Language Selection

English French German Italian Portuguese Spanish

A look at Slackware 13.0

Filed under
Slack

Some curiosity has come upon me and I have been giving a few Linux distros a spin in fVirtualBox virtual machines. One was Slackware and I recall a fellow university student using it in the mid/late 1990′s. Since then, my exploration took me into Redhat, SuSE, Mandrake and eventually to Ubuntu, Debian and Fedora. All of that bypassed Slackware so it was to give the thing a look.

While the current version is 13.1, it was 13.0 that I had to hand so I had a go with that. In many ways, the installation was a flashback to the 1990′s and I can see it looking intimidating to many computer users with its now old-fashioned installation GUI. If you can see through that though, the reality is that it isn’t too hard to install.

After all, the DVD was bootable. However, it did leave you at a command prompt and I can see that throwing many. The next step is to use cfdisk to create partitions (at least two are needed, swap and normal). Once that is done, it is time to issue the command setup and things look more graphical again.

rest here




More in Tux Machines

Programming

Security News

  • Security advisories for Thursday
  • Please save GMane!
  • The End of Gmane?
    In 2002, I grew annoyed with not finding the obscure technical information I was looking for, so I started Gmane, the mailing list archive. All technical discussion took place on mailing lists those days, and archiving those were, at best, spotty and with horrible web interfaces. The past few weeks, the Gmane machines (and more importantly, the company I work for, who are graciously hosting the servers) have been the target of a number of distributed denial of service attacks. Our upstream have been good about helping us filter out the DDoS traffic, but it’s meant serious downtime where we’ve been completely off the Internet.
  • Pwnie Express makes IoT, Android security arsenal open source
    Pwnie Express has given the keys to software used to secure the Internet of Things (IoT) and Android software to the open-source community. The Internet of Things (IoT), the emergence of devices ranging from lighting to fridges and embedded systems which are connected to the web, has paved an avenue for cyberattackers to exploit.
  • The Software Supply Chain Is Bedeviled by Bad Open-Source Code [Ed: again, trace this back to FUD firms like Sonatype in this case]
    Open-source components play a key role in the software supply chain. By reducing the amount of code that development organizations need to write, open source enables companies to deliver software more efficiently — but not without significant risks, including defective and outdated components and security vulnerabilities.
  • Securing a Virtual World [Ed: paywall, undated (no year but reposted)]
  • Google tells Android's Linux kernel to toughen up and fight off those horrible hacker bullies
    In a blog post, Jeff Vander Stoep of the mobile operating system's security team said that in the next build of the OS, named Nougat, Google is going to be addressing two key areas of the Linux kernel that reside at the heart of most of the world's smartphones: memory protection and reducing areas available for attack by hackers.

today's howtos

Chew on this: Ubuntu Core Linux comes to the uCRobotics Bubblegum-96 board

Linux and other open source software have been in the news quite a bit lately. As more and more people are seeing, closed source is not the only way to make money. A company like Red Hat, for instance, is able to be profitable while focusing its business on open source. Ubuntu is one of the most popular Linux-based operating systems, and it is not hard to see why. Not only is it easy to use and adaptable to much hardware (such as SoC boards), but there is a ton of free support online from the Ubuntu user community too. Today, Canonical announces a special Ubuntu Core image for the uCRobotics Bubblegum-96 board. Read more