Language Selection

English French German Italian Portuguese Spanish

PCLOS .92 - It just works

Filed under

Once upon a time there was a packager from Texas whose rpms became so popular he had to make a distro to contain them. He searched high and low for most beautiful eye candy. He patched and pre-linked applications until they screamed with speed. He tweaked and compiled until they were stable. He added gui tools, drivers, and plugins until every user could work like a pro. He kept working on that distro, release after release, until this very day. That distro is known as PCLinuxOS, and the day version .92 was released, cries of joy were heard throughout the land as many microsoft slaves and linux grunts were set free. Free, free, free at last. Texstar has set us free.

Indeed this radically simple to use Linux distribution did start out as a result of Texstar's desire for a more beautiful and faster performing system. From the late 1990's thru the early 2000's, Texstar was rebuilding rpms to enhance his own desktop. But the story really began when he first offered up his rebuilt kde packages. The more people installed these rpms, the more they wanted.

After a while livecd technology became available for mandrake systems, and Texstar was intrigued. Could he replace a lot of the buggy software from France, add many wonderful enhancements and extras, and make a livecd? Yes he could. Only a few of got to test that initial release, but those of us who did knew Texstar was onto something big. He addressed a market thusfar overlooked by the big boys and his distro's popularity keep growing, staying in the top 4% (and climbing) of all distros in DistroWatch's database.

As PCLOS evolved, it's appearance has too. This release has a significantly different look than previously. This time we have a minimal background on the two major desktops, a pretty but understated windec and a new quad-colored logo. The cute penguins and cuddly polar bears are gone. We are now presented with a more mature, grown-up PCLOS. The new logo/theme creates an esoteric atmosphere of faint familiarity easing the transition to Linux from Windows. This new logo, borrowed from a gnome icon project, consists of similar colored features as the (in)famous windows' logo. The hope was for the experience of using Linux to be less alien for them. PCLOS accomplishes this without becoming a windows clone. And if you miss the penguins, all the components from the last release are still there; the wallpaper, the splash screen, etc.

The look has changed dramatically. However, lest we forget, this is Linux. It's all about customization and free-choice. If you don't like the theme, there are many included with PCLOS and many more available on the web. My favorite "goodie" site is

Not all the changes are in appearance. Texstar et. al. work really hard to bring the users the stable end of the cutting edge spectrum. This is a very fine line and it takes a talented crew to walk it. It's very difficult to find that sweet spot, but I think PCLOS has done just that. In the robust but not over-crowded menus, one can find the right tool for the right job.

For example, this release brings us

  • kernel-pclos-i586-up-1GB-2.6.12.oci6.mdk-1-1tex

  • xorg-x11-6.9-0.cvs20051101.2tex
  • kdebase-3.4.3-6tex
  • fluxbox-0.9.12-1tex
  • gcc-3.3.1-2mdk
  • koffice-1.4.2-1tex
  • gaim-1.5.0-1tex
  • xsane-0.97-2tex
  • gimp-2.2.9-1tex
  • audacity-1.2.3-2tex
  • glibc-2.3.2-14mdk
  • gtk+2.0-2.6.8-1tex
  • k9copy-1.0.0-2tex
  • kaffeine-0.7.1-3tex
  • kompose-0.5.3-1tex
  • limewire-4.9.30-1tex
  • mozilla-firefox-1.0.7-1tex
  • thunderbird2firefox-1.0.7-2tex
  • mplayer-1.0-0.pre7.2tex
  • vlc-0.8.2-1tex
  • wlassistant-0.5.4-1tex
  • tvtime-1.0.2-1tex
  • Full RPMlist

Here we have some configuration tools and file transfer applications.


Here are some games and graphics apps.


And here we have communications tools for instant messenging, internet relay chating, and emailing.


Here we show the newsgroup tools as well as some of the office applications and remote file/networking solutions.


And of course here is a nice selection of apps for music and video enjoyment as well as some internet browsers.


If this is your first time considering PCLOS, you may not know of it's package manager. PCLOS features synaptic on top of apt-get to install the binary packages from Texstar's repository of applications. It's worked flawlessly here for as long as I've been using PCLOS. It efficiently downloads each package desired and its dependencies, then quickly installs them. The menus are updated to reflect the new application(s) as well. It's a wonderful system Tex & crew have going there.


Again, if you're new to PCLOS you need to know about the PCLinuxOS Control Center. This is the configuration hub of your new (or perspective) system. From there you can configure anything you need, from boot options and loader, hardware setup and tweaks, to networking and a firewall. ...and so much more. It is really the crowning jewel of PCLOS, I think.


If you prefer (or need) a lighter desktop, PCLOS includes the very popular Fluxbox. One of the nicest of the lighter environments, it's a welcome addition. This release brings a spiffied up appearance for Fluxbox as well, almost matching the KDE desktop. It features idesk for the desktop icons and a customized theme and menu. The menu is complete with all the entries you'd find in the KDE menu making it every bit as useful and handy as KDE.


And don't forget the convenience. PCLOS was one of the first distros to include the extras like java, flash, and nvidia drivers. This release has these and more. As you can see in the screenshots as portrayed in the thumbnails below, the plugins work wonderfully. I can watch trailers and select ecards from my browser with no work at all from myself.


Foregone in the last release but returned in this one are the 3D graphic drivers for nvidia and ati video cards. This release currently comes in 4 versions:

  • pclinuxos-0.92 - General Release - Standard xorg. drivers
  • pclinuxos-p92-nvidia7174 - 3D Graphic drivers for older Nvidia TNT cards.
  • pclinuxos-p92-nvidia7676 - 3D Graphic drivers for newer Nvidia cards.
  • pclinuxos-p92-ati8500up - 3D Graphic drivers for ATI video cards 8500 and up.

Texstar is quoted as writing,

"Also in the works is a mini-me iso with a minimal install and you can add your own applications from the PCLOS repository and a PCLOS DVD with more applications that aren't available on the cd versions."

The reports that came in from early testing and especially the ones now are very complimentary. Most folks are stating how nice this release is. Some have went so far as to say it's the best operating system they've tried. Just look at this thread and this comment on PCLO.

Texstar and posse have been working overtime to bring support for the latest technology to their distro. They have begun to include support for the latest wifi/wireless adapters and connectivity, but Texstar states,

"wifi connectivity and configuration is an area we need to improve upon. Mainly we worked on new hardware detection routines, faster boot times, usbkey support, usb hard drive installation, sata hd support, and added some code to the livecd-install to slow down the cdrom drive speed to not more than 24x to help keep the cdrom drive on some systems from overheating and killing the install."

So what's in the future for PCLinuxOS? Texstar writes,

"0.93 will sport kernel 2.6.14 and KDE 3.5. We are going to move many of the 3rd party drivers out of the kernel build and make dkms packages out of them so when you install a new kernel, at boot up the system will automatically rebuild the drivers for the new kernel. This will also give us the ability to update various drivers without requiring the user to install a new kernel.

1.0 will probably be a complete rebuild of the entire distro using a new glibc, gcc 4.x, KDE 4.0, Xorg 7.0, and all the latest opensource applications."

I've spent a lot of time in PCLinuxOS .92, since the first test release and following the continuing development. I've experience very few glitches with the test releases and could not put my finger on any bugs in the final. It just works.

Download your copy today!

And if you find it useful, please consider making a donation to help support future development HERE.

I've posted a few more screenshots HERE.

...And they all lived happily ever after.

Re: Official copies available ?

atang1 wrote:

For many of us who are still using 56k modems, will there be official copies with documentation to be sold? Is it time to go commercial yet? If 0.92 is good enough to go commercial, the next release should be just an auto-update, same as windows sp2 or sp3, etc.

No, there is no official "boxes" available now. I recall it being a hope of Tex's for the future. But it's a very expensive investment to make and I don't think the download donations are supporting that expansion at this time. The documentation project is just getting a good start right now as well and it's based online as a wiki.

One of the key features of PCLOS is the elimination of having to do a reinstall each release. New releases are said to be primarily for the new user, as an established system should be able to come current thru synaptic/apt-get. Although if 1.0 goes as planned, I'd probably want to opt for the fresh reinstall. But as a reviewer, I almost always to fresh installs of any distro, unless I want to comment on the upgradeability.

If you'd like, I can snail mail you a cdr of it. I think there are places that sell cdrs of really cheap as well. Email me if you'd like a copy from me.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Linux 4.8.4

I'm announcing the release of the 4.8.4 kernel. And yeah, sorry about the quicker releases, I'll be away tomorrow and as they seem to have passed all of the normal testing, I figured it would be better to get them out earlier instead of later. And I like releasing stuff on this date every year... All users of the 4.8 kernel series must upgrade. The updated 4.8.y git tree can be found at: git:// linux-4.8.y and can be browsed at the normal git web browser: Read more Also: Linux 4.7.10 Linux 4.4.27

New Releases: Budgie, Solus, SalentOS, and Slackel

  • Open-Source Budgie Desktop Sees New Release
    The pet parakeet of the Linux world, Budgie has a new release available for download. in this post we lookout what's new and tell you how you can get it.
  • Solus Linux Making Performance Gains With Its BLAS Configuration
    - Those making use of the promising Solus Linux distribution will soon find their BLAS-based workloads are faster. Solus developer Peter O'Connor tweeted this week that he's found some issues with the BLAS linking on the distribution and he's made fixes for Solus. He also mentioned that he uncovered these BLAS issues by using our Phoronix Test Suite benchmarking software.
  • SalentOS “Luppìu” 1.0 released!
    With great pleasure the team announces the release of SalentOS “Luppìu” 1.0.
  • Slackel "Live kde" 4.14.21
    This release is available in both 32-bit and 64-bit architectures, while the 64-bit iso supports booting on UEFI systems. The 64-bit iso images support booting on UEFI systems. The 32-bit iso images support both i686 PAE SMP and i486, non-PAE capable systems. Iso images are isohybrid.

Security News

  • Free tool protects PCs from master boot record attacks [Ed: UEFI has repeatedly been found to be both a detriment to security and enabler of Microsoft lock-in]
    Cisco's Talos team has developed an open-source tool that can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks. The tool, called MBRFilter, functions as a signed system driver and puts the disk's sector 0 into a read-only state. It is available for both 32-bit and 64-bit Windows versions and its source code has been published on GitHub. The master boot record (MBR) consists of executable code that's stored in the first sector (sector 0) of a hard disk drive and launches the operating system's boot loader. The MBR also contains information about the disk's partitions and their file systems. Since the MBR code is executed before the OS itself, it can be abused by malware programs to increase their persistence and gain a head start before antivirus programs. Malware programs that infect the MBR to hide from antivirus programs have historically been known as bootkits -- boot-level rootkits. Microsoft attempted to solve the bootkit problem by implementing cryptographic verification of the bootloader in Windows 8 and later. This feature is known as Secure Boot and is based on the Unified Extensible Firmware Interface (UEFI) -- the modern BIOS.
  • DDOS Attack On Internet Infrastructure
    I hope somebody's paying attention. There's been another big DDOS attack, this time against the infrastructure of the Internet. It began at 7:10 a.m. EDT today against Dyn, a major DNS host, and was brought under control at 9:36 a.m. According to Gizmodo, which was the first to report the story, at least 40 sites were made unreachable to users on the US East Coast. Many of the sites affected are among the most trafficed on the web, and included CNN, Twitter, PayPal, Pinterest and Reddit to name a few. The developer community was also touched, as GitHub was also made unreachable. This event comes on the heels of a record breaking 620 Gbps DDOS attack about a month ago that brought down security expert Brian Krebs' website, KrebsonSecurity. In that attack, Krebs determined the attack had been launched by botnets that primarily utilized compromised IoT devices, and was seen by some as ushering in a new era of Internet security woes.
  • This Is Why Half the Internet Shut Down Today [Update: It’s Getting Worse]
    Twitter, Spotify and Reddit, and a huge swath of other websites were down or screwed up this morning. This was happening as hackers unleashed a large distributed denial of service (DDoS) attack on the servers of Dyn, a major DNS host. It’s probably safe to assume that the two situations are related.
  • Major DNS provider Dyn hit with DDoS attack
    Attacks against DNS provider Dyn continued into Friday afternoon. Shortly before noon, the company said it began "monitoring and mitigating a DDoS attack" against its Dyn Managed DNS infrastructure. The attack may also have impacted Managed DNS advanced service "with possible delays in monitoring."
  • What We Know About Friday’s Massive East Coast Internet Outage
    Friday morning is prime time for some casual news reading, tweeting, and general Internet browsing, but you may have had some trouble accessing your usual sites and services this morning and throughout the day, from Spotify and Reddit to the New York Times and even good ol’ For that, you can thank a distributed denial of service attack (DDoS) that took down a big chunk of the Internet for most of the Eastern seaboard. This morning’s attack started around 7 am ET and was aimed at Dyn, an Internet infrastructure company headquartered in New Hampshire. That first bout was resolved after about two hours; a second attack began just before noon. Dyn reported a third wave of attacks a little after 4 pm ET. In all cases, traffic to Dyn’s Internet directory servers throughout the US—primarily on the East Coast but later on the opposite end of the country as well—was stopped by a flood of malicious requests from tens of millions of IP addresses disrupting the system. Late in the day, Dyn described the events as a “very sophisticated and complex attack.” Still ongoing, the situation is a definite reminder of the fragility of the web, and the power of the forces that aim to disrupt it.
  • Either IoT will be secure or the internet will be crippled forever
    First things first a disclaimer. I neither like nor trust the National Security Agency (NSA). I believe them to be mainly engaged in economic spying for the corporate American empire. Glenn Greenwald has clearly proven that in his book No Place to Hide. At the NSA, profit and power come first and I have no fucking clue as to how high they prioritize national security. Having said that, the NSA should hack the Internet of (insecure) Things (IoT) to death. I know Homeland Security and the FBI are investigating where the DDoS of doomsday proportions is coming from and the commentariat is already screaming RUSSIA! But it is really no secret what is enabling this clusterfuck. It’s the Mirai botnet. If you buy a “smart camera” from the Chinese company Hangzhou XiongMai Technologies and do not change the default password, it will be part of a botnet five minutes after you connect it to the internet. We were promised a future where we would have flying cars but we’re living in a future where camera’s, light-bulbs, doorbells and fridges can get you in serious trouble because your home appliances are breaking the law.
  • IoT at the Network Edge
    Fog computing, also known as fog networking, is a decentralized computing infrastructure. Computing resources and application services are distributed in logical, efficient places at any points along the connection from the data source (endpoint) to the cloud. The concept is to process data locally and then use the network for communicating with other resources for further processing and analysis. Data could be sent to a data center or a cloud service. A worthwhile reference published by Cisco is the white paper, "Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are."
  • Canonical now offers live kernel patching for Ubuntu 16.04 LTS users
    Canonical has announced its ‘Livepatch Service’ which any user can enable on their current installations to eliminate the need for rebooting their machine after installing an update for the Linux kernel. With the release of Linux 4.0, users have been able to update their kernel packages without rebooting, however, Ubuntu will be the first distribution to offer this feature for free.
  • ​The Dirty Cow Linux bug: A silly name for a serious problem
    Dirty Cow is a silly name, but it's a serious Linux kernel problem. According to the Red Hat bug report, "a race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system."
  • Ancient Privilege Escalation Bug Haunts Linux
  • October 21, 2016 Is Dirty COW a serious concern for Linux?
  • There is a Dirty Cow in Linux
  • Red Hat Discovers Dirty COW Archaic Linux Kernel Flaw Exploited In The Wild
  • Linux kernel bug being exploited in the wild
  • Update Linux now: Critical privilege escalation security flaw gives hackers full root access
  • Linux kernel bug: DirtyCOW “easyroot” hole and what you need to know
  • 'Most serious' Linux privilege-escalation bug ever discovered
  • New 'Dirty Cow' vulnerability threatens Linux systems
  • Serious Dirty Cow Linux Vulnerability Under Attack
  • Easy-to-exploit rooting flaw puts Linux PCs at risk
  • Linux just patched a vulnerability it's had for 9 years
  • Dirty COW Linux vulnerability has existed for nine years
  • 'Dirty Cow' Linux Vulnerability Found
  • 'Dirty Cow' Linux Vulnerability Found After Nine Years
  • FakeFile Trojan Opens Backdoors on Linux Computers, Except openSUSE
    Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with a new trojan named FakeFile, currently distributed in live attacks. Russian antivirus vendor Dr.Web discovered this new trojan in October. The company's malware analysts say the trojan is spread in the form of an archived PDF, Microsoft Office, or OpenOffice file.

today's howtos