Language Selection

English French German Italian Portuguese Spanish

Windows to Ubuntu Transition Guide

Filed under
Ubuntu

Alright, so you have successfully installed Ubuntu Linux, but now what do you do with it? You are in the right place. I am going to get you started with a guide on how to use your new Ubuntu system.

This transition guide is targeted at existing Windows users and will show you how to do program installations, a little system configuration, but primarily highlight some Windows "replacement" programs for common applications you can't live without. This guide's intent is to introduce you to equivalent programs to what you are accustomed to and, hopefully, to cover a good amount of what you might want in a new install.

Topic include:


  • Configuring and using Synaptic Package Manager to install applications

  • Installing common packages with Automatix

  • Essential desktop, office, and Internet applications

  • Playing movies and music

  • Games

  • Digital cameras, printing, and burning

  • Installing a PHP and MySQL enabled Apache web server

  • Development tools

  • Installing and configuring a firewall

  • Setting up remote desktop connection

  • Setting up a streaming music server

Full Story.

More in Tux Machines

Leftovers: Gaming

Leftovers: KDE/Qt

Leftovers: OSS

Security Leftovers

  • DNS server attacks begin using BIND software flaw
    Attackers have started exploiting a flaw in the most widely used software for the DNS (Domain Name System), which translates domain names into IP addresses. Last week, a patch was issued for the denial-of-service flaw, which affects all versions of BIND 9, open-source software originally developed by the University of California at Berkeley in the 1980s.
  • Researchers Create First Firmware Worm That Attacks Macs
    The common wisdom when it comes to PCs and Apple computers is that the latter are much more secure. Particularly when it comes to firmware, people have assumed that Apple systems are locked down in ways that PCs aren’t. It turns out this isn’t true. Two researchers have found that several known vulnerabilities affecting the firmware of all the top PC makers can also hit the firmware of MACs. What’s more, the researchers have designed a proof-of-concept worm for the first time that would allow a firmware attack to spread automatically from MacBook to MacBook, without the need for them to be networked.