'Twas brillig, and Kevin Fox at 14/01/10 00:43 did gyre and gimble:
> devices", why not "Poke hole in local firewall"?

Is there a standard way to do this? I guess running ip[6]tables directly
would work if you had root permissions.... is there some kind of
framework (via presumably policykit) to achieve this?

Col

-- 

Colin Guthrie
gmane(at)colin.guthr.ie
http://colin.guthr.ie/

Day Job:
  Tribalogic Limited [http://www.tribalogic.net/]
Open Source:
  Mandriva Linux Contributor [http://www.mandriva.com/]
  PulseAudio Hacker [http://www.pulseaudio.org/]
  Trac Hacker [http://trac.edgewall.org/]

_______________________________________________
pulseaudio-discuss mailing list
[email protected]
https://tango.0pointer.de/mailman/listinfo/pulseaudio-discuss

Reply via email to