taken in the past were right or not, as I am myself relatively new in the company. However, I'm sure that a community is necessary and that our company can't be without one. I'm also convinced that, considering this fact, we need to take care of you. On April 30th, Mandriva will hold its long-awaited general assembly of the shareholders. Shortly after that, we'll define the strategy and set our priorities for the next twelve months." Susan Linton expands on the story in "Mandriva's Alive!", while Mandrake Linux founder Gaël Duval has written an informative post entitled "An OS in the Public Interest - a Mandriva Linux Foundation?"
* * * * *
One of the many strengths of open-source operating systems is the availability of source code that can be cast into any form and shape - from general-purpose distribution to highly specialised operating systems. One area where Linux has been shining in recent years is education, with DoudouLinux being one of the projects that cater specifically for very young children. Linux.com's Carla Schroder finds DoudouLinux "a beautiful example of functional simplicity": "DoudouLinux has several features that set it apart from the others: a safe computing environment for children; make computers accessible to all children on earth; copy and share freely; carry it anywhere and use safely on any computer; the operating system children prefer. Safety means two things. It means system safety, because even though DoudouLinux can be installed to a hard drive, it's really intended to run from a CD or USB stick without making any changes to the host system, and without access to the host system. It can't be used as a rescue distro or interfere with the host system in any way. There is no console and no command line. It is very simple, with a limited tightly-focused set of applications, and no modifications without rebuilding the system image."
DoudouLinux 2011-02 - a Debian-based distribution targeting young children
(full image size: 51kB, screen resolution 1280x1024 pixels)
|Tips and Tricks (by Jesse Smith)
cron and crontab: some classics are timeless
Quite often we, as computer users, need to schedule applications or jobs to take place at a given time. Backups typically happen at night, virus scans might happen after dinner, system updates might take place first thing in the morning. It's often useful to have routine tasks performed automatically and at a time when we're not sitting in front of the machine. This week we're going to cover the cron daemon and demonstrate how it can be used to quickly set up periodic tasks.
What does cron do? Well, once a minute the cron daemon checks the file /etc/crontab to see if any tasks are scheduled and, if it finds an applicable task, it runs a given program. The /etc/crontab file is a text file which we can open and examine in any text editor. Let's break down the information fields we will find in that file.
Typically a crontab file will contain two or more lines setting variables. Usually we will see a line setting the path to a shell and another listing the paths where cron can find executable files. These may look like the following:
Following these variables we will find lines specifying times and tasks to be run at those times. Let's look at an example of one of these scheduled tasks:
15 * * * * root logrotate
The first five fields of the line are made up of numbers or stars. These fields represent a given point (or points) in time to let us know when the task will be run. From left to right the fields indicate the minute, hour, day of the month, month and day of the week when a task is to be run. Stars effectively mean "any" or "every". The sixth column indicates which user account will be used to run the task and the final field is the command to be run. In the above example we will run the logrotate command as the root user. This will happen 15 minutes into every hour of every day of every month, on every day of the week. In the following example we will run a backup script as the root user at noon on every Sunday:
0 12 * * * 0 root my-backup-script
As you can see, we've set the minute field to zero, the hour to twelve (noon) and the day of the week to zero (Sunday). Cron associates Sunday with zero, Monday with one... through to Saturday which is six. Here is another example where we perform a clean-up of the /tmp directory at 6:30pm every evening from Monday through Friday. The dash character allows us to specify a range:
30 18 * * 1-5 root rm -rf /tmp/*
On most Linux systems it's not just the root user who can schedule tasks, regular user accounts can create their own cron jobs. These user-scheduled tasks are kept separate from the /etc/crontab jobs and can be accessed by running the command:
The crontab command will open a text editor and allow us to create tasks specific to our account. The main difference between the user-specific schedules and the /etc/crontab file is that the user-specific schedules do not include a username. For example, the following entry in my crontab file will perform a backup of my Documents directory at 5:00am on the first day of each month:
0 5 1 * * tar czf ~/mybackup.tar.gz ~/Documents
Should we wish to see all of the jobs we have scheduled in our cron file we can run
to get a complete list. Lastly, we can remove all of our user's scheduled tasks by running:
The cron program is a very flexible and powerful tool which can be used to automate processes and is particularly good for scheduling backups and system clean-ups. It's a very handy utility to know.
|Released Last Week
Snowlinux 2 "LXDE", "Xfce"
Lars Torben Kremer has announced the release of Snowlinux 2, a desktop distribution based on Debian GNU/Linux 6.0 and featuring custom LXDE and Xfce desktops: "The team is proud to announce the release of Snowlinux 2 'Ice' LXDE. New features: Snowlinux Metal theme; Snowlinux Metal icons; improved installer (keyboard variants, UUID in fstab); DRUCK key; GNOME-PPP; firewall; apturl; terminal colors; OpenJDK 6 Java; updated software and packages; better software selection; improved speed and response; new look and feel; system improvements. System requirements: x86 CPU; 256 MB memory; 2 GB free disk space; graphics card capable of 800×600 pixel resolution; CD-ROM drive or USB port." Here is the brief release announcement with a screenshot of the default desktop.
Superb Mini Server 1.6.5
An updated version of Superb Mini Server (SMS), a Slackware-based distribution for servers, was made available earlier today: "Superb Mini Server version 1.6.5 released (Linux kernel 3.2.14). This minor release brings along Linux kernel 3.2.14, glibc 2.15 and GCC 4.7.0, with many updated server packages, such as Postfix 2.9.1, BIND 9.9.0, Dovecot 2.1.4, ClamAV 0.97.4, OpenLDAP 2.4.30, MySQL 5.1.62 and OpenSSL 0.9.8u. To retain stability, compatibility and a fully working web server, the new Apache HTTPD server 2.4.1 and PHP 5.4.0 were left out from the stable tree since 2.4 API along with PHP 5.4.0 will bring nothing but problems to most web applications. New packages in this release are gccgo, Wireshark network monitor tool and FreeRADIUS radius protocol server, available in the extra repository. Asterisk add-on package are removed, since they are now included in the new Asterisk 1.8.x package." Read the rest of the release announcement for more details.
SliTaz GNU/Linux 4.0
Christophe Lincoln has announced the release of SliTaz GNU/Linux 4.0, a major new version of the project's fast, minimalist but extensible Linux distribution with its own package management system: "The SliTaz contributors are pleased to announce the release of the new stable distribution SliTaz GNU/Linux 4.0. Two years of community work have created a reliable system capable of even shorter boot times with more than 1,000 new installable packages. SliTaz provides a complete graphical desktop in 35 MB based on LXDE and Openbox that works entirely in 192 MB of RAM. Its new 4-in-1 CD image can be installed on a hard drive with only 48 MB by automatically selecting a configuration most fully suited to your hardware. The home-made tools have grown. Tazpkg brings a new notification system and is much faster despite the increase in the number of packages and Tazpanel enables a new centralized management system." See the brief release announcement and the detailed release notes for further information.
SliTaz GNU/Linux 4.0 - small and light, but powerful and extensible
(full image size: 554kB, screen resolution 1280x1024 pixels)
Plop Linux 4.2.1
Elmar Hanlhofer has announced the release of Plop Linux 4.2.1, an updated version of the project's distribution built from scratch and designed to rescue data from a damaged system, backup and restore operating systems, and automate tasks: "Plop Linux 4.2.1 released. The i486 version is now the default version to avoid some PAE troubles. The PAE version is still available as an additional version. ClamAV is back in Plop Linux, it's included in the opt.sqfs and it's available as an optional tar.gz package. New ClamAV 0.97.4; updated glib 2.32.1, Linux kernel 3.3.1, Midnight Commander 4.8.2; ISO boot - find ISO image on hard disk bug fix; NFS boot - optional mount parameter bug fix; optional X new and updates to GNOME 3.4, GParted 0.12, MPlayer 2012-03-31, Firefox 11.0, WINE 1.5.1; desktop website icon removed." Here is the full changelog.
Heiko Zuecker has announced the release of Devil-Linux 1.6.0, a specialist live distribution for firewalls, routers and servers which boots and runs completely from a CD-ROM or a USB Flash drive: "Hello Devil-Linux community. It has finally happened: Devil-Linux 1.6 has been released. This new release brings many new features, lots of improvements, many software updates, Linux kernel 3.2, and a 64-bit edition." Some of the major package updates include LVM 2.02.95, DHCP 4.2.3-P2, OpenLDAP 2.4.30, Squid 3.1.19, Webmin 1.580, Dovecot 2.1.3, MySQL 5.5.21, Samba 3.6.3, Apache HTTPD server 2.2.22, PHP 5.3.10.... See the brief release announcement and consult the comprehensive changelog for more information.
Slackel is a Linux distribution based on Slackware's "current" branch, with the goal of integrating the latest KDE desktop, the Calligra office suite and some custom artwork into separate live (installable to hard disk) and installation DVD images. The project's latest version, KDE-4.8.2, was announced yesterday: "A new set of Slackel KDE-4.8.2 version. A collection of four KDE ISO images are immediately available to our users, including 32-bit and 64-bit installation images as well as 32-bit and 64-bit live images that can be burned to a DVD or used with a USB drive. Slackel KDE-4.8.2 includes the latest 'current' tree of Slackware Linux and the latest KDE 4.8.2 accompanied by a very rich collection of KDE-centric software. The Firefox 11.0 web browser, KMail and KTorrent are the main networking applications included in this release, followed by Akregator and Kopete." Read the rest of the release announcement for further information.
Lightweight Portable Security 1.3.3
A new version of Lightweight Portable Security (LPS), a Linux live CD with strong privacy protection features created by the United States Department of Defence, is out. Version 1.3.3 is a maintenance release, updating Firefox, Flash, Adobe Reader and OpenSSL, and adding Thunderbird and Pidgin to the "deluxe" edition. From the changelog: "Changes in version 1.3.3: updated Firefox to 10.0.3 ESR; updated Flash to 220.127.116.11; updated OpenSSL to 0.9.8u; updated Adobe Reader to 9.5.1; updated Encryption Wizard application to 3.3.2; added Thunderbird 3.1.20 and DAVmail to LPS-Public Deluxe for S/MIME email support with MS Exchange OWA; added Pidgin 2.10.2 (with SameTime support); added VMware View 1.4; added option for OpenDNS DNSCrypt; added Firefox extension HTTPS Everywhere 2.0.1; added Firefox extension NoScript 2.3.7 (disabled by default)."
* * * * *
Development, unannounced and minor bug-fix releases
|Upcoming Releases and Announcements
Summary of expected upcoming releases
New distributions added to database
* * * * *
New distributions added to waiting list
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 23 April 2012. To contact the authors please send email to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, suggestions and corrections: news, donations, distribution submissions, comments)
- Bruce Patterson (feedback and suggestions: podcast edition)
|• Issue 572 (2014-08-18): ZFSguru 10.1, Fedora's Flock, beta installer for "Jessie", Ubuntu Core, rolling releases|
|• Issue 571 (2014-08-11): HandyLinux 1.6, LMDE update, default desktop in "Jessie", running out of disk space|
|• Issue 570 (2014-08-04): Neptune 4, Kubuntu's KDE Plasma 5, FreeBSD and UEFI, Linux servers|
|• Issue 569 (2014-07-28): Deepin 2014, Ask Fedora, Gentoo and LibreSSL, encrypted package downloads|
|• Issue 568 (2014-07-21): Antergos 2014.06.24, Mint based on Debian stable, upgrading CentOS, BinaryTides|
|• Issue 567 (2014-07-14): Manjaro 0.8.10, PC-BSD jails, Debian and glibc, Fedora's DNF, Xiki and Opera 24|
|• Issue 566 (2014-07-07): LXLE 14.04, OpenBSD's SimpleDE, openSUSE artwork, home security basics|
|• Issue 565 (2014-06-30): Chakra 2014.05, Fedora on BeagleBone, Matthew Miller interview, e-book readers|
|• Issue 564 (2014-06-23): Antergos 2014.05.26 and Q4OS 0.5.11, Debian LTS and glibc, Fedora DNF|
|• Issue 563 (2014-06-16): Mint 17, CentOS 7 pre-release, Debian MATE, accessing encrypted content|
|• Issue 562 (2014-06-09): GoboLinux 015, Gentoo interview, Fedora leader change, climagic tricks|
|• Issue 561 (2014-06-02): OpenMandriva 2014.0, Debian GNU/Hurd, Lubuntu and LXQt, Final Term, TrueCrypt|
|• Issue 560 (2014-05-26): KaOS 2014.04, Wayland and KDE 5 on Fedora, distros with commercial support, DenyHosts|
|• Issue 559 (2014-05-19): VortexBox 2.3, LTS-only Linux Mint, FreeBSD 11 ambitions, KDE 5 beta|
|• Issue 558 (2014-05-12): RHEL 7 Workstation impressions, LXQt and Lumina, Haiku interview|
|• Issue 557 (2014-05-05): Xubuntu 14.04, Ubuntu 14.10 roadmap, Fedora Workstation, ownCloud|
|• Issue 556 (2014-04-28): Ubuntu 14.04, LibreSSL, Lumina desktop, Deepin interview|
|• Issue 555 (2014-04-21): Robolinux 7.4.2, Ubuntu release day stats, Debian security, Porteus update|
|• Issue 554 (2014-04-14): Review of FreeNAS, OpenSSL bug, Fedora.next, Robolinux Stealth VM, measuring memory|
|• Issue 553 (2014-04-07): Puppy 5.7 "Slacko", end of Ubuntu One, file encryption with GPG|
|• Issue 552 (2014-03-31): Tanglu 1.0, Ubuntu GNOME LTS, SliTaz for ARM|
|• Issue 551 (2014-03-24): Linux Mint "Debian" 201403, call for end to proprietary firmware, LVM|
|• Issue 550 (2014-03-17): Review of NixOS 13.10, Lubuntu seeking feedback, Android-x86 4.4-rc1 impressions|
|• Issue 549 (2014-03-10): ClearOS 6.5 and UCS 3.2, Gentoo interview, Ubuntu app contest, Into the Core|
|• Issue 548 (2014-03-03): Review of Mageia 4, FreeBSD console driver, filtering web content, Pitivi fundraiser|
|• Issue 547 (2014-02-24): Chakra 2014.02, Ubuntu privacy, preventing unwanted remote logins|
|• Issue 546 (2014-02-17): Review of PC-BSD 10.0, Red Flag closure, Ubuntu and systemd, SlackE18, Fedora book review|
|• Issue 545 (2014-02-10): Impressions of FreeBSD 10.0, Debian votes systemd, Ubuntu file manager, server security|
|• Issue 544 (2014-02-03): Netrunner 13.12, openSUSE future, Ubuntu Touch in emulator, running commands in multiple places|
|• Issue 543 (2014-01-27): Review of Korora 20, FreeBSD 10.0, DNF, ZFS rescue CD, Bridge Linux interview|
|• Issue 542 (2014-01-20): QupZilla, Ubuntu with MATE, Arch on Raspberry Pi, best applications|
|• Issue 541 (2014-01-13): openSUSE 13.1 and Zentyal 3.3, CentOS joins Red Hat, Bodhi on Chromebooks|
|• Issue 540 (2014-01-06): SMS 2.0.6 and SME Server 8.0, Hawaii desktop, PHR statistics 2013, more on multi-part archives|
|• Issue 539 (2013-12-23): Centrych 12.04.3, Fedora 20 and its spins, dividing archives across multiple discs|
|• Issue 538 (2013-12-16): Mint 16 review, RHEL and CentOS 7 plans, SteamOS, Windows XP replacement suggestions|
|• Issue 537 (2013-12-09): OpenMandriva 2013.0, Gentoo developer interview, project Neon, Linux Mint and security|
|• Issue 536 (2013-12-02): Impressions of openSUSE 13.1, Ubuntu Touch, FreeBSD 10 delay, troubleshooting OS lock-ups|
|• Issue 535 (2013-11-25): GhostBSD 3.5, Debian and MATE, Ubuntu 14.04 features, security updates|
|• Issue 534 (2013-11-18): Review of OpenBSD 5.4, Fedora on ARM, menu names vs command-line names|
|• Issue 533 (2013-11-11): Point Linux 2.2, Pisi update, Debian and Xfce, Bruno Cornec interview|
|• Issue 532 (2013-11-04): Ubuntu and Kubuntu 13.10, Debian's init, FreeBSD's PKG-NG, Linux on ARM|
|• Issue 531 (2013-10-28): PC-BSD 9.2, openSUSE testing, nftables, upgrade pros and cons|
|• Issue 530 (2013-10-21): Kwheezy 1.2, DPL interview, Zenwalk's future, keeping up with vulnerabilities|
|• Issue 529 (2013-10-14): Ubuntu's Mir, dmesg and photorec tips, Tiny Tiny RSS|
|• Issue 528 (2013-10-07): Semplice 5, Haiku package management, Klaus Knopper interview, making custom distro|
|• Issue 527 (2013-09-30): Tiny Core Linux 5.0, SteamOS, moving operating system to new computer|
|• Issue 526 (2013-09-23): Look at ArchBang 2013.09.01, BSD Now, kernel stats, command-line tips|
|• Issue 525 (2013-09-16): The Official Ubuntu Server Book, FreeBSD 10 and OpenBSD 5.4, Skype alternatives|
|• Issue 524 (2013-09-09): Look at LXLE 12.04.3, Ubuntu's new package format, Secure Boot and dual-booting|
|• Issue 523 (2013-09-02): OpenIndiana 151a8, openSUSE "Evergreen", GNOME and DuckDuckGo, running apps from RAM|
|• Issue 522 (2013-08-26): Look at gNewSense 3.0, Ubuntu Edge fundraising failure, exploring GPL|
|• Issue 521 (2013-08-19): Review of Korora 19, Fedora considers return to "Core", Haiku package management|
|• Issue 520 (2013-08-12): Salix OS 14.0.1 "KDE", Xubuntu experiments with XMir, managing passwords with KeePass|
|• Issue 519 (2013-08-05): Review of Porteus 2.0, Kubuntu lays out plans for Wayland adoption, adjusting system swappiness|
|• Full list of all issues|