Re: unable to boot with systemd (works with sysvinit)

2015-01-12 Thread Johannes Schauer
Hi, Quoting Selim T. Erdoğan (2015-01-12 22:38:08) > On Sat, Jan 10, 2015 at 12:33:36PM +0100, Johannes Schauer wrote: > > I'm unable to boot my laptop with systemd which worked before. I'm unable to > > tell the changes I made since the last time it worked because according to > > my > > uptime,

Re: Fwd: Re: Have I been hacked?

2015-01-12 Thread Joel Rees
2015/01/13 5:04 "Ric Moore" : > > On 01/12/2015 11:50 AM, Jerry Stuckle wrote: > >> >> You should learn from some REAL security experts, not the internet. > > > Like who? There are compromises all over the net, with consumer security files lying in the open like gutted bleeding fish. I don't think

Re: i386 MultiArch: Am I Right or Wrong?

2015-01-12 Thread The Wanderer
On 01/12/2015 at 05:17 PM, Patrick Bartek wrote: > As I understand on an AMD64 system, when i386 multi-architecture is > "enabled" and apt-get update is run, nothing gets installed until one > installs some 386 app, etc., and then only those i386 dependencies > specific to, and necessary for THAT

Wheezy: motion app error: "Unable to find a compatible palette format"

2015-01-12 Thread Ldten K
Hi, Am trying to get my webcam to work with the motion app. The webcam is working fine with VLC, I can save the webcam's output to a file without any problems, but the motion app fails with the same webcam with "Unable to find a compatible palette format" error (see [1] below). Some people see

Re: VPN IPSec (Cisco vpnc)

2015-01-12 Thread Chris Davies
Hajder Rabiee wrote: > Trying to connect to VPN at work but keep getting: "vpnc: no response from > target". This is a typical response when the group name/password are incorrect. IPSec ID IPSec secret Chris -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a s

Several dracut problems (keymap, luks passphrase, resume from hibernate) in wheezy(-backports)

2015-01-12 Thread Aleksandar Dimitrov
Hi, Bear with me, this is a long email. Ideally, if you're reading it, you're involved or interested in dracut. If you don't think anybody will read it here, please point me to the right place. My setup is: / is unencrypted, on /sdd1. /sdd2 contains a luks volume, which in turn contains an lvm vo

Re: Have I been hacked?

2015-01-12 Thread Joel Rees
2015/01/13 5:45 "Ric Moore" : > > On 01/12/2015 02:47 AM, Joel Rees wrote: >> >> On Sun, Jan 11, 2015 at 4:37 AM, Ric Moore wrote: >>> >>> You all may wish to read this, from ars technica: >>> http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/1/ >>> >>> Ve

Re: wireless USB adopter installation

2015-01-12 Thread Lisi Reisz
On Monday 12 January 2015 20:59:07 zaheer ahmed wrote: > hi > i am using compaq 32bit desktop. i am new user of debian 5. i am using wifi > USB TL- WN727N its woks fine in xp but not working in debain5. i am new in > linux debian5 plz tell me all steps which i follow and easily install > driver. te

Re: Speed up a WiFI interface ??

2015-01-12 Thread Selim T . Erdoğan
On Tue, Dec 30, 2014 at 07:14:19PM +0100, Bernhard Frühmesser wrote: > Hello, > > For a friend i setup a small RAID-1 config using Wheezy on one of his old > machines, just to backup his most important stuff. Unfortunately the > location where the box is placed can not be reached via cable because

i386 MultiArch: Am I Right or Wrong?

2015-01-12 Thread Patrick Bartek
As I understand on an AMD64 system, when i386 multi-architecture is "enabled" and apt-get update is run, nothing gets installed until one installs some 386 app, etc., and then only those i386 dependencies specific to, and necessary for THAT app are installed. Nothing else. So, for example, a 386

Re: unable to boot with systemd (works with sysvinit)

2015-01-12 Thread Selim T . Erdoğan
On Sat, Jan 10, 2015 at 12:33:36PM +0100, Johannes Schauer wrote: > > I'm not subscribed, so please keep me CC-ed. > > I'm unable to boot my laptop with systemd which worked before. I'm unable to > tell the changes I made since the last time it worked because according to my > uptime, the last ti

wireless usb adopter installation

2015-01-12 Thread zaheer ahmed
hi i am using compaq 32bit desktop. i am new user of debian 5. i am using wifi USB TL- WN727N its woks fine in xp but not working in debain5. i am new in linux debian5 plz tell me all steps which i follow and easily install driver. tell me installation process with complete commands. thanx regards

Re: Have I been hacked?

2015-01-12 Thread Ric Moore
On 01/12/2015 02:47 AM, Joel Rees wrote: On Sun, Jan 11, 2015 at 4:37 AM, Ric Moore wrote: You all may wish to read this, from ars technica: http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/1/ Very interesting. So interesting that I downloaded cudahas

Re: Have I been hacked?

2015-01-12 Thread Iain M Conochie
On 12/01/15 16:41, Jerry Stuckle wrote: On 1/12/2015 10:10 AM, Chris Bannister wrote: Oh, come on! http://www.thefreedictionary.com/context It is all about *who* you are, or claim to be. https://danielmiessler.com/blog/security-identification-authentication-and-authorization/ You have comp

Re: Fwd: Re: Have I been hacked?

2015-01-12 Thread Iain M Conochie
On 12/01/15 16:50, Jerry Stuckle wrote: On 1/12/2015 11:36 AM, i...@thargoid.co.uk wrote: Forwarding to the list as I seemed to have managed to leave it off. Apologies. Knowledge is easier to duplicate than a physical item. You mentioned the ATM attack. Incorrect. Knowledge cannot be dupli

Re: Have I been hacked?

2015-01-12 Thread Brian
On Sun 11 Jan 2015 at 16:43:34 -0700, Bob Proulx wrote: > Brian wrote: > > Bob Proulx wrote: > > > Complete agreement. I want to go further and say that a password that > > > you can remember without needing to write it down is probably not a > > > good password. > > > > Security of an ssh login

Re: Fwd: Re: Have I been hacked?

2015-01-12 Thread Ric Moore
On 01/12/2015 11:50 AM, Jerry Stuckle wrote: You should learn from some REAL security experts, not the internet. Like who? There are compromises all over the net, with consumer security files lying in the open like gutted bleeding fish. I don't think anyone is a "REAL security expert", exce

Re: debian/testing philosophie?

2015-01-12 Thread Dan Ritter
On Sat, Jan 10, 2015 at 02:09:02PM +0100, Hans wrote: > To all these thoughts, what do you advice me to install? Better unstable than > testing? I know, youi will now say "stable" but stable is sometimes just too > old for a desktop (for example I had problems with the installation on > notebook

Re: Fwd: Re: Have I been hacked?

2015-01-12 Thread Jerry Stuckle
On 1/12/2015 11:36 AM, i...@thargoid.co.uk wrote: > Forwarding to the list as I seemed to have managed to leave it off. > Apologies. > > >> >>> Knowledge is easier to duplicate than a physical item. You mentioned the >>> ATM attack. >> >> Incorrect. Knowledge cannot be duplicated if there is no

Re: Have I been hacked?

2015-01-12 Thread Jerry Stuckle
On 1/12/2015 10:10 AM, Chris Bannister wrote: > On Mon, Jan 12, 2015 at 09:19:58AM -0500, Jerry Stuckle wrote: >> On 1/12/2015 8:05 AM, i...@thargoid.co.uk wrote: >>> >>> Nope - I am pretty sure it is something I am, within the context of the >>> above statement. >>> >> >> A fingerprint is somethin

Re: A capability in the IMAP protocol.

2015-01-12 Thread peter
* From: Andrei POPESCU em concurrently. Someone might work with a smartphone and a desktop system concurrently for example. IMAP is useful there. In a simpler but similar case, an mbox file can be on a flash storage card which is shifted from one machine to another not too frequently.

Fwd: Re: Have I been hacked?

2015-01-12 Thread iain
Forwarding to the list as I seemed to have managed to leave it off. Apologies. Knowledge is easier to duplicate than a physical item. You mentioned the ATM attack. Incorrect. Knowledge cannot be duplicated if there is no basis for that knowledge. For instance, it was not possible for a

Re: A capability in the IMAP protocol.

2015-01-12 Thread peter
> IMAP allows retrieving a message, and IMAP allows deleting a message, so > this can certainly be done. (As long as the server actually respects the > delete command, rather than archiving on delete or something like that, > but that would be server-specific.) > ... > I imagine that various other

mounting a labeled filesystem

2015-01-12 Thread peter
peter@dalton:~$ grep GRN /etc/fstab LABEL=GRNSDHC41 /home/peter/GR auto defaults,noauto,user,users 0 0 peter@dalton:~$ mount LABEL=GRNSDHC41 mount: must be superuser to use mount peter@dalton:~$ sudo mount LABEL=GRNSDHC41 [sudo] password for peter: peter@dalton:~$ mount | grep GR /dev/sda1 on /ho

Re: mounting a labeled filesystem

2015-01-12 Thread Darac Marjal
On Mon, Jan 12, 2015 at 06:18:13AM -0800, pe...@easthope.ca wrote: > peter@dalton:~$ grep GRN /etc/fstab > LABEL=GRNSDHC41 /home/peter/GR auto defaults,noauto,user,users 0 0 > > peter@dalton:~$ mount LABEL=GRNSDHC41 > mount: must be superuser to use mount The "user" option SHOULD allow this. What

Re: Have I been hacked?

2015-01-12 Thread Chris Bannister
On Mon, Jan 12, 2015 at 09:19:58AM -0500, Jerry Stuckle wrote: > On 1/12/2015 8:05 AM, i...@thargoid.co.uk wrote: > > > > Nope - I am pretty sure it is something I am, within the context of the > > above statement. > > > > A fingerprint is something you HAVE. It is present on your body; it is >

mounting a labeled filesystem

2015-01-12 Thread peter
peter@dalton:~$ grep GRN /etc/fstab LABEL=GRNSDHC41 /home/peter/GR auto defaults,noauto,user,users 0 0 peter@dalton:~$ mount LABEL=GRNSDHC41 mount: must be superuser to use mount peter@dalton:~$ sudo mount LABEL=GRNSDHC41 [sudo] password for peter: peter@dalton:~$ mount | grep GR /dev/sda1 on /ho

Re: Have I been hacked?

2015-01-12 Thread Jerry Stuckle
On 1/12/2015 8:05 AM, i...@thargoid.co.uk wrote: > > While it is possible to enforce certain password policies (e.g. must use > capital letters, numbers, symbols etc) these > do not necessarily dictate a secure password. I guess if I know you > phone number, if it is stored in my phone I have > it

Re: Choosing/Rotating screen for greeter

2015-01-12 Thread Sven Arvidsson
On Mon, 2015-01-12 at 11:01 +, Daniel Lintott wrote: > Hi, > > I've recently switched to using one of my screens in vertical > orientation. This is fine from the desktop (after login), but currently > the greeter displays on the vertical screen but on it's side. > > Is it possible to move the

Screen refresh

2015-01-12 Thread Diogene Laerce
Hi, I have an annoying refreshing/redrawing issue with my monitor screen LG Flatron L222WS on my Wheezy (Nvidia GT 640 with last proprietary driver installed). The screen, pretty much all the time, does not refresh the image (does not redraw it) : the screen stays idle for example when I change

Re: Have I been hacked?

2015-01-12 Thread iain
On 2015-01-12 08:24, Joel Rees wrote: On Mon, Jan 12, 2015 at 7:32 AM, Iain M Conochie wrote: On 10/01/15 20:31, Brian wrote: By all means advocate and use ssh keys. But at least provide some substantial reason for spurning password login for that particular situation. A blanket "don't use p

Re: Choosing/Rotating screen for greeter

2015-01-12 Thread Daniel Lintott
On 12/01/15 11:48, Alex Mestiashvili wrote: > I use lightdm with option display-setup-script: > > display-setup-script=/etc/fixscreen.sh > > cat /etc/fixscreen.sh: > #!/bin/sh > /usr/bin/xrandr --output DP-1 --rotate left > > execute xrandr in your x session to get the output names. Tha

Re: zsh is pretty good

2015-01-12 Thread Chris Bannister
On Mon, Jan 12, 2015 at 12:46:55AM -0500, kamaraju kusumanchi wrote: > I have always used bash as it is the default shell on Debian. However, > I started using zsh couple of days ago and find it pretty impressive. Have a look at this: http://grml.org/zsh/zsh-lovers.html At the very end there's

Re: Choosing/Rotating screen for greeter

2015-01-12 Thread Alex Mestiashvili
On 01/12/2015 12:01 PM, Daniel Lintott wrote: Hi, I've recently switched to using one of my screens in vertical orientation. This is fine from the desktop (after login), but currently the greeter displays on the vertical screen but on it's side. Is it possible to move the greeter to the other s

Re: Have I been hacked?

2015-01-12 Thread Darac Marjal
On Mon, Jan 12, 2015 at 09:18:10AM +, Joe wrote: > On Mon, 12 Jan 2015 17:24:41 +0900 > Joel Rees wrote: > > > > The only truly secure computer is the one that you wrote all the OS > > and application code for. > > *And* the compiler(s) and the rest of the build toolchain... *and* the > BIO

Re: Have I been hacked?

2015-01-12 Thread ken
On 01/12/2015 04:18 AM, Joe wrote: On Mon, 12 Jan 2015 17:24:41 +0900 Joel Rees wrote: >The only truly secure computer is the one that you wrote all the OS >and application code for. *And* the compiler(s) and the rest of the build toolchain...*and* the BIOS,*and* the code for any network

Re: Searching for information site

2015-01-12 Thread Darac Marjal
On Sun, Jan 11, 2015 at 11:38:58PM +0100, Hans wrote: > Hello list, > > is there an information site, which or where I can subscribe, to get > informed, > when packages are put off the repo and its reason for it? Yes. https://ftp-master.debian.org/removals.html > > Thanks for any infos. > >

Choosing/Rotating screen for greeter

2015-01-12 Thread Daniel Lintott
Hi, I've recently switched to using one of my screens in vertical orientation. This is fine from the desktop (after login), but currently the greeter displays on the vertical screen but on it's side. Is it possible to move the greeter to the other screen, which is horizontal or rotate the greeter

Re: Have I been hacked?

2015-01-12 Thread Joe
On Mon, 12 Jan 2015 17:24:41 +0900 Joel Rees wrote: > The only truly secure computer is the one that you wrote all the OS > and application code for. *And* the compiler(s) and the rest of the build toolchain... *and* the BIOS, *and* the code for any network hardware you use...*and* the firmware

Re: Have I been hacked?

2015-01-12 Thread Joel Rees
On Mon, Jan 12, 2015 at 7:32 AM, Iain M Conochie wrote: > > On 10/01/15 20:31, Brian wrote: >> >> By all means advocate and use ssh keys. But at least provide some >> substantial reason for spurning password login for that particular >> situation. A blanket "don't use passwords" or "keys are bette