Manufacturer: NexTrend Technology, Inc.
Price: $1419 US with 17" Monitor $1139 US without
Reviewer: Jason Kroll
Successful PC manufacturer NexTrend has begun offering complete, pre-installed Linux systems based on Caldera OpenLinux 2.2. The systems arrive completely configured for all hardware and even the X Window System, and are available in a variety of configurations based on different processors and hardware components. The systems include everything one expects in a computer, including keyboard, mouse, shielded speakers, the computer itself and a bunch of mysterious manuals, screws and bubble wrap (tension sheets?)--the typical things that come with computers, some of which we never figure out how to use (for example, the free Windows software that comes with your Linux box).
The real question is, what's the very best thing about this computer? It's turquoise. Actually, the particular machine NexTrend sent to our product testing lab has a Pentium III 500MHz CPU, an 8.4GB drive and 128MB of RAM, which are also nice. To be honest, this machine is actually quite loaded. Still, if you order one, you can have more or less any configuration, as far as I know. The true question, aside from the color, is how well the Linux system operates.
It looks like a Macintosh, but we all knew that about turquoise-colored machines running KDE. Still, what with the color of the machine (perhaps more accurately described as teal), it feels particularly inviting, on top of which Caldera OpenLinux 2.2 is a tight, clean distribution which includes a lot of productivity software preconfigured into the menuing system (such as Netscape, WordPerfect 8.0 and Star Office 5). COAS (Caldera Open Administration System) is a small, fast program for dealing with things ranging from system administration to machine-specific hardware configuration, and even includes a loader for kernel modules. Taken on the whole, Caldera OpenLinux 2.2 fits very nicely on the home desktop computer, and while it is known as “Linux for Business”, the important point is it works, is easy to use and comes with a lot of software, though still no pico.
Although Caldera has about the easiest installer going, one way around the alleged difficulty of Linux installation is to buy a pre-installed system. The NexStar system is completely configured, with an optimal kernel and dozens of modules. Everything works on this machine, from the XF86Config file, to the Sound Blaster 64AWE card, the 56K modem, the Intel 8460B Ethernet card, the 48X speed CD-ROM drive, the Iomega ZIP drive (though this is not pre-configured into fstab), the floppy drive, the 8.4GB hard drive (okay, if this didn't work, there'd be a problem), the ATI AGP 8MB video card, etc. XF86Config is ideally configured for the optional CyberVision monitor in both 800x600 (84Hz) and 1024x768 (70Hz) modes (I added a nice 1152x864 mode at 69Hz), though libvga.config is not configured (just copy data from XF86Config). The video timings are more or less perfectly matched to the monitor, and when the system is up and running, it's quite neat. However, it is possible to make a mess of things.
The one annoyance in OpenLinux 2.2 is that once you have “shutdown” KDE to console mode, you cannot get it up again. startx and kde just start up a bare X screen and the client has authority issues connecting to the server, so all you get to do is move an X over a test pattern. Typing telinit 5 won't solve this problem, but you can reboot or else just remember not to shut down KDE. The remedy, an update of XFree86, is available on Caldera's web site. OpenLinux 2.2 has the feel one expects of a professional Linux system, and COAS is truly neat. While hackers often like Slackware, and SuSE, Debian GNU/Linux, and the ubiquitous Red Hat are also superb choices, Caldera OpenLinux 2.2 is ideal for the user who wants a pre-installed system—it has a lot of software organized neatly into KDE's menus, is a complete system and truly feels like one. NexTrend's selection of OpenLinux is a point to consider when deciding which Linux PC maker to choose, if for example you're bored with Red Hat.
No computer review is complete without some benchmarks, but we haven't finished our custom benchmark software, so it's time for benchmark trivia. The cat /proc/cpuinfo command reports 498.07 bogomips; the Crafty chess engine evaluates about 190,000 positions per second; bonnie reports block writing at 21533KB/sec and block input at 14684KB/sec, and BYTEmark evaluates the system to have a memory index of 2.082, an integer index of 1.794, and a floating-point index of 4.603 (compared to AMDK6/233). It took 3.5 minutes to make bzImage for a 462KB kernel.
Many machines are out there, so be sure to shop around, and if you order from NexTrend, make sure they still put Linux boxes in these cool, teal shells.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- The US Government and Open-Source Software
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide