Sevatio Octavio wrote:

> I've only used Mandrake.  How is Red Hat different from Mandrake?
>
> Seve
>
> -----Original Message-----
> From: Henrik Edlund <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED] <[EMAIL PROTECTED]>
> Date: Saturday, November 27, 1999 7:08 AM
> Subject: [expert] Back to Red Hat
>
> >Looks like I am heading back to Red Hat Linux. I am getting tired
> >of Mandrake not releasing security updates. Sigh. Mandrake was
> >good, but they seem to have lost the edge now...
> >
> >--
> >Henrik Edlund
> >http://www.edlund.org/
> >
> >  "They were in the wrong place at the wrong time.
> >Naturally they became heroes."
> >                  Leia Organa of Alderaan, Senator
> >
> >

1.  Red Hat is compiled for 386 on up
2.  The directories are all in the same places, and some of the code is
common
3.  A lot of people get very concerned when RedHat has a security
release and Mandrake doesn't, out of the mistaken impression that
Mandrake=RedHat plus some stuff, which ceased to be true with 5.3.
4.  RedHat is Gnome-Centric though it does have KDE as a bolt-on
5.  The "Borders" option in screen setup is set by default to flip to
other screens when your mouse arrow hits the edge.
6.  RedHat's tech support is the least hospitable experience I can
remember in recent years.  Caldera was better, and they ignored me :-}
7.  RedHat is much better capitalized, but then so is Microsoft.
8.  Both packages come with great bloat and cannot be said to be
attractive to general public users.  A growing discontent at the number
of daemons these distros launch by default is resulting in further
splintering of distributions.  There are several now that offer
downloadable "difference" packages to RedHat.  None offer "difference"
packages for Mandrake.
9.  RedHat distributions with the "RedHat" label cost more than any
Mandrake dsistribution I can buy.
10.  Mandrake does seem a little more dilatory with the security
releases, but then they do have to check to see if their system has the
same vulnerability, and then prepare an update, which may be an entirely
different coding job.
11.  RedHat is the favored target of exploit hunters(after Microsoft),
since it is perceived to be the "standard" or the "biggest" by most of
them, therefore most exploits are discovered first on RedHat.

I am sure I have left out more than I have covered, but that should be a
beginning of an answer to your question.

Civileme

Reply via email to