Are There Any Evil Distros?
If you take a gander at the number of Linux distributions listed at Distrowatch, you'll find there are tons of "forks" and "offshoots" from one distribution to another. With Linux, we have the freedom to do that, but I'm curious if there are any Linux flavors that are truly offensive to people. There has been some controversial uprising in the past, but it begs the questions -- does the freedom to fork ever cross over into creepville?
Redhat got its fair share of grief when it took the grassroots Linux, and pushed it into the commercial realm. (Redhat may not have been the first to do this, I'm not entirely sure, but they were the most popular to do so back in the day). There are still some bitter feelings for Redhat by many folks. I think it's fair to say, however, that Redhat's commercial ventures pushed Linux into places it wouldn't have otherwise gone. So are they evil? Are they misguided? Or are they awesome?
In a very aggressive attempt to dethrone Microsoft, Linspire was controversially released as a Linux distribution that you paid for. It was a bit creepy for the Linux users of the day, because it felt dirty to do something like that. It had enough fanfare, both positive and negative, that Microsoft felt it pertinent to sue them out of their original "Lindows" name. While Lindows itself was largely a spit in the face of Microsoft, Linux users also felt a bit burned by the extremely commercial feel of it. Did that make them evil? Were they misguided? Or, were they awesome?
Ubuntu is the current king of the land. While it's still a newcomer, relatively speaking, Ubuntu has done amazing things in making Linux usable by the general population. Ubuntu, however, is only so amazing because it is based on Debian. The Ubuntu team hasn't made their product commercial by any means, but many people think they are unfairly taking credit for all the Debian footwork. Does that make Ubuntu wise? Or are they evil for using Debian as their base?
Even Ubuntu has its offshoots. Lots in fact. One of the more controversial ones is Linux Mint. Just like Ubuntu uses the Debian base, Linux Mint uses Ubuntu for the majority of their innards. Also like Ubuntu, Linux Mint adds a lot of new features and implements some fundamental changes -- but the Linux Mint team relies heavily on the work of the Ubuntu team. Does that make them efficient? Does it make them evil? Or doesn't it define them at all?
When we talk about Linux and Open Source, we always come back to the word "free". Ultimately, we are free to decide for ourselves if a given distro tactic is evil or innovative. We have the freedom to choose whether we find companies morally corrupt or fiscally efficient. Heck, we even have the freedom to disagree with each other. :)
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The US Government and Open-Source Software
- May 2016 Issue of Linux Journal
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- BitTorrent Inc.'s Sync
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide