While I am not new to Linux, I still have some confusion. My dilemma is: "What distro to use and why?" I have tried various flavors of Linux, but I am still a little baffled about which distro I should choose. One of my hurdles is my laptop, because it has a broadcom chipset for the wireless card, but I did get it working once with Fedora, so I know it is possible. What really makes one distro better than the other? They all use the same basic kernel, KDE, or Gnome, have a package manager, etc., right?
So, which distro and why?
BTW, love your magazine.
As a magazine for the whole Linux community, we try to avoid choosing sides in the great distribution debate.
The choice of a favorite Linux flavor is often a matter of taste. Some distros offer access to a huge variety of applications out of the box, and others attempt to add value by simplifying the menus to reduce clutter. Some are targeted for home users, whereas others are outfitted for business. And each Linux has a distinctive visual style.
The installers are getting better at finding hardware, so some of the hardware detection differences between the distributions are disappearing. Still, getting Linux to work with your devices is one of the biggest challenges, so if you have a distribution that works well with your hardware, and you are satisfied with it, why not keep using it?
If you feel like experimenting, the Live boot option included with many Linux variants will provide a convenient preview of how the Linux release will work with your system.
I noticed that there were no sections solely dedicated to security practices for desktop and server usage as a whole, although you do have some articles pertaining to security lessons in the Sysadmin section.
It would be nice to have a "Security Practices" section for the casual desktop user and the beginner/novice system administrator.
Buy this article as PDF
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.