Language Selection

English French German Italian Portuguese Spanish

Taking Puppy for a short walk

Filed under
Linux
Reviews
-s

Puppy 2.0 was released several days ago and I'd been quite anxious to find the time to look at it. This major release brings about some significant changes to the underlying code as well as some visible changes - most notably the mozilla-seamonkey suite and kernel 2.6.16.7.



There aren't a whole lot of gui changes, although we now have a new background. Again, it's a tranquil generic skyscape, but this time it does state the distro and version number. The desktop holds a few more icons than previously for convenient access to some of the more commonly used applications like inkscape, xine, and gnumeric. You immediately know that your sound is working from the "woof woof" one hears when their desktop appears with an introduction in dillo.

        

The developers state that they've completely rewritten the whole startup process and indicate they've improved hardware detection. Although I still had to run the "connect" script upon boot, it did detect my ethernet card and obtain a lease from my dhcpd server. Another change this release is the ram recommendation. Previously 128mb was recommended, but the developers now state this might be a bit low to run the heavier applications such as seamonkey.

Some of the listed changes include:

  • Redesign of the underlying architecture of Puppy for streamlined
    booting from any media, running in a wide range of environments, and
    installation to any media, including CD/DVD, hard drive, USB, Zip.
  • Total rewrite of the boot and shutdown scripts for maximum flexibility.
    No longer does Puppy automatically create a personal save-file on the
    hard drive -- now you are in control and choose exactly where you want it
    (note, you make the choice at the first shutdown). You can even save
    personal files/settings to a floppy disk!
  • Total rewrite of the main Wizards, in particular the Puppy Universal Installer and the CD/DVD Simple Remaster Wizards.
  • Mozilla SeaMonkey suite, with web browser, composer, mail & news and addressbook.
  • Inkscape vector editor.
  • GParted graphical drive partitioning tool.
  • Geany editor replaces the aging Beaver.
  • Perl v5.8.0.
  • Great little applets for the taskbar, to display free memory, volume control, network status.
  • There is considerably more automatic hardware detection, with loading of the correct kernel modules.
  • Kernel version 2.6.16.7.
  • working automatic mouse detection
  • Automatic serial modem detection for true hardware modems
  • Pupsafe - a layer of protection above root.
  • ALSA replaces OSS
  • Bash as default shell
  • Many more little utility applications

        

Control Panel, Setup apps, and Utilities

        

Information Managers, Help File, and Search Tools

        

Multimedia Apps, Games, and File Managers

        

Internet Apps, Networking Tools, and Graphic Processing

    

Word Processors and Mozilla Seamonkey

There are a lot of terrific improvements, especially with hardware detection and setup. It is still the same small fast useful distro to which we've grown accustommed while being updated with a modern kernel and other great additions. Despite ho hum appearances, it's a great little distro and has a fine selection of tools and apps that can be used as a rescue system, to resurrect older computers, or as an everyday workhorse.

Puppy Homepage.
Download Puppy 2.0.
Previous Coverage.

More in Tux Machines

Phoronix on Graphics

Leftovers: OSS

Security Leftovers

  • Security updates for Thursday
  • OpenSSL patches two high-severity flaws
    OpenSSL has released versions 1.0.2h and 1.0.1t of its open source cryptographic library, fixing multiple security vulnerabilities that can lead to traffic being decrypted, denial-of-service attacks, and arbitrary code execution. One of the high-severity vulnerabilities is actually a hybrid of two low-risk bugs and can cause OpenSSL to crash.
  • Linux Foundation Advances Security Efforts via Badging Program
    The Linux Foundation Core Infrastructure Initiative's badging program matures, as the first projects to achieve security badges are announced.
  • Linux Foundation tackles open source security with new badge program
  • WordPress Plugin ‘Ninja Forms’ Security Vulnerability
    FOSS Force has just learned from Wordfence, a security company that focuses on the open source WordPress content management platform, that a popular plugin used by over 500,000 sites, Ninja Forms, contains serious security vulnerabilities.
  • Preparing Your Network for the IoT Revolution
    While there is no denying that IP-based connectivity continues to become more and more pervasive, this is not a fundamentally new thing. What is new is the target audience is changing and connectivity is becoming much more personal. It’s no longer limited to high end technology consumers (watches and drones) but rather, it is showing up in nearly everything from children’s toys to kitchen appliances (yes again) and media devices. The purchasers of these new technology-enabled products are far from security experts, or even security aware. Their primary purchasing requirements are ease of use.
  • regarding embargoes
    Yesterday I jumped the gun committing some patches to LibreSSL. We receive advance copies of the advisory and patches so that when the new OpenSSL ships, we’re ready to ship as well. Between the time we receive advance notice and the public release, we’re supposed to keep this information confidential. This is the embargo. During the embargo time we get patches lined up and a source tree for each cvs branch in a precommit state. Then we wait with our fingers on the trigger. What happened yesterday was I woke up to a couple OpenBSD developers talking about the EBCDIC CVE. Oh, it’s public already? Check the OpenSSL git repo and sure enough, there are a bunch of commits for embargoed issues. Pull the trigger! Pull the trigger! Launch the missiles! Alas, we didn’t look closely enough at the exact issues fixed and had missed the fact that only low severity issues had been made public. The high severity issues were still secret. We were too hasty.
  • Medical Equipment Crashes During Heart Procedure Because of Antivirus Scan [Ed: Windows]
    A critical medical equipment crashed during a heart procedure due to a timely scan triggered by the antivirus software installed on the PC to which the said device was sending data for logging and monitoring.
  • Hotel sector faces cybercrime surge as data breaches start to bite
    Since 2014, things have become a lot more serious with a cross section of mostly US hotels suffering major breaches during Point-of-Sale (POS) terminals. Panda Security lists a string of attacks on big brands including on Trump Hotels, Hilton Worldwide, Hyatt, Starwood, Rosen Hotels & Resorts as well two separate attacks on hotel management outfit White Lodging and another on non-US hotel Mandarin Oriental.

Android Leftovers