Language Selection

English French German Italian Portuguese Spanish

Opera 15.x for Linux Revisited

Filed under
Software

Opera deserves plenty of credit for being accessible to Linux users. The Opera download page provides a long list of Linux distributions for downloading the correct software package. In addition, Opera is almost always up-to-date in the Linux repositories. Google Chrome, in comparison, focuses on the "classic four" - Debian, Ubuntu, Fedora, and openSUSE on their main download page.

I've lauded the Opera browser before and last reviewed the application in June 2012. Admittedly, however, I eventually settled on Chromium in my Linux boxes and Internet Explorer 10 on my Windows 7 machine with Mozilla Firefox as my back-up browser for all my machines. For those who have never tried previous releases of Opera, Opera distinguished itself from other browsers for its heavy focus on features and its unique Presto rendering engine. I've always felt that the old Opera, with its integrated torrent utility, IRC support, and e-mail client, was for power users - which I most certainly am not. Moreover, I had problems with Opera's compatibility with the embarrassingly obscure sites I frequent.

erst ehre

More in Tux Machines

Leftovers: OSS

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux