Language Selection

English French German Italian Portuguese Spanish

SUSE

OpenSUSE 13.2 supercharged with smoother setup, system snapshots, Btrfs, and more

Filed under
SUSE

OpenSUSE 13.2 was released a week ago. As with the recent Fedora update, the latest release of openSUSE took a year to develop instead of the standard six months as the organization retooled its development practices.

SUSE Linux has now been around for over 20 years, and it’s still going strong. As usual, the latest release serves as a foundation for developing Novell’s SUSE Linux Enterprise and brings some significant new improvements. So let’s dive right in!

Read more

Also: What to expect from Btrfs on openSUSE 13.2?

Installing openSuSE, Fedora and Ubuntu on my new Acer Aspire E11

Filed under
GNU
Linux
SUSE
Ubuntu

Because this is a UEFI Firmware system, the first step is to wrestle with with BIOS and UEFI configuration. Every OEM is different in this area, and sometimes even different models from the same OEM are different. The critical questions are:

How to UEFI boot from a USB stick
How to (optionally) disable UEFI Secure Boot
How to (optionally) enable Legacy Boot (MBR)
Will changes to the UEFI boot configuration be retained

I know from experience with previous Acer systems that there are two things you have to do in the BIOS to prepare for Linux installation. FIrst, you have to change the "F12 Boot Menu" option to 'Enable', so that that you can press F12 during startup and get to the Boot Select menu.

Second, if you want/need to change the UEFI boot settings, you will first have to set a "Supervisor Password" in the BIOS configuration. Once the password is set, you can disable Secure Boot and/or enable Legacy Boot as necessary.

[...]

After the installation process completed, and before I rebooted, I checked the UEFI boot configuration (efibootmgr -v). It was correct, with "opensuse-secureboot" defined and first in the boot sequence list. But then I rebooted and... it booted Windows. ARRRRGGGHHHH! NO! Acer doesn't do this kind of garbage, HP/Compaq does! I have two or three other Acer laptops around here, and the boot configuration is perfectly stable on them!

I rebooted and used F12 to get Boot Select, then selected openSuSE from there, and it came up ok. Then I checked the boot configuration again. Sure enough, the boot order had been changed back to have Windows Boot Manager first. Swine...

I rebooted again, and this time went into BIOS setup (F2). On the 'Boot' page, there is a 'Boot priority order' list, and "Windows Boot Manager" was right at the top of that list. There was nothing about "openSuSE" in the list, but there was a strange new entry for "HDD: WDE WD5000LPVX-22VOTTO", which is absolutely as clear as mud... I didn't recall seeing that entry when I was in the Boot menu the first time. I moved that item to the top of the priority list, crossed my fingers and rebooted.

Read more

New Kernel Live Patching Combines kGraft & Kpatch

Filed under
Linux
SUSE

Back in February SUSE unveiled a new means of live Linux kernel patching, kGraft, compared to the existing Ksplice. One month later, Red Hat unveiled their own solution that happened to be under development at the same time, Kpatch. Since both of them have been out, both have pursued mainline interests but neither one accepted upstream yet. Now a new live kernel patching solution is out that tries to take the best of both worlds.

Read more

openSUSE 13.2: green light to freedom!

Filed under
SUSE

This is the first release after the change in the openSUSE development mode, with a much shorter stabilization phase thanks to the extensive testing done in a daily basis in the rolling distribution used now as a base for openSUSE stable releases. The perfect balance between innovation and stability with the great level of freedom of choice that openSUSE users are used to.

Read more

Ubuntu & SUSE & CentOS, Oh My!

Filed under
Red Hat
SUSE
Ubuntu

It's Halloween week, and the big names in Linux are determined not to disappoint the trick-or-treaters. No less than three mainline distributions have released new versions this week, led by perennially-loved-and-hated crowd favourite Ubuntu.

Ubuntu 14.10, better-known by its nom de womb "Utopic Unicorn", hit the streets last Thursday. It appears to be a mostly update release, with more of the release announcement's ink devoted to parent-company Canonical's "Canonical Distribution of Ubuntu Openstack" than to Utopic's "latest and greatest open source technologies". Among those, the v3.16 kernel has been included, as well as updated versions of GTK, Qt, Firefox, LibreOffice, Juju, Docker, MAAS, and of course, Unity. Full details can be found in the official release notes.

Read more

Systemd, but no journald, in new SUSE release

Filed under
SUSE

Since version 11 came out, there have been three updates - what SUSE calls service packs - in June 2010, February 2012 and January 2013.

One major change is the introduction of systemd as the default init system. However, SUSE has chosen not to include journald, the new system logging method.

Matthias Eckermann, senior product manager at SUSE, told iTWire in response to a query: "We have done a thorough review of all INIT systems about three years ago. Despite the negative sentiment in the open source community, our evaluation back then has shown that systemd is the most promising approach going forward.

Read more

Was ist das? Eine neue Suse Linux Enterprise? Ausgezeichnet!

Filed under
SUSE

Suse has kicked out a new version of its enterprise-grade commercial Linux distribution, Suse Linux Enterprise 12, more than five years after the last major-version release.

Read more

SUSE Linux Enterprise 12 Debuts With 'Rock-Solid' Cloud Support

Filed under
SUSE

After more than five years of development, SUSE on Monday rolled out SUSE Linux Enterprise 12, a brand-new version of the enterprise-class edition of its popular Linux platform. Built for reliability, scalability and security, the new release is designed to help companies efficiently deploy and manage highly available IT services in physical, virtual or cloud infrastructures.

SUSE Linux Enterprise 12 serves as the foundation for all SUSE data center operating systems and extensions. New operating systems and software extensions based on it include SUSE Linux Enterprise Server for x86_64, IBM Power Systems and IBM System z; SUSE Linux Enterprise High Availability Extension and Geo Clustering for SUSE Linux Enterprise High Availability Extension; SUSE Linux Enterprise Virtual Machine Driver Pack; and SUSE Linux Enterprise Desktop and SUSE Linux Enterprise Workstation Extension.

Read more

openSUSE Factory to merge with Tumbleweed

Filed under
SUSE

As a long-time openSUSE I wondered about the future of Factory and Tumbleweed when the project announced Factory’s evolution as an independent rolling release of the distribution.

Tumbleweed maintainer and the lead Linux kernel developer Greg Kroah-Hartman was not very positive about the future of Tumbleweed, which was considered to be a ‘kind-of’ rolling release version.

Back then Ludwig Nussel of openSUSE told me, “The new Factory is not here to replace Tumbleweed. Both rolling distributions accomplish different goals. The Tumbleweed initiative provides rolling updates of selected packages (~10% of the packages in Factory) on top of the most recent openSUSE released version. Tumbleweed therefore always has openSUSE releases as base. Factory on the other hand is a full rolling distribution where all packages, even core ones are continuously updated and rebuilt.”

Read more

Tumbleweed, Factory rolling releases to merge

Filed under
SUSE

“With the release of openSUSE 13.2 due in November, we realised this was a perfect opportunity to merge our two openSUSE rolling-releases together so users of Tumbleweed can benefit from the developments to our Factory development process over the last few years,” said Richard Brown, Chairman of openSUSE board. “The combined feedback and contributions from our combined Tumbleweed and Factory users should help keep openSUSE rolling forward even faster, while offering our users the latest and greatest applications on a stable rolling release.”

Read more

Syndicate content

More in Tux Machines

Leftovers: OSS

Security Leftovers

  • Security updates for Thursday
  • OpenSSL patches two high-severity flaws
    OpenSSL has released versions 1.0.2h and 1.0.1t of its open source cryptographic library, fixing multiple security vulnerabilities that can lead to traffic being decrypted, denial-of-service attacks, and arbitrary code execution. One of the high-severity vulnerabilities is actually a hybrid of two low-risk bugs and can cause OpenSSL to crash.
  • Linux Foundation Advances Security Efforts via Badging Program
    The Linux Foundation Core Infrastructure Initiative's badging program matures, as the first projects to achieve security badges are announced.
  • Linux Foundation tackles open source security with new badge program
  • WordPress Plugin ‘Ninja Forms’ Security Vulnerability
    FOSS Force has just learned from Wordfence, a security company that focuses on the open source WordPress content management platform, that a popular plugin used by over 500,000 sites, Ninja Forms, contains serious security vulnerabilities.
  • Preparing Your Network for the IoT Revolution
    While there is no denying that IP-based connectivity continues to become more and more pervasive, this is not a fundamentally new thing. What is new is the target audience is changing and connectivity is becoming much more personal. It’s no longer limited to high end technology consumers (watches and drones) but rather, it is showing up in nearly everything from children’s toys to kitchen appliances (yes again) and media devices. The purchasers of these new technology-enabled products are far from security experts, or even security aware. Their primary purchasing requirements are ease of use.
  • regarding embargoes
    Yesterday I jumped the gun committing some patches to LibreSSL. We receive advance copies of the advisory and patches so that when the new OpenSSL ships, we’re ready to ship as well. Between the time we receive advance notice and the public release, we’re supposed to keep this information confidential. This is the embargo. During the embargo time we get patches lined up and a source tree for each cvs branch in a precommit state. Then we wait with our fingers on the trigger. What happened yesterday was I woke up to a couple OpenBSD developers talking about the EBCDIC CVE. Oh, it’s public already? Check the OpenSSL git repo and sure enough, there are a bunch of commits for embargoed issues. Pull the trigger! Pull the trigger! Launch the missiles! Alas, we didn’t look closely enough at the exact issues fixed and had missed the fact that only low severity issues had been made public. The high severity issues were still secret. We were too hasty.
  • Medical Equipment Crashes During Heart Procedure Because of Antivirus Scan [Ed: Windows]
    A critical medical equipment crashed during a heart procedure due to a timely scan triggered by the antivirus software installed on the PC to which the said device was sending data for logging and monitoring.
  • Hotel sector faces cybercrime surge as data breaches start to bite
    Since 2014, things have become a lot more serious with a cross section of mostly US hotels suffering major breaches during Point-of-Sale (POS) terminals. Panda Security lists a string of attacks on big brands including on Trump Hotels, Hilton Worldwide, Hyatt, Starwood, Rosen Hotels & Resorts as well two separate attacks on hotel management outfit White Lodging and another on non-US hotel Mandarin Oriental.

Android Leftovers

today's howtos