Rebellin Linux 3.5 Released — Beginner-friendly, Fast, And Debian-based Linux Distro

Rebellin Linux is a fast and lightweight Linux distro that’s developed for beginners. Its latest release, Rebellin Linux 3.5, has been released with Linux kernel 4.8. Based on Debian Sid, the ISO download of the distro are available in GNOME and MATE versions.

Just last week, I published the latest list of the 
best beginner-friendly Linux distros. Here, I’m going to share the news of the release of another desktop Linux distribution that’s suitable for new users who are looking for a fast and smart-looking operating system. It’s also a lightweight distro that needs just 512MB RAM to run.

The latest release of Rebellin Linux, i.e., Rebellin Linux 3.5, has been rolled out by the developers. Built on a Debian base and the previous release, the developers have called it the best Debian Sid-based operating system. Wondering what’s the basis for this claim? Well, they’re saying so because they’ve email support.
Now, let’s take a look at what Rebellin Linux 3.5 has to offer:

Rebellin Linux 3.5 features and changes

1. Linux kernel 4.8

Rebellin Linux 3.5 uses Liquorix Kernel version 4.8. The developers have called it more reliable as compared to the kernel available in the official Debian repos.

2. GNOME 3.22.2 and MATE 1.16.1
Rebellin Linux offers two choices of desktop environments — GNOME and MATE. With Rebellin 3.5, GNOME shell has been upgraded to v3.22.2 and MATE has been upgraded to v1.16.1.

3. Material design

A new material design theme ship with the latest release. So, if you’re a fan of this look, you’re in for a treat.

4. WhatsApp client

Developers of Rebellin Linux call the addition of a WhatsApp client for Linux the biggest addition. The client is also available for download for other distros too.

5. AMD APU improvement

With some improvements, Rebellin Linux 3.5 works perfectly with AMD APUs. Developers have found it to be perfectly working on an AMD A4-1200 processor.

6. VLC replaced by Totem

VLC media player has been replaced by Totem, the default media player for most Gnome-based distros. The developers haven’t given any exact reasons for this change.

7. Miscellaneous changes and updates

Most of the drivers and packages have been updated, MTP support added, touchpad issues added, etc.
Just in case Rebellin Linux 3.5 appeals you, you can visit their website and grab 32-bit and 64-bit ISO images based on GNOME or MATE.
After trying out Rebellin Linux, don’t forget to share your views and feedback. Good luck!

New And Best Features Of Linux Kernel 4.10

Linux kernel 4.10’s release is just around the corner. This release comes loaded with many new features and better hardware support for Nouveau driver, Intel GTV, AMD Zen, Intel Turbo Boost Max, new ARM devices, etc. The other new features of Linux kernel 4.10 include writeback throttling, fast fail support, and faster WLAN support. (Update: Linux kernel 4.10 is now released.)
Back in December, 2016, Linux boss Linus Torvalds rolled out Linux kernel 4.9. Thanks to tons of code due to Project Ara’s ‘greybus’ and AMD GPU register definition files, it was the biggest ever kernel release in terms of commits. The release also opened the Linux kernel 4.10 merge window. Kernel 4.10 is expected to be released this weekend–most probably on February 19.
Having said that, I know you’re pretty excited about this release and you might be wondering about the new and best features coming to Linux kernel 4.10. So, here they are:

Linux Kernel 4.10 New Features

1. Writeback throttling

Writeback throttling has been integrated in the block layer. This makes the system more fluid and doesn’t compromise with the background writeback activity.

2. Improvements in Nvidia DRM driver

A major change coming with Linux kernel 4.10 is the improvements for Nvidia GPUs. The Nouveau driver is now restructured to allow smoother development in the future. The basic support for Multi-Stream Transport has also been added. There is also performance boost support, option to adjust Nvidia logo brightness, etc.

3. Fail fast support

In the MD RAID subsystem, Fail fast support has been added. What is its use? This change will cancel the read operating from the drive that’s showing problems and read from the other device.

4. AMDGPU DRM driver fixes and AMD Zen addition

Multiple fixes (power management, exposed RPM fan info., etc.) have been made to AMDGPU DRM. Now, it supports Polaris 12 GPUs. Also, more AMD Zen code is being mainlined.

5. Support for Intel Turbo Boost Max 3.0 and Intel Cache Allocation Technology (CAT)

A big feature of Linux kernel 4.10 is the support for Intel Turbo Boost Max 3.0 technology. This lets the CPU cores to achieve higher frequencies. Another addition is the support for Intel Cache Allocation Technology that allows one to partition the cache of newer Intel CPUs.

6. Initial Intel Graphics Virtualization Technology support

In Linux kernel 4.10, the initial Intel GVT mainline support is being added. It’ll allow the VMs to make use of graphics hardware.

7. Support for new ARM platforms

A number of new ARM platforms are now supported. They are Huawei Nexus 6P, LG Nexus 5X, Pine64, Snapdragon 808 and 810, Samsung Exynos 5433, NXP LS1046A, etc.

8. Better support for Raspberry Pi 3, Microsoft Surface 3, x86 laptops

9. Other major improvements

  • Better HDMI support on Skylake CPUs
  • Early support for Tegra P1/Parker
  • EXT4 DAX iomap and XFS iomap support
  • Faster WLAN
  • ATA command priority support
  • Encryption support in UBIFS
For further reading, visit Phoronix’s excellent post on kernel 4.10 changes and LWN’s extensive kernel 4.10 merge window coverage part 12, and 3.
Did you find this article on the best Linux kernel 4.10 features helpful? Don’t forget to drop your views and feedback.

Linux Kernel 4.10 Released With New Features

Linus Torvalds has finally released Linux kernel 4.10. The latest release is a result of seven weeks of hard work and 13,000 commits. Kernel 4.10 features improvements to AMDGPU DRM and Nvidia DRM driver, better hardware support, initial Intel Graphics Virtualization Technology support, etc. You can go ahead and grab kernel 4.10 from kernel.org.
Well, as expected, Linux boss Linus Torvalds has released Linux kernel 4.10 after rolling out eight release candidates. The latest release comes loaded with lots of improved hardware support and some new features.
In his release announcement, Linus writes how Linux kernel 4.10 didn’t end up being as small as it initially looked. Just like everybody else, Linus expected a smaller 4.10 release after releasing Linux kernel 4.9, the biggest ever kernel release in terms of commits. Specifically, Linux kernel 4.10 is a result of 13,000 commits, excluding the merges.
“It’s been quiet since rc8, but we did end up fixing several small issues, so the extra week was all good,” Linus adds in his announcement post.
Just a few days ago, I wrote an article on the best and new features coming to Linux kernel 4.10. There, you can read those features in detail. For those who are in a hurry, here’s a list of the best and new features of Linux kernel 4.10:

Linux kernel 4.10 features

  • Fail fast support
  • Writeback throttling
  • AMDGPU DRM driver fixes, ADM Zen code mainlined
  • Nvidia DRM driver improvement
  • Intel Turbo Boost Max 3.0 and Intel Cache Allocation support
  • New ARM platforms support
  • Intel Graphics Virtualization Technology support
  • Better Raspberry Pi 3 and Surface 3 support
  • Encryption support in UBIFS
  • Faster WLAN
  • Early Tegra P1/Parker support
Linus urges you to go and try out the latest kernel and verify if all is good. “I’ll obviously start pulling stuff for 4.11 on Monday,” he adds.
So, go ahead and grab Linux kernel 4.10 tarball from kernel.org. Also, don’t forget to share your experiences with us.

What is VPN (Virtual Private Network)? How it Works?

VPN is a technology used to setup a private network over the internet to share the resources of a corporate intranet with remote users and other office locations of the company.  People can also use VPN to access their home network.
 VPN is a personal network created over the internet The devices connected to a VPN can have a continuous communication, regardless of any physical or digital barriers in the mid-way.
A VPN is like your private lounge on the internet where you can hang out without interference from other people. It allows you access your home network or the corporate network of your company even if you’re in some other corner of the world.

Two Types of VPNs

Mainly, VPNs are of two kinds, namely, Remote Access VPN and Site-to-Site VPN. The second kind site-to-site virtual private networks have further sub-types.

Remote Access VPN

When we talk about Remote Access VPN, we are talking about giving someone access to an existing private network over the internet. The private network can be a network setup by some corporate organization equipped with database and network hardware related to the organization or any of their project.
Because of remote access VPN, there is no need for an employee to connect to his company’s network directly. He can do so with the help of necessary VPN client software and credentials given by the firm.
Remote Access VPNs aren’t the buzzwords for the corporate sector only. Home users can also leverage them. For instance, you can setup a virtual private network at your home and use the credentials to access it from somewhere else. This way, the websites you visit will see the IP address of your home network rather than your actual IP address.
Moreover, most of the VPN services you see in the market are an example of remote access VPN. These services mainly help people eliminate geographical restrictions on the internet. These limitations are probably there because of government-led blocking, or if a website or service is not accessible in a particular region.

Site-to-Site VPN

The word ‘site’ in this case refers to the physical location where a private network exists. It is also known as LAN-to-LAN or Router-to-Router VPN. In this type, two or more private networks in different parts of the world are connected to each other over the network, all serving as one single virtual private network on the internet. Now, there are two sub-kinds of site-to-site virtual private networks.

Intranet Site-to-Site VPN:

We call it intranet site-to-site VPN when different private networks of a single organization are clubbed together over the internet. The can be used to share resources across various office locations of the company. One other possible way would be laying separate cable across different office locations, but that won’t be feasible and might incur high costs.

Extranet Site-to-Site VPN:

There can be a need to connect the corporate networks belonging to different organizations. They might be collaborating on a project involving resources from both the organizations. Such virtual private networks created are known as extranet site-to-site VPNs.

How does a VPN work?

The working of VPN is not a terrible deal to understand, though it is. But, before that, you need to get an idea of the protocols, or set of rules in laymen terms, used by VPN in providing a secure personal network.
SSL (Secured Socket Layer): It uses a 3-way handshake method for assuring proper authentication between the client and server machines. The authentication process is based on cryptography where certificates, behaving as cryptographic keys already stored on the client and server sides, are used for initiating the connection.
IPSec (IP Security): This protocol can work in transport mode or tunneling mode so that it can do its job of securing the VPN connection. The two modes differ in the sense that the transport mode only encrypts the Payload in the data, i.e. only the message present in the data. The tunneling mode encrypts the entire data to be transmitted.
PPTP (Point-To-Point Transfer Protocol): It connects a user located at some remote location with a private server in a VPN network, and also uses the tunneling mode for its operations. Low maintenance and simple working make PPTP a widely adopted VPN protocol. Further credit goes to the inbuilt support provided by Microsoft Windows.
L2TP (Layer Two Tunnelling Protocol): It facilitates the tunneling of data between two geographical sites over the VPN network, often used in combination with the IPSec protocol which further aids to the security layer of the communication.
So, you have a rough idea about the various protocols used in a VPN. We shall proceed further and see how it works. When you connect to a public network, for example, free WiFi networks at airports, you can assume that all your data is flowing through a big tunnel along with the data of other users.
So, anyone who wants to spy on you can easily sniff your data packets from the network. When VPN comes into the scene, it provides you a secret tunnel inside that big tunnel. And all your data is transformed into garbage values so that no one can recognize it.

Setting up a VPN Connection involves Three Phases:

Authentication: In this step, data packets are first encapsulated, basically wrapped inside another packet along with some headers and other stuff are attached. All of this conceals the identity of the data packets. Now, your device initiates the connection by sending a Hello request to the VPN server, which replies with an acknowledgment and asks for the user credentials to clarify the authenticity of the user.
Tunneling: After the authentication phase is finished, what we can say, an imaginary tunnel is created which provides a direct point to point connection through the internet. We can send whatever data we want to via that tunnel.
Encryption: After we’ve successfully created the tunnel, it can transfer whatever information we want to, but that information is still not safe if we use a free VPN service. That’s because other people also use it. So, we encrypt the data packets before sending them over the tunnel, thus, barring any other user to peep into our packets, as he will only see some unrecognizable rubbish data flowing through the tunnel.
Now, if you want to access a website, your device will send the access request to the VPN server which will then forward the request to the website in its name and receive the data from it. Then this data will be sent to your device. And the website will think, the VPN server is the user and it will find no trace of your or your device as the actual user. Unless you transmit some personal information over the connection. For example, your identity can be known if you access a social networking website like Facebook or Twitter,
A VPN connection is used to provide direct access to a corporate network to a user who is not in the geographical coverage of the network. Logically, the remote user is connected just like a regular user who is using the network within the corporate premises.
VPN is also used to provide a homogenous network environment to a corporate firm having its office locations in different parts of the world. Thus, creating an uninterrupted sharing of resources bypassing the geographical hurdles.
Other uses include accessing those services on the internet which are not available in a particular country or region, accessing censored content or if a user only wants to remain anonymous on the web.

Pros and Cons:

The biggest advantage of using a VPN is the cost effectiveness it facilitates in providing a single private network in comparison to using separate leased lines which can burn the pockets of corporate firms. All credited goes to the internet, for acting as the medium for uninterrupted VPN connections.
Apart from all the right things VPN does for us, it has its weak sides too. Not having a streamlined procedure for ensuring Quality of Service (QoS) over the internet, is the biggest incapacity VPN technology has in its possession. Furthermore, the level of security and authenticity outside the private network is beyond the purview of VPN technology. The incompatibility between different vendors only adds to its bunch of drawbacks.

Popular VPN services:

HideMyAss, PureVPN, VyprVPN, all these are well known for their QoS and security they provide in their VPN connections.
Cyber Ghost, Surf Easy, Tunnel Bear are some free VPN services you can use if you don’t want to shell out your pocket. But you’ll have to satisfy yourself with fewer features, download limits, or advertisements. Also, these free services can’t beat the paid services, note that.

VPN on Android:

You can also setup a VPN connection on your smartphones running Android OS. It allows you to access your company’s private network right on your Android device. VPN also facilitates a network administrator to control your device, add or delete data and track your usage.

Winding Up:

VPN has so far equipped us with an extraordinary level of security and anonymity we can accomplish while sharing our confidential data over the internet. Corporate giants have always admired the ease and uniformity they can engineer in their network while using VPN. Though it has its limitations, but VPN has outperformed our expectations.  We should praise VPN for the cost effectiveness it provides in its operations.

What is Linux Kernel? Explained in Layman’s Terms

There are so many Linux distributions out in the wild, but there is only one de facto thing that they have in common: the Linux kernel. But while it’s often talked about, a lot of people don’t really know exactly what it does.
Let’s take a look at what the Linux kernel really does and why it’s needed, with as few geeky terms as possible.

What’s a Kernel?

Each operating system uses a kernel. Without a kernel, you can’t have an operating system that actually works. Windows, Mac OS X, and Linux all have kernels, and they’re all different. It’s the kernel that also does the grunt work of the operating system. Besides the kernel, there are a lot of applications that are bundled with the kernel to make the entire package something useful — more on that a bit later.
The kernel’s job is to talk to the hardware and software, and to manage the system’s resources as best as possible. It talks to the hardware via the drivers that are included in the kernel (or additionally installed later on in the form of a kernel module). This way, when an application wants to do something (say change the volume setting of the speakers), it can just submit that request to the kernel, and the kernel can use the driver it has for the speakers to actually change the volume.
The kernel is highly involved in resource management. It has to make sure that there is enough memory available for an application to run, as well as to place an application in the right location in memory. It tries to optimize the usage of the processor so that it can complete tasks as quickly as possible. It also aims to avoid deadlocks, which are problems that completely halt the system when one application needs a resource that another application is using. It’s a fairly complicated circus act to coordinate all of those things, but it needs to be done and that’s what the kernel is for.

What Else Makes Up An Operating System?

Like I mentioned earlier, operating systems include their own kernel along with a bunch of other applications. With just a kernel, it’s nearly impossible to do anything with the operating system. You also need some other applications to be bundled with it, such as a shell. The shell is responsible for displaying the prompt that you see in terminals or command lines. Shells are a much easier way to launch applications, navigate through folders, and much more. All of those tasks that you can do in a shell are supported via other applications that must be bundled as well. For example, the tar application is needed if you’re working with tarballs in a shell.
Operating systems, particularly Linux distributions, then continue to bundle more applications, such as a desktop environment, a web browser, an office suite, and other applications that you often interact with directly. So as you can see, the kernel is just a very small portion of an operating system, but it’s arguably the most crucial one.

Linux History

How long has the Linux kernel been around? It was first created by a Finnish student named Linus Torvalds in 1991. He sent out an email to a mailing list saying, “Hello everybody out there using minix — I’m doing a (free) operating system (just a hobby, won’t be big and professional like gnu) for 386 (486) AT clones.” Over the course of over two decades, the hobby operating system has turned into a major piece of software that now powers millions of devices all over the world.
During this time, Linus decided to license the kernel using the GPL license, meaning that it was open source. People were free to look at the code, modify it to their needs, and then distribute it to others (under the same license).
Hope you like this article.