Language Selection

English French German Italian Portuguese Spanish

MythTV Distro Roundup - Part 1: KnoppMyth

Filed under
Linux

One of the favorite, stand alone systems on Linux for producing your own Digital Video Recorder, or DVR, is MythTV. But for some, MythTV is a little too geek to be bothered with due its sometimes complex and cumbersome installation process, or issues with the distribution it's being installed on. But not to be thwarted, a few slick and creatively minded developers have taken some of the top Linux distributions out there and created complete, ready to install MythTV distros that are designed to simplify the install to the point of being essentially "plug and play", rather than "plug and pray".

While there are nearly eight of these distributions out there, only three are solid and mainstream enough to be recognized by Distrowatch, and ready for the average, non-Linux geek to use. The first of those we will look at is KnoppMyth, a MythTV Linux distribution built on the ever venerable Knoppix livecd distro, and designed to make setting up your own DVR easy.

More Here




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News