Language Selection

English French German Italian Portuguese Spanish

Installing Gentoo on a Notebook in 2011

Filed under
Gentoo

The first time I installed Gentoo, back in late 2004, I used an at-the-time brand-new Dell Inspiron (5150 if I recall) notebook as the victim. At that time, Gentoo was a new world to me, and a confusing one. It took me about a half-week's worth of actual work to get it installed, but it happened, and it was one of the most satisfying experiences I've ever had with a PC.

There was a problem, though. As Gentoo is hugely a do-it-yourself Linux distribution, there are many things that are just not done for you without your explicit consent. Things have become a little easier over the years, especially with the very informative guides and major improvements made to Gentoo's own software, but even today it's still an amazing challenge to get it installed onto a PC and configured correctly (the latter being the more difficult part).

At that time in 2004, the biggest issue I had was getting the wireless NIC to function, and though I did manage it after a couple of days, the solution I had been using was clunky and I was essentially limited to a single SSID to connect to. Despite Gentoo being my preferred distro and one I've been using full-time for 5 years (as of this week), the fact that I had such difficulty getting the wireless to work in the earlier days prevented me from ever using it on the notebook much after that first install. Since then, I've just used whatever distro I felt like testing out, such as Ubuntu or openSUSE.

Well, a couple of weeks ago I upgraded the hard drive in my notebook since the previous one in there was dying, and for some reason I got hit with the idea to install Gentoo again and see how things have improved -

rest here




More in Tux Machines

Cooking With Linux and EzeeLinux Shows

Red Hat Leftovers

  • RPKG guide from Tito user
    Since the beginning of the rpkg project, it was known as a client tool for DistGit. Times changed and a new era for rpkg is here. It was enhanced with project management features, so we can safely label it as a tito alternative. A features review, pros and cons and user guide is a theme for a whole new article. In this short post, I, as a long-time tito user, want to show rpkg alternatives for the tito commands, that I frequently use.
  • All-Flash Platform-as-a-Service: Pure Storage and Red Hat OpenShift Reference Architecture
    Pure Storage® is excited to announce a reference architecture for Red Hat OpenShift Container Platform, using both Pure Storage FlashArray and FlashBlade™ to provide all the underlying storage requirements.
  • Red Hat OpenStack Platform 13 Delivers Long-Term Support
    The Red Hat OpenStack Platform 13 release was officially announced here on May 21, bringing along with it new features and expanded support for the open-source cloud platform. In a video interview with eWEEK, Mark McLoughlin, senior director of engineering for OpenStack at Red Hat, details what's new in the release and what is set to come in the next release. Red Hat OpenStack Platform 13 is based on the upstream OpenStack Queens release that first became generally available on Feb. 28. "The key thing for the OpenStack Platform 13 release is that it is a long life release," McLoughlin said.
  • Red Hat, Inc. (RHT) stock remained among YTD Quarterly with rise of 12.54%
  • 10 tasks for running containers on Atomic Host
    Unlike a virtual machine, which includes an entire operating system, a container is meant to hold only the software needed to run an application. Therefore, to run a container efficiently and securely, you need an operating system that provides secure container services and acts as a foundation for running containers. One operating system developed for that task is Atomic Host. Think of Atomic Host as a secure, specialized version of Fedora, CentOS, or Red Hat Enterprise Linux (RHEL). Its best use is to provide a reliable and easily upgradable operating system for running containers. Different formats of Atomic Host are available to run on anything from bare metal to a variety of cloud environments. With an Atomic Host system installed, you can use the docker command as you would on other container-enabled systems. However, Atomic Host also comes with an additional command called atomic, which expands what you can do with containers.

Security: Firefox Accounts, 'DevSecOps', VPNFilter, PassProtect, Reproducible Builds

  • Two-step authentication in Firefox Accounts
  • Firefox Finally Offers Two Factor Auth to Protect Your Passwords
    Mozilla is rolling out two factor authentication for Firefox accounts and if you sync passwords using Firefox Sync you should enable it immediately. The option for two factor authentication should show up in your Firefox account settings in a few weeks, but you can skip the wait by clicking this link. Do that and you should see the option for two-factor authentication, as shown above.
  • Now Make Your Firefox Account Safer With New Two Factor Authentication
    It seems that tech giants, finally, are gearing up to make portals more secure. In an announcement made yesterday, Mozilla has announced two-factor authentication for Firefox accounts. It is an optional security feature that will require inserting authentication code after signing in your Firefox account with your credentials. The newly introduced two-step verification feature is based on the commonly used Time-based One-Time Password (TOTP)-based standard. Currently, the feature is available with Duo, Google Authenticator, and Authy. Users will need to install these apps to receive the authentication code.
  • Navigating the container security ecosystem
    SJ Technologies partnered with Sonatype for the DevSecOps Community 2018 Survey. The survey was wildly popular, receiving answers from more than 2,000 respondents representing a wide range of industries, development practices, and responsibilities. One-third of respondents (33%) came from the technology industry, and banking and financial services was the second most represented group (15%). 70% of all respondents were using a container registry. With so many respondents utilizing containers, a deeper dive into container security is in order.
  • New VPNFilter malware targets at least 500K networking devices worldwide
  • 500,000 Routers Are Infected With Malware and Potentially Spying On Users
  • 500,000 Routers In 54 Countries Hacked To Create Massive Botnet Army
  • PassProtect Tells You If Your Password Is Compromised
    A compromised password can’t protect you. PassProtect is a Chrome extension that notifies you whenever a password you enter is exposed, giving you the chance to change it. Data breaches happen all the time, and the result is usually a bunch of usernames and password floating around the web. Attackers use these lists to access accounts, so it’s important to change your passwords after a breach. Most users can’t keep track of it all, however. Which is where PassProtect come in. Using data from Have I Been Pwned, Troy Hunt’s database of compromised passwords, PassProtect lets you know when a password you use was part of a recent breach.
  • PassProtect warns Chrome users when their username or passwords get pwned
    Data breaches happen all the time. When they do, it’s invariably bad, with countless people ensnared. The MySpace breach, for example, impacted nearly 360 million. LinkedIn impacted 165 million more. One tool helping to mitigate the aftermath is Okta’s new Chrome plugin, PassProtect.
  • Reproducible Builds: Weekly report #160
    This week’s edition was written by Bernhard M. Wiedemann, Chris Lamb, Levente Polyak and Mattia Rizzolo & reviewed by a bunch of Reproducible Builds folks on IRC & the mailing lists.

today's howtos