Exploring the Gentoo File Manager
ONE FOR ALL
KDE users choose Konqueror, Gnomers use Nautilus, and commandline
fans extol the virtues of Midnight Commander. Gentoo gives you
the best of all these worlds – a desktop independent file manager.
Many Linux users primarily associate
the name Gentoo with a
popular do-it-yourself distribution.
In fact, the distribution has nothing
to do with the file manager of the same
name. As the file manager’s homepage
tells you , both projects are aware
that they share a name, and neither of
them minds. This would be unthinkable
for commercial software, but it works
fine for Gentoo. Both Gentoos have
something in common, flexibility! The
file manager gives you an enormous
range of configuration options to meet
your needs, and that makes it an indispensable
companion on your desktop.
Many distributions, including Suse,
Debian, or Mandrake Linux, have their
own Gentoo packages, so you can use
your distro’s package manager to install
Gentoo. If your distribution
does not have a
binary, or if you prefer
to use the latest Version
0.11.54, you will
need to build from the
source code. After
archive from ,
unpack the file and
change to the directory
that this step creates.
Gentoo is based on the
Gimp Toolkit (gtk),
version 1.2.x, so you
will need the matching
developer packages to
build and install the
file manager. Make sure the requirements
are fulfilled, and then go on to
build and install Gentoo with the normal
three commands: ./configure, make, and
su -c “make install”.
Buy this article as PDF
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.