Language Selection

English French German Italian Portuguese Spanish


First post-8.0 Zenwalk Current

Filed under

Here's the first post-8.0 "current" ISO. Along with many packages updates from upstream and Zenwalk, you'll get the MPV media player out of the box, some improvements in the setup (new disk partitioning dialog) and the ZenENCFS privacy folder encrypting tool (so that you won't have to put your hardware into the microwave oven any more to remain anonymous).

Read more

Salix Live Xfce 14.2 Beta 2 Released, Supports Booting on 64-bit UEFI Systems

Filed under

The Salix development team announced the release of the second Beta build of the upcoming Live Edition of the Salix Xfce 14.2 GNU/Linux distribution based on the Slackware 14.2 operating system.

Read more

Slackware-Based Superb Mini Server 2.0.9 Supports Let's Encrypt Certificates

Filed under

The developers of the Slackware-based, server-oriented Superb Mini Server (SMS) GNU/Linux distribution announced recently the release of the ninth maintenance update in the stable 2.0 series of the operating system.

Read more

Slackware Updates

Filed under
  • [Slackware] Sep ’16 Security fixes for Adobe Flash
  • Adobe is making a u-turn by resurrecting Flash Player for Linux
  • LibreOffice 5.2.1 for slackware-current

    The upgraded boost package in slackware-current last week had broken LibreOffice’s “localc” program. Which is typical because I compile LibreOffice with a “–without-system-boost” flag. Apparently a dependency on the system’s boost libraries gets added nevertheless. Patches to cure this behaviour are very welcome!

    Thus it became necessary to compile new packages for slackware-current. Co-incidentally there was also a new LibreOffice release last week: a minor upgrade to the 5.2 series, check out the announcement on the Document Foundation blog . And note their designation of this release: “LibreOffice 5.2.1, targeted at technology enthusiasts, early adopters and power users, provides a number of fixes over the major release announced in August. For all other users and enterprise deployments, TDF suggests LibreOffice 5.1.5 “.

ConnochaetOS 14.2 Officially Released Based on Slackware 14.2 and Salix Linux

Filed under

Henry Jensen from ConnochaetOS was happy and proud to announce the official release and general availability of the ConnochaetOS 14.2 GNU/Linux-libre operating system.

Read more

SlackEX Linux Live Now Powered by Linux Kernel 4.7.1, Based on Slackware 14.2

Filed under

Arne Exton informs us about the immediate availability for download of a new build of his Slackware-based SlackEX GNU/Linux operating system, version 160817, running the latest stable Linux kernel.

Read more

Zenwalk Linux 8.0 - A more Zen Slackware

Filed under

There were a few things I enjoyed about Zenwalk 8.0 and several I did not. Before getting to those, I want to acknowledge that Zenwalk is, in most ways, very much like Slackware. The two distributions are binary compatible and if you like (or dislike) one, you will probably feel the same way about the other. They're quite closely related with similar benefits and drawbacks.

On the positive side of things, I like that Zenwalk trims down the software installed by default. A full installation of Zenwalk requires about two-thirds of the disk space a full installation of Slackware consumes. This is reflected in Zenwalk's focused "one-app-per-task" approach which I feel makes it easier to find things. Zenwalk requires relatively little memory (a feature it shares with Slackware) and, with PulseAudio's plugin removed, consumes very few CPU cycles. One more feature I like about this distribution is the fact Zenwalk includes LibreOffice, a feature I missed when running pure Slackware.

On the other hand, I ran into a number of problems with Zenwalk. The dependency problems which annoyed me while running Slackware were present in Zenwalk too. To even get a working text editor I needed to have development libraries installed. To make matters worse, the user needs a text editor to enable the package manager to install development libraries. It's one of those circular problems that require the user to think outside the box (or re-install with all software packages selected).

Other issues I had were more personal. For example, I don't like window transparency or small fonts. These are easy to fix, but it got me off on the wrong foot with Zenwalk. I do want to acknowledge that while my first two days with Zenwalk were mostly spent fixing things, hunting down dependencies and tweaking the desktop to suit my tastes, things got quickly better. By the end of the week I was enjoying Zenwalk's performance, its light nature and its clean menus. I may have had more issues with Zenwalk than Slackware in the first day or so, but by the end of the week I was enjoying using Zenwalk more for my desktop computing.

For people running older computers, I feel it is worth noting Zenwalk does not offer 32-bit builds. The distribution has become 64-bit only and people who still run 32-bit machines will need to turn elsewhere, perhaps to Slackware.

In the end, I feel as though Zenwalk is a more focused flavour of Slackware. The Slackware distribution is multi-purpose, at least as suited for servers as desktops. Slackware runs on more processor architectures, has a live edition and can dump a lot of software on our hard disk. Zenwalk is more desktop focused, with fewer packages and perhaps a nicer selection of applications. The two are quite similar, but Slackware has a broader focus while Zenwalk is geared to desktop users who value performance.

Read more

Also: New Toolchain on Current

Linux Kernel 4.7 Now Unofficially Available for Slackware 14.2 and Derivatives

Filed under

In the good tradition of unofficial Linux kernel releases for Slackware-based GNU/Linux distribution, GNU/Linux developer Arne Exton informs us about the availability of the recently released Linux 4.7 kernel for Slackware 14.2 and its derivatives.

Read more

The saga continues with Slackware 14.2

Filed under

Slackware is the oldest surviving Linux distribution and has been maintained since its birth by Patrick Volkerding. Slackware has a well deserved reputation for being stable, consistent and conservative. Slackware is released when it is ready, rather than on a set schedule, and fans of the distribution praise its no-frills and no-fuss design. Slackware adheres to a "keep it simple" philosophy similar to Arch Linux, in that the operating system does not do a lot of hand holding or automatic configuration. The user is expected to know what they are doing and the operating system generally stays out of the way. The latest release of Slackware, version 14.2, mostly offers software updates and accompanying hardware support. A few new features offer improved plug-n-play support for removable devices and this release of Slackware ships with the PulseAudio software. PulseAudio has been commonly found in the audio stack of most Linux distributions for several years, but that is a signature of Slackware: adding new features when they are needed, not when they become available. In this case PulseAudio was required as a dependency for another package.

Slackware 14.2 is available in 32-bit and 64-bit builds for the x86 architecture. There is also an ARM build. While the main edition of Slackware is available as an installation disc only, there is a live edition of Slackware where we can explore a Slackware-powered desktop environment without installing the distribution. The live edition can be found on the Alien Base website. Both the live edition and the main installation media are approximately 2.6GB in size. For the purposes of this review I will be focusing on the main, installation-only edition.

Booting from the install media brings us to a text screen where we are invited to type in any required kernel parameters. We can press the Enter key to take the default settings or wait two minutes for the media to continue booting. A text prompt then offers to let us load an alternative keyboard layout or use the default "US" layout. We are then brought to a text console where a brief blurb offers us tips for setting up disk partitions and swap space. The helpful text says we can create partitions and then run the system installer by typing "setup".

Read more

SlackEX Is Based on Slackware 14.2, Ships with Linux Kernel 4.6.4 & KDE 4.14.21

Filed under

Today, July 14, 2016, Arne Exton informs us about the availability of a new build of his SlackEX Live Linux operating system, which has been rebased on the latest Slackware release.

Based on Slackware 14.2, powered by the latest and most advanced Linux 4.6.4 kernel with support for the latest hardware devices, and using the KDE Development Platform 4.14.21 that shipped with the KDE Applications 16.04.2 software suite, SlackEX Build 160711 is a 64-bit (x86_64) OS brings support for installation on USB flash drives.

Read more

Syndicate content

More in Tux Machines

Linux 4.8.4

I'm announcing the release of the 4.8.4 kernel. And yeah, sorry about the quicker releases, I'll be away tomorrow and as they seem to have passed all of the normal testing, I figured it would be better to get them out earlier instead of later. And I like releasing stuff on this date every year... All users of the 4.8 kernel series must upgrade. The updated 4.8.y git tree can be found at: git:// linux-4.8.y and can be browsed at the normal git web browser: Read more Also: Linux 4.7.10 Linux 4.4.27

New Releases: Budgie, Solus, SalentOS, and Slackel

  • Open-Source Budgie Desktop Sees New Release
    The pet parakeet of the Linux world, Budgie has a new release available for download. in this post we lookout what's new and tell you how you can get it.
  • Solus Linux Making Performance Gains With Its BLAS Configuration
    - Those making use of the promising Solus Linux distribution will soon find their BLAS-based workloads are faster. Solus developer Peter O'Connor tweeted this week that he's found some issues with the BLAS linking on the distribution and he's made fixes for Solus. He also mentioned that he uncovered these BLAS issues by using our Phoronix Test Suite benchmarking software.
  • SalentOS “Luppìu” 1.0 released!
    With great pleasure the team announces the release of SalentOS “Luppìu” 1.0.
  • Slackel "Live kde" 4.14.21
    This release is available in both 32-bit and 64-bit architectures, while the 64-bit iso supports booting on UEFI systems. The 64-bit iso images support booting on UEFI systems. The 32-bit iso images support both i686 PAE SMP and i486, non-PAE capable systems. Iso images are isohybrid.

Security News

  • Free tool protects PCs from master boot record attacks [Ed: UEFI has repeatedly been found to be both a detriment to security and enabler of Microsoft lock-in]
    Cisco's Talos team has developed an open-source tool that can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks. The tool, called MBRFilter, functions as a signed system driver and puts the disk's sector 0 into a read-only state. It is available for both 32-bit and 64-bit Windows versions and its source code has been published on GitHub. The master boot record (MBR) consists of executable code that's stored in the first sector (sector 0) of a hard disk drive and launches the operating system's boot loader. The MBR also contains information about the disk's partitions and their file systems. Since the MBR code is executed before the OS itself, it can be abused by malware programs to increase their persistence and gain a head start before antivirus programs. Malware programs that infect the MBR to hide from antivirus programs have historically been known as bootkits -- boot-level rootkits. Microsoft attempted to solve the bootkit problem by implementing cryptographic verification of the bootloader in Windows 8 and later. This feature is known as Secure Boot and is based on the Unified Extensible Firmware Interface (UEFI) -- the modern BIOS.
  • DDOS Attack On Internet Infrastructure
    I hope somebody's paying attention. There's been another big DDOS attack, this time against the infrastructure of the Internet. It began at 7:10 a.m. EDT today against Dyn, a major DNS host, and was brought under control at 9:36 a.m. According to Gizmodo, which was the first to report the story, at least 40 sites were made unreachable to users on the US East Coast. Many of the sites affected are among the most trafficed on the web, and included CNN, Twitter, PayPal, Pinterest and Reddit to name a few. The developer community was also touched, as GitHub was also made unreachable. This event comes on the heels of a record breaking 620 Gbps DDOS attack about a month ago that brought down security expert Brian Krebs' website, KrebsonSecurity. In that attack, Krebs determined the attack had been launched by botnets that primarily utilized compromised IoT devices, and was seen by some as ushering in a new era of Internet security woes.
  • This Is Why Half the Internet Shut Down Today [Update: It’s Getting Worse]
    Twitter, Spotify and Reddit, and a huge swath of other websites were down or screwed up this morning. This was happening as hackers unleashed a large distributed denial of service (DDoS) attack on the servers of Dyn, a major DNS host. It’s probably safe to assume that the two situations are related.
  • Major DNS provider Dyn hit with DDoS attack
    Attacks against DNS provider Dyn continued into Friday afternoon. Shortly before noon, the company said it began "monitoring and mitigating a DDoS attack" against its Dyn Managed DNS infrastructure. The attack may also have impacted Managed DNS advanced service "with possible delays in monitoring."
  • What We Know About Friday’s Massive East Coast Internet Outage
    Friday morning is prime time for some casual news reading, tweeting, and general Internet browsing, but you may have had some trouble accessing your usual sites and services this morning and throughout the day, from Spotify and Reddit to the New York Times and even good ol’ For that, you can thank a distributed denial of service attack (DDoS) that took down a big chunk of the Internet for most of the Eastern seaboard. This morning’s attack started around 7 am ET and was aimed at Dyn, an Internet infrastructure company headquartered in New Hampshire. That first bout was resolved after about two hours; a second attack began just before noon. Dyn reported a third wave of attacks a little after 4 pm ET. In all cases, traffic to Dyn’s Internet directory servers throughout the US—primarily on the East Coast but later on the opposite end of the country as well—was stopped by a flood of malicious requests from tens of millions of IP addresses disrupting the system. Late in the day, Dyn described the events as a “very sophisticated and complex attack.” Still ongoing, the situation is a definite reminder of the fragility of the web, and the power of the forces that aim to disrupt it.
  • Either IoT will be secure or the internet will be crippled forever
    First things first a disclaimer. I neither like nor trust the National Security Agency (NSA). I believe them to be mainly engaged in economic spying for the corporate American empire. Glenn Greenwald has clearly proven that in his book No Place to Hide. At the NSA, profit and power come first and I have no fucking clue as to how high they prioritize national security. Having said that, the NSA should hack the Internet of (insecure) Things (IoT) to death. I know Homeland Security and the FBI are investigating where the DDoS of doomsday proportions is coming from and the commentariat is already screaming RUSSIA! But it is really no secret what is enabling this clusterfuck. It’s the Mirai botnet. If you buy a “smart camera” from the Chinese company Hangzhou XiongMai Technologies and do not change the default password, it will be part of a botnet five minutes after you connect it to the internet. We were promised a future where we would have flying cars but we’re living in a future where camera’s, light-bulbs, doorbells and fridges can get you in serious trouble because your home appliances are breaking the law.
  • IoT at the Network Edge
    Fog computing, also known as fog networking, is a decentralized computing infrastructure. Computing resources and application services are distributed in logical, efficient places at any points along the connection from the data source (endpoint) to the cloud. The concept is to process data locally and then use the network for communicating with other resources for further processing and analysis. Data could be sent to a data center or a cloud service. A worthwhile reference published by Cisco is the white paper, "Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are."
  • Canonical now offers live kernel patching for Ubuntu 16.04 LTS users
    Canonical has announced its ‘Livepatch Service’ which any user can enable on their current installations to eliminate the need for rebooting their machine after installing an update for the Linux kernel. With the release of Linux 4.0, users have been able to update their kernel packages without rebooting, however, Ubuntu will be the first distribution to offer this feature for free.
  • ​The Dirty Cow Linux bug: A silly name for a serious problem
    Dirty Cow is a silly name, but it's a serious Linux kernel problem. According to the Red Hat bug report, "a race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system."
  • Ancient Privilege Escalation Bug Haunts Linux
  • October 21, 2016 Is Dirty COW a serious concern for Linux?
  • There is a Dirty Cow in Linux
  • Red Hat Discovers Dirty COW Archaic Linux Kernel Flaw Exploited In The Wild
  • Linux kernel bug being exploited in the wild
  • Update Linux now: Critical privilege escalation security flaw gives hackers full root access
  • Linux kernel bug: DirtyCOW “easyroot” hole and what you need to know
  • 'Most serious' Linux privilege-escalation bug ever discovered
  • New 'Dirty Cow' vulnerability threatens Linux systems
  • Serious Dirty Cow Linux Vulnerability Under Attack
  • Easy-to-exploit rooting flaw puts Linux PCs at risk
  • Linux just patched a vulnerability it's had for 9 years
  • Dirty COW Linux vulnerability has existed for nine years
  • 'Dirty Cow' Linux Vulnerability Found
  • 'Dirty Cow' Linux Vulnerability Found After Nine Years
  • FakeFile Trojan Opens Backdoors on Linux Computers, Except openSUSE
    Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with a new trojan named FakeFile, currently distributed in live attacks. Russian antivirus vendor Dr.Web discovered this new trojan in October. The company's malware analysts say the trojan is spread in the form of an archived PDF, Microsoft Office, or OpenOffice file.

today's howtos