Language Selection

English French German Italian Portuguese Spanish

Stx Linux 1.0 Final Look

Filed under
Linux
Reviews
-s

Stx Linux is a small lightweight operating system for the x86 arch. It is based on Slackware and slackware derivatives. One of the key features of Stx is it's ability to perform admirably on older hardware, and it's minimum requirements are a pentium 1 with 32 mb ram. Tuxmachines has covered some of the developmental releases, RC2 and RC3, but since final was released today, we felt it deserved yet another look.

The Stx site says, "STX Linux is a desktop Linux distribution especially targeted to older hardware. It also works quite well on new PC's." If you already have an older Stx install, Stibs has made some update patches available here. Today, we will report on a clean install as well as how the patch process went for us on our rc3 install.

The Changelog since rc3 includes:

  • 3 packaged Patches from the download page applied

  • Installer corrected for creating an fstab that allows normal users to mount cdrom and floppy drives
  • The usual package updates
  • Included Elleo's hacked eworkpanel with notification area
  • Included recompiled pyfltk (XFT font rendering now also in STXCC) Thx Mike
  • GTK 2 and EDE Themes switched to STX for a more uniform appearance, also Thx Mike Wink
  • Included gnome-cups-manager for printer administration (more common than the CUPS web frontend)
  • Included Requiredbuilder for creating dependecy files for Slackware/STX packages

Upgrading Current Install

My first test was upgrading my current rc3 install with the 3 patches made available on the Stx site. The install of the packages went smoothly and the upgrades were indeed implimented. I could see some new features already. Most noticable was the new login splash, wallpapers, and the incorporation of the Stx ede theme. I stated in my article on rc3 that I hoped the viagra logo didn't make it into the distro, but I knew it would. I was right. The new login screen and wallpapers now feature the new Stx logo. The root desktop wallpaper has a big old stop sign with the warning embossed "Think twice before you hit Enter." As you can see the "file splitter" (or menu entry) is now functional.

        

To patch/upgrade a rc3 install, download the 3 patches from the Stx Linux site and issue the command:
installpkg <stxpatches> It probably isn't necessary to reboot, but I did anyway. The process took less than 5 minutes start to finish. The patches are small to download and take a mere seconds to install.

Fresh Install

The installer has been discussed briefly before here on Tuxmachines, but for the newcomer I'll reiterate that it is what I call ascii-graphical. By that I mean that it's not a full blown fancy frame-buffered beauty like one finds in suse or mandriva, but yet it's not a text install demanding manual fdisks, mountings, and confusing commands. It does offer a 'graphical interface' of sorts, yet one uses the keyboard to navigate. It's one of the easiest and fastest installs to date. Missing is setting up a user account, but one is provided a chance to change the root password and a "demo" user (password: demo) is already setup. Once the system is in-place, you can setup a regular user through the Stx Control Panel.

As usual for Stx, the install went without a hitch and a nice light desktop resulted. For those who don't know, Stx features the Equinox Desktop Environment. It's main goal appears to be ease of use within a familiar environment, perhaps for those coming from Windows. Ede looks very much like a Win98 desktop. The newly included default Stx theme continues to appear very windows-like. I don't recall if this is exactly the same Stx theme that's been available on the Ede site for a while, but probably is. ...Which brings up another subject, there are quite a few nice themes available on the Ede site. But I'm getting off-topic.

The big ugly root stop sign wallpaper encountered in the patched system did not appear on the fresh install, but the viagra pill wallpaper did. It's not particularly repellant, but I prefer something with less of a message. I quickly changed my background to one of the others available thru the background settings module. In fact, ede comes with a control panel of its own in which you can change many settings such as the font, theme, and colors. As an aside, the fonts render much better in my fresh install.

Stx comes with lots of great applications for most popular tasks. One can, for example, listen to music, watch videos, surf the internet, answers emails, chat with friends, write a review, take screenshots and manipulate images, play some games, and even write a webpage.

        

        

Another difference in the patched system and the fresh install was the printer setup dialogue. Now that parellel ports detection was working, I clicked on printer setup in the Stx Control Panel. In the patched system, one is offered the browser based cups admin. In the fresh install, a little setup module opens a more familiar applet. They both do pretty much the same thing and both seem to work, but I like the gnome-cups-manager much better.

        

The Stx Control Panel is a really great thing. From there one can configure hardware, (un)install software, configure a network/internet connection, and set some system settings. It's a wonderful application, nice and light and all the modules seem to functional really well.

        

Through the Stx Control Panel one can install software. Stx includes slapt-get and the nice front-end gslapt. Already configured to use a Slackware 10.2 repository, one can, as an example, install jre, eog, or even KDE. I tested it installing jre, eog, and Fluxbox. I wanted eog because the image viewer provided couldn't seem to handle .pngs. In fact, I'd suggest to Stibs replacing Xfi with eog. Slapt worked wonderfully. I didn't even have to restart my browser for java to start working, eog rendered the images with no problems, and Fluxbox started right up. I'm not sure if KDE would go smoothly, perhaps I'll test it later. One needs to be cautious with gslapt/slapt-get as some things listed as installed aren't. Some things listed as not install are. So I "which binaries" and "locate libraries" before each installation to make sure. I'm guessing the "installed software" list slapt-get is using is left from Stibs' development system and it's not exactly accurate. Just a bit of caution is required. For example, gslapt states the kernel-source is installed, but it isn't. One can build a vanilla kernel from kernel.org (if they slapt-get --install diffutils) if desired to build any drivers you may need like nvidia. But it'd just be better if the ones matching the default kernel were included in the iso.

        

Several browser plugins worked out of the box such as the gxine movie player, flash, and javascript.

        

Then after installing java through gslapt:


Conclusion

So, as delivered Stx is a very capable yet light weight desktop system that has lots of personality and functionality. As installed one can accomplished most of their day to day tasks. Stx is ultra-stable and blazingly fast. As I've said before, I really like Stx a lot. If I mention it needs this or that, it's because I like it and plan to use it. The patches work fine, but I found the fresh install much cleaner and saw a few improvements not readily apparent in the patched system.

Stx is available for download primarily from ibiblio.org, but there are also two mirrors listed. They are the one in Germany and one in Bulgaria. I had the best luck from the one in Germany as ibiblio is always slow for me in my part of the world. For those who prefer bittorrent, they have that option available as well. Further, Stibs even offers the iso in 29 15 MB parts for those users on dial up. In addition, some Arabian Fonts are offered.

Previous coverage: RC3, RC2, RC Screenshots.

Current Screenshots.


More in Tux Machines

Google and Mozilla

  • Google Rolls Out Continuous Fuzzing Service For Open Source Software
    Google has launched a new project for continuously testing open source software for security vulnerabilities. The company's new OSS-Fuzz service is available in beta starting this week, but at least initially it will only be available for open source projects that have a very large user base or are critical to global IT infrastructure.
  • Mozilla is doing well financially (2015)
    Mozilla announced a major change in November 2014 in regards to the company's main revenue stream. The organization had a contract with Google in 2014 and before that had Google pay Mozilla money for being the default search engine in the Firefox web browser. This deal was Mozilla's main source of revenue, about 329 million US Dollars in 2014. The change saw Mozilla broker deals with search providers instead for certain regions of the world.

Security Leftovers

  • Security updates for Friday
  • Understanding SELinux Roles
    I received a container bugzilla today for someone who was attempting to assign a container process to the object_r role. Hopefully this blog will help explain how roles work with SELinux. When we describe SELinux we often concentrate on Type Enforcement, which is the most important and most used feature of SELinux. This is what describe in the SELinux Coloring book as Dogs and Cats. We also describe MLS/MCS Separation in the coloring book.
  • The Internet Society is unhappy about security – pretty much all of it
    The Internet Society (ISOC) is the latest organisation saying, in essence, “security is rubbish – fix it”. Years of big data breaches are having their impact, it seems: in its report released last week, it quotes a 54-country, 24,000-respondent survey reporting a long-term end user trend to become more fearful in using the Internet (by Ipsos on behalf of the Centre for International Governance Innovation). Report author, economist and ISOC fellow Michael Kende, reckons companies aren't doing enough to control breaches. “According to the Online Trust Alliance, 93 per cent of breaches are preventable” he said, but “steps to mitigate the cost of breaches that do occur are not taken – attackers cannot steal data that is not stored, and cannot use data that is encrypted.”
  • UK's new Snoopers' Charter just passed an encryption backdoor law by the backdoor
    Among the many unpleasant things in the Investigatory Powers Act that was officially signed into law this week, one that has not gained as much attention is the apparent ability for the UK government to undermine encryption and demand surveillance backdoors. As the bill was passing through Parliament, several organizations noted their alarm at section 217 which obliged ISPs, telcos and other communications providers to let the government know in advance of any new products and services being deployed and allow the government to demand "technical" changes to software and systems.
  • EU budget creates bug bounty programme to improve cybersecurity
    Today the European Parliament approved the EU Budget for 2017. The budget sets aside 1.9 million euros in order to improve the EU's IT infrastructure by extending the free software audit programme (FOSSA) that MEPs Max Anderson and Julia Reda initiated two years ago, and by including a bug bounty approach in the programme that was proposed by MEP Marietje Schaake.
  • Qubes OS Begins Commercialization and Community Funding Efforts
    Since the initial launch of Qubes OS back in April 2010, work on Qubes has been funded in several different ways. Originally a pet project, it was first supported by Invisible Things Lab (ITL) out of the money we earned on various R&D and consulting contracts. Later, we decided that we should try to commercialize it. Our idea, back then, was to commercialize Windows AppVM support. Unlike the rest of Qubes OS, which is licensed under GPLv2, we thought we would offer Windows AppVM support under a proprietary license. Even though we made a lot of progress on both the business and technical sides of this endeavor, it ultimately failed. Luckily, we got a helping hand from the Open Technology Fund (OTF), which has supported the project for the past two years. While not a large sum of money in itself, it did help us a lot, especially with all the work necessary to improve Qubes’ user interface, documentation, and outreach to new communities. Indeed, the (estimated) Qubes user base has grown significantly over that period. Thank you, OTF!
  • Linux Security Basics: What System Administrators Need to Know
    Every new Linux system administrator needs to learn a few core concepts before delving into the operating system and its applications. This short guide gives a summary of some of the essential security measures that every root user must know. All advice given follows the best security practices that are mandated by the community and the industry.
  • BitUnmap: Attacking Android Ashmem
    The law of leaky abstractions states that “all non-trivial abstractions, to some degree, are leaky”. In this blog post we’ll explore the ashmem shared memory interface provided by Android and see how false assumptions about its internal operation can result in security vulnerabilities affecting core system code.

GNU/FSF

  • The Three Software Freedoms
    The government can help us by making software companies distribute the source code. They can say it's "in the interest of national security". And they can sort out the patent system (there are various problems with how the patent system handles software which are out of the scope of this article). So when you chat to your MP please mention this.
  • Leapfrog Honoring the GPL
  • A discussion on GPL compliance
    Among its many activities, the Software Freedom Conservancy (SFC) is one of the few organizations that does any work on enforcing the GPL when other compliance efforts have failed. A suggestion by SFC executive director Karen Sandler to have a Q&A session about compliance and enforcement at this year's Kernel Summit led to a prolonged discussion, but not to such a session being added to the agenda. However, the co-located Linux Plumbers Conference set up a "birds of a feather" (BoF) session so that interested developers could hear more about the SFC's efforts, get their questions answered, and provide feedback. Sandler and SFC director of strategic initiatives Brett Smith hosted the discussion, which was quite well-attended—roughly 70 people were there at a 6pm BoF on November 3.
  • Join us as a member to give back for the free software you use
    At the FSF, we run our own infrastructure using only free software, which makes us stand out from nearly every other nonprofit organization. Virtually all others rely on outside providers and use a significant amount of nonfree software. With your support, we set an example proving that a nonprofit can follow best practices while running only free software.
  • The Free Software Foundation is in need of members

today's howtos