Language Selection

English French German Italian Portuguese Spanish

Slax 5.1.4 - Your Pocket OS

Filed under
Linux
Reviews
-s

Slax recently released version 5.1.4 of their amazing "pocket os" and since it had been almost a year since our last look, we thought we'd better find out what 5.1.4 was like. Much like its predecessor, it has a whole lot chocked into a small kde-based download. At 192 mb, is it worth the download?


Slax's homepage says it better than I would. To quote them,

"SLAX is fast and beautiful Linux operating system which fits on small (3.14") CD-ROM disc. It runs directly from the CD (or USB) without installing. The Live CD described here is based on the Slackware Linux distribution and uses Unification File System (also known as unionfs), allowing read-only filesystem to behave as a writable one, saving all changes to memory.

Imagine the ability to boot your favorite Linux distribution whether you are at home, at school, or at work. Imagine walking on the street and carrying the only thing you needed in life - the 8cm compact disk with your Live Linux CD. Wouldn't you want to experience such a feeling? Smile "

Well, "the only thing you need in life" might be a bit of an exaggeration, but perhaps it might be the only thing one needs in computing. It's a complete os featuring all the basic requirements: surfing, emailing, instant messaging, connectivity, office, image viewing and file manipulation all sitting on the wonderful performing base of Slackware Linux. Slax comes with a 2.6.16 kernel, xorg 6.9.0 and a light version of KDE 3.5.2. In other words, it's an updated small portable version of Slackware.

Booting slax is as easy as popping in the cd and rebooting your computer. The default configuration worked great here, but there are many "cheat codes" available and found by depressing F1 at the boot screen. Booting progresses with the output displayed in the bottom portion of the screen while a nice image of a shamrock dresses it up at the top. At the end of this process, one is taken to a login screen. Instructions for logging in and gui startup are displayed as well as instructions for some basic configuration. Startx starts the gui at 1024x768 with vesa drivers and xconf will start an autodetection of your graphics system for perhaps enhanced display and performance. Also noteworthy from this same screen is the command for "slax-install." The screen states that at this time it "still doesn't work," but it alludes to future capability.

        

The gui starts with a customized kde splash and consists of xorg 6.9.0 and KDE 3.5.2. The slax version is quite scaled down as evidenced by the size of the iso, but it doesn't seem so by looking at the apps. As stated, there are apps for office work, connectivity and commuications, and even image viewing. There are tools for system configuration and monitoring as well as file manipulation and multimedia use. I think their choices in slimming down the kde desktop seem quite intuitive. The desktop itself is attractive featuring a customized wallpaper and panel. In the panel one can find quick launchers for konqueror, kopete, kmplayer, and juk. In the systray sits a connection monitor, locale selector, kmix applet, and krandrtray. Desktop icons are Home and System.

        

The games list consists of kbounce, kbattleship and patience. The graphics menu contains kuickshow, kpdf, and kolourpaint. Your office choices are kpresenter, kspread, kword, and kontact.

        

Multimedia applications include kaudiocreator, K3B, KMpalyer, juk, and KsCD. For the internet and communications are konqueror, remote desktop setup and browsers, Kppp, KWiFiManager, Akregator, Kmail, and Kopete. Some utilities you might find useful are kpager, kdeprintfax, Kate, Font viewer, Kcalc, kjots and knotes. Also included are some system configuration and monitoring tools.

        

        

There are also many modules available for download and installation from the slax site. Also on the site is a nice looking forum for discussions on all things Slax. In fact, the whole site is rather great looking, complete, and easy to navigate. It's always a nice touch and professional when a developer goes that extra mile to provide a wonderful web interface for use of and help with their distro - in many languages as well. Also of particular interest is their users' contributions of their screenshots. There are some great looking desktops shown there! All in all, Slax is a very respectable project and their distro is an amazing offering. The developers work hard to offer such a fantastic distro and provide timely updates. I've always like Slax quite a bit and this offering continues that tradition. It is definitely worth the download!

Related Links:



Some recent changelog activity includes:

v 5.1.4 SLAX (all editions) (6th of May 2006)

- added KDE 3.5.2, koffice 1.5.0
- updated alsa sound drivers
- updated to latest Linux-2.6.16 patches
- updated ndiswrapper and atheros wifi drivers
- fixed gtk2 config to use nicer default theme and font (firefox users are happy)
- fixed manual IP configuration
- dhcpcd now waits only 5 seconds to DHCP response
- removed noatun at all
- upgraded many libraries from Slackware current
- added new busybox binary to linux live scripts, this fixes some accidental problems with mounting union during startup.
- created official development module and kernel source module for SLAX
- added iocharset= boot option, to mount NTFS/DOS fs with your encoding
- added make_disk.bat to CD tree, to create USB bootable disk in windows
- properly remount ro disk device if SLAX is using data from it
- added FUSE and SSHFS filesystems, this will replace webconfig in the future
- cups set as a default printing system in KDE
- artsd doesn't autosuspend now, as this caused hundred of artsd processes
to be started on some machines (and in vmware), causing SLAX to swap or hang
- autoexec boot argument replaces "~" by spaces now, very useful if you need
to execute some command with parameters
- when autoexec is used, halt (powerdown) instead of reboot
- added openldap client and upgraded samba client files
- removed 2 useless videos from k3b extras
- and finally, added kernel boot splash image (no patches needed!). Use vga=normal boot parameter if you like the old text mode
v 5.1.0 SLAX (all editions) (31th of March 2006)

- added DejaVu fonts (Bitstream Vera with enhancements)
- added missing libmikmod libraries
- added missing libstdc++ libraries
- properly unmount device mounted by changes= boot argument
- added kbuildsycoca to kde-uselivemod to rebuild menu entries
- webconfig configuration size limit raised from 8MB to 28MB
webconfig now saves ALL modifications in the whole filesystem
- webconfig now uses direct access (uselivemod and dir2mo),
configsave and configrestore are deprecated and will be replaced by
changes= cheatcode soon.

v 5.0.8 Standard Edition (23th of March 2006)

- updated to Linux Kernel 2.6.16
- based on newest linux live scripts
- updated squashfs and unionfs kernel modules
- this fixes uselivemod and configsave/configrestore
- the rest remains the same, KDE 3.5.
- fixed bug in mounting of dos partitions (long filenames work now)
- slax now uses only 60% of RAM maximum for its filesystem - Slax Server Edition released, includes Apache 2, PHP 5, MySQL 5.

Slax? Slow?

Have you actually USED Slax before? I've never heard someone call running from Slax slow before. I've used it on everything from 233 MHz K-6s to 633 MHz Celerons to Sempron 2800+s, and I have to say that I've never used a faster live-cd. I agree, if it was architecture specific, it might be faster, but that would break the wide compatibility users of the distro enjoy.

As far as using different compression, I'd have to say that I'll take the size of the SquashFS modules over the speed of tgz packages any day. The goal of this project is to fit a functional Slackware system into a footprint small enough to fit on a 210 MB cd. Tomas has done exactly that, and I have to say that to this day, I am amazed at the results.

And finally, I'll address your concerns with the amount of memory required... this is a function of KDE, not Slax in particular. I booted Slax on a computer with 60 MB of RAM just this morning. You can run Fluxbox in 128 MB of RAM, as well as XFCE. Tomas has created different Slax versions to address these concerns, and the modular design allows even further customizations with comparative ease.

Good point

I speak of things I know not of. I can see where you're coming from now, and I don't disagree. Unfortunately, I know that getting Tomas to implement such changes will be fairly difficult.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

GNU Parallel 20190822 ('Jesper Svarre') released [stable]

GNU Parallel 20190822 ('Jesper Svarre') [stable] has been released. It is available for download at: http://ftpmirror.gnu.org/parallel/ No new functionality was introduced so this is a good candidate for a stable release. GNU Parallel is 10 years old next year on 2020-04-22. You are here by invited to a reception on Friday 2020-04-17. Read more

KDE ISO Image Writer – Release Announcement

My GSoC project comes to an end and I am going to conclude this series of articles by announcing the release of a beta version of KDE ISO Image Writer. Read more Also: How I got a project in Labplot KDE

Linux Foundation: Automotive Grade Linux Announcement and Calling Surveillance Operations "Confidential Computing"

  • Automotive Grade Linux Announces New Instrument Cluster Expert Group and UCB 8.0 Code Release

    Automotive Grade Linux (AGL), an open source project developing a shared software platform for in-vehicle technology, today announced a new working group focused on Instrument Cluster solutions, as well as the latest code release of the AGL platform, the UCB 8.0. The AGL Instrument Cluster Expert Group (EG) is working to reduce the footprint of AGL and optimize the platform for use in lower performance processors and low-cost vehicles that do not require an entire infotainment software stack. Formed earlier this year, the group plans to release design specifications later this year with an initial code release in early 2020. “AGL is now supported by nine major automotive manufacturers, including the top three producers by worldwide volume, and is currently being used in production for a range of economy and luxury vehicles” said Dan Cauchy, Executive Director of Automotive Grade Linux at the Linux Foundation. “The new Instrument Cluster Expert Group, supported by several of these automakers, will expand the use cases for AGL by enabling the UCB platform to support solutions for lower-cost vehicles, including motorcycles.”

  • Shhh! Microsoft, Intel, Google and more sign up to the Confidential Computing Consortium

    The Linux Foundation has signed up the likes of Microsoft and Google for its Confidential Computing Consortium, a group with the laudable goal of securing sensitive data. The group – which also includes Alibaba, Arm, Baidu, IBM, Intel, Red Hat, Swisscom and Tencent – will be working on open-source technologies and standards to speed the adoption of confidential computing. The theory goes that while approaches to encrypting data at rest and in transit have supposedly been dealt with, assuming one ignores the depressingly relentless splurts of user information from careless vendors, keeping it safe while in use is quite a bit more challenging. Particularly as workloads spread to the cloud and IoT devices.

  • Tech giants come together to form cloud security watchdog

    Some of the world’s biggest technology companies are joining forces to improve the security of files in the cloud. This includes Google, IBM, Microsoft, Intel, and many others. The news first popped up on the Linux Foundation, where it was said that the Confidential Computing Consortium will work to bring industry standards and identify the proper tools to encrypt data used by apps, devices and online services. At the moment, cloud security solutions focus to protect data that’s either resting, or is in transit. However, when the data is being used is “the third and possibly most challenging step to providing a fully encrypted lifecycle for sensitive data.”

  • Tech firms join forces to boost cloud security

    Founding members of the group – which unites hardware suppliers, cloud providers, developers, open source experts and academics – include Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom and Tencent. [...] “The earliest work on technologies that have the ability to transform an industry is often done in collaboration across the industry and with open source technologies,” said Jim Zemlin, executive director at the Linux Foundation. “The Confidential Computing Consortium is a leading indicator of what is to come for security in computing and will help define and build open technologies to support this trust infrastructure for data in use.”

  • Google, Intel and Microsoft form data protection consortium
  • Intel Editorial: Intel Joins Industry Consortium to Accelerate Confidential Computing

    Leaders in information and infrastructure security are well versed in protecting data at-rest or in-flight through a variety of methods. However, data being actively processed in memory is another matter. Whether running on your own servers on-prem, in an edge deployment, or in the heart of a cloud service provider’s data center, this “in-use” data is almost always unencrypted and potentially vulnerable.

  • Confidential Computing: How Big Tech Companies Are Coming Together To Secure Data At All Levels

    Data today moves constantly from on-premises to public cloud and the edge, which is why it is quite challenging to protect. While there are standards available that aim to protect data when it is in rest and transit, standards related to protecting it when in use do not exist. Protecting data while in use is called confidential computing, which the Confidential Computing Consortium is aiming to create across the industry. The Confidential Computing Consortium, created under the Linux Foundation, will work to build up guidelines, systems and tools to ensure data is encrypted when it’s being used by applications, devices and online services. The consortium says that encrypting data when in use is “the third and possibly most challenging step to providing a fully encrypted lifecycle for sensitive data.” Members focused on the undertaking are Alibaba, ARM, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom and Tencent.

  • IT giants join forces for full-system data security

    Apple is conspiciously missing from the consortium, despite using both Intel hardware and inhouse designed ARM-based processors. Of the first set of commitments, Intel will release its Software Guard Extensions (SGX) software development kit as open source through the CCC.

  • Google, Intel, and Microsoft partner to improve cloud security

    Some of the biggest names in tech have banded together in an effort to promote industry-wide security standards for protecting data in use.

  • Alibaba, Baidu, Google, Microsoft, Others Back Confidential Computing Consortium

    The Confidential Computing Consortium aims to help define and accelerate open-source technology that keeps data in use secure. Data typically gets encrypted by service providers, but not when it’s in use. This consortium will focus on encrypting and processing the data “in memory” to reduce the exposure of the data to the rest of the system. It aims to provide greater control and transparency for users.

  • Microsoft, Intel and others are doubling down on open source Linux security

    In other words, the operating system could be compromised by some kind of malware, but the data being used in a program would still be encrypted, and therefore safe from an attacker.

  • Microsoft, Intel, and Red Hat Back Confidential Computing

    The Linux Foundation’s latest project tackles confidential computing with a group of companies that reads like a who’s who of cloud providers, chipmakers, telecom operators, and other tech giants. Today at the Open Source Summit the Linux Foundation said it will form a new group called the Confidential Computing Consortium. Alibaba, Arm, Baidu, Google Cloud, IBM, Intel, Microsoft, Red Hat, Swisscom, and Tencent all committed to work on the project, which aims to accelerate the adoption of confidential computing.

IBM/Red Hat: OpenShift, CUDA, Jim Whitehurst, VMworld and RHELvolution

  • Red Hat Launches OpenShift Service Mesh to Accelerate Adoption of Microservices and Cloud-Native Applications

    Red Hat, Inc., the world's leading provider of open source solutions, today announced the general availability of Red Hat OpenShift Service Mesh to connect, observe and simplify service-to-service communication of Kubernetes applications on Red Hat OpenShift 4, the industry’s most comprehensive enterprise Kubernetes platform. Based on the Istio, Kiali and Jaeger projects and enhanced with Kubernetes Operators, OpenShift Service Mesh is designed to deliver a more efficient, end-to-end developer experience around microservices-based application architectures. This helps to free developer teams from the complex tasks of having to implement bespoke networking services for their applications and business logic.

  • CUDA 10.1 U2 Adds RHEL8 Support, Nsight Compute Tools For POWER

    NVIDIA last week quietly released a second update to CUDA 10.1. CUDA 10.1 Update 2 brings Red Hat Enterprise Linux 8.0 support, continued POWER architecture support improvements, and other additions.

  • IBM Stock and Jim Whitehurst’s Toughest Test

    What analysts say they want from IBM stock is Red Hat CEO Jim Whitehurst in current CEO Virginia Rometty’s chair. They want Red Hat running IBM. That wasn’t the promise when this deal was put together. The promise was that Red Hat would get autonomy from IBM, not that IBM would lose its autonomy to Red Hat. But Whitehurst’s concept of an Open Organization has excited analysts who don’t even know what it is. If IBM became an Open Organization, these analysts think, it would replace the top-down structure IBM has used for a century with an organic system in which employees and customers are part of the product design process. Instead of selling gear or even solutions, IBM would become a corporate change agent.

  • Going to VMWorld? Learn to help data scientists and application developers accelerate AI/ML initiatives

    IT experts from around the world are headed to VMworld 2019 in San Francisco to learn how they can leverage emerging technologies from VMware and ecosystem partners (e.g. Red Hat, NVIDIA, etc.) to help achieve the digital transformation for their organizations. Artificial Intelligence (AI)/Machine Learning (ML) is a very popular technology trend, with Red Hat OpenShift customers like HCA Healthcare, BMW, Emirates NBD, and several more are offering differentiated value to their customers. Investments are ramping up across many industries to develop intelligent digital services that help improve customer satisfaction, and gain competitive business advantages. Early deployment trends indicate AI/ML solution architectures are spanning across edge, data center, and public clouds.

  • RHELvolution 2: A brief history of Red Hat Enterprise Linux releases from RHEL 6 to today

    In the previous post, we looked at the history of Red Hat Enterprise Linux from pre-RHEL days through the rise of virtualization. In this one we'll take a look at RHEL's evolution from early days of public cloud to the release of RHEL 8 and beyond.