Language Selection

English French German Italian Portuguese Spanish

A Short Trip Down Memory Lane

Filed under
Linux

Back in 2006, I was a fresh-faced new GNU/Linux adventurer.

About a year after my first install of Ubuntu, I posted THIS at Scot’s Newsletter Forums, a site which has since become my second home. Some of my opinions have changed since then. For instance, I don’t use KDE anymore (not since 3.5). I also don’t care for Google too much these days, not since they’ve started showing their greedy fangs… “Do no evil” Pffffft! Yeah, right. Anywho…

Relatively quickly I settled on Slackware as my primary operating system. My GNU/Linux mentor, Bruno Knaapen, once predicted that I would end up with Slackware because I definitely had the Slacker attitude. Miss you, Bruno, old friend. He called that one right. I run Slackware as my primary and Arch Linux as my secondary (backup) OS on my main system. I also run Slack on my laptop and my shop systems.

Rest here




The Nocturnal Slacker

I read the Nocturnal Slacker's article yesterday and found it interesting because his journey from Windows to Gnu/Linux and onward was very similar to my own. So, I posted a short comment, telling bits of my 'Trip Down Memory Lane'. At the end I also mentioned that I had encountered a glitch on his wordpress site and asked him why he was using so many buttons on his pages. But none of this ever appeared in the comments section below the article. It was pre-moderated, suppressed, censored, call it what you like, and I am wondering who does Eric Layton think he is to supresses other people's comments at will? Are there no values, no ethics anywhere these days?

The following is the original text I posted yesterday on the "Nocturnal Slacker v1.0" web site. See for yourself just how offensive it is ...

Very interesting. My reasons to move to GNU/Linux were the same as yours. If I hadn't been so complacent and lazy I would have made that move years earlier (my first experiments with Suse and Mandrake were in the late 90s) but XP was just too damn convenient. In the beginning (2004) I was just as promiscuous as you were. But after some time I settled on Debian and haven't changed since, despite the lure of Ubuntu. Of course I'm still curious and I try out the live images of new and promising looking distros. Although Slackware proper was never really my cup of tea I do find Salix excellent. Occasionally, very rarely, I feel a whiff of nostalgia for pre 2004 times, as happened a few days ago when a friend told me that she's processing all her photos in IrfanView. This reminded me of the applications I used to use then ... IrfanView, Notepad2, the 1by1 audio player, XMplay etc. But apart from this I have never looked back. Vista, Win7, Win8, ... are as alien to me now as Apple has always been.

P.S.:
Accessing your page was extremely sluggish because "www.sharingbuttons.org" just wouldn't load for minutes. Only after I put that URL into my hosts file and reloaded your page could I scroll and read your whole article. You say you don't care for Google, but I'm wondering ... do you really need all these silly buttons? Don't you think Facebook is just as bad, if not worse?

I did reply to you there, my

I did reply to you there, my friend. I have to screen comments because of SPAM, unfortunately. The delay before the comments appear is due to... well, the fact that I was sleeping when you posted your comment. I receive email notifications of new comments from my blog every 15 minutes, but I have to be awake and online to receive them. I'm sorry that the delay annoyed you.

I do appreciate your (and everyone's) comments on my articles. They are a very important part of my blogging process. Feedback is important. It lets a writer know whether or not he/she is actually helping/entertaining his/her readers in some way. I write for personal gratification that I get from helping folks in the GNU/Linux/Internet community. I'm not a paid writer.

I also answered your query regarding the sharing buttons on my blog.

Thanks for reading and commenting (here and there). I hope you will stop by again. Smile

~Eric

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

LMMS Guide Part 1: Creating Simple Melodies Using Sounds And Instruments

​LMMS stands for Linux Multimedia Studio. It is a very good open-source program that is used to create music tracks using sound files, predefined instruments, and sound effects. LMMS has versions for Windows and macOS in addition to Linux. Their website, of course, lists all of their features offered to users. This article will attempt to provide practical guides and tips for composing songs using LMMS. Read
more

How To Create Shell Scripts

Having to type the same command over and over again can be a daunting task and tiresome for that matter. The shell scripts are really easy to create and run saving you from a lot of misery and anguish if you really prefer using the terminal over using the GUI for running tasks. Read
more

Today in Techrights

Security Leftovers

  • Thousands of FedEx customers' private info exposed in legacy server data breach

    Uncovered by Kromtech Security Center, the parent company of MacKeeper Security, the breach exposed data such as passport information, driver's licenses and other high profile security IDs, all of which were hosted on a password-less Amazon S3 storage server.

  • Correlated Cryptojacking

    they include The City University of New York (cuny.edu), Uncle Sam's court information portal (uscourts.gov), Lund University (lu.se), the UK's Student Loans Company (slc.co.uk), privacy watchdog The Information Commissioner's Office (ico.org.uk) and the Financial Ombudsman Service (financial-ombudsman.org.uk), plus a shedload of other .gov.uk and .gov.au sites, UK NHS services, and other organizations across the globe.

    Manchester.gov.uk, NHSinform.scot, agriculture.gov.ie, Croydon.gov.uk, ouh.nhs.uk, legislation.qld.gov.au, the list goes on.

  • Facebook using 2FA cell numbers for spam, replies get posted to the platform

    Replies ending up as comments appears to be a bizarre bug, but the spamming seems intentional.

  • Swedish Police website hacked [sic] to mine cryptocurrency

    Remember now, it is a Police Force that allowed their website to be hijacked by this simple attack vector. The authority assigned to serve and protect. More specifically, the authority that argues that wiretapping is totally safe because the Police is competent in IT security matters, so there’s no risk whatsoever your data will leak or be mishandled.

    This is one of the websites that were trivially hacked [sic].

    It gives pause for thought.

    It also tells you what you already knew: authorities can’t even keep their own dirtiest laundry under wraps, so the notion that they’re capable or even willing to protect your sensitive data is hogwash of the highest order.

  • New EU Privacy Law May Weaken Security

    In a bid to help domain registrars comply with the GDPR regulations, ICANN has floated several proposals, all of which would redact some of the registrant data from WHOIS records. Its mildest proposal would remove the registrant’s name, email, and phone number, while allowing self-certified 3rd parties to request access to said data at the approval of a higher authority — such as the registrar used to register the domain name.

    The most restrictive proposal would remove all registrant data from public WHOIS records, and would require legal due process (such as a subpoena or court order) to reveal any information supplied by the domain registrant.

  • Intel hit with 32 lawsuits over security flaws

    Intel Corp said on Friday shareholders and customers had filed 32 class action lawsuits against the company in connection with recently-disclosed security flaws in its microchips.

  • The Risks of "Responsible Encryption"

    Federal law enforcement officials in the United States have recently renewed their periodic demands for legislation to regulate encryption. While they offer few technical specifics, their general proposal—that vendors must retain the ability to decrypt for law enforcement the devices they manufacture or communications their services transmit—presents intractable problems that would-be regulators must not ignore.

  • Reviewing SSH Mastery 2nd Ed

    It’s finally out ! Michael W Lucas is one of the best authors of technical books out there. I was curious about this new edition. It is not a reference book, but covers the practical aspects of SSH that I wish everybody knew. Rather than aggregating different articles/blogs on SSH, this book covers 90% of the common use cases for SSH that you will ever encounter.