View Single Post
Old 01-12-15, 00:38   #4
jenkins4
Official Site Uploader & TECH ADVISOR
 
Join Date: Aug 2013
Location: Australia
Posts: 8,277
Thanks: 217
Thanked 2,767 Times in 2,104 Posts
jenkins4 has a reputation beyond reputejenkins4 has a reputation beyond reputejenkins4 has a reputation beyond reputejenkins4 has a reputation beyond reputejenkins4 has a reputation beyond reputejenkins4 has a reputation beyond reputejenkins4 has a reputation beyond reputejenkins4 has a reputation beyond reputejenkins4 has a reputation beyond reputejenkins4 has a reputation beyond reputejenkins4 has a reputation beyond repute

Awards Showcase
Bronze Medal Gold Medal Gold Medal Gold Medal 
Total Awards: 4

Default Re: Learn About LINUX

New to Linux? (Ubuntu and Mint)

So you have got your Linux machine set up now, or are considering it?
Lets have a look at what some of the experts say and take some heed...........it may save you hours of frustration.
We have all got to learn to walk before we can run!


There are 10 mistakes that you definitely want to avoid, for the sake of the health of your system. Because they may be fatal.


As with all warnings in general, these warnings are especially important for beginners with Linux. Advanced Linux users won't easily get into trouble, not even in the danger zone. And when they do get into trouble, they can help themselves...

To make a comparison with jet planes: it all depends on how you want to use your computer.

As a pilot of the trusted F-18:

Or as a test pilot of an experimental plane:

Or as a pilot of... well, whatever it is:

If (for the time being?) the battle proven reliability of the F-18 is what you're looking for, then you can benefit from the warnings below.

Contents

1 Be very careful with external repositories (like PPA's) and with external .deb files
2 Only use sudo and gksudo when absolutely necessary
3 Be careful with add-ons, extensions, applets and desklets
3.1 Firefox and Chromium/Chrome extensions: don't trust them blindly
3.2 Desklets and applets: think before you install
4 Never use cleaning or defrag applications
5 Don't mix KDE with other desktop environments
5.1 Don't install a second full-blown file manager
6 Never use installation scripts like Ultamatix, Ubuntu Tweak, Ubuntu Sources List Generator or Ubuntuzilla
6.1 Severe danger level (red alert!): Ultamatix
6.2 High danger level (orange alert): Ubuntu Tweak and Ubuntu Sources List Generator
6.3 Elevated danger level (yellow alert): Ubuntuzilla
7 Don't enable the software repository "proposed" (or "romeo")
8 Handle with some care: the software repositories Backports, Partners and Independent
8.1 Backports
8.2 Partners and Independent
9 Never remove any application that's part of the default installation of Ubuntu or Linux Mint
10 Don't experiment on a production machine



Be very careful with external repositories (like PPA's) and with external .deb files
1. Software from PPA's (third-party repositories) is untested in your version of Linux Mint or Ubuntu, and may damage the stability, the reliability and even the security of your system.

Furthermore, you make yourself dependent on the owner of the PPA, often only one person, who isn't being checked at all...

Therefore only use a PPA when you really (really!) have no acceptable alternative. Or when you're a tester for a particular piece of software (which you should only be doing on a non-essential test computer).

PPA's are a mixed blessing, to say the least. If used wisely and very restrictively, PPA's can occasionally be of great help. But used carelessly, they're a pest that plagues the earth.

Have you already enabled PPA's and do you want to get rid of them? Then you can recreate a clean software sources list like this.

You also need to be careful with .deb files from external sources:

Files with the extension .deb are separate installers, just like .exe installers for Windows. You can download debs from some websites. When you double-click them, they ask for your password and then they install themselves in your system.

Only install those .deb files that you trust completely. When you're at all unsure about a .deb file, don't install it! These files are unchecked, unverified and may do damage to your system. They may even contain malware, like spyware and such.

This happens in the real world: I know of at least one incident. Some years ago, malware (a trojan) was detected in a .deb file, that was available for download on the much visited website of gnome-look.org.

Only use sudo and gksudo when absolutely necessary
2. With sudo and gksudo you give yourself root permissions (administrator power). You should only do that for system administration applications and never for ordinary applications.

Unnecessary use of sudo (and gksudo) can mess up your file and directory permissions, causing all kinds of weird malfunctions.

When you launch an ordinary application with sudo (or gksudo), it creates files and directories that are the property of root, and not of you. Plus it changes the ownership of some existing files to root.

Never launch ordinary applications with sudo (or gksudo). It's unnecessary, it's dangerous and you run a big risk of messing up the permissions of your own files.

Be careful with add-ons, extensions, applets and desklets
3. Be careful with the add-ons, extensions, applets and desklets that you install. Because some of them can cause lots of problems:

Firefox and Chromium/Chrome extensions: don't trust them blindly
3.1. Firefox add-ons with malicious software: it has happened, in spite of the malware scanning efforts by Mozilla. Don't trust them blindly. This goes for Chromium/Chrome as well.

And keep their number down anyway: don't turn Firefox and Chromium/Chrome into a Christmas tree. The more extensions you install, the slower your browser becomes. Furthermore, some add-ons may cause malfunctions in other add-ons, or even in the browser itself.

Desklets and applets: think before you install

3.2. Applets and desklets can beautify your desktop and even add useful features. But they can cause problems. So keep their number down.

The more desklets and applets you install, the slower your system becomes. What's more, some of them may cause malfunctions in each other or in the desktop itself.

Never use cleaning or defrag applications
4. With cleaning applications like Bleachbit, you easily destroy more than you want. You can't trust them, because before you know it, they remove too much and damage the system.

Besides, they are useless. Linux hardly experiences any pollution. So cleaning is superfluous. You may at most win a gigabyte or so of disk space, at an unacceptably high risk of damage. Should you wish to clean up a bit anyway, then this is a safe way for Ubuntu and this is a safe way for Linux Mint.

Defragmentation tools are even worse. Unfortunately, you can find some defrag tools in the "fringes" of the Linux ecosystem.... Don't use them! There's a huge risk that they either mess up your system beyond all repair, or cause massive loss of files.

Defrag tools are very dangerous rubbish. Without any exception. What's more: Linux doesn't even need defragmentation.

Don't mix KDE with other desktop environments
5. An Ubuntu or a Linux Mint in which you install the full KDE desktop alongside the existing other desktop environment (Mate, Cinnamon, Unity, Xfce, LXDE or Gnome), becomes a hopelessly polluted mess. This pollution will decrease performance and may cause instability and malfunctions.

If you want to ensure that your operating system continues to work well, stick to the default desktop environment. And don't install any KDE applications in Ubuntu or Linux Mint, that upon installation pull in half of the KDE desktop as dependent files (like for example DVD burner K3B does)...

Tip: when you install applications by means of Synaptic Package Manager, then you can check beforehand what a particular application needs as dependent files.

There are desktop environments that share a lot "under the hood"; it's relatively safe to install those alongside each other. For example: Xfce (the desktop environment of Xubuntu) fits pretty nicely alongside the Gnome/Unity of Ubuntu and the Cinnamon or Mate of Linux Mint.

But even then some pollution is inevitable... A system with a single desktop will always perform best.

Have you made this mistake and do you wish to undo it? Then the best approach is unfortunately a clean re-installation.

Don't install a second full-blown file manager
5.1. Related to the "don't mix desktop environments" issue: it's not advisable to install a full-blown second file manager. It's best to stick to the file manager that comes by default with your desktop environment.

The reason is, that full-blown file managers are deeply interwoven with the desktop environment for which they were designed. That means that they can cause problems after installation in a "foreign" desktop environment: they simply engrain themselves too deeply in that "foreign" desktop and tend to clash sometimes with its primary file manager.

Exceptions are stand-alone simple file managers like GNOME Commander and Midnight Commander. They don't interweave themselves with the desktop environment at all, and only do their primary limited task: basic file management.

Never use installation scripts like Ultamatix, Ubuntu Tweak, Ubuntu Sources List Generator or Ubuntuzilla
6. Third party installation scripts are all dangerous: some are acutely risky, some a little less. But you'd better avoid the lot. Below I'll describe some of the most common dangerous scripts.

Severe danger level (red alert!): Ultamatix
6.1. Ultamatix is the worst of the bunch. It will irreparably damage your system.

Note: this horrible project seems to be dead, but it has been resurrected from the grave before... So for the time being I won't remove this warning.

Ultamatix installs all kinds of unstable versions of applications (nightly builds). Besides, it makes use of forced permits: --assume-yes and --force-yes are very dangerous. The developer says that those are being used because "he doesn't want to bother the users with all kinds of questions". It takes only one wrong dependency, buggy application or another hitch, and your system may be damaged beyond repair....

When you've already used this script, a clean re-installation of Ubuntu or Linux Mint is the only solution. With previous formatting of the root partition.

Furthermore, Ultamatix is essentially superfluous: everything it does, you can do also in the safe official way. With only a little extra effort.

High danger level (orange alert): Ubuntu Tweak and Ubuntu Sources List Generator
6.2. Ubuntu Tweak and Ubuntu Sources List Generator are also dangerous. Don't use them! With them, you can add several PPA's and third party software, without it being clear where everything comes from and without being asked for a verification key.

You can add all kinds of software packages without verification or quality check, and without knowing if they are fit for your Ubuntu version or what they'll do to your system. Very risky indeed. Better stay away from them...

Elevated danger level (yellow alert): Ubuntuzilla
6.3. Ubuntuzilla is more limited in scope, and poses no security risk. But you'd better avoid this one as well. It may cause strange malfunctions in Firefox, because the Ubuntuzilla version of Firefox is "original upstream software" which isn't completely adapted to and tested for your Ubuntu version.

With Ubuntuzilla, you bypass the entire system of tweaks and quality checks that the Ubuntu developers apply to Firefox.... This endangers the stability and reliability of Firefox.

Don't enable the software repository "proposed" (or "romeo")
7. Don't enable the software repository "proposed", unless you're a tester and don't value a stable system. In Linux Mint this repo is called "romeo", but it's the same risk.

The source "proposed" ("romeo" in Linux Mint) is very dangerous. It contains unstable and buggy software that hasn't been improved and tested enough yet. Stay away from it!

When you do enable this source, your system will definitely become unstable sooner or later. The only solution then, is a complete clean re-installation of Ubuntu or Linux Mint. With previous formatting of the root partition.

It's disabled by default of course, but like this you can check whether this source is really safely disabled in your system:

Linux Mint:
Menu button - Administration - Update Manager
Panel: Edit - Software sources
Optional components: Unstable packages (romeo) should be disabled.

Ubuntu:
- If not installed yet: first install Synaptic Package Manager. Synaptic is present by default in Linux Mint, but not in Ubuntu. So use the Ubuntu Software Center to install Synaptic.

Then launch Synaptic:

Click on the grey Ubuntu logo (Dash home).
Query: synaptic
Click on Synaptic Package Manager

Settings - Software Sources

Tab Updates: you'll see this unchecked update source:
Pre-released updates (trusty-proposed).

As said: make sure it's disabled!

The only reason for the existence of trusty-proposed (Ubuntu) and romeo (Linux Mint) source is use by testers. Those testers help to hunt for bugs in potential updates, before those updates are being delivered to the users of Ubuntu and Linux Mint.

Handle with some care: the software repositories Backports, Partners and Independent
8. There are three software repositories that are safe enough to enable them in your system, but nevertheless have to be handled with some care: Backports, Partners and Independent.

Definitely not a fatal matter, because these repositories pose an acceptable low risk. But this risk, although low and acceptable, is still worthy of some attention...

Backports
8.1. In Linux Mint, the "backport" repository is disabled by default, and it's best to leave it that way.

In Ubuntu however, the software repository of "backports" is enabled by default. But with a lowered (harmless) priority, so that you can only install software from it when you consciously choose to.

Like this you can check whether this source is enabled in Ubuntu:

- If not installed yet: first install Synaptic Package Manager by means of the Ubuntu Software Center.

- Click on the grey Ubuntu logo (Dash home).
Query: synaptic
Click on Synaptic Package Manager

Settings - Software Sources - tab Updates

You'll see this checked update source:
Unsupported updates (trusty-backports).

The "backports" source is much less risky than "proposed", because it holds software that's stable in itself. But this software hasn't been tested for your version of Ubuntu. Therefore it may still diminish the stability of (parts of) the system.

Although this repository has been enabled, it has therefore been issued a low and harmless priority. My advice is: keep backports enabled in Ubuntu, but be cautious when using it.

To check the priority of Backports you can run the following command in a terminal:
apt-cache policy | grep backports

Now you'll see that the priority of the Backports repository is pinned to 100 for everything except the translations (in a localized system). Other repositories (and the translations in Backports) have the default priority 500.

This means that you have to explicitly choose to install the backport version of a package, if another version of that package also exists in a non-backports repository. The advantage of this is, that if a package is only available in Backports, you'll be able to install it without modifying anything else.

Partners and Independent
8.2. Only applicable in Ubuntu, not in Linux Mint: like this you can check the current status of the repositories Partners and Independent:

- If not installed yet: first install Synaptic Package Manager by means of the Ubuntu Software Center.

- Click on the grey Ubuntu logo (Dash home).
Query: synaptic
Click on Synaptic Package Manager

Settings - Software Sources - tab "Other Software"

Here you can enable the Partners repository (it's not enabled by default) and the Independent repository. This gives you access to certain software from third parties, such as companies (the partners) that have entered into an agreement with Canonical.

So far, so good. But these repositories may pose a security risk, because they aren't always being updated adequately.... Updates come from the partner companies and independent developers, not from Canonical: Canonical only does the packaging for them. Those partner companies and the independents don't always pay as much attention to providing security updates as they should.

For example, in the past the Partners repository contained an outdated and insecure version of Adobe Flash Player (whereas the regular Multiverse repository contained the secure version, under another name!). Same thing with certain localized versions of Adobe Reader (which is a highly attacked target by malware).

So it's better to use this repositories with some care. By all means do enable them, but don't put too much trust in the security of the software you install from it.

Never remove any application that's part of the default installation of Ubuntu or Linux Mint

9. Even when you never use a particular default application: don't remove it. Reason: the default installation is an intertwined system that's dependent on shared supporting files, which makes the operating system run stable.

When you remove a default application, you run a risk of seriously damaging the system. With some default applications this risk is bigger than with others, and with some there's no risk at all. But it's best to avoid this risk altogether.

If you want to, you can remove an unused application from the menu, but don't remove it from the system.

This limitation applies only to those applications, that are part of the default installation of Ubuntu or Linux Mint. Applications that you've added yourself, can be removed safely.

Don't experiment on a production machine
10. Probably not all of your computers are equally important to you. Some computers are real production machines, or "work horses" that you always must be able to rely on. Other computers are more or less like "play boxes"; fun to have, but of no vital importance.

It's important to treat both kinds of computers differently. Do not experiment on a production machine, no matter how tempting it may be to try out something new.

Only do your experiments on the play boxes or on a dedicated testing machine. Because otherwise you may end up suddenly with an unusable computer, and for a production machine that's often a small disaster.

The best approach is, to install only LTS versions of Ubuntu on production machines. Because LTS versions are extra good and reliable. All Linux Mint versions are LTS nowadays (starting with the 17-series), so with Mint you're always OK.

When you want to upgrade a production machine that's already running on an Ubuntu LTS version, to a newer LTS version, then only do that after the appearance of the first point release ("Service Pack 1") of that newer Ubuntu LTS version.

The best practice is, to split your computer work force in three: work horses, play boxes and testing machines.

- on the work horses you only install LTS versions of Ubuntu (starting with Linux Mint 17, all current and future versions of Linux Mint are and will be LTS);

- on the play boxes you can install the latest stable Ubuntu every six months;

- on the testing machines you do your wild experiments, and your bug hunting in alpha and beta editions of the development versions of Ubuntu or Linux Mint.

Common sense really
jenkins4 is online now   Reply With Quote
The Following 2 Users Say Thank You to jenkins4 For This Useful Post:
BaZZa101 (04-12-15), Ladybbird (01-12-15)