Spotlight on Linux: Zenwalk Linux 6.4 "Live"
Zenwalk Linux is a Slackware based distribution introduced in early 2004 that aims to be fast, easy, modern. Zenwalk tends to have a very loyal user-base in addition to leaving most distro hoppers and reviewers impressed. Most agree with Zenwalk's latest tagline: It just works.
It is quite an ambitious project as it offers and maintains five different editions. The Standard Edition is the flagship version for the project. It's a complete system for desktops, laptops, and servers. The Core Edition is a basic version of Linux with no X server, no graphical environment, and no applications. It's for those who like to build their own system their own way. The Live Edition is the installable Live CD that will boot any of 12 common languages. And finally, there are the alternative graphical environment editions: the GNOME Edition and the Openbox Edition.
The default desktop environment of Zenwalk is Xfce. Xfce is a likable alternative to GNOME and KDE because of its customization options, lighter weight, higher performance, and its familiar elements. Zenwalk also ships with a handy software stack covering all the more common computer tasks. It includes the Totem movie player, Brasero media burner, OpenOffice.org, The GIMP, Icecat / Icedove, Pidgin, and Geany. There are lots of handy system tools too, some of which are original to Zenwalk. All this sits on Linux 18.104.22.168, Xorg X Server 1.7.7, and GCC 4.4.4.
Zenwalk has its own package management system called Netpkg. It can be used at the command line or through its easy GUI. The Zenwalk repositories contain many other popular and useful applications as well as security and application updates.
The installer isn't as complete as some others, but once the target drive is prepared with a partition for Zenwalk and a swap partition there is very little work left. Define the target partition, set up a user, and select a root password, Zenwalk does the rest. Zenwalk still uses Lilo which many don't like, but that step can be skipped.
Advantages of using Zenwalk are good performance, small but welcoming community, and an up-to-date system. It's easy to use, yet it's not run of the mill. It's different without being disconcerting. Hardware support is excellent for Linux supported devices and the desktop is attractive yet unobtrusive.
Disadvantages might be a few niggles here and there. For example, one report states that updating the system can be resource intensive. Another complained that there were no advanced options during installation for LVM, RAID, and disk encryption. But most reports had nothing but good things to say.
Susan Linton is a Linux writer and the owner of tuxmachines.org.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide