Installing Windows software on LinuxOctober 22, 2025 Linux Tutorials Linux-IntroductionAs already announced at the end of the last article, in this article I would like to show you some ways of trying to get Windows software to run under Linux. Unfortunately, I have to phrase it this way, as not all Windows software runs on Linux. The reasons for this vary greatly, but at least I feel that things have improved in recent years. Even if software manufacturers do not specifically create their own Linux versions, I have seen on occasion that they are at least making an effort to ensure compatibility with Wine.
Installation of native Linux softwareSeptember 24, 2025 Linux Tutorials Linux-IntroductionWe now have a working Linux system thanks to the last article. The next logical step for me is to take a closer look at software installation. Since there are various options available, as is usual with Linux, this article will primarily focus on installing native Linux software. But of course, this is not just an analysis for its own sake; as before, we are taking a goal-oriented approach.
Basic installation of the Linux distributionSeptember 18, 2025 Linux Tutorials Linux-IntroductionAfter covering the general basics of Linux in the first article, this article will finally deal with the installation. However, to keep this article from becoming too long, it will only cover the basic installation. I will begin by explaining why I chose this particular distribution. I will then explain the necessary preparatory work before discussing the most important options during installation.
Linux? What the penguin!?September 15, 2025 Linux Tutorials Linux-IntroductionHopefully everyone is aware that as of October 14, 2025, there will be no more free support for Windows 10 and therefore no more free security updates. This means that security vulnerabilities still present in Windows 10 will no longer be fixed, making computers even more vulnerable to security risks. I would even go so far as to say that criminals are currently hoarding the security vulnerabilities they have found so that they can exploit them for longer after free support ends.