Reconstructor: When You Lose Your Restore CD
I have an original Asus EeePC 701 4G. I've talked about it and written about it before. I tend to like a full operating system on the Eee, and have had several different Linux distributions installed on it. I'm constantly looking for the best mix of form and function. It turns out, however, that my kids really like the original Xandros based operating system that comes with the EeePC. Unfortunately, I lost my original restore DVD that came with the computer. Since it's Linux, you wouldn't think that would be a problem. Unfortunately, it is.
I'm sure Asus has their reasons for not allowing a download of the restore ISO. Perhaps they are under some legal obligation to keep it off the digital shelves. Sadly, I think they've lost one of the more powerful aspects of incorporating a free operating system on their computers. Why not provide an ISO image of the OS installer for download? As it stands now, I can't put Xandros back onto my EeePC. Thankfully, there are alternatives.
One interesting option is to create a custom Ubuntu based distribution. Reconstructor, a project on SourceForge, allows you to start with Ubuntu, and then create a customized operating system that you can install, or even redistribute if you like. (Assuming you don't customize it by adding software that is illegal to redistribute. For those, you'd want to make a script to install them post-install anyway. I suspect if Asus did something like that, they would be able to redistribute their restore CD.)
Some of the things you can customize with reconstructor are:
- Change the boot image
- Create a custom Gnome splash screen
- Change the default desktop background
- Customize icons on the desktop (like adding a script to install things that can't be redistributed)
- Enter a chroot environment, to change system settings for the installed base
- Customized installed packages
Those are some powerful changes, albeit for the most part they're rather superficial. Reconstructor goes even further, however, and gives you a powerful module mechanism so that other users can contribute pre-scripted code to make customization even easier. As of this writing, there are 134 modules available that others have contributed. Some simply add a package to the default install, and others make significant changes to the underlying installable OS.
So if you're like me, and tend to install operating systems all the time, you might want to consider creating a pre-configured Ubuntu distribution. You can customize it to reflect the way you use a computer, and always have a restore CD available. Even if you lose the one that comes with your laptop, like I did.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Humble Hacker?
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide