Language Selection

English French German Italian Portuguese Spanish

openSuSE 12.1 Released

Filed under
SUSE

It has been a long development cycle, with a lot of very hard work by the developers. In my opinion, the developers hard work has really paid off, this is an excellent release. It is available in KDE and Gnome3 LiveCD/USB images, and a (very large) DVD installer image, in 32-bit (i686) and 64-bit (x86_64) versions. If you want something other than a KDE or Gnome desktop, you can install from the DVD distribution, and get the latest Xfce or LXDE desktop. I have installed the KDE version on my laptop at home, and on several netbooks, and the Gnome version on another netbook, and it all went very smoothly.

The first thing to say about installation is that I don't think openSuSE gets enough credit for the speed and quality of their installer. It is nicely designed, it doesn't natter at you about a lot of unnecessary information, and when it gets down to the actual work of doing the installation, it is amazingly fast. I would estimate it at about 5 minutes to walk through the installer and answer the questions (considerably less for experienced users), 5-10 minutes to actually copy the live system to disk and boot it, and 5 minutes for the first boot and configuration of the installed system. Add a bit to that for the download of the ISO image (depends on the speed of your Internet connection, probably something between 2 and 5 minutes), and a few minutes to either burn a CD or copy to USB stick, and you can realistically expect to spend about 30 minutes getting openSuSE installed and running. That's pretty impressive.

The standard KDE 4.7 desktop is pretty familiar by now. Here it is, with the application menu open:

Rest ehre




More in Tux Machines

8 Linux Security Improvements In 8 Years

At a time when faith in open source code has been rocked by an outbreak of attacks based on the Shellshock and Heartbleed vulnerabilities, it's time to revisit what we know about Linux security. Linux is so widely used in enterprise IT, and deep inside Internet apps and operations, that any surprises related to Linux security would have painful ramifications. In 2007, Andrew Morton, a no-nonsense colleague of Linus Torvalds known as the "colonel of the kernel," called for developers to spend time removing defects and vulnerabilities. "I would like to see people spend more time fixing bugs and less time on new features. That's my personal opinion," he said in an interview at the time. Read more

Linux from Square One

Despite the fact I have a different view of which distros are best for kids — Qimo (pronounced “kim-o,” as in the last part of eskimo, not “chemo”) tops the list, as it should, but the French distro Doudou (add your own joke here) is unfortunately left out — the link there is informative. So for those who are just getting their proverbial feet wet in Linux, this is a godsend. Read more

Explaining Security Lingo

This post is aimed to clarify certain terms often used in the security community. Let’s start with the easiest one: vulnerability. A vulnerability is a flaw in a selected system that allows an attacker to compromise the security of that particular system. The consequence of such a compromise can impact the confidentiality, integrity, or availability of the attacked system (these three aspects are also the base metrics of the CVSS v2 scoring system that are used to rate vulnerabilities). ISO/IEC 27000, IETF RFC 2828, NIST, and others have very specific definitions of the term vulnerability, each differing slightly. A vulnerability’s attack vector is the actual method of using the discovered flaw to cause harm to the affected software; it can be thought of as the entry point to the system or application. A vulnerability without an attack vector is normally not assigned a CVE number. Read more

​EMC partners with Canonical, Mirantis, and Red Hat for OpenStack

Do you want to use OpenStack, but you're afraid of the headaches of getting its architecture just right? Well, EMC is here to help with OpenStack reference architectures for three leading OpenStack vendors: Canonical, Mirantis, and Red Hat. Read more