Language Selection

English French German Italian Portuguese Spanish

Tails 2.0 Linux Distro Improves Installation, Gets New Look

Filed under
Linux

Tails—an acronym for The Amnesic Incognito Live System—first rose to notoriety in 2013 as the Linux distribution used by U.S. National Security Agency (NSA) whistleblower Edward Snowden. Since the debut of Tails 1.0 on April 29, 2014, there haven't been any major new releases of the Linux distribution—until Jan. 26, when Tails 2.0 debuted. Tails is a desktop Linux distribution whose goal is to help users stay private on the Internet, by way of multiple tools, including the use of Tor, The Onion Router network. With Tails 2.0, the big change comes by way of rebasing the distribution on the Debian 8.0 (code-named Jessie) Linux operating system, which provides new software packages. Users also will immediately notice that Tails 2.0 now makes use of the GNOME Shell desktop user interface, providing both a top-down menu and an activities window for desktop navigation. While Tails 2.0 boasts a new look, it is also now losing one of its past capabilities, which is the ability to look like a Windows desktop in what is known as Windows Camouflage mode. In this slide show, eWEEK examines key features of the Tails 2.0 release.

Read more

More in Tux Machines

Open source Linux-on-Zynq SBC debuts new FPGA add-on standard

Opal Kelly’s “SYZYGY Brain-1” SBC, which runs Linux on a Zynq-7012S, is a proof of concept for its SYZYGY standard for FPGA-driven peripherals. FPGA development firm Opal Kelly has gone to Crowd Supply to launch a development board to showcase its SYZYGY standard for FPGA peripheral expansion. SYZYGY bridges the gap between Digilent’s low-speed Pmod connector and the higher-end VITA 57.1 FMC (FPGA Mezzanine Card) standard. The open source, 110 x 75mm SYZYGY Brain-1 SBC runs Linux on a Xilinx Zynq-7012S SoC, a member of the FPGA-enabled Zynq-7000S family, which offers single Cortex-A9 cores instead of dual dual cores on the Zynq-7000 series. Read more

Why Linux can make you feel thankful or merely stuffed

There are many reasons why I came to appreciate Unix and then Linux and why they became such an important part of my life. These operating systems provided a focus and a career specialty that I've greatly enjoyed. I appreciate Linus Torvalds and the many thousands of developers who have contributed their time and energy into building a powerful, efficient and enjoyable operating system. I appreciate the many tools and commands that make them so easy to use and get my work done. And I appreciate the chances that I've had to share what I've learned with so many others. It's been fun, and it's been very rewarding. Read more

Ubuntu-Based ExLight Linux OS Is One of the Few to Use Latest Enlightenment 0.22

ExLight Build 171121 replaces last week's Build 171112, which used the older Enlightenment 0.20 desktop from the Ubuntu 17.10 (Artful Aardvark) software repositories, to update Enlightenment to the latest 0.22 release that the developer compiled from sources. This makes ExLight one of few distros to use Enlightenment 0.22. "Version 171112 uses Enlightenment 0.20 installed from Ubuntu’s repositories. Build 171121 of ExLight uses Enlightenment 0.22 installed by me from source," said the developer in the release announcement. "Only two Linux distributions in the whole wide world (besides ExLight) use Enlightenment 0.22 as desktop environment." Read more

Ubuntu 17.10 Users Get Major Kernel Update, 20 Security Vulnerabilities Patched

If you're using the latest Ubuntu 17.10 (Artful Aardvark) operating system on your personal computer, you should know that it received it's first major kernel update since the official release back in October 19, 2017. The update addresses a total of 20 security vulnerabilities for Ubuntu 17.10's Linux 4.13 kernel packages, including the Raspberry Pi 2 one. Among the security issues patched in this update, five are related to Linux kernel's USB subsystem, including a use-after-free vulnerability, which could allow a physically proximate attacker to crash the affected system by causing a denial of service (DoS attack) or possibly execute arbitrary code. Other three are related to the ALSA subsystem, including a race condition. Read more