Introduction

This guide will walk you through installing Ubuntu 10.04, aka “Lucid Lynx”, the April 2010 Long Term Support (LTS) release with encrypted home directories.

What is Linux?

Linux typically refers to the collection of software that runs on top of the Linux Kernel. While in colloquial use, “Linux” often refers to a compiled selection of software packaged to run together as an operating system, the name Linux specifically refers to the kernel, which is the interface between the hardware and all the other software that runs on a computer. For the sake of brevity, linux is a mature, secure operating system that includes a wide collection of powerful software that is usually both free as in beer (cost) and free as in speech (freedom). It offers powerful free tools that enable one to computer and communicate securely and privately.

What is Ubuntu Linux?

Ubuntu linux is a Linux Distribution that is based on the Debian Linux distribution, with corporate support from Canonical and a 6 month release cycle. It is a distribution whose design is focused around ease of use and setup, stability, accessible security, a very wide array of pre-packaged software, and has one of the largest adoption rates of any linux distribution. The main Ubuntu release runs the GNOME Desktop Environment, but also has different flavors that run different desktop environments, such as Kubuntu, which runs the KDE Software Compilation, or Xubuntu, which runs the Xfce Desktop Environment. This guide recommends the Ubuntu 32bit 10.03 Lucid Lynx release of Ubuntu for ease of use and features.

How to install Ubuntu Linux

This guide recommends the use of the 32bit version of Ubuntu.

This script and instructions can guide you through installing common software that isn’t installed in Ubuntu by default, usually for space reasons or because of legal uncertainties in some countries (like restricted codecs–patent licenses), and making various customizations that people often want upon a new install of ubuntu. I believe it was written by the maintainer of the webupd8.org blog (with whom I have no affiliation), though if one is feeling particularly paranoid, one can simply search for and perform the actions that are done in the script, or even review the code of the script oneself and determine if it is performing any unknown and/or nefarious functions. For the most secure machine, only install software that you need from sources you trust.

Recommended Additional Security Measures: