LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 12-15-2012, 06:27 PM   #16
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886

Quote:
Originally Posted by Nbiser View Post
I also disagree with most, and think that secure boot is not good anywhere, not even in a corporate environment. If the techs at a company can't boot into their memtest or gparted CDs they are left out in the cold.
If a tech has to do that all he needs is either a CD with a signed bootloader (not that difficult to create for a tech), or he just disables Secure Boot for the duration of testing. Secure Boot will not keep a technician from doing his job, it will also not keep the trained attacker with physical access to the machine from whatever he wants to do, but it will keep malware from infecting the boot process and the "normal" employee from just booting a Knoppix or WinPE CD to circumvent company policy or compromise the system.
 
1 members found this post helpful.
Old 12-15-2012, 07:46 PM   #17
Nbiser
Member
 
Registered: Oct 2012
Location: Maryland
Distribution: Fedora, Slackware, Debian, Ubuntu, Knoppix, Helix,
Posts: 302
Blog Entries: 7

Rep: Reputation: 44
Quote:
Originally Posted by TobiSGD View Post
If a tech has to do that all he needs is either a CD with a signed bootloader (not that difficult to create for a tech), or he just disables Secure Boot for the duration of testing. Secure Boot will not keep a technician from doing his job, it will also not keep the trained attacker with physical access to the machine from whatever he wants to do, but it will keep malware from infecting the boot process and the "normal" employee from just booting a Knoppix or WinPE CD to circumvent company policy or compromise the system.
If the PC isn't a windows 8 PC, and thus doesn't have the Windows 8 logo, the tech may not be able to disable secure boot. Of course, most systems will have the Windows 8 logo.
 
Old 12-15-2012, 09:28 PM   #18
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
Quote:
Originally Posted by Nbiser View Post
If the PC isn't a windows 8 PC, and thus doesn't have the Windows 8 logo, the tech may not be able to disable secure boot. Of course, most systems will have the Windows 8 logo.
A PC does not have to come with the Windows 8 OS to have the Windows 8 logo. In fact, the logo is not really referring to the whole PC (when it comes to Secure Boot), but only to the options available in the firmware of the motherboard. Usually motherboards are delivered without OS. This is of course different with laptops and machines with mainboards that are specifically manufactured for one OEM, like Dell.
You also can be sure that a company that want to use Secure Boot with a non-Microsoft OS (or disable it) will buy machines that have these options available. They don't go out buy machines randomly, usually companies have some type of evaluation process.
 
Old 12-15-2012, 10:27 PM   #19
jpollard
Senior Member
 
Registered: Dec 2012
Location: Washington DC area
Distribution: Fedora, CentOS, Slackware
Posts: 4,912

Rep: Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513
Quote:
Originally Posted by TobiSGD View Post
A PC does not have to come with the Windows 8 OS to have the Windows 8 logo. In fact, the logo is not really referring to the whole PC (when it comes to Secure Boot), but only to the options available in the firmware of the motherboard. Usually motherboards are delivered without OS. This is of course different with laptops and machines with mainboards that are specifically manufactured for one OEM, like Dell.
You also can be sure that a company that want to use Secure Boot with a non-Microsoft OS (or disable it) will buy machines that have these options available. They don't go out buy machines randomly, usually companies have some type of evaluation process.
And thus add a working system to landfill just because it won't run the next version of MS pile of crud.

That is what is wrong with it.

Just because a machine is bought with Win8 on it doesn't mean it always will. Hand-me-down computers work just fine - but if you READ the license, hand-me-down systems DON'T come with a license to use the OS. You are supposed to buy it again.

And that purchase is (or can be) unaffordable (or like XP, unavailable) to to the recipient.

Thus making more electronic junk which tends to have hazardous substances.

Last edited by jpollard; 12-15-2012 at 10:29 PM.
 
Old 12-16-2012, 07:14 AM   #20
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
Quote:
Originally Posted by jpollard View Post
And thus add a working system to landfill just because it won't run the next version of MS pile of crud.
What do you mean with that?

Quote:
Just because a machine is bought with Win8 on it doesn't mean it always will.
Please explain.
 
Old 12-16-2012, 07:52 AM   #21
jpollard
Senior Member
 
Registered: Dec 2012
Location: Washington DC area
Distribution: Fedora, CentOS, Slackware
Posts: 4,912

Rep: Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513
I thought it was obvious.

I have four machines that were originally purchased for use with windows for other people. When they were no longer supported by MS, then they were headed for the landfill.

I got them and put Linux on them because I knew there was nothing wrong with the systems. They run fine, and are (well were, they are over 10 years old now) good usable systems with Linux.

Secure boot as implemented/required by MS prevents doing this by only allowing windows to boot - and the inability to put MY certificates on such systems means I can't use them to boot MY trusted software, unless I disable secure boot. And on systems I CAN'T disable secure boot means I can't put Linux on them, thus headed for the landfill.
 
Old 12-16-2012, 08:09 AM   #22
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
Quote:
Originally Posted by jpollard View Post
I thought it was obvious.
Not at all.

Quote:
I have four machines that were originally purchased for use with windows for other people. When they were no longer supported by MS, then they were headed for the landfill.
Why? If those machines are ten years old they came with XP and XP is still supported. If a ten years old machine came with Ubuntu you can be sure that without upgrading the hardware you won't be able to run a current Ubuntu on it. This is the way it goes in IT, software becomes more demanding over time, just because there are more resources available. this is not Microsoft specific.

Quote:
Secure boot as implemented/required by MS prevents doing this by only allowing windows to boot - and the inability to put MY certificates on such systems means I can't use them to boot MY trusted software, unless I disable secure boot.
If manufacturers want to get the Windows 8 Logo certification, which is obviously wanted by Microsoft, they have to implement the options to disable Secure Boot and to manage your own keys. So Microsoft prevents you from nothing (in fact they are encouraging manufacturers to give you the options you want), manufacturers that don't want to get the certification for whatever reason do.
So you have to blame the manufacturers in the first place, not Microsoft.
 
Old 12-16-2012, 08:57 AM   #23
schneidz
LQ Guru
 
Registered: May 2005
Location: boston, usa
Distribution: fedora-35
Posts: 5,313

Rep: Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918Reputation: 918
Quote:
Originally Posted by Davidicus View Post
I am a victim of 'Secure Boot', and I have been told by a computer retailer, that if I override secure boot which I am told is almost impossible I could be sued by Microsoft. With all the millions of computers in the world, I can't really believe this, but it has got me thinking. Thanks for the help I have received so far by the way. Is this retailer talking rubbish?
in the us, you have a right to sue if you are willing to pay court fees and possible counter-suit if you don't recieve judgement as a plaintiff. doesnt mean that the other party broke the law or did anything illigal.

this may be related to the patriot act (which is a corrolary to the dmca) which makes people who supercede any computer encryption (such as modding cell phones, ripping dvd's, ...) into military combatants.

that law has recently been renewed to allow installing alternate roms on devices and ripping dvd's for education purposes.

/ianal

Last edited by schneidz; 12-16-2012 at 09:08 AM.
 
Old 12-16-2012, 09:06 AM   #24
jpollard
Senior Member
 
Registered: Dec 2012
Location: Washington DC area
Distribution: Fedora, CentOS, Slackware
Posts: 4,912

Rep: Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513
Quote:
Originally Posted by TobiSGD View Post
Not at all.

Why? If those machines are ten years old they came with XP and XP is still supported. If a ten years old machine came with Ubuntu you can be sure that without upgrading the hardware you won't be able to run a current Ubuntu on it. This is the way it goes in IT, software becomes more demanding over time, just because there are more resources available. this is not Microsoft specific.
XP is no longer being sold except for systems that have already been built with it - and a 10 year old system wont run current XP...

And those machines work just fine in what I have targeted them, so no landfill. And I do know how to put a linux on it that will work - that is one of the benefits of Linux from Scratch.
I still have a 486 that can do routing for 10Mbit networks. Think that will run current XP?

Quote:
If manufacturers want to get the Windows 8 Logo certification, which is obviously wanted by Microsoft, they have to implement the options to disable Secure Boot and to manage your own keys. So Microsoft prevents you from nothing (in fact they are encouraging manufacturers to give you the options you want), manufacturers that don't want to get the certification for whatever reason do.
So you have to blame the manufacturers in the first place, not Microsoft.
No they aren't. MS has only stated that for Window 8 (they do still have to support Windows 7, so secure boot MUST be disabled for that...)

For ARM is is mandated that they NOT BE ABLE TO DISABLE secure boot.

As I said, SPECIFIED and REQUIRED by MS.. so Microsoft is to blame.

I may be a bit paranoid, but:

In a few years I fully expect (unless another anti-trust suite stops them) to drop the "able to disable secure boot" on X86. Likely as soon as they can drop the Windows 7 support. After that they can revoke the certificate used for booting via secure boot for those systems - thus making it impossible to create/update systems based on them...

The past history of MS is full of crap they have done to "partners" and "competitors" all over the world to preserve, and extend their monopoly. This is just their first way of trying to extend it into the ARM market.
 
Old 12-16-2012, 09:09 AM   #25
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,925
Blog Entries: 44

Rep: Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159
Member Response

Hi,
Quote:
Originally Posted by jpollard View Post
And thus add a working system to landfill just because it won't run the next version of MS pile of crud.
Not a responsible company, if disposed of improperly they can be fined for that type of dumping.
Quote:
Originally Posted by jpollard View Post
That is what is wrong with it.
No, what is wrong with is that some people are not fully aware of proper disposal rules and restrictions
Quote:
Originally Posted by jpollard View Post
Just because a machine is bought with Win8 on it doesn't mean it always will. Hand-me-down computers work just fine - but if you READ the license, hand-me-down systems DON'T come with a license to use the OS. You are supposed to buy it again.
That will depend on the 'EULA'. If OEM then yes you will need to re-license.
Quote:
Originally Posted by jpollard View Post
And that purchase is (or can be) unaffordable (or like XP, unavailable) to to the recipient.
Not always true, you will have to dig to find the OS but it can be done legally and sometimes affordable.
Quote:
Originally Posted by jpollard View Post
Thus making more electronic junk which tends to have hazardous substances.
Which when handled properly by licensed recyclers then no issue. What I am against is the companys that move hardware to third world or countries that do not have regard for human safety when handling electronic hardware disposal. Now that should be something local, state & federal agents should be handling by closer contacts & inspections.
 
Old 12-16-2012, 09:43 AM   #26
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,925
Blog Entries: 44

Rep: Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159
Member Response

Hi,

First, I think you should research a bit before making statements you have been making. Too much 'FUD', lack of understanding and misinformation.
Quote:
Originally Posted by jpollard View Post
XP is no longer being sold except for systems that have already been built with it - and a 10 year old system wont run current XP...
Not if you use SP1 for a 10 year old system then do updates. Of course if the system is not 64 bit then using a current Xp 64bit on a 10 year old machine may require you to jump through more hoops/. Doable on proper hardware. I still do this with licensed XP on older equipment with proper license.
Quote:
Originally Posted by jpollard View Post
And those machines work just fine in what I have targeted them, so no landfill. And I do know how to put a linux on it that will work - that is one of the benefits of Linux from Scratch.
I still have a 486 that can do routing for 10Mbit networks. Think that will run current XP?
Not a current but you could install SP1 an do the update process in order to bring too a supported Xp level. Fine that you are able to recycle older equipment to extend the service life.
Quote:
Originally Posted by jpollard View Post
No they aren't. MS has only stated that for Window 8 (they do still have to support Windows 7, so secure boot MUST be disabled for that...)
Again you do not know nor understand the 'UEFI' protocol nor how 'secure boot' is handled for equipment. Nor how the certification process is done for a user with Microsoft. Read a bit to inform yourself.

Quote:
Originally Posted by jpollard View Post
For ARM is is mandated that they NOT BE ABLE TO DISABLE secure boot.
Microsoft based ARM. Rooting ARM can be done on other manufactures devices. Of course 'Apple' has locked their devices, but 'Apple' is unique in the type of equipment provided to their users. You can 'root' but at the risk of warranty for equipment.

Quote:
Originally Posted by jpollard View Post
As I said, SPECIFIED and REQUIRED by MS.. so Microsoft is to blame.
Not on all systems, you still need to read the license agreement. Read the protocol, 'UEFI'.

Quote:
Originally Posted by jpollard View Post
I may be a bit paranoid, but:
I think you are relying on to much 'FUD'. Research and certify information before passing it on. That way you will be informed.

Quote:
Originally Posted by jpollard View Post
In a few years I fully expect (unless another anti-trust suite stops them) to drop the "able to disable secure boot" on X86. Likely as soon as they can drop the Windows 7 support. After that they can revoke the certificate used for booting via secure boot for those systems - thus making it impossible to create/update systems based on them...
Here again, You do not understand the 'UEFI' protocol and the 'Secure boot' set for that protocol. Thre are too many active Win/7 computer user base to drop Win/7. Win/7 is in the position that Win/Xp has been for the past decade(plus). You do not understand the License again, read the 'EULA' for Win/7 and read up on 'UEFI' then realize your misinformation concerning 'Secure boot'.
Quote:
Originally Posted by jpollard View Post
The past history of MS is full of crap they have done to "partners" and "competitors" all over the world to preserve, and extend their monopoly. This is just their first way of trying to extend it into the ARM market.
As I stated above, you do need to research more and be specific. Microsoft is a company that must profit for their share holders. Fines and judgements are not something a company needs to bear. Sure, earlier years Microsoft did some bad business practices. Proof is that people think that Microsoft does this presently on a blanketed basis. They have teams of lawyers & bean counters who know the limits and tricks to keep the company profitable legally.

My biggest complaint is that many users (Gnu/Linux included) is that most rely on and pass on 'FUD' to assure their hatred for Microsoft. Research & verify!
 
Old 12-16-2012, 10:02 AM   #27
TobiSGD
Moderator
 
Registered: Dec 2009
Location: Germany
Distribution: Whatever fits the task best
Posts: 17,148
Blog Entries: 2

Rep: Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886Reputation: 4886
Quote:
Originally Posted by jpollard View Post
I still have a 486 that can do routing for 10Mbit networks. Think that will run current XP?
Of course not, it was never intended to. It also won't run current Ubuntu. This is just a nonsensical argument, sorry I have to say that.

Quote:
No they aren't. MS has only stated that for Window 8 (they do still have to support Windows 7, so secure boot MUST be disabled for that...)
Of course they have only stated that only for Windows 8. May be because it is the Windows 8 Logo certfication, not the "pick a random future Windows version" certification.

Quote:
For ARM is is mandated that they NOT BE ABLE TO DISABLE secure boot.

As I said, SPECIFIED and REQUIRED by MS.. so Microsoft is to blame.
True on ARM devices. They do it exactly as Apple and almost any manufacturer for Android devices. Yet I wait to see the people blame them. Double standard?

Quote:
In a few years I fully expect (unless another anti-trust suite stops them) to drop the "able to disable secure boot" on X86. Likely as soon as they can drop the Windows 7 support. After that they can revoke the certificate used for booting via secure boot for those systems - thus making it impossible to create/update systems based on them...

The past history of MS is full of crap they have done to "partners" and "competitors" all over the world to preserve, and extend their monopoly. This is just their first way of trying to extend it into the ARM market.
So basically you say: I don't have any facts, I say all that only based on my personal opinion?
Do that on your blog, a technical forum is about facts.
 
Old 12-16-2012, 11:11 AM   #28
jefro
Moderator
 
Registered: Mar 2008
Posts: 21,982

Rep: Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625Reputation: 3625
As stated, other companies already do this sort of task to prevent other OS's. Secure boot if one reads about and understands it is not as big an issue. You have a choice to buy it or not. You have to realize that very few people in the world know about computer. They don't want to know. They don't join LQ even. They just want their computer to work. If you read up on secure boot, you will find it useful just like the billions of changes that have been made to linux over the years. Remember when such a notion as running as a limited user and not root was crazy talk? Remember when using antivirus and antimalware was nutty?

Last edited by jefro; 12-17-2012 at 02:48 PM.
 
Old 12-16-2012, 11:46 AM   #29
onebuck
Moderator
 
Registered: Jan 2005
Location: Central Florida 20 minutes from Disney World
Distribution: SlackwareŽ
Posts: 13,925
Blog Entries: 44

Rep: Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159Reputation: 3159
Member Response

Hi,

I have added this to hopefully help others to understand and relate to the information as we still have world members who use WinXP with Gnu/Linux dual boot or VM usage.

WinXP release information;
Quote:
http://www.tomshardware.com/forum/51919-45-sp1a-release

Archived from groups: microsoft.public.windowsxp.general (More info?)
Windows XP Service Pack 1 came out on August 30, 2002.

Windows XP Service Pack 1a came out on February 3, 2003.

Windows XP and Windows XP SP1 had Microsoft VM (Virtual Machine).

Windows XP SP1a does not have Microsoft VM (Virtual Machine).

[[Windows XP SP1a is the same as Windows XP SP1 except that the Microsoft
virtual machine (VM) is removed in SP1a.]]

[[On February 3, 2003, Microsoft released SP1 again as SP1a.]]
Differences Between Windows XP SP1 and Windows XP SP1a
http://support.microsoft.com/?kbid=813926

Windows XP Home Edition Service Pack 1 30-Aug-2002
Windows XP Home Edition Service Pack 2 17-Sep-2004

Windows XP Professional Service Pack 1 30-Aug-2002
Windows XP Professional Service Pack 2 17-Sep-2004
http://support.microsoft.com/gp/lifesupsps
Quote:
http://www.neowin.net/news/main/08/0...-release-dates

With Service Pack 3 for Windows XP just over the horizon, we've managed to get our hands on the internal schedule for the release of the highly anticipated update to the aging operating system. As you can see in the list below, most of the stages will occur before the end of the month, though forced automatic updates won't land until June. This delay should give system administrators an ample amount of time to prepare for the upgrade or simply come up with an excuse for when things go awry.

  • April 14, 2008: Support is available for the release version of Service Pack 3 for Windows XP
  • April 21, 2008: Original Equipment Manufacturers, Volume License, Connect, and MSDN and TechNet subscribers
  • April 29, 2008: Microsoft Update, Windows Update, Download Center
  • June 10, 2008: Automatic Updates
http://www.neowin.net/images/icons/viewicon.gif View: Windows XP Service Pack 3 Overview
Of course the WinXp updates are still supported. Just no new release except for the Netbook/Notebook hardware. Users still can use Win/XP on proper equipment. 10 year old equipment that fits the model can be used.
EDIT: Forgot to add: Windows XP Service Pack 3 Overview
HTH!

Last edited by onebuck; 12-16-2012 at 11:48 AM. Reason: forgot link
 
Old 12-16-2012, 04:41 PM   #30
jpollard
Senior Member
 
Registered: Dec 2012
Location: Washington DC area
Distribution: Fedora, CentOS, Slackware
Posts: 4,912

Rep: Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513Reputation: 1513
Quote:
Originally Posted by TobiSGD View Post
Of course not, it was never intended to. It also won't run current Ubuntu. This is just a nonsensical argument, sorry I have to say that.
The aim wasn't to run any specific distribution. It was specific to running MY kernel that I compile for that specific target. It doesn't have to be a distribution. Linux can run for specific target environments in 16 MB of memory even, and on a 486 - the DSL distribution for example.

Quote:
Of course they have only stated that only for Windows 8. May be because it is the Windows 8 Logo certfication, not the "pick a random future Windows version" certification.

True on ARM devices. They do it exactly as Apple and almost any manufacturer for Android devices. Yet I wait to see the people blame them. Double standard?
No - Apple isn't a monopoly trying to take over every other vendor.
Quote:
=

So basically you say: I don't have any facts, I say all that only based on my personal opinion?
Do that on your blog, a technical forum is about facts.
I clearly stated what followed was opinion (paranoid even). It has been the history of MS that developed that opinion.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Now You Can Boot Any Linux Distro On UEFI Secure Boot PCs LXer Syndicated Linux News 2 12-16-2012 06:47 AM
[SOLVED] Do We Need Secure Boot? Agon Linux - Security 25 12-12-2012 05:56 PM
[SOLVED] Does anyone understand Secure Boot? AlleyTrotter Slackware 32 10-16-2012 05:28 PM
Secure Boot prodonice Linux - Security 5 10-29-2008 01:36 PM
Illegal instruction / Won't Boot after up2date glibc rjesse Fedora 2 10-16-2005 07:20 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie

All times are GMT -5. The time now is 11:38 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration