Language Selection

English French German Italian Portuguese Spanish

Sabayon 8 KDE review

Filed under

Sabayon 8 is the latest version of Sabayon, a part source, part binary, multi-purpose Linux distribution based on Gentoo. This is a distribution that I have often criticized for missing critical components and being very buggy, but the developers seem to have gotten their act together.

Sabayon follows a rolling release development model, which means that once you install a new system, you may never need to re-install – ever. It is a development model I think all distributions should follow.

While the project provides installation images for all known desktop environments, only those for the 32- and 64-bit editions of the K Desktop Environment, GNOME 3, and Xfce, have so far being made available for download. Going by the distribution’s release history, installation images for other (supported) desktop environments should be released soon. This article offers a summary review of Sabayon 8 KDE.

rest here

More in Tux Machines

Leftovers: Software

  • Rblpapi 0.3.5
    A new release of Rblpapi is now on CRAN. Rblpapi provides a direct interface between R and the Bloomberg Terminal via the C++ API provided by Bloomberg Labs (but note that a valid Bloomberg license and installation is required).
  • Flatpak 0.6.13
    These used to take an application id and an optional branch name as two arguments. This meant you could not specify multiple apps to install in a single command. So, instead of having the branch as a separate argument we now support partial references. If you only specify an id we try to match the rest as best we can depending on what is installed/available, but if this matches multiple things you have to specify more details.
  • New features on Hosted Weblate
    Today, new version has been deployed on Hosted Weblate. It brings many long requested features and enhancements.
  • A Wild Desktop Reddit App for Linux Appears
    Reddit is …Well it’s Reddit: there’s little else like it on the internet. Thos of us who use Reddit probably do so a tab, in a browser, because that’s how the site works best. Many desktop Reddit apps exist, but few translate the unique experience of using the service to the desktop in a way that really works.
  • Opera 41 Browser Brings Performance Improvements
    For those still using the Opera web-browser, Opera 41 is now available as the latest stable release and seems primarily focused on performance improvements.
  • Faster and better browsing – Welcome Opera 41
    We all know the feeling. You want to check out your favorite website, but when you open your laptop or turn on your computer, you realize the browser is closed. You click on the browser icon and then have to wait while the browser opens all your previously opened sites… We have a solution for you that makes your browsing faster: Opera 41 includes a new, smarter startup sequence that cuts away almost all the wait time, no matter how many tabs you open on startup.

today's howtos

Security News

  • Tuesday's security updates
  • We Got Phished
    She logged into her account but couldn’t find the document and, with other more urgent emails to deal with, she quickly moved on and put this brief event out of mind. This staff member will henceforth be known as PZ, or “patient zero.” The login page wasn’t really a login page. It was a decoy webpage, designed to look legitimate in order to trick unsuspecting recipients into typing in their private login credentials. Having fallen for the ruse, PZ had effectively handed over her email username and password to an unknown party outside the Exploratorium. This type of attack is known as “phishing.” Much like putting a lure into a lake and waiting to see what bites, a phishing attack puts out phony prompts, such as a fake login page, hoping that unwitting recipients can be manipulated into giving up personal information.
  • DDoS attacks against Dyn the work of 'script kiddies'
    Last week's distributed denial of service attack in the US against domain name services provider Dynamic Network Services are more likely to have been the work of "script kiddies", and not state actors. Security researchers at threat intelligence firm Flashpoint dismissed reports that linked the attack to WikiLeaks, the Russian government or the New World Hackers group. Instead, Flashpoint said, it was "moderately confident" that the Hackforums community was behind the attack which led to well-known sites like Twitter, Spotify, Netflix and Paypal being inaccessible on 21 October (US time).
  • How one rent-a-botnet army of cameras, DVRs caused Internet chaos
    Welcome to the Internet of Evil Things. The attack that disrupted much of the Internet on October 21 is still being teased apart by investigators, but evidence thus far points to multiple "botnets" of Internet-connected gadgets being responsible for blocking access to the Domain Name Service (DNS) infrastructure at DNS provider Dyn. Most of these botnets—coordinated armies of compromised devices that sent malicious network traffic to their targets—were controlled by Mirai, a self-spreading malware for Internet of Things (IoT) devices. in a blog post on the attack, Dyn reported "tens of millions" of devices were involved in the attack But other systems not matching the signature of Mirai were also involved in the coordinated attack on Dyn. "We believe that there might be one or more additional botnets involved in these attacks," Dale Drew, CSO of Level 3 Communications, told Ars. "This could mean that they are 'renting' several different botnets to launch an attack against a specific victim, in which multiple other sites have been impacted." The motive may have been blackmail, since the attacker sought a payout by Dyn to stop. But Drew warned that the huge disruption caused by the attack "could result in large copycat attacks, and [a] higher [number of] victim payouts [so] as to not be impacted in the same way. It could also be a signal that the bad guy is using multiple botnets in order to better avoid detection since they are not orchestrating the attack from a single botnet source."
  • ARM builds up security in the tiniest Internet of Things chips
    IoT is making devices smaller, smarter, and – we hope – safer. It’s not easy to make all those things happen at once, but chips that can help are starting to emerge. On Tuesday at ARM TechCon in Silicon Valley, ARM will introduce processors that are just a fraction of a millimeter across and incorporate the company’s TrustZone technology. TrustZone is hardware-based security built into SoC (system on chip) processors to establish a root of trust. It’s designed to prevent devices from being hacked and taken over by intruders, a danger that’s been in the news since the discovery of the Mirai botnet, which recently took over thousands of IP cameras to mount denial-of-service attacks.
  • Antique Kernel Flaw Opens Door to New Dirty Cow Exploit

Red Hat Open Tech to Run UKCloud’s Enterprise Platform; Radhesh Balakrishnan Comments

Red Hat and public cloud provider UKCloud have forged a partnership to develop an infrastructure-as-a-service cloud platform for the U.K. government’s work to deliver digital services to the public. UKCloud has standardized on Red Hat OpenStack Platform with Red Hat Ceph Storage to handle citizen web applications and government systems in behalf of public sector organizations across industries such as healthcare, defense and police and justice, Red Hat said Monday. Read more