Language Selection

English French German Italian Portuguese Spanish

21st Century Desktops, Linux or Windows, Does It Matter?

Filed under
OS

It is with considerable amusement I view the verbal skirmishes between the gathering Linux and Windoze factions, almost like watching differing Religious sects gather. There are obvious advantages to each O.S. and the philosophy's behind their development, one system having the ability to accommodate the users needs with minimal to no CLI intervention, you don't have to make any decisions, they have been made for you. The alternative OS family gives you infinite control of all aspects of the system, very good for some, very bad for others.

If your O.S. does what you want it to do and you can tolerate the things it does that you don't want it to do, I couldn't be happier.

At this point almost no one remembers what we call a GUI had nothing to do with Bill Gates, in 1974 Xerox introduced a hand full of demonstration “Alto” systems with a fully functional GUI, multi button mouse and office suite. in the following years Amiga workbench, Amiga dos, tons of games and applications, the Amiga 3000 ran a 68000 @ 30 MHz, (32 buss ) it multi tasked flawlessly and rendered complex graphics at a speed that still leaves the uninitiated with sticky drawers.

More Here




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News