Language Selection

English French German Italian Portuguese Spanish

Mandriva Free 2007 - the FOSSwire review

Filed under
MDV
Reviews

I’m going to take a look at the popular Linux distribution Mandriva; more specifically, their latest free-of-charge desktop outing Mandriva Free 2007.

Mandriva, originally called Mandrake, was born from the code of Red Hat 5.1 and its aim was to create a KDE-based Linux distribution (in those days KDE wasn’t GPL, and Red Hat didn’t want to include it for that reason).

And eight years on, we have Mandriva 2007. It’s a distro aimed at newer users of Linux, and in fact there are several versions of the distribution which are boxed commercial products (Discovery, PowerPack and PowerPack Plus). The Free edition that I tested out isn’t one of these boxed copies and is the only free-to-download version.

Installation

This edition isn’t a Live CD like Ubuntu, so after popping it into the drive and rebooting, you launch straight into the install program where you get to work installing. While it’s a shame you can’t boot in straight away and test it out, Ubuntu is well ahead of most distributions in this respect, so it doesn’t put Mandriva behind the pack, just not in front of it either.

Full Story.

A sort of bizzare review

To wit...

Wonder if FOSSwire knows all of their screenshots are unavailable at the moment?

If you want a version of Mandriva that you could check out, and later install, from a live CD, you can freely download "Mandriva One" -- it's not exactly hidden on Mandriva's website.

The author doesn't test partitioning, nor does he mention that Mandriva's installer was one of the first (if not the first) that allowed you to resize an NTFS partition.

I don't know about "most" Linux users, but I wouldn't assume they have no distro loyalty after finding the one they like.

Why would you reference apps by their descriptions, and not by their names? Most people are clever enough to figure out that "Kate" is a text editor -- especially when it's listed under "Editors" on the menu. Likewise for the author's beef over the KDE vs. the Mandriva control centers. Most users will be clever enough to figure out that the "KDE" in "KDE Control Center" refers to the GUI and the "Mandriva" ... you get the point.

More importantly: Simplification for new users is good and fine, but there's a learning process that has to occur, too.

I'd agree that it's not terribly clear what's going on with the update manager. That was a source of confusion for me, too, the last time I installed Mandriva. Clicking on the icon in the system tray brought up a dialog that seemed to indicate one had to have a club membership ($) in order to use the utility. However, someone told me that updates are freely available to everyone -- just perhaps not through the utility in the system tray. (?)

"It might not blow you away, but it’s a solid operating system product with a lot of potential." Huh. Sounds like "damning with faint praise."
--
><)))°> Kanotix: Making Linux work. http://kanotix.com

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security Leftovers

  • Why Are Cryptographers Being Denied Entry into the US?

    Is there some cryptographer blacklist? Is something else going on? A lot of us would like to know.

  • Security Engineering: Third Edition

    Today I put online a chapter on Who is the Opponent, which draws together what we learned from Snowden and others about the capabilities of state actors, together with what we’ve learned about cybercrime actors as a result of running the Cambridge Cybercrime Centre. Isn’t it odd that almost six years after Snowden, nobody’s tried to pull together what we learned into a coherent summary?

    There’s also a chapter on Surveillance or Privacy which looks at policy. What’s the privacy landscape now, and what might we expect from the tussles over data retention, government backdoors and censorship more generally?

  • Google halts some business with China's Huawei: report

    Huawei will reportedly no longer be able to access Android updates, the Gmail app, the Google Play store and new versions of Google phones outside of China.

  • Google restricts Huawei's use of Android

    Existing Huawei smartphone users will be able to update apps and push through security fixes, as well as update Google Play services.

    But when Google launches the next version of Android later this year, it may not be available on Huawei devices.

    Future Huawei devices may no longer have apps such as YouTube and Maps.

  • Forget Huawei, The Internet Of Things Is The Real Security Threat
    We've noted for a while how a lot of the US protectionist security hysteria surrounding Huawei isn't supported by much in the way of hard data. And while it's certainly possible that Huawei helps the Chinese government spy, the reality is that Chinese (or any other) intelligence services don't really need to rely on Huawei to spy on the American public. Why? Because people around the world keep connecting millions of internet of broken things devices to their home and business networks that lack even the most rudimentary of security and privacy protections. Week after week we've documented how these devices are being built with both privacy and security as a distant afterthought, resulting in everything from your television to your refrigerator creating both new attack vectors and wonderful new surveillance opportunities for hackers and state actors.

today's howtos

Android Leftovers

A Look At The MDS Cost On Xeon, EPYC & Xeon Total Impact Of Affected CPU Vulnerabilities

This weekend I posted a number of benchmarks looking at the performance impact of the new MDS/Zombieload vulnerabilities that also included a look at the overall cost of Spectre/Meltdown/L1TF/MDS on Intel desktop CPUs and AMD CPUs (Spectre). In this article are similar benchmarks but turning the attention now to Intel Xeon hardware and also comparing those total mitigation costs against AMD EPYC with its Spectre mitigations. This article offers a look at the MDS/Zombieload mitigations on a 1st Gen Skylake Xeon Scalable server as well as a Kabylake Xeon E3 server for reference. Following that is a look at the total CPU vulnerability mitigation costs for 1st Gen Xeon Scalable, 2nd Gen Xeon Scalable (Cascade Lake), and an AMD EPYC 2P server as well for its Spectre mitigations. As expected given Intel's guidance last week of their latest Xeon processors being mitigated for MDS, indeed, the dual Xeon Platinum 8280 Cascade Lake server reported it was not affected by the MDS mitigations and thus not enabled. So for the MDS tests up first it's just some reference results using a dual Xeon Gold 6138 Skylake server running Ubuntu 19.04 with the Linux 5.0 patched kernel and reference results side-by-side for a separate Xeon E3-1275 v6 server. Read more