Exploring the Gentoo File Manager
ONE FOR ALL
KDE users choose Konqueror, Gnomers use Nautilus, and commandline
fans extol the virtues of Midnight Commander. Gentoo gives you
the best of all these worlds – a desktop independent file manager.
Many Linux users primarily associate
the name Gentoo with a
popular do-it-yourself distribution.
In fact, the distribution has nothing
to do with the file manager of the same
name. As the file manager’s homepage
tells you , both projects are aware
that they share a name, and neither of
them minds. This would be unthinkable
for commercial software, but it works
fine for Gentoo. Both Gentoos have
something in common, flexibility! The
file manager gives you an enormous
range of configuration options to meet
your needs, and that makes it an indispensable
companion on your desktop.
Many distributions, including Suse,
Debian, or Mandrake Linux, have their
own Gentoo packages, so you can use
your distro’s package manager to install
Gentoo. If your distribution
does not have a
binary, or if you prefer
to use the latest Version
0.11.54, you will
need to build from the
source code. After
archive from ,
unpack the file and
change to the directory
that this step creates.
Gentoo is based on the
Gimp Toolkit (gtk),
version 1.2.x, so you
will need the matching
developer packages to
build and install the
file manager. Make sure the requirements
are fulfilled, and then go on to
build and install Gentoo with the normal
three commands: ./configure, make, and
su -c “make install”.
Buy this article as PDF
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.