Language Selection

English French German Italian Portuguese Spanish

Comparing CTK Arch Live and ArchBang

Filed under
Linux

Today I’ll be comparing two Arch Linux-based Openbox Distributions: ArchBang and CTKArchLive.

A few years ago, CrunchBang (“#!”) Linux became very popular as a lightweight Ubuntu-based distribution that made the Openbox window manager more palatable and appealing. Since then, it’s only gotten better and more popular, along the way ditching the Ubuntu base for Debian and gaining an Xfce version on the way. Because it was the first very popular Openbox distribution, it has inspired the creation of other distributions that use Openbox on top of various other base distributions. For example, Madbox, which I have recently reviewed, is based on Ubuntu to fill the gap from #!’s move to Debian.

The two I’m testing today, CTKArchLive and ArchBang, are, as you can probably guess by their names, based on Arch Linux. Aside from Chakra GNU/Linux, a KDE-using distribution that’s sort of based on Arch that I’ve tested before for FreeTechie.com, I’ve never really used Arch before. Neither of these distributions claim to cater to relative newbies like Chakra does, so I may have to play the whole manual configuration thing by ear, as I’ve never done that before in depth. I will say, however, that I have tried the live session of a previous ArchBang release before briefly in a live session. Continue reading to see how each one turns out. I tested both of these by using the MultiSystem multiboot USB creation script on the two ISO files and trying each via a live USB system. As I just want to focus on the live sessions, I did not install either of these.

rest here




More in Tux Machines

LLVM News

  • LLVM Pulls In More Than $300,000 USD A Year In Sponsorships
    The LLVM Foundation published its plans and budgets this week for 2016. There are a few interesting details when analyzing the information. The post at LLVM.org explains of the LLVM Foundation for those unfamiliar, "The LLVM Foundation originally grew out of the need to have a legal entity to plan and support the annual LLVM Developers’ Meeting and LLVM infrastructure. However, as the Foundation was created we saw a need for help in other areas related to the LLVM project, compilers, and tools. The LLVM Foundation has established 3 main programs: Educational Outreach, Grants & Scholarships, and Women in Compilers & Tools."
  • LLVMpipe Ported To Android x86 For Running Android Apps Without GPU Support
    For x86 Android users, patches are available for making use of Mesa's LLVMpipe driver in Gallium3D for cases where hardware drivers are not available.

Security Leftovers

  • Friday's security updates
  • Hacking Slack accounts: As easy as searching GitHub
    A surprisingly large number of developers are posting their Slack login credentials to GitHub and other public websites, a practice that in many cases allows anyone to surreptitiously eavesdrop on their conversations and download proprietary data exchanged over the chat service. According to a blog post published Thursday, company researchers recently estimated that about 1,500 access tokens were publicly available, some belonging to people who worked for Fortune 500 companies, payment providers, Internet service providers, and health care providers. The researchers privately reported their findings to Slack, and the chat service said it regularly monitors public sites for posts that publish the sensitive tokens.
  • Time for a patch: six vulns fixed in NTP daemon
  • NTP Daemon Gets Fixes for Vulnerabilities Causing DoS and Authentication Bypass
  • Cisco Spots New NTP Bugs
  • Network Time Keeps on Ticking with Long-Running NTP Project [Ed: corrected URL]
  • Open Source Milagro Project Aims to Fix Web Security for Cloud, Mobile, IoT
    As the Internet continues to both grow in size and widen in scope, so do demands on the supporting infrastructure. The number of users and devices, amount of activity, internationalization of the web, and new devices that range from mobile apps and cloud instances to "Internet of Things," put strain on the system. Not just for bandwidth or service availability, but also on the assurance of trust -- trust that the entities at each end are who (or what) they say they are, and that their communications are private and secure.
  • M2Mi Obtains DHS Open-Source Cryptographic Tool Development Funds
    Machine-to-Machine Intelligence Corp. has been awarded $75,000 in funds by the Department of Homeland Security‘s science and technology directorate to create a deployable cryptographic protocol for an Internet of Things security initiative.
  • Encrypted Network Traffic Comes at a Cost
    The use of encryption over the Internet is growing. Fueled by Edward Snowden's revelations on the extent of NSA and GCHQ content monitoring, encryption is now increasingly provided by the big tech companies as part of their standard product offerings. It's effectiveness can be seen in the continuing demands by different governments for these same tech companies to provide government backdoors for that encryption. Encryption works: it safeguards privacy. Against this background, the use of Secure Sockets Layer (SSL) or Transport Layer Security (TLS) to encrypt network traffic is likely to grow dramatically. Google is encouraging this. It already uses HTTPS as a positive weight for web sites in its search algorithm, while current rumors suggest it will soon start to place a warning red X in the URL bar of sites that do not use it. Taken together, these are strong incentives for businesses that don't currently use SSL/TLS to start doing so. Some predictions believe that almost 70% of network traffic will be encrypted by the end of this year.
  • Raptor Engineering Updates Details On Their POWER8-Based Talos Secure Workstation
    Raptor Engineering has published new information around their proposed high-performance Talos Secure Workstation that for around $3k is a high-end POWER8 motherboard.

GNOME privacy options give users even more desktop security

GNOME is helping you to improve security by wiping away that breadcrumb trail. Instead of having to manage these issues in various places such as display settings, file manager, and location settings, the developers of GNOME put these security-centric settings in one location: the GNOME Privacy tool. Read more