Language Selection

English French German Italian Portuguese Spanish

SparkyLinux 2020.02 Brings More Goodies from Debian GNU/Linux 11 “Bullseye”

Filed under
Debian

Using the Linux 5.4.13 kernel by default, SparkyLinux 2020.02 comes with up-to-date packages from the software repositories of the upcoming Debian GNU/Linux 11 “Bullseye” operating system. The entire system was synced with the Debian Testing repos as of February 9th, 2020.

If they want a newer kernel, users will also be able to install the latest and most advanced Linux 5.5.2 kernel, as well as the first RC (Release Candidate) of the upcoming Linux 5.6 kernel. Both kernels are available in SparkyLinux’s unstable repositories.

Included in the SparkyLinux 2020.02 release, there’s also the Calamares 3.2.18 graphical installer, Mozilla Firefox 72.0.2 web browser, Mozilla Thunderbird 68.4.2 email and news client, LibreOffice 6.4 office suite, VLC 3.0.8 media player, and Exaile 4.0.2 audio player.

Read more

Sparky 2020.02

  • Sparky 2020.02

    Sparky 2020.02 “Po Tolo” of the (semi-)rolling line is out. It is based on the testing branch of Debian “Bullseye”.

    Changes:
    * system upgraded from Debian testing “Bullseye” repos as of February 9, 2020
    * Calamares installer 3.2.18
    * Linux kernel 5.4.13 as default (5.5.2 & 5.6-rc1 in Sparky unstable repos)
    * Firefox 72.0.2
    * Thunderbird 68.4.2
    * LibreOffice 6.4.0
    * VLC 3.0.8
    * Exaile 4.0.2, etc.
    * added the new Sparky public key

SparkyLinux 2020.02 "LXQt" overview | powered by debian

SparkyLinux 2020.02 MATE Run Through

SparkyLinux 2020.02 GameOver, Multimedia and Rescue Editions

  • SparkyLinux 2020.02 GameOver, Multimedia and Rescue Editions Are Out Now

    Released last week on February 10th, SparkyLinux 2020.02 brought updated components from the Debian GNU/Linux 11 “Bullseye” software repositories. It shipped with Xfce, MATE, LXQt, Openbox (MinimalGUI), and MinimalCLI (text-mode) editions.

    Now, the SparkyLinux 2020.02 GameOver, Multimedia and Rescue special editions are available for download as well. They’re also based on the Debian GNU/Linux 11 “Bullseye” repos, but include special software components.

    While the GameOver edition comes preloaded with numerous games, the Multimedia edition contains a collections of utilities for audio, graphics, and video creation, and the Rescue edition brings useful tools for system maintenance and repair.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security Leftovers

  • This Bluetooth Attack Can Steal a Tesla Model X in Minutes

    Lennert Wouters, a security researcher at Belgian university KU Leuven, today revealed a collection of security vulnerabilities he found in both Tesla Model X cars and their keyless entry fobs. He discovered that those combined vulnerabilities could be exploited by any car thief who manages to read a car's vehicle identification number—usually visible on a car's dashboard through the windshield—and also come within roughly 15 feet of the victim's key fob. The hardware kit necessary to pull off the heist cost Wouters around $300, fits inside a backpack, and is controlled from the thief's phone. In just 90 seconds, the hardware can extract a radio code that unlocks the owner's Model X. Once the car thief is inside, a second, distinct vulnerability Wouters found would allow the thief to pair their own key fob with the victim's vehicle after a minute's work and drive the car away.

  • Ransomware gangs likely to start monetising stolen data: researcher

    Ransomware gangs have shown themselves to be an innovative lot, incorporating more and more tactics as they look to extort money from their victims and this trend will continue into the new year, a veteran researcher of this brand of malware says.

  • Victory! Court Protects Anonymity of Security Researchers Who Reported Apparent Communications Between Russian Bank and Trump Organization

    Security researchers who reported observing Internet communications between the Russian financial firm Alfa Bank and the Trump Organization in 2016 can remain anonymous, an Indiana trial court ruled last week.

    The ruling protects the First Amendment anonymous speech rights of the researchers, whose analysis prompted significant media attention and debate in 2016 about the meaning of digital records that reportedly showed computer servers linked to the Moscow-based bank and the Trump Organization in communication.

    Imagine walking down the street, looking for a good cup of coffee. In the distance, a storefront glows in green through your smart glasses, indicating a well-reviewed cafe with a sterling public health score. You follow the holographic arrows to the crosswalk, as your wearables silently signal the self-driving cars...

    Despite widespread complaints about its effects on human rights, the Brazilian Senate has fast-tracked the approval of “PLS 2630/2020”, the so-called “Fake News” bill. The bill lacked the necessarily broad and intense social participation that characterized the development of the 2014 Brazilian Civil Rights...

  • Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

    Despite their importance, Unix/Linux local and privileged accounts often don’t get sufficient oversight in a centralized PAM strategy. True, the Unix/Linux userbase is typically more technically savvy and has a greater understanding of security than your typical user. In some ways, Unix/Linux actually led the move toward PAM decades ago. The problem is, not much has changed in decades. They still heavily rely on their own methods for privileged management, such as Sudo controls, and are still using Sudo with few differences from when it was first introduced. No matter how savvy the user, Unix/Linux privileged accounts are time-consuming and tedious to manage, so they often don’t get sufficient oversight. In addition, when it comes time for an audit, it’s extremely difficult to piece together all of the privileged account activities and security controls. You might have one report for Windows and Mac and a separate one or many for Unix/Linux. You can’t get a consolidated view of risk to use for decision-making or show progress to your auditors.

  • Strange case of the art dealer, the tech billionaire, his email and Picasso’s lover

    The only problem, a judge said yesterday, is that Allen may not have written the email. In fact, Mr Justice Trower said, evidence pointed to the email having been fabricated “for the purpose of misleading the court”.

Android Leftovers

Compact embedded system runs Linux on i.MX8M

MiTac’s fanless “ME1-108T” embedded computer runs Linux on an up to quad-core i.MX8M with up to 4GB LPDDR4, up to 32GB eMMC, 2x GbE, 3x USB, and HDMI, DP, serial, mini-PCIe, and 40-pin RPi GPIO. ICP Germany announced the launch of MiTac’s compact ME1-108T embedded system. Although we have reported on dozens of compute modules and SBCs that run Linux on NXP’s dual- or quad-core, Cortex-A53 i.MX8M, the ME1-108T appears to be only the second embedded system using the SoC after Axiomtek’s Agent336. Read more

today's howtos

  • Shading in Blender – Linux Hint

    Shading is an act of adding shade to a drawn object to give it a look and a perception of depth. Nobody likes white bland 3D objects. In 3D modeling, it is very significant to give objects some color material or texture. The process of adding shades to color materials and textures is called shading. Shading is so essential in 3D modeling that Blender has a dedicated workspace for shading. Shading workspace will automatically bring us in the “Look Dev” mode. Look Dev mode approximates lights and gives a general idea of the output of the object or scene. The shader editor will show the shader nodes of the selected object. Every object in Blender can be assigned a default material with white shading. And these shaders can be manipulated in the Shading workspace. You can add material to any object by going into the material tab.

  • Blender Viewport Navigation – Linux Hint

    The viewport is the main view of Blender that a user sees after getting it installed. At first look, it may appear intimidating, but it has become a lot comprehensible after the launch of the 2.80 version. The interface is less complicated and simple to learn. The viewport is a window that allows you to look around the scene or object you created. Viewport and camera view can be confusing, but both are not similar. A camera is an object in the scene, whereas the viewport is a part of the interface. Basics of navigating viewport include rotating, zooming, and panning the perspective of the view. There are various ways to navigate in the viewport.

  • Blender Cloud Rendering – Linux Hint

    How does it feel when you create a beautiful scene in Blender with high definition textures, shaders, particles, and volumetric effects and when you click on rendering, it just says that you need 2 hours to render just one frame? Yes, it feels discouraging. It is not easy to render a high-quality image or animation using an ordinary workstation. It is not a piece of cake to render in Blender, especially when working in Cycles (rendering engine). 3D rendering requires a lot of computing power. If you are rendering an animation, then it will take much more power and time. It would be best if you had a powerful PC with high-end specifications to get decent results. The trouble is the affordability of a robust workstation; they are costly. But this issue is fixable; just use cloud rendering.

  • Delete/Drop a Database in MySQL – Linux Hint

    MySQL is an RDBMS (Relational Database Management System) that is famous for its speed and easy-to-use interface. In this article, you will learn about the different methods to delete or drop a database in MySQL. In this article, we assume that you already have a working knowledge of the creation and listing of databases in MySQL. So, feel free to read on if you have already installed MySQL on your system and have some dummy databases in MySQL that you want to delete.

  • CentOS 8 Restart Network – Linux Hint

    Among the most frequent system administration practices is the process of restarting the network. To connect your machine with the Internet, a sound networking service is always required. At times, due to undesirable issues, the networking service in a particular operating system may start malfunctioning. If the issue is temporary, then it can be resolved simply by restarting your networking service. There are multiple methods that you can use in any operating system to restart the system’s networking service. Today, we walk you through the two primary methods of restarting the network service in CentOS 8, one of the most popular distributions of the Linux operating system. If you are using a system based on CentOS 8 and are not able to establish a secure connection with your network, you would be shocked by how many issues a quick restart can solve. You can restart the Linux networking service using various commands, but you must execute the commands to restart the network using sudo or su commands as a root user.

  • Installation of Sublime text editor on Ubuntu 20.04

    Sublime Text is a well-known text editor used to write source code for web development. This tutorial will assist you in installing Sublime Text on an Ubuntu 20.04 machine.

  • WireShark in-depth Tutorial – Linux Hint

    Wireshark is an open-source and free network traffic inspection tool. It captures and displays packets in real-time for offline analysis in a human-readable format with microscopic details. It requires some sound knowledge of basic networking and is considered an essential tool for system administrators and network security experts. Wireshark is the de-facto go-to tool for several network problems that vary from network troubleshooting, security issue examination, inspecting network traffic of a suspicious application, debugging protocol implementations, along with network protocol learning purposes, etc. The Wireshark project was initiated in 1998. Thanks to the global networking expert’s voluntary contribution, it continues to make updates for new technologies and encryption standards. Hence, it’s by far one of the best packet analyzer tools and is utilized as a standard commercial tool by various government agencies, educational institutes, and non-profit organizations.