Language Selection

English French German Italian Portuguese Spanish

openSUSE 10.2 Final Report

Filed under
Reviews
SUSE
-s

Although I had planned to write a full length review of openSUSE 10.2 at the time of the RC release, I later decided against it. ...until I received a shiny new HP Pavilion notebook computer for Christmas and needed to install a Linux distribution. I obviously chose openSUSE 10.2 and I'm not sorry I did. This will describe some of my experiences with this fine distro on my new equipment.

When this adventure began, I still had not planned to write about it as eco2geek had already generously shared his experiences on a similar Compaq laptop. As such some items were already configured without my having taken screenshots. Also it's important to note that although I'm not exactly a laptop virgin, I'd say I only reached 2nd or 3rd base using my old vintage 1999 Dell as a training device. So please forgive my ignorance.

This machine arrived with an 80 gig sata harddrive with Windows XP Media Edition on an NTFS partition. This partition spanned approximately 69 gigs of this drive with an 11 gig vfat restore partition at the end. It was my desire to not only retain this Windows install, but also the restore partition. I was a bit apprehensive with it residing on said NT filesystem. But as I was testing livecds I had handy, one disk I popped in was the RC1 of openSUSE 10.2. I ran it through the partitioning step just to see what it'd say, and it acted like it could resize that NTFS partition and install. I was encouraged and burnt the final release of openSUSE 10.2 onto dvdr.

I popped in the dvd and restarted the machine. I was presented with the new very polished openSUSE installer. The new theme was complete throughout now and a new install option was present in the options menus at the bottom of the boot screen. Harddrive install is now an easy option. It's not relevant this time, but it's nice to know that method is now much easier to perform. From that point on I don't recall any new elements that have not been previously described by me in the coverage of the development cycle.

I reached the first summary screen and saw where the installer proposed to resize my ntfs and make several partitions for my new install. I was leery, but I had made some dvd backups of the XP system, so I preceded. I didn't really want to go with its exact proposal as it was planning on giving windows 30 gigs. As all the data was still within the first 6 gigs, I changed that to 12 and set up some additional partitions I thought I might need, such as a 500 mb /boot, and two extra partitions (one for the upcoming PCLOS .94 and another for testing other various distros). In addition, I decided to let it use ext3 filesystem as is openSUSE's new default this release. I almost held my breath as I depressed enter, but off it went. Next thing I recall was it installing all the software I had chosen.

This install also brought another first or two for me. This time I was gonna need a bootloader installed and I even chose to go with grub. It included Windows in its proposal as well as a windows 2 for that restore partition. I deleted that entry in the config.

Upon first reboot I just hit enter as OpenSUSE 10.2 is the default system. After some other configuration steps, I rebooted to see if Windows was still operative. It was. It did go through its dskchk that first boot after the Linux install, but it booted fine. I've booted over there another time since and all seems well. It's still amazes me how far Linux has come. But that's not all that amazed me about openSUSE on this machine.

One of the first things I noticed was how openSUSE detected my display and gave a correct resolution of 1280x800. As mentioned earlier, I'd tested a few livecds previously, and none of them did as well. Another yippee was its detection and auto-config of the pointer thingy. I recall reading horror stories in the past by folks trying to get those to work. Linux has come a long way, Baby. Some more good news: the sound card and volume control worked out of the box, some of the media/shortcut keys work, and power management was setup out of the box and worked properly.

        

I did have configure some things myself. The first order of business after graphics is always the net connection. As my graphics were fine, I started out to set up the wireless connection. Unfortunately, my wireless chipset isn't supported natively by Linux, so I had to resort to ndiswrapper. I ended up using the advice given by eco2geek about installing the windows driver off that partition and using ndiswrapper for the module as described by the howto he linked to in that article. It worked wonderfully. As he stated, it will connect to the neighbor's lan if you're not careful. But once you connect to your own, it will be set as default.

My printer is connected to my main workhorse machine, so I needed to set it up as a smb printer on this new machine. I had previously set it up on the desktop and only needed to configure it on the laptop through Yast. There was no pain with this process. Easy peasy, just fill in a few blanks and click Finish.

I tested the new Software Manager quite a bit installing additional software and even uninstalling some. I quickly became weary of popping in the install dvd and opted to set up a http mirror. In addition I ran the Online Updates configuration to set up an update repository. That applet has offered updates and installed them without issue twice already. Their appearances haven't changed since previous coverage, but it seems all is working wonderfully to me.

In fact, everything I have wanted to do in Yast has worked fantasticly. From looking at hardware information, adding new users, adjusting startup services, to turning off the firewall, ...everything, has worked great.

        

My only complaint is the fonts. The fonts aren't quite as nice on this system as I've observed on my desktop openSUSE installs. I'm sure it's to do with the type of display, but I've not been able to adjust them to my exact liking. Although I'm growing accustomed to the new appearance, the fonts on my desktop just knock my socks off when I get back on that machine.

At this point I strayed from openSUSE's stock system and I installed the NVIDIA graphic drivers. This didn't seem to help with the font issue, but games are much more cooperative. I did install a few more font packages and found one that looks better than the default.

After that I ended up "Hacking openSUSE 10.2." I then copied over my kmailrc, bookmarks.xml, and akregator directory from my desktop and I am ready to take my new computer on the road.

The only issue I've had is one lock-up when issuing a "sensors-detect" under X. This process completes at the terminal without further issue.

In conclusion, openSUSE 10.2 performs marvelously on my new mobile computer. This whole experience has been a pleasure from start to finish. Most hardware is detected and auto-configured right out of the box. Most of what requires further configuration are user-friendly to set up. Important components like power management work great as well. openSUSE runs fast and stable, even after "Hacking." And it's just plain pretty while retaining a nice professional appearance. As always, slick and polished are the two words that come to mind when trying to describe openSUSE. But now another comes to me as well. Amazing.

My thanks goes out to eco2geek for his previous article, which probably saved me hours of googling and trial & error, and to all those wonderful developers at openSUSE who work so hard to bring us such a pretty and functional system.

openSUSE Homepage.
Changelog & Version information.
RC 1 Coverage.

What fonts did you choose?

openSUSE 10.2 fonts are also a problem for me on my HP Pavilion laptop (dv6000t - Nvidia GO 7400). I am using the MSfonts with some satisfaction, and have grabbed every Xorg update I can find thinking that might be a logical fix. I have played with font rendering and settled with 96 dpi, sub-pixel (LCDs), medium hinting.

During Oct-Nov I loaded all the openSUSE 10.2 alpha, beta, and RC releases on my HP with good success (except for headphone sound) and don't remember being unhappy with fonts. But the final 10.2 font problem (in Firefox) has been so bad for me I avoid using SUSE for my long surfing sessions...

Would appreciate knowing what fonts you found satisfactory on your HP - particulary in your Firefox browser. Like you, I am very happy with 10.2 on my desktop machine (Sony G420 19" monitor - Nvidia 7600 GS card).

BTW, was happy to hear you got a new HP fox Christmas. My brother bought his wife one and I am VERY with mone.

Thanks, happyg

re: What fonts did you choose?

I'm using dustismo for kde stuff. I tried windows fonts, and I even tried enabling the bytecode interpreter, but it seems almost like a lost cause. I even tried a coupla tricks from suse specific font tutorials with no real luck.

I don't really use firefox all that much, so I've left it on whatever was default. It don't look too bad really.

I've just really been using pclos mostly lately on that laptop cuz the fonts look so much better right out of the box.

----
You talk the talk, but do you waddle the waddle?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's leftovers

  • Bring your ideas to the world with kubectl plugins

    kubectl is the most critical tool to interact with Kubernetes and has to address multiple user personas, each with their own needs and opinions. One way to make kubectl do what you need is to build new functionality into kubectl. Challenges with building commands into kubectl However, that’s easier said than done. Being such an important cornerstone of Kubernetes, any meaningful change to kubectl needs to undergo a Kubernetes Enhancement Proposal (KEP) where the intended change is discussed beforehand. When it comes to implementation, you’ll find that kubectl is an ingenious and complex piece of engineering. It might take a long time to get used to the processes and style of the codebase to get done what you want to achieve. Next comes the review process which may go through several rounds until it meets all the requirements of the Kubernetes maintainers – after all, they need to take over ownership of this feature and maintain it from the day it’s merged. When everything goes well, you can finally rejoice. Your code will be shipped with the next Kubernetes release. Well, that could mean you need to wait another 3 months to ship your idea in kubectl if you are unlucky. So this was the happy path where everything goes well. But there are good reasons why your new functionality may never make it into kubectl. For one, kubectl has a particular look and feel and violating that style will not be acceptable by the maintainers. For example, an interactive command that produces output with colors would be inconsistent with the rest of kubectl. Also, when it comes to tools or commands useful only to a minuscule proportion of users, the maintainers may simply reject your proposal as kubectl needs to address common needs. But this doesn’t mean you can’t ship your ideas to kubectl users.

  • Phoronix Test Suite 9.4 Released With More Features For Open-Source, Cross-Platform Automated Benchmarking

    Phoronix Test Suite 9.4-Vestby is now available as one of our largest updates in recent years for our open-source, cross-platform automated benchmarking framework. Almost wanting to rebrand it as Phoronix Test Suite 10, sticking to conventional versioning the Phoronix Test Suite 9.4 release brings numerous result viewer improvements, a lot of polishing to the PDF result exporting, various Microsoft Windows support improvements, new statistics capabilities, some useful new sub-commands, and much more as the latest quarterly feature release.

  • Linux 5.6 Tests On AMD EPYC 7742 vs. Intel Xeon 8280 2P With 100+ Benchmarks

    The latest benchmarks for your viewing pleasure are looking at the dual Intel Xeon Platinum 8280 performance up against the dual AMD EPYC 7742 CPUs while using the in-development Linux 5.6 kernel as the first time trying out these highest-end server processors on this new kernel debuting as stable in about one month's time.

  • PyIDM – An Open Source Alternative to IDM (Internet Download Manager)

    pyIDM is a free, open-source alternative to IDM (Internet Download Manager), used to download general files and videos from youtube as well as other streaming websites. It is developed using Python (requires Python 3.6+) and relies only on open source tools and libraries such as pycurl, youtube_dl, FFmpeg, and pysimplegui. It features multiple-connections, a speed engine (and it offers high download speeds based on libcurl); resume uncompleted downloads, support for fragmented video streams, support for encrypted/non-encrypted HLS (HTTP Live Streaming) media streams. Besides, it also supports scheduling downloads, re-using an existing connection to a remote server, and HTTP proxy support. And it allows users to control options such as selecting a theme (there are 140 themes available), set proxy, selecting segment size, speed limit, maximum concurrent downloads and maximum connections per download.

  • DRM Plugin crashes after openSUSE Tumbleweed update

    A few days ago openSUSE users started complaining about DRM Plugin crashes in Firefox after running a Tumbleweed update. Netflix requires the DRM plugin in Firefox to be able to play encrypted videos. The plugin would crash due to a bug in Firefox 73. While this bug affected not just openSUSE users, but everyone using Firefox 73, it became apparent to TW users as v73 landed in the Tumbleweed repo.

  • How Melissa Di Donato Is Going To Reinvent SUSE

    SUSE is one of the oldest open source companies and the first to market Linux for the enterprise. Even though it has undergone several acquisitions and a merger, it remains a strong player in the business. It has maintained its integrity and core values around open source. It continues to rely on its tried-and-tested Linux business and European markets, and generally shies away from making big moves taking big risks. Until now. SUSE appointed Melissa Di Donato as its first female CEO. She is making some serious changes to the company, from building a diverse and inclusive culture to betting on emerging technologies and taking risks. Soon after taking the helm last year, Di Donato spent the first few months traveling around the globe to meet SUSE teams and customers and get a better sense of the perception of the market about the company. Just like Red Hat CEO Jim Whitehurst, Di Donato didn’t come to the company from an open source background. She had spent the last 25 years of her career as a SUSE customer, so she did have an outsider’s perspective of the company. “I am not interested in what SUSE was when I joined. I am more interested in what we want to become,” she said.

  • Experimental feature: snap refresh awareness and update inhibition

    We’d like to follow up on last week’s article about parallel installs for classic snaps with another bleeding-edge topic. Today, we will discuss snap refreshes. By design, snaps come with automatic updates, and by default, the update (refresh) frequency check is four times a day. Whenever new application versions are published, they soon become available and propagate to all end-user systems. Normally, the process is transparent and seamless, but there could be exceptions. For instance, if you have an app open and running, an update could be disruptive in the middle of your work. Some developers have asked for an option to inhibit refreshes of snaps while they are running, and this is now a new, experimental feature that you can enable and test on your system. [...] The app refresh capability offers snaps users another level of control in the overall user experience. Automatic updates are geared toward security, but users can defer updates for up to 60 days, and now, they also have the ability to gracefully update applications with minimal disruption to their normal usage patterns and workflows. We very much welcome your feedback and suggestions, especially with new and upcoming features. The refresh awareness option is a good example of where the developer feedback has been valuable and useful in making the snap ecosystem even friendlier and more robust. If you have any ideas on this topic – or any other, please join our forum for a discussion.

  • How Domotz streamlined provisioning of IoT devices

    Learn how Ubuntu Core and snaps gives Domotz a competitive advantage As the number of IoT devices scale, the challenges of provisioning and keeping them up to date in the field increases. Domotz, who manufacture an all-in-one, network monitoring and management device for enterprise IoT networks, found themselves with this challenge that was further compounded by their rapid software release cadence. One of the most crucial and difficult aspects for Domotz to solve was the delivery of automatic updates to the tens of thousands of devices deployed. Domotz turned to snaps and Ubuntu Core to meet their exacting requirements. I absolutely believe that Ubuntu Core and snaps give us a competitive advantage. We are the only company in the IoT network management space that can guarantee a secure, always-up-to-date device for our customers’ on-premises deployments.

  • A birthday gift: 2GB Raspberry Pi 4 now only $35

    TL;DR: it’s our eighth birthday, and falling RAM prices have allowed us to cut the price of the 2GB Raspberry Pi 4 to $35. You can buy one here.

  • The RedMonk Programming Language Rankings: January 2020 [Ed: Redmonk uses to assess programming languages use only projects that Microsoft (a Redmonk client) controls. Some 'research', eh?]
  • Announcing Rust 1.41.1

    The Rust team has published a new point release of Rust, 1.41.1. Rust is a programming language that is empowering everyone to build reliable and efficient software. If you have a previous version of Rust installed via rustup, getting Rust 1.41.1 is as easy as: rustup update stable If you don't have it already, you can get rustup from the appropriate page on our website.

  • This Week in Rust 327
  • Zip Files: History, Explanation and Implementation

    I have been curious about data compression and the Zip file format in particular for a long time. At some point I decided to address that by learning how it works and writing my own Zip program. The implementation turned into an exciting programming exercise; there is great pleasure to be had from creating a well oiled machine that takes data apart, jumbles its bits into a more efficient representation, and puts it all back together again. Hopefully it is interesting to read about too.

    This article explains how the Zip file format and its compression scheme work in great detail: LZ77 compression, Huffman coding, Deflate and all. It tells some of the history, and provides a reasonably efficient example implementation written from scratch in C. The source code is available in hwzip-1.0.zip.

    I am very grateful to Ange Albertini, Gynvael Coldwind, Fabian Giesen, Jonas Skeppstedt (web), Primiano Tucci, and Nico Weber who provided valuable feedback on draft versions of this material.

Netrunner Linux Still Goes Its Own Way at 'Twenty'

The Netrunner distro used to be a bleeding-edge choice among KDE options. With little that's new and must-have, this release takes the edge off the bleeding. I wasn't nudged away from my preferred competing KDE distro -- the new Feren OS Plasma edition. While Netrunner 20.01 provides a fairly solid integration of classic KDE desktop performance, this release is a departure, in that it is not a step or two ahead of most other KDE-integrated Linux OSes. I Netrunner attracts two types of typical users. One fancies a more friendly desktop environment. The second wants the freedom to tweak more extensively than other desktop environments allow. Hardware requirements include a minimum CPU of 1.6 GHz Intel Atom N270 or greater and at least 1 GB of RAM with at least 10 GB hard drive space. Also, the computer should have Intel GMA 945 graphics card support with 128+ MB of video memory. Netrunner is a unique distro with its own spin on the K Plasma desktop environment. Seasoned Linux users who like to fiddle and tweak an OS into their own platform will love how this distro integrates the KDE Plasma desktop. Newcomers can be quite content using the out-of-the-box settings. Read more

Wind River launches dev site with TensorFlow for Linux and a free VxWorks download

A new “Wind River Labs” developer site hosts projects including TensorFlow for Wind River Linux, the first free VxWorks SDK, and VxWorks BSPs for the Raspberry Pi and UP Squared. One would think that when Wind River decided to launch a public-facing developer site, it would showcase the Yocto Project based Wind River Linux, which is available in a GPL-licensed release on GitHub in addition to the standard commercial version and new continuous integration version. Yet when Wind River announced its new Wind River Labs site this week, its proprietary VxWorks was the star of the show — but with a twist. There’s a new free VxWorks SDK for evaluating the RTOS for non-commercial purposes, as well as open source VxWorks BSPs for the Raspberry Pi and UP Squared boards. Read more

Security, Proprietary Software and Openwashing

  • Linux 4.4.215 / 4.9.215 / 4.14.172 / 5.5.7 Kernels Bringing Intel KVM Security Fix

    A few days back we reported on a security vulnerability within Intel's KVM virtualization code for the Linux kernel. That vulnerability stems from unfinished kernel code and was fixed for Linux 5.6 Git and is now being back-ported to the 4.4 / 4.9 / 4.14 / 5.5 supported kernels. Back on Monday when the CVE-2020-2732 patches first came to light, little was publicly known about the issue but that it stemmed from incomplete code in the vmx_check_intercept functionality in not checking all possible intercepts and in turn could end up emulating instructions that should be disabled by the hypervisor.

  • Let's Encrypt Has Issued a Billion Certificates

    We issued our billionth certificate on February 27, 2020. We’re going to use this big round number as an opportunity to reflect on what has changed for us, and for the Internet, leading up to this event. In particular, we want to talk about what has happened since the last time we talked about a big round number of certificates - one hundred million. One thing that’s different now is that the Web is much more encrypted than it was. In June of 2017 approximately 58% of page loads used HTTPS globally, 64% in the United States. Today 81% of page loads use HTTPS globally, and we’re at 91% in the United States! This is an incredible achievement. That’s a lot more privacy and security for everybody. Another thing that’s different is that our organization has grown a bit, but not by much! In June of 2017 we were serving approximately 46M websites, and we did so with 11 full time staff and an annual budget of $2.61M. Today we serve nearly 192M websites with 13 full time staff and an annual budget of approximately $3.35M. This means we’re serving more than 4x the websites with only two additional staff and a 28% increase in budget. The additional staff and budget did more than just improve our ability to scale though - we’ve made improvements across the board to provide even more secure and reliable service. Nothing drives adoption like ease of use, and the foundation for ease of use in the certificate space is our ACME protocol. ACME allows for extensive automation, which means computers can do most of the work. It was also standardized as RFC 8555 in 2019, which allows the Web community to confidently build an even richer ecosystem of software around it. Today, thanks to our incredible community, there is an ACME client for just about every deployment environment. Certbot is one of our favorites, and they’ve been working hard to make it even easier for people to use.

  • The “Cloud Snooper” malware that sneaks into your Linux servers [Ed: Sophos citing itself, hyping up the threat is installing malicious software on one's own server]

    SophosLabs has just published a detailed report about a malware attack dubbed Cloud Snooper. The reason for the name is not so much that the attack is cloud-specific (the technique could be used against pretty much any server, wherever it’s hosted), but that it’s a sneaky way for cybercrooks to open up your server to the cloud, in ways you very definitely don’t want, “from the inside out”. The Cloud Snooper report covers a whole raft of related malware samples that our researchers found deployed in combination.

  • OpenSMTPD Email Server Vulnerability Threatens Many Linux and BSD Systems [Ed: It is this package, not the operating systems (GNU/Linux rarely uses this)]

    A critical vulnerability has been discovered in the OpenBSD email server OpenSMTPD. Exploiting the flaw could allow remote code execution attacks. The seriousness of the vulnerability poses a threat to the integrity of OpenBSD and Linux systems.

  • A billion Wi-Fi devices suffer from a newly discovered security fla

    More than a billion internet-connected devices—including Apple's iPhone and Amazon's Echo—are affected by a security vulnerability that could allow [attackers] to spy on traffic sent over Wi-Fi.

  • New ‘Haken’ Malware Found On Eight Apps In Google Play Store

    Eight apps – mostly camera utilities and children’s games – were discovered spreading a new malware strain that steals data and signs victims up for expensive premium services.

  •                            
  • What does it take to commit to 100% open source?
                                 
                                   

    While experts in the database market in particular agree that open source is becoming the norm, the question remains, just how open is this sector’s open-source software? Can software providers realistically succeed with a company that’s 100% open source? Furthermore, would a proprietary infrastructure software provider with a freemium tier be able to achieve the same benefits as those committing to open source?

                                   

    The short answer is, yes — a proprietary infrastructure software company with a freemium tier could theoretically achieve the same benefits as companies going fully open source. However, it’s important to recognize that it would take a freemium model company a significantly longer period of time for its software to mature to the same level as that of an open-source company. Also, the loss of collaborative development and slower feedback loops would likely lead to a higher probability of the software never achieving market traction and ultimately fading away into oblivion.

  • Mirantis: Balancing Open Source With Guardrails

    Mirantis, an open infrastructure company that rose to popularity with its OpenStack offering, is now moving into the Kubernetes space very aggressively. Last year, the company acquired the Docker Enterprise business from Docker. This week, it announced that they were hiring the Kubernetes experts from the Finnish company Kontena and established a Mirantis office in Finland, expanding the company’s footprint in Europe. Mirantis already has a significant presence in Europe due to large customers such as Bosch and Volkswagen.