| DistroWatch Weekly
|DistroWatch Weekly, Issue 481, 5 November 2012
Welcome to this year's 45th issue of DistroWatch Weekly!
It has been another fun week in the world of open source operating systems. The highly secure and reliable OpenBSD operating system, version 5.2, was released with a number of important improvements, including the ability to allow multithread programs running on OpenBSD to use multiple CPUs. Speaking of releases, Debian, a pillar of the Linux community, is nearing its 7.0 release. Read on below for some of the interesting changes coming to the "universal operating system". Also in our News section the Electronic Frontier Foundation weighs in on Ubuntu's latest release and user privacy. Additionally, on the topic of privacy, the Tails project produces a live image which is designed to protect a user's identity and security. In this week's feature review Jesse Smith takes the Tails distribution for a spin and reports on his experience. Last week we touched briefly on a bug in the ext4 file system which may cause data corruption and Robert Storey brings us more details on the problem and suggests possible workarounds while the kernel developers prepare a fix. As usual we cover the releases of the past week, look ahead to exciting new releases and bring you news, podcasts and reviews from Around the Web. We here at DistroWatch wish you a pleasant week and happy reading!
|Feature Story (by Jesse Smith)
Tails and Claws
Over the past year I have looked at two distributions (Liberté and LPS) which have a strong focus on security. Staying secure and anonymous on-line is a popular topic these days as many people are concerned about freedom of speech and monitored communications. Many of us are concerned about our privacy and, with that in mind, I would like to introduce our readers to a Linux distribution called Tails. The Tails project is based upon Debian's Stable repositories and includes a number of privacy and security tools available out of the box. The distribution can be transferred to a USB drive or a live DVD. The distribution isn't meant to be installed to a local hard disk, but rather run from external media (specifically the documentation suggests read-only DVDs) in an effort to avoid infection of the operating system. I downloaded the project's ISO which weighs in at approximately 770MB.
Before getting into what it was like to run Tails, I first want to acknowledge the documentation provided on the Tails website. The project does a nice job of explaining potential threats, explaining what Tails will do for its users and it also goes over a list of things from which Tails will not protect people. This is good because some people seem to feel security is a binary situation, either they are secure and anonymous on-line or they aren't. The situation isn't so black & white and the Tails documentation does a nice job of telling us how the distribution can protect us and what dangers still lurk out there on the Net.
Tails 0.13 -- Website and documentation.
(full image size: 124kB, resolution: 1366x768 pixels)
When we first boot off the Tails media we're brought to a graphical screen which is essentially a login screen. However, instead of asking us for a name and password we are asked if we would like to login with the defaults or select from more options. Taking the defaults logs us into a GNOME 2 (version 2.30) desktop with a plain blue background. An application menu and system tray sit at the top of the display and a task switcher sits at the bottom of the screen. On the desktop we find icons for browsing the local file system, accessing the Tails documentation and there is an icon for launching a bug reporting wizard.
Going back to the login screen for a moment, if we do decide to browse the available options we are asked if we would like to set a password for the root account and we are given the option of logging into a desktop environment which is themed to look like Windows XP. I tried this alternative theme and the effect really is quite convincing at a glance. The same applications are available to us and the same technology protects us, but the alternative theme allows a person to avoid the attention an open source desktop might attract from casual observers.
Tails 0.13 -- Alternative desktop theme.
(full image size: 361kB, resolution: 1366x768 pixels)
Looking in the application menu we find the Iceweasel web browser, the Claws e-mail client, Pidgin for instant messaging and a Tor connection monitor. There is a second web browser entry marked "unsafe" and this menu item also launches Iceweasel, but without the benefit of Tor. Launching the unsafe browser option brings up a dialog box warning us of the risks and asking if we are sure we wish to launch the browser. Assuming we do open Iceweasel without Tor then we find Iceweasel's border has been tainted red as a reminder that its use is not recommended. Also in the application menu we find the OpenOffice suite, the Audacity audio editor, a CD ripper and the Totem video player. The PiTiVi video editor is included in the distribution and there are apps for setting up (and removing) persistent storage volumes on USB drives. Additionally, the menu holds a copy of the GNU Image Manipulation Program, Inkscape, an archive manager, a calculator and a text editor. The Orca screen reader is available to us as are the full range of GNOME configuration apps. Another handy tool presented to us is a meta data anonymizer. This application will scan files, such as images, and detect meta data stored in the file. The application will then offer to scrub the file, removing the meta data. The scrub is performed on a copy of our file, leaving the original intact. This is useful if we want to upload a file to someone without risk of having identifying marks left in the file.
Tails 0.13 -- Web browser plugins.
(full image size: 174kB, resolution: 1366x768 pixels)
Exploring Tails further we find Java is installed for us, as are popular multimedia codecs. Flash isn't included, due to security concerns surrounding the plug-in. In order to assist users in acquiring more software, the Synaptic package manager is included in the application menu. Finally, behind the scenes, the Linux kernel, version 3.2, keeps things running for us.
Besides Iceweasel there are a few programs included with Tails that can be used to communicate with the outside world and I'd like to touch briefly on two of them. The first is Pidgin, the instant messenger client. Launching Pidgin automatically connects us to an IRC server and lists two available chat channels, one for Tor and one for Tails. Here we can hope to find help in trouble-shooting problems. I tried connecting to other types of accounts Pidgin supports, but found my login attempts were blocked. I'm uncertain if this is a bug or a feature as logging in to a server with known credentials would be a security breech.
The other application I'd like to touch on briefly is Claws. Claws is an e-mail client which attempts to be both user friendly and secure. The security aspect comes from having encryption and signing support built into the e-mail client. Typically the use of encryption tools requires a plug-in, but Claws comes with security in mind by default. Aside from the built in encryption, Claws acts much like any other modern e-mail client. It reminds me a bit of Thunderbird, or perhaps Thunderbird before the developers introduced tabs. At any rate, Claws is fairly straight forward to use and supports both POP and IMAP connections. I played around with it a little and had no trouble connecting to remote servers and downloading messages. Of course, signing into a remote server gives away our identity and the headers of messages aren't encrypted, so e-mail should be used with a degree of caution.
Tails 0.13 -- The Claws e-mail client.
(full image size: 113kB, resolution: 1366x768 pixels)
I ran Tails on my laptop (dual-core 2GHz CPU, 4GB of RAM, Intel video card and Intel wireless card) and in a VirtualBox virtual machine. In both cases Tails worked well. When running on physical hardware, the distribution properly detected all of my hardware, set my screen to its maximum resolution and sound worked out of the box. Wireless networks were automatically detected and connecting was easy using Network Manager. I noticed that by default tapping my trackpad wouldn't register taps as clicks, but this feature can be enabled through the GNOME configuration menu. One nice feature of Tails is it will detect when it is running in a virtual machine and warn the user the operating system is not running directly on hardware and the session may be monitored. The GNOME 2 desktop is quite responsive and I found that, even with Tor running and accessibility features enabled, the distribution only used approximately 180MB of RAM.
Package management on Tails is handled by the Synaptic application. This graphical utility allows us to refresh our list of available packages from the Debian repositories. We can upgrade software and install new packages. Of course, when running from a DVD the changes we make to the operating system won't last through a reboot, but having a package manager available does give us some additional flexibility while using Tails. Synaptic works quickly and operated through Tor, much like Iceweasel does, hiding our IP address from the repository servers. I didn't do much with Synaptic during my trial, but I did take the time to install a few items to make sure they would install properly and I encountered no problems.
Having played around with Tails for a few days I have found it to be a pleasant, flexible platform from which to browse anonymously. I think what I enjoy most about Tails is that, unlike some specialty distributions, it feels much more like a general purpose desktop. Quite often I find projects which try to be secure or which are designed to rescue data or which have some other focus don't give the user the benefits (and flexibility) which come from running a regular desktop distribution. Tails has its focus aimed at being secure and anonymous out of the box, yet it manages to present a fairly friendly desktop and gives us the ability to get a wide range of work done and even access Debian's vast supply of software. Security may be placed first, but not in an exclusive fashion and I find that appealing. Another aspect of Tails I appreciated was the "XP" theme. The effect is really quite good and consistent, likely to mislead anyone who doesn't examine the desktop closely.
One other thing I like about Tails, and I brought this up briefly in the review of Liberté, is there are a few different approaches to take when a user wants to perform an action which is not recommended. The operating system can allow the action, the operating system can warn the user of the potential danger and then give the user a choice as to whether to proceed, or the system can block the action. Liberté opted to block unsafe actions. Tails, on the other hand, takes what I feel is the more desirable approach of educating the user about the potential dangers of their actions and then letting the user decide whether to take the risk. It is a style which protects the operator, but doesn't presume to know better than the user and I like this approach. Last, but not least, I found the documentation on the Tails website to be clear and fairly easy to navigate. The developers have done a good job of trying to educate their users, both explaining what Tails is and what it is not, and I see that as a good starting point. To date, Tails is probably my favourite security-oriented distribution.
The EFF talks about privacy and Ubuntu, Debian introduces changes to their installer and Valve seeks help testing Steam on Linux.
Canonical's decision to include on-line searches for Amazon products in the Dash of the latest version of Ubuntu stirred up some controversy and any number of bug reports from users. Some complained that the on-line search component made local searches too slow, others felt there was a privacy concern and some simply didn't want advertisements mixed in with their local search results. Others feel that Ubuntu should be able to make money with a little product placement, no harm, no foul. This past week the Electronic Frontier Foundation put forward their two cents saying "Technically, when you search for something in Dash, your computer makes a secure HTTPS connection to productsearch.ubuntu.com, sending along your search query and your IP address. If it returns Amazon products to display, your computer then insecurely loads the product images from Amazon's server over HTTP. This means that a passive eavesdropper, such as someone sharing a wireless network with you, will be able to get a good idea of what you're searching for on your own computer based on Amazon product images. It's a major privacy problem if you can't find things on your own computer without broadcasting what you're looking for to the world." The EFF goes on to acknowledge that on-line searching can be disabled and provides instructions for users who wish to either disable these searches or switch to a different desktop environment, thus side-stepping the Dash completely. The EFF's statement concludes with a list of requests for the Ubuntu developers, including changing the on-line ads feature to opt-in rather than opt-out; explaining to users in detail what is done with their search results and which third-parties get access to that data; and making the privacy settings more fine-grained.
* * * * *
The release of Debian 7.0 is getting closer and it was recently announced that the installer for 7.0 will include support for IPv6. Support for EFI has also been introduced which means the Debian installer will no longer rely on legacy BIOS code. This change may also pave the way for future support of additional features such as Secure Boot. A few months back it was announced Debian would be shipping Xfce as the default desktop on their installation media, replacing GNOME which was becoming too large to fit on a single CD. Since then work has been done to squeeze GNOME onto the installation CD and it looks as though GNOME is back in as the default Debian desktop.
* * * * *
The openSUSE developers have been working on an ARM port of the big, green operating system. Last week the developers pushed out openSUSE 12.2 for ARM, release candidate 2, with plans to release the final version November 6th. To date it looks as though the ARM port works on Chromebooks and the N900. Future plans include making openSUSE work with the popular Raspberry Pi economy computer. People looking to experiment with the new openSUSE branch can find testing images on the project's website.
* * * * *
Valve is one of the more influential gaming companies these days. Their games and their Steam platform have gained a large following, both among dedicated and casual gamers alike. This year Valve has been dipping their toes in the Linux pool, experimenting with porting their software to work with Linux distributions. This could be very good news for Linux users who want access to big name gaming titles as where Valve goes others often follow. Last week Valve put out a call for beta testers to try out the Linux version of their Steam client. If you are an experienced Linux user and have some spare time, consider helping Valve bring mainstream gaming to Linux.
|Tips and Tricks (by Robert Storey)
Ext4 Data Corruption Bug and Solution
Just when you thought it was safe...
Ext4 (the fourth extended file system) has been the gold standard for the Linux kernel ever since it was declared "stable" in October 2008. It was the direct descendant of ext3 (released November 2001) which introduced journaling to the previously unjournaled ext2 file system that has been with us since 1993.
Ever since its release into the wild, ext4 has proven to be fast and reliable. I've installed it onto more computers than I can count, and never had any reason to complain about it...until recently. But a serious bug has crept into the ext4 stable release, causing data corruption on some computers running Linux kernels 3.4, 3.5, and 3.6.
I first stumbled across this problem about six weeks ago when I was writing this review of Bodhi Linux. After installing Bodhi, it initially ran well, but by the fourth or fifth reboot problems developed. The first glitch: I couldn't log in while running Xorg, but could log in if I used text mode. A few reboots later and I couldn't log in at all -- in fact, all I saw was a blank, black screen. Needless to say, I was nonplussed and had a few email exchanges with the developer, who insisted that Bodhi was innocent. I, of course, occupied the moral high ground and nearly gave Bodhi a scathing review -- until I tried installing Lubuntu which soon developed similar problems. Properly chastised, I meekly retreated and gave Bodhi the fine review it deserved, and looked elsewhere for the cause of this debacle.
My assumption at this point was that my hard drive was probably failing. However, I had an older version of Ubuntu installed on the same hard drive and it ran smooth as silk. As it turned out, that installation was on a partition formatted with XFS, a file system that used to be my favorite because it was considerably faster than ext3. I never had any complaints about XFS and only abandoned it because most new distros no longer include the formatting command mkfs.xfs plus the necessary XFS utilities for error-checking. However, kernel support for XFS is very much alive, so it is still a viable option.
I broke out an old Slackware CD and reformatted my ext4 partition with XFS, then reinstalled Bodhi. It ran without a hiccup. Although I still wasn't confident that my hard drive was OK, I was glad to see it running well and wasn't going to look a gift horse in the mouth.
Then just last week I was installing the recently released Ubuntu 12.10 on a friend's new computer when the same thing happened. Ubuntu ran great until the third reboot, when it too began to act flaky. At first it gave me nasty error messages, but on subsequent reboot attempts it just crashed and burned. Remembering my prior experience with Bodhi, I broke out that Slackware CD and reformatted with XFS, reinstalled and all was well.
If I was seeing this, I assumed there were others in the same boat, so I went searching. With just a little bit of googling, I found this October 24 post by Michael Larabel on the Phoronix web site: EXT4 Data Corruption Bug Hits Stable Linux Kernels. You should probably read Michael's post, but in a nutshell what it says is that starting from Linux kernel 3.4 and continuing, some users are seeing file data corruption on partitions formatted with ext4.
I should stress that not everyone is experiencing this issue. Indeed, I make a habit of installing Linux on friends' computers and only two of them formatted with the latest ext4 have so far developed this problem. On the other hand, that is two too many. I am always claiming that Linux is rock-solid reliable, so it's more than a little embarrassing when I install it for someone only to see it blow up shortly thereafter.
The chief maintainer of ext4, Theodore Y. "Ted" Ts'o , is well aware of the problem and hard at work on a solution. Ted is one of the most knowledgeable people in the world when it comes to file systems and I don't doubt for a minute that he will sort out this issue. However, tracking down the bug, issuing a fix and putting it through rigorous testing takes time.
On the one hand I am somewhat reluctant to write this news story, since having a large community of beta-testers (even unwilling ones) is helpful to solving this problem. On the other hand, some of us value our data more than life itself (did I just say that?), so we need a solution right now. Thus, I would like to make a few suggestions to those of you who have been bit by this bug, or are at least very concerned about it.
At the minimum, your various removable backup devices (external USB hard drive and USB memory sticks) should be formatted with either FAT32 (the factory default in almost every case) or ext2. I personally prefer ext2 as it supports such niceties as file ownership and uses space more efficiently. In fact, I've been using ext2 for this purpose long before this ext4 bug ever hit, because there really is no need for journaling on a backup device.
On your hard drive itself, a minimum precaution would be to have a separate /home partition formatted with a file system other than ext4. This would at least protect your precious data even if the root partition crashes and burns. However, most people (present company included) tend to put everything under the "/" root partition, /home included. Furthermore, it's kind of inconvenient to have your root file system crash, though again I stress that only a minority of users are actually experiencing this.
If you decide do as I've done and go with XFS, there are a few tricks to installing it. As I already said, practically every distro comes with a kernel with XFS support baked in, but you need the formatting and maintenance utilities. You can hunt around for a live CD that already has mkfs.xfs installed. I used Slackware 13, but there are many others.
Alternatively, you could boot up even the latest Ubuntu live CD and install package XFSprogs before you run the installer. The Ubuntu installation program allows you choose XFS under the "something else" option for disk partitioning, but if you don't have XFSprogs installed, it won't be able to format the partition with that file system.
You may find that after you've installed your favorite distro on an XFS partition, on first boot-up you'll be greeted with this disheartening error message (as I saw on Ubuntu):
Serious errors were found while checking the disk drive for /. Press I to ignore, S to skip mounting or M for manual.
As scary as that message looks, there was nothing wrong with the disk. The problem was simply that since package XFSprogs was not installed by default, there were no XFS file system checking utilities. Thus, file system integrity could not be checked on boot-up and the attempt to do so failed. The simple solution is to press I to "ignore" and then after boot-up, install XFSprogs. On subsequent restarts, the error message should be absent.
Now that I've hyped XFS, I should probably mention that there are a few other ancient alternatives passed down to us by our ancestors. Why not simply go back to good old ext3? Probably not a good idea, for the reason it was abandoned in the first place - it was slow. Indeed, the old ext2 file system was significantly faster than ext3, but it lacked a journal. Aside from lackluster performance, ext3 had a few other drawbacks which you can read about here.
Another competitor in the file system wars is ReiserFS. Once very popular, it was the default on a number of distros I used (SUSE, for example). However, the murder conviction of chief developer Hans Reiser put a dark cloud over the whole project and no one really likes to talk about it. Nevertheless, the Linux kernel still has support, and if you want to try it look for the package reiserfsprogs.
One more alternative is JFS (the Journaled File System). This is an open-source implementation of a commercial file system that was used on IBM's trusty old AIX operating system. From what I understand, it works well enough though I've never used it personally. I don't know any distros that default to JFS, but it's still supported in the Linux kernel. The package you'll need is jfsutils. Using JFS might at least give you the warm fuzzy feeling of knowing that it was developed by a major brand-name tech company.
On the other hand, my personal favorite, XFS, was also a corporate spin-off. Developed by the now-defunct SGI (Silicon Graphics, Inc), it was the star file system of the IRIX OS and was considered very advanced for its time. Now that SGI is no longer with us, all development work on XFS has ceased. Given the fact that such development has introduced bugs into ext4, that might be a good thing.
|Released Last Week
Ryan Finnie has announced the release of Finnix 106, a small, self-contained, bootable Linux CD distribution for system administrators, based on Debian's testing branch: "Today I am pleased to announce the release of Finnix 106, which contains an important kernel update as well as minor fixes and improvements. Finnix 106 includes Linux kernel 3.5, and notably fixes a major bug observed in Finnix 105 where booting would freeze if the system's disk included an extended partition. With Finnix 105, Project NEALE was announced - an effort to build Finnix releases in a completely automated and normalized way. Finnix 105 was the first release to be produced with NEALE, but the build infrastructure was not available to the public at the time. For Finnix 106, the build infrastructure has been finished and released to the public." See the release announcement and release notes for more details.
Parabola GNU/Linux 2012.10.17
André Fabian Silva Delgado has announced the release of Parabola GNU/Linux 2012.10.17, a new version of the project's Arch-based distribution containing strictly free software only: "There is a new install medium available. We plan to release new installation media monthly. The live system can be used for new installs or as a rescue system. We have updated packages, fixed bugs and we have done the following visible changes: first medium with Linux-libre 3.6 (3.6.2) with Atheros AR8162 (ALX driver) support; the script boot parameter works again; when booting via PXE and NFS or NBD the ISO will be copied to RAM to ensure a more stable usage; the live medium contains usb_modeswitch and wvdial which allows to establish a network connection using an UMTS USB dongle; the newest version of systemd and netcfg are included...." Read the remainder of the release announcement for further details.
Dimitris Tzemos has announced the release of Slackel KDE-4.9.2, a live Slackware-based distribution with the very latest KDE desktop environment: "Slackel Live KDE-4.9.2 has been released. A collection of two KDE live DVD images are immediately available that can be burned to a DVD or used with a USB drive. The Slackel live DVD images include Linux kernel 3.2.29. Slackel Live KDE-4.9.2 includes the current tree of Slackware Linux and KDE 4.9.2, accompanied by a rich collection of KDE-centric software. Firefox 16.0.2, KMail, KTorrent, Akregator, Kopete, OpenJRE 7u9, Pidgin, gFTP, GParted, wicd, slapt-get and Gslapt, sourcery. In the multimedia section Bangarang 2.1, Clementine 1.0.1, K3b 2.0.2 are all included." See the release announcement to find out more about the release.
Bob Beck has announced the release of OpenBSD 5.2, a free, multi-platform BSD-based UNIX-like operating system: "We are pleased to announce the official release of OpenBSD 5.2. This is our 32nd release on CD-ROM. We remain proud of OpenBSD's record of more than ten years with only two remote holes in the default install. As in our previous releases, 5.2 provides significant improvements, including new features, in nearly all areas of the system. The most significant change in this release is the replacement of the user-level uthreads by kernel-level rthreads, allowing multithreaded programs to utilize multiple CPUs/cores. Some highlights: GNOME 3.4.2, KDE 3.5.10, Xfce 4.10, MySQL 5.1.63, PostgreSQL 9.1.4, Postfix 2.9.3, Mozilla Firefox 3.5.19, 3.6.28 and 13.0.1, Mozilla Thunderbird 13.0.1, LibreOffice 3.5.5...." See the OpenBSD 5.2 release page which includes a detailed list of all changes and improvements.
Tiny Core Linux 4.7
Robert Shingledecker has released version 4.7 of Tiny Core Linux, a minimalist but extensible graphical Linux distribution for desktop computers. From the release announcement: "I am pleased to announce the release of Core 4.7. Change log: updated ondemand to support scm extensions and icons from both tcz and scm; updated wbar - to support scm ondemand icons; updated scmapps GUI for new ondemand maintenance and download option; updated scm-load - new option -wo ondemand download; updated tc-functions - added new support functions; updated scm to interface to updated scmaps GUI; new scm-run to support scriptable load and launch scm style extensions; updated filetool - new GUI access to filetool.lst, .xfiletool.lst, and backup options; updated filetool.sh to interface to updated filetool GUI; updated apps GUI - New Check Onboot Unneeded and changes required by ondemand scm support...."
Arch Linux 2012.11.01
Pierre Schmitz has announced the availability of Arch Linux 2012.11.01, the latest of the regular installation CD images that the project providing a popular rolling-release Linux distribution now makes available at the beginning of each month. This is mostly a bug-fix release. From the release announcement: "The latest snapshot of our install and rescue media can be found on our download page. The 2012.11.01 ISO image mainly contains minor bug fixes, cleanups and new packages compared to the previous one: first media with Linux kernel 3.6; copytoram=n can be used to not copy the image to RAM on network boot - this is probably unreliable but an option for systems with very low memory; cowfile_size boot parameter mainly for persistent COW on VFAT, see the README file for details."
DragonFly BSD 3.2.1
Justin Sherrill has announced the release of DragonFly BSD 3.2.1, an updated version of the BSD operating system originally forked from FreeBSD 4: "The 3.2.1 release of DragonFly BSD is available now. Significant work has gone into the scheduler to improve performance, using postgres benchmarking as a measure. See the PDF of graphed results to see the improvements. DragonFly should be now one of the best selections for PostgreSQL and other databases. USB4BSD has been incorporated into this release. More USB devices are compatible with DragonFly, and xhci (USB 3.0) users may be able to take full advantage of their newer hardware. Since this is a new feature, it is available in 3.2 but not built by default." See the release announcement and the release notes for further information.
* * * * *
Development, unannounced and minor bug-fix releases
|Upcoming Releases and Announcements
Summary of expected upcoming releases
|Around the Web
* * * * *
* * * * *
New distributions added to waiting list|
- Maui. Maui aims to be a user-friendly desktop operating system which aims to reduce the learning curve required from new users. It has an appliance-like approach and one of the project's goals is to have a distribution which can boot in under four seconds.
- sposkpat. A single purpose operating system designed to offer a distraction in the form of the Kpatience card game.
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 12 November 2012. To contact the authors please send email to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, suggestions and corrections: news, donations, distribution submissions, comments)
- Bruce Patterson (feedback and suggestions: podcast edition)
|Linux Foundation Training
|• Issue 841 (2019-11-18): Emmabuntus DE3-1.00, changing keys in a keyboard layout, Debian phasing out Python 2 and voting on init diversity, Slackware gets unofficial updated live media|
|• Issue 840 (2019-11-11): Fedora 31, monitoring user activity, Fedora working to improve Python performance, FreeBSD gets faster networking|
|• Issue 839 (2019-11-04): MX 19, manipulating PDFs, Ubuntu plans features for 20.04, Fedora 29 nears EOL, Netrunner drops Manjaro-based edition|
|• Issue 838 (2019-10-28): Xubuntu 19.10, how init and service managers work together, DragonFly BSD provides emergency mode for HAMMER, Xfce team plans 4.16|
|• Issue 837 (2019-10-21): CentOS 8.0-1905, Trident finds a new base, Debian plans firewall changes, 15 years of Fedora, how to merge directories|
|• Issue 836 (2019-10-14): Archman 2019.09, Haiku improves ARM support, Project Trident shifting base OS, Unix turns 50|
|• Issue 835 (2019-10-07): Isotop, Mazon OS and, KduxOS, examples of using the find command, Mint's System Reports becomes proactive, Solus updates its desktops|
|• Issue 834 (2019-09-30): FreedomBox "Buster", CentOS gains a rolling release, Librem 5 phones shipping, Redcore updates its package manager|
|• Issue 833 (2019-09-23): Redcore Linux 1908, why Linux distros are free, Ubuntu making list of 32-bit software to keep, Richard M Stallman steps down from FSF leadership|
|• Issue 832 (2019-09-16): BlackWeb 1.2, checking for Wayland session and applications, Fedora to use nftables in firewalld, OpenBSD disables DoH in Firefox|
|• Issue 831 (2019-09-09): Adélie Linux 1.0 beta, using ffmpeg, awk and renice, Mint and elementary improvements, PureOS and Manjaro updates|
|• Issue 930 (2019-09-02): deepin 15.11, working with AppArmor profiles, elementary OS gets new greeter, exFAT support coming to Linux kernel|
|• Issue 829 (2019-08-26): EndeavourOS 2019.07.15, Drauger OS 7.4.1, finding the licenses of kernel modules, NetBSD gets Wayland application, GhostBSD changes base repo|
|• Issue 828 (2019-08-19): AcademiX 2.2, concerns with non-free firmware, UBports working on Unity8, Fedora unveils new EPEL channel, FreeBSD phasing out GCC|
|• Issue 827 (2019-08-12): Q4OS, finding files on the disk, Ubuntu works on ZFS, Haiku improves performance, OSDisc shutting down|
|• Issue 826 (2019-08-05): Quick looks at Resilient, PrimeOS, and BlueLight, flagship distros for desktops,Manjaro introduces new package manager|
|• Issue 825 (2019-07-29): Endless OS 3.6, UBports 16.04, gNewSense maintainer stepping down, Fedora developrs discuss optimizations, Project Trident launches stable branch|
|• Issue 824 (2019-07-22): Hexagon OS 1.0, Mageia publishes updated media, Fedora unveils Fedora CoreOS, managing disk usage with quotas|
|• Issue 823 (2019-07-15): Debian 10, finding 32-bit packages on a 64-bit system, Will Cooke discusses Ubuntu's desktop, IBM finalizes purchase of Red Hat|
|• Issue 822 (2019-07-08): Mageia 7, running development branches of distros, Mint team considers Snap, UBports to address Google account access|
|• Issue 821 (2019-07-01): OpenMandriva 4.0, Ubuntu's plan for 32-bit packages, Fedora Workstation improvements, DragonFly BSD's smaller kernel memory|
|• Issue 820 (2019-06-24): Clear Linux and Guix System 1.0.1, running Android applications using Anbox, Zorin partners with Star Labs, Red Hat explains networking bug, Ubuntu considers no longer updating 32-bit packages|
|• Issue 819 (2019-06-17): OS108 and Venom, renaming multiple files, checking live USB integrity, working with Fedora's Modularity, Ubuntu replacing Chromium package with snap|
|• Issue 818 (2019-06-10): openSUSE 15.1, improving boot times, FreeBSD's status report, DragonFly BSD reduces install media size|
|• Issue 817 (2019-06-03): Manjaro 18.0.4, Ubuntu Security Podcast, new Linux laptops from Dell and System76, Entroware Apollo|
|• Issue 816 (2019-05-27): Red Hat Enterprise Linux 8.0, creating firewall rules, Antergos shuts down, Matthew Miller answers questions about Fedora|
|• Issue 815 (2019-05-20): Sabayon 19.03, Clear Linux's developer features, Red Hat explains MDS flaws, an overview of mobile distro options|
|• Issue 814 (2019-05-13): Fedora 30, distributions publish Firefox fixes, CentOS publishes roadmap to 8.0, Debian plans to use Wayland by default|
|• Issue 813 (2019-05-06): ROSA R11, MX seeks help with systemd-shim, FreeBSD tests unified package management, interview with Gael Duval|
|• Issue 812 (2019-04-29): Ubuntu MATE 19.04, setting up a SOCKS web proxy, Scientific Linux discontinued, Red Hat takes over Java LTS support|
|• Issue 811 (2019-04-22): Alpine 3.9.2, rsync examples, Ubuntu working on ZFS support, Debian elects new Project Leader, Obarun releases S6 tools|
|• Issue 810 (2019-04-15): SolydXK 201902, Bedrock Linux 0.7.2, Fedora phasing out Python 2, NetBSD gets virtual machine monitor|
|• Issue 809 (2019-04-08): PCLinuxOS 2019.02, installing Falkon and problems with portable packages, Mint offers daily build previews, Ubuntu speeds up Snap packages|
|• Issue 808 (2019-04-01): Solus 4.0, security benefits and drawbacks to using a live distro, Gentoo gets GNOME ports working without systemd, Redox OS update|
|• Issue 807 (2019-03-25): Pardus 17.5, finding out which user changed a file, new Budgie features, a tool for browsing FreeBSD's sysctl values|
|• Issue 806 (2019-03-18): Kubuntu vs KDE neon, Nitrux's znx, notes on Debian's election, SUSE becomes an independent entity|
|• Issue 805 (2019-03-11): EasyOS 1.0, managing background services, Devuan team debates machine ID file, Ubuntu Studio works to remain an Ubuntu Community Edition|
|• Issue 804 (2019-03-04): Condres OS 19.02, securely erasing hard drives, new UBports devices coming in 2019, Devuan to host first conference|
|• Issue 803 (2019-02-25): Septor 2019, preventing windows from stealing focus, NetBSD and Nitrux experiment with virtual machines, pfSense upgrading to FreeBSD 12 base|
|• Issue 802 (2019-02-18): Slontoo 18.07.1, NetBSD tests newer compiler, Fedora packaging Deepin desktop, changes in Ubuntu Studio|
|• Issue 801 (2019-02-11): Project Trident 18.12, the meaning of status symbols in top, FreeBSD Foundation lists ongoing projects, Plasma Mobile team answers questions|
|• Issue 800 (2019-02-04): FreeNAS 11.2, using Ubuntu Studio software as an add-on, Nitrux developing znx, matching operating systems to file systems|
|• Issue 799 (2019-01-28): KaOS 2018.12, Linux Basics For Hackers, Debian 10 enters freeze, Ubuntu publishes new version for IoT devices|
|• Issue 798 (2019-01-21): Sculpt OS 18.09, picking a location for swap space, Solus team plans ahead, Fedora trying to get a better user count|
|• Issue 797 (2019-01-14): Reborn OS 2018.11.28, TinyPaw-Linux 1.3, dealing with processes which make the desktop unresponsive, Debian testing Secure Boot support|
|• Issue 796 (2019-01-07): FreeBSD 12.0, Peppermint releases ISO update, picking the best distro of 2018, roundtable interview with Debian, Fedora and elementary developers|
|• Issue 795 (2018-12-24): Running a Pinebook, interview with Bedrock founder, Alpine being ported to RISC-V, Librem 5 dev-kits shipped|
|• Issue 794 (2018-12-17): Void 20181111, avoiding software bloat, improvements to HAMMER2, getting application overview in GNOME Shell|
|• Issue 793 (2018-12-10): openSUSE Tumbleweed, finding non-free packages, Debian migrates to usrmerge, Hyperbola gets FSF approval|
|• Issue 792 (2018-1203): GhostBSD 18.10, when to use swap space, DragonFly BSD's wireless support, Fedora planning to pause development schedule|
|• Issue 791 (2018-11-26): Haiku R1 Beta1, default passwords on live media, Slax and Kodachi update their media, dual booting DragonFly BSD on EFI|
|• Issue 790 (2018-11-19): NetBSD 8.0, Bash tips and short-cuts, Fedora's networking benchmarked with FreeBSD, Ubuntu 18.04 to get ten years of support|
|• Issue 789 (2018-11-12): Fedora 29 Workstation and Silverblue, Haiku recovering from server outage, Fedora turns 15, Debian publishes updated media|
|• Full list of all issues|
Star Labs - Laptops built for Linux.
View our range including the Star Lite, Star LabTop and more. Available with a choice of Ubuntu, Linux Mint or Zorin OS pre-installed with many more distributions supported. Visit Star Labs for information, to buy and get support.
|Random Distribution |
VenenuX is a South American desktop distribution based on Debian GNU/Linux and intended primarily for Spanish-speaking users. It adheres strictly to the principles of free software as defined by the Free Software Foundation.