At the end of Lindows setup, you have the option to create user accounts. Also, after setup, the standard KDE tool for managing users, KUser, is available in the Settings menu as User Manager. It's simple to create non-root users with this tool. Then, after the computer boots up, the KDM login manager prompts for a user name and password.
I highly recommend that you create a separate account for each person who will use the Lindows computer. For more on managing user accounts in Lindows, see my companion article on the Linux Journal Web site (www.linuxjournal.com/article/7166).
The Lindows Family License permits Lindows customers to install Lindows on multiple computers, as long as all the computers are in the customer's household. Click-N-Run has a section, My Products, that shows all software installed by the Click-N-Run user; this includes proprietary software licensed by the user. Any software the user has installed with Click-N-Run on a different computer is listed in a dim-grey font, while software installed on the current computer is shown in black. It's easy to click on grey packages and select them for downloading and installing on the current computer.
Thus, any proprietary software purchased using Click-N-Run actually is licensed for all Lindows computers in the purchaser's household. If you run proprietary software and your household has multiple computers, this license potentially could be a good deal.
Click-N-Run is the slickest package installation system I have seen yet in a Linux distribution, but you must pay a minimum of $50 per year to use it. The Lindows system is mostly smooth and polished, but a few rough edges remain.
If you read Linux Journal, it is unlikely that you will want to run Lindows on your own computer. But, it is a possibility that family members or friends would appreciate a Linux system designed for newbies. As long as you set them up to not run as root all the time, Lindows is a good choice.
Steve R. Hastings first used UNIX on actual paper teletypes. He enjoys bicycling with his wife, listening to music, petting his cat and making his Linux computers do new things.
|The True Internet of Things||Sep 02, 2015|
|September 2015 Issue of Linux Journal: HOW-TOs||Sep 01, 2015|
|September 2015 Video Preview||Sep 01, 2015|
|Using tshark to Watch and Inspect Network Traffic||Aug 31, 2015|
|Where's That Pesky Hidden Word?||Aug 28, 2015|
|A Project to Guarantee Better Security for Open-Source Projects||Aug 27, 2015|
- The True Internet of Things
- Using tshark to Watch and Inspect Network Traffic
- September 2015 Issue of Linux Journal: HOW-TOs
- Problems with Ubuntu's Software Center and How Canonical Plans to Fix Them
- Concerning Containers' Connections: on Docker Networking
- Firefox Security Exploit Targets Linux Users and Web Developers
- Where's That Pesky Hidden Word?
- A Project to Guarantee Better Security for Open-Source Projects
- Build a “Virtual SuperComputer” with Process Virtualization
- My Network Go-Bag