Language Selection

English French German Italian Portuguese Spanish

KDE and Distributions: MEPIS Interview

Filed under
Interviews

The MEPIS distribution has been one of the bigger KDE-centric distributions around for some years now, created to make desktop GNU/Linux easier to use. As part of our KDE and Distributions series founder and main contributor Warren Woodford talks to KDE Dot News about the history and current vision of the distribution.

Past

Can you tell us about the history of your distribution?

I started MEPIS in November 2002 because I wasn't satisfied with the distros I had used. I've been working with GUIs since 1984 and I know what I like and expect from an OS and a desktop. Trolltech had the tools and KDE had the desktop but, in my opinion, everyone was missing the mark when putting it all together to create a user experience. So I decided to do MEPIS. I didn't know if anyone would like the results, including me.

Why did you choose KDE and which version of KDE did you first implement?

Full Interview.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News