You are not logged in.
Right. Some random googling suggests https://volumio.org/forum/vcgencmd-comm … html#p6319 to me, but you might have tried that already?
You might find something useful at https://www.syslinux.org/wiki/index.php?title=PXELINUX.
That Ubuntu solution is not right for Devuan.
However they suggest that hdparm -S is ineffective, and maybe that's the first thing to investigate. If it works fine, then the command
# hdparm -S 2 /dev/hdawould make the disk /dev/hda spin down after 10 seconds. Perhaps you can check that to begin with.
If that works, then the resume code path that leads to that (or the similar) command is broken, and we can look at that.
If not, then it's a more difficult problem.
If I understand it right, the basic tenet against a published Troll Count is on the line that it's more likely to be (mis-) used by a bunch of dickheads banding together to wield dickheadary against some normal adult member, than that it's used by the normal adult members as (weak) indicator towards the censoring of a dickhead.
Well, perhaps. I'll leave my head where it is for the moment.
Just to add some motivation:
My assertion is that when you are trolling, you are trolling whether you think so or not; it's not up to you, as a troll, to judge it right or wrong. Further, I believe some people would be too polite to nominate a troll if they thought the troll would see them doing it. They would rather suffer the trolling, and that would dull any edge of this extension.
The troll list is that little bit different from an ignore list in publishing the count, in the hope that it both stimulates people to evaluate the (perhaps) trolling posts more thoughtfully, and triggers self-criticism for the (somewhat) trolling poster.
You got it right. There is no way you can find out who are ignoring you (short of bribing me to tell you, of course).
Great! Dutch, or "Netherlands", is a new language for this forum, as is German ("Deutche"), so those tasks will involve the full grunt of translating some 1500 phrases, and 16 email templates.
I used to have a script that made a CSV for the phrases to make it easier But, as that was a couple of laptops ago, it'll take a short while to recall. When I've done so, and prepared the basis, I'll email it to your registration email address.
It reminds me that I'm still sitting still on the Swedish translation ![]()
Perhaps one of you could spell out a way in which this might be abused, or rather I assume, a way in which this function can be used to abuse someone?
Is it that you think, that by X seeing an elevated troll count for Y, they (X) would be more inclined than otherwise to also nominate Y as troll? Or that Y would be unhappy seeing that so many members see them as a troll?
If Y is trolling in the eyes of some/many, then Y is trolling in the eyes of some/many, whether Y thinks so or not.
Without feedback, Y won't learn or change.
Package locales seems to be the owner of /etc/locale.gen (or at least the man page).
I think you're using the url tag back-to-front; it takes the actual url in the begin tag, and the description between the tags. So if you swap those, it becomes a click-accessible url. As is, one has to copy that url that is seen and paste to follow, rather than clicking it.
devuser might be right, though one thing is that you do need to allow forwarding between tunX and tunY.
server-vpn might keep its clients up-to-date with its own gateway, which changes from 192.168.x.1 to be 10.8.y.1. It thus configures its clients' routing to pass 10.8.y.1 traffic through itself, and that traffic would stop at the forwarding block.
Yes, forget my nonsense about masquerading on the output chain, and check routing regarding the ethX network. In particular, the server-vpn return traffic must not be routed through the client-vpn.
I think, since those are locally generated but with remote sources, you'll also need a MASQUERADE rule on the OUTPUT chain of the nat table. I suppose the set up of the first openvpn (the server) should have dealt with it, but it perhaps worked out to use something else (eth0) as its outbound interface. In fact, maybe a restart of the server, after the outbound openvpn (client) is set up makes this happen?
Could it be that the outbound traffic through tunY needs NAT (i.e. a MASQUERADE rule)?
Several years ago a new "feature" was implemented on this forum. It sparked a barrage of sometimes charged comments but not one of them predicted the future of this experiment correctly. It was only used a few times, quickly became a non-issue and then was forgotten in time! All that remains is an ignore function which some might find useful.
This forum has now gained a Troll Deterrent Extension, which involves the following:
The Display tab of the Profile page now includes an entry field where you can nominate usernames that you figure are trolls.
Any post by a troll of yours is replaced, for you, by a blanket notice instead of actual content. You can only see their posts if you withdraw the nomination.
In addition, there is a Troll Count in the user information area of all posts. This shows how many members consider the poster to be a troll. This however is only shown when the count exceeds a threshold.The current threshold is 2, i.e., if 2 or more members figure a poster being a troll, then the poster's Troll Count is shown to everyone, including guests, for all of that member's posts. The Troll Count Display Threshold is an administration option.
At the moment, the Troll Deterrent Extension is in English only.
Yes, the iso files in https://files.devuan.org/devuan_ascii/desktop-live/ have SHA256 message digests as documented by the SHA256SUMS file in the same directory:
76584ce7183993306af8b00edc8ffce3a1dc69b10f0a97e0a6302d49b0a63858 devuan_ascii_2.0.0_amd64_desktop-live.iso
8f535c235897303a5d55266858ffe9fe6c4d3e830f609c77c406f6e4aed0befa devuan_ascii_2.0.0_i386_desktop-live.isoIf you get something else, then the downloaded iso has got corrupted, and it's then a good idea to download anew, possibly from an alternative source.
I followed Luke to the source, and saw that ntp has a script added into /etc/dhcp/dhclient-exit-hooks.d/ that apparently does some willy-nilly restart attempt upon dhcp events,
Well, if things work as is, then you may well leave it at that.
Otherwise, the one thing I could pick up was the missing broadcast address in wicd-wired-settings.conf, which might make a difference; perhaps it causes the networking stack to fail in its ARP. You should probably assign that to 192.168.0.255 or whatever is correct for your subnet.
And otherwise^2, I think the "proper" way to avoid wicd managing eth0 would be to avoid the wired_interface = eth0 assignment in wicd-manager-settings.conf, and instead make that wired_interface = (or remove it, perhaps). For myself, I use wicd-curses rather than editing the configuration files directly.
afaik there's no deprecation happening here; it's rather that proponents of apt are more keen to voice their perspective.
In general, and as you probably know, the interfaces file is used by the ifupdown network management system, whereas wired-settings.conf is used by the wicd network management system. The former is more passive, and only operates on interfaces as explicitly commanded, e.g. # ifup eth0.
wicd is actively managing the interfaces it is told to manage; it's a daemon program that discovers changes to interface status and acts on these. Especially, if you have told wicd to manage eth0 it will do so, but if you haven't, it won't. I think wicd by default will configure itself to manage eth0 upon installation, but it's certainly the first thing to confirm.
If wicd is set to manage eth0, then it will do so according to wired-settings.conf. There's barely any magic involved at all, though in some cases mis-behaviour would be due to some bug rather than configuration mistakes. So let's see yours.
I would think the first problem is due to the PAM configuration, though I don't remember exactly. Please show /etc/pam.d/common-auth and /etc/pam.d/common-password; it might trigger my memory ![]()
EDIT: as I remember, when one of those files has the use_authtok option for the pam_unix.so module, then it's impossible for an su root user to change anyone's password. The solution would be to not have that option. See man pam_unix.
A simple way to download all installed binary packages could the following command:
$ dpkg-query -f '${Package}=${Version}\n' -W | xargs -n 1 apt-get downloadSimilarly, to download all source packages you would use the following:
$ dpkg-query -f '${Package}=${Version}\n' -W | xargs -n 1 apt-get source --download-onlyBoth will populate the working directory.
Thanks. It would be due to firefox, or a plugin.
The particular request is noted as a security issue for "punbb", from 2011, but not a concern for this forum. The point is rather that there is no reason for anyone to attempt an unserviceable URL, and therefore anyone doing so is deemed to be of dubious intention. There have been some 7000 such the last month.
The lockout is at network level, where it gains a plain text (no SSL) response, with an advice of a course of action to take by anyone who, like in this case, is unjustly caught. But, your method is fine too.
Yes, your IP got classified as "dubious", not so much as a quality assessment of your posts, but automatically because you (or your software) made a spurious "HEAD /req_message HTTP/1.1" request, which is an unserviceable request. All unserviceable requests gain the dubious qualification, and the subsequent lockout from the server. (I shouldn't tell you when it happened to golinux, or myself even
).
Which program did you use?
ok. Why did you install iptables from backports?