Feeds

Ten tweaks for a new Acer Aspire One

Take charge of Linpus

High performance access to file storage

5. Install Skype

The AA1 is a great communications device, but Skype doesn't come pre-installed. Head over to the Skype website and download the VoIP app. You're looking for the Linux versions and, in particular, the release for Fedora 7, the Linux distribution on which the AA1's Linpus Linux is based.

Skype downloaded

Skype's .rpm downloaded

When it's downloaded, open up your AA1's Downloads folder - click on any of the entries in the desktop's Files section - and double-click on the skype-2.0.0.72-fc5.i586.rpm icon.

Again, when it's installed, Skype will appear in the Advanced Menu, part of the Network sub-menu.

6. Add Desktop Icons

It's all very well having the Advanced Menu, but for some apps you'd also like the fast access provided by the AA1 desktop. Here's how you make them appear. Press Alt-F2, type in xterm to open the command line window - experienced Linux hands call it a Terminal - and click on Run...

Linpus' desktop configuration file

Linpus' desktop configuration file
Click for full-size screengrab

At the command line, type sudo mousepad /home/user/.config/xfce4/desktop/group-app.xml and hit Enter. This calls up the desktop's configuration file. Scroll through and you'll see how the entries are arranged. Skype's already present, but it's set so that the desktop will ignore it - remove the !-- at the start of the line it's in and the -- at the end. You'll also need to change the app sequence= number - set it to 8.

Save the file then restart your AA1. Click on the right-arrow button in the Connect section, and you should see a new Skype icon. Drag and drop it higher in the list if you prefer.

Linpus' desktop with new icons

The AA1 desktop... with new Skype, VLC and Gimp icons
Click for full-size screengrab

Other apps are kept in the AA1's /usr/share/applications folder as .desktop files. You can add these to the desktop UI by editing the group-app.xml file as above, copying the Skype line, pasting it into any of the four sections and changing the name of the app to be loaded. Make sure all the apps in a section - indicated by the <id>x</id> tags - have different app sequence= numbers.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.