| DistroWatch Weekly
|Linux Foundation Training
|Reader Comments • Jump to last comment
1 • Disk encryption (by pcninja on 2015-09-21 00:40:10 GMT from North America) |
I don't use disk encryption, but I want to. The only reason why I don't do it, is because I lack back-up medium and I don't know how to set it up. Also, I don't really want to have to do a fresh install if something goes wrong.
2 • Disk Encryption (by KenWeiLL on 2015-09-21 02:04:26 GMT from Asia)
I don't use disk encryption too. Afaik, it degrades disk's read-write (speed) performance?
3 • disk encryption... (by tom joad on 2015-09-21 02:23:53 GMT from Europe)
I just started using encryption on my laptop. I did just the ubuntu mate partition and I used luks or whatever is included when you do a new ubuntu install.
My hard drive is an SSD so I haven't really noticed a performance hit. When I encrypted the partition I put a 18 character password on it. So far that has worked fine.
Personlly I really like the security that if someone grabs my laptop I can be pretty certain they wouldn't get my stuff. If they want it they will have to work at it.
After I did my laptop I attempted to encrypt a traditional 320 gig western digital hard drive in my tower. There I did experience a performance hit, a big one. My tower took forever to start, it was cranky and hung a lot. So I did a clean re-install and it is fine.
Personally, I think encryption of an entire disk is good bet. For business folks, lawyers, government employes, military personnel, etc I think encryption makes good, reasonable and prudent sense.
4 • Disk Encryption (by John on 2015-09-21 04:23:14 GMT from North America)
I prefer to use a truecrypt vault on a usb flash drive to store passwords that are sensitive such as money accounts and the like. Other passwords that are less sensitive such as email, forum passwords etc. I use kee pass. I also use encfs to encrypt certain folders on dropbox. When the distro allows it I like to encrypt at least my home folder in case my laptop is lost or stolen. Might as well make it as hard as possible for the thief to crack it.
5 or 6 character passwords isn't strong enough to keep a kid out. Passwords needs to be 10 characters or more with mixed uppercase, lowercase, digits, symbols. 16 characters is fair, 32 characters desirable, 63 if you're paranoid. Even your WiFi pass phrase needs to be strong. The longer the better.
Encryption isn't un-breakable. The strongest password can be cracked given enough time and resources. Why make it easy, make it as hard as possible.
5 • Ultimate Edition (by Baltazar on 2015-09-21 06:14:00 GMT from North America)
I just tried Ultimate Edition and it looks nice... a bit to dark themed to my like though. It feels snappy and all on my SSD, but the one roadblock I have found is that its Software Center will not work...
And, I missed the option or something and installed it to Mate desktop instead of Xfce...
Anyone feel that UE's page is a bit bland and its requirements to post to its page a bit excessive... feel like they will ask for social security numbers at any moment now. Gives a bad jive...
6 • Disk Encryption (by Bob on 2015-09-21 06:57:44 GMT from Europe)
Disk encryption - what for? I am too lazy to do backups. So it is always good to know that NSA can do that easily for me :-)
7 • Accessing hard disk images (by HermanH on 2015-09-21 07:41:59 GMT from Europe)
Use kpartx for accessing parttitions in a hard disk image:
8 • Rubberhose filesystem (by Paraquat on 2015-09-21 07:44:52 GMT from Asia)
I don't normally bother to encrypt my hard drive. I just make sure that there isn't anything risky on there like credit card numbers and passwords.
Closely related to this topic...Julian Assange. He's famous now for Wikileaks, but most people don't know (or have forgotten) that he was a pretty famous hacker in his youth, and is one of the authors of the rubberhose filesystem on which most modern disk encryption is based:
If you haven't seen it yet, it's worth tracking down a copy of the film "Underground: The Julian Assange Story". Even non-geeks I know liked it:
9 • Finally a stable Semplice Linux (by Flynn on 2015-09-21 08:18:46 GMT from Europe)
I'm really glad, that the Team around Semplice has been released a second branch, now based on Debian stable. And "Semplice for Workstations" (Jethro Tull) is a nice name and also a great description. IMHO. Now everone can choose between Semplice based on sid and Semplice based on stable. I'm looking forward to. Great work@Team Semplice
10 • Crypto Needs Help (by Arch Watcher 402563 on 2015-09-21 10:19:55 GMT from North America)
The threat model of "someone else's hands" needs clarity. The common cases are (ex-) friends, family, or colleagues -- frenemies. But malice isn't necessary. A workplace computer shuffle can put one user's e-mail in the hands of a new hire. An encrypted disk won't help.
What's needed are security at desktop and app levels. The best comes from keyfiles on external USB dongles for data access, even if you have the computer AND the user login AND the encrypted disk gets automounted. There isn't enough focus on such rigging.
There's little focus on simple sweeping. There are "recent documents" listings all over $XDG_CONFIG_HOME. Autoclean them at shutdown or on demand. Ditto personal search engines and databases. Offer ways to shut them off completely, e.g. Arch AUR package akonadi-fake. Switch avahi off by default at installation.
The CPU may matter more than disk encryption. Search the terms "processor+backdoor" for many interesting reads.
11 • Disk Encryption (by Stan on 2015-09-21 10:44:35 GMT from Europe)
I'm surprised to see that at the moment of this post, 67% of voters does not use Disk Encryption.
I don't use Disk Encryption because my main computing happen on a Desktop, if someone breaking in physically where is located I would have bigger problems, my Desktop data would be an insignificant damage.
In my smartphone I don't use encryption either, because I follow my own strict personal policy: *No Internet Banking* *No e-shopping* *No sensitive data*
I use Encrypted Containers instead, e.g. TrueCrypt, and offline password manager.
My important data in the "cloud" most likely will be in an encrypted container.
IMHO disk encryption is mainly for highly mobile users who carries all their sensitive data everywhere.
What I do not like of Disk Encryption it mainly protects your data hen the device is powered off.
12 • Disk encryption (by solt87 on 2015-09-21 11:44:19 GMT from Europe)
I encrypt everything but the /boot partition, but I selected "whole disk" as the closest option.
Yes, it affects disk performance, but with standard LUKS parameters, it's subjectively unnoticeable.
13 • Semplice Linux (by Wse on 2015-09-21 12:02:07 GMT from Europe)
A marvelous distro based on Debian Jessie and Openbox! Everyone should try it and once you try it, you'd want to use it.
This Eugenio Paolantonio has a very good feeling on aesthetics.
14 • Disk Encryption (by Sitwon on 2015-09-21 13:40:34 GMT from North America)
Over the past few years I have been transitioning all of my systems to Full-Disk Encryption. On some distributions it is handled automatically by the installer, on others it requires some manual intervention during the install. But at run-time, you only notice it when you boot the machine and need to decrypt the drive. There's no noticeable difference in performance.
As for doing a fresh install when something goes wrong... the only thing that would force you to do a fresh install would be corrupting the partition table (you'd be doing a fresh install anyways) or losing the password/key you use to decrypt the drive. When you boot from a rescue CD, you might have to type one extra command to decrypt the disk, but after that it's just like recovering any other system.
If you use the computer for work, encrypting the hard drive can go a long way to saving your company and saving your job should the computer or drive ever be stolen. From a compliance stand point, the company doesn't need to report it as a breech if the drive was encrypted.
If it's your personal computer or device, it's still a worthwhile exercise. Even if you don't use that device for banking or "sensitive data", you'd probably be surprised at how much damage could be done with data you didn't think was sensitive. Or how much sensitive data could be compromised from just that little bit of access.
Encryption doesn't protect your data from the government. A judge can compel you to decrypt a drive if prosecutors can convince them that there is relevant evidence on the drive. However, it could force prosecutors to notify you earlier in the process if you the subject of an investigation, which would give you additional time to prepare your defense. And even though the judge can compel you to decrypt the drive, it could give you some leverage to bargain (plea bargains or immunity) depending on the charges and evidence in question.
Many people will be thinking at this point, "I'm innocent, I have nothing to hide. Why should I care?" But the reality is that you may be charged for something that you didn't know was a crime, or you may be unknowingly complicit in someone else's crime, or you may just be falsely accused of a crime. Having an encrypted drive is an additional layer of legal defense for law-abiding citizens. The fact that your drives are encrypted cannot be used as evidence of wrongdoing. (Just as locking your car doors is not evidence that you're smuggling drugs.)
There are some out there who get really paranoid about encryption and imagine they live in a world of spy-craft and sophisticated attackers who want to steal their data. Realistically, that's probably not you. The more likely threat vector is that an opportunistic thief will steal your device and try to resell it for a quick buck. They won't be sophisticated enough to do a coldboot attack, or even know what that is. On the off chance that you're targeted for your data, at least you've added one more obstacle to slow them down. It complicates the theft and increases the chance that they will be caught. And again, it's a worthwhile mitigation because it gives you a bit more time to react to the theft and protect yourself.
Security is not about preventing risk, it's about mitigating risk.
The only cost is the one-time investment in learning about LUKS and how to use it. But that could potentially save you from losing everything you have. So this simple mitigation is worth the cost.
15 • Accessing hard disk images (by yetanothergeek on 2015-09-21 14:32:27 GMT from North America)
If you pass the -P or --partscan option to losetup, it will automatically create a separate loopback device for each partition of a disk image.
# losetup --show -f -P full-disk.img
# ls /dev/loop0*
/dev/loop0 /dev/loop0p1 /dev/loop0p2 /dev/loop0p3 /dev/loop0p4
# mount /dev/loop0p2 /my-data/
# do-something-with /my-data/
# umount /my-data/
# losetup -d /dev/loop0
BTW, while full disk images certainly have their uses, it seems like a horribly inefficient way to back up a system. For one thing, you are likely to be needlessly backing up several GB of free space. It also makes it difficult to manage incremental backups. In the event of a catastrophic disk failure, you're probably better off partitioning a new disk from scratch anyway rather than trying to restore the entire disk layout from a backup.
16 • a (by a on 2015-09-21 14:44:45 GMT from Europe)
I have LUKS encryption on a data drive, so I voted "other". I used to use that drive with an "old" CPU but it made everything very slow, so I switched to an unencrypted drive later.
People saying "I use an SSD so encryption doesn’t slow things down" don’t make much sense, because it’s the CPU that decrypts and encrypts the data; the amount of data stays the same. If anything, using encryption on an SSD could slow things more than on an HDD if the controller does on the fly compression (encrypted data can’t be compressed, so the SSD will have to read and write more), and because the time needed by the CPU to handle encryption will be more noticeable compared to the time needed by the drive to access the data.
To comment 14 (Sitwon), I doubt the law about encryption is the same in every country on the planet.
17 • Disk Encryption (by Stan on 2015-09-21 15:09:43 GMT from Europe)
Interesting comment, I still cannot find a real value of full disk encryption for personal use on desktops. My data will be secure only when the device is powered off and I'm not subject of a legal process, other than that these days most of the threats are online. However I highly recommend encrypted file containers.
To me encrypting my /home folder or entire disk makes no sense if I have to de-crypt the data to be able to run a "dangerous" web browser, I rather prefer to protect only the important parts and unlock it on demand when I need something.
18 • Disk Encryption (by Kekinash on 2015-09-21 16:58:53 GMT from North America)
Here in the US you must have your computer and all mobile items encrypted, no because the government, I don't care about them, they already have the backdoors to access my encrypted data , but because ID thieves. If you are like me, keeping on the computer bank statements, and all kind of sensitive data, you must protect your computer, and encryption is another layer thieves must peel before accessing it. Of course you need to protect your computer or mobile when is on.
Not doing it is just be lazy and irresponsible.
19 • Disk Encryption (by lashley on 2015-09-21 20:31:04 GMT from North America)
I do do not use encryption simply as other has stated not keeping sensitive data on their PC. I run multiple drives for multiple reasons which are not a security concern.
My main concern would be banking and financial institutions selling personal sensitive info to the highest bidder.
My country's complacency in regards to safeguarding personal information of citizens they have collected and allowing hostile nations gaining access to that information. No excuses.
20 • Disc Encryption & the "Ring -2" Bug in Intel Chips 1995-2011 (by anamezon on 2015-09-21 21:03:04 GMT from Europe)
Disc encryption is all fine and good (though IMHO a bit of overkill in most users' cases) if sensitive (or not-so-much) data needs to be somewhat protected e.g. during disc transfers or in case of a theft, etc.; however in case of systems with Intel chips (starting with Pentium Pro ca. 1995 and up to Sandy Bridge ca. 2011, take a look here, if you want:
) it will be just of a minor nuisance for an skillful person with access to the system - the CPUs themselves are irreparably (!!!) buggy on level "ring -2" a.k.a. SMM, making them succeptible to rootkits underneath everything else - userland, OS & kernel, even the chip hypervisor :( so, encrypt all you like, on such systems whatever passes for decryption through the CPU is already in a readily-obtainable form ... sad but true, and it seems there is no fix for these series of Intel CPUs ...
21 • Disk encription (by Wse on 2015-09-21 21:15:51 GMT from Europe)
Let's say you have your home partition encripted. You boot your computer with a Linux live iso, then make yourself root and quite easily read that encripted partition of the your distro. It is quite easy to get inside the password blocked Windows installation with practically any Linux Live iso. You can even delete the parts or whole of system32 and completely disable that installation. There are some isos boot straight into root, such as Puppy or System Rescue. Try to encript your home partition, or directory and then check it with a live iso.
Should we encript?
22 • Disk encryption (by Stan on 2015-09-21 22:01:41 GMT from Europe)
Disk encryption does not save you from this situation
You better shutdown that pc to be safe.
23 • The New (Mint 17.3) Desktop Settings Tool (by late-to-the-party on 2015-09-22 00:15:10 GMT from North America)
I'm surprised no one is commenting on Mint's (new) Desktop Settings Tool ... for me, changing desktops without logging out is exciting news. I expect to eventually see the feature "cloned" in many distros. Well done, Team Mint!
24 • Disk Encryption (by Ari Torres on 2015-09-22 00:32:54 GMT from North America)
no encryption for this boy,are we safe? i don't care :)
25 • Encryption that really worketh well. (by Ted on 2015-09-22 00:39:11 GMT from North America)
The best and most reliable encryption is "no storage devices" as were available in the early 1960s. Not needed then, not needed now, though when one must, be wise to employ non-conventional means of storage.
Then consider something simple enough that its structure is finite in normal calculations and infinite in transition calculations. This enables a dynamic variable that with cybernetic assistance cannot be possible for humans to hack.
Keep it simply symbiotic.
26 • Linux Mint 17.3 .. Switch Desktops without Logging Out .. (by Graham_J on 2015-09-22 00:46:48 GMT from Oceania)
Why would anybody want to do that??
27 • @26 and disk encryption (by Will B on 2015-09-22 02:06:12 GMT from North America)
[ @26, Graham_J ]
I think that would be a really cool feature because you can sample different desktop environments and window managers on-the-fly (at least, seems that what they said). I would welcome such a feature, although I'm pretty set on Openbox.
[ Encryption ]
I personally don't use it, but I have set up encrypted FreeBSD and Ubuntu systems for customers (see my blog for articles). I think encryption is important, but I'm just either too lazy or change distros/OS's too frequently.
28 • Mint Window managers (by hhh on 2015-09-22 03:13:16 GMT from North America)
>Why would anybody want to do that??
To switch the window manager without logging out?
29 • @ 23, 26 & 28 Window managers (by Wse on 2015-09-22 05:26:20 GMT from Europe)
In Linux, isn't it simply "window-manager --replace?"
30 • Encryption & WMs (by M.Z. on 2015-09-22 06:16:29 GMT from North America)
Why would it possibly be considered lazy if I have no sensitive data on my computer? If fact encryption would be a useless waste of time & effort if you avoid storing sensitive data on your PC or worse a laptop. Indeed the only truly irresponsible thing would be to carry sensitive info around everywhere on an easily stolen laptop, but if you have nothing worth stealing then who cares?
As 28 & 29 hint at this is only the Window Manager we are talking about. It's a bit of a back end thing that will have no effect on what desktop you are using, it'll just enable wobbly windows as soon as you switch to Compiz. Not a bad enhancement but for my part I was far more impressed by this Compton compositor thing. I've noticed a fair amount of tearing while streaming video from certain sites in Linux & I'm glad to hear about this improvement for XFCE. I've really only noticed good tear free rendering in KDE up till now, so it's nice to know there are other options that may be equally good. Thanks to the Linux Mint team for making the option available & easy to use.
31 • changing WINDOW MANAGERS under Linux Mint MATE and Xfce... (by frodopogo on 2015-09-22 09:33:40 GMT from North America)
Go back and read carefully.....
it's not about changing desktops, it's about changing Window Managers.
I'm not familiar with any in the list but Compiz.
These kinds of things have performance quirks. In electric guitar circles, we have the idea of an A/B comparison, where you can switch immediately between two guitar effects so your ear can hear the most vivid contrast between them. If it takes too long to switch, you tend to forget part of what the first sound was, so when you hear the second sound, the contrast isn't that vivid.
In the same way, I can see how with something governing desktop effects, it would be handy to be able to try one, then immediately switch to another so any contrast in performance or appearance is as vivid as possible. Then will you truly be able to make an informed decision about which you prefer, without the memory of the first one fading before you apply the second one.
32 • #! Returns as BunsenLabs 8.2 (Hydrogen) RC1 (by TheGreatControversy on 2015-09-22 12:41:06 GMT from North America)
BunsenLabs 8.2 looks like the legit continuation of CrunchBang. :) Hopefully UEFI support is added to the final release, otherwise it will be for me, only the occasional use in V-Box.
33 • Mounting partitions in image (@8,15) (by PePa on 2015-09-22 17:41:07 GMT from Asia)
Like comment 8, mounting partitions within an image is easy with kpartx. Unfortunately, on my system, losetup doesn't offer a -P option...
This creates the mapper to the partitions:
sudo kpartx -av full-disk.img
This mounts the second partition on mountpoint my-data:
sudo mount /dev/mapper/loop2p2 my-data
34 • Encryption (by Poet Nohit on 2015-09-22 20:43:29 GMT from North America)
Using encryption is a waste of resources. It does not protect against anything except the most casual of snoops (which you shouldn't care about in the first place).
If you need your data protected, your best bet is to steghide it and memorize the passwords involved. Otherwise, you're just kidding yourself.
35 • Mint 17.3 (by lashley on 2015-09-22 23:47:30 GMT from North America)
I have to agree with the vast majority of comments on switching window managers without logging out. There is no need for such tool, no point in it.
Would suggest improving the distro and moving all the desktop environments to LMDE2.
That would be a more logical and sensible switch.
36 • Multiple Subjects (by Chris on 2015-09-23 03:08:04 GMT from North America)
IMO, each person & organization needs to identify their own Threat Model, create a corresponding Security Plan, and implement their plan. Such a Security Plan may or may not include some combination of encryption methods (Full Disk, Partition, File, External Storage, Etc.). As an example, the The Linux Foundation-IT recently released their Security Checklist (check it out for ideas):
As for what I selected in the poll, I could tell you but then I'd have to kill you! Just kidding, I selected Other. In addition to other security methods, I:
1. Keep critical files on an encrypted USB drive; and
2. Use FDE on my PCs (mostly laptops) to minimize my losses from potential theft/loss, minimize the value of my purloined property if improperly acquired by someone else, and secure any of my critical file data that may have been loaded onto my swap partition when I access my encrypted USB files.
Linux Mint Fast WM Switching:
I don't see any benefit of this to me and wish the Mint team would allocate their resources to more pressing matters (e.g., drop Ubuntu base) but YMMV.
The only potential benefits I can see to anyone are fast switching to benefit temporary application usage (e.g., @30's video tearing example) and a subjective quick comparison. However, in the unlikely event I would need to change my WM or compare WMs, I would make a permanent change or more objectively (e.g., benchmark) compare WMs using traditional methods not requiring a fast switch.
Welcome to the party...finally.
37 • Nope - nada. (by KGIII on 2015-09-23 13:20:39 GMT from North America)
I don't really do the whole encryption anything on anything, for the most part. I don't leave anything that would ruin me on a computer - at all. I've been at this for too many years to trust anything - including myself. So, rather than forget my decryption password or the likes, I simply don't do anything (including banking) online.
I do send encrypted files to people and I do encrypt sent emails but I don't think that's what you were asking about. There's only an illusion of security and, quite frankly, I lack secrets enough to withstand the 'pipe wrench decryption method' or anything like that. So, frankly, I don't bother with it much at all.
That and, well, you're just as likely to see me flitting about from distro to distro and only bothering to use a Live USB/DVD/CD while storing my data elsewhere if I bother to make any. I've moved to a position where I'm much more fluid and have also changed to being a much more passive consumer as I've aged.
Then again, I'd kind of like to take a distro, modify it, and then wrap it back up and make my own Live USB disk to just plug-in and go. Frankly, I have too many computers around the house. I'd probably do better just using a remote profile akin to what I have done in the past with Windows but, honestly, I don't really know how to accomplish that with Linux. I imagine it's possible - then I'd probably keep it encrypted because it's easier to maintain in one single location.
If that makes any sense...
Anyhow, I'll try to recall this post and to check back in. I can't say that I've ever posted here so I've no clue if it notifies of replies or the likes. I'll use a real email address but who knows if it displays that or not. The sad part is that I've known about this site for years and years but haven't ever bothered to comment before.
38 • WM switch & LMDE (by M.Z. on 2015-09-23 19:39:28 GMT from North America)
@35 & 36
Linux Mint often works toward a more polished & user friendly experience, & logging out & back in again feels clunky & unnecessary. I rather like this sort of touch & found it very useful to be able to preview new log in screens without a full long out & log in when that feature hit Cinnamon/MDM. This is the same sort of thing & helps make for a truly polished desktop experience that sets Mint apart from distros that require manual editing of config files. I expect more of these sorts of little enhancements in the future, along with other bigger things.
You mean Mint Debian Edition? Version 2 has been out for months & runs quite well on my laptop. It's no longer rolling release & it has Debian stable as a base, but you get the latest version of Cinnamon (or MATE if you chose that version) automatically with your regular updates. They say it has some more rough edges & requires more knowledge compared to the main edition, but I haven't really noticed any difference except for Firefox taking a few extra days to update. That & the installer is a little less nice. From what the Mint folks say the main thing that prevents more work on polishing LMDE is the relative lack of users, so by all means download it & give it a try. I recently updated the Wikipedia article on Mint to reflect some of the changes in Mint 17 & & LMDE:
It's much more informative now, but also feels like it could use some more polish.
39 • UEFI-support shouldn't be a dealbreaker (by Spacex on 2015-09-23 23:39:26 GMT from Europe)
Uefi-support shouldn't be a dealbreaker for you. It takes 5 minutes to fix post-install. If you really like Bunsen, then surely it's worth a little effort on your part :)
40 • Window Manager Switching (by Dragonopolis on 2015-09-24 01:28:21 GMT from North America)
I believe some people are forgetting that Linux is also about choice as well as open/freedom/value. Organizations or individuals can choose a very focused based Distro/application that serves a specific need/ experience "or" Create a Distro/Application that takes a more Broad approach allowing many options to attract more user base.... Linux Mint has always given it's user base many options. Linux Mint did not have to offer more desktops than one.... Linux Mint did not need a Debian version of Linux Mint. I could go on and on.... However
Nobody is asking or requiring that every one use every option that is offered in any distro; including Linux Mint.
What supporters of Linux Mint should be saying is.... It's great to see Linux Mint continuing to offer more options for its user base and potentially attracting new users/supporters as well
If this is not what a person wants from Linux Mint ...Perhaps you've made a incorrect choice... Lucky for you Linux base distros have plenty of options for you.... Perhaps a more Focused with less options type of Distro based on Ubuntu....... such as Elementary OS..... the choice is yours.....
41 • @17 (re encryption) (by Simon on 2015-09-24 04:10:42 GMT from Oceania)
Exactly. I encrypt sensitive data (including family photos etc.: if they're not happy about the thought of a thief browsing through photos of them, then it's our responsibility to ensure such data is encrypted), but leave everything else unscrambled for the convenience and small performance gain. It makes no sense to encrypt the many GB of files in /usr and so on when I couldn't care less if a thief were to pick through those.
I don't encrypt my entire home directory (again because there's no point); but I do symlink browser profiles and email data directories and so on to an encrypted drive, so I can be confident that personal communications and other personal information would remain secure if the computers were stolen.
42 • Encryption (by imnotrich on 2015-09-24 04:58:21 GMT from North America)
Although I encrypt everything sent to the cloud (my SpiderOak back up account), I have not yet gone to the trouble of encrypting my hard drives locally.
Why? Well for one, encryption adds an extra level of complexity (translation: makes it next to impossible) if I ever need to recover data from a dead or dying hard drive.
I agree encryption would be important if someone had physical access to or stole my hardware, such as after a burglary but I dispute how useful it would be against external/remote/government threats such as NSA surveillance. Believe it or not, most encryption schemes have back doors and for those that do not. the NSA has sufficient CPU horsepower to crack anyway. If they want to.
43 • Is desktop switching new? Is it useful? (by dbrion0606 on 2015-09-24 05:42:44 GMT from Europe)
Before 2010, it was possible with Mandriva to choose between WM/DE at login ; no need to edit config files (it was a second line in the login menu, IIIRC), the freedom of choice was respected ... This makes more sense than switching while working (often, one is concentrated on what one does/receives). I played once or twice with tis freedom of choice....
44 • Is desktop switching new? (by Wse on 2015-09-24 20:10:30 GMT from Europe)
Have a look;
45 • Window Manager switching (by M.Z. on 2015-09-24 20:42:13 GMT from North America)
Again, the talk with regard to Mint is actually about the _Window Manager_. I've looked up & run the command so switch out XFWM for Kwin. I also did some light reconfiguration work in XFCE in order to get all the neat Kwin effects in XFCE automatically without running that replace command every time. It's a neat tweak to the XFCE desktop that gives you all the effects of KDE while still using the XFCE desktop. I used the tutorial about doing so here on youtube in order to do it in Mint XFCE:
It's far more manual & less user friendly than what Mint is offering with their new WM tweaks for Compiz/Compton etc., but Kwin is a bit of a different animal compared to the WMs offered in Mint XFCE & MATE.
46 • LUKS (by mw on 2015-09-24 21:39:05 GMT from Europe)
I am using LUKS on my notebooks since 5 years.
47 • Disk Encryption (by Andy Figueroa on 2015-09-24 22:14:44 GMT from North America)
My "Other" response details is that I encrypt selected files only because that meets my needs.
48 • disk encryption (by hotdiggettydog on 2015-09-24 22:53:35 GMT from Europe)
I don't encrypt disks or partitions.
Cryptkeeper folders work well enough for me.
Anything really sensitive is kept as encrypted archives offline.
49 • Window Manager switching (by Muthu on 2015-09-25 14:15:30 GMT from Asia)
@45 I think Voyager-X2-HD Version based on Xubuntu's LTS is also a good tweak to the XFCE desktop that gives me all the effects of KDE while still Iam using the XFCE desktop. Just Check it out guys. It is Cool.
50 • Distrowatch search (by Jessey on 2015-09-26 18:31:32 GMT from North America)
Am I the only one who gets annoyed that you can't search distros by file system's supported. For example Deepin supports BTFS out of the box but Linux Mint does not. I tried to search for distros that use HFS+ by defult but the package was no in there. Another common one is Reiser 4. Yet, distrowatch has no way to sort distros by the file systems they support.
51 • New Bee looking for OOTB experience? (by JustSayItJonah on 2015-09-27 12:52:26 GMT from North America)
"Uefi-support shouldn't be a dealbreaker for you. It takes 5 minutes to fix post-install. If you really like Bunsen, then surely it's worth a little effort on your part :)"
Something to consider, if it is NewBee related, they probably don't want to jump through any extra hoops, especially if they are coming from windows (Just a OOTB=out of the box, experience.). Plus, if you posted "a how to" instructions or a link to "a how to" for UEFI, this may help the person out (instead of out the door. ;)). Just my 2 bits.
52 • @51 (by Wse on 2015-09-27 13:56:14 GMT from Europe)
Or google crunchbang-monara.
53 • multiple DE (by zykoda on 2015-09-30 07:12:45 GMT from Europe)
Simultaneous multiple X sessions, each with a different DE, switchable by Ctrl+Alt+FX are already possible allowing fairly rapid switching......resources permitting!
Number of Comments: 53
Display mode: DWW Only • Comments Only • Both DWW and Comments
|• Issue 843 (2019-12-02): Obarun 2019.11.02, Bluestar 5.3.6, using special characters on the command line, Fedora plans to disable empty passwords, FreeBSD's quarterly status report|
|• Issue 842 (2019-11-25): SolydXK 10, System Adminstration Ethics book review, Debian continues init diversity debate, Google upstreaming Android kernel patches|
|• Issue 841 (2019-11-18): Emmabuntus DE3-1.00, changing keys in a keyboard layout, Debian phasing out Python 2 and voting on init diversity, Slackware gets unofficial updated live media|
|• Issue 840 (2019-11-11): Fedora 31, monitoring user activity, Fedora working to improve Python performance, FreeBSD gets faster networking|
|• Issue 839 (2019-11-04): MX 19, manipulating PDFs, Ubuntu plans features for 20.04, Fedora 29 nears EOL, Netrunner drops Manjaro-based edition|
|• Issue 838 (2019-10-28): Xubuntu 19.10, how init and service managers work together, DragonFly BSD provides emergency mode for HAMMER, Xfce team plans 4.16|
|• Issue 837 (2019-10-21): CentOS 8.0-1905, Trident finds a new base, Debian plans firewall changes, 15 years of Fedora, how to merge directories|
|• Issue 836 (2019-10-14): Archman 2019.09, Haiku improves ARM support, Project Trident shifting base OS, Unix turns 50|
|• Issue 835 (2019-10-07): Isotop, Mazon OS and, KduxOS, examples of using the find command, Mint's System Reports becomes proactive, Solus updates its desktops|
|• Issue 834 (2019-09-30): FreedomBox "Buster", CentOS gains a rolling release, Librem 5 phones shipping, Redcore updates its package manager|
|• Issue 833 (2019-09-23): Redcore Linux 1908, why Linux distros are free, Ubuntu making list of 32-bit software to keep, Richard M Stallman steps down from FSF leadership|
|• Issue 832 (2019-09-16): BlackWeb 1.2, checking for Wayland session and applications, Fedora to use nftables in firewalld, OpenBSD disables DoH in Firefox|
|• Issue 831 (2019-09-09): Adélie Linux 1.0 beta, using ffmpeg, awk and renice, Mint and elementary improvements, PureOS and Manjaro updates|
|• Issue 930 (2019-09-02): deepin 15.11, working with AppArmor profiles, elementary OS gets new greeter, exFAT support coming to Linux kernel|
|• Issue 829 (2019-08-26): EndeavourOS 2019.07.15, Drauger OS 7.4.1, finding the licenses of kernel modules, NetBSD gets Wayland application, GhostBSD changes base repo|
|• Issue 828 (2019-08-19): AcademiX 2.2, concerns with non-free firmware, UBports working on Unity8, Fedora unveils new EPEL channel, FreeBSD phasing out GCC|
|• Issue 827 (2019-08-12): Q4OS, finding files on the disk, Ubuntu works on ZFS, Haiku improves performance, OSDisc shutting down|
|• Issue 826 (2019-08-05): Quick looks at Resilient, PrimeOS, and BlueLight, flagship distros for desktops,Manjaro introduces new package manager|
|• Issue 825 (2019-07-29): Endless OS 3.6, UBports 16.04, gNewSense maintainer stepping down, Fedora developrs discuss optimizations, Project Trident launches stable branch|
|• Issue 824 (2019-07-22): Hexagon OS 1.0, Mageia publishes updated media, Fedora unveils Fedora CoreOS, managing disk usage with quotas|
|• Issue 823 (2019-07-15): Debian 10, finding 32-bit packages on a 64-bit system, Will Cooke discusses Ubuntu's desktop, IBM finalizes purchase of Red Hat|
|• Issue 822 (2019-07-08): Mageia 7, running development branches of distros, Mint team considers Snap, UBports to address Google account access|
|• Issue 821 (2019-07-01): OpenMandriva 4.0, Ubuntu's plan for 32-bit packages, Fedora Workstation improvements, DragonFly BSD's smaller kernel memory|
|• Issue 820 (2019-06-24): Clear Linux and Guix System 1.0.1, running Android applications using Anbox, Zorin partners with Star Labs, Red Hat explains networking bug, Ubuntu considers no longer updating 32-bit packages|
|• Issue 819 (2019-06-17): OS108 and Venom, renaming multiple files, checking live USB integrity, working with Fedora's Modularity, Ubuntu replacing Chromium package with snap|
|• Issue 818 (2019-06-10): openSUSE 15.1, improving boot times, FreeBSD's status report, DragonFly BSD reduces install media size|
|• Issue 817 (2019-06-03): Manjaro 18.0.4, Ubuntu Security Podcast, new Linux laptops from Dell and System76, Entroware Apollo|
|• Issue 816 (2019-05-27): Red Hat Enterprise Linux 8.0, creating firewall rules, Antergos shuts down, Matthew Miller answers questions about Fedora|
|• Issue 815 (2019-05-20): Sabayon 19.03, Clear Linux's developer features, Red Hat explains MDS flaws, an overview of mobile distro options|
|• Issue 814 (2019-05-13): Fedora 30, distributions publish Firefox fixes, CentOS publishes roadmap to 8.0, Debian plans to use Wayland by default|
|• Issue 813 (2019-05-06): ROSA R11, MX seeks help with systemd-shim, FreeBSD tests unified package management, interview with Gael Duval|
|• Issue 812 (2019-04-29): Ubuntu MATE 19.04, setting up a SOCKS web proxy, Scientific Linux discontinued, Red Hat takes over Java LTS support|
|• Issue 811 (2019-04-22): Alpine 3.9.2, rsync examples, Ubuntu working on ZFS support, Debian elects new Project Leader, Obarun releases S6 tools|
|• Issue 810 (2019-04-15): SolydXK 201902, Bedrock Linux 0.7.2, Fedora phasing out Python 2, NetBSD gets virtual machine monitor|
|• Issue 809 (2019-04-08): PCLinuxOS 2019.02, installing Falkon and problems with portable packages, Mint offers daily build previews, Ubuntu speeds up Snap packages|
|• Issue 808 (2019-04-01): Solus 4.0, security benefits and drawbacks to using a live distro, Gentoo gets GNOME ports working without systemd, Redox OS update|
|• Issue 807 (2019-03-25): Pardus 17.5, finding out which user changed a file, new Budgie features, a tool for browsing FreeBSD's sysctl values|
|• Issue 806 (2019-03-18): Kubuntu vs KDE neon, Nitrux's znx, notes on Debian's election, SUSE becomes an independent entity|
|• Issue 805 (2019-03-11): EasyOS 1.0, managing background services, Devuan team debates machine ID file, Ubuntu Studio works to remain an Ubuntu Community Edition|
|• Issue 804 (2019-03-04): Condres OS 19.02, securely erasing hard drives, new UBports devices coming in 2019, Devuan to host first conference|
|• Issue 803 (2019-02-25): Septor 2019, preventing windows from stealing focus, NetBSD and Nitrux experiment with virtual machines, pfSense upgrading to FreeBSD 12 base|
|• Issue 802 (2019-02-18): Slontoo 18.07.1, NetBSD tests newer compiler, Fedora packaging Deepin desktop, changes in Ubuntu Studio|
|• Issue 801 (2019-02-11): Project Trident 18.12, the meaning of status symbols in top, FreeBSD Foundation lists ongoing projects, Plasma Mobile team answers questions|
|• Issue 800 (2019-02-04): FreeNAS 11.2, using Ubuntu Studio software as an add-on, Nitrux developing znx, matching operating systems to file systems|
|• Issue 799 (2019-01-28): KaOS 2018.12, Linux Basics For Hackers, Debian 10 enters freeze, Ubuntu publishes new version for IoT devices|
|• Issue 798 (2019-01-21): Sculpt OS 18.09, picking a location for swap space, Solus team plans ahead, Fedora trying to get a better user count|
|• Issue 797 (2019-01-14): Reborn OS 2018.11.28, TinyPaw-Linux 1.3, dealing with processes which make the desktop unresponsive, Debian testing Secure Boot support|
|• Issue 796 (2019-01-07): FreeBSD 12.0, Peppermint releases ISO update, picking the best distro of 2018, roundtable interview with Debian, Fedora and elementary developers|
|• Issue 795 (2018-12-24): Running a Pinebook, interview with Bedrock founder, Alpine being ported to RISC-V, Librem 5 dev-kits shipped|
|• Issue 794 (2018-12-17): Void 20181111, avoiding software bloat, improvements to HAMMER2, getting application overview in GNOME Shell|
|• Issue 793 (2018-12-10): openSUSE Tumbleweed, finding non-free packages, Debian migrates to usrmerge, Hyperbola gets FSF approval|
|• Issue 792 (2018-1203): GhostBSD 18.10, when to use swap space, DragonFly BSD's wireless support, Fedora planning to pause development schedule|
|• Issue 791 (2018-11-26): Haiku R1 Beta1, default passwords on live media, Slax and Kodachi update their media, dual booting DragonFly BSD on EFI|
|• Full list of all issues|
Star Labs - Laptops built for Linux.
View our range including the Star Lite, Star LabTop and more. Available with a choice of Ubuntu, Linux Mint or Zorin OS pre-installed with many more distributions supported. Visit Star Labs for information, to buy and get support.
|Random Distribution |
Burapha Linux Server
Burapha Linux Server was a free Linux distribution. It was a descendant of Burapha Linux 5.5, which in turn was a descendant of Slackware 10.x. Burapha Linux Server does not have any packages taken directly from Slackware; the project builds their own packages and have their own package manager. The primary purpose of development was for the computer science students to learn the infrastructure of a UNIX system, and to apply the acquired knowledge in research and projects.