Feeds

Ten tweaks for a new Acer Aspire One

Take charge of Linpus

Choosing a cloud hosting partner with confidence

5. Install Skype

The AA1 is a great communications device, but Skype doesn't come pre-installed. Head over to the Skype website and download the VoIP app. You're looking for the Linux versions and, in particular, the release for Fedora 7, the Linux distribution on which the AA1's Linpus Linux is based.

Skype downloaded

Skype's .rpm downloaded

When it's downloaded, open up your AA1's Downloads folder - click on any of the entries in the desktop's Files section - and double-click on the skype-2.0.0.72-fc5.i586.rpm icon.

Again, when it's installed, Skype will appear in the Advanced Menu, part of the Network sub-menu.

6. Add Desktop Icons

It's all very well having the Advanced Menu, but for some apps you'd also like the fast access provided by the AA1 desktop. Here's how you make them appear. Press Alt-F2, type in xterm to open the command line window - experienced Linux hands call it a Terminal - and click on Run...

Linpus' desktop configuration file

Linpus' desktop configuration file
Click for full-size screengrab

At the command line, type sudo mousepad /home/user/.config/xfce4/desktop/group-app.xml and hit Enter. This calls up the desktop's configuration file. Scroll through and you'll see how the entries are arranged. Skype's already present, but it's set so that the desktop will ignore it - remove the !-- at the start of the line it's in and the -- at the end. You'll also need to change the app sequence= number - set it to 8.

Save the file then restart your AA1. Click on the right-arrow button in the Connect section, and you should see a new Skype icon. Drag and drop it higher in the list if you prefer.

Linpus' desktop with new icons

The AA1 desktop... with new Skype, VLC and Gimp icons
Click for full-size screengrab

Other apps are kept in the AA1's /usr/share/applications folder as .desktop files. You can add these to the desktop UI by editing the group-app.xml file as above, copying the Skype line, pasting it into any of the four sections and changing the name of the app to be loaded. Make sure all the apps in a section - indicated by the <id>x</id> tags - have different app sequence= numbers.

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Tim Cook: The classic iPod HAD to DIE, and this is WHY
Apple, er, couldn’t get the parts for HDD models
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.