Language Selection

English French German Italian Portuguese Spanish

Ubuntu Rescued My Laptop

Filed under
Ubuntu

A few weeks ago I started seeing the “Blue Screen of Death” on my Sony Vaio PCG-K35 laptop every 10 minutes or so, making the computer nothing more than an overpriced 7 lb. brick. Because my laptop is more of a convenience and I’m in the middle of a large project, it got put up in the closet until I found time to deal with it.

I pulled it out last week and was unable to find the activation keys to Windows XP Pro and Microsoft Office that came with the laptop from the OEM. This pretty much made reinstalling it with Microsoft software impossible, and I’m not about to drop $500-700 on new keys to get it all running again- I don’t even like Microsoft.

This weekend while driving to South Carolina to meet with my fiance’s brother (who also happens to be a minister and is going to marry us), I installed the Ubuntu Linux 6.10 (Edgy Eft) distribution that I downloaded and burnt to CD on my desktop.

Installing Ubuntu

Wow. That’s all I can say- Wow. Ubuntu installed like a dream in less than 30 minutes, and everything just worked. My wireless card worked, power management worked, and the DVD burner worked with no tweaking, fidgeting, or fussing.

I’m no stranger to Linux- All the dedicated servers I lease are always powered by a Red Hat or some other Linux distribution. However, all my experiences with graphical interfaces on desktops for the open-source operating system have been painful at best. Every other distribution I have tried always required me to compile drivers, tweak settings, and generally get pissed off trying to make things work.

Ubuntu just does, right “out of the box”.

Ubuntu vs. XP… No Adobe, but Everything Else Rocks

Full Story.

re: Ubuntu

Article should be titled: "I'm a dumbass and can't file simple registration numbers safely away or figure out how to image my laptop harddrive".

Apparently finding the license sticker that's welded to the bottom of her laptop is also too hard.

She's "no stranger to Linux" (with her vast hosting experience) but this is the first (THE FIRST) distro she tried that actually works??? Time to get out of the house a bit more, there are dozens of distro's that work on the desktop.

But the story does have a happy ending as yet another Ubuntu fanboy is born.

Your comment.

To comment in kind:

Your comment should be titled: "I'm a rude and arrogant jerk who can't post a comment without a nasty insult."

re: Your Comment

Possibly.

Assuming you read the article, which part of my comment is untrue?

To me, it looks like the author is jumping on the Ubuntu fan club to garner free exposure to her site where she just happens to be promoting the launch of a new service.

Commenting style.

Didn't say it was untrue--accuracy is not my issue. It's a matter of style and attitude--I just don't care for your arrogant, in-your-face rudeness.

Commenting is not a nasty contest. You don't need to win any points, or establish yourself as a put-down artist in order to comment disfavorably on something. To quote one of my favorite science fiction authors, "90% of nearly everything is crap", so it's easy to find lots to be critical about, and that's fine. Showing some grace while doing it is a real art.

re: Style

Luckily, I'm a scientist and not an artist (graceful or otherwise), so I favor facts over political correctness.

Style is relative, so one persons rude and arrogance is another's direct and to the point.

Publishing anything on the internet (a mostly global public media) is not for the weak willed or thin skinned.

Gook luck with that.

"I argue very well. Ask any of my remaining friends. I can win an argument on any topic, against any opponent. People know this, and steer clear of me at parties. Often, as a sign of their great respect, they don't even invite me."
-- Dave Barry

I could go into a major slash and burn here, but it's pointless. A simple Google Search shows that you've annoyed many, many others (must all be "weak-willed, thin-skinned" folk) in other forums around the Internet.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's lefftovers

OSS Leftovers

  • Running for the board of the Open Source Initiative – a few words
    Today I would like to explain my reasons for my candidacy at the board of the Open Source Initiative. I can think of two kinds of reason for my decision: one is personal, and the other one is directly related to current state of Open Source and software freedom. Let’s start with the first one: I’m currently helping the Open Information Security Foundation and the Suricata project in my capacity at ANSSI, while contributing in a minor way to the LibreOffice project and the Document Foundation.
  • Tutanota: Encrypted Open Source Email Service for Privacy Minded People
    Since then, I have heard of another email provider that you may be interested in. It’s a little different, but it touts some of the same features ProtonMail does: privacy, security, open-source code, etc. It’s called Tutanota, and like ProtonMail, I am a very big fan.
  • Open FinTech Forum – Event preview, October 10-11, New York City.
  • The tracker will always get through
    A big objection to tracking protection is the idea that the tracker will always get through. Some people suggest that as browsers give users more ability to control how their personal information gets leaked across sites, things won't get better for users, because third-party tracking will just keep up. On this view, today's easy-to-block third-party cookies will be replaced by techniques such as passive fingerprinting where it's hard to tell if the browser is succeeding at protecting the user or not, and users will be stuck in the same place they are now, or worse. I doubt this is the case because we're playing a more complex game than just trackers vs. users. The game has at least five sides, and some of the fastest-moving players with the best understanding of the game are the adfraud hackers. Right now adfraud is losing in some areas where they had been winning, and the resulting shift in adfraud is likely to shift the risks and rewards of tracking techniques.
  • MozMEAO SRE Status Report - February 16, 2018
    Here’s what happened on the MozMEAO SRE team from January 23 - February 16.
  • The major milestones of the Government Digital Service (GDS)
  • PyTorch Should Be Copyleft
    Most people have heard of Google’s Tensorflow which was released at the end of 2015, but there’s an active codebase called PyTorch which is easier to understand, less of a black box, and more dynamic. Tensorflow does have solutions for some of those limitations (such as Tensorflow-fold, and Tensorflow-Eager) but these new capabilities remove the need for other features and complexity of Tensorflow. Google built a great system for doing static computation graphs before realizing that most people want dynamic graphs. Doh! [...] I wish PyTorch used the AGPL license. Most neural networks are run on servers today, it is hardly used on the Linux desktop. Data is central to AI and that can stay owned by FB and the users of course. The ImageNet dataset created a revolution in computer vision, so let’s never forget that open data sets can be useful.
  • Linux on Nintendo Switch, a new Kubernetes ML platform, and more news
    In this edition of our open source news roundup, we take a look at the Mozilla's IoT gateway, a new machine learning platform, Code.mil's revamp, and more.

Security: France, Munich, 'Smart' Meters, MeltdownPrime and SpectrePrime

  • Highlights of the French cybersecurity strategy

    First, the document describes that in France cyberdefence and cyberoffence are separated. This is directly opposed to the models employed in Anglo-Saxon countries. But it’s shown as an asset. Key argument: it respects freedoms and civil liberties.

    The document then lists the six general objectives of cyberdefence, namely: prevention, anticipation, protection, detection, attribution, reaction (remediation). The strategy itself is complete, it focuses on civil, military, domestic, external, and international levels. Let’s say it’s a rarity in the business in strategic cybersecurity documents.

    [...]

    The strategy then mentions that one of the solutions could be to release source code and documentation after an end of support date.

  • The Munich Security Conference 2018

    Over the past five decades, the Munich Security Conference (MSC) has become the major global forum for the discussion of security policy. Each February, it brings together more than 450 senior decision-makers from around the world, including heads-of-state, ministers, leading personalities of international and non-governmental organizations, as well as high ranking representatives of industry, media, academia, and civil society, to engage in an intensive debate on current and future security challenges.

  • Smart meters could leave British homes vulnerable to cyber attacks, experts have warned
    New smart energy meters that the Government wants to be installed in millions of homes will leave householders vulnerable to cyber attacks, ministers have been warned.
  • MeltdownPrime and SpectrePrime: Researchers nail exploits
    "The flaws—dubbed Meltdown and Spectre—are in chips made by Intel and other major suppliers. They can allow hackers to steal data from the memory of running apps, including password managers, browsers and emails." The authors of the paper on arXiv, Caroline Trippel, Daniel Lustig, and Margaret Martonosi, discuss a tool they developed for "automatically synthesizing microarchitecture-specific programs capable of producing any user-specified hardware execution pattern of interest." They said they show "how this tool can be used for generating small microarchitecture-specific programs which represent exploits in their most abstracted form—security litmus tests."

How Linux became my job

I've been using open source since what seems like prehistoric times. Back then, there was nothing called social media. There was no Firefox, no Google Chrome (not even a Google), no Amazon, barely an internet. In fact, the hot topic of the day was the new Linux 2.0 kernel. The big technical challenges in those days? Well, the ELF format was replacing the old a.out format in binary Linux distributions, and the upgrade could be tricky on some installs of Linux. Read more