DistroWatch Weekly |
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 2, value: US$35.20) |
|
|
|
bc1qxes3k2wq3uqzr074tkwwjmwfe63z70gwzfu4lx lnurl1dp68gurn8ghj7ampd3kx2ar0veekzar0wd5xjtnrdakj7tnhv4kxctttdehhwm30d3h82unvwqhhxarpw3jkc7tzw4ex6cfexyfua2nr 86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le paypal.me/distrowatchweekly • patreon.com/distrowatch |
|
Extended Lifecycle Support by TuxCare |
|
Reader Comments • Jump to last comment |
1 • Untrusted applications (by Katie on 2023-03-27 00:26:35 GMT from United Kingdom)
I have a spare laptop for all the untrusted applications. Running Arch btw.
2 • Q&A privacy. (by Hermit on 2023-03-27 01:54:25 GMT from United States)
I'm puzzled by the Q&A. The questioner asks about privacy, but then lists three of the most intrusive applications available, I'd be more concerned about any unlikely malware, or anyone having access to the information on those apps: credentials, history, etc. Having those apps hacked can cause some difficulties in your life. Skype is the least intrusive. I have it and use it rarely under a fictitious name, and only after checking all options to send as little info to MS as possible. Still, it knows any contacts I have and any numbers I call. In the questioner's case, he uses them for work, so they know who he is, where he works, what he looks like, probably where he lives, and in some cases, when he goes to the toilet. Zoom consists of sitting in front of a camera saying and doing things, some of which you might regret and which can be recorded for posterity. (Google Jeffrey Toobin) By all means it isn't a bad idea to isolate those apps, but the questioner's concerns are upside-down. Security? Sure. Privacy? Gimme a break!
3 • Re: 2 (by Sitwon on 2023-03-27 02:44:59 GMT from United States)
There are many dimensions to both security and privacy. They can both be used to describe a wide variety of concerns.
While the primary feature of Zoom is to share audio and/or video streams between participants, that is fairly obvious to all involved. The fact that you may be recorded is not inherently a violation of privacy, if you consent to the recording. Many people are fine with sharing recordings of themselves under certain circumstances, but not others.
However, being closed-source software, the questioner might not trust that their consent is being respected by the software tools they named and may want to enforce technological limits to curtail the ability of the software to observe or record any information that they have not explicitly consented to.
Privacy is about consent. It's reasonable to consent to sharing a limited subset of information, and to want to enforce those boundaries.
4 • At 2 & 3: (by Bert on 2023-03-27 04:16:45 GMT from Belgium)
Being recorded at the computer. Not that much of a deal when you are carefull enough to see what you do and what you say. You are being recorded just walking down the street as well. The other day I had been talking to the major just outside an inn. I needed to go to be at the police office 2 days later and for one reason or another they told me that they had seen me talking to the mayor. So, those cameras are being well monitored as well. There is no more privacy. More to the point: be carefull about which programs you use and protect your computer as good as you can. But with that comes another problem: I have Avira Professionel and Surfshark. The programs are good but they limit the speed of your browsing drastically if you do not turn off the web protection. So good protection comes with the price of less functionality.
5 • @3 & 4 privacy (by Hermit on 2023-03-27 06:16:27 GMT from United States)
Good comments, but straying from the point. The purpose of isolating apps by is not to keep internet security while browsing, nor keeping from being recorded. It is to deny access to the rest of your system, thus keeping them from obtaining your private data or inserting their own malware or whatever. My point is that those app mentioned (not all apps) contain more personal info than I would be comfortable making accessible outside the apps. I'd want my door closed the other way, to keep my system or anyone with access to it from getting to the info on the apps. The personal data required by those apps can be used for harm, impersonation among several others.
On recording: My expectation of privacy is not the same on the street as it is at home, so cameras on the streets are not relevant. If I want privacy on the street, Ill need to wear a disguise. No matter what restrictions you place on your Zoom or other app, I can record my screen with sound by other means, so can anyone else who wants to. If using a video conferencing app, I will always assume I can be recorded.
Internet: I don't use antivirus or any of the apps @3 mentions on Linux. If I want privacy and protection I can use an anti-fingerprinting browser like Librewolf, and If needed, I run it isolated, usually in a VM.
6 • Security and Siduction (by Hank on 2023-03-27 09:19:20 GMT from Switzerland)
When I read snap and Flatpack in conjunction with security the relative difficulty of inspecting package contents always comes to mind. Apart of the bloat aspect that is Fatpack is pretty descriptive.
Siduction is one of the better debian based offerings. Only a couple of things stop me using it, the init which I find a pain, and need to install Libreoffice from LO Org. The version included is thanks to debian 7.4.
Version 7.5 has been stuck in debian experimental for weeks already, seems devs enjoying a long long teatime.
7.5 from LO Org includes some for me important updates, it is running fine on the devices I support which are on antiX with sid repos enabled for rolling release. Sid is not for everyone but generaly more stable than some big name distros.
7 • Politics in Linux (by Joe Beer on 2023-03-27 10:45:37 GMT from United States)
Politics should not be in Linux period. If that code isn't ever accepted, then I'll start look at alternative OS's.
8 • How I isolate untrusted applications (by James on 2023-03-27 11:34:18 GMT from United States)
I just don't use proprietary applications. I find Linux alternatives, but then I am retired and not forced by work.
I did use Zoom for a short period during the lock downs, but didn't do anything specific to secure it and removed is as soon as possible. Actually you didn't even have to do that there were some people that just joined by phone, which is possible, but there would be no video if you did.
9 • siduction (by Tim on 2023-03-27 13:36:27 GMT from United States)
In my distro hopping days, I used siduction for a long while (probably more than a year) and I liked it very much. The people who manage and support it are very knowledgeable, friendly, and helpful. Like the reviewer, I would recommend it to anyone who wants a Debian-based, cutting edge distribution.
10 • Security and Privacy (by Dr.J on 2023-03-27 13:41:25 GMT from Germany)
Some comments have already pointed out, privacy and security are two different things. I use Arch and I have Firejail installed; it does some useful things like passing a noroot parameter to the kernel or building a custom filesystem for the sandbox etc. Do I use it often? No. Because 99.9% of the time I use the official Arch repos.
Privacy is something else entirely. For example, run Opera browser in Firejail sandbox and nothing changes in terms of privacy, starting from IP to installed fonts, fingerprints and all phone-home-activities etc. But: All the available means to change this are great, starting with special Tor gateways (like Whonix), VPN, Tails etc. and ending with the Tor browser. The problem is: if the Tor browser is running at the highest security level, you can forget about the Internet. Too many sites block you, the speed is moderate, mails can not be retrieved or sent, etc.. It is not easy to find a good compromise here, which is also practicable. Because at the end of the day nobody out there wants you to be private.
11 • untrusted applications (by K4RS on 2023-03-27 15:54:34 GMT from United States)
I chose None of the above. The reason is simple. If I don't trust it, I don't run it. End of story.
12 • privacy/security (by Tomposter on 2023-03-27 16:53:17 GMT from United States)
Excellent article on protecting privacy. I run Firefox using Firejail almost always. In addition, I have a separate user without SUDO for certain activities. @10 Dr J says it well, "nobody out there wants you to be private". There is a need to take steps to protect yourself.
Having a separate operating system on a separate SSD for must-be-secure activities is a big advantage for some of us. In the days of the big boxes with bays accessible from the front of the computer, one could install a "rack" that allows 2.5" SSDs to be switched easily. Such a rack can't be (easily) used in common modern boxes. I'd like to be able to run SSD-based Linux from USB (full install, not "live"). But TRIM-over-USB is difficult for technically-challenged users like myself. I don't run Windows, but have read that Windows has enabled TRIM over USB for devices that support UASP. One day a Linux developer may see the advantages of running a fully-capable operating system over USB and make TRIM easy for all of us.
13 • Political? (by GT on 2023-03-27 17:32:39 GMT from United States)
"We don't feel comfortable accepting patches from or relating to hardware produced by your organization.
Please withhold networking contributions until further notice."
Is there anything more to this than these two sentences? If not, isn't labeling this "political" an assumption? I can see this being interpreted multiple ways.
14 • Security (by minux on 2023-03-27 17:41:33 GMT from United Kingdom)
Like @1 does, install dodgy apps, and windows xp only app gems, to a spare old laptop that never goes online
Who else ticked 'virtual machine' when it's actually 'another machine'?
15 • Politics on Linux (by John on 2023-03-27 20:07:08 GMT from Argentina)
That's a good dictatorial way of limiting software freedom. When people mix work with personal life, problems start. Kicinski is basically taking benefits from the community because of his personal opinions.
16 • Politics in Linux (by Jacob A. Tice on 2023-03-27 23:31:02 GMT from United States)
I hate to break it to you, Joe (@7), but "politics" is a lot more than just "politician X is bad." Everything is political, blanket banning all "politics" accomplishes nothing but not being able to have disagreements, or even be different to the norm. Also, John (@15), how exactly do you propose we separate all personal life from the work we do? Because anywhere there is a discussion that will come up.
17 • Politics in Linux (by Jacob A. Tice on 2023-03-27 23:36:11 GMT from United States)
Also, doing some searching, it turns out the the patches are being made specifically for the Baikal series of processors, made by Russian company T-Systems. It is currently against the law in the US to do business with them. I'm not saying I agree with that, I'm just saying how it is.
18 • Politics in Linux (by John on 2023-03-28 14:37:55 GMT from Argentina)
@17 what has the US law to do with the kernel? besides, if you read Kicinski's rejection comment, there is no mention to LAW but only to PERSONAL opinions "We don't feel comfortable accepting patches from or relating to hardware produced by your organization." @16 you separate personal life from work by separating personal life from work. as simple as that. If your personal opinions undermine the progress of your work and the benefits for the end user, that's a sign of interference.
19 • @18 (by Justin on 2023-03-28 19:11:47 GMT from United States)
If you dealt with the law in those countries, you would know. Stating their discomfort and being brief is a way to protect themselves from legal ramifications. For example, if they are subject to US laws in this case (if you reside in the US, you are subject to US laws, regardless about how you feel about politics), there is nothing they can do. However, they can decline politely in a way that says, "hey, we can't do this now but perhaps one day we can, sorry" instead of "hey buddy, dealing with you is _illegal_ so go fsck off." They are probably being smart and don't want to hurt future relations. At the moment they may be unable (or at least unsure) how best to proceed, but eventually the macropolitical situation will resolve itself, and they will all want to get back to being open source buddies.
This isn't unique to today. You can look up many examples from the 20th century during its many hot and cold wars. Scientists, technologies, etc., care about the research and the work. It sucks when external things prevent us from working together, but we don't have to be jerks about it.
20 • Isolation privacy trust/untrust (by Sebastien on 2023-03-28 21:25:22 GMT from France)
I've never used it but according to what I've seen and read, QubeOS seems to have pushed the concept quiet far to address this kind of concern.
Not sure it would fit my needs as a daily driver but it looks a very nice piece of software still. I definitly have to try this one day or another !
21 • security privacy (by whyfi on 2023-03-29 04:24:07 GMT from Singapore)
One man's freedom is another man's security flaw. e.g.,
* FOSS philosophy is that many eyes on the code identifies bugs, so improves software. But on the flip side it means that everyone knows all the innards of an OS. Doesn't this make it trivial for hackers to write malware that targets certain areas for data - like familiar paths, locations of user folders, or locations of system stuff. So wouldn't these names / locations need to be obfuscated somehow to provide security?
* Manufacturers make hardware & components that are designed to be always powered, always trying to connect, ready to print, or ready to share files. (e.g., They slap wifi onto anything nowadays.) It's up to the user to use software to turn things off - which is not always effective, or can be compromised.
Eventually, all the malware, spyware, and ransomware will become so pervasive that it will cause the tech industry to have to redesign computers from the hardware up, from a security / privacy perspective, and not from a connecting / sharing perspective.
22 • Linux security/privacy (by Otis on 2023-03-29 16:21:49 GMT from United States)
@21 Methinks the eventuality feared in that last paragraph would already have happened, after decades of Linux proliferation, world wide.
We have flaws, we patch. Seems to be working okay.
23 • @21: (by dragonmouth on 2023-03-29 16:51:32 GMT from United States)
"Doesn't this make it trivial for hackers to write malware......" It also makes it trivial to see the hacks or the malware.
24 • Untrusted applications (by Greg Zeng on 2023-03-30 05:05:51 GMT from Australia)
Comments from readers are interesting, again. “INCOGNITO” mode is available in many operating systems and web browsers. Many web browsers also have varying & multiple levels of privacy protection. One comment also mentioned TOR and VPN.
The original Q&A did not mention AppImage applications, which claim the same container safety as Snap & Flatpak. There are an extremely large number of Linux operating systems that specialized particularly on Incognito and Privacy Protection. These Linux systems are based on the two major platforms (DEB & Red Hat RPM). A few other Linux systems claim to be “independent”, which has different meanings at this time.
Most of the current “living” operating systems can run without installing onto the main storage medium. This is so that the trial user can check the Linux system, or to debug-modify the installed system of the hardware. A few Linux systems have been designed, specially never to be installed to any specific hardware computer.
Some comments seem to understand why the Privacy & Incognito systems are necessary for some computer users. One of the main reasons is checking whether suspected malware is specific to what part of the existing computer system. Hardware, software, operating system, location, user, Trojans, boot-bugs, etc. Some users have suspected or supposed affiliations with earlier life events, earlier or current employers, etc. Work affiliations and personal privacy are often needing to be kept apart. For example, “pen-names”, stage-names, etc.
Once again, Distrowatch has shown a major reason why Linux is better than most commercial operating systems, especially Microsoft & Apple.
25 • AppImage (by Friar Tux on 2023-03-30 13:27:22 GMT from Canada)
@24 (Greg Zeng) "The original Q&A did not mention AppImage applications..." I have noticed that AppImage is consistently missing from most discussions involving portable/containered software. I, personally, prefer it to Flatpak and Snap (mainly because of the "one file = one app" idea). As I've mentioned before, AppImage is also the only format that picks up my local theme - Flatpak and Snaps do give you a choice between light and dark themes but these are either eye incinerating, bright white, or that ugly dark grey. I keep a folder of my favourite AppImages on a USB pen drive to ensure I have my needed tools with me should my system ever go belly up. Some may be as old as dirt, but they do what I need them to do and that's all that counts. AppImage have been around for longer than the other two and seem to work far better than the other two so it baffles me why it was not more universally adopted. The only thing I can think of is that it's a continuation of the popularity contest between Red Hat and Canonical.
26 • AppImages (by Jesse on 2023-03-30 13:36:11 GMT from Canada)
@24: "The original Q&A did not mention AppImage applications, which claim the same container safety as Snap & Flatpak."
AppImages do not offer any isolation or container safety. You can add sandboxing to them by using an external tool like Firejail, which we did talk about.
27 • 3CX (by fruit flavor on 2023-03-31 03:34:52 GMT from Norway)
Do you use comms software from 3CX? What to do next after biz hit in supply chain attack
https://www.theregister.com/2023/03/30/communications_software_vendor_3cx_hit/
Miscreants hit downstream customers with infostealers
28 • @22 (by Justin on 2023-03-31 17:04:15 GMT from United States)
It actually isn't working so well. The number of IoT devices with exploitable flaws is astounding specifically because there is no ability to patch them. That process of redesign is happening now but takes time. Famous examples are Spectre/Meltdown. The internet as a whole was never designed with security or privacy in mind, so we bolt on DoH and (hopelessly) wait for DNSSEC. The big problem is inertia, cost, and perceived value. It's slowly happening.
29 • DNSSEC Security (by Otis on 2023-03-31 20:21:16 GMT from United States)
Of course it does not offer privacy for queries, but is quite robust at protecting the actual DNS responses themselves. "Privacy" is a weird goal in all this, given that we're all out there in some way or another, on or off grid.
Individual user end can do a lot in that privacy direction, of course. I honestly do not agree with that as a primary goal, because, again, do you wear a mask or other disguise when you go out in public? Why not?
YKWIM ;)
Number of Comments: 29
Display mode: DWW Only • Comments Only • Both DWW and Comments
| | |
TUXEDO |
TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Issue 1099 (2024-12-02): AnduinOS 1.0.1, measuring RAM usage, SUSE continues rebranding efforts, UBports prepares for next major version, Murena offering non-NFC phone |
• Issue 1098 (2024-11-25): Linux Lite 7.2, backing up specific folders, Murena and Fairphone partner in fair trade deal, Arch installer gets new text interface, Ubuntu security tool patched |
• Issue 1097 (2024-11-18): Chimera Linux vs Chimera OS, choosing between AlmaLinux and Debian, Fedora elevates KDE spin to an edition, Fedora previews new installer, KDE testing its own distro, Qubes-style isolation coming to FreeBSD |
• Issue 1096 (2024-11-11): Bazzite 40, Playtron OS Alpha 1, Tucana Linux 3.1, detecting Screen sessions, Redox imports COSMIC software centre, FreeBSD booting on the PinePhone Pro, LXQt supports Wayland window managers |
• Issue 1095 (2024-11-04): Fedora 41 Kinoite, transferring applications between computers, openSUSE Tumbleweed receives multiple upgrades, Ubuntu testing compiler optimizations, Mint partners with Framework |
• Issue 1094 (2024-10-28): DebLight OS 1, backing up crontab, AlmaLinux introduces Litten branch, openSUSE unveils refreshed look, Ubuntu turns 20 |
• Issue 1093 (2024-10-21): Kubuntu 24.10, atomic vs immutable distributions, Debian upgrading Perl packages, UBports adding VoLTE support, Android to gain native GNU/Linux application support |
• Issue 1092 (2024-10-14): FunOS 24.04.1, a home directory inside a file, work starts of openSUSE Leap 16.0, improvements in Haiku, KDE neon upgrades its base |
• Issue 1091 (2024-10-07): Redox OS 0.9.0, Unified package management vs universal package formats, Redox begins RISC-V port, Mint polishes interface, Qubes certifies new laptop |
• Issue 1090 (2024-09-30): Rhino Linux 2024.2, commercial distros with alternative desktops, Valve seeks to improve Wayland performance, HardenedBSD parterns with Protectli, Tails merges with Tor Project, Quantum Leap partners with the FreeBSD Foundation |
• Issue 1089 (2024-09-23): Expirion 6.0, openKylin 2.0, managing configuration files, the future of Linux development, fixing bugs in Haiku, Slackware packages dracut |
• Issue 1088 (2024-09-16): PorteuX 1.6, migrating from Windows 10 to which Linux distro, making NetBSD immutable, AlmaLinux offers hardware certification, Mint updates old APT tools |
• Issue 1087 (2024-09-09): COSMIC desktop, running cron jobs at variable times, UBports highlights new apps, HardenedBSD offers work around for FreeBSD change, Debian considers how to cull old packages, systemd ported to musl |
• Issue 1086 (2024-09-02): Vanilla OS 2, command line tips for simple tasks, FreeBSD receives investment from STF, openSUSE Tumbleweed update can break network connections, Debian refreshes media |
• Issue 1085 (2024-08-26): Nobara 40, OpenMandriva 24.07 "ROME", distros which include source code, FreeBSD publishes quarterly report, Microsoft updates breaks Linux in dual-boot environments |
• Issue 1084 (2024-08-19): Liya 2.0, dual boot with encryption, Haiku introduces performance improvements, Gentoo dropping IA-64, Redcore merges major upgrade |
• Issue 1083 (2024-08-12): TrueNAS 24.04.2 "SCALE", Linux distros for smartphones, Redox OS introduces web server, PipeWire exposes battery drain on Linux, Canonical updates kernel version policy |
• Issue 1082 (2024-08-05): Linux Mint 22, taking snapshots of UFS on FreeBSD, openSUSE updates Tumbleweed and Aeon, Debian creates Tiny QA Tasks, Manjaro testing immutable images |
• Issue 1081 (2024-07-29): SysLinuxOS 12.4, OpenBSD gain hardware acceleration, Slackware changes kernel naming, Mint publishes upgrade instructions |
• Issue 1080 (2024-07-22): Running GNU/Linux on Android with Andronix, protecting network services, Solus dropping AppArmor and Snap, openSUSE Aeon Desktop gaining full disk encryption, SUSE asks openSUSE to change its branding |
• Issue 1079 (2024-07-15): Ubuntu Core 24, hiding files on Linux, Fedora dropping X11 packages on Workstation, Red Hat phasing out GRUB, new OpenSSH vulnerability, FreeBSD speeds up release cycle, UBports testing new first-run wizard |
• Issue 1078 (2024-07-08): Changing init software, server machines running desktop environments, OpenSSH vulnerability patched, Peppermint launches new edition, HardenedBSD updates ports |
• Issue 1077 (2024-07-01): The Unity and Lomiri interfaces, different distros for different tasks, Ubuntu plans to run Wayland on NVIDIA cards, openSUSE updates Leap Micro, Debian releases refreshed media, UBports gaining contact synchronisation, FreeDOS celebrates its 30th anniversary |
• Issue 1076 (2024-06-24): openSUSE 15.6, what makes Linux unique, SUSE Liberty Linux to support CentOS Linux 7, SLE receives 19 years of support, openSUSE testing Leap Micro edition |
• Issue 1075 (2024-06-17): Redox OS, X11 and Wayland on the BSDs, AlmaLinux releases Pi build, Canonical announces RISC-V laptop with Ubuntu, key changes in systemd |
• Issue 1074 (2024-06-10): Endless OS 6.0.0, distros with init diversity, Mint to filter unverified Flatpaks, Debian adds systemd-boot options, Redox adopts COSMIC desktop, OpenSSH gains new security features |
• Issue 1073 (2024-06-03): LXQt 2.0.0, an overview of Linux desktop environments, Canonical partners with Milk-V, openSUSE introduces new features in Aeon Desktop, Fedora mirrors see rise in traffic, Wayland adds OpenBSD support |
• Issue 1072 (2024-05-27): Manjaro 24.0, comparing init software, OpenBSD ports Plasma 6, Arch community debates mirror requirements, ThinOS to upgrade its FreeBSD core |
• Issue 1071 (2024-05-20): Archcraft 2024.04.06, common command line mistakes, ReactOS imports WINE improvements, Haiku makes adjusting themes easier, NetBSD takes a stand against code generated by chatbots |
• Issue 1070 (2024-05-13): Damn Small Linux 2024, hiding kernel messages during boot, Red Hat offers AI edition, new web browser for UBports, Fedora Asahi Remix 40 released, Qubes extends support for version 4.1 |
• Issue 1069 (2024-05-06): Ubuntu 24.04, installing packages in alternative locations, systemd creates sudo alternative, Mint encourages XApps collaboration, FreeBSD publishes quarterly update |
• Issue 1068 (2024-04-29): Fedora 40, transforming one distro into another, Debian elects new Project Leader, Red Hat extends support cycle, Emmabuntus adds accessibility features, Canonical's new security features |
• Issue 1067 (2024-04-22): LocalSend for transferring files, detecting supported CPU architecure levels, new visual design for APT, Fedora and openSUSE working on reproducible builds, LXQt released, AlmaLinux re-adds hardware support |
• Issue 1066 (2024-04-15): Fun projects to do with the Raspberry Pi and PinePhone, installing new software on fixed-release distributions, improving GNOME Terminal performance, Mint testing new repository mirrors, Gentoo becomes a Software In the Public Interest project |
• Issue 1065 (2024-04-08): Dr.Parted Live 24.03, answering questions about the xz exploit, Linux Mint to ship HWE kernel, AlmaLinux patches flaw ahead of upstream Red Hat, Calculate changes release model |
• Issue 1064 (2024-04-01): NixOS 23.11, the status of Hurd, liblzma compromised upstream, FreeBSD Foundation focuses on improving wireless networking, Ubuntu Pro offers 12 years of support |
• Issue 1063 (2024-03-25): Redcore Linux 2401, how slowly can a rolling release update, Debian starts new Project Leader election, Red Hat creating new NVIDIA driver, Snap store hit with more malware |
• Issue 1062 (2024-03-18): KDE neon 20240304, changing file permissions, Canonical turns 20, Pop!_OS creates new software centre, openSUSE packages Plasma 6 |
• Issue 1061 (2024-03-11): Using a PinePhone as a workstation, restarting background services on a schedule, NixBSD ports Nix to FreeBSD, Fedora packaging COSMIC, postmarketOS to adopt systemd, Linux Mint replacing HexChat |
• Issue 1060 (2024-03-04): AV Linux MX-23.1, bootstrapping a network connection, key OpenBSD features, Qubes certifies new hardware, LXQt and Plasma migrate to Qt 6 |
• Issue 1059 (2024-02-26): Warp Terminal, navigating manual pages, malware found in the Snap store, Red Hat considering CPU requirement update, UBports organizes ongoing work |
• Issue 1058 (2024-02-19): Drauger OS 7.6, how much disk space to allocate, System76 prepares to launch COSMIC desktop, UBports changes its version scheme, TrueNAS to offer faster deduplication |
• Issue 1057 (2024-02-12): Adelie Linux 1.0 Beta, rolling release vs fixed for a smoother experience, Debian working on 2038 bug, elementary OS to split applications from base system updates, Fedora announces Atomic Desktops |
• Issue 1056 (2024-02-05): wattOS R13, the various write speeds of ISO writing tools, DSL returns, Mint faces Wayland challenges, HardenedBSD blocks foreign USB devices, Gentoo publishes new repository, Linux distros patch glibc flaw |
• Issue 1055 (2024-01-29): CNIX OS 231204, distributions patching packages the most, Gentoo team presents ongoing work, UBports introduces connectivity and battery improvements, interview with Haiku developer |
• Issue 1054 (2024-01-22): Solus 4.5, comparing dd and cp when writing ISO files, openSUSE plans new major Leap version, XeroLinux shutting down, HardenedBSD changes its build schedule |
• Issue 1053 (2024-01-15): Linux AI voice assistants, some distributions running hotter than others, UBports talks about coming changes, Qubes certifies StarBook laptops, Asahi Linux improves energy savings |
• Issue 1052 (2024-01-08): OpenMandriva Lx 5.0, keeping shell commands running when theterminal closes, Mint upgrades Edge kernel, Vanilla OS plans big changes, Canonical working to make Snap more cross-platform |
• Issue 1051 (2024-01-01): Favourite distros of 2023, reloading shell settings, Asahi Linux releases Fedora remix, Gentoo offers binary packages, openSUSE provides full disk encryption |
• Issue 1050 (2023-12-18): rlxos 2023.11, renaming files and opening terminal windows in specific directories, TrueNAS publishes ZFS fixes, Debian publishes delayed install media, Haiku polishes desktop experience |
• Issue 1049 (2023-12-11): Lernstick 12, alternatives to WINE, openSUSE updates its branding, Mint unveils new features, Lubuntu team plans for 24.04 |
• Issue 1048 (2023-12-04): openSUSE MicroOS, the transition from X11 to Wayland, Red Hat phasing out X11 packages, UBports making mobile development easier |
• Issue 1047 (2023-11-27): GhostBSD 23.10.1, Why Linux uses swap when memory is free, Ubuntu Budgie may benefit from Wayland work in Xfce, early issues with FreeBSD 14.0 |
• Issue 1046 (2023-11-20): Slackel 7.7 "Openbox", restricting CPU usage, Haiku improves font handling and software centre performance, Canonical launches MicroCloud |
• Issue 1045 (2023-11-13): Fedora 39, how to trust software packages, ReactOS booting with UEFI, elementary OS plans to default to Wayland, Mir gaining ability to split work across video cards |
• Full list of all issues |
Star Labs |
Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Random Distribution |
MUMi-LinuX
MUMi-LinuX was a Linux distribution for dedicated servers and desktops, developed by Muammer Altuntas, Eastern Mediterranean University in Cyprus. It uses TAR.GZ packages and was optimised for the i686 architecture. MUMi-LinuX Desktop was an easy-to-use Live CD with an option to install it on hard disk.
Status: Discontinued
|
TUXEDO |
TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |
Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|