DistroWatch Weekly |
DistroWatch Weekly, Issue 986, 19 September 2022 |
Welcome to this year's 38th issue of DistroWatch Weekly!
Base distributions, independent projects which serve as the foundation for other distributions, are often reassembled into all sorts of unexpected shapes and applied to a wide variety of purposes. This week we begin with a look at Porteus, a Slackware-based project which strives to be as desktop-friendly and modern as Slackware is server-focused and conservative. Jeff Siegel takes us for a tour of Porteus in this week's Feature Story and reports on his findings. Then, in our News section, we talk about an unofficial software centre being developed for Ubuntu which strives to overcome the problems in the existing Ubuntu Software Centre. We also report on a handy tool from Proxmox which offers offline updates in a variety of scenarios. Plus we talk about how to handle protecting data on a stolen laptop. Do you have a way to remotely connect to your laptop, possibly to track it or remotely wipe its disk? Let us know about your approach to gaining remote access in this week's Opinion Poll. In this issue we're pleased to welcome the young SpiralLinux distribution to our database. SpiralLinux provides a series of desktop spins based on Debian and is a spiritual sibling to GeckoLinux. Plus we are pleased to share the releases of the past week and share the torrents we are seeding. We wish you all a wonderful week and happy reading!
Content:
|
Feature Story (by Jeff Siegel) |
Porteus 5.0
Porteus is based on Slackware, which may be the most old-fashioned, command line-driven distro in the Linux community, including and particularly for installation. Nevertheless, Porteus' developers have come up with a live desktop distribution (with eight desktops for x86_64) that is portable and aims to be persistent. In other words, so much of what Slackware is not -- and does not want to be.
Does your brain hurt yet? Because mine does.
I spent a couple of weeks with three of the desktops - Xfce, KDE, and Cinnamon - and found that, yes, a Slackware-based distro can offer a live desktop that is portable and snappy. But it's far from straightforward to use or configure, and especially if you want to do more than marvel at how slick the desktop looks and acts. Package management, to quote from the Porteus forum, ain't pretty: "Package management (and dependency resolution) is a perpetual issue in this Slackware based Porteus."
And getting persistence to work? Just writing that sentence made my brain hurt yet again; I was never able to do it. Maybe the best way to explain the difficulty is with this analogy: You may be able to troubleshoot how to save changes to a Porteus USB stick so they'll be there the next time, but it's like walking around the block four times in order to cross the street - a lot of effort for something that should take almost no effort at all.
Getting started
I downloaded the three desktops and installed each on a 32GB USB stick. They're part of Porteus 5.0, which uses the 5.18.8 kernel and is based on Slackware 15.0. It can run on as little as 36MB of RAM, but probably needs 512MB to load into memory and to run effectively. The downloaded ISO files are stunningly small - 348MB for the Xfce desktop, 359MB for Cinnamon, and 417MB for KDE. By comparison, the current Mint Cinnamon ISO is 2.4 GB.

Porteus 5.0 -- The Cinnamon desktop and application menu
(full image size: 1.7MB, resolution: 1920x1080 pixels)
Boot times, as advertised, are about 15 seconds - again, amazingly quick. Each desktop looks as it should (though the Xfce dark theme is a bit muddy) and responds quickly and easily. I wasn't surprised to see this with Xfce, but it was impressive with Cinnamon, which sometimes gives me trouble, and especially impressive with KDE - the latter truly acted as it was running on a high-end machine, and not from a generic USB stick on my decade-old, 4GB memory Asus laptop.
The software is also modern and top-notch, as opposed to the lighter and older (and sometimes ancient) apps that many portable distros use to save space and memory. There is the underrated Audacious media player, the MPV video player, the Dconf settings editor, and GParted to manage partitions. Interestingly, there are few strictly KDE apps for that desktop, no doubt to keep duplication of functions and bloat off the USB. Also convenient: a root terminal for each desktop and launch-as-root icons for the Thunar, Nemo, and Dolphin file managers.
Which, unfortunately, was about all of the good news. I should have figured something was up when I couldn't find a printer manager for any of the desktops, so no way to print to my networked Canon MX-920. Contrast this with EasyOS, which has turned network printing into a one-step app. Plus, there isn't a word processor or office suite and no email software.

Porteus 5.0 -- Trying to find printer settings
(full image size: 1.6MB, resolution: 1920x1080 pixels)
It's not so much that package management is so difficult and that persistence is even more complicated; it's that, since Porteus is based on Slackware, no one seems to worry about those things. There is very little documentation, and what there is - to quote again from the post on the Porteus forum - is often wrong: "Some of our documentation is outdated, [the] usm [package manager] is no longer with us." Hence my frustration when I tried to use the Porteus FAQ, loaded in the distro, and which called for USM to install new packages -- and couldn't find it.

Porteus 5.0 -- Exploring the project's documentation
(full image size: 1.1MB, resolution: 1920x1080 pixels)
Problems, problems, problems
The problems started with Porteus' "Browser Selection and Update Tool," which offers to install any of eight browsers (including the Lynx terminal browser). You can also choose between specific versions of some of the browsers, like the current Firefox or Firefox ESR. The tool mostly works - except when it doesn't. One forum user said the Porteus server wouldn't download Firefox despite repeated attempts. The solution? He needed to go the mirror, download the package, and install it himself.

Porteus 5.0 -- Selecting web browsers to install
(full image size: 1.4MB, resolution: 1920x1080 pixels)
Technically, these are not packages, but what Porteus calls modules. The idea is to avoid traditional package building, instead relying on modules that can be turned on and off. Don't need the word processor module you just loaded? Then click it again and turn it off, with the goal of keeping Porteus small and compact. This seems to be a change from previous versions of Porteus, which used the USM package manager and was relatively straightforward, but may have used too much USB space. In addition, there are a variety of scripts - called Porteus cheat sheets - that are supposed to help with packages, persistence, and the like.

Porteus 5.0 -- Trying to move a module
(full image size: 950kB, resolution: 1920x1080 pixels)
The catch, of course, is that it's not clear how to build a module, though there is a module app with a handful of modules awaiting installation. Apparently, module building involves using a wrapper called pmod in conjunction with the Slackware package tool, slackpkg. There is also a script called pkginfo, which is used to check for missing dependencies as well as to find out if the package is already installed. All of which, frankly, makes typical command line package installation - the scourge of new Linux users - seem simple. Or, to quote from the same forum post one more time: "Beware - [slackpkg] is far from intuitive."
So yes, my brain is starting to hurt again.
I didn't have any trouble downloading and installing the Firefox module, and it worked most of the time I clicked on it. And it was snappy, too. And I could turn the module off, as well. But, of course, there was another catch. The module is loaded into /tmp, and needs to be moved to the /porteus/modules folder on the USB. Otherwise, it won't be there the next time you run Porteus.
How to move it is a mystery. I tried several approaches - dragging and dropping, cutting and pasting, and using the Porteus save manager to create a saved space on the USB. And I tried using the root account, as well.
All of which failed with the error message: "Error while copying to modules." And why not? The modules folder is there, but it has no space in it -- 0 bytes.
A few words about persistence
Persistence is not difficult. Puppy Linux has been doing it for years with a couple of mouse clicks, while Puppy successor EasyOS works even more smoothly. And Ubuntu's Ubiquity-driven persistence, despite having a couple of hurdles to overcome and the need to use a USB with enough space to account for the size of the Ubuntu ISO, is not all that difficult to work with.
It's not like I didn't want it to work, either. I'm just geeky enough to love this stuff, and I love to find something that is so different and so unique that I can tell people about it - and bore them in the process, since it's Linux. And maybe it was me; maybe the answer was in front of me the entire time and I just didn't see it. But I tried everything I could think of to make persistence work with Porteus, short of using GParted to force space on the USB. And the reason I didn't was simple - if I needed to do that, what's the point of persistence? Who else would bother except someone who wants to batter their brain with the pain of Slackware?
It's also why I didn't try to install any of the desktop ISOs on my laptop. If I couldn't get persistence to work, what was the point of installation other than making me even crazier?

Porteus 5.0 -- The KDE Plasma desktop
(full image size: 2.3MB, resolution: 1920x1080 pixels)
In the end, persistence in Porteus is past infuriating, maybe even more than package installation. Is that because of its Slackware roots? Is it a lack of resources for development? Porteus 5.0 was three years in the making, which speaks to some difficulties on that end. Or it is just the idea that the people who will use Porteus will figure it out for themselves?
Maybe. But that doesn't mean it's a good idea - or that I'll give up my copy of EasyOS.
* * * * *
Hardware used for this review
My physical test equipment for this review was an Asus UX31A laptop with the following specifications:
- Processor: Intel Core i5-3317U, 1.7GHz
- Storage: 128GB SSD
- Memory: 4GB of RAM
- Networking: Intel Centrino Advanced-N 6235 802.11 a/b/g/n wireless
- Display: Integrated Intel HD Graphics 4000
When he is not testing out new versions of Linux distributions, Jeff Siegel can be found writing about all things related to wine at Wine Curmudgeon.
* * * * *
Visitor supplied rating
Porteus has a visitor supplied average rating of: 9/10 from 13 review(s).
Have you used Porteus? You can leave your own review of the project on our ratings page.
|
Miscellaneous News (by Jesse Smith) |
Unofficial new software centre for Ubuntu, Proxmox offers offline mirroring
Though it is not official yet, it looks as though Ubuntu users may soon be given a new software centre. The current software centre, which ships with the Ubuntu Desktop edition, is often criticized for being slow and locking up during operations. An effort to create a more responsive, more reliable software centre is underway. A brief overview of the new software centre along with screenshots can be found on the project's GitHub page.
* * * * *
The Proxmox project has announced a new mirroring tool to help administrators keep up with software updates in a variety of scenarios. "We are proud to announce the first release of our new Proxmox Offline Mirror tool. With the Proxmox Offline Mirror tool, you can manage a local APT mirror for all package updates for Proxmox and Debian projects. From this local APT mirror you can create an external medium, for example a USB flash drive or a local network share, to update systems which cannot access the package repositories directly (or proxied) via the Internet. Such systems might be restricted by policies to access the public internet or are completely air-gapped. Finally, you can also manage subscriptions for such restricted hosts." Additional details can be found in the project's announcement.
* * * * *
These and other news stories can be found on our Headlines page.
|
Questions and Answers (by Jesse Smith) |
Remotely wiping hard drive
This-hard-drive-will-self-destruct asks: I'm looking to set my laptop up so that if it's ever stolen I can remotely access it and wipe the drive. I am using Btrfs as a file system, which I know shred won't work properly on. Any ideas?
DistroWatch answers: I have a few thoughts on this sort of setup. The first thing which comes to mind is it is true tools like shred won't work on files contained in copy-on-write filesystems such as Btrfs and ZFS. The attempts to overwrite these files before they are erased will fail under normal circumstances. However, this limitation is just for individual files within a filesystem. You can use tools like shred to erase entire disks. When you use shred on a whole disk it doesn't matter which filesystem you are using because the operation isn't working through the filesystem, it's operating on the raw disk.
In other words, using shred to erase each file individually on a Btrfs volume will fail. However, running shred on the disk device itself will work. For example, if your laptop's hard drive was called sda then you could run the following:
shred /dev/sda
In short, you can use shred for wiping a disk clean. However, there are a number of problems with the plan of logging into the laptop remotely and running a command to wipe the hard drive. In no particular order, these are some challenges you'll face:
- The laptop needs to be powered on and connected to a network. This means the person who stole it has been able to login to an account and make a network connection.
- The laptop needs to not be blocked from making (or accepting) networking connections, for example by a local firewall.
- The person who stole the laptop must not have removed your user account or changed your password, or replaced your operating system while still leaving your user data intact.
- You need to have a method in place for you to make the network connection happen. In other words, your laptop either needs to initiate a connection when it connects to a network, or it needs to be able to accept a network connection. If the former, your laptop will probably be opening a remote forwarding port using OpenSSH and connecting to a server you control. In the latter case you need some way to know the IP address of your laptop, maybe by having it send a ping or connecting to a remote service.
In short, this plan of remotely connecting to your laptop is probably not going to work. For it to be successful the person who stole it will need to be technology savvy enough to break into a local account and connect to the network on a Linux machine, while also not being savvy enough to know this is a bad idea. You're also relying on them not making backups or installing a fresh operating system before making themselves vulnerable to your plan. The thief also needs to stay on-line long enough for you to detect the laptop is on-line, sign in, and run the wipe command.
Chances are anyone who steals your laptop will either just wipe it immediately, change your login credentials, or make a backup before taking it on-line. In most cases trying to remotely wipe the disk won't help you. Not to mention you'd need to enable remote access and monitor for the laptop after it was stolen. This can be done, but it's a relatively large amount of work.
An easier approach is to set up disk (or home directory) encryption. Most Linux distributions make disk encryption a single-click process at install time. Simply click the "Encrypt disk" box during the initial install and enter a password. After that, your files are protected. As long as no one steals your laptop while you're logged in and the system is powered on (ie not in sleep mode) your information should be secure. This is an easier form of security to enable, it's more likely to work, and prevents anyone who steals your laptop from reading your files.
* * * * *
Additional answers can be found in our Questions and Answers archive.
|
Released Last Week |
SME Server 10.1
Terry Fage has announced the release of SME Server 10.1, an updated version of the project's specialist distribution for home servers. This version continues to be based on CentOS 7 and will be supported until June 2024: "The Koozali SME Server development team is pleased to announce the release of SME Server 10.1. This release is based on CentOS 7. CentOS 7 has an end of life on 30 June 2024. Koozali SME Server users are encouraged to upgrade production servers to this release. Major changes in this release: httpd access control using httpd 2.4 syntax; improve handling of logs between journalctl and rsyslog; improve logrotate scripts; better handling of pseudonyms; improve yum update without reboot; upgrade bglibs and cvm-unix to latest version; Contribs data are now part of core backup, improved handling of SSL certificates; increased level of security in term of encryption for all services; FTP is only available over TLS by default to avoid clear text exchanges on the network; PHP module is not used anymore by Apache server, we now use php-fpm 7.4 by default...." Read the rest of the release announcement for more information.
IPFire 2.27 Core 170
IPFire is a lightweight Linux distribution for use with firewalls and routers. The project has released a new update which introduces publicly supplied IP block lists. "he next Core Update is released: IPFire 2.27 - Core Update 170. It features new IP blocklists for the firewall engine, significant improvements to Pakfire, modernizes the default cryptographic algorithm selection for IPsec connections, as well as a new kernel, and a plethora of bug fixes and security improvements under the hood. IP-Reputation Blocking to keep known threats out: Based on prior development by Tim FitzGeorge, Stefan brought a new feature to the firewall engine, which allows the easy activation of various public IP-based blocklists, just by a single click." Additional information can be found in the project's release announcement.
* * * * *
Development, unannounced and minor bug-fix releases
|
Torrent Corner |
Weekly Torrents
The table below provides a list of torrents DistroWatch is currently seeding. If you do not have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found in our Torrent Archive. We also maintain a Torrents RSS feed for people who wish to have open source torrents delivered to them. To share your own open source torrents of Linux and BSD projects, please visit our Upload Torrents page.
Torrent Corner statistics:
- Total torrents seeded: 2,771
- Total data uploaded: 42.4TB
|
Upcoming Releases and Announcements |
Summary of expected upcoming releases
|
Opinion Poll (by Jesse Smith) |
Remotely accessing your laptop
In this week's Questions and Answers column we talked about protecting a laptop's hard drive contents from capture. One of the options touched on was remotely accessing the laptop, which could lead to finding or erasing the stolen computer. We'd like to hear if you have a way to remotely connect to your computer when it's not in your home or office. Do you have a remote login option set up using dynamic DNS, a proxy, or utility which phones home to you? Let us know how you remotely access your machines in the comments.
You can see the results of our previous poll on using a root account versus sudo in last week's edition. All previous poll results can be found in our poll archives.
|
Remotely accessing a computer outside the LAN
I use dynamic DNS: | 114 (9%) |
I use a phone home service: | 5 (0%) |
I use a proxy: | 13 (1%) |
I use a third-party connection app: | 150 (12%) |
I use another solution: | 67 (5%) |
I do not have remote access outside the LAN: | 239 (19%) |
I do not have remote access at all: | 651 (53%) |
|
|
Website News |
New distributions added to database
SpiralLinux
SpiralLinux is a selection of desktop spins built from Debian GNU/Linux, with a focus on simplicity and out-of-the-box usability across all the major desktop environments. SpiralLinux serves as an alternative live installation method for a highly reliable customized Debian system using only official Debian package repositories. Unlike Debian's official install media, SpiralLinux includes non-free firmware. It also provides popular media codecs out of the box.

SpiralLinux 11.220628 -- The Plasma application menu
(full image size: 1.2MB, resolution: 1920x1080 pixels)
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 26 September 2022. Past articles and reviews can be found through our Article Search page. To contact the authors please send e-mail to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews/submissions, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, donations, comments)
|
|
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 0, value: US$0.00) |
|
|
|
 bc1qtede6f7adcce4kjpgx0e5j68wwgtdxrek2qvc4  86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le |
|
Linux Foundation Training |
| |
MALIBAL |
MALIBAL: Linux Laptops Custom Built for YouMALIBAL is an innovative computer manufacturer that produces high-performance, custom laptops for Linux. If your MALIBAL laptop is not the best Linux laptop you have ever used, you can return it for a full 100% refund. We will even pay the return shipping fees! For more info, visit: https://www.malibal.com
|
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Issue 1021 (2023-05-29): rlxos GNU/Linux, colours in command line output, an overview of Void's unique features, how to use awk, Microsoft publishes a Linux distro |
• Issue 1020 (2023-05-22): UBports 20.04, finding another machine's IP address, finding distros with a specific kernel, Debian prepares for Bookworm |
• Issue 1019 (2023-05-15): Rhino Linux (Beta), checking which applications reply on a package, NethServer reborn, System76 improving application responsiveness |
• Issue 1018 (2023-05-08): Fedora 38, finding relevant manual pages, merging audio files, Fedora plans new immutable edition, Mint works to fix Secure Boot issues |
• Issue 1017 (2023-05-01): Xubuntu 23.04, Debian elects Project Leaders and updates media, systemd to speed up restarts, Guix System offering ground-up source builds, where package managers install files |
• Issue 1016 (2023-04-24): Qubes OS 4.1.2, tracking bandwidth usage, Solus resuming development, FreeBSD publishes status report, KaOS offers preview of Plasma 6 |
• Issue 1015 (2023-04-17): Manjaro Linux 22.0, Trisquel GNU/Linux 11.0, Arch Linux powering PINE64 tablets, Ubuntu offering live patching on HWE kernels, gaining compression on ex4 |
• Issue 1014 (2023-04-10): Quick looks at carbonOS, LibreELEC, and Kodi, Mint polishes themes, Fedora rolls out more encryption plans, elementary OS improves sideloading experience |
• Issue 1013 (2023-04-03): Alpine Linux 3.17.2, printing manual pages, Ubuntu Cinnamon becomes official flavour, Endeavour OS plans for new installer, HardenedBSD plans for outage |
• Issue 1012 (2023-03-27): siduction 22.1.1, protecting privacy from proprietary applications, GNOME team shares new features, Canonical updates Ubuntu 20.04, politics and the Linux kernel |
• Issue 1011 (2023-03-20): Serpent OS, Security Onion 2.3, Gentoo Live, replacing the scp utility, openSUSE sees surge in downloads, Debian runs elction with one candidate |
• Issue 1010 (2023-03-13): blendOS 2023.01.26, keeping track of which files a package installs, improved network widget coming to elementary OS, Vanilla OS changes its base distro |
• Issue 1009 (2023-03-06): Nemo Mobile and the PinePhone, matching the performance of one distro on another, Linux Mint adds performance boosts and security, custom Ubuntu and Debian builds through Cubic |
• Issue 1008 (2023-02-27): elementary OS 7.0, the benefits of boot environments, Purism offers lapdock for Librem 5, Ubuntu community flavours directed to drop Flatpak support for Snap |
• Issue 1007 (2023-02-20): helloSystem 0.8.0, underrated distributions, Solus team working to repair their website, SUSE testing Micro edition, Canonical publishes real-time edition of Ubuntu 22.04 |
• Issue 1006 (2023-02-13): Playing music with UBports on a PinePhone, quick command line and shell scripting questions, Fedora expands third-party software support, Vanilla OS adds Nix package support |
• Issue 1005 (2023-02-06): NuTyX 22.12.0 running CDE, user identification numbers, Pop!_OS shares COSMIC progress, Mint makes keyboard and mouse options more accessible |
• Issue 1004 (2023-01-30): OpenMandriva ROME, checking the health of a disk, Debian adopting OpenSnitch, FreeBSD publishes status report |
• Issue 1003 (2023-01-23): risiOS 37, mixing package types, Fedora seeks installer feedback, Sparky offers easier persistence with USB writer |
• Issue 1002 (2023-01-16): Vanilla OS 22.10, Nobara Project 37, verifying torrent downloads, Haiku improvements, HAMMER2 being ports to NetBSD |
• Issue 1001 (2023-01-09): Arch Linux, Ubuntu tests new system installer, porting KDE software to OpenBSD, verifying files copied properly |
• Issue 1000 (2023-01-02): Our favourite projects of all time, Fedora trying out unified kernel images and trying to speed up shutdowns, Slackware tests new kernel, detecting what is taking up disk space |
• Issue 999 (2022-12-19): Favourite distributions of 2022, Fedora plans Budgie spin, UBports releasing security patches for 16.04, Haiku working on new ports |
• Issue 998 (2022-12-12): OpenBSD 7.2, Asahi Linux enages video hardware acceleration on Apple ARM computers, Manjaro drops proprietary codecs from Mesa package |
• Issue 997 (2022-12-05): CachyOS 221023 and AgarimOS, working with filenames which contain special characters, elementary OS team fixes delta updates, new features coming to Xfce |
• Issue 996 (2022-11-28): Void 20221001, remotely shutting down a machine, complex aliases, Fedora tests new web-based installer, Refox OS running on real hardware |
• Issue 995 (2022-11-21): Fedora 37, swap files vs swap partitions, Unity running on Arch, UBports seeks testers, Murena adds support for more devices |
• Issue 994 (2022-11-14): Redcore Linux 2201, changing the terminal font size, Fedora plans Phosh spin, openSUSE publishes on-line manual pages, disabling Snap auto-updates |
• Issue 993 (2022-11-07): Static Linux, working with just a kernel, Mint streamlines Flatpak management, updates coming to elementary OS |
• Issue 992 (2022-10-31): Lubuntu 22.10, setting permissions on home directories, Linux may drop i486, Fedora delays next version for OpenSSL bug |
• Issue 991 (2022-10-24): XeroLinux 2022.09, learning who ran sudo, exploring firewall tools, Rolling Rhino Remix gets a fresh start, Fedora plans to revamp live media |
• Issue 990 (2022-10-17): ravynOS 0.4.0, Lion Linux 3.0, accessing low numbered network ports, Pop!_OS makes progress on COSMIC, Murena launches new phone |
• Issue 989 (2022-10-10): Ubuntu Unity, kernel bug causes issues with Intel cards, Canonical offers free Ubuntu Pro subscriptions, customizing the command line prompt |
• Issue 988 (2022-10-03): SpiralLinux 11.220628, finding distros for older equipment and other purposes, SUSE begins releasing ALP prototypes, Debian votes on non-free firmware in installer |
• Issue 987 (2022-09-26): openSUSE's MicroOS, converting people to using Linux, pfSense updates base system and PHP, Python 2 dropped from Arch |
• Issue 986 (2022-09-19): Porteus 5.0, remotely wiping a hard drive, a new software centre for Ubuntu, Proxmox offers offline updates |
• Issue 985 (2022-09-12): Garuda Linux, using root versus sudo, UBports on the Fairphone 4, Slackware reverses change to grep |
• Issue 984 (2022-09-05): deepin 23 Preview, watching for changing to directories, Mint team tests Steam Deck, Devuan posts fix for repository key expiry |
• Issue 983 (2022-08-29): Qubes OS 4.1.1, Alchg Linux, immutable operating systems, Debian considers stance on non-free firmware, Arch-based projects suffer boot issue |
• Issue 982 (2022-08-22): Peropesis 1.6.2, KaOS strips out Python 2 and PulseAudio, deepin becomes independent, getting security update notifications |
• Issue 981 (2022-08-15): Linux Lite 6.0, defining desktop environments and window managers, Mint releases upgrade tool, FreeBSD publishes status report |
• Issue 980 (2022-08-08): Linux Mint 21, Pledge on Linux, SparkyLinux updates classic desktop packages, Peppermint OS experiments with Devuan base |
• Issue 979 (2022-08-01): KaOS 2022.06 and KDE Plasma 5.25, terminating processes after a set time, GNOME plans Secure Boot check |
• Issue 978 (2022-07-25): EndeavourOS 22.6, Slax explores a return to Slackware, Ubuntu certified with Dell's XPS 13, Linux running on Apple's M2 |
• Issue 977 (2022-07-18): EasyOS 4.2, transferring desktop themes between distros, Tails publishes list of updates, Zevenet automates Let's Encrypt renewals |
• Issue 976 (2022-07-11): NixOS 22.05, making a fake webcam, exploring the Linux scheduler, Debian publishes updated media |
• Issue 975 (2022-07-04): Murena One running /e/OS, where are all the openSUSE distributions, Fedora to offer unfiltered Flathub access |
• Issue 974 (2022-06-27): AlmaLinux 9.0, the changing data of DistroWatch's database, UBports on the Pixel 3a, Tails and GhostBSD publish hot fixes |
• Issue 973 (2022-06-20): openSUSE 15.4, collecting distro media, FreeBSD status report, Ubuntu Core with optional real-time kernel |
• Issue 972 (2022-06-13): Rolling Rhino Remix, SambaBox 4.1, SUSE team considers future of SUSE and openSUSE Leap, Tails improves Tor Connection Assistant |
• Issue 971 (2022-06-06): ChimeraOS 2022.01.03, Lilidog 22.04, NixOS gains graphical installer, Mint replaces Bluetooth stack and adopts Timeshift, how to change a MAC address |
• Issue 970 (2022-05-30): Tails 5.0, taking apart a Linux distro, Ubuntu users seeing processes terminated, Budgie team plans future of their desktop |
• Issue 969 (2022-05-23): Fedora 36, a return to Unity, Canonical seeks to improve gaming on Ubuntu, HP plans to ship laptops with Pop!_OS |
• Full list of all issues |
Free Tech Guides |
NEW! Learn Linux in 5 Days

In this FREE ebook, you will learn the most important concepts and commands and be guided step-by-step through several practical and real-world examples (a free 212-page ebook).
|
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Shells.com |

Your own personal Linux computer in the cloud, available on any device. Supported operating systems include Android, Debian, Fedora, KDE neon, Kubuntu, Linux Mint, Manjaro and Ubuntu, ready in minutes.
Starting at US$4.95 per month, 7-day money-back guarantee
|
Random Distribution | 
Bio-Linux
Bio-Linux was a full-featured, powerful, configurable and easy-to-maintain bioinformatics workstation. Bio-Linux provides more than 500 bioinformatics programs on an Ubuntu base. There was a graphical menu for bioinformatics programs, as well as easy access to the Bio-Linux bioinformatics documentation system and sample data useful for testing programs. Bio-Linux packages that handle new generation sequence data types can also be installed.
Status: Discontinued
|
Free Tech Guides |
NEW! Learn Linux in 5 Days

In this FREE ebook, you will learn the most important concepts and commands and be guided step-by-step through several practical and real-world examples (a free 212-page ebook).
|
MALIBAL |
MALIBAL: Linux Laptops Custom Built for YouMALIBAL is an innovative computer manufacturer that produces high-performance, custom laptops for Linux. If your MALIBAL laptop is not the best Linux laptop you have ever used, you can return it for a full 100% refund. We will even pay the return shipping fees! For more info, visit: https://www.malibal.com
|
TUXEDO |

TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |

Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Free Tech Guides |
NEW! Learn Linux in 5 Days

In this FREE ebook, you will learn the most important concepts and commands and be guided step-by-step through several practical and real-world examples (a free 212-page ebook).
|
|