Language Selection

English French German Italian Portuguese Spanish

Slax 6.0 on an Ancient Prestigio 109 Laptop

Filed under
Linux

I decided to take a closer look at Slax, by getting the latest “Distribution Release” which is version 6.0.3. This time, I’m using our ancient Prestigio 109 laptop to fully check the features and capabilities of this tiny distro.

This old mobile computer of ours has 1GHz VIA Nehemia processor, 256MB RAM, and 20GB hard drive. The hardware specifications may not seem that old to some of you, but if you’ll compare these to today’s laptop specs, you will agree with me. Just a little history of our beloved Prestigio 109 laptop; its original operating system is Windows XP. I decided to install Zenwalk later on after my wife complained that XP is starting to run like a turtle. I then switched to Ubuntu, then Mepis, and then finally settled with Xubuntu.

So how did Slax 6.0 get along with our ageing not-so-portable machine?

Read on.




More in Tux Machines

Intel Compute Stick with Ubuntu Goes on Sale, Lower Specs than Windows Version

The Ubuntu 14.04 LTS flavored Intel Compute Stick is finally going on sale next week, and it joins the Windows version that was already made available a while back. Read more

Ubuntu MATE Project Donates Money to Geany, Transmission, and MATE Devs

The Ubuntu MATE team makes monthly donations to other projects that are being used by this distribution and this month's targets are Geany and Transmission, along with a couple of MATE developers. Read more

Ubuntu MATE hardware partnership with LibreTrend

Ubuntu MATE is an official flavour of Ubuntu focussed on usability and stability, which has gained massive traction in the Linux community over recent months. Inspired by the traditional GNOME 2 interface of classic Ubuntu releases, Ubuntu MATE is the perfect distribution for easing the transition between Microsoft Windows or Mac OS and Linux. Read more

Can Data Infrastructure Vendors Stop Hackers?

The ecosystem is based on Security-Enhanced Linux (SELinux), but it adds role-based access control with a policy for each role, so no one can get to the system root and the root can’t see user data. All access is logged, so any attempts to penetrate the system can be traced. Policies are based on roles such as security admin, audit admin and sysadmin, and each file is tagged with a security level so some users can see it while others can’t. Read more