Language Selection

English French German Italian Portuguese Spanish

Meet Hedinux

Filed under
Linux
Reviews
-s

Distrowatch says that 'Hedinux is a beginner-friendly, i686-optimised desktop Linux distribution built from scratch.' Hedinux released their 2006.1-alpha recently and Tuxmachines thought, "yippee, freshmeat!" Well, it turns out Hedinux isn't exactly brand new, but they were to us. This is what we found when we booted their livecd.

Hedinux's announcement states the following improvements:

  • The distribution was build with the "Linux From Scratch" book, gcc 4.0.2.
  • The latest stable kernel is available in version 2.6.15.4.
  • spca5xx and ov51x-jpeg webcam drivers are included.
  • The installer was rebuild.
  • Performance improvements for the "hed" package manager, and bugs fixes. Here is a list of new commands :
    • hed update upgrade (update packages list and upgrade the system)
    • hed list (list installed packages)
    • hed list not_installed (list not installed packages)
    • hed install mypackage (installation of "mypackage" package)
    • hed remove mypackage (remove "mypackage" package)
  • Faster boot up process
  • New major packages: cups, ssh, sane...
  • A simplier GNOME menu.
  • Latest versions of desktop environments: GNOME 2.12.3, KDE 3.5.1, XFCE 4.2.3.2, Enlightenment 0.16.999.023.

Hedinux comes in several formats. They offer a 622mb livecd featuring the gnome 2.12 desktop, a 604mb more traditional install cd, and a 73mb net install cd. We chose the livecd. You can download any of them here.

LiveCD

As we booted Hedinux we recognized the linux live boot up debian live distros seem to prefer. Hed's is a bit customized in that you find pumpkin orange OK's. If all goes well, you'd be asked at what resolution you'd prefer and probably end up in a Gnome desktop. Having problems with my graphic chip and the xorg 6.82 combo, I ended up at a commandline. Changing "nv" to "vesa" and killing X allowed the X server to restart and drop me into Gnome.

It's a cute little gnome desktop. Mostly default, it features a white background with Hedinux's mascot and logo. I'm assuming this is a hedgehog. But their rendition is a much cuter almost cartoonish version. I never thought a hedgehog could be cute before, but never say never. I wonder if we are to draw some parallel with it's ability to roll itself into a ball. Big Grin

In the menu one can find several useful apps for browsing, email, office tasks, graphic manipulation, and sound and video enjoyment. One can find a im and irc chat client as well as an ftp, voip, download and some emule apps. Also included are some basic linux system and development tools. I thought it was a fairly good general purpose menu.

        

    

        

Harddrive Install

One highlight in the menu is their hedinux-installer. I was hoping I'd might find one, but given their download choices, I wasn't sure I would. The included installer must be their net-installer as that was it's method. It downloaded packages it needed, upon execution and setup, to install a base system. Then after first boot, it downloads the rest of your package selection and installs them.

One of Hedinux's goals is to be newbie-friendly, but I'm not so sure this installer, at least on the livecd, would qualify. For anyone with a bit of Linux experience would probably not have a problem, but someone straight from windows would run away probably screaming into the night.

The first step is cfdisk. Now I can fdisk in my sleep, but I hate cfdisk. Personal feelings aside, this is not as newbie-friendly as some fans may profess. Would qtparted be much larger? The next few steps are easy enough in choosing packages and setting up users and such. Although after installation configuration is another step that could send Mandriva and SUSE users next door. Given a choice of vi or nano, the user is expected to edit certain configuration files on their own. Most are easy enough and anyone with moderate experience knows the format, but some are not as common and all are daunting for the newbie. They do have a non-expert setting, but as far as I can tell, it's the same procedure, one just doesn't choose the steps from a menu. Instead they are presented to the user in a predefined sequence.

        

After the install of the base system and one boots into Hedinux for the first time. During the boot process, the system stops and finishes the install. For my install, I chose all 4 window managers and all packages. This added up to 280 packages and took approximately an hour to download. The installer looked very apt-get like to me, but it's called Hed. It did it's job admirably and ... amazingly. 280 packages and no errors. I was stoked.

One has to reconfigure some of their services again after installation, such as your X server. But then one might find themselves at the lovely login screen. You've seen this one before. It's the one with a kde-like blue wavy background with a big yellow lazy susan or daisy in the corner.

After login you can choose from any of your installed desktops, except for enlightenment which didn't show up in the menu. KDE and xfce4 were stock installs, meaning no customizations, but they seemed complete and fully functional. Gnome on the other hand was not fully functional. It did start but shot an applet error and all components were launched in seperate windows, including the desktop itself. Given the choice to delete the troublesome applet from configuration, I did, yet it did not fix the problem. After reboot, Gnome still behaved in the same manner. I thought it was rather strange since this was their system of choice and default on the livecd. If any one should have worked, it should have been gnome.

        

Conclusion

Hedlinux is based on noone so they claim. I recognized the linux live startup scripts, they used Linux From Scratch as their build method, and the package installer/updater is apt-get. So to state they aren't based on anyone is stretching it a bit far. However, it all comes together to work pretty good. I liked it. The system installs, mostly works, and offers above average performance with an adequate variety of applications. I had no stabilty problems and all apps seemed to function well (except mplayer which wouldn't start due to a missing libmad). The only hardware issue was with usb devices not detected. To call it newbie-friendly is a misnomer however, at least in the version tested here. All in all, I think it's a wonderful effort and a great project. Considering this is an alpha release, I'm quite impressed. More screenshots here.

More in Tux Machines

Google, IBM and Microsoft

  • Five Common Chromebook Myths Debunked
    When Chromebooks first came out in 2011, they were basically just low-spec laptops that could access web apps – fine for students maybe, but not to be regarded as serious computers. While they’ve become more popular (the low cost, simplicity, and dependability appeal to businesses and education systems), as of 2018 Chromebooks still haven’t managed to become widely accepted as a Windows/Apple/Linux alternative. That may be about to change. The humble Chromebook has gotten a lot of upgrades, so let’s get ourselves up to speed on some things that just aren’t true anymore. [...] The 2011 Chrome OS was pretty bare-bones, but it’s gone to the opposite extreme since then. Not only is it steadily blurring the line between Chrome and Android, it can now install and run some Windows programs as well, at the same time as a Chrome and an Android app, if you like. And hey, while you’re at it, why not open a Linux app as well? You can already install Linux on a Chromebook if you want, but one of the next versions of Chrome OS is going to include a Linux virtual machine accessible right from your desktop (which is already possible, just not built-in and user-friendly). In sum, Chrome OS has gone from barely being an operating system to one that can run apps from four other OSes at the same time.
  • Like “IBM’s Work During the Holocaust”: Inside Microsoft, Growing Outrage Over a Contract with ICE
  • Ubuntu Podcast from the UK LoCo: S11E15 – Fifteen Minutes - Ubuntu Podcast
    ...Microsoft getting into hot water over their work with US Immigration and Customs Enforcement. Plus we round up the community news.

KDE on Android: CI, CD & SDK

I guess we all agree that one of the biggest stoppers to get a contribution out is the ability to get the system ready to start working on the contribution. Today I want to talk a bit about generating Android binaries from our machine. In the KDE Edu sprint we had the blatant realisation that it’s very frustrating to keep pushing the project while not being swift at delivering fresh packages of our applications in different systems. We looked into windows, flatpak, snap and, personally, I looked into Android once again. Nowadays, KDE developers develop the applications on their systems and then create the binaries on their systems as well. Usually it’s a team effort where possibly just one person in the team will be familiar with Android and have the development combo in place: Android SDK, Android NDK, Qt binaries and often several KDE Frameworks precompiled. Not fun and a fairly complex premise. Read more Also:

today's howtos

Linux Kernel and Security: LVM2, Containers, AMD

  • LVM2 Begins Work On Major Changes To Logical Volume Management
    LVM2 as the user-space tools for Logical Volume Management (LVM) on Linux is in the process of going through a big re-work.
  • Containers and Cloud Security
    The idea behind this blog post is to take a new look at how cloud security is measured and what its impact is on the various actors in the cloud ecosystem. From the measurement point of view, we look at the vertical stack: all code that is traversed to provide a service all the way from input web request to database update to output response potentially contains bugs; the bug density is variable for the different components but the more code you traverse the higher your chance of exposure to exploitable vulnerabilities. We’ll call this the Vertical Attack Profile (VAP) of the stack. However, even this axis is too narrow because the primary actors are the cloud tenant and the cloud service provider (CSP). In an IaaS cloud, part of the vertical profile belongs to the tenant (The guest kernel, guest OS and application) and part (the hypervisor and host OS) belong to the CSP. However, the CSP vertical has the additional problem that any exploit in this piece of the stack can be used to jump into either the host itself or any of the other tenant virtual machines running on the host. We’ll call this exploit causing a failure of containment the Horizontal Attack Profile (HAP). We should also note that any Horizontal Security failure is a potentially business destroying event for the CSP, so they care deeply about preventing them. Conversely any exploit occurring in the VAP owned by the Tenant can be seen by the CSP as a tenant only problem and one which the Tenant is responsible for locating and fixing. We correlate size of profile with attack risk, so the large the profile the greater the probability of being exploited.
  • Canonical Releases AMD Microcode Updates for All Ubuntu Users to Fix Spectre V2
    Canonical released a microcode update for all Ubuntu users with AMD processors to address the well-known Spectre security vulnerability. The Spectre microprocessor side-channel vulnerabilities were publicly disclosed earlier this year and discovered to affect billions of devices made in the past two decades. Unearthed by Jann Horn of Google Project Zero, the second variant (CVE-2017-5715) of the Spectre vulnerability is described as a branch target injection attack.