Language Selection

English French German Italian Portuguese Spanish

I been Buffalo'd

Filed under
Reviews

Buffalo Linux 1.7.3 was released on May 10 and it sounded quite interesting. I'd visted their website a couple times in the past but never installed this oddly named distro. Now with the site up and running I thought the time was right.

The boot up of the new livecd format seems to go well detecting most hardware, loading up necessary modules, and configurations. I could tell almost immediately this distro must be based on slackware, then the interactive configuration dialogues confirmed this.

All seemed to be going fine until it tried to autologin into an X environment. All I got was a big tan screen of nothing else. The mouse responded, but nothing else would. I couldn't kill X or ctrl+alt+Fx to terminal. After seeing all my partitions mounted during boot all I could do was hit reset. Bad bad Buffalo mounting all partitions without asking. Luckily no perceivable damage detected as of yet after fsck. Time will tell for sure tho.

I had one other distro just boot to a blank X screen like that, but I can't remember which one it was now. I wanted to blame it on my video card at first, then remembered that damn small and even pcbsd had no trouble with it. So, I don't know what's up with Buffalo, but I'm gonna be a little shy about wanting to test future releases unless the author turns off that mounting all partitions thing.

Buffalo ain't the only livecd that mounts all the partitions automagically. I think this is a very dangerous trend. Oh I see the reason for it, user-friendliness. But I think somewhere the line needs to be drawn. Why not place an icon on the desktop to a script that mounts them after boot? I'd be making a bigger stink about all this had I lost some important data. Down with auto-mount! Big Grin Down with auto-mount. Come on, protest with me...

If anyone else would like to review and post screenshots of Buffalo, they'd be most welcome to submit. Another distro that I wanted to review but was not able to boot was flonix. If you have a review of flonix, please submit. Smile

More in Tux Machines

MongoDB IPO

Graphics: Mesa 17.2.3, Libinput 1.9 and More

  • mesa 17.2.3
    Mesa 17.2.3 is now available. In this release we have: The Vulkan drivers ANV and RADV have multiple small fixes. The EGL code has improved handling of the new wl_dmabuf codepath. SWR no longer crashes when checking environment variables. Other gallium drivers have also seen updates - freedreno, nouveau and radeonsi. The gallivm module, used by llvmpipe et al. has gained little endian PPC64 fixes.
  • Mesa 17.2.3 Offers Vulkan Fixes, Gallium3D Updates
    Mesa 17.2.3 is now available as the latest bi-weekly update for this current stable driver series.
  • [ANNOUNCE] libinput 1.9.0
    libinput 1.9 is now available. As expected, not a lot of changes since the rc2: a few test fixes, a fix to stop excessive logging and an extra assert so we fail early in case of a bug.
  • Libinput 1.9 Released With Input Improvements, Requires Meson
    Peter Hutterer has today released libinput 1.9.0 as the latest version of this library used by both Wayland and X11 systems for unified input handling.
  • DRM Leasing Support To Land For Linux 4.15
  • Intel OpenGL Shader Cache Revised Once More
    The long ongoing work to implement an OpenGL/GLSL shader cache for the Intel Mesa driver has been revised once more with 32 new patches hitting the mailing list today.

Linux 4.13.8, 4.9.57, 4.4.93, 3.18.76 and Ubuntu Kernel Team Summary

Security: FUD, Adobe, Cybersecurity Improvement Act, Updates and More

  • Focusing on Healthcare Open Source Security Awareness [Ed: More Flexera marketing in the form of scare-mongering]
  • Adobe patches zero-day vulnerability used to plant gov't spying software
    Adobe has patched a zero-day vulnerability used by the BlackOasis APT to plant surveillance software developed by Gamma International. On Monday, researchers from Kaspersky Lab revealed the new, previously unknown vulnerability, which has been actively used in the wild by advanced persistent threat (APT) group BlackOasis.
  • IoT Cybersecurity: What's Plan B?
    In August, four US Senators introduced a bill designed to improve Internet of Things (IoT) security. The IoT Cybersecurity Improvement Act of 2017 is a modest piece of legislation. It doesn't regulate the IoT market. It doesn't single out any industries for particular attention, or force any companies to do anything. It doesn't even modify the liability laws for embedded software. Companies can continue to sell IoT devices with whatever lousy security they want.
  • Security updates for Wednesday
  • Security updates for Thursday
  • Abuse of RESTEasy Default Providers in JBoss EAP
    Red Hat JBoss Enterprise Application Platform (EAP) is a commonly used host for Restful webservices. A powerful but potentially dangerous feature of Restful webservices on JBoss EAP is the ability to accept any media type. If not configured to accept only a specific media type, JBoss EAP will dynamically process the request with the default provider matching the Content-Type HTTP Header which the client specifies. Some of the default providers where found to have vulnerabilities which have now been removed from JBoss EAP and it's upstream Restful webservice project, RESTEasy.
  • “Security concerns” lead to LTE service shutdown on Chinese Apple Watches