Language Selection

English French German Italian Portuguese Spanish

Installing Linux on old PC’s

Filed under
Linux

In part one I showed you that you could install a linux distro on a new computer and transplant it into a 386 computer in a short amount of time and with little effort. Now it is time to move on to bigger and beefier machines like 486′s, Pentiums and better.

Less than 16 megs of ram:

This is where my second laptop comes in. It is an old first run Pentium running at 90Mhz with 8 megs of ram. On machines with <16 megs of ram there is not much choice out there.

Much like the 386 install, you can use an older distribution, but you do have a couple of other options. One is DSL linux, which is no longer being supported outside of its community. Another is Deli linux, which is also not supported anymore, but has a fork called DeLicate. Since DeLicate does not have an installer, you need to install DeLicate 8 first and then upgrade through the package manager.

rest here




Bah

I once dipped a old firebrick into some gold paint, but it was still just a old brick.

What a waste of time and effort.

Landfill those dinosaurs and waste your time on a 5 year old computer.

Or better yet, pry open your wallet and spend a few hundred bucks and get something built this year.

Humbug

vonskippy, do you like ANYTHING?

I mean, seriously. Is there anything in the world, anything at all, that you like and approve of? Anything at all. One single thing would do it.

yes, he does...

... and you've supplied it!

Oh come on.

Oh come on, do you or anyone else really think it's worthy of anyone's time to waste on these dinosaurs?. Most modern watches/smartphones/PDA's/Tablets/Netbooks have way way way way way more functionality while using way way way way way way less electricity.

Sure, if you like to restore ancient history, that's great, but as any practical exercise in modern computing it's a waste of time and effort. The distro choices that will work on just old tech is so far out of date, out of security, and out of any useful function it's a complete waste of time. At least the people who get Linux running on a toaster are doing something clever - these guys are just repeating 20 year old history (look at me, I've rotated the tires on my 78 Nova), nothing new, nothing clever, nothing noteworthy.

I love how blogs/forums have gone from a method of communicating OPINIONS into the childish "you either agree 110% with me, or you're wrong".

I post my OPINIONS. Agree, disagree, I don't care, but if you have no other form of rebuttal then attacking me the writer, instead of my opinions, you're the troll, not I.

grumpy

dwasifar wrote:
vonskippy, do you like ANYTHING?

I mean, seriously. Is there anything in the world, anything at all, that you like and approve of? Anything at all. One single thing would do it.

Attention. He is a lonely soul and this is his only enjoyment so please be kind to the grumpy old man.

Thank U.

Troll?

Never accused you of trolling. I also never even said whether I disagreed with you about this article; you assumed that.

This is not about this particular response to this particular article. It's about your comments in general. I've been coming here for a long time, and I have never, ever seen you post anything remotely positive. Perhaps you have, and I've just happened to miss it. But overwhelmingly, the comments I see from you are snide cutdowns of whatever the subject happens to be. So the question - do you like ANYTHING? - is a fair one. Or, if you would prefer it in the terms you used: do you have a positive OPINION of anything? Anything at all? One single thing would do it.

Never accused you

You can accuse me of trolling. heh heh

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's howtos

Red Hat and Fedora: Red Hat Academy, Lynne Chamberlain, Flatpak Apps, and Video of Fedora 26

Security: Windows 10 Bypass, Slackware OpenJDK Update and More

  • [Older] GHOSTHOOK ATTACK BYPASSES WINDOWS 10 PATCHGUARD
    A bypass of PatchGuard kernel protection in Windows 10 has been developed that brings rootkits for the latest version of the OS within reach of attackers. Since the introduction of PatchGuard and DeviceGuard, very few 64-bit Windows rootkits have been observed; Windows 10’s security, in particular its mitigations against memory-based attacks, are well regarded. Researchers at CyberArk, however, found a way around PatchGuard through a relatively new feature in Intel processors called Processor Trace (Intel PT).
  • [Slackware] OpenJDK 8 security round-up for July ’17
    Sooner than I anticipated, there is an update for OpenJDK 8. Andrew Hughes (aka GNU/Andrew) announced the release of IcedTea 3.5.0. The new icedtea framework compiles OpenJDK 8 Update 141 Build 15 (8u141_b15). This release includes the official July 2017 security fixes.
  • ROI (Not Security) the Most Immediate IoT Challenge
    According to Defining IoT Business Models, a new report from Canonical, the software company behind the Ubuntu Linux distribution, device security and privacy (45 percent) falls behind quantifying the return of investment (ROI) of their IoT projects (53 percent) as an immediate challenge. Canonical drew its conclusions from a survey of 361 IoT professionals conducted by IoTNow on behalf of the company.
  • Apply the STIG to even more operating systems with ansible-hardening
    Tons of improvements made their way into the ansible-hardening role in preparation for the OpenStack Pike release next month. The role has a new name, new documentation and extra tests. The role uses the Security Technical Implementation Guide (STIG) produced by the Defense Information Systems Agency (DISA) and applies the guidelines to Linux hosts using Ansible. Every control is configurable via simple Ansible variables and each control is thoroughly documented.
  • Open Source Flaw 'Devil's Ivy' Puts Millions of IoT Devices at Risk
    Millions of IoT devices are vulnerable to cybersecurity attacks due to a vulnerability initially discovered in remote security cameras, Senrio reported this week.
  • Microsoft’s secret weapon in ongoing struggle against Fancy Bear? Trademark law [Ed: Microsoft should make a start by stopping the addition of back doors to all its software]
  • SECURITY FOR THE SECURITY GODS! SANDBOXING FOR THE SANDBOXING THRONE
    Last year, probably as a distraction from doing anything else, or maybe because I was asked, I started reviewing bugs filed as a result of automated flaw discovery tools (from Coverity to UBSan via fuzzers) being run on gdk-pixbuf. Apart from the security implications of a good number of those problems, there was also the annoyance of having a busted image file bring down your file manager, your desktop, or even an app that opened a file chooser either because it was broken, or because the image loader for that format didn't check for the sanity of memory allocations.

5 open source tools for developing IoT applications

The internet of things is growing at a staggeringly fast pace, and is quickly coming to revolutionize virtually every aspect of modern life. Aspiring developers hoping to hop on board and profit off the growing phenomenon are constantly looking for the right tools to use. So what are the open source tools best suited for working with the IoT, and where can developers find them? A plethora of open source tools lay at the disposal of any would-be developer eager and wise enough to use them. By utilizing these five, you’ll find yourself tackling challenges and developing successful applications in no time. Read more Related: