From that thread:
The part you need is the firmware
... this is where we were headed.
bbfuller is very patient and newbie-friendly, and knows his fedora inside out. He's right - I am not a fedora specialist. A quick google also shows lots of f8 users resorting to ndiswrapper (which performs a similar function to the b43 code - it allows the windows firmware to interface with the kernel).
Any distro which contains a main-stream 2.6.24 or later kernel should be fine with those instructions. The b43 driver will be included. The only caveat will be that not all distros will install the fwcutter utility out of the box.
A main-stream 2.6.24 kernel or better, for the b43 driver
The fwcutter utility.
The appropriate windows driver: use your Windows driver CD or try here
1. Copy the driver to someplace handy on your linux machine. (It is usually zipped so you'll have to extract it.)
2. locate the wl_apsta.o file in the driver tree - cd into that directory.
3. extract the firmware to your distros firmware directory:
sudo bcm43xx-fwcutter -w /lib/firmware/`uname -r` wl_apsta.o (ubuntu)
b43-fwcutter -w /lib/firmware wl_apsta.o (fedora)
... others will be similar.
Caveat: This process may have to be repeated for each kernel upgrade.
I was not aware of the "Linux security model" thing about creating a limited user and not running as root,
Funny: didn't you notice that you had to enter "r o o t" followed by the root password to log in instead of entering your username
password? Did you not notice that there was a difference?
XP and above use the same sort of model. But if you have not used Vista, you can be forgiven for not realizing. MS has copped a lot of criticism for keeping their customers ignorant.
Linux security starts by being open-source. This means that security proffessionals can (and do) examine the source code to find flaws.
The execution layers are well seperated - with security compiled in to the lowest level.
Apparmour - provides manditory access controls to the communication pathways between different programs.
SELinux - provides security contexts to applications - so an app cannot by conned into doing something it's not designed for.
Unix Permissions - keyed with the user accounts. Assigns an owner and a group to every file, and special permissions to those groups and users. This is called "Discretionary Access Control". The idea is that nothing has access to the whole system. Limits damage in the event of an attack or a mistake.
On top of that, you can add a firewall and AV. The firewall is supposed to regulate network connections, and AV is supposed to spot if you actually managed to install malicious software. f8 has a firewall by default.
It is recommended that you disable access to su and enable sudo instead. But not vital. However, you should never leave your machine with a root terminal open. (Note: just requiring superusers to use the terminal tends to discourage casual cracking.)
With all that - is it little wonder that linux is famously secure. It also means that some things will be a wee bit less convenient though.