Language Selection

English French German Italian Portuguese Spanish

How my uncle became a Linux user

Filed under
Linux

It has been a month since my relatives from Bradford visited us here in Manchester. Our usual routine if they come to spend the holidays with us is to go to the gym to work out, to run on the treadmill and play pingpong. The best part of the workout, which we enjoy the most, is swimming afterwards. We get relaxed at the jacuzzi and then get hot and sweaty inside the sauna. It is a good exercise and offers relaxation after a stressful day of work. We have so much fun in the gym.

We arrived home around 8:00 pm after having a good round of walk in Manchester City Stadium. We were lucky to see the Manchester City football team; they had a match against Roma, so crowds were flooding in the streets. There were about a thousand spectators coming to watch the game who walked past us.
At home I prepared the meal. We had candlelights and red wine to enjoy while having our soup, vegetable salad and chicken for dinner; mango smoothies were the final dessert.

After the meal we chatted about the economy, healthcare, jobs, business, and technology in the U.K. I have learned a lot from Albert, my aunt's husband. He is an economist.

Albert explained to me that he was struggling with his PC. It was a brand new PC. It had a touchscreen and the laptop was thin and powerful. Albert's problem was not the laptop. As it turns out, his problem was Windows. The computer came with Windows 8. He already wasted a lot of money because shops exploited him. He did not even have an office suite installed. The computer was useless. He hardly used it. He hardly even had any files on it.

I then explained to Albert about GNU/Linux. I told him about Stallman and GNU. I also told him about the dirty tricks of Microsoft and about the true Bill Gates, including his involvement in GMO. Albert listened to me and he wanted to know more. I hope he learned something from me, just as I had learned from him.

The following morning I asked my husband for help. He was working all night and in the morning he was available to help Albert. Based on Roy's analysis, the machine was full of malware or some other mess. It was almost impossible to do anything with it. Windows 8 was hard to work with and it was hardly even possible to download and install a program like LibreOffice. The interface was confusing. It took ages to do very simple things.

Albert insisted that we should install GNU/Linux, but we didn't have a recent version of a distro at that time. Either way, Albert was so frustrated with Windows that he was willing to throw it all down the drain, along with his files.

This was my first time seeing Windows 8. I usually use Android or KDE. Microsoft Windows has become full of pop-ups, spam, marketing and other garbage. I am glad to use GNU/Linux and Albert will soon join us. By all means, Albert now wants to use Open Source and he already learns how to use LibreOffice.

More in Tux Machines

Linux firewalls: What you need to know about iptables and firewalld

A firewall is a set of rules. When a data packet moves into or out of a protected network space, its contents (in particular, information about its origin, target, and the protocol it plans to use) are tested against the firewall rules to see if it should be allowed through. Here’s a simple example... Read more

Mozilla: Firefox GCC/LLVM Clang Dilemma, September 2018 CA Communication and CfP

  • Fedora Firefox – GCC/CLANG dilemma
    After reading Mike’s blog post about official Mozilla Firefox switch to LLVM Clang, I was wondering if we should also use that setup for official Fedora Firefox binaries. The numbers look strong but as Honza Hubicka mentioned, Mozilla uses pretty ancient GCC6 to create binaries and it’s not very fair to compare it with up-to date LLVM Clang 6. Also if I’m reading the mozilla bug correctly the PGO/LTO is not yet enabled for Linux, only plain optimized builds are used for now…which means the transition at Mozilla is not so far than I expected.
  • September 2018 CA Communication
    Mozilla has sent a CA Communication to inform Certification Authorities (CAs) who have root certificates included in Mozilla’s program about current events relevant to their membership in our program and to remind them of upcoming deadlines. This CA Communication has been emailed to the Primary Point of Contact (POC) and an email alias for each CA in Mozilla’s program, and they have been asked to respond to the following 7 action items:
  • Emily Dunham: CFP tricks 1
    Some strategies I’ve recommended in the past for dealing with this include looking at the conference’s marketing materials to imagine who they would interest, and examining the abstracts of past years’ talks.

today's howtos

Security: Quantum Computing and Cryptography, Time to Rebuild Alpine Linux Docker Container

  • Quantum Computing and Cryptography
    Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would break the RSA cryptosystem for any key length. This is why cryptographers are hard at work designing and analyzing "quantum-resistant" public-key algorithms. Currently, quantum computing is too nascent for cryptographers to be sure of what is secure and what isn't. But even assuming aliens have developed the technology to its full potential, quantum computing doesn't spell the end of the world for cryptography. Symmetric cryptography is easy to make quantum-resistant, and we're working on quantum-resistant public-key algorithms. If public-key cryptography ends up being a temporary anomaly based on our mathematical knowledge and computational ability, we'll still survive. And if some inconceivable alien technology can break all of cryptography, we still can have secrecy based on information theory -- albeit with significant loss of capability. At its core, cryptography relies on the mathematical quirk that some things are easier to do than to undo. Just as it's easier to smash a plate than to glue all the pieces back together, it's much easier to multiply two prime numbers together to obtain one large number than it is to factor that large number back into two prime numbers. Asymmetries of this kind -- one-way functions and trap-door one-way functions -- underlie all of cryptography.
  • This New CSS Attack Restarts iPhones & Freezes Macs
  • Time to Rebuild Alpine Linux Docker Containers After Package Manager Patch
  • GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg