Feeds

Delayed Debian plans Valentine's weekend arrival

Android phones, prepare to get hacked

Beginner's guide to SSL certificates

The next version of Debian - the basis of Ubuntu - could arrive this weekend, five months late and just as it's been hacked into phones running Google's Android.

The weekend of February 14 has been penciled in as a "tentative target" for the long-awaited Lenny release of Debian, the project team has said.

Coming in the wake of past busted Lenny deadlines the Lenny team promised they'd stick to this weekend's date saying they'd only shift if something really critical popped up that can't be handled as an errata, or if they end up unable to release during the weekend because of a technical problem.

Lenny has been in "deep freeze" since the second release candidate was posted on January 31, with the team testing packages in the release as they stand, without major new features or code changes added.

The Debian team last December said it expected a "good number" of bugs to affect the Lenny RC but a short list of bugs that "must absolutely be fixed" would be drawn up.

Others would be shifted to a later date. Already, the Lenny team has promised an update release called "Lenny-and-a-half" that will add drivers needed for newer hardware.

If the Debian team stick to the plan, then the good news is at least Lenny beat the worst expectations of its release. Debian Bastian developer Venthur last October calculated it would take a further eight to nine months to bring Lenny up to release quality. The acid test will be in the reception Lenny gets this weekend, and whether people like what they get or feel bugs important to them went unfixed in order to hit this weekend's latest deadline.

Among the planned Lenny features are support for full IPv6 support, Network File System (NFS) 4 and Large File System (LFS), and Asus EEE hardware.

Ahead of that, it seems enterprising hackers (here and here) have put Debian on T-Mobile's G1 cellphone, running Android. The hackers said they got fully fledged Debian on their G1 Android phones, and were able to access the "full plethora of programs available in Debian" while continuing to use the phone to make and receive calls.

One claimed his installer and bootloader could get you up and running in 10 minutes. The trick is the fact Debian already supports ARM EABI architecture used by Android.

Android purists, meanwhile, can stick with what they know. Google Monday released the Android 1.1 SDK here

Secure remote control for conventional and virtual desktops

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
'In... 15 feet... you will be HIT BY A TRAIN' Google patents the SPLAT-NAV
Alert system tips oblivious phone junkies to oncoming traffic
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
Lotus Notes inventor Ozzie invents app to talk to people on your phone
Imagine that. Startup floats with voice collab app for Win iPhone
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.