Language Selection

English French German Italian Portuguese Spanish

SUSE Linux 10.1 Final Report

Filed under
Reviews
SUSE
-s

XGL

XGL has been available for 10.1 from early in the development cycle. At first packages required separate downloading and individual installation. Later on they became available on the install disks. Novell had published a guide to setup XGL on their system, but my testing on several developmental versions failed. Others had better luck. Towards the end of April Novell published a newer more complete XGL configuration guide here and this release, I had much better luck. This guide is step by step, copy & paste, complete and accurate enough that anyone can have XGL on their nice shiny new system. As some of the instructions are to be executed from outside of X, I made a little file that could be easily cat'd from the terminal. In addition, I issued the gpm command in order to facilitate copy and paste. For me the command was gpm -m /dev/input/mice -t imps2

    

As you might notice, Novell has included instructions for setting up XGL on both the Gnome and KDE desktops. This is an exciting advancement as most distros that include XGL, do so only for Gnome. As KDE is my desktop of choice, this was very welcome. As stated, I just followed the instruction on the above linked site and XGL functioned fairly well. The KDE configuration required just the making of a .desktop file for the Autostart folder over the general system-wide setup. I did have to do a hard reboot in order to get X to restart and some of the listed commands didn't work, but many did. Those that worked include rotating the cube by mouse or keyboard, tilting and rotating by mouse, warping windows, animated menus, translucent window adjustments, and zoom in and out manually.

        

The Gnome configuration was just as easy as the KDE setup. In fact, all the features worked upon starting Gnome anyway and going thru the setup didn't enable any others. I went through their setup instructions for good measure. As stated some of the listed functions didn't work. Some of these include: Scaling, resizing windows, and zoom once. One general XGL feature missing completely was the F12 - arranging and view all of the open windows. This is actually my favorite XGL feature.

        

Conclusion

All in all, SUSE 10.1 rocks. It is solid, stable, and professional. It is feature rich and thus lacks very little. With its new features like AppArmor and XGL, SUSE is ahead of the competition. Missing multimedia support is a major drawback, especially for new window converts. Its Software Manager is still demonstrating minor glitches can be quite annoying. The whole Software Management suite is a bit confusing with the separate modules with overlapping functionality. The kernel is a very new version, but KDE and Gnome are already almost considered outdated with KDE 3.5.1 being used over the 3.5.2 that's been out for a coupla months and similarly for the included Gnome 2.12 verses the latest Gnome 2.1.4. But weighing these few complaints against all the features, stability, and overall look & feel & functionality, SUSE still comes out King of Hill. They are the top of the pyramid and the cream of the crop.

Related Links:


        


some wireless

I just read a report that stated some wireless devices are also broken in 10.1 due to the removal of proprietary drivers. The end-user will now need to supply such drivers themselves, which aren't exactly newbie friendly. Sad

----
You talk the talk, but do you waddle the waddle?

Gaming and Wireless

I've got cedega running and games installed with it. Try adding a line in fstab to mount your cd/dvd device (look at http://www.gentoo.org/doc/en/handbook/handbook-amd64.xml?part=1&chap=8 this is the same regardless of gentoo or amd64). Then just have SuSE ignore disks when you put them into the drive. Cedega's mount function will then work. Note the common mistake that users have not mkdir'ed the mount directory that is listed in fstab.

If you've got an Atheos based wireless card, or any other card as listed by madwifi.org, then get the SuSE 10.1 specific driver rpms and source rpms from http://madwifi.org/suse/.

Another terrific review

Best review yet--thanks!

I'm in process of installing 10.1 on a student workstation in the Computer Science lab at the high school where I teach. Main High School Servers are Novell Netware, so, as a workstation client, I'll be checking OpenSuse's netware connectivity.

Later, I'll be testing OpenSuse as a Local classroom server. Will report back after I work through this process.
Regards,
Gary Frankenbery

Re: Another terrific review

gfranken wrote:

Best review yet--thanks!

Thanks so much for saying. I wondered, as nobody linked to it. Tongue

gfranken wrote:

I'm in process of installing 10.1 ... Will report back after I work through this process.

Yippee! I hope that means what I think it means. Smile

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

OpenELEC 8.0.2 Embedded Linux Entertainment OS Is Out with Mesa 17.0.4, More

The OpenELEC 8.0 open-source embedded Linux entertainment operating system received its second maintenance update, versioned 8.0.2, which fixes various issues reported by users lately and updates some core components. Read more

Red Hat Financial News

  • Red Hat announces latest version of Ansible
  • Red Hat On An Expansion Spree In India
    Red Hat is aggressively expanding its operations in India. The company recently announced the opening of two new offices in Bangalore and New Delhi. With the opening of the new offices, Red Hat is expanding its footprint in India with a goal of supporting interest for open source solutions and services from customers and partners and further promoting the benefits open source solutions can offer enterprises in India. Red Hat now has six offices in India, including additional facilities in Bangalore and New Delhi, and offices in Mumbai and Pune. Red Hat’s new Bangalore office is a 14,000 sq. ft. facility at Lavelle Road. It is designed to act as a training and enablement center for customers and partners. Through the new facility, which features a cafeteria, and space for networking, meetings, training and certification exams, and an indoor game zone, Red Hat aims to bring its open, collaborative culture to life. The additional New Delhi office is a 12,405 sq.ft facility located close to the international airport at Aerocity, designed with an eye toward enabling collaboration with customers throughout the region.
  • Somewhat Positive Press Coverage Very Likely to Affect Red Hat (RHT) Stock Price
  • Red Hat Inc (RHT) Releases Q1 Earnings Guidance

Security Leftovers

  • Security updates for Monday
  • Recursive DNS Server Fingerprint Problem

    Our goal is to identify hijacked resolvers by analyzing their fingerprints, in order to increase safety of Internet users. To do that, we utilize data collected via RIPE Atlas (atlas.ripe.net).

  • Online developer tutorials are spreading XSS and SQL injection flaws

    The researchers, from across three universities in Germany and Trend Micro, checked the PHP code bases of more than 64,000 projects on Github and uncovered more than 100 vulnerabilities that they believe might have been introduced as a result of developers picking up the code that they used from online tutorials.

  • BrickerBot, the permanent denial-of-service botnet, is back with a vengeance

    BrickerBot, the botnet that permanently incapacitates poorly secured Internet of Things devices before they can be conscripted into Internet-crippling denial-of-service armies, is back with a new squadron of foot soldiers armed with a meaner arsenal of weapons.

  • Reproducible Builds: week 104 in Stretch cycle
  • Webroot antivirus goes bananas, starts trashing Windows system files
    Webroot's security tools went berserk today, mislabeling key Microsoft Windows system files as malicious and temporarily removing them – knackering PCs in the process. Not only were people's individual copies of the antivirus suite going haywire, but also business editions and installations run by managed service providers (MSPs), meaning companies and organizations relying on the software were hit by the cockup. Between 1200 and 1500 MST (1800 and 2100 UTC) today, Webroot's gear labeled Windows operating system data as W32.Trojan.Gen – generic-Trojan-infected files, in other words – and moved them into quarantine, rendering affected computers unstable. Files digitally signed by Microsoft were whisked away – but, luckily, not all of them, leaving enough of the OS behind to reboot and restore the quarantined resources.
  • How The Update Framework Improves Security of Software Updates
    Updating software is one of the most important ways to keep users and organizations secure. But how can software be updated securely? That's the challenge that The Update Framework (TUF) aims to solve. Justin Cappos, assistant professor at New York University, detailed how TUF works and what's coming to further improve the secure updating approach in a session at last week's DockerCon 17 conference in Austin, Texas. Simply using HTTPS and Transport Layer Security (TLS) to secure a download isn't enough as there have been many publicly reported instances of software repositories that have been tampered with, Cappos said.
  • Security Updates for Ubuntu Phone to End in June
    Security updates for Ubuntu phone and tablet will end this June, Canonical has confirmed. Current OTA updates are currently limited to critical fixes and security updates — a decision we were first to tell you back in January. But after June 2017 Canonical “will no longer deliver any further updates”.
  • Canonical to stop supporting Ubuntu Phone in June
    Canonical had already announced development of its Ubuntu Phone software was ending. Now we know when the final nail goes in the coffin: June.
  • Malware Hunts And Kills Poorly Secured Internet Of Things Devices Before They Can Be Integrated Into Botnets
    Researchers say they've discovered a new wave of malware with one purpose: to disable poorly secured routers and internet of things devices before they can be compromised and integrated into botnets. We've often noted how internet-of-broken-things devices ("smart" doorbells, fridges, video cameras, etc.) have such flimsy security that they're often hacked and integrated into botnets in just a matter of seconds after being connected to the internet. These devices are then quickly integrated into botnets that have been responsible for some of the worst DDoS attacks we've ever seen (including last October's attack on DYN).

GNOME/GTK News

  • The Way GNOME Handles Wallpapers Really Annoys Me
    I love GNOME Shell — and no, not just because I’ve little choice now that is Ubuntu’s default desktop! But the more I use GNOME the more I learn that the desktop environment, like every other, has its own share of quirks, bugs and inconsistencies. Like the following appreciably niche niggle in the the way GNOME handles desktop wallpapers.
  • Drag-and-drop in lists
    I’ve recently had an occasion to implement reordering of a GtkListBox via drag-and-drop (DND). It was not that complicated. Since I haven’t seen drag-and-drop used much with list boxes, here is a quick summary of what is needed to get the basics working.