David Christensen wrote:
> Why not?
I guess because he's in China and internet costs relatively much there.
On Jul 31, 2018 23:15, "Ben Caradoc-Davies" wrote:
On 01/08/18 11:11, Default User wrote:
> I was going to read up on:
> apt-get dist-upgrade -V -s
> But then today, I was able to do a full upgrade, using:
> sudo aptitude -Pvv update
> sudo aptitude -Pvv safe-upgrade
> sudo aptitude -Pvv full-upg
On 01/08/18 11:11, Default User wrote:
I was going to read up on:
apt-get dist-upgrade -V -s
But then today, I was able to do a full upgrade, using:
sudo aptitude -Pvv update
sudo aptitude -Pvv safe-upgrade
sudo aptitude -Pvv full-upgrade
Finally!
Now, I'm sure using:
apt-get dist-upgrade -V -s
w
On 01/08/18 03:57, Dan Ritter wrote:
> On Tue, Jul 31, 2018 at 11:38:34AM -0400, Karen Lewellen wrote:
>> Hi everyone,
>> While the question seems simple, at least to me, the reason behind it is
>> complicated. so I am hoping to focus on the question first.
>> During the dh key exchange process, w
On Tue, Jul 31, 2018 at 06:05:04PM -0700, David Christensen wrote:
> On 07/31/2018 05:42 PM, Roberto C. Sánchez wrote:
> > On Tue, Jul 31, 2018 at 05:36:41PM -0700, David Christensen wrote:
> > >
> > > One possibility is to configure your Internet gateway to block traffic
> > > between the host a
On 07/31/2018 05:42 PM, Roberto C. Sánchez wrote:
On Tue, Jul 31, 2018 at 05:36:41PM -0700, David Christensen wrote:
One possibility is to configure your Internet gateway to block traffic
between the host and the Internet, and then install from CD-1, DVD-*, BD-*,
etc., media.
An easier appro
On Tue, Jul 31, 2018 at 05:36:41PM -0700, David Christensen wrote:
>
> One possibility is to configure your Internet gateway to block traffic
> between the host and the Internet, and then install from CD-1, DVD-*, BD-*,
> etc., media.
>
An easier approach would be that when the installer asks "W
On 07/31/2018 02:56 PM, Long Wind wrote:
i plan to install debian by network
Okay.
i don't like security update,
Why not?
how to do it? Thanks!
One possibility is to configure your Internet gateway to block traffic
between the host and the Internet, and then install from CD-1, DVD-*
I've solved this problem creating a xorg.conf file at /etc/X11/ with
the command "Xorg -configure" and disabling PageFlip in this file at
the section Device, uncommenting the Option "PageFlip" and setting it
to "False" (between quotes).
--
Thiago Machado da Silva
I was going to read up on:
apt-get dist-upgrade -V -s
But then today, I was able to do a full upgrade, using:
sudo aptitude -Pvv update
sudo aptitude -Pvv safe-upgrade
sudo aptitude -Pvv full-upgrade
Finally!
Now, I'm sure using:
apt-get dist-upgrade -V -s
would have worked as well, although
Hi
just putting my answer at the top.
My client does have a log option, will aim for that. still again my first
priority is finding a place to test with a nonstandard port. then I can
be sure it really is all about port 22 and 21.
Kare
On Tue, 31 Jul 2018, Dan Ritter wrote:
On Tue, Jul
> I can't find any evidence for that without being told where to look.
It was in the previous message:
https://packages.debian.org/sid/libmpfr4
https://packages.debian.org/sid/libmpfr6
>> Doesn't explain why one says "Package: libmpfr4 (3.1.6-1)" and the other
>> says "[mpfr4_4.0.1-1.dsc
On Tue, Jul 31, 2018 at 01:01:31PM -0400, Karen Lewellen wrote:
> Hi again,
>
>
> > ssh-keygen is a command that comes along with your SSH client in
> > Debian (and all other UNIX-like systems that supply OpenSSH).
> Understood.
>
> > That sounds like your DSL company decided to block port 22,
>
Hello,
The files .local/share/xorg/Xorg.0.log, /var/log/user.log and
/var/log/syslog are flooded with the same messages. The files are
huge. The messages are:
(EE) modeset(0): Failed to get GBM bo for flip to new front.
(EE) modeset(0): present flip failed
--
Thiago Machado da Silva
Hi again,
ssh-keygen is a command that comes along with your SSH client in
Debian (and all other UNIX-like systems that supply OpenSSH).
Understood.
That sounds like your DSL company decided to block port 22,
which is somewhere between ridiculous and evil.
(21 is FTP, by the way.)
Yes, on p
On Tue, Jul 31, 2018 at 12:07:53PM -0400, Karen Lewellen wrote:
>
> Hi, thanks with answers.
>
> On Tue, 31 Jul 2018, Dan Ritter wrote:
>
> >
> > You generate a private/public key pair with ssh-keygen, and send
> > the public key over to your destination in advance, so that they
> > can recogn
On Tue 31 Jul 2018 at 10:01:00 (-0400), Stefan Monnier wrote:
> >> Funny thing is, this is what the versioning says on those pages:
> >> Package: libmpfr4 (3.1.6-1)
> >> Package: libmpfr6 (4.0.1-1)
> >>
> >> ...ok, that's strange. Even weirder, they are both built from the same
> >> sources: mpfr-4
Hi, thanks with answers.
On Tue, 31 Jul 2018, Dan Ritter wrote:
You generate a private/public key pair with ssh-keygen, and send
the public key over to your destination in advance, so that they
can recognize you.
Okay, I understand. Meaning that keygen is a part of the ssh client I
take
On Tue, Jul 31, 2018 at 11:38:34AM -0400, Karen Lewellen wrote:
> Hi everyone,
> While the question seems simple, at least to me, the reason behind it is
> complicated. so I am hoping to focus on the question first.
> During the dh key exchange process, where do the user dh key packets come
> from
Hi everyone,
While the question seems simple, at least to me, the reason behind it is
complicated. so I am hoping to focus on the question first.
During the dh key exchange process, where do the user dh key packets come
from software wise?
I have a problem now where each place I try to visit us
>> Funny thing is, this is what the versioning says on those pages:
>> Package: libmpfr4 (3.1.6-1)
>> Package: libmpfr6 (4.0.1-1)
>>
>> ...ok, that's strange. Even weirder, they are both built from the same
>> sources: mpfr-4.0.1-1.
Indeed, I find that odd.
I suspect that the "3.1.6-1" in the "ti
On Mon, Jul 30, 2018 at 03:55:52PM +0300, Алексей wrote:
I can't set the MTU in the eth0 configuration. I can probably write a pre-up
directive in the configuraion of the first vlan interface however I'm not sure
if this is correct way. Probably someone can advice better one?
You can do it with
Hi.
Here it is:
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).
# The loopback network interface
auto lo
iface lo inet loopback
auto eth0
#auto eth1
#auto eth2
auto eth3
auto vlan8
iface vlan8 inet stati
[...]
> Hi Martin,
>
> can you show real data from /proc/loadavg output? Which column do you
> compare?
I' talking about the 1/5/15 minute numbers.
> I wouldn't worry about difference in /proc/loadavg because everything is
> different between RHEL/CentOS 6 and Debian 9 - kernel, Apache version,
On 07/31/2018 10:31 AM, Martin Drescher wrote:
> Hi ML members,
>
> I have a question about how the numbers compute which I get from
> /proc/loadavg.
> I'm running a bunch of HTTP servers, most of them running a RHEL 6, which is
> a kernel version 2.6. All patches applied, so that Meltdown and S
Hi ML members,
I have a question about how the numbers compute which I get from /proc/loadavg.
I'm running a bunch of HTTP servers, most of them running a RHEL 6, which is a
kernel version 2.6. All patches applied, so that Meltdown and Spectre stuff
should be included. Some of the servers where
26 matches
Mail list logo