DistroWatch Weekly |
DistroWatch Weekly, Issue 799, 28 January 2019 |
Welcome to this year's 4th issue of DistroWatch Weekly!
Technology moves ever forward and many people find it easier to keep up with software developments in incremental steps rather than in leaps forward. People who like a little change at a time benefit from running rolling release distributions such as KaOS. This week we begin with a look at KaOS, a distribution which focuses on one desktop (KDE Plasma) and one application toolkit (Qt), along with the project's latest developments. We also talk about preparations being made for a new version of Debian and link to refreshed Debian 9 media. Plus we talk about Canonical publishing a version of Ubuntu for embedded devices and link to the details in our News section. Then we talk about a book for people who are interested in penetration testing. The book is called Linux Basics For Hackers and we share thoughts on the book's contents. As usual, we are pleased to share the releases of the past week and list the torrents we are seeding. Next week we will be updating our Major Distributions page and use our Opinion Poll to invite readers to suggest a new project to be added to the overview of major projects. We wish you all a terrific week and happy reading!
Content:
- Review: KaOS 2018.12
- News: Debian 10 freezes while Debian 9 gets a media refresh, Ubuntu publishes IoT release
- Book review: Linux Basics For Hackers
- Released last week: Porteus Kiosk 4.8.0, Parrot 4.5
- Torrent corner: ArchLabs, Archman, AUSTRUMI, ClonOS, Debian, Live Raizo, Nitrux, Parrot, Porteus Kiosk, Robolinux
- Upcoming releases: Tails 3.12
- Opinion poll: Which distro should be listed as a major project?
- New distributions: Abalar Libre, BlueLight, EQuilibrium Level Three
- Reader comments
Listen to the Podcast edition of this week's DistroWatch Weekly in OGG (17MB) and MP3 (12MB) formats.
|
Feature Story (by Jesse Smith) |
KaOS 2018.12
KaOS is an independent desktop Linux distribution that features the latest version of the KDE desktop environment, the Calligra office suite, and other popular software applications that use the Qt toolkit. KaOS employs a rolling-release development model and is built exclusively for 64-bit computer systems.
Some changes have come to the KaOS distribution lately, including the migration of applications to OpenSSL 1.1 (from OpenSSL 1.0) and KDE Plasma 5.14 is now in the project's repositories. KaOS currently ships with a welcome window called Croeso which offers a lot of customization options for first-time users. Croeso replaces the old Kaptan welcome screen.
KaOS has dropped support for Qt 4 which has not received active development for a while. The latest snapshot also updates Calamares and introduces a fix to make sure systems with Btrfs volumes should install properly on UEFI-enabled computers. Further, the project's release notes warn the distribution cannot be installed on a RAID system.
The latest snapshot of KaOS is 1.9GB in size. Booting from this media brings up the KDE Plasma desktop. The interface features a blue and grey theme with the desktop panel displayed vertically down the right-hand side. I think KaOS may be the only distribution I have used which places the panel in this manner.
Once the live desktop loads we are shown a welcome window which offers to open the distribution's guide (which features installation instructions), launch the Calamares installer, display on-line documentation, show us the operating system's default passwords, or open the user forum. The forum and documentation links are opened in the Falkon browser.
Installing
The Calamares installer offers a nice, graphical point-n-click experience to quickly set up Linux distributions. The installer begins by asking us for our preferred language and showing us the project's release notes. We are asked for our time zone and keyboard layout. Calamares offers guided or manual partitioning with the manual option presenting a nice, easy interface that includes a graphical representation of the local disk. I decided to set up KaOS on a Btrfs volume, though ext2/3/4, XFS, Reiser, JFS and LVM volumes would have also been possible. We are then asked to make up a username and password and the installer then shows us progress while it copies packages to the hard drive. Once finished, the installer offers to reboot the computer.
Early impressions
My fresh copy of KaOS booted to a graphical login screen. The elements on the screen are placed over on the right-hand side, rather than in the middle or to the left as found on other distributions. We can sign into the Plasma desktop running on either a Wayland or X.Org session and I will talk a bit about both of these later. Next to the password box there is a toggle for showing the password we are typing. I think this is the first time I have observed an option to show the user's password on a GNU/Linux login screen.
A problem I faced with the login screen is elements are presented with text in low contrast. This made it difficult to read session options, for example.
KaOS 2018.12 -- The welcome screen
(full image size: 388kB, resolution: 1280x1024 pixels)
Once I got signed in a new welcome window appeared. This one features several tabs that give us access to project news and customization options. Some of these customization modules deal with the look of the desktop (the theme, fonts, wallpaper, and window decorations) while others show more advanced modules to configure the firewall, systemd services and user accounts. I played around with a few of the modules, making little tweaks to the desktop. The only component I ran into trouble with was the firewall module. The interface did not respond to input when run from the welcome menu. Later I opened the firewall configuration tool via another method and it worked for me without further problems.
KaOS 2018.12 -- Managing the firewall
(full image size: 313kB, resolution: 1280x1024 pixels)
Shortly after I began using KaOS, a notification appeared in the system tray letting me know package updates were available. Clicking the notification icon itself doesn't do anything, but right-clicking on it gives us the option of opening the Octopi package manager, launching the update manager, or changing settings related to when the system looks for new packages. The update manager shows us a list of available updates and offers to install them in a terminal window. We are then prompted for the root password and then prompted again to confirm we really want to install the updates. The updates appear to be presented in an all-or-nothing manner as I did not see any way to unselect specific packages from the update process.
KaOS 2018.12 -- Downloading software updates
(full image size: 371kB, resolution: 1280x1024 pixels)
Another characteristic I noticed early on is the text on the clock widget is unusually small. Menus, virtual terminals and window title bars typically used a medium-sized font, but the clock was too tiny to read easily. I tried looking through the clock settings and font settings without finding a way to resize it. I did find it amusing though that swapping out the digital clock widget for another, like the fuzzy clock, presented the opposite problem. The fuzzy clock's font was so large it could only show three letters at a time ("quarter to five" would show as just "ter") even after I increased the panel's width.
Wayland and X.Org
When I first started using KaOS I was running the Plasma desktop in an X.Org environment. At first the desktop was a little slow to respond, which is not uncommon with larger desktops as they often load extra services, index files and perform other background actions. Shortly after getting started I left the computer alone for a few hours, then came back and found Plasma had gotten slower while I was away. It could take five seconds for the desktop to respond to mouse clicks or keyboard input and resizing or maximizing a window could take ten seconds - a most unusual turn of events. After disabling file indexing and most visual effects, the desktop remained slow to respond.
Some looking around revealed that the X.Org display server was using over half of my computer's RAM and this was, in turn, causing the system to swap heavily as it struggled to find room for my handful of applications. I decided to reboot and start fresh, keeping an eye on my system's memory consumption. When I first signed in, KaOS used a little less than 500MB of RAM in total, about what I would expect. Over time though the X.Org server gradually used more and more. I repeated the experiment a few times and found X.Org typically grabbed about 10MB of memory per minute. At this rate the system could fill its memory in under a day with a few applications open, necessitating a reboot.
I switched over the to Plasma Wayland session and generally had a better experience, at least concerning memory. While the Wayland session was a little laggy and produced visual artefacts when run in a virtual machine, when run on physical hardware Wayland was smooth and responsive. Initial memory usage was about the same (around 500MB) and tended to stay low. My only real issue with the Wayland session was the mouse pointer, which was unusually large most of the time (it changed size occasionally). I also found the mouse pointer was choosy about when it would change shape, particularly when moved over hyperlinks in a web browser. Sometimes the pointer morphed to indicate it was over a link and sometimes it did not, which made web browsing a little confusing at first. Otherwise the Wayland session worked well for me. This is one of the first times I have preferred using a Wayland session over the default X.Org session on any distribution.
KaOS 2018.12 -- The Wayland session with large mouse pointer
(full image size: 347kB, resolution: 1280x1024 pixels)
Apart from some performance issues in the virtual machine, KaOS worked well in both of my test environments. It was quick to respond on the desktop and all my hardware was properly detected. When run in VirtualBox, KaOS integrated with the virtual environment and could use my display's full screen resolution.
Package management
KaOS uses Octopi as its graphical package manager. Octopi is fairly simple in its design, listing available package names and allowing us to perform basic searches. Packages are listed with just a short name and version number. Clicking on an item and selecting the Info tab at the bottom of the window provides some terse information and a one-line description of the package. Octopi sets up batches of installation and removal actions and processes them all at once.
I did not run into any problems with Octopi, but I think its layout and limited package descriptions indicate it is best suited to more experienced Linux users. For people who prefer to use the command line, the pacman package manager can be used.
Applications
KaOS ships with a collection of software that mostly fits into the KDE/Qt family of applications. The Falkon web browser is included along with the Quassel IRC client. The KDE Connect service is offered to coordinate actions with Android phones. The K3b disc burning software is included along with the Kamoso webcam tool, and the MPV and SMPlayer media players. A wide range of media codecs are available by default. Gwenview and Krita are offered to view and edit images.
KaOS 2018.12 -- Managing system settings from the welcome screen
(full image size: 384kB, resolution: 1280x1024 pixels)
The Calligra productivity software is featured in the menu instead of LibreOffice and Okular is present for reading PDF documents. KaOS also offers the Dolphin file manager, the KDE Partition Manager, the KGpg encryption software, and the KDE help documentation. Digging further I found Java is included along with the GNU Compiler Collection. KaOS uses systemd for its init implementation and runs on version 4.19 of the Linux kernel, though new versions are periodically packaged and released.
There is a Skype entry in the application menu, but it just opens a web browser and takes us to the Microsoft Live login page. Another entry, called Seafile, had me puzzled at first. The program asks us to select a folder where it can put files, then asks us for a server name and our e-mail address, but does not say why or what the program does. The application does not offer any help, just a button for signing into accounts. I later found Seafile is a cross-platform file synchronization service.
While KaOS uses a different set of software than what I typically use (Calligra versus LibreOffice, MPV versus VLC, Krita versus GIMP) I mostly found myself comfortable with the alternative programs. The only one which gave me trouble was the Calligra suite. I have used, and enjoyed, Calligra before, but it has changed in recent versions and I found the changes made using its word processor difficult. For example, the suite features a big dock to the right of the window. I could move it, but not remove it, and the dock uses a lot of screen space. There did not appear to be any settings in the menus relating to the dock and clicking what looked to be its close button attached the dock to the top of my document, taking up most of the application window. I tried switching to Calligra's "distraction-free" mode, but this caused the word processor to take up the entire screen and remove all of its menus and I could not find a way to revert back to normal mode, and had to use Alt-Tab to switch windows. After fighting with the suite for a few more minutes I finally removed it and installed LibreOffice.
KaOS 2018.12 -- Struggling with Calligra's layout
(full image size: 60kB, resolution: 1280x1024 pixels)
Another problem I ran into was the inability to configure printers. I could open the printer configuration module in the System Settings panel, but it would not allow me to browse the network for printers or manually set up a new printer. I could also not enable printer sharing. Any action I attempted was met with errors saying I did not have proper permission or access was forbidden. The printer module does not prompt for a root or sudo password, effectively locking out the user.
Conclusions
My overall impression of KaOS at the moment is not great. My trial started out well. I like the project's focus and its efforts to try to polish one desktop. The installer offered a good experience and the distribution is easy to get set up. The welcome window has evolved nicely and makes it easy to customize the system right from the start.
However, using KaOS - trying to run it as a platform to get things done - proved to be a challenge. Part of this is a matter of taste or personal preference and I will completely admit that half the issue is conditioning. I'm used to having a mixture of GTK+ and Qt software while KaOS just uses Qt applications and I had to either adapt or swap out components in order to be productive. The problems I faced with Calligra and its interface were an extreme example of this, but there were other hurdles too. Everything from Dolphin to Gwenview seems to be set up differently compared next to other distributions, with panels down the left side instead of across the top, or on the right side rather than the left. The developers probably have a good reason for doing this, but it means the user needs to unlearn their experiences from other distributions before feeling at home on KaOS and my week-long trial did not afford me enough time to make the transition.
KaOS 2018.12 -- Browsing files in Dolphin
(full image size: 496kB, resolution: 1280x1024 pixels)
A minor complaint I had was with font colour. Looking back over the above screen shots the reader can see sometimes text is white on a black background, other times black on white, another time it is green on white, on the login screen it is dark blue on grey. Fonts were often smaller than I liked and sometimes lower-contrast than I'd like.
I do want to give the project credit for offering a pretty good Plasma on Wayland session. This is a rare accomplishment and I feel as though KaOS's implementation of Wayland is nearly on par with its X.Org experience. Wayland still stutters in a virtual machine, but it performed very nicely on my hardware.
Wayland working pretty well is especially important in the face of the X.Org memory leak I experienced. X.Org's expanding size necessitated a daily reboot of KaOS in order to reclaim my RAM and this is not a problem I have had on any other distribution. KaOS is a rolling release often on the cutting edge and I hope this issue is not a problem I run into elsewhere.
I ran into a bunch of other little issues, such as the irregular font sizes and the inability to set up printers and gradually became convinced that it would be difficult for me to be productive while running KaOS. The distribution does some things well and several things differently which makes it an interesting project. However, for me it is not a practical tool at the moment for getting things done.
* * * * *
Hardware used in this review
My physical test equipment for this review was a desktop HP Pavilon p6 Series with the following specifications:
- Processor: Dual-core 2.8GHz AMD A4-3420 APU
- Storage: 500GB Hitachi hard drive
- Memory: 6GB of RAM
- Networking: Realtek RTL8111 wired network card
- Display: AMD Radeon HD 6410D video card
* * * * *
Visitor supplied rating
KaOS has a visitor supplied average rating of: 5.5/10 from 24 review(s).
Have you used KaOS? You can leave your own review of the project on our ratings page.
|
Miscellaneous News (by Jesse Smith) |
Debian 10 freezes while Debian 9 gets a media refresh, Ubuntu publishes IoT release
The Debian distribution does not have a fixed release schedule, famously shipping "when it is ready" rather than on a specific date. Still, there are milestones in the project's development and we have reached a significant one: the beginning of the Testing repository freeze. The freeze marks a time when the Testing repository mostly stops changing, apart from bug fixes and critical updates. Jonathan Wiltshire announced the freeze in a mailing list post: "We're pleased to announce that the freeze for Debian 10 'Buster' has begun. On January 12th we stopped accepting transition requests and we are working to complete the remaining transitions in progress. This also means that autopkgtest regressions have now become migration blockers. Other stages of the release are on target. They are: 2019-02-12 Soft freeze (no new packages, no re-entry, 10 day migration); 2019-03-12 Full freeze." The release of Debian 10 "Buster" is likely to occur shortly after the Full freeze.
In other Debian news, the project has released updated media for version 9 "Stretch". The new media includes security fixes, but is not a new, independent release. "The Debian project is pleased to announce the seventh update of its stable distribution Debian 9 (codename Stretch). This point release incorporates the recent security update for APT, in order to help ensure that new installations of Stretch are not vulnerable. No other updates are included. New installation images will be available soon at the regular locations."
* * * * *
Fans of Internet of Things (IoT) devices should be happy to learn that Canonical has published a new release of Ubuntu for embedded devices. The new release, Ubuntu Core 18, focuses on providing a minimal platform with Snap packages and long term support. The announcement reads: "Immutable, digitally signed snaps ensure that devices built with Ubuntu Core are resistant to corruption or tampering. Any component can be verified at any time. All snaps on Ubuntu Core devices are strictly confined, limiting any damage from a compromised application. Ubuntu Core 18 will receive ten years low-cost security maintenance, enabling long-term industrial and mission-critical deployments. Updates are delivered with a device-specific SLA, ensuring that change is managed by the manufacturer or the enterprise and providing a rapid response to any vulnerabilities that are detected over the device lifetime." Ubuntu Core 18 images can be found on the distribution's IoT download page.
* * * * *
These and other news stories can be found on our Headlines page.
|
Book Review (by Jesse Smith) |
Linux Basics For Hackers
Some people tend to think of computer hacking as a dark, mysterious art form. In the minds of many, partly thanks to TV shows and movies, hackers are seen as dangerous, immoral actors and their skills are cause for suspicion. However, what rarely gets talked about is the skills required to hack into a computer has a huge overlap with the skills required to securely maintain a computer system. Hacking and system administration are really two sides to the same coin, both jobs require that the individual knows how the system works, what it can do, and what its weak points are.
I bring this up because, at first glance, people probably have a flash of either excitement or suspicion when they see the title Linux Basics For Hackers, written by someone going by the pen name OccupyTheWeb. It looks dangerous, in a digital way, and one might wonder what forbidden secrets lurk between the covers. However, learning the basics of being a hacker is really similar to learning how to be a system administrator, approached from a different angle. The skills are mostly the same, the final application of those skills is just different.
At its core Linux Basics For Hackers (LBFH) is a textbook which teaches the reader how to operate a GNU/Linux distribution from the command line. What sets the book apart from other sysadmin books is largely the flavour or the angle the author takes. For instance Kali Linux, a penetration testing distro, is used as the reference distribution instead of Ubuntu or Red Hat Enterprise Linux. The skills discussed and the tips offered are similar, but always with a stronger aim toward using the system for personal benefit rather than examining the background on subjects and how to lock down the operating system.
LBFH has 17 chapters, each of them averaging just over ten pages long, making for a terse, rapid-fire approach to learning Linux. The book covers how to install Kali, how to navigate the file system, some common shell commands (cat, cd, and ls) and then goes on to explore practical topics. We are walked through file and directory permissions, editing configuration files, system logging, connecting to networks, finding files, scanning network ports, and managing software packages. Later on we get into using databases, Bash scripting, some basic Python scripting, and managing storage devices.
On the surface these topics probably do not sound all that different from the ones covered in such texts as The Official Ubuntu Server Book or the Linux Bible. The subject matter is mostly the same, but LBFH is different in a couple of important ways:
The first is the book skips over most of the hand holding and background information on topics. LBFH assumes we already know how to use an operating system - specifically some knowledge of Windows is assumed, but a little Linux experience wouldn't hurt. We are not taught the history of command names or why directories are set up the way they are. We are told what we need to know to use Linux, not why the operating system works the way it does. The chapters are short and generally just offer some basic examples and a few tips, enough to get us started. Exploring ideas in depth or learning why things work the way they do is left up to the reader. Hackers are expected to be curious and continue learning via other methods.
Second, many examples are geared toward investigating the operating system or even exploiting it rather than locking it down or understanding it. The differences are mostly minor, but it puts a different focus on the examples. For instance, the shell script we learn to write scans the network for open ports rather than scanning logs. When we learn about shell variables it is to turn off logging of our command line history rather than changing the default editor. The database section talks about reading tables of information, not how to properly create our own database. The skills we pick up are the same as in a sysadmin textbook, but the focus is a little different.
Third, there is a section of the book about trying to stay anonymous and secure on-line. While system administrators usually want to gather information and track their users' actions, LBFH encourages us to stay anonymous and leave no footprints. This is a set of skills most users will likely benefit from knowing in this always on-line age.
While reading LBFH I found a number of things I enjoyed about the book and a few points I didn't like. Let's look at the detractors first. The first concern I had, and the one which I suspect will affect potential readers the most, is that the explanations are short. The book covers almost 20 topics in about 200 pages, which does not give us any time to explore topics in depth. This makes LBFH a good reference book or introductory text, but it means we may be left wanting more information. As an example, the chapter on shell scripting does not cover the (in my opinion) important subjects of conditional statements and loops. At the end of the chapter there is a table of commonly used script commands and the testing operator ([) is mentioned, but without an example or further explanation, and the "if" keyword isn't mentioned at all. Likewise, the section on logging mentions different types of logs, but very little information is provided on what each log file is used for or how that would be helpful for future hackers or system administrators.
My second concern is with typos. Any book, even textbooks, will contain a few typos - authors are only human, after all. This is a minor issue, but one which may cause confusion. For example, the networking section mixes up the terms "MAC address" and "IP address". Luckily it is usually clear what the author means from the context. In other areas, such as scripting examples, the intent is not always clear and it will cause some of the presented scripts to not work due to syntax errors.
My final point is a bit more important, in my view. There are a handful of places in the text where incorrect information or commands are used and, in the latter case, the command output the author expected to see is still provided. For instance, an error appears in the section on directory navigation where we are told we can use the command "cd .. .." to go up multiple levels. This example was later corrected on the publisher's website.
There are a few more examples of these kinds of errors in the chapter on processes. For instance, the book states that a zombie process is one that misbehaves or is frozen, when zombie processes are really ones that have been terminated, leaving their meta-data behind. Later, the book suggests we can remove zombie processes with the kill command, which will not work since zombie processes have already terminated. The chapter also states sending processes the SIGHUP signal will cause them to be restarted with their original PID which is not the case. There are a handful of mistakes like this which left me puzzled as to how they came to be included in the text.
Shifting gears over to the positive aspects of the book, paradoxically, LBFH's primary weakness (terse explanations) may also be one of the strongest points in its favour. The book is a delightfully light and fast read. A dedicated reader can get through the chapters and exercises in a couple of days. It is one of the shortest "how to use Linux" texts I have read and it covers a wide range of topics. Most of the material will be applicable to most Linux distributions and almost all of it will apply to the Debian and Ubuntu family of distributions. While I would not recommend this book for Linux beginners, people who are already familiar with desktop Linux and want to pick up command line basics quickly will greatly benefit from this quick-and-light approach.
As someone who has always favoured the administrative side of the hacker/sysadmin skill set, I found it worthwhile reading about the technology I use from the other side's point of view. To offer a good defence we should know how to think like an attacker and LBFH provides this necessary insight. I wouldn't say LBFH can replace an in-depth text like Linux Bible, but it is a good companion read in order to get an alternative perspective.
Finally, I like that most of LBFH is immediately practical. Some Linux textbooks spend a lot of time on theory or edge cases and LBFH is more streamlined. The author focuses on the commands and scenarios most people will find useful most of the time. Little time is spent on corner cases or legacy situations. This means the examples and suggestions will almost all be useful right from the beginning and the exercises listed at the backs of the chapters are practical.
In the end, I came away liking LBFH. Its quick and dirty approach to exploring and using a Linux system was welcome. I like that it is more hands-on and less theory. Having theory and background can be useful for people who want to become expert administrators, but for home users who want to know the basics and learn how to leverage the power of the command line, LBFH is an good guide. The book does not deal much with hacking directly, but does set us up with the skills required to test our systems, regain access to a wireless network we lost the password for, and set up home video surveillance. It is a text full of practical examples and, some rough edges aside, I think it will be helpful to a lot of people. I wouldn't suggest it for a Linux beginner, but for someone who is comfort with running a Linux desktop and wants to gain more immediately practical skills, this book is a good place to start.
* * * * *
- Title: Linux Basics For Hackers
- Author: OccupyTheWeb
- Published by: No Starch Press
- Pages: 203
- ISBN-10: 1-59327-855-1
- ISBN-13: 978-1-59327-855-7
- Available from: No Starch Press
|
Released Last Week |
Porteus Kiosk 4.8.0
Tomasz Jokiel has announced the release of Porteus Kiosk 4.8.0, an updated version of the project's specialist distribution designed for web kiosks - based on Gentoo Linux, with a choice of Firefox or Chrome browsers: "I am pleased to announce that Porteus Kiosk 4.8.0 is now available for download. Major software upgrades in this release include: Linux kernel 4.19.16, X.Org Server 1.20.3, Google Chrome 70.0.3538.110 and Mozilla Firefox 52.9.0 ESR. Packages from the userland are upgraded to portage snapshot tagged on 2019-01-19. Short changelog: added support for the 'onscreen buttons' to the Firefox browser - back, forward, home, print, etc; it is possible to set default paper size for the printer directly in the kiosk configuration - 'A4' and 'Letter' sizes are available in the wizard by default but other ones are supported as well; added possibility of forcing the 'fbdev' DDX driver which in some cases - depending on the GPU card - offers higher screen resolution than the VESA driver; it is possible to set a custom port number on which the VNC service will be listening." See the release announcement and changelog for further details.
Parrot 4.5
Lorenzo Faletra has announced the release of Parrot 4.5, the latest stable version of the project's specialist distribution designed for penetration testing, digital forensics and privacy protection, based on Debian's "Testing" branch: "Parrot 4.5 is officially released and there are some major changes under the hood. We are in 2019 now, and computers that are not capable of running 64-bit operating system are mostly legacy computers that are not capable of running modern and complex applications. Additionally, many programs and frameworks are no longer available for 32-bit x86 systems. We have been releasing 32-bit images since the beginning of the project and we worked hard to provide fresh binary updates for the i386 architecture for a while, but nowadays 32-bit-only computers are no longer capable of running a full pentest campaign or providing hardware-accelerated support to our security protection systems. Parrot 4.5 no longer provides live ISO files for the i386 architecture." Read the comprehensive release notes for further details.
* * * * *
Development, unannounced and minor bug-fix releases
|
Torrent Corner |
Weekly Torrents
The table below provides a list of torrents DistroWatch is currently seeding. If you do not have a bittorrent client capable of handling the linked files, we suggest installing either the Transmission or KTorrent bittorrent clients.
Archives of our previously seeded torrents may be found in our Torrent Archive. We also maintain a Torrents RSS feed for people who wish to have open source torrents delivered to them. To share your own open source torrents of Linux and BSD projects, please visit our Upload Torrents page.
Torrent Corner statistics:
- Total torrents seeded: 1,218
- Total data uploaded: 23.6TB
|
Upcoming Releases and Announcements |
Summary of expected upcoming releases
|
Opinion Poll |
Which new distro should be listed as a major project?
DistroWatch maintains a Major Distributions page where we provide summaries for, and history on, ten major projects. These projects tend to be either highly popular or significant for historical purposes.
This past week, while updating some of the information on this page, we realized Mageia, once highly popular for its ease of use, has been relatively quiet in recent years and seems to have fallen out of the spotlight. With this in mind, we are considering replacing Mageia on our Major Distributions page with one other project. Ideally, the replacement distribution should be one which has also gained popularity for being easy to use. We are interested in which distribution our readers think should take over the spot.
You can see the results of our previous poll on picking a distribution based on its core or the desktop in last week's edition. All previous poll results can be found in our poll archives.
|
Which new distro should be listed as a major project?
Manjaro Linux: | 1097 (20%) |
MX Linux: | 1572 (29%) |
elementary OS: | 563 (10%) |
Solus: | 658 (12%) |
Kali Linux: | 103 (2%) |
Other: | 348 (6%) |
Leave Mageia on the page: | 1112 (20%) |
|
|
DistroWatch.com News |
Distributions added to waiting list
- Abalar Libre. Abalar Libre provides a custom GNU/Linux operating system for Spanish-speaking users in schools and education centres.
- BlueLight. BlueLight, formerly called OS.js Linux, is a lightweight web-based Linux distro powered by OS.js. It uses the power of Electron to run a cloud based operating system, OS.js, to provide the user with a more web-based experience.
- EQuilibrium Level Three. EQuilibrium is a GNU/Linux distribution featuring the KDE desktop and Chromium as its primary interface. The distribution is designed to be used with on-line web services.
* * * * *
DistroWatch database summary
* * * * *
This concludes this week's issue of DistroWatch Weekly. The next instalment will be published on Monday, 4 February 2019. Past articles and reviews can be found through our Article Search page. To contact the authors please send e-mail to:
- Jesse Smith (feedback, questions and suggestions: distribution reviews/submissions, questions and answers, tips and tricks)
- Ladislav Bodnar (feedback, questions, donations, comments)
- Bruce Patterson (podcast)
|
|
Tip Jar |
If you've enjoyed this week's issue of DistroWatch Weekly, please consider sending us a tip. (Tips this week: 1, value: US$13.15) |
|
|
|
bc1qxes3k2wq3uqzr074tkwwjmwfe63z70gwzfu4lx lnurl1dp68gurn8ghj7ampd3kx2ar0veekzar0wd5xjtnrdakj7tnhv4kxctttdehhwm30d3h82unvwqhhxarpw3jkc7tzw4ex6cfexyfua2nr 86fA3qPTeQtNb2k1vLwEQaAp3XxkvvvXt69gSG5LGunXXikK9koPWZaRQgfFPBPWhMgXjPjccy9LA9xRFchPWQAnPvxh5Le paypal.me/distrowatchweekly • patreon.com/distrowatch |
|
Extended Lifecycle Support by TuxCare |
| |
TUXEDO |
TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Archives |
• Issue 1090 (2024-09-30): Rhino Linux 2024.2, commercial distros with alternative desktops, Valve seeks to improve Wayland performance, HardenedBSD parterns with Protectli, Tails merges with Tor Project, Quantum Leap partners with the FreeBSD Foundation |
• Issue 1089 (2024-09-23): Expirion 6.0, openKylin 2.0, managing configuration files, the future of Linux development, fixing bugs in Haiku, Slackware packages dracut |
• Issue 1088 (2024-09-16): PorteuX 1.6, migrating from Windows 10 to which Linux distro, making NetBSD immutable, AlmaLinux offers hardware certification, Mint updates old APT tools |
• Issue 1087 (2024-09-09): COSMIC desktop, running cron jobs at variable times, UBports highlights new apps, HardenedBSD offers work around for FreeBSD change, Debian considers how to cull old packages, systemd ported to musl |
• Issue 1086 (2024-09-02): Vanilla OS 2, command line tips for simple tasks, FreeBSD receives investment from STF, openSUSE Tumbleweed update can break network connections, Debian refreshes media |
• Issue 1085 (2024-08-26): Nobara 40, OpenMandriva 24.07 "ROME", distros which include source code, FreeBSD publishes quarterly report, Microsoft updates breaks Linux in dual-boot environments |
• Issue 1084 (2024-08-19): Liya 2.0, dual boot with encryption, Haiku introduces performance improvements, Gentoo dropping IA-64, Redcore merges major upgrade |
• Issue 1083 (2024-08-12): TrueNAS 24.04.2 "SCALE", Linux distros for smartphones, Redox OS introduces web server, PipeWire exposes battery drain on Linux, Canonical updates kernel version policy |
• Issue 1082 (2024-08-05): Linux Mint 22, taking snapshots of UFS on FreeBSD, openSUSE updates Tumbleweed and Aeon, Debian creates Tiny QA Tasks, Manjaro testing immutable images |
• Issue 1081 (2024-07-29): SysLinuxOS 12.4, OpenBSD gain hardware acceleration, Slackware changes kernel naming, Mint publishes upgrade instructions |
• Issue 1080 (2024-07-22): Running GNU/Linux on Android with Andronix, protecting network services, Solus dropping AppArmor and Snap, openSUSE Aeon Desktop gaining full disk encryption, SUSE asks openSUSE to change its branding |
• Issue 1079 (2024-07-15): Ubuntu Core 24, hiding files on Linux, Fedora dropping X11 packages on Workstation, Red Hat phasing out GRUB, new OpenSSH vulnerability, FreeBSD speeds up release cycle, UBports testing new first-run wizard |
• Issue 1078 (2024-07-08): Changing init software, server machines running desktop environments, OpenSSH vulnerability patched, Peppermint launches new edition, HardenedBSD updates ports |
• Issue 1077 (2024-07-01): The Unity and Lomiri interfaces, different distros for different tasks, Ubuntu plans to run Wayland on NVIDIA cards, openSUSE updates Leap Micro, Debian releases refreshed media, UBports gaining contact synchronisation, FreeDOS celebrates its 30th anniversary |
• Issue 1076 (2024-06-24): openSUSE 15.6, what makes Linux unique, SUSE Liberty Linux to support CentOS Linux 7, SLE receives 19 years of support, openSUSE testing Leap Micro edition |
• Issue 1075 (2024-06-17): Redox OS, X11 and Wayland on the BSDs, AlmaLinux releases Pi build, Canonical announces RISC-V laptop with Ubuntu, key changes in systemd |
• Issue 1074 (2024-06-10): Endless OS 6.0.0, distros with init diversity, Mint to filter unverified Flatpaks, Debian adds systemd-boot options, Redox adopts COSMIC desktop, OpenSSH gains new security features |
• Issue 1073 (2024-06-03): LXQt 2.0.0, an overview of Linux desktop environments, Canonical partners with Milk-V, openSUSE introduces new features in Aeon Desktop, Fedora mirrors see rise in traffic, Wayland adds OpenBSD support |
• Issue 1072 (2024-05-27): Manjaro 24.0, comparing init software, OpenBSD ports Plasma 6, Arch community debates mirror requirements, ThinOS to upgrade its FreeBSD core |
• Issue 1071 (2024-05-20): Archcraft 2024.04.06, common command line mistakes, ReactOS imports WINE improvements, Haiku makes adjusting themes easier, NetBSD takes a stand against code generated by chatbots |
• Issue 1070 (2024-05-13): Damn Small Linux 2024, hiding kernel messages during boot, Red Hat offers AI edition, new web browser for UBports, Fedora Asahi Remix 40 released, Qubes extends support for version 4.1 |
• Issue 1069 (2024-05-06): Ubuntu 24.04, installing packages in alternative locations, systemd creates sudo alternative, Mint encourages XApps collaboration, FreeBSD publishes quarterly update |
• Issue 1068 (2024-04-29): Fedora 40, transforming one distro into another, Debian elects new Project Leader, Red Hat extends support cycle, Emmabuntus adds accessibility features, Canonical's new security features |
• Issue 1067 (2024-04-22): LocalSend for transferring files, detecting supported CPU architecure levels, new visual design for APT, Fedora and openSUSE working on reproducible builds, LXQt released, AlmaLinux re-adds hardware support |
• Issue 1066 (2024-04-15): Fun projects to do with the Raspberry Pi and PinePhone, installing new software on fixed-release distributions, improving GNOME Terminal performance, Mint testing new repository mirrors, Gentoo becomes a Software In the Public Interest project |
• Issue 1065 (2024-04-08): Dr.Parted Live 24.03, answering questions about the xz exploit, Linux Mint to ship HWE kernel, AlmaLinux patches flaw ahead of upstream Red Hat, Calculate changes release model |
• Issue 1064 (2024-04-01): NixOS 23.11, the status of Hurd, liblzma compromised upstream, FreeBSD Foundation focuses on improving wireless networking, Ubuntu Pro offers 12 years of support |
• Issue 1063 (2024-03-25): Redcore Linux 2401, how slowly can a rolling release update, Debian starts new Project Leader election, Red Hat creating new NVIDIA driver, Snap store hit with more malware |
• Issue 1062 (2024-03-18): KDE neon 20240304, changing file permissions, Canonical turns 20, Pop!_OS creates new software centre, openSUSE packages Plasma 6 |
• Issue 1061 (2024-03-11): Using a PinePhone as a workstation, restarting background services on a schedule, NixBSD ports Nix to FreeBSD, Fedora packaging COSMIC, postmarketOS to adopt systemd, Linux Mint replacing HexChat |
• Issue 1060 (2024-03-04): AV Linux MX-23.1, bootstrapping a network connection, key OpenBSD features, Qubes certifies new hardware, LXQt and Plasma migrate to Qt 6 |
• Issue 1059 (2024-02-26): Warp Terminal, navigating manual pages, malware found in the Snap store, Red Hat considering CPU requirement update, UBports organizes ongoing work |
• Issue 1058 (2024-02-19): Drauger OS 7.6, how much disk space to allocate, System76 prepares to launch COSMIC desktop, UBports changes its version scheme, TrueNAS to offer faster deduplication |
• Issue 1057 (2024-02-12): Adelie Linux 1.0 Beta, rolling release vs fixed for a smoother experience, Debian working on 2038 bug, elementary OS to split applications from base system updates, Fedora announces Atomic Desktops |
• Issue 1056 (2024-02-05): wattOS R13, the various write speeds of ISO writing tools, DSL returns, Mint faces Wayland challenges, HardenedBSD blocks foreign USB devices, Gentoo publishes new repository, Linux distros patch glibc flaw |
• Issue 1055 (2024-01-29): CNIX OS 231204, distributions patching packages the most, Gentoo team presents ongoing work, UBports introduces connectivity and battery improvements, interview with Haiku developer |
• Issue 1054 (2024-01-22): Solus 4.5, comparing dd and cp when writing ISO files, openSUSE plans new major Leap version, XeroLinux shutting down, HardenedBSD changes its build schedule |
• Issue 1053 (2024-01-15): Linux AI voice assistants, some distributions running hotter than others, UBports talks about coming changes, Qubes certifies StarBook laptops, Asahi Linux improves energy savings |
• Issue 1052 (2024-01-08): OpenMandriva Lx 5.0, keeping shell commands running when theterminal closes, Mint upgrades Edge kernel, Vanilla OS plans big changes, Canonical working to make Snap more cross-platform |
• Issue 1051 (2024-01-01): Favourite distros of 2023, reloading shell settings, Asahi Linux releases Fedora remix, Gentoo offers binary packages, openSUSE provides full disk encryption |
• Issue 1050 (2023-12-18): rlxos 2023.11, renaming files and opening terminal windows in specific directories, TrueNAS publishes ZFS fixes, Debian publishes delayed install media, Haiku polishes desktop experience |
• Issue 1049 (2023-12-11): Lernstick 12, alternatives to WINE, openSUSE updates its branding, Mint unveils new features, Lubuntu team plans for 24.04 |
• Issue 1048 (2023-12-04): openSUSE MicroOS, the transition from X11 to Wayland, Red Hat phasing out X11 packages, UBports making mobile development easier |
• Issue 1047 (2023-11-27): GhostBSD 23.10.1, Why Linux uses swap when memory is free, Ubuntu Budgie may benefit from Wayland work in Xfce, early issues with FreeBSD 14.0 |
• Issue 1046 (2023-11-20): Slackel 7.7 "Openbox", restricting CPU usage, Haiku improves font handling and software centre performance, Canonical launches MicroCloud |
• Issue 1045 (2023-11-13): Fedora 39, how to trust software packages, ReactOS booting with UEFI, elementary OS plans to default to Wayland, Mir gaining ability to split work across video cards |
• Issue 1044 (2023-11-06): Porteus 5.01, disabling IPv6, applications unique to a Linux distro, Linux merges bcachefs, OpenELA makes source packages available |
• Issue 1043 (2023-10-30): Murena Two with privacy switches, where old files go when packages are updated, UBports on Volla phones, Mint testing Cinnamon on Wayland, Peppermint releases ARM build |
• Issue 1042 (2023-10-23): Ubuntu Cinnamon compared with Linux Mint, extending battery life on Linux, Debian resumes /usr merge, Canonical publishes fixed install media |
• Issue 1041 (2023-10-16): FydeOS 17.0, Dr.Parted 23.09, changing UIDs, Fedora partners with Slimbook, GNOME phasing out X11 sessions, Ubuntu revokes 23.10 install media |
• Issue 1040 (2023-10-09): CROWZ 5.0, changing the location of default directories, Linux Mint updates its Edge edition, Murena crowdfunding new privacy phone, Debian publishes new install media |
• Issue 1039 (2023-10-02): Zenwalk Current, finding the duration of media files, Peppermint OS tries out new edition, COSMIC gains new features, Canonical reports on security incident in Snap store |
• Issue 1038 (2023-09-25): Mageia 9, trouble-shooting launchers, running desktop Linux in the cloud, New documentation for Nix, Linux phasing out ReiserFS, GNU celebrates 40 years |
• Issue 1037 (2023-09-18): Bodhi Linux 7.0.0, finding specific distros and unified package managemnt, Zevenet replaced by two new forks, openSUSE introduces Slowroll branch, Fedora considering dropping Plasma X11 session |
• Issue 1036 (2023-09-11): SDesk 2023.08.12, hiding command line passwords, openSUSE shares contributor survery results, Ubuntu plans seamless disk encryption, GNOME 45 to break extension compatibility |
• Full list of all issues |
Star Labs |
Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
Random Distribution |
mAid
mAid (previously known as FWUL - Forget Windows Use Linux) is a desktop Linux distribution based on Manjaro Linux and featuring the Budgie desktop. The main purpose of the project is to build a small, fast, light and hassle-free distribution for working with Android devices. It comes with a custom installation program, a cross-platform remote control utility, some Android tools, and many standard Linux applications.
Status: Active
|
TUXEDO |
TUXEDO Computers - Linux Hardware in a tailor made suite Choose from a wide range of laptops and PCs in various sizes and shapes at TUXEDOComputers.com. Every machine comes pre-installed and ready-to-run with Linux. Full 24 months of warranty and lifetime support included!
Learn more about our full service package and all benefits from buying at TUXEDO.
|
Star Labs |
Star Labs - Laptops built for Linux.
View our range including the highly anticipated StarFighter. Available with coreboot open-source firmware and a choice of Ubuntu, elementary, Manjaro and more. Visit Star Labs for information, to buy and get support.
|
|