Y was broken by X only in a stupid implementation from the
1990s and all other Libre software have been doing X without breaking Y
for decades.
Regards,
--
Nicolas George
g that looks like breaking signatures. Do you mean
dash-dash-space-LF signatures or digital signatures?
Regards,
--
Nicolas George
it
still requires running programs: if the issue is that the system does
not want to run programs, chroot will not convince it.
What is needed is to extract manually enough of the shared libraries.
Regards,
--
Nicolas George
Greg (HE12025-07-14):
> Sure. All the old hands (Hasler, Wright, tomas, Wooledge et. al.) are
> using Gnome, the default Debian desktop.
Any evidence to support that claim?
--
Nicolas George
using Gnus to read this mailing list,
> please get real.
So, you would have a webforum with new users asking questions and
experienced users who could give answers still on the mailing-list.
Is it a underhanded plan to have the experienced users quietly by
themselves?
--
Nicolas George
Greg (HE12025-07-11):
> Does that mean to a different filesystem on the same disk it's a move rather
> than a copy?
The fact that it is on the same disk is not relevant. Apart from that, I
suggest you re-read Dan's mail more carefully, everything was in it.
--
Nicolas George
of the process it's no longer a "copy."
Indeed. And you might notice it is exactly what Dan said.
--
Nicolas George
selves in order to attract hypothetical users.
It is bound to fail, and it denotes quite a bit of condescension. That
the condescension is mostly warranted does not make it ok.
Regards,
--
Nicolas George
hw (HE12025-07-11):
> (S)FTP is still in use like for cameras, scanners (printers) and phones.
Do you have a few examples of brand and models of cameras and phones
that use FTP?
--
Nicolas George
r boot.
> That's possibly because the Linux drivers perform some settings on
> the hardware. The boot firmware (EFI ?) and GRUB obviously don't do
> what is needed.
Indeed. The described problem is EXACTLY what we should expect if the
firmware has lost ability to drive USB but the Linux kernel still works.
Regards,
--
Nicolas George
Felix Miata (HE12025-07-09):
> This may have nothing to do with Debian or any OS. It could be either
> firmware in
> the motherboard
Nit: the firmware in the motherboard is an operating system.
Regards,
--
Nicolas George
scribe is an issue in your system firmware: the devices start
working when Linux takes control, the problem is not Linux.
> Later, after other system updates, the the keyboard and the mouse are
> working again during boot, and so on: the on/off cycle repeats.
That was not clear.
Regards,
--
Nicolas George
Jeffrey Walton (HE12025-07-01):
> However, setuid on a script is considered a security
> flaw.
Was. Now it just does not have any effect.
Regards,
--
Nicolas George
actice might trigger one of the ineffective anti-spam constraints that
the oligopolistic operators are forcing on every body for other reasons
than fighting spam.
Regards,
--
Nicolas George
n
MUA bounces. And MTA forwards are much closer to MUA bounces than MUA
forwards.
Regards,
--
Nicolas George
Greg (HE12025-06-27):
> It is not the accepted meaning of the term.
Did you not already tell that? Was not Greg Wooledge precisely replying
to that?
--
Nicolas George
ords used in different fields?
--
Nicolas George
ail, then the previous relay has to generate
delivery status notification message.
Regards,
--
Nicolas George
seriously wrong here, but I cannot guess if it is in
SpamAssassin's design or in the way it has been set up in this instance.
Regards,
--
Nicolas George
sage completely wrong.
Regards,
--
Nicolas George
um to the safe place.
Regards,
--
Nicolas George
ical damage or theft.
Regards,
--
Nicolas George
apis;x86_64" \
-d pixel_7
emulator -avd Pixel_7A_x86_64 -no-boot-anim -gpu off
Regards,
--
Nicolas George
rhkra...@gmail.com (HE12025-05-02):
> What lesson is that?
Never run a script with any privileges unless you know exactly what it
does.
Regards,
--
Nicolas George
put.
There are always good reasons to use zsh.
Regards,
--
Nicolas George
on the hard way.
> So I need help in finding out exactly "how" to make it connect in
> recovery mode in order to run apt and restore my laptop to working
> again.
I think it will be less painful for you to backup your data and system
config files to an external device and then r
rewall rules.
What you are trying to achieve looks a lot like VPN software, look it
up.
Regards,
--
Nicolas George
he correct way of booting Debian 12 without a graphical interface?
Hi.
You need to look at `systemctl set-default`.
Regards,
--
Nicolas George
Mario Marietto (HE12025-04-28):
> This seems to be an interesting alternative to compare to xpra also because
> it works even on FreeBSD (the OS that I use everyday) :
>
> https://winswitch.org/dev/
Please tell us if you find it useful once you have tested it throughly.
--
Nicolas George
Mario Marietto (HE12025-04-28):
> Usually I check after that someone gave me some general idea.
Then I suggest you apply the same rule even more strictly to saying.
--
Nicolas George
Mario Marietto (HE12025-04-28):
> I think i can detach an application with ssh and a proper parameter.
Checking is better than thinking without checking.
Be sure to tell us the results of your experiments.
--
Nicolas George
;>>> even over laggy ADSL links and you can detach the window from the local
>>>> display and reattach it to another.
And once again, partially, when I replied to one of your own suggestions:
>>>> Xpra would bring you the ability to detach apps on a per-VM basis
--
Nicolas George
een mode, and that would require changing the way I have been
doing things with regard to hot-plugged screens.
Regards,
--
Nicolas George
ime. If I run firefox through x2go for example,
will I get (1) one big window with the firefox window in it, and if
firefox opens a save dialog it will be inside the big window, or (2) a
window for firefox, integrated with my local wm, and the save dialog
ditto?
Regards,
--
Nicolas George
ending bitmaps of
its windows.
Regards,
--
Nicolas George
t fast and
detachable.
Regards,
--
Nicolas George
window, still responsive.
I am rather fond of Xpra. Before considering installing it from sources,
I wanted to ask:
Do anybody know another tool with the same features, still packages for
Trixie?
Regards,
--
Nicolas George
enefit? Will I find a trove of package already
implementing network protocols and standard algorithms, or be able to
run Perl 5 packages somehow? And so on.
Do you know the answer to these questions? Or a place where somebody
wrote them?
Regards,
--
Nicolas George
point where average
human eyes start losing alignment.
Regards,
--
Nicolas George
ately, that is just
not true.
> Then again, looking at their site, so is everything
> else they do, including their TOU.
What do you think is wrong in their terms of use?
--
Nicolas George
Oq8mb1L"
(do not worry, this is not the real key).
Regards,
--
Nicolas George
Roger Price (HE12025-04-17):
> Very easy for him - he's a manager - he will say "Use software!". Problem
> solved. Roger
“I did. I am sure my mail is blue. Is it not?” and join a screenshot.
Regards,
--
Nicolas George
believe you).
Monochrome is rather stretching it in this day and age. Better evoke the
situation of people with sight disabilities, because it is true that
they might have special needs, including about color, to be able to read
something.
Regards,
--
Nicolas George
3;91m italic red \e[0m ", but they are ignored
> in
> an e-mail message body.
>
> Is there some way of producing colored text without using HTML ?
Not possible.
Regards,
--
Nicolas George
source-files/TFP2021.pdf
> ].
>
> Suggestions?
Have you tried starting with pdftotext -layout and then adding the CSV
delimiters using a powerful editor. The rectangle selection of Vim might
be useful.
Regards,
--
Nicolas George
rive. If it did,
it would not cal it unknown-block(0,0).
Regards,
--
Nicolas George
nient if you want to run several
> commands as root instead of just one.
Not true: with a root shell, you need to be extra careful at all time.
With sudo in front of the privileged commands, you only need to be
extra careful when you type sudo.
Regards,
--
Nicolas George
robably because of
radio interferences.
Regards,
--
Nicolas George
ifying it that sudo makes things more complex than su.
Please, when replying to this, double check you do not commit the second
fallacy to assume that one thing is simpler than another when the
difference is you already know the first and not the second.
Regards,
--
Nicolas George
That includes the root data structures of
most anything that could already been there, so the rest, the data that
will not have been overwritten, will be mostly unusable without a lot of
effort.
Regards,
--
Nicolas George
of LF, as Tomas
mentioned? For that, you would need to hit ctrl-enter and see ^M in the
terminal, each time before you hit enter.
Regards,
--
Nicolas George
reason why I decided to use some option to set
> $HOME.
I strongly suggest you learn to use sudo as sudo is intended to be used
rather than using it as an imitation for su. You would not have had this
problem if you did.
Regards,
--
Nicolas George
n.
> My recommendation is to create a one-line configuration file:
My recommendation is to learn to use sudo itself rather than trying to
emulate su. Having the privileged commands logged is a good idea. Using
privileges only with commands that need it is a good idea. Having the
same shell history
ot; without really
> understanding how it works.
Must not comment. Must not comment.
Regards,
--
Nicolas George
jeremy ardley (HE12025-03-26):
> One reason to choose VPN over ssh is that many ISPs block incoming ports
> including ssh, telnet, RDP, smtp, and smb ports.
And they do not block ports used for VPNs. How convenient.
--
Nicolas George
binary files with it.
Regards,
--
Nicolas George
: if your users might not be able to install port knocking software,
not allowed to run VPN clients, or if an annoying firewall is in the
middle, you have no choice but to let a public access.
Regards,
--
Nicolas George
hrough the VPN to internal systems.
> Why do you think SSH is less secure than any other VPN ?
Why do you think Jan says ssh is less secure than a VPN when Jan is
saying that ssh is less secure than VPN+ssh?
I suggest to add port knocking to protect the VPN.
Regards,
--
Nicolas George
cess returned error exit status 1
Then read backwards until you find the error message from the
subprocess. I did, it was quite obvious, you only need to read a dozen
lines at the end.
(And I assume somebody will just give you the answer instead of letting
you learn to find it by yourself. Sigh.)
many scenarios where it is useful, you just have to exercise
your imagination.
Maybe client does not and should not have network access to nas.
Maybe alexandria does not have the hardware to plug the disks.
Maybe alexandria implements caching that nas is not capable of doing.
And so on and so on.
Regards,
--
Nicolas George
to...@tuxteam.de (HE12025-03-20):
> Sorry if that came across as rude.
Do not be: not reading before replying at least to see if what one is
about to reply has already been addressed and therefore wasting
everybody's time is way ruder than your message might seem.
Regards,
--
Nicolas George
equivalent to no full backup after the very first one. And the very
first one can be considered an incremental backup over a full one of no
data at all.
Regards,
--
Nicolas George
Hans (HE12025-03-14):
> Depends on, what you prefer: in console, or with GUIn as conjob or whatever
A tool that cannot be automated is not a backup tool.
Corollary: a GUI-only tool is not a backup tool.
Regards,
--
Nicolas George
ile you damaged, which is part of the job description of a
backup tool.
Regards,
--
Nicolas George
and gdisk telling us the block device has the
wrong size: the issue is absolutely not the filesystem on it.
Also, this is not Windows, please do not use “format” as a verb for a
disk.
Regards,
--
Nicolas George
16 2147483647 sdb
>> Found valid GPT with protective MBR; using GPT.
>> Disk /dev/sdb: 4294967294 sectors, 2.0 TiB
Regards,
--
Nicolas George
.
The point of the test is: if it succeeds, you can reasonably hope that
the device will continue working for some time.
Regards,
--
Nicolas George
Yassine Chaouche (HE12025-03-04):
> I see this as a "forum" mode
It is not called “forum mode”, it is called “egoistic mode”, because the
poster expects other people will read their messages and provide help
but is not willing to do the same for others in return.
Regards,
--
Nicolas George
to...@tuxteam.de (HE12025-03-04):
> > That is a terrible idea.
> Not if done right.
“Not if done right” has been said of all terrible ideas in the history
of terrible ideas.
Regards,
--
Nicolas George
That is a terrible idea.
Regards,
--
Nicolas George
u should not give them the privileges to do it
in the first place) and you cannot come do it during the lessons.
Regards,
--
Nicolas George
to unexpectedly throw away perfectly
good computers just because they do not have the latest fake-security
chip mandatory for the new release of Windows
Regards,
--
Nicolas George
it that the last line gives sudo privileges to
the sudo user, not group?
Regards,
--
Nicolas George
the good answers.
--
Nicolas George
lled a solution.
Those who call it a solution should let the LLMs speak.
The only way to achieve a reliable result is to understand what is going
on. I am flabbergasted that so many people on this list do not start
with that. This is probably the last contribution from me in this
thread.
Regards,
--
N
Max Nikulin (HE12025-02-12):
> I would not be surprised if it is not explicitly documented.
At worst, the source code is the documentation.
Regards,
--
Nicolas George
a way, but it would be less efficient than installing
Windows or Macos instead of Linux.
If you want a Linux way to solve the issue: first, read the
documentation of xfce-terminal to see how it decides which web browser
to run; then read the documentation of that mechanism to see how to
configure it.
Regards,
--
Nicolas George
if you want the keys to be handled without a
desktop environment, you will need to explain the circumstances in more
details.
Regards,
--
Nicolas George
/input/event0
and press a few keys. If it prints something, you know the keys work. If
it prints nothing, you break it with ctrl-C and you start again with
event1, then event2, etc., until either you have found the keys work or
you have exhausted the event devices.
Regards,
--
Nicolas George
o:
>> - gdm3 uses some kind of windows-like registry for its configuration and
>> the documented way to disable the users list
>>
>> <https://help.gnome.org/admin/system-admin-guide/stable/login-userlist-disable.html.en>
>> has no effect;
--
Nicolas George
Nicolas George (12025-01-30):
> So, in short, and in reverse order:
>
> With gdm3, users are logged into the kind of session they used last.
>
> With lightdm with users list, same.
>
> With lighdm and the default config of hidden users list, users are
> logged into the k
Debian LightDM setup: if you want the default
> session to be the last, perhaps you can try assigning "last" value to it (I
> don't know, I have tried it)
No effect.
That would have been rather surprising, in fact: why should the behavior
be different if users list is shown or not.
Regards,
--
Nicolas George
and lets users choose their session types without forcing
one on them.
Regards,
--
Nicolas George
tons like that run on client-side.
The look-and-feel seems a bit basic too, but it can probably be changed.
Thanks for the suggestion, worth considering.
Regards,
--
Nicolas George
rkdown”, I
could use DokuWiki.
--
Nicolas George
kaged project, it is not unlikely. It is more a matter
of whether they will have drawbacks I had not anticipated, like
requiring a permanent daemon for each instance. (My goal is to run
multiple lightly-loaded instances on the same VM.)
Regards,
--
Nicolas George
ki, I had not really thought
about it in depth and I did not really want a wiki. I cannot really
blame you, so many people posting here come asking for X when it is
really Z they need.
But in the future, I suggest you keep this kind of assumption for cases
where you have strong clues that it is the case or for when some time
has passed and no satisfactory answer was given.
Regards,
--
Nicolas George
d not and now they want to edit each other's page.
Plus, I suspect just like the markdowku plugin, the one that does not
require explicitly saying , the buttons still produce custom
syntax.
Regards,
--
Nicolas George
itor in another window.
I might be wrong, but it does not look remotely like a wiki. Would you
explain?
--
Nicolas George
but the custom
syntax is still there interacting with Markdown and the editor buttons
are still made for the custom syntax.
Regards,
--
Nicolas George
but simple and reliable, I can give it a
try too.
Thanks.
--
Nicolas George
ll not need updating.
Only need to schedule for unexpected software breakage once every two to
five years.
Regards,
--
Nicolas George
Andy Smith (12025-01-18):
> Why do you continue to post to this list
Why do you continue replying?
Regards,
--
Nicolas George
is how far I am willing to discuss this.
--
Nicolas George
security control for at least 15 years. This should be no
> surprise to anyone nowadays.
I am not denying that. You made a different statement, that I leave
quoted, and you have nothing to support that statement.
--
Nicolas George
ten use compression to
> > > minimize writes and blocks written during a write cycle.
--
Nicolas george
Jeffrey Walton (12025-01-15):
> Probably better since disk controllers often use compression to
> minimize writes and blocks written during a write cycle.
I find that statement highly dubious. Do you have a source?
Regards,
--
Nicolas George
does not have to be as soon as the
mantissa is greater than one. Notice that the heights of mountains are
in meters, not in kilometers, even for the Himalaya. It is better to go
to M and only then switch to 9.77 G: more significant digits, not
less readable.
(Also, the people who designed the symbols for the prefixes really
dropped the ball with k instead of K, but that predates memory units by
a long time.)
--
Nicolas George
uences.
--
Nicolas George
as the benefit of not being overwritten on the
next upgrade.
Regards,
--
Nicolas George
1 - 100 of 1418 matches
Mail list logo