Language Selection

English French German Italian Portuguese Spanish

KIARA 2.4 My Homemade KDE3 Distro

Filed under
Linux

http://kiaragnulinux.blogspot.com/2011/11/kiara-gnulinux-2.html

Learn your command line, kids! Nine years ago, I was such a nOOB that I was drummed out of a couple of Linux chats, and I couldn't even install Slackware... and now I have my own live CD, and it's been downloaded hundreds of times all over the world. It's an awesome hobby.

Of course, most of the credit goes to Patrick Slackware and Tomas Slax. But KIARA (Kiara Is A Recursive Acronym) is the best way I know to experience KDE3 without needing any harddrive "skin" in the game. In other words, it's the only KDE3 live CD I know that keeps the web browsers current. In my experience, Nothing brings New Life to an old Desktop like New Web software.

Complete List of added Software packages.

amarok-1.4.10-i486-3.lzm
at-3.1.10-i486-1.lzm
bsd-games-2.13-i486-8.lzm
codecs-essential-20071007.lzm
elinks-0.11.lzm
emacs-22.3-i486-2.lzm
fluxbox-1.1.1-i486-1.lzm
fvwm-2.4.20-i486-1.lzm
gimp-2.4.7-i486-1.lzm
irssi-0.8.14-i486-1.lzm
kdeaccessibility-3.5.10-i486-2.lzm
kdeaddons-3.5.10-i486-2.lzm
kdeadmin-3.5.10-i486-4.lzm
kdeartwork-3.5.10-i486-2.lzm
kdebindings-3.5.10-i486-2.lzm
kdeedu-3.5.10-i486-2.lzm
kdegames-3.5.10-i486-2.lzm
kdegraphics-3.5.10-i486-2.lzm
kdemultimedia-3.5.10-i486-2.lzm
kdenetwork-3.5.10-i486-2.lzm
kdepim-3.5.10-i486-4.lzm
kdesdk-3.5.10-i486-3.lzm
kdetoys-3.5.10-i486-2.lzm
kdeutils-3.5.10-i486-2.lzm
kdevelop-3.5.3-i486-3.lzm
kdewebdev-3.5.10-i486-2.lzm
kdm-fix-s6.lzm
knemo-0.4.8-i486-2.lzm
koffice-1.6.3-i486-7.lzm
krusader-1.90.0.lzm
lynx-2.8.6rel.5-i486-1.lzm
mc-4.6.1_20070623p14-i486-2.lzm
mpg321-0.2.10-i486-2.lzm
nano-2.0.9-i486-1.lzm
screen-4.0.3-i486-1.lzm
sudo-1.6.8p12-i486-1.lzm
wine-1.1.22-i486-mt.lzm
wireless-tools-29-i486-4.lzm
wlassistant-0.5.7.lzm
wpa_supplicant-0.5.10-i486-1.lzm
xchat-2.8.6-i486-2.lzm
xine-lib-1.1.15-i686-1.lzm
xpaint-2.7.8.1-i486-2.lzm
xscreensaver-5.07-i486-2.lzm
yakuake-2.8.1-i486-2mfb.lzm

Added Web software
Firefox 8.0 Mozilla
Thunderbird 8.0
Mozilla Seamonkey 2.4.1
Opera Web Browser 11.52
Adobe Flashplayer 11

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Live Rooting

Why can't I edit this post? Every other blogpost in my archive has an edit button.

Well, I'll post later. I've got more to say about making a custom Slax. It's not that hard, and it's a happy coincidence that the most customizable live CD I know combines KDE3 and Slackware, which is a great combination for everyday desktop stuff that some folks think needs to be preserved.

By request I'm adding some packages to enable wireless internet, but since I've never used wireless internet, I can only add the software. Please test it and let me know if there's anything missing.

My favorite way of running KIARA (or I guess I should say "SLAX") is to run the system according to the "always fresh" option. I edited the boot menu to make that the default. Whatever the medium that you boot the Slax/Kiara system from, the system itself doesn't retain any new data, which makes it as secure as a read only CD.

So I'll mount an ext3 partition on my hardrive as /home (Slax doesn't read ext4 by default) and create (or REcreate) a normal user account with adduser, and THAT gives me a place to store my files and configuration data, while anything that compromises the system files can be removed with a reboot.

A read-only / partition, and a read-write /home partition. I'm sure I didn't invent this, but I needed to call it something and so I call it live-rooting. In theory it's a way to help make running legacy software like Slackware 12.2 with KDE 3.5.10 secure and stable. Secure because the system files can always be recreated by rebooting, stable because we already know KDE3 runs great on slackware 12.2, and nothing from outside needs to be brought in to mess with success.

Live rooting, using live media with complete hermetically sealed operating systems, might be a way for users to continue to use their KDE3s and Gnome2s indefinitely, if that's what they want, without the need to depend on huge quixotic forkng projects like Trinity. And it may be a way to make mission systems EXTRA secure.

Or so goes the theory. I'm not someone who knows enough to be sure of this. If I'm right, I'd love for someone to tell me, and if I'm wrong, I NEED for someone to tell me.

I recently used the boot install script to install KIARA to a FAT32 partition, so that it ran from the hard drive like it would run from a thumb drive, with the "always fresh" default, and it was the fastest, most robust, most responsive KDE Desktop I'd seen in a dog's age. Thanks, again Patrick Slackware and Tomas Slax!

So you will need to re-create

So you will need to re-create this every time there's a Firefox update? And the user needs to download it with the same frequency? Oh boy ... Smile

What do you mean by "recreate"?

I've been doing this for about two and a half years, with a year off when I tried to live with KDE4.

I boot my Kiara thumb drive, I edit three or four files, I add new wallpaper to make it fancy, I run a shell script to make a new iso image, and then i upload the image. It shouldn't take more than an hour and a half, though sometimes things go wrong. Things went bad in a big way last night because I was almost finished uploading when I remembered that I'd promised someone to add wireless software.

From a security standpoint, I don't know why it would be necessary for a live CD user to always have the very latest browser, but they can if they want to. And if they do, I don't think downloading and burning a CD is a big deal. It's something that I can offer that no one else is offering. Slax 6.1.2 comes with Firefox 3.5 or something. If I may say so, I think that's a little too old.

Of course, anyone can run Kiara from a flash drive and replace the browsers manually, just like I did.

To put it another way. KDE3.5+Firefox 8 = I get off!

Still the greatest Desktop Environment of all Time, and with the web browsers up to date I can only think of one obscure feature (in Gimp) that ever I miss when running a system that is essentially Slackware 12.2. With the web browsers up to date KDE3 doesn't seem old and dead at all. This must be what it's like for some people to drive a 57 Chevy, tuned up and running like new. Honestly, I don't use this all the time, there's all this video editing software I need. But I'm going to love keeping it up to date for a long time to come.

No, you don't have to download every release, but you can, and I recommend it. But that's only because I get off. No other reason.

Mind you, this is not to diss KDE4. Honestly, the worst thing you can say about KDE4 is that it's the second greatest desktop of all time.

More in Tux Machines

Proxmox VE 4.3 released

Proxmox Server Solutions GmbH today announced the general availability of Proxmox Virtual Environment 4.3. The hyper-converged open source server virtualization solution enables users to create and manage LXC containers and KVM virtual machines on the same host, and makes it easy to set up highly available clusters as well as to manage network and storage via an integrated web-based management interface. The new version of Proxmox VE 4.3 comes with a completely new comprehensive reference documentation. The new docu framework allows a global as well as contextual help function. Proxmox users can access and download the technical documentation via the central help-button (available in various formats like html, pdf and epub). A main asset of the new documentation is that it is always version specific to the current user’s software version. Opposed to the global help, the contextual help-button shows the user the documentation part he currently needs. Read more

Games for GNU/Linux

Security News

  • Tuesday's security updates
  • New Open Source Linux Ransomware Divides Infosec Community
    Following our investigation into this matter, and seeing the vitriol-filled reaction from some people in the infosec community, Zaitsev has told Softpedia that he decided to remove the project from GitHub, shortly after this article's publication. The original, unedited article is below.
  • Fax machines' custom Linux allows dial-up hack
    Party like it's 1999, phreakers: a bug in Epson multifunction printer firmware creates a vector to networks that don't have their own Internet connection. The exploit requirements are that an attacker can trick the victim into installing malicious firmware, and that the victim is using the device's fax line. The firmware is custom Linux, giving the printers a familiar networking environment for bad actors looking to exploit the fax line as an attack vector. Once they're in that ancient environment, it's possible to then move onto the network to which the the printer's connected. Yves-Noel Weweler, Ralf Spenneberg and Hendrik Schwartke of Open Source Training in Germany discovered the bug, which occurs because Epson WorkForce multifunction printers don't demand signed firmware images.
  • Google just saved the journalist who was hit by a 'record' cyberattack
    Google just stepped in with its massive server infrastructure to run interference for journalist Brian Krebs. Last week, Krebs' site, Krebs On Security, was hit by a massive distributed denial-of-service (DDoS) attack that took it offline, the likes of which was a "record" that was nearly double the traffic his host Akamai had previously seen in cyberattacks. Now just days later, Krebs is back online behind the protection of Google, which offers a little-known program called Project Shield to help protect independent journalists and activists' websites from censorship. And in the case of Krebs, the DDoS attack was certainly that: The attempt to take his site down was in response to his recent reporting on a website called vDOS, a service allegedly created by two Israeli men that would carry out cyberattacks on behalf of paying customers.
  • Krebs DDoS aftermath: industry in shock at size, depth and complexity of attack
    “This attack didn’t stop, it came in wave after wave, hundreds of millions of packets per second,” says Josh Shaul, Akamai’s vice president of product management, when Techworld spoke to him. “This was different from anything we’ve ever seen before in our history of DDoS attacks. They hit our systems pretty hard.” Clearly still a bit stunned, Shaul describes the Krebs DDoS as unprecedented. Unlike previous large DDoS attacks such as the infamous one carried out on cyber-campaign group Spamhaus in 2013, this one did not use fancy amplification or reflection to muster its traffic. It was straight packet assault from the old school.
  • iOS 10 makes it easier to crack iPhone back-ups, says security firm
    INSECURITY FIRM Elcomsoft has measured the security of iOS 10 and found that the software is easier to hack than ever before. Elcomsoft is not doing Apple any favours here. The fruity firm has just launched the iPhone 7, which has as many problems as it has good things. Of course, there are no circumstances when vulnerable software is a good thing, but when you have just launched that version of the software, it is really bad timing. Don't hate the player, though, as this is what Elcomsoft, and what Apple, are supposed to be doing right. "We discovered a major security flaw in the iOS 10 back-up protection mechanism. This security flaw allowed us to develop a new attack that is able to bypass certain security checks when enumerating passwords protecting local (iTunes) back-ups made by iOS 10 devices," said Elcomsoft's Oleg Afonin in a blog post.
  • After Tesla: why cybersecurity is central to the car industry's future
    The news that a Tesla car was hacked from 12 miles away tells us that the explosive growth in automotive connectivity may be rapidly outpacing automotive security. This story is illustrative of two persistent problems afflicting many connected industries: the continuing proliferation of vulnerabilities in new software, and the misguided view that cybersecurity is separate from concept, design, engineering and production. This leads to a ‘fire brigade approach’ to cybersecurity where security is not baked in at the design stage for either hardware or software but added in after vulnerabilities are discovered by cybersecurity specialists once the product is already on the market.

Ofcom blesses Linux-powered, open source DIY radio ‘revolution’

Small scale DAB radio was (quite literally) conceived in an Ofcom engineer’s garden shed in Brighton, on a Raspberry Pi, running a full open source stack, in his spare time. Four years later, Ofcom has given the thumbs up to small scale DAB after concluding that trials in 10 UK cities were judged to be a hit. We gave you an exclusive glimpse into the trials last year, where you could compare the specialised proprietary encoders with the Raspberry Pi-powered encoders. “We believe that there is a significant level of demand from smaller radio stations for small scale DAB, and that a wider roll-out of additional small scale services into more geographic areas would be both technically possible and commercially sustainable,” notes Ofcom. Read more