You are not logged in.
Generally you want both 'autoremove' to remove unneeded dependencies, and 'purge' to remove preserved configuration files. e.g. 'apt autoremove --purge okular'. IIRC the inverse 'apt purge --autoremove foo' would also work.
Some packages that were installed as dependencies may not be (auto)removed if they are also suggests or recommends from other packages still installed, depending on how you have configured apt (see apt-get manual & debian documentation for details).
did you believe in BitLocker or in Windows?
[emphasis mine]
Believing in software is a fairly insane concept to begin with. Use logic when selecting tools, not trust, and certainly not faith or "belief".
if this tool unmaintained and have bugs, why Debian and Devuan still use it as time tool
Because nobody has volunteered to fix it yet?
If it's the default GUI time configuration "tool" (which, AFAICT it is not), then it should work with the default ntp daemon.
If it's just a GUI tool among several options... The same applies as with any other software in the distro - there's a lot of stuff available, and it's up to the user to decide which they want to use and check compatibility of their selections.
NTP isn't broken, your chosen optional GUI frontend is. Fix it, report it to the relevant bugtracker(s), or use something else.
You could of course just configure your NTP daemon using it's own mechanisims (and have been up and running days ago), rather than insisting on this ancient unmaintained GNOME castoff GUI silliness.
NTP will keep your clock in sync, GUI or not. How often do you really need to change timezone anyway, and why do you need a control panel for a one-line config change?
There are a half-dozen potential NTP clients available, which you use is personal preference.
The most lightweight is opentpd, while the most modern (and most suitable for machines with intermittent connectivity) is chrony. I can vouch for both currently (as well as ntpdate and ntpsec in the past) working just fine on Devuan.
The real question is: Which one is your GUI nonsense looking for, how is it checking, and why doesn't it see ntpsec? If it's doing something really dumb like looking for a specific init script (or worse, systemd service on dbus), it's not going to work with openrc without some tinkering.
I don't recognise that GUI window, but it looks gtk-ish. Last I heard xfce didn't have a native timezone config whatchamacallit... So MATE maybe? If that's the case it's probably looking for timedatectl+timesyncd, which is a systemd thing so you are likely SOL.
Then again I really don't know why anyone would need a GUI for setting the time to begin with, so personally I'd just ignore it.
devuan broken again
No, this is an obvious wetware error. Specifically, the user is running the unstable branch, but lacks the wherewithal to deal with the expected packaging flux or report bugs through proper channels.
KDE
...Is doing much the same with its not-like-winblows features and workflows (single-click activation, primary buffer on mouse 3, window shading, etc.), but at least they keep most of them available behind configuration options (for now).
Make no mistake, that's all this is - pandering to "users who are unaware" and dumbing-down the interface to the lowest common denominator to make the windows refugees more comfortable.
security
Is the siren-song of the Fischer-price UI, and the perennial excuse for the removal of sharp edges, no matter how useful they may be when used sensibly.
legacy feature of X.org which has stuck around for whatever reason
Reason? Because it's useful, and people who know how to use it are are used to it.
All the big-tech corporations are the same, this is just a new example of that which has been obvious to anyone with two brain cells for a long time.
It's the same old song: Company sells you convenience and "safety" (cloud backups, all your keys in your online account in case you loose them etc.), charges you in loss of freedom and autonomy.
You can:
A: Behave like a good little consumer sheep, use the big shiny product, accept the default configuration, and deal with the fact that you have effectively no freedom to do as you wish with your technology and your data is not even remotely yours any more.
B: Be scorned by the normies as a "hacker", and either use free software/alternative technologies or (often illegally, if US law is to be believed) modify the usual offerings to not screw you over.
Either way, this isn't really "news", and whinging about it is just shouting at clouds. Most people really don't care, they like being sheep.
a forum to help people seeking advice
Why yes, yes it is... Which is why I call out FUD and non-technical hyperbole like the above.
poison a nice and good community
Oh, you mean interrupt the "Everything new is bad, everyone is out to get you, big-software corporations evil" circlejerk? Oops. ![]()
if you can help, then help
I do, with researched and tested technical support rather than vague, unsubstantiated "[x] is bad, don't use [x]".
If you don't show us what is in /etc/exports and where your filesystems are mounted server, and /etc/fstab on the client, all that remains is speculation.
Speculation: You are trying to export a directory that contains mountpoints for other filesystems, without specifying the 'crossmnt' flag. See the exports(5) manual page.
MBR and EFI mode are fine.
UEFI mode is the devil
This is pure nonsense, you clearly have no idea what you are talking about.
UEFI is a boot mechanism replacing the IBM-PC ROM BIOS bootstrap code and accompanying boot sector (MBR), which dates back to 1983 and is unsuitable for much modern hardware (notably no support for booting from NVME).
EFI is a dedicated partition used to store UEFI entries (or just a strange way of pronouncing UEFI without the "unified" because unknown reasons) much as as BIOS boot used a reserved sector. Nothing more, nothing less.
If you don't use UEFI you won't have and don't need an EFI partition, so saying the former is "the devil" and the latter is not makes no sense.
TPM and Secure Boot have nothing to do with UEFI, beyond the fact that the latter usually needs UEFI support to function as intended.
TPM and Secure Boot are operating system agnostic (so long as that operating system has a signed kernel for the latter), not exclusive to Windows.
They are not "traps" either, in that one can use or not use them as one pleases (unless your OS requires them for installation, which GNU/Linux does not).
TPM is a fairly generic crypto coprocessor and key storage. Secure Boot will use it if it's present, otherwise what you do with it is up to you - just like the rest of your hardware.
"Avoid evil feature" with no technical explanation (besides vague appeals to "youtube" wisdom) is not useful. Worse, it's plain-old FUD.
if your computer is equipped with ECC RAM modules, enable this feature in the BIOS setup.
ECC is a hardware feature, requiring additional chips on memory modules as well as motherboard, CPU (IMC) and BIOS support. Few "consumer" systems have it, and if you do you will know.
Linus Torvalds tells you
Linus says many things.
there are YouTubes on that
There are "YouTubes" on eating laundry detergent, that doesn't make it a good idea.
* Yes.
* Not Currently.
* Depends on who you ask.
Enrico does indeed "break stuff" in master from time to time, but as of right now the Xlibre project as a whole is maintaining pretty good release quality.
So yeah, "broke stuff" is valid... If your goal is to never break anything, even in an unreleased master branch. Run things that way and you don't make any progress though, omelettes eggs, yada yada.
As for politics, I for one do not care in the slightest. I simply want a sane development process and software that fits the needs of both app developers and end users. Right now Xlibre is both, while Wayland is neither (wayland is policy > code, and development by committee. It shows.)
Not really, though conversely I don't see any reason not to set it to >=2.
The most common reason for a dirty filesystem is a power failure, so IMO the most logical time to fix it is when the system starts up again.
If check is disabled, you might find yourself needing to run fsck manually before you can mount the filesystem, I prefer the system to handle that automatically, at the earliest opportunity.
Setting check to '0' in fstab is roughly analogous to always selecting skip for non-system filesystems in that that startup chkdisk screen Windows will sometimes throw at you if it crashes hard enough or you pull the plug while there's disk activity. No big deal, but unless you're in a mighty hurry there's no reason not to just let it do its thing. Ext4 is a journaled filesystem, so a fsck is usually measured in seconds.
really don't like nano
Feel free to install your preference and change the default CLI/TUI editor with
update-alternatives --config editorYou'll want to be comfortable with some CLI editor, doing things as root through the GUI is both awkward and generally discouraged.
Personally I like mcedit, it (and mc itself of course) should be very familiar to anyone who has used classic Norton Commander or MSDOS edit.
Numerical options were 0 and 0
FYI, setting the pass field to '0' will cause startup filesystem check/repair (if needed) to be skipped, this may or may not be what you want.
probably anywhere else too?
Most things that mount filesystems (udisks, gvfs etc.) look in fstab first before doing the "polkit auth -> mount /media/foo" thing, so yeah, it should. 'user' is particularly handy, but there are some details in the manual you might want to be aware of.
Interesting method to mount a partition using pci-ids
It's just exploiting the fact that mount dereferences symlinks when resolving the device node.
The convenient links under /dev/disk/ are created by udev, so they won't work for the bootloader or on a system that doesn't run udev or doesn't start it before mounting non-root filesystems. I don't know any commonly-used examples of the latter, but it's something to bear in mind.
maybe i'm misunderstanding the OP and what he wants to accomplish.
Nah, the question (is it one question or two? Internal or external drive? Which "file manager"?) is just vague, as usual. ![]()
The "automatically" in "automatically and without superuser password" kinda implies "without user action", hence myself (and chumpGPT) heading toward /etc/fstab.
wouldn't be good enough for gaming
Certainly not for anything expecting 3D acceleration. VirGL would help, but that's currently only available for Linux guests.
windows game via wine in a vm
Uhh, why? An API translation layer that you could just run on the host, running in a VM and rendering to a virtualised GPU with no 3D acceleration... Were you trying to make things as slow as possible?
Would setting a flag to these two partitions thru gparted help? Would gparted then ad the lines to fstab?
Possibly. I vaguely recall gparted having an option to set a mount point (or maybe that was KDEs 'partitionmanager'), but that won't be any kind of "flag" set on the partition - it's offering to modify /etc/fstab for you.
I've never used it, and frankly I wouldn't trust it to not make a mess in my nice readable column-aligned file.
Really don't wan't to make this unbootable by making a mistake to fstab
Don't mess with the line for the root filesystem, and it'll be fine.
Even if you did somehow manage screw that up, such things can be fixed by chrooting in from a livecd or the install media (as can 99% of "unbootable" situations in general).
what chatgtp said
Why are you asking a large language regurgitaion model for information that is readily available with a 15 second web search, or locally with:
man fstaband
man mount?
Fstab syntax is not complicated, and examples are all over the 'net.
For most purposes:
* Create a directory to use as the mount point and check/set permissions.
* Edit /etc/fstab to add a matching line, where the (space separated) fields are:
[device] [mount point] [filesystem type] [options] [dump priority] [check priority]
* Test that it works as intended with 'mount [mount point]'.
The first field can be a traditional device node (e.g /dev/sd[x][y]), any symlink under /dev/disk/by-[whatever] (e.g. /dev/disk/by-id/[drive model and serial number]), a 'UUID' tag (e.g. UUID=[filesystem UUID]), or a 'LABEL' tag (e.g. LABEL=[filesystem label].
Note that /dev/sd[x][y] names are assigned in the order the kernel detects devices, so they may shift around. That's why many examples prefer UUID, but there are several other options.
If you want to use UUID, you can print it with 'blkid -o value -s UUID [device node]'
Mount point can be any directory you like. Preferably an empty one, as mounting will "overlay" existing contents making it inaccessible (well, mostly, but that's into the weeds).
Filesystem type is self-explanatory, or 'auto' if you're lazy (or like to swap drives around).
Available options are explained in the mount manual, fstab takes the same format as the '-o' command-line option for the mount command.
The last two fields determine the order filesystems are dumped (don't worry about it) and checked. For non-root filesystems the usual is '0 2'.
** In case it's not obvious, where I say [foo], you're supposed to fill in your value and drop the enclosing [].
A couple of random examples from my systems, I prefer labels to UUIDs:
LABEL=spool /mnt/spool ext4 noatime 0 2Unless it's a hotswap bay and I want to identify it by a specific SATA port, so any disk I put in it mounts at the same place:
/dev/disk/by-path/pci-0000:00:17.0-ata-1-part1 /mnt/bay1 auto user,noatime,noauto,exec 0 2Which is better way?
If you mean polkit rules or fstab... They're answering different questions, because there are (at least) two mechanisms for "automatically" mounting filesystems.
/etc/fstab is system level, and is processed before any user logs in. If the filesystem is permanent and you want it always mounted regardless of what user or environment you are using, this is the most reliable method.
Polkit rules are used to allow an unprivileged user to mount things that are not in /etc/fstab, or things that are in /etc/fstab but don't have 'user' in the options field (since either of those scenarios would normally require root permissions).
Polkit is generally only used by graphical desktop/file managers, (i.e. not by the 'mount' command at the CLI), and will only help with "automatic" mounting if your GUI or file manager of choice has a facility of its own to "remember" mounted filesystems and re-mount them at login.
I could replace the screen and I could buy a new laptop but I am irritated by those options.
IMO, the time (=money) you will spend trying multiple sub-optimal software workarounds is better spent fixing the underlying hardware problem.
I could run Windows within the VM - but is that a good way to play speedy games?
In a word, no.
In more words, you can get near-native CPU performance in a VM, but GPU performance for gaming is another matter entirely. The only way you will get native graphics performance is PCI-passthrough, which means either a dedicated GPU for the VM guest or single-GPU passthrough where the host OS is effecitvely unusable (i.e. has no video output) while the guest is running.
Both are a pain in the arse to set up, the latter very much more so.
For most games (aka anything that will run on the Steam Deck), by far the best option is wine/proton + DXVK... The exceptions being anything with invasive ring-0 anti-cheat rootkits or DRM, which will almost certainly not work in wine (unless the developer specifically supports it) and quite likely not in a VM either.
I don't know if Fortnite is one of those, it's really not my kind of game. At a guess I'd say it probably is, since it's a popular "competitive" online multiplayer title and those have a way of attracting scum.
The fact that warmth seems to help is a clue that the cable may simply be loose.
Or dry solder joints, or failing caps, or cracked balls under a mux chip / display driver or the like. Often this kind of thing can be located with a hot air gun and a can of freeze spray...
Whether it can be fixed without specialised equipment depends on where and what it is, anything beyond a loose connector will probably mean a hot-air station and a good magnifier/microscope at the least. Modern SMD electronics just isn't particularly easy to work on.
Only the UUID is checked by the system when the UUID= is used in the fstab.
Filsystem uuids will end up in in grub.cfg if you use grub-mkconfig / update grub and haven't set GRUB_DISABLE_LINUX_UUID=true, and GRUB will pass them to the kernel and initramfs before fstab is read.
Partition and disk uuids are, as you say, irrelevant (unless you specifically choose to use partuuid as a search hint for grub)
they cannot live in the same box unless one of the drives gets new UUIDs.
If you're referencing them by UID. If you're using something else (e.g. filesystem label) it won't matter... until you inevitably forget about this and it bites you in the arse years later.
I think (?) that is the case even if they are not in each other's /etc/fstab file.
Whatever you use to differentiate the disks needs to be unique, otherwise you will get random (or more accurately, timing/initialisation order sensitive) behaviour.
The most entertaining effect is where you load the kernel and initramfs from one drive, but it mounts the root partition on the other. Unless you have set things up differently, grub, initramfs and fstab will all be using filesystem uuids.
I have only done it on HDDs with a single partition.
What does number of partitions per drive have to do with anything? Partitions and filesystems should all have unique ids if you want them to be uniquely identifiable, that is all.
Partition uuids can be changed with gdisk (GPT) or fdisk (MBR), filesystem uuid (assuming ext[2,3,4]) with tune2fs. The latter is the only one that matters.
What's wrong with it?
It's proprietary, so who really knows?
"Negative feelings" about closed-source browsers and packages that are not compliant with Debian free-software guidelines or packaging policy, on the discussion board for a Debian-based FOSS distribution, are not particularly surprising.
It's no worse than Chrome, is it?
That's really not a very high bar to pass, typhoid is "no worse" than lung cancer, but I for one don't want either.
Brave and the like are at least open-source, so any dubious "features" are readily inspect-able.
Anybody know how to get rid of?
apt purge vivaldi-stable...probably. Assuming the package didn't do anything else idiotic in postinst. It doesn't appear to, but I didn't look very hard.
Discover
Is a janky PoS at the best of times (ditto packagekit in general). Use apt at the CLI, or if you must have a GUI, synaptic.
It puts the browser in the opt directory and nowhere is there to be found a gpg key. They install a cron job file which when trying to look at has nothing in it so it is a bit of a mystery what it does.
Everything is inline in the package postinst script, the repository configuration and key signature (base64, for reasons) are piped into the config files... Because of course that's how they do it - it's the best way to fuck around with the system (making sure their browser is the very highest priority in alternatives for example) and "support" multiple distros with a single .deb.
The crontab file is a symlink to /opt/vivaldi/cron/vivaldi, which is a copy-paste from the postinst and apparently rewrites the apt configuration and keys every day... Again, reasons, presumably. ![]()
Proprietary vendors are all the same when it comes to packaging, total disregard for established standards. Everything that can be an executable script is, windows lets vendors screw around however they like and execute whatever they want so that's how it must be done everywhere.
You have third-party repos with missing signing keys, so apt is (rightly) ignoring them.
See the Debian wiki and apt-secure(8). apt-key was removed in trixie/excalibur, any "guides" on the net that mention it are out-of-date.
For brave, you might want to try extrepo.
As for Vivaldi, their website claims that after installing the the .deb package "our Linux update repositories will be configured automatically for you to receive updates".
Personally I doubt this "Users are stupid so we don't give technical details, just click button and we'll handle everything" corpo-speak bullshit, but I'm not about to install the thing to find out.
AFAICT, this is pretty much what should be on that page WRT repo setup and key import. The security implications of using /etc/apt/trusted.gpg.d as in this example are explained in the wiki above.
I don't use either of these packages myself, so YMMV. Frankly why people need multiple "privacy" browsers proprietary and/or crypto nonsense packing chrome forks from third-party sources rather than just configuring the tested offerings in the stable repos to their liking is beyond me, but whatever. vOv.
Also, as always, DonkBreakDe[bi|vu]an. Note comment on "other repositories created to distribute single applications".