Skip to main content

The stuff that Linux (and BSD) just do better

The stuff that Linux (and BSD) just do better

Let’s face it. Linux probably isn’t the best operating system for your desktop, laptop, or tablet. That’s not to say it can’t be done. It can be done, and it can be pretty awesome, depending on your expertise. Still, despite how awesome it may be, Linux fails spectacularly as a desktop OS for everyone but the most elite nerd. The elite of the elite of nerds, really. The amount of time and knowledge required to configure Linux as a proper desktop system can be staggering.
So, if Linux isn’t something that can replace Windows on your laptop computer and do a better job of it, what the heck is it good for? Why the heck would anyone actually use Linux?

Linux and BSD are great for business

Businesses like Google, Netflix, Sony, and Apple, rely on Linux and BSD operating systems. Netflix runs FreeBSD on its servers, streaming in excess of a billion hours of movies and TV shows in a single month. Companies like Apple and Sony use FreeBSD for their operating systems. Apple’s iOS and OS X rely heavily on code from FreeBSD, while Sony runs a modified version of FreeBSD on its PlayStation 4. Google uses a modified version of the Linux kernel for its Android mobile operating system. Android is currently the most popular mobile operating system in the world, and it’s a variation of Linux!

It costs nothing and runs great on old hardware

This might sound lame, but it’s really not. Linux can make a highly useful machine out of what would otherwise otherwise been garbage. That’s not just good for the environment. It’s good for your wallet.
Of course, we’re not saying you’ll be playing games on that old garbage machine of yours. But you might be surprised at just how much you can actually do with it. Give it a shot and someday in the future you might think it was crazy to ever have thought of throwing out your old hardware.
Even very old hardware can be rendered usable again with Linux. Arch Linux, for example, should run fine on any i686 compatible system, with at least 64 MB of RAM and 800 MB of disk space (recommended). For reference, the i686 (AKA the P6 microarchitecture) was introduced by Intel in 1995. That’s impressive!

Security, stability, reliability

OpenBSD, famous for originating OpenSSH and known for its security, uses the slogan, “Only two remote holes in the default install, in a heck of a long time!” Linux, and certain BSD operating systems especially, are very secure. So secure, in fact, that they make the security features in certain other operating systems seem like a bad joke with poor timing.
Even air traffic control systems are beginning to adopt Linux. That’s about as mission critical as it gets.

Open source

The advantages of open source is simple. When code is open for anyone to see, the number of programmers that end up collaborating on the code is not limited by any one company. In many circumstances, this results in development of the open source project far outperforming what any one company could hope to achieve.
Many believe, and perhaps correctly, that open source software is made more to benefit the individual, whereas propriatary software will always have the interests of the company in mind. There are many open source applications out there that do more, more efficiently, and cost zero dollars.

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…