DistroWatch Weekly |
DistroWatch Weekly, Issue 878, 10 August 2020 |
Welcome to this year's 32nd issue of DistroWatch Weekly!
On this website we mostly talk about Linux-powered desktop operating systems. However, while there are millions of desktop computers running Linux distributions, where Linux really shines is in the server market. This week we kick off with a quick look at Zentyal Server, an Ubuntu-based distribution that ships with a convenient, user-friendly interface. Read on to hear how the latest release of Zentyal performs. In our News section we share user survey results from the CentOS project and a similar overview of how Linux Mint is utilised. Plus we are pleased to share network security tips from the IPFire team and link to a new list of devices which work with the mobile UBports operating system. How to package software and how to make the many pieces of an operating system work together is an ongoing debate among developers. In our Questions and Answers column we look at one aspect of this debate: dynamic versus static linking where we talk about some of the benefits and drawbacks to these approaches of linking applications to their dependencies. Last week we discussed a GRUB security patch which caused some systems to no longer boot and we would like to hear if you were affected by this issue in our Opinion Poll. Plus we are pleased to list last week's releases and share the torrents we are seeding. We wish you all an incredible week and happy reading!
Content:
- Review: Zentyal Server 6.2
- News: CentOS shares survey results, Linux Mint gives version usage overview, IPFire shares DNS security tips, UBports updates list of working devices
- Questions and answers: Pros and cons of dynamic linking versus static linking
- Released last week: BSD Router Project 1.97, Ubuntu 20.04.1
- Torrent corner: BSD Router Project, KDE neon, Kubuntu, Lubuntu, Redo Rescue, Robolinux, Ubuntu, Ubuntu Budgie, Ubuntu Kylin, Ubuntu MATE, Ubuntu Studio, Xubuntu
- Opinion poll: Were you affected by the GRUB Boothole security patch?
- Reader comments
|
Feature Story (by Jesse Smith) |
Zentyal Server 6.2
Zentyal is an Ubuntu-based server distribution which is designed to be easy to set up and then manage using a friendly, web-based interface. The distribution targets small and medium office and business environments. The Zentyal distribution is intended to take on such tasks a as a storage server, Internet gateway, or to provide other office IT infrastructure - all through a convenient, point-n-click web portal.
The latest version of Zentyal is based on Ubuntu 18.04.4 and mostly features minor updates. There are new anti-virus packages, improved DNS management, easier management of hard drives, and the AppArmor security software is enabled by default.
The download for Zentyal is 1GB in size and is available for 64-bit (x86_64) machines only. Booting from the install media brings up a menu asking us to select our preferred language from a list. Then we are given the choice of wiping the hard drive and installing Zentyal or launching an expert installer. Both menu options launch a text-based installer which should be familiar to people who have set up Ubuntu Server or used Debian's text installer.
Installing
Setting up Zentyal through the expert install mode brings up a series of text-based menus where we are asked to supply our preferred language (again), choose our keyboard layout, time zone, and to make up a username and password for ourselves. The installer then asks if we want to use guided or manual partitioning. The former takes over the entire disk, creating an ext4 formatted LVM volume, while the manual option walks us through an unusually long series of partitioning and filesystem options screens.
The installer then asks if we would like to install a graphical desktop environment (LXDE in this case). Packages are copied to our hard drive and then we are presented with a few more configuration steps. We are asked if we wish to enable a web proxy and if we want to install the GRUB boot loader. Then we confirm our system clock settings and the system offers to restart itself.
The installer uses an unusual combination of white text on a bright green background for text entry boxes which I found difficult to read. The rest of the interface uses a high contrast, but entering text into fields was hard on the eyes.
After the installer finished its work and offered to reboot the computer I ran into my first serious issue. The shutdown process started off well, showing systemd status messages about services being shutdown. However, the process took a long time. In fact, once the system reached a point where it was reportedly cleaning up temporary directories and had been stuck on that task for 15 minutes (longer than the installer had taken to set up the operating system) I finally forced a hard reset.
Early impressions
Zentyal booted and, after performing a quick filesystem check, brought me to a text console. (I had opted not to install the desktop environment.) I could sign in with the credentials I had supplied to the installer and was able to confirm my Internet connection worked. I was able to shutdown the system (reboots happened quickly and were error-free at this time), and some basic command line programs worked.
Once I got logged in I noticed a few oddities with Zentyal. The first was that the operating system identified itself as Ubuntu 18.04.4 LTS rather than Zentyal Server 6.2. Which makes some sense since Ubuntu is this project's parent. The message which is displayed when the user logs in indicates that the web interface can be accessed by pointing a web browser to the server's IP address and using port 8443 over the HTTPS protocol.
Attempts to connect to port 8443 were refused. As were connection attempts to communicate over port 443. Attempts to connect with port 80 (the default HTTP port) worked, but only showed a generic home page for the nginx web server.
At this point I tried to install the telnet client to help me troubleshoot the connection issues and found my package database was a mess. I had to run "dpkg --configure -a" to fix it. This seemed odd as the APT package tools had not been used yet since the installation had completed. After letting dpkg run I was able to install telnet and confirm only ports 22 (for OpenSSH) and 80 (for the generic nginx install) were available. There were no services listening on port 8443. This remained true after a reboot and so I decided to start over from scratch.
Second impressions
Things had gone poorly enough the first time trying Zentyal that I decided to be extra careful the next time around. I double-checked the distribution's ISO checksum, decided to try running it in a virtual machine to avoid any potential hardware incompatibilities, and then opted to take the automated installation option.
As it turns out, the automated install option walks us through almost all of the same steps as the expert installer. We are asked the same questions about language, keyboard layout, time zone, and login credentials. There appear to be just three differences in the automated version of the system installer. The first is we are warned partitions on the main hard disk are already mounted and asked if they should be unmounted before the disk is partitioned. Since the plan is to wipe the disk, umounting partitions seemed wise. Though I'm not sure why any partitions would be mounted by the installer to begin with.
The second difference is that the installer handles disk partitioning, setting up an LVM volume and formatting it with ext4 rather than have us set up partitions and mount points. The third difference is the installer does not ask if we would like to install a graphical desktop, it just assumes we want the desktop. This causes LXDE to be installed, along with a handful of X.Org and Wayland libraries.

Zentyal Server 6.2 -- Exploring the LXDE menu
(full image size: 52kB, resolution; 1920x1200 pixels)
The installation process finished, indicated it was successful and offered to restart the system. Once again Zentyal got stuck shutting down. Background services stopped gradually for a few minutes, then got stuck cleaning out temporary directories. The system at this point appeared to be idle (hard drive and CPU activity were minimal) and remained stuck for the next twenty minutes. Eventually I forced a restart.
This time my fresh copy of Zentyal booted to a graphical environment. I could sign into the LXDE desktop where the Firefox browser opened and automatically attempted to connect to the localhost. This connection failed and, again, all connections (either over HTTP or HTTPS) failed to reach port 8443 and succeeded on port 80 where the generic web server was running. I tried to take a screenshot of this error and discovered that the keyboard shortcut for screenshots was mapped, but to a GNOME screenshot application that was not available. This broken shortcut feels all the more out of place given Zentyal uses the LXDE desktop rather than GNOME.

Zentyal Server 6.2 -- Trying to take a screenshot of Firefox connecting to the Zentyal server
(full image size: 96kB, resolution: 1920x1200 pixels)
I wanted to use the nmap tool to scan local ports and see which services were available. I soon found that nmap was installed, but one of its dependencies (libblas) was missing, causing the tool to not run. I could reinstall nmap through the APT package manager and a scan turned up no new services, other than OpenSSH and nginx showing its generic home page.
Conclusions
After my second failed attempt at using Zentyal, and some troubleshooting, I came to the realization the distribution was not going to work as expected and put it aside. According to the documentation, I should be able to simply install the distribution and connect to it using a web browser, but this did not work, either locally or over the LAN. This was disappointing as I have used Zentyal in the past and generally had positive experiences with it. I've even recommended the distribution to a few people who wanted to run a light office server with an easy, point-n-click interface.
I have three theories as to why Zentyal did not work for me this time around. One is that the documentation is out of date (or updated in places I'm not looking) and additional steps are now required to set up the web portal service. The second is that there is a bug in the web portal software that is preventing it from running.
Personally, I suspect neither of these are true and, instead, something (or multiple somethings) are going wrong during the setup phase. While the installer appears to finish copying its files to my hard drive and reports it is done, the fact the system does not shut down cleanly afterwards suggests something is not finished in the background. The shutdown services never conclude and, while disk and CPU activity was virtually non-existent all twenty minutes I waited, I suspect additional configuration steps were supposed to be happening during that time. It is hard to say for certain though since no status messages are displayed and the installer claims to be finished. I would also consider it odd for services to be enabled during the shutdown phase of the live media, but stranger things have happened.
Whatever the case, Zentyal did not work for me and, unfortunately, did not display any errors or status messages which would help explain why. The documentation, while normally helpful, did not offer any tips to help me get going. In the past Zentyal has proven to be easy for me to use, but this version has left me with a server-sized void to fill.
* * * * *
Visitor supplied rating
Zentyal Server has a visitor supplied average rating of: 8.7/10 from 3 review(s).
Have you used Zentyal Server? You can leave your own review of the project on our ratings page.
|
Miscellaneous News (by Jesse Smith and Ladislav Bodnar) |
CentOS shares survey results, Linux Mint gives version usage overview, IPFire shares DNS security tips, UBports updates list of working devices
The CentOS team has published their monthly community newsletter and it shares some important information on the Boothole issue we reported last week. The newsletter also links to survey data the CentOS team has collected about how their distribution is used, how often it is updated, and how people would like to be involved in the project. "Over the past 3 or 4 months, we have been running a survey about how you use CentOS. Many thanks to those who participated in this, to help us better understand how we can give you what you need. I've written up the results of the survey here. While some of the results were expected - most of you use CentOS in small to medium shops, running services either for work or personal use - there were some eye-opening things in this. To me personally, the volunteerism question shows that a lot of you are looking for places to get involved, and that we haven't done a great job telling you where and how. We'll be working to fix that."
* * * * *
The Linux Mint team has been looking at which versions and editions of their distribution get the most attention. The project looked at which versions are most commonly used and added some observations to explain why this is likely the case: "The newest release attracts many users and grows faster than any other but it does not yet represent the largest percentage. As we can see on the chart, more than half of Linux Mint users use Linux Mint 19.x. The older Mint 18.x and the brand new Mint 20 both represent about 20% of the user base. Linux Mint 17.x despite reaching EOL still represents 6% and LMDE represents about 1%." In the project's monthly newsletter the team also acknowledged some common concerns users had with Linux Mint 20, including the lack of a Chromium web browser package, and reported there are plans to address these issues.
* * * * *
The IPFire team is continuing its series of blog posts detailing recommendations on how to improve computer and network security. The latest post concerns DNS configurations and how to make adjustments to this key component of virtually every network-connected device. "After having roamed around infosec in general last week, this post gives some advice on how to gain additional privacy by changing your IPFire's DNS configuration. DNS happens to be a very basic thus quite important protocol of today's internet, but is still being considered a low-risk one when it comes to security and privacy. If you are familiar with IPFire, you might have noticed DNSSEC validation is mandatory, since it defeats entire classes of attacks...."
* * * * *
The UBports team has published information about the project's work, development progress, and updated ports on various devices. The PinePhone and Nexus 6P received special attention: "Florian has been working on a port for the Nexus 6P from Huawei for about a year and it is in a pretty good state. The only issue is that it is big and heavy. It has a good camera , still minus some functions. The GPS is the fastest on any UT device. It takes about 30 seconds to get a fix. Moving the old core devices to Halium 7.1 build is in the works and progressing well. We now have about 40 devices listed on the devices page. That is way more options than in the past." The list of devices which work with UBports, along with their porting status, can be found on the project's new devices page.
* * * * *
These and other news stories can be found on our Headlines page.
|
Questions and Answers (by Jesse Smith) |
Pros and cons of dynamic linking versus static linking
Linking-it-all-together asks: I came across this article about the benefits of static linking over dynamic linking. If dynamic linking is slower and doesn't offer practical benefits then why do most distros still dynamic link? Is this a hold over from the past or is there a reason I'm missing that make distros still use dynamic linking?
DistroWatch answers: Before we get to the article, I'd like to share a brief, overly generalized view of what statically linked and dynamically linked programs are. A statically linked program is self-contained. Any libraries or functions that are required for the program to run are baked into the program itself. This reduces the program's external dependencies and makes the program bigger. On the positive side of things this means statically linked programs do not rely on other libraries and can be copied to other systems more easily. It also means if libraries are updated on the operating system, the statically linked program will not break due to the changing libraries in other parts of the system.
A dynamically linked program is smaller and does not keep all of its parts internally. Instead a dynamically linked program relies on other libraries on the system to provide key functions. This approach offers a few benefits. In particular it means programs that share common functionality can share one copy of a library rather than have each program carry its own copy. This also means when security updates become available we only need to update each library once and every program on the system which uses pieces of that library automatically benefit, even often without being updated themselves. In theory dynamic linking means smaller programs, smaller updates, and less duplication of functionality. However, dynamically linked programs can break if a library they depend on changes too much or a library they depend on is removed from the system.
I read through the article provided and it does share some interesting statistics on dynamically linked programs versus statically linked programs. The author appears to be making a case against dynamic linking and in favour of static linking, or at least presenting facts which would support such a case. For the sake of this discussion I am going to assume the observations the article's author makes are accurate and factually correct, at least for their own distribution.
The author addresses some interesting questions, such as how often are dynamically libraries used on the system, which indicates how many resources avoid duplication by sharing libraries. They also explore how quickly dynamic and static programs load and how much larger statically linked programs are compared to their dynamically linked counterparts. The author points out that many libraries on their distribution are not shared by many programs, that statically linked programs can load faster, and that not a lot of bandwidth is saved by using dynamically linked programs.
Reading through the page of observations the author shares, it's understandable we might wonder why developers continue to favour dynamically linked applications in most situations. Let's look at some of the specific arguments from the article.
Do your installed programs share dynamic libraries? Findings: not really. Over half of your libraries are used by fewer than 0.1% of your executables.
This is an interesting way of presenting the statistic. Over half of libraries are linked to by fewer than 0.1% of programs. Which is all well and good, but it seems to be focusing on where dynamically linked libraries are not being used, or are used rarely. It is not looking at how often dynamically linked libraries are being used. Imagine if I told you 95% of the items I own do not use wheels, therefore wheels are not important. That may be true, for most items. Many of the objects I own probably do not need wheels. My table, fridge, and laptop do not need wheels. However, the automobile and bicycle really do need wheels to be effective.
I feel the author's argument is similar to the above example using wheels. They are correct that in some instances, maybe even in many instances, libraries are not being shared much, which reduces their value. However, the low level libraries that are used a lot, such as the C library, GTK, and Qt, are likely to be used by hundreds, maybe even thousands, of applications on your distribution. A small number of libraries are used a lot, so it does not matter much (in my opinion) whether other libraries are used rarely. The benefits we get from sharing code in a handful of low-level libraries are enough to make dynamic linking worth while in many situations.
Is loading dynamically linked programs faster?
Findings: definitely not.
This is an interesting point. The author points out that their system loads static applications in about half the time as dynamic ones. This seems like a lot, until we consider the load times are being displayed in nanoseconds. A nanosecond is a billionth of a second, meaning the slowly loading dynamically linked application is taking a whole 0.000137263 seconds to start. It is not physically possible for a person to notice the difference between the load times of a dynamically linked program versus a statically linked one. In fact, you could load a thousand programs of each type before seeing a 0.1 second difference between the two types.
Wouldn't statically linked executables be huge?
Findings: not really. On average, dynamically linked executables use only 4.6% of the symbols on offer from their dependencies. A good linker will remove unused symbols.
I think this point is entirely valid and I do not have much to add to it. A good build system will make individual statically linked programs and dynamically linked ones of similar size. The statically linked ones should not be much larger. However, I believe if we look at how many programs most operating systems run these days, we can see how small benefits will add up over time. Having one program be 4% larger is not a big deal. Having 2,000 programs be 4% larger begins to accumulate additional storage space. Still, the difference, on a modern system, will not be significant so we do not need to worry much about application size. I feel the point here is well made.
Will security vulnerabilities in libraries that have been statically linked cause large or unmanageable updates? Findings: not really.
Not including libc, the only libraries which had "critical" or "high" severity vulnerabilities in 2019 which affected over 100 binaries on my system were dbus, gnutls, cairo, libssh2, and curl. 265 binaries were affected by the rest.
The total download cost to upgrade all binaries on my system which were affected by CVEs in 2019 is 3.8GiB. This is reduced to 1.0GiB if you eliminate glibc.
I think there are two key points to consider carefully here. The author is correct that the difference of a few gigabytes when performing updates over the span of a year is not a lot to most modern computer users. However, I feel it worth noting that, given the choice between larger and smaller updates, most people will want the smaller updates as they use less bandwidth. It might be a relatively small savings, but it is still savings in the range of gigabytes of data and one which will be noticeable on capped or slow Internet connections. In other words, if you can download a 1GB of data in 10 minutes, the size of package updates will not matter to you. However, if you're on a connection where a 1GB download can take most of the day, then you will quickly see the benefit of using dynamic linking to reduce the size of your downloads.
We might also wish to look at this situation from the distribution's point of view. Let's say, just for example, Canonical has 50 million Ubuntu users. And let us assume each user can save around 1GB per year of bandwidth by using dynamic linking to reduce the number packages we need to download. A single extra gigabyte of bandwidth is not much for the end user to absorb, but for Canonical that is a difference of 50 million gigabytes (50 petabytes) per year.
The linked article also skips over the main reason most people want to use dynamically linked programs, which is having the ability to update one library with a security fix and have it correct the issue for every program on the system which uses that library. If one library is vulnerable on a dynamically linked system, we only need to update one package to fix it. When running a statically linked system, we need to update every single program which used the vulnerable library. This can mean a vulnerability in the C library (for example) means updating hundreds, sometimes thousands, of packages. That means in a statically linked scenario we need the maintainer of every package on our system to notice the vulnerability, update their package, and push out a fix. When we use dynamic linking we only need one maintainer, not dozens, to update just one package.
In my opinion, dynamical linking might offer only small, or questionable, benefits a lot of the time, but it offers a great deal of benefit in some key areas with very few drawbacks. There are certainly pros and cons for each approach, but the ease of package management and security updates, along with the reduction of work required by package build servers, means dynamic linking tends to benefit developers and users more than it causes problems. Which is why I suspect dynamic linking will continue to be the default approach for most distributions for the foreseeable future.
* * * * *
Additional answers can be found in our Questions and Answers archive.
|
Released Last Week |
BSD Router Project 1.97
Olivier Cochard-Labbé has announced the release of BSD Router Project (BSDRP) 1.97, the latest stable build of the project's free and open-source software router distribution based on embedded FreeBSD. This release is upgrades the underlying operating system to FreeBSD 12.1: "BSDRP 1.97 is online. Based on a FreeBSD 12.1-STABLE (r363822), it fixes some missing Ethernet NIC modules (Chelsio Ethernet VF driver and Ethernet QLogic 3200 series). This version adds some new packages - Mellanox Firmware tools (lite version), WireGuard, vim-tiny, mrtparse (MRT format data parser), nrpe3 (Nagios client including nagios-plugins), frr7-pythontools (helper script to help reload frr). New features: load of Intel microcodes by default; update to 12.1-STABLE. Bug fixes: add Chelsio Ethernet VF driver (if_cxgbev); add missing if_qlxgb.ko for Ethernet QLogic 3200 series; correctly disabling ICMP redirect by default. New packages: Mellanox firmware tools (lite version); WireGuard; vim-tiny...." See the release announcement and release notes for more details.
Ubuntu 20.04.1
Łukasz Zemczak has announced the release of Ubuntu 20.04.1, along with the distribution's community editions. These new builds mostly contain bug fixes for packages, reducing the amount of time required to update new installations. "The Ubuntu team is pleased to announce the release of Ubuntu 20.04.1 LTS (Long-Term Support) for its Desktop, Server, and Cloud products, as well as other flavours of Ubuntu with long-term support. As usual, this point release includes many updates, and updated installation media has been provided so that fewer updates will need to be downloaded after installation. These include security updates and corrections for other high-impact bugs, with a focus on maintaining stability and compatibility with Ubuntu 20.04 LTS." Further details can be found in the release announcement and in the release notes.
* * * * *
Development, unannounced and minor bug-fix releases
|
Torrent Corner |
Weekly Torrents
The table below provides a list of torrents DistroWatch is currently seeding. If you do not have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found in our Torrent Archive. We also maintain a Torrents RSS feed for people who wish to have open source torrents delivered to them. To share your own open source torrents of Linux and BSD projects, please visit our Upload Torrents page.
Torrent Corner statistics:
- Total torrents seeded: 2,090
- Total data uploaded: 33.0TB
|
Upcoming Releases and Announcements |
Summary of expected upcoming releases
|
Opinion Poll (by Jesse Smith) |
Were you affected by the GRUB Boot Hole security patch?
Last week we talked about a security bug in the GRUB boot loader which, once the issue was patched, the fix could cause some Red Hat and CentOS systems to no longer boot. The issue was quickly resolved and new patches pushed out which worked around the problem. Were you one of the CentOS or Red Hat users who were hit by the GRUB patch problem? Let us know how you worked around it in the comments.
You can see the results of our previous poll on using a Linux-powered mobile phone in last week's edition. All previous poll results can be found in our poll archives.
|
Were you affected by the Boothole patch?
I am a CentOS/RHEL user who was affected: | 18 (2%) |
I am a CentOS/RHEL user who was not affected: | 91 (8%) |
I am not a CentOS/RHEL user who was affected: | 42 (4%) |
I am not a CentOS/RHEL user and not affected: | 999 (87%) |
|
|
Website News (by Ladislav Bodnar) |
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 17 August 2020. Past articles and reviews can be found through our Article Search page. To contact the authors please send e-mail to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews/submissions, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, donations, comments)
- Bruce Patterson (podcast)
|
|
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 0, value: US$0.00) |
|
|
|
 bc1qtede6f7adcce4kjpgx0e5j68wwgtdxrek2qvc4  86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le |
|
Linux Foundation Training |
|
Reader Comments • Jump to last comment |
1 • Static vs dynamic (by Technosaurus on 2020-08-10 01:55:52 GMT from United States)
First, some libraries are just plain bad at static builds (gnu-libc, x11, glib, gtk, most c++ libs) but many have alternatives such as musl-libc, tinyx11, etc... If you use link time optimization (or similar), the size difference in the binaries is often negligible (and sometimes smaller than the shared binary) Since the system doesn't need to load up additional shared libraries, the initial start time of static builds is often much quicker. Static builds can work on different distros regardless of what packages are installed. Dynamic library updates don't break static binaries (important for system repair tools). Updates to static binaries are only necessary iff it uses the library code that required a CVE. The updates for static builds could take advantage of binary diff tools to minimize network traffic - it's usually pretty minimal if the build systems don't change.
Anecdote: Back when I was working on Puppy Linux (4.x timeframe), we used a hybrid method in the main iso where any library that was only used once was built in statically, but that was based on iso size constraints - static builds of single use libs reduced the iso size by 10-20%.
2 • Dynamic linking & static linking (by Friar Tux on 2020-08-10 01:58:22 GMT from Canada)
Isn't that the whole idea behind Flatpak, Snaps, and/or AppImages? And don't developers benefit in that it reduces the amount of work needed to satisfy the various distros? I've come to the point where I'm really not worried about duplication of libraries on my system, thanks to the amount of memory most laptops come with now-a-days. (This may be from my Windows years as Windows installs each app/program into its own folder WITH all the libraries needed. There was plenty of duplicating there.)
3 • Grub update issue (by Bin on 2020-08-10 04:22:22 GMT from United Kingdom)
Running Debian SparkyLinux 5.12 with unattended upgrades.
Normally UA handles grub updates - this time it didn't.
Dumped out at grub rescue prompt
Used rescatux to correct grub and all well. grub is now on the exception list along with xserver.
4 • Static vs dynamic linking (by Alexandru on 2020-08-10 07:37:14 GMT from Austria)
First of all, congrats for insightful article.
Static linking and dynamic linking both have their use cases. 1. Size. Static linking only gets those bits of a library which are actually used, dynamic linking always provides whole library. On the other hand, dynamic linking takes the storage space only once, while static linking takes space as many times as many different programs use that library. 2. Loading time. Statically linked programs usually load faster than dynamically linking ones except the case when the dynamic library is already loaded into memory by some other application that links against it. In this case new dynamically linked application (whose size is smaller than that of statically linked one) is loaded faster. 3. Uniformity. The same application which is statically linked to different versions of the same library, or different libraries that export the same symbols, may look or behave differently. And this is counter-intuitive. Additionally static linking creates problems with the size of updates and shortness of time they are available.
In conclusion: - Static linking use cases: 1. The library is small 2. The library is used by few programs - Dynamic linking use case are all the rest.
5 • Static vs dynamic linking (by Robert_M on 2020-08-10 09:17:35 GMT from Canada)
Historically, dynamic linking was used over static linking in order to reduce the memory and disk space footprint on a system.
When I started my career in computers, a 10 megabyte Winchester disk drive was several thousand dollars and memory was $1 per word. This was for unix based systems. I had a university professor who said that times were great as he remembered memory being $1 per bit. People of my generation actually remember real "core" memory.
It was not unusual to have systems with 1-2 K of memory and 20-40 mbytes of storage. We were memory constrained at the time. A system with 4gig of storage was a large system.
Dynamic linking reduced the need for expensive upgrades but came at a cost. When I worked for an R&D firm that had several thousand unix boxes, it would take about 6 months to a year to ensure that all applications were converted over to work with a new release. A very painful process.
This was at the time when tcp/ip networks were fairly new and the internet was a collection of statically connected sites. We initially had two diskless workstations configured to a single disk based system to reduce deployment costs.
Times were different back then. Today, with current memory and storage prices , it makes sense to come full circle and look static linking to take advantage of its simplicity. As an end user, I am constantly upgrading and I think of my systems as a collection of packages and not libraries. I feel that anything that makes a package self-contained is a good thing.
I am having a blast working with raspberry pi s that have the same power and storage of $30k workstation in the past for sub $100.
My apologies for the long rant, but to understand where we are, we need to understand where we've come from. Context is everything.
Now back to lurking.....
6 • Zentyal (by Bernard Fuller on 2020-08-10 09:28:17 GMT from United Kingdom)
I tried Zentyal in the past and never felt comfortable with it. I seem to remember that one server distribution I tried didn't include a Mail Server, was it this one??
I've been using ClearOS now for several years. If you get the chance, or have the energy, I'd be interested to hear what you make of that. Apart from their forum, I sometimes feel I'm working in a vacuum with it.
Some other independent view would be interesting.
7 • Static vs Dynamic Linking (by Newby on 2020-08-10 10:12:50 GMT from Canada)
@5 Enjoyed reading about your experience with "period era" hardware. Brought back painful memories of trying to input data on a Data General computer with 4K of core memory, via 8 toggle switches on the front panel. For a more "excruciating" experience, there was inputting data into an IBM mainframe via punch cards. It could be a while before you got the results and found out if you were successful or not, and then try and remember what you were trying to do so you could "troubleshoot". And that was assuming the mechanics were aligned properly so the cards didn't "jam up". And who could forget the joys of waiting ages for a cassette tape program to finish loading a simple game on a Commodore or Atari system (as well as Apple, Sinclair/Timex, BBC "Micro", etc.) At the very end of your history lesson about "linking", you intrigued as with a reference about "lurking". Would be rather interesting if you could expound upon that. So many nefarious possibilities inferred by that last line..... :)
8 • LMDE (by OstroL on 2020-08-10 10:23:44 GMT from Poland)
>> LMDE is small but that’s not particularly relevant. It doesn’t get point-releases, it’s not promoted or given the same exposure, and its purpose isn’t to compete with Linux Mint or to attract new users. It’s developed as a plan B in case we need to switch package base one day. It could be seen as a costly investment but it’s strategically important to our project. It tells us exactly how much we rely on Ubuntu, how well we can do without it, and how much work would be involved if we had to stop using it.
9 • grub update issue (by CatInAHat on 2020-08-10 11:14:55 GMT from Australia)
on 'extra' OS, MX with grub on root Partition: update used grub-install (as a tui) to ask which location to update/install grub - eh? chose my current location of course... next boot gave me grub rescue prompt :P had to use SystemRescueCd to boot OS, repaired grub with MX Boot Repair tool
primary OS, MX with grub on mbr: same process, reboot = fine...
secondary OS, Artix, no issue...
10 • Static linking (by bison on 2020-08-10 14:14:33 GMT from United States)
One class of programs that would benefit from static linking are games.
I like to play older versions of SuperTuxKart (before they changed the game physics), but these will not run on modern Linux systems because they depend on obsolete shared libraries, which cannot be installed because they conflict with other libraries on the system.
I keep a copy of Ubuntu 14.04 around just for games.
11 • Static vs Dynamic (by Nathan on 2020-08-10 14:15:11 GMT from United States)
Static vs dynamic to me is a question of how I want abandonware to fail. As a prolific author of abandonware myself, it always has bugged me how android apps that I released never to update again would benefit from security patches if only I re-compiled them against updated libraries (of course, fixing breakages along the way). Sure they continue working (mostly), but they quickly become vulnerable to attacks because of the vulnerable libraries that are baked in. Same applies to my flatpak apps.
On the other hand, whenever I attempt to launch my dynamically-linked abandonware after a year or so of not touching it, I find that it errors out and I have to fix a few broken library calls first.
In the end, for me it boils down to security. If I want to be forced to have good security, dynamic linking is better. If I just want to run the program, never mind that it exposes me to an ever-expanding list of vulnerabilities, then static linking allows me that luxury. Unfortunately for me, I'm both lazy and a security minded person, so I live in constant guilt and worry about my statically-linked programs betraying me. ;)
12 • Linking, and file hash algorithms (by RJA on 2020-08-10 14:31:09 GMT from United States)
Well, over at the PaleMoon community, using the system libraries instead of libraries that are bundled with the package is a big no-no, because of outdated/wrong library versions.
Well, looks like Microsoft made the move to SHA-2 and considers even SHA-1 a risk.
SHA-1 has been considered a risk for a while, but has been tolerable.
So, I was horrified to see MD5! (Including Zentyal)
-RJA
13 • linking in programs (by Myrtle on 2020-08-10 15:07:03 GMT from United States)
https://stackoverflow.com/questions/1993390/static-linking-vs-dynamic-linking
That page said it well and ended it well with a lot of "it depends" in answer to questions about performance.
Test test test is the takeaway, and in an environment as close to the real world working conditions as possible.
14 • Dynamically linked programs (by Tim on 2020-08-10 15:13:51 GMT from United States)
Jesse, that is an excellent paragraph about the benefits of dynamically linked programs. I have known that for many years (I started using UNIX in the early 80s), but it is great to get such a clear summary. Thank you.
FWIW, for the same reasons, I will avoid Flatpaks and Snaps for as long as possible. If they back me into a corner, I will switch to BSD.
15 • Linux Mint LMDE (by barnabyh on 2020-08-10 16:55:44 GMT from Germany)
Shame only 1% of Mint users run LMDE. It's exceptionally polished and runs really well without as much overhead, it could easily be the main edition. No idea what it is supposedly missing when compared to the Ubuntu Mint. Ok, I only used that one briefly about 11 years ago. Perhaps the hardware driver assistant I read about but how many people actually need that? Most is well supported ootb and adding the nVidia driver is not that hard.
Synaptic shows me 60010 packages available so it can't be availability of packages either.
Hope they don't discontinue it, it's the only Mint I would even consider. Running well for 16 months here incl. the upgrade.
16 • Linux Mint (by narly on 2020-08-10 18:48:53 GMT from United States)
I recently updated from Linux Mint 19 to 20. I wanted to wipe my hard drives and start over again from scratch. I also wanted to switch to the Xfce desktop. I gave up on MATE because it started to get buggy. Cinnamon is OK, but I like the speed and simplicity of Xfce better now. I did try LMDE4, but had intermittant wifi problems with my laptop. Now I'm happily running Linux Mint 20 Xfce on both my laptop and desktop.
17 • Linux Mint (by yrotadnam on 2020-08-10 20:59:06 GMT from New Zealand)
@8,@15 - I see LMDE as no more than an insurance policy by Mint. Rather unpolished in its current state, but important as Canonical could be bought or become unpredictable. @17 - Cinnamon is good though I see some crashes and hangups. MATE is again in my experience more stable, has wobbly windows, but is a bit dated. I have tried Xfce but find it lacking after Cinnamon's powerhouse of ease-of-use, particularly things like file managers are where many DE's fall down. KDE have improved much over time, but Mint dropped KDE. You can add it, but its 4.1 which is ancient and rubbish compared to the new 5.8 or whatever you would get with Manjaro. my 10c, YMMV
18 • Mint KDE, @17 (by WhatMeWorry on 2020-08-11 01:03:39 GMT from United States)
"You can add it, but its 4.1"
You can easily add KDE to Mint 20 by enabling Kubuntu backports, and it runs well. Currently it's 5.18.5. (Manjaro is on 5.19.3) Question is, why? If staying in the Ubuntu family, there's Kubuntu; and there's neon, which has the latest. I ran Mint for many years. Had many advantages for me, but in the last few years, the differences between Mint and others have become minor. I just choose a distro that offers the desktop I want.
19 • @18-- Mint. (by R. Cain on 2020-08-11 23:30:04 GMT from United States)
"...Question is, why?...in the last few years, the differences between Mint and others have become minor..."
It's been a very long time since there was any compelling reason to consider using Mint.
20 • LMDE (by other Tim on 2020-08-12 00:20:36 GMT from United States)
I need to push back a little on this idea that LMDE is just a backup plan for Mint and that it's unpolished.
I happily used LMDE 2 for years. There was nothing unpolished about it. The only reason newer LMDEs don't interest me is that I use MATE.
LMDE is a nice option because it's simple to set up a system with it, and by enabling Debian backports you can have relatively fresh packages on a very stable base for many years. There have been many times I've been wishing for a "Ubuntu Backports" but that role is taken by PPAs and sometimes its hard to see who you can trust.
Debian and LMDE are not unpolished. If you take the time to gain even basic knowledge of APT, it's more intuitive and much faster than any of these software stores that people think they need. I use all members of the Debian family (including Ubuntu and Mint) but I think it's been more than six years since I bothered opening a software store. My copies of Ubuntu or Mint are managed the same way my copies of Debian are.
21 • LMDE, @20 (by WhatMeWorry on 2020-08-12 09:32:41 GMT from United States)
"I need to push back a little on this idea that LMDE is just a backup plan for Mint" You'd be pushing back against the Mint devs, since they are the ones saying that. As for being unpolished, it seems OK to me, but I'm not a regular user.
"relatively fresh packages" Debian backports are usually taken from "testing", so "fresh" is definitely relative. Ubuntu does have backports, usually enabled by default.
I don't use the app stores much either, but "basic knowledge of APT" is no substitute for Synaptic. (And vice versa.)
22 • In the last few years... (by Friar Tux on 2020-08-12 13:36:10 GMT from Canada)
@19 (R Cain) "...in the last few years, the differences between Mint and others have become minor..." Some of us see that as a good thing. So long as those others work as well and as problem-free as Mint has worked (for me). Also, it's to be expected. With the number of distros out there, and each one 'improving' with each version, it stands to reason they will soon all meld together. While I like having the choice of hundreds of distros, I can foresee a time when they will all meld into one 'super-distro'. The other route is that we will end up with five or six different versions of Linux and/or BSD, with hundreds of distros in each version. But then, that's freedom for you. (It reminds me of the auto industry. While it only takes four wheels and a motor to get you from point A to point B, still, look how many, many models of vehicles we have come up with.)
23 • Grub Boot(black)hole (by cykodrone on 2020-08-12 19:16:31 GMT from France)
No, my humble dual distro lappy was not affected (Devuan grub), but I must say, that's embarrassing, I bet some faces were as red as RH's logo, eek. :/
24 • @20--"Backup Plan" (by R. Cain on 2020-08-13 13:02:15 GMT from United States)
"I need to push back a little on this idea that LMDE is just a backup plan for Mint..."; "...I happily used LMDE 2 for years..." [this last lends *no* credibility to the commenter's objection; it is NOT ABOUT you, folks]
One needs to be aware of history, to not fall victim to the "Facebook Syndrome" of 'putting it out there' without doing any thinking OR research, before rushing to "...push back..."; to wit--
Clement Lefebvre *HIMSELF* said a few years ago, in one of Mint's blogs or forums, that yes, indeed, the entire, SOLE purpose of developing LMDE was as an insurance policy" against any untoward circumstances which might occur if Mint were absolutely, only tied and committed to Ubuntu.
Push back all you like, folks. Know what you're talking about when you do.
25 • Lmde (by Tim on 2020-08-14 02:07:27 GMT from United States)
I know exactly what I'm talking about: that LMDE is a good distro that gave me a problem free two years.
Clem and Mint are super clear why they make LMDE. My argument is not with them- it's with those voices here dismissing LMDE as unpolished and not worth anything other than this backup plan. If you like Cinnamon and know how to use apt, this might be the distro for you.
26 • LMDE & Mint (by M.Z. on 2020-08-14 20:12:36 GMT from United States)
I've had a lot of good years with LMDE, and it has seemed fairly solid all around to me. It's got plenty of good polish & is very stable, while offering the friendly & easy sort of desktop computing users expect out of Mint. If you use any sort of general PC desktop like KDE/Windows then LMDE could be an excellent distro for you.
The only thing LMDE sort of lacks for me now is the level BTRFS + Timeshift integration in the update manager in LMDE 4 verses LMDE 3. In the previous release I could use Calamares to more easily setup partitions as BTRFS & get the whole thing up & running & doing daily snapshots. There was no need to ever use my daily or weekly BTRFS snaps shots in LMDE 3 give how rock solid stable it was, but that level of stability + a back up plan in a dirt simple desktop distro was very compelling to me. I gave up on additional trouble shooting of getting LMDE4 on BTRFS to load via my Grub customizer in Mageia, though it may well work as well in the main edition as it did for me in LMDE 3.
I could wax poetic about how quickly Mint integrated flatpak into their nice & easy software manager, how long they offered BTRFS + Timeshift before Ubuntu started playing with experimental ZFS support, or how they continue to consistently improve their easy to use set of desktop options. Regardless of all that or how many more details could be given, Mint is one of if not the biggest community based Linux distros & one of the most widely used distros as well, and given how good an alternative it is for windows I can see many compelling reasons why.
27 • Mint (by Friar Tux on 2020-08-14 22:32:28 GMT from Canada)
@26 (MZ) I agree 100%. In fact, Mint is so trouble-free (four years for me) that the joke in my family is that I have to play with other distros to keep my Linux skills up to par. Clem and gang have got one rock solid OS there (LMDE included). Plus, if you don't care for the default polish, you can easily change that. Just hope over to pling.org have have fun. (I'm interpreting polish as the visuals. I could be wrong here.)
28 • SOHO server distros (by Ankleface Wroughlandmire on 2020-08-14 23:16:37 GMT from Ecuador)
Zentyal looks quite underwhelming. If you have hardware that supports it I'd always recommend TrueNAS as the first option. Or if you prefer something Linux-based and/or have less-common or even extremely uncommon hardware, then OpenMediaVault is your solution. It's Debian-based, and can be installed directly as a distro on most normal hardware. But if you have something more arcane you can install it on top of a regular Debian install. Proof in point, I found a site that let me install Debian on an old Lacie NAS with an armv5 processor, and now it runs OpenMediaVault just fine.
29 • "...trouble free.." (by Otis on 2020-08-15 12:16:00 GMT from United States)
@27 I agree but about MX, not Mint. Same thing except it's been only two years (or there abouts) for me. And minus the systemd.
Number of Comments: 29
Display mode: DWW Only • Comments Only • Both DWW and Comments
| | |
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Issue 1037 (2023-09-18): Bodhi Linux 7.0.0, finding specific distros and unified package managemnt, Zevenet replaced by two new forks, openSUSE introduces Slowroll branch, Fedora considering dropping Plasma X11 session |
• Issue 1036 (2023-09-11): SDesk 2023.08.12, hiding command line passwords, openSUSE shares contributor survery results, Ubuntu plans seamless disk encryption, GNOME 45 to break extension compatibility |
• Issue 1035 (2023-09-04): Debian GNU/Hurd 2023, PCLinuxOS 2023.07, do home users need a firewall, AlmaLinux introduces new repositories, Rocky Linux commits to RHEL compatibility, NetBSD machine runs unattended for nine years, Armbian runs wallpaper contest |
• Issue 1034 (2023-08-28): Void 20230628, types of memory usage, FreeBSD receives port of Linux NVIDIA driver, Fedora plans improved theme handling for Qt applications, Canonical's plans for Ubuntu |
• Issue 1033 (2023-08-21): MiniOS 20230606, system user accounts, how Red Hat clones are moving forward, Haiku improves WINE performance, Debian turns 30 |
• Issue 1032 (2023-08-14): MX Linux 23, positioning new windows on the desktop, Linux Containers adopts LXD fork, Oracle, SUSE, and CIQ form OpenELA |
• Issue 1031 (2023-08-07): Peppermint OS 2023-07-01, preventing a file from being changed, Asahi Linux partners with Fedora, Linux Mint plans new releases |
• Issue 1030 (2023-07-31): Solus 4.4, Linux Mint 21.2, Debian introduces RISC-V support, Ubuntu patches custom kernel bugs, FreeBSD imports OpenSSL 3 |
• Issue 1029 (2023-07-24): Running Murena on the Fairphone 4, Flatpak vs Snap sandboxing technologies, Redox OS plans to borrow Linux drivers to expand hardware support, Debian updates Bookworm media |
• Issue 1028 (2023-07-17): KDE Connect; Oracle, SUSE, and AlmaLinux repsond to Red Hat's source code policy change, KaOS issues media fix, Slackware turns 30; security and immutable distributions |
• Issue 1027 (2023-07-10): Crystal Linux 2023-03-16, StartOS (embassyOS 0.3.4.2), changing options on a mounted filesystem, Murena launches Fairphone 4 in North America, Fedora debates telemetry for desktop team |
• Issue 1026 (2023-07-03): Kumander Linux 1.0, Red Hat changing its approach to sharing source code, TrueNAS offers SMB Multichannel, Zorin OS introduces upgrade utility |
• Issue 1025 (2023-06-26): KaOS with Plasma 6, information which can leak from desktop environments, Red Hat closes door on sharing RHEL source code, SUSE introduces new security features |
• Issue 1024 (2023-06-19): Debian 12, a safer way to use dd, Debian releases GNU/Hurd 2023, Ubuntu 22.10 nears its end of life, FreeBSD turns 30 |
• Issue 1023 (2023-06-12): openSUSE 15.5 Leap, the differences between independent distributions, openSUSE lengthens Leap life, Murena offers new phone for North America |
• Issue 1022 (2023-06-05): GetFreeOS 2023.05.01, Slint 15.0-3, Liya N4Si, cleaning up crowded directories, Ubuntu plans Snap-based variant, Red Hat dropping LireOffice RPM packages |
• Issue 1021 (2023-05-29): rlxos GNU/Linux, colours in command line output, an overview of Void's unique features, how to use awk, Microsoft publishes a Linux distro |
• Issue 1020 (2023-05-22): UBports 20.04, finding another machine's IP address, finding distros with a specific kernel, Debian prepares for Bookworm |
• Issue 1019 (2023-05-15): Rhino Linux (Beta), checking which applications reply on a package, NethServer reborn, System76 improving application responsiveness |
• Issue 1018 (2023-05-08): Fedora 38, finding relevant manual pages, merging audio files, Fedora plans new immutable edition, Mint works to fix Secure Boot issues |
• Issue 1017 (2023-05-01): Xubuntu 23.04, Debian elects Project Leaders and updates media, systemd to speed up restarts, Guix System offering ground-up source builds, where package managers install files |
• Issue 1016 (2023-04-24): Qubes OS 4.1.2, tracking bandwidth usage, Solus resuming development, FreeBSD publishes status report, KaOS offers preview of Plasma 6 |
• Issue 1015 (2023-04-17): Manjaro Linux 22.0, Trisquel GNU/Linux 11.0, Arch Linux powering PINE64 tablets, Ubuntu offering live patching on HWE kernels, gaining compression on ex4 |
• Issue 1014 (2023-04-10): Quick looks at carbonOS, LibreELEC, and Kodi, Mint polishes themes, Fedora rolls out more encryption plans, elementary OS improves sideloading experience |
• Issue 1013 (2023-04-03): Alpine Linux 3.17.2, printing manual pages, Ubuntu Cinnamon becomes official flavour, Endeavour OS plans for new installer, HardenedBSD plans for outage |
• Issue 1012 (2023-03-27): siduction 22.1.1, protecting privacy from proprietary applications, GNOME team shares new features, Canonical updates Ubuntu 20.04, politics and the Linux kernel |
• Issue 1011 (2023-03-20): Serpent OS, Security Onion 2.3, Gentoo Live, replacing the scp utility, openSUSE sees surge in downloads, Debian runs elction with one candidate |
• Issue 1010 (2023-03-13): blendOS 2023.01.26, keeping track of which files a package installs, improved network widget coming to elementary OS, Vanilla OS changes its base distro |
• Issue 1009 (2023-03-06): Nemo Mobile and the PinePhone, matching the performance of one distro on another, Linux Mint adds performance boosts and security, custom Ubuntu and Debian builds through Cubic |
• Issue 1008 (2023-02-27): elementary OS 7.0, the benefits of boot environments, Purism offers lapdock for Librem 5, Ubuntu community flavours directed to drop Flatpak support for Snap |
• Issue 1007 (2023-02-20): helloSystem 0.8.0, underrated distributions, Solus team working to repair their website, SUSE testing Micro edition, Canonical publishes real-time edition of Ubuntu 22.04 |
• Issue 1006 (2023-02-13): Playing music with UBports on a PinePhone, quick command line and shell scripting questions, Fedora expands third-party software support, Vanilla OS adds Nix package support |
• Issue 1005 (2023-02-06): NuTyX 22.12.0 running CDE, user identification numbers, Pop!_OS shares COSMIC progress, Mint makes keyboard and mouse options more accessible |
• Issue 1004 (2023-01-30): OpenMandriva ROME, checking the health of a disk, Debian adopting OpenSnitch, FreeBSD publishes status report |
• Issue 1003 (2023-01-23): risiOS 37, mixing package types, Fedora seeks installer feedback, Sparky offers easier persistence with USB writer |
• Issue 1002 (2023-01-16): Vanilla OS 22.10, Nobara Project 37, verifying torrent downloads, Haiku improvements, HAMMER2 being ports to NetBSD |
• Issue 1001 (2023-01-09): Arch Linux, Ubuntu tests new system installer, porting KDE software to OpenBSD, verifying files copied properly |
• Issue 1000 (2023-01-02): Our favourite projects of all time, Fedora trying out unified kernel images and trying to speed up shutdowns, Slackware tests new kernel, detecting what is taking up disk space |
• Issue 999 (2022-12-19): Favourite distributions of 2022, Fedora plans Budgie spin, UBports releasing security patches for 16.04, Haiku working on new ports |
• Issue 998 (2022-12-12): OpenBSD 7.2, Asahi Linux enages video hardware acceleration on Apple ARM computers, Manjaro drops proprietary codecs from Mesa package |
• Issue 997 (2022-12-05): CachyOS 221023 and AgarimOS, working with filenames which contain special characters, elementary OS team fixes delta updates, new features coming to Xfce |
• Issue 996 (2022-11-28): Void 20221001, remotely shutting down a machine, complex aliases, Fedora tests new web-based installer, Refox OS running on real hardware |
• Issue 995 (2022-11-21): Fedora 37, swap files vs swap partitions, Unity running on Arch, UBports seeks testers, Murena adds support for more devices |
• Issue 994 (2022-11-14): Redcore Linux 2201, changing the terminal font size, Fedora plans Phosh spin, openSUSE publishes on-line manual pages, disabling Snap auto-updates |
• Issue 993 (2022-11-07): Static Linux, working with just a kernel, Mint streamlines Flatpak management, updates coming to elementary OS |
• Issue 992 (2022-10-31): Lubuntu 22.10, setting permissions on home directories, Linux may drop i486, Fedora delays next version for OpenSSL bug |
• Issue 991 (2022-10-24): XeroLinux 2022.09, learning who ran sudo, exploring firewall tools, Rolling Rhino Remix gets a fresh start, Fedora plans to revamp live media |
• Issue 990 (2022-10-17): ravynOS 0.4.0, Lion Linux 3.0, accessing low numbered network ports, Pop!_OS makes progress on COSMIC, Murena launches new phone |
• Issue 989 (2022-10-10): Ubuntu Unity, kernel bug causes issues with Intel cards, Canonical offers free Ubuntu Pro subscriptions, customizing the command line prompt |
• Issue 988 (2022-10-03): SpiralLinux 11.220628, finding distros for older equipment and other purposes, SUSE begins releasing ALP prototypes, Debian votes on non-free firmware in installer |
• Issue 987 (2022-09-26): openSUSE's MicroOS, converting people to using Linux, pfSense updates base system and PHP, Python 2 dropped from Arch |
• Issue 986 (2022-09-19): Porteus 5.0, remotely wiping a hard drive, a new software centre for Ubuntu, Proxmox offers offline updates |
• Issue 985 (2022-09-12): Garuda Linux, using root versus sudo, UBports on the Fairphone 4, Slackware reverses change to grep |
• Full list of all issues |
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Shells.com |

Your own personal Linux computer in the cloud, available on any device. Supported operating systems include Android, Debian, Fedora, KDE neon, Kubuntu, Linux Mint, Manjaro and Ubuntu, ready in minutes.
Starting at US$4.95 per month, 7-day money-back guarantee
|
Random Distribution | 
Salient OS
Salient OS is an Arch Linux-based, rolling-release distribution aimed at multimedia and gaming enthusiasts. It is optimised for performance as a gaming workstation and it can be installed to a hard disk using the Calamares installer. Salient OS comes in two separate editions, featuring either the Xfce or the KDE Plasma desktop.
Status: Dormant
|
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|