DistroWatch Weekly |
DistroWatch Weekly, Issue 878, 10 August 2020 |
Welcome to this year's 32nd issue of DistroWatch Weekly!
On this website we mostly talk about Linux-powered desktop operating systems. However, while there are millions of desktop computers running Linux distributions, where Linux really shines is in the server market. This week we kick off with a quick look at Zentyal Server, an Ubuntu-based distribution that ships with a convenient, user-friendly interface. Read on to hear how the latest release of Zentyal performs. In our News section we share user survey results from the CentOS project and a similar overview of how Linux Mint is utilised. Plus we are pleased to share network security tips from the IPFire team and link to a new list of devices which work with the mobile UBports operating system. How to package software and how to make the many pieces of an operating system work together is an ongoing debate among developers. In our Questions and Answers column we look at one aspect of this debate: dynamic versus static linking where we talk about some of the benefits and drawbacks to these approaches of linking applications to their dependencies. Last week we discussed a GRUB security patch which caused some systems to no longer boot and we would like to hear if you were affected by this issue in our Opinion Poll. Plus we are pleased to list last week's releases and share the torrents we are seeding. We wish you all an incredible week and happy reading!
Content:
- Review: Zentyal Server 6.2
- News: CentOS shares survey results, Linux Mint gives version usage overview, IPFire shares DNS security tips, UBports updates list of working devices
- Questions and answers: Pros and cons of dynamic linking versus static linking
- Released last week: BSD Router Project 1.97, Ubuntu 20.04.1
- Torrent corner: BSD Router Project, KDE neon, Kubuntu, Lubuntu, Redo Rescue, Robolinux, Ubuntu, Ubuntu Budgie, Ubuntu Kylin, Ubuntu MATE, Ubuntu Studio, Xubuntu
- Opinion poll: Were you affected by the GRUB Boothole security patch?
- Reader comments
|
Feature Story (by Jesse Smith) |
Zentyal Server 6.2
Zentyal is an Ubuntu-based server distribution which is designed to be easy to set up and then manage using a friendly, web-based interface. The distribution targets small and medium office and business environments. The Zentyal distribution is intended to take on such tasks a as a storage server, Internet gateway, or to provide other office IT infrastructure - all through a convenient, point-n-click web portal.
The latest version of Zentyal is based on Ubuntu 18.04.4 and mostly features minor updates. There are new anti-virus packages, improved DNS management, easier management of hard drives, and the AppArmor security software is enabled by default.
The download for Zentyal is 1GB in size and is available for 64-bit (x86_64) machines only. Booting from the install media brings up a menu asking us to select our preferred language from a list. Then we are given the choice of wiping the hard drive and installing Zentyal or launching an expert installer. Both menu options launch a text-based installer which should be familiar to people who have set up Ubuntu Server or used Debian's text installer.
Installing
Setting up Zentyal through the expert install mode brings up a series of text-based menus where we are asked to supply our preferred language (again), choose our keyboard layout, time zone, and to make up a username and password for ourselves. The installer then asks if we want to use guided or manual partitioning. The former takes over the entire disk, creating an ext4 formatted LVM volume, while the manual option walks us through an unusually long series of partitioning and filesystem options screens.
The installer then asks if we would like to install a graphical desktop environment (LXDE in this case). Packages are copied to our hard drive and then we are presented with a few more configuration steps. We are asked if we wish to enable a web proxy and if we want to install the GRUB boot loader. Then we confirm our system clock settings and the system offers to restart itself.
The installer uses an unusual combination of white text on a bright green background for text entry boxes which I found difficult to read. The rest of the interface uses a high contrast, but entering text into fields was hard on the eyes.
After the installer finished its work and offered to reboot the computer I ran into my first serious issue. The shutdown process started off well, showing systemd status messages about services being shutdown. However, the process took a long time. In fact, once the system reached a point where it was reportedly cleaning up temporary directories and had been stuck on that task for 15 minutes (longer than the installer had taken to set up the operating system) I finally forced a hard reset.
Early impressions
Zentyal booted and, after performing a quick filesystem check, brought me to a text console. (I had opted not to install the desktop environment.) I could sign in with the credentials I had supplied to the installer and was able to confirm my Internet connection worked. I was able to shutdown the system (reboots happened quickly and were error-free at this time), and some basic command line programs worked.
Once I got logged in I noticed a few oddities with Zentyal. The first was that the operating system identified itself as Ubuntu 18.04.4 LTS rather than Zentyal Server 6.2. Which makes some sense since Ubuntu is this project's parent. The message which is displayed when the user logs in indicates that the web interface can be accessed by pointing a web browser to the server's IP address and using port 8443 over the HTTPS protocol.
Attempts to connect to port 8443 were refused. As were connection attempts to communicate over port 443. Attempts to connect with port 80 (the default HTTP port) worked, but only showed a generic home page for the nginx web server.
At this point I tried to install the telnet client to help me troubleshoot the connection issues and found my package database was a mess. I had to run "dpkg --configure -a" to fix it. This seemed odd as the APT package tools had not been used yet since the installation had completed. After letting dpkg run I was able to install telnet and confirm only ports 22 (for OpenSSH) and 80 (for the generic nginx install) were available. There were no services listening on port 8443. This remained true after a reboot and so I decided to start over from scratch.
Second impressions
Things had gone poorly enough the first time trying Zentyal that I decided to be extra careful the next time around. I double-checked the distribution's ISO checksum, decided to try running it in a virtual machine to avoid any potential hardware incompatibilities, and then opted to take the automated installation option.
As it turns out, the automated install option walks us through almost all of the same steps as the expert installer. We are asked the same questions about language, keyboard layout, time zone, and login credentials. There appear to be just three differences in the automated version of the system installer. The first is we are warned partitions on the main hard disk are already mounted and asked if they should be unmounted before the disk is partitioned. Since the plan is to wipe the disk, umounting partitions seemed wise. Though I'm not sure why any partitions would be mounted by the installer to begin with.
The second difference is that the installer handles disk partitioning, setting up an LVM volume and formatting it with ext4 rather than have us set up partitions and mount points. The third difference is the installer does not ask if we would like to install a graphical desktop, it just assumes we want the desktop. This causes LXDE to be installed, along with a handful of X.Org and Wayland libraries.

Zentyal Server 6.2 -- Exploring the LXDE menu
(full image size: 52kB, resolution; 1920x1200 pixels)
The installation process finished, indicated it was successful and offered to restart the system. Once again Zentyal got stuck shutting down. Background services stopped gradually for a few minutes, then got stuck cleaning out temporary directories. The system at this point appeared to be idle (hard drive and CPU activity were minimal) and remained stuck for the next twenty minutes. Eventually I forced a restart.
This time my fresh copy of Zentyal booted to a graphical environment. I could sign into the LXDE desktop where the Firefox browser opened and automatically attempted to connect to the localhost. This connection failed and, again, all connections (either over HTTP or HTTPS) failed to reach port 8443 and succeeded on port 80 where the generic web server was running. I tried to take a screenshot of this error and discovered that the keyboard shortcut for screenshots was mapped, but to a GNOME screenshot application that was not available. This broken shortcut feels all the more out of place given Zentyal uses the LXDE desktop rather than GNOME.

Zentyal Server 6.2 -- Trying to take a screenshot of Firefox connecting to the Zentyal server
(full image size: 96kB, resolution: 1920x1200 pixels)
I wanted to use the nmap tool to scan local ports and see which services were available. I soon found that nmap was installed, but one of its dependencies (libblas) was missing, causing the tool to not run. I could reinstall nmap through the APT package manager and a scan turned up no new services, other than OpenSSH and nginx showing its generic home page.
Conclusions
After my second failed attempt at using Zentyal, and some troubleshooting, I came to the realization the distribution was not going to work as expected and put it aside. According to the documentation, I should be able to simply install the distribution and connect to it using a web browser, but this did not work, either locally or over the LAN. This was disappointing as I have used Zentyal in the past and generally had positive experiences with it. I've even recommended the distribution to a few people who wanted to run a light office server with an easy, point-n-click interface.
I have three theories as to why Zentyal did not work for me this time around. One is that the documentation is out of date (or updated in places I'm not looking) and additional steps are now required to set up the web portal service. The second is that there is a bug in the web portal software that is preventing it from running.
Personally, I suspect neither of these are true and, instead, something (or multiple somethings) are going wrong during the setup phase. While the installer appears to finish copying its files to my hard drive and reports it is done, the fact the system does not shut down cleanly afterwards suggests something is not finished in the background. The shutdown services never conclude and, while disk and CPU activity was virtually non-existent all twenty minutes I waited, I suspect additional configuration steps were supposed to be happening during that time. It is hard to say for certain though since no status messages are displayed and the installer claims to be finished. I would also consider it odd for services to be enabled during the shutdown phase of the live media, but stranger things have happened.
Whatever the case, Zentyal did not work for me and, unfortunately, did not display any errors or status messages which would help explain why. The documentation, while normally helpful, did not offer any tips to help me get going. In the past Zentyal has proven to be easy for me to use, but this version has left me with a server-sized void to fill.
* * * * *
Visitor supplied rating
Zentyal Server has a visitor supplied average rating of: 8.7/10 from 3 review(s).
Have you used Zentyal Server? You can leave your own review of the project on our ratings page.
|
Miscellaneous News (by Jesse Smith and Ladislav Bodnar) |
CentOS shares survey results, Linux Mint gives version usage overview, IPFire shares DNS security tips, UBports updates list of working devices
The CentOS team has published their monthly community newsletter and it shares some important information on the Boothole issue we reported last week. The newsletter also links to survey data the CentOS team has collected about how their distribution is used, how often it is updated, and how people would like to be involved in the project. "Over the past 3 or 4 months, we have been running a survey about how you use CentOS. Many thanks to those who participated in this, to help us better understand how we can give you what you need. I've written up the results of the survey here. While some of the results were expected - most of you use CentOS in small to medium shops, running services either for work or personal use - there were some eye-opening things in this. To me personally, the volunteerism question shows that a lot of you are looking for places to get involved, and that we haven't done a great job telling you where and how. We'll be working to fix that."
* * * * *
The Linux Mint team has been looking at which versions and editions of their distribution get the most attention. The project looked at which versions are most commonly used and added some observations to explain why this is likely the case: "The newest release attracts many users and grows faster than any other but it does not yet represent the largest percentage. As we can see on the chart, more than half of Linux Mint users use Linux Mint 19.x. The older Mint 18.x and the brand new Mint 20 both represent about 20% of the user base. Linux Mint 17.x despite reaching EOL still represents 6% and LMDE represents about 1%." In the project's monthly newsletter the team also acknowledged some common concerns users had with Linux Mint 20, including the lack of a Chromium web browser package, and reported there are plans to address these issues.
* * * * *
The IPFire team is continuing its series of blog posts detailing recommendations on how to improve computer and network security. The latest post concerns DNS configurations and how to make adjustments to this key component of virtually every network-connected device. "After having roamed around infosec in general last week, this post gives some advice on how to gain additional privacy by changing your IPFire's DNS configuration. DNS happens to be a very basic thus quite important protocol of today's internet, but is still being considered a low-risk one when it comes to security and privacy. If you are familiar with IPFire, you might have noticed DNSSEC validation is mandatory, since it defeats entire classes of attacks...."
* * * * *
The UBports team has published information about the project's work, development progress, and updated ports on various devices. The PinePhone and Nexus 6P received special attention: "Florian has been working on a port for the Nexus 6P from Huawei for about a year and it is in a pretty good state. The only issue is that it is big and heavy. It has a good camera , still minus some functions. The GPS is the fastest on any UT device. It takes about 30 seconds to get a fix. Moving the old core devices to Halium 7.1 build is in the works and progressing well. We now have about 40 devices listed on the devices page. That is way more options than in the past." The list of devices which work with UBports, along with their porting status, can be found on the project's new devices page.
* * * * *
These and other news stories can be found on our Headlines page.
|
Questions and Answers (by Jesse Smith) |
Pros and cons of dynamic linking versus static linking
Linking-it-all-together asks: I came across this article about the benefits of static linking over dynamic linking. If dynamic linking is slower and doesn't offer practical benefits then why do most distros still dynamic link? Is this a hold over from the past or is there a reason I'm missing that make distros still use dynamic linking?
DistroWatch answers: Before we get to the article, I'd like to share a brief, overly generalized view of what statically linked and dynamically linked programs are. A statically linked program is self-contained. Any libraries or functions that are required for the program to run are baked into the program itself. This reduces the program's external dependencies and makes the program bigger. On the positive side of things this means statically linked programs do not rely on other libraries and can be copied to other systems more easily. It also means if libraries are updated on the operating system, the statically linked program will not break due to the changing libraries in other parts of the system.
A dynamically linked program is smaller and does not keep all of its parts internally. Instead a dynamically linked program relies on other libraries on the system to provide key functions. This approach offers a few benefits. In particular it means programs that share common functionality can share one copy of a library rather than have each program carry its own copy. This also means when security updates become available we only need to update each library once and every program on the system which uses pieces of that library automatically benefit, even often without being updated themselves. In theory dynamic linking means smaller programs, smaller updates, and less duplication of functionality. However, dynamically linked programs can break if a library they depend on changes too much or a library they depend on is removed from the system.
I read through the article provided and it does share some interesting statistics on dynamically linked programs versus statically linked programs. The author appears to be making a case against dynamic linking and in favour of static linking, or at least presenting facts which would support such a case. For the sake of this discussion I am going to assume the observations the article's author makes are accurate and factually correct, at least for their own distribution.
The author addresses some interesting questions, such as how often are dynamically libraries used on the system, which indicates how many resources avoid duplication by sharing libraries. They also explore how quickly dynamic and static programs load and how much larger statically linked programs are compared to their dynamically linked counterparts. The author points out that many libraries on their distribution are not shared by many programs, that statically linked programs can load faster, and that not a lot of bandwidth is saved by using dynamically linked programs.
Reading through the page of observations the author shares, it's understandable we might wonder why developers continue to favour dynamically linked applications in most situations. Let's look at some of the specific arguments from the article.
Do your installed programs share dynamic libraries? Findings: not really. Over half of your libraries are used by fewer than 0.1% of your executables.
This is an interesting way of presenting the statistic. Over half of libraries are linked to by fewer than 0.1% of programs. Which is all well and good, but it seems to be focusing on where dynamically linked libraries are not being used, or are used rarely. It is not looking at how often dynamically linked libraries are being used. Imagine if I told you 95% of the items I own do not use wheels, therefore wheels are not important. That may be true, for most items. Many of the objects I own probably do not need wheels. My table, fridge, and laptop do not need wheels. However, the automobile and bicycle really do need wheels to be effective.
I feel the author's argument is similar to the above example using wheels. They are correct that in some instances, maybe even in many instances, libraries are not being shared much, which reduces their value. However, the low level libraries that are used a lot, such as the C library, GTK, and Qt, are likely to be used by hundreds, maybe even thousands, of applications on your distribution. A small number of libraries are used a lot, so it does not matter much (in my opinion) whether other libraries are used rarely. The benefits we get from sharing code in a handful of low-level libraries are enough to make dynamic linking worth while in many situations.
Is loading dynamically linked programs faster?
Findings: definitely not.
This is an interesting point. The author points out that their system loads static applications in about half the time as dynamic ones. This seems like a lot, until we consider the load times are being displayed in nanoseconds. A nanosecond is a billionth of a second, meaning the slowly loading dynamically linked application is taking a whole 0.000137263 seconds to start. It is not physically possible for a person to notice the difference between the load times of a dynamically linked program versus a statically linked one. In fact, you could load a thousand programs of each type before seeing a 0.1 second difference between the two types.
Wouldn't statically linked executables be huge?
Findings: not really. On average, dynamically linked executables use only 4.6% of the symbols on offer from their dependencies. A good linker will remove unused symbols.
I think this point is entirely valid and I do not have much to add to it. A good build system will make individual statically linked programs and dynamically linked ones of similar size. The statically linked ones should not be much larger. However, I believe if we look at how many programs most operating systems run these days, we can see how small benefits will add up over time. Having one program be 4% larger is not a big deal. Having 2,000 programs be 4% larger begins to accumulate additional storage space. Still, the difference, on a modern system, will not be significant so we do not need to worry much about application size. I feel the point here is well made.
Will security vulnerabilities in libraries that have been statically linked cause large or unmanageable updates? Findings: not really.
Not including libc, the only libraries which had "critical" or "high" severity vulnerabilities in 2019 which affected over 100 binaries on my system were dbus, gnutls, cairo, libssh2, and curl. 265 binaries were affected by the rest.
The total download cost to upgrade all binaries on my system which were affected by CVEs in 2019 is 3.8GiB. This is reduced to 1.0GiB if you eliminate glibc.
I think there are two key points to consider carefully here. The author is correct that the difference of a few gigabytes when performing updates over the span of a year is not a lot to most modern computer users. However, I feel it worth noting that, given the choice between larger and smaller updates, most people will want the smaller updates as they use less bandwidth. It might be a relatively small savings, but it is still savings in the range of gigabytes of data and one which will be noticeable on capped or slow Internet connections. In other words, if you can download a 1GB of data in 10 minutes, the size of package updates will not matter to you. However, if you're on a connection where a 1GB download can take most of the day, then you will quickly see the benefit of using dynamic linking to reduce the size of your downloads.
We might also wish to look at this situation from the distribution's point of view. Let's say, just for example, Canonical has 50 million Ubuntu users. And let us assume each user can save around 1GB per year of bandwidth by using dynamic linking to reduce the number packages we need to download. A single extra gigabyte of bandwidth is not much for the end user to absorb, but for Canonical that is a difference of 50 million gigabytes (50 petabytes) per year.
The linked article also skips over the main reason most people want to use dynamically linked programs, which is having the ability to update one library with a security fix and have it correct the issue for every program on the system which uses that library. If one library is vulnerable on a dynamically linked system, we only need to update one package to fix it. When running a statically linked system, we need to update every single program which used the vulnerable library. This can mean a vulnerability in the C library (for example) means updating hundreds, sometimes thousands, of packages. That means in a statically linked scenario we need the maintainer of every package on our system to notice the vulnerability, update their package, and push out a fix. When we use dynamic linking we only need one maintainer, not dozens, to update just one package.
In my opinion, dynamical linking might offer only small, or questionable, benefits a lot of the time, but it offers a great deal of benefit in some key areas with very few drawbacks. There are certainly pros and cons for each approach, but the ease of package management and security updates, along with the reduction of work required by package build servers, means dynamic linking tends to benefit developers and users more than it causes problems. Which is why I suspect dynamic linking will continue to be the default approach for most distributions for the foreseeable future.
* * * * *
Additional answers can be found in our Questions and Answers archive.
|
Released Last Week |
BSD Router Project 1.97
Olivier Cochard-Labbé has announced the release of BSD Router Project (BSDRP) 1.97, the latest stable build of the project's free and open-source software router distribution based on embedded FreeBSD. This release is upgrades the underlying operating system to FreeBSD 12.1: "BSDRP 1.97 is online. Based on a FreeBSD 12.1-STABLE (r363822), it fixes some missing Ethernet NIC modules (Chelsio Ethernet VF driver and Ethernet QLogic 3200 series). This version adds some new packages - Mellanox Firmware tools (lite version), WireGuard, vim-tiny, mrtparse (MRT format data parser), nrpe3 (Nagios client including nagios-plugins), frr7-pythontools (helper script to help reload frr). New features: load of Intel microcodes by default; update to 12.1-STABLE. Bug fixes: add Chelsio Ethernet VF driver (if_cxgbev); add missing if_qlxgb.ko for Ethernet QLogic 3200 series; correctly disabling ICMP redirect by default. New packages: Mellanox firmware tools (lite version); WireGuard; vim-tiny...." See the release announcement and release notes for more details.
Ubuntu 20.04.1
Łukasz Zemczak has announced the release of Ubuntu 20.04.1, along with the distribution's community editions. These new builds mostly contain bug fixes for packages, reducing the amount of time required to update new installations. "The Ubuntu team is pleased to announce the release of Ubuntu 20.04.1 LTS (Long-Term Support) for its Desktop, Server, and Cloud products, as well as other flavours of Ubuntu with long-term support. As usual, this point release includes many updates, and updated installation media has been provided so that fewer updates will need to be downloaded after installation. These include security updates and corrections for other high-impact bugs, with a focus on maintaining stability and compatibility with Ubuntu 20.04 LTS." Further details can be found in the release announcement and in the release notes.
* * * * *
Development, unannounced and minor bug-fix releases
|
Torrent Corner |
Weekly Torrents
The table below provides a list of torrents DistroWatch is currently seeding. If you do not have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found in our Torrent Archive. We also maintain a Torrents RSS feed for people who wish to have open source torrents delivered to them. To share your own open source torrents of Linux and BSD projects, please visit our Upload Torrents page.
Torrent Corner statistics:
- Total torrents seeded: 2,090
- Total data uploaded: 33.0TB
|
Upcoming Releases and Announcements |
Summary of expected upcoming releases
|
Opinion Poll (by Jesse Smith) |
Were you affected by the GRUB Boot Hole security patch?
Last week we talked about a security bug in the GRUB boot loader which, once the issue was patched, the fix could cause some Red Hat and CentOS systems to no longer boot. The issue was quickly resolved and new patches pushed out which worked around the problem. Were you one of the CentOS or Red Hat users who were hit by the GRUB patch problem? Let us know how you worked around it in the comments.
You can see the results of our previous poll on using a Linux-powered mobile phone in last week's edition. All previous poll results can be found in our poll archives.
|
Were you affected by the Boothole patch?
I am a CentOS/RHEL user who was affected: | 18 (2%) |
I am a CentOS/RHEL user who was not affected: | 91 (8%) |
I am not a CentOS/RHEL user who was affected: | 42 (4%) |
I am not a CentOS/RHEL user and not affected: | 999 (87%) |
|
|
Website News (by Ladislav Bodnar) |
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 17 August 2020. Past articles and reviews can be found through our Article Search page. To contact the authors please send e-mail to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews/submissions, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, donations, comments)
- Bruce Patterson (podcast)
|
|
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 0, value: US$0.00) |
|
|
|
 bc1qtede6f7adcce4kjpgx0e5j68wwgtdxrek2qvc4  86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le |
|
Linux Foundation Training |
| |
MALIBAL |
MALIBAL: Linux Laptops Custom Built for YouMALIBAL is an innovative computer manufacturer that produces high-performance, custom laptops for Linux. If your MALIBAL laptop is not the best Linux laptop you have ever used, you can return it for a full 100% refund. We will even pay the return shipping fees! For more info, visit: https://www.malibal.com
|
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Issue 1022 (2023-06-05): GetFreeOS 2023.05.01, Slint 15.0-3, Liya N4Si, cleaning up crowded directories, Ubuntu plans Snap-based variant, Red Hat dropping LireOffice RPM packages |
• Issue 1021 (2023-05-29): rlxos GNU/Linux, colours in command line output, an overview of Void's unique features, how to use awk, Microsoft publishes a Linux distro |
• Issue 1020 (2023-05-22): UBports 20.04, finding another machine's IP address, finding distros with a specific kernel, Debian prepares for Bookworm |
• Issue 1019 (2023-05-15): Rhino Linux (Beta), checking which applications reply on a package, NethServer reborn, System76 improving application responsiveness |
• Issue 1018 (2023-05-08): Fedora 38, finding relevant manual pages, merging audio files, Fedora plans new immutable edition, Mint works to fix Secure Boot issues |
• Issue 1017 (2023-05-01): Xubuntu 23.04, Debian elects Project Leaders and updates media, systemd to speed up restarts, Guix System offering ground-up source builds, where package managers install files |
• Issue 1016 (2023-04-24): Qubes OS 4.1.2, tracking bandwidth usage, Solus resuming development, FreeBSD publishes status report, KaOS offers preview of Plasma 6 |
• Issue 1015 (2023-04-17): Manjaro Linux 22.0, Trisquel GNU/Linux 11.0, Arch Linux powering PINE64 tablets, Ubuntu offering live patching on HWE kernels, gaining compression on ex4 |
• Issue 1014 (2023-04-10): Quick looks at carbonOS, LibreELEC, and Kodi, Mint polishes themes, Fedora rolls out more encryption plans, elementary OS improves sideloading experience |
• Issue 1013 (2023-04-03): Alpine Linux 3.17.2, printing manual pages, Ubuntu Cinnamon becomes official flavour, Endeavour OS plans for new installer, HardenedBSD plans for outage |
• Issue 1012 (2023-03-27): siduction 22.1.1, protecting privacy from proprietary applications, GNOME team shares new features, Canonical updates Ubuntu 20.04, politics and the Linux kernel |
• Issue 1011 (2023-03-20): Serpent OS, Security Onion 2.3, Gentoo Live, replacing the scp utility, openSUSE sees surge in downloads, Debian runs elction with one candidate |
• Issue 1010 (2023-03-13): blendOS 2023.01.26, keeping track of which files a package installs, improved network widget coming to elementary OS, Vanilla OS changes its base distro |
• Issue 1009 (2023-03-06): Nemo Mobile and the PinePhone, matching the performance of one distro on another, Linux Mint adds performance boosts and security, custom Ubuntu and Debian builds through Cubic |
• Issue 1008 (2023-02-27): elementary OS 7.0, the benefits of boot environments, Purism offers lapdock for Librem 5, Ubuntu community flavours directed to drop Flatpak support for Snap |
• Issue 1007 (2023-02-20): helloSystem 0.8.0, underrated distributions, Solus team working to repair their website, SUSE testing Micro edition, Canonical publishes real-time edition of Ubuntu 22.04 |
• Issue 1006 (2023-02-13): Playing music with UBports on a PinePhone, quick command line and shell scripting questions, Fedora expands third-party software support, Vanilla OS adds Nix package support |
• Issue 1005 (2023-02-06): NuTyX 22.12.0 running CDE, user identification numbers, Pop!_OS shares COSMIC progress, Mint makes keyboard and mouse options more accessible |
• Issue 1004 (2023-01-30): OpenMandriva ROME, checking the health of a disk, Debian adopting OpenSnitch, FreeBSD publishes status report |
• Issue 1003 (2023-01-23): risiOS 37, mixing package types, Fedora seeks installer feedback, Sparky offers easier persistence with USB writer |
• Issue 1002 (2023-01-16): Vanilla OS 22.10, Nobara Project 37, verifying torrent downloads, Haiku improvements, HAMMER2 being ports to NetBSD |
• Issue 1001 (2023-01-09): Arch Linux, Ubuntu tests new system installer, porting KDE software to OpenBSD, verifying files copied properly |
• Issue 1000 (2023-01-02): Our favourite projects of all time, Fedora trying out unified kernel images and trying to speed up shutdowns, Slackware tests new kernel, detecting what is taking up disk space |
• Issue 999 (2022-12-19): Favourite distributions of 2022, Fedora plans Budgie spin, UBports releasing security patches for 16.04, Haiku working on new ports |
• Issue 998 (2022-12-12): OpenBSD 7.2, Asahi Linux enages video hardware acceleration on Apple ARM computers, Manjaro drops proprietary codecs from Mesa package |
• Issue 997 (2022-12-05): CachyOS 221023 and AgarimOS, working with filenames which contain special characters, elementary OS team fixes delta updates, new features coming to Xfce |
• Issue 996 (2022-11-28): Void 20221001, remotely shutting down a machine, complex aliases, Fedora tests new web-based installer, Refox OS running on real hardware |
• Issue 995 (2022-11-21): Fedora 37, swap files vs swap partitions, Unity running on Arch, UBports seeks testers, Murena adds support for more devices |
• Issue 994 (2022-11-14): Redcore Linux 2201, changing the terminal font size, Fedora plans Phosh spin, openSUSE publishes on-line manual pages, disabling Snap auto-updates |
• Issue 993 (2022-11-07): Static Linux, working with just a kernel, Mint streamlines Flatpak management, updates coming to elementary OS |
• Issue 992 (2022-10-31): Lubuntu 22.10, setting permissions on home directories, Linux may drop i486, Fedora delays next version for OpenSSL bug |
• Issue 991 (2022-10-24): XeroLinux 2022.09, learning who ran sudo, exploring firewall tools, Rolling Rhino Remix gets a fresh start, Fedora plans to revamp live media |
• Issue 990 (2022-10-17): ravynOS 0.4.0, Lion Linux 3.0, accessing low numbered network ports, Pop!_OS makes progress on COSMIC, Murena launches new phone |
• Issue 989 (2022-10-10): Ubuntu Unity, kernel bug causes issues with Intel cards, Canonical offers free Ubuntu Pro subscriptions, customizing the command line prompt |
• Issue 988 (2022-10-03): SpiralLinux 11.220628, finding distros for older equipment and other purposes, SUSE begins releasing ALP prototypes, Debian votes on non-free firmware in installer |
• Issue 987 (2022-09-26): openSUSE's MicroOS, converting people to using Linux, pfSense updates base system and PHP, Python 2 dropped from Arch |
• Issue 986 (2022-09-19): Porteus 5.0, remotely wiping a hard drive, a new software centre for Ubuntu, Proxmox offers offline updates |
• Issue 985 (2022-09-12): Garuda Linux, using root versus sudo, UBports on the Fairphone 4, Slackware reverses change to grep |
• Issue 984 (2022-09-05): deepin 23 Preview, watching for changing to directories, Mint team tests Steam Deck, Devuan posts fix for repository key expiry |
• Issue 983 (2022-08-29): Qubes OS 4.1.1, Alchg Linux, immutable operating systems, Debian considers stance on non-free firmware, Arch-based projects suffer boot issue |
• Issue 982 (2022-08-22): Peropesis 1.6.2, KaOS strips out Python 2 and PulseAudio, deepin becomes independent, getting security update notifications |
• Issue 981 (2022-08-15): Linux Lite 6.0, defining desktop environments and window managers, Mint releases upgrade tool, FreeBSD publishes status report |
• Issue 980 (2022-08-08): Linux Mint 21, Pledge on Linux, SparkyLinux updates classic desktop packages, Peppermint OS experiments with Devuan base |
• Issue 979 (2022-08-01): KaOS 2022.06 and KDE Plasma 5.25, terminating processes after a set time, GNOME plans Secure Boot check |
• Issue 978 (2022-07-25): EndeavourOS 22.6, Slax explores a return to Slackware, Ubuntu certified with Dell's XPS 13, Linux running on Apple's M2 |
• Issue 977 (2022-07-18): EasyOS 4.2, transferring desktop themes between distros, Tails publishes list of updates, Zevenet automates Let's Encrypt renewals |
• Issue 976 (2022-07-11): NixOS 22.05, making a fake webcam, exploring the Linux scheduler, Debian publishes updated media |
• Issue 975 (2022-07-04): Murena One running /e/OS, where are all the openSUSE distributions, Fedora to offer unfiltered Flathub access |
• Issue 974 (2022-06-27): AlmaLinux 9.0, the changing data of DistroWatch's database, UBports on the Pixel 3a, Tails and GhostBSD publish hot fixes |
• Issue 973 (2022-06-20): openSUSE 15.4, collecting distro media, FreeBSD status report, Ubuntu Core with optional real-time kernel |
• Issue 972 (2022-06-13): Rolling Rhino Remix, SambaBox 4.1, SUSE team considers future of SUSE and openSUSE Leap, Tails improves Tor Connection Assistant |
• Issue 971 (2022-06-06): ChimeraOS 2022.01.03, Lilidog 22.04, NixOS gains graphical installer, Mint replaces Bluetooth stack and adopts Timeshift, how to change a MAC address |
• Issue 970 (2022-05-30): Tails 5.0, taking apart a Linux distro, Ubuntu users seeing processes terminated, Budgie team plans future of their desktop |
• Full list of all issues |
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Shells.com |

Your own personal Linux computer in the cloud, available on any device. Supported operating systems include Android, Debian, Fedora, KDE neon, Kubuntu, Linux Mint, Manjaro and Ubuntu, ready in minutes.
Starting at US$4.95 per month, 7-day money-back guarantee
|
Random Distribution | 
FuryBSD
FuryBSD was an open-source, desktop-oriented operating system based on FreeBSD. It was an attempt to revive the spirit of other easy-to-use FreeBSD-based projects of the past (e.g. PC-BSD and TrueOS), but it also adds additional convenience in the form of a hybrid USB/DVD image. The project provides separate live images with Xfce and KDE Plasma desktops. FuryBSD was free to use and it can be freely distributed under the BSD license.
Status: Discontinued
|
Free Tech Guides |
NEW! Learn Linux in 5 Days

In this FREE ebook, you will learn the most important concepts and commands and be guided step-by-step through several practical and real-world examples (a free 212-page ebook).
|
MALIBAL |
MALIBAL: Linux Laptops Custom Built for YouMALIBAL is an innovative computer manufacturer that produces high-performance, custom laptops for Linux. If your MALIBAL laptop is not the best Linux laptop you have ever used, you can return it for a full 100% refund. We will even pay the return shipping fees! For more info, visit: https://www.malibal.com
|
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|