Is there any way to disable DRI for an application?
Kmail is using DRI and SEGVing in the Nouveau libraries. Not sure how much of this is Kmail bugs and how much is Nouveau (valgrind reports heaps of issues in Kmail and Nouveau triggers kernel bugs). But while investigating this I'd like to have Kmail keep working while not removing DRI entirely from the system.
Any suggestions?
--
Sent from my Huawei Mate 9 with K-9 Mail.
On Tue, 29 Oct 2019 04:11:18 AM Rohan McLeod wrote:
> Petr Baum wrote:
> > On Tue, 29 Oct 2019 10:53:25 AM Rohan McLeod wrote:
> >> Petr Baum via luv-main wrote:
Rohan,
> 1/ is the need for an "external" (typically USB) CD/DVD drive because
> it needs to connect to a laptop ?;
Yes, it is. I would probably copy recovered files to my internal (main) SSD
drive first.
> -the GUI files-utility correctly recognised a previously burnt M-Dsk as
> 23GB (of a 25GB disk)
>From what I came across reading of M-Disks is not a problem - but burning them
may be. Somebody complained that his attempt to use M-Disk failed on Windows
and it was suggested that he should use Nero. I would love to backup my
historical photos on M-Disk as a second stage but I prefer to know the HW/SW
combination which would be happy with my Ubuntu laptop before I go ahead with
this project.
Regards, Petr Baum
--
<pb-luv(a)baum.com.au>
Petr Baum, P.O.Box 2364, Rowville 3178
fax +61-3-97643342
This message was created in naturally virus-free operating system: Linux
On Tue, 29 Oct 2019 10:53:25 AM Rohan McLeod wrote:
> Petr Baum via luv-main wrote:
Rohan,
...
> > I have got a big box of about 25 years old CD ROM disks with scanned B/W
> > 70-100 years old photo negatives. I was using copies from HDD for many
> > years but failure of my server resulted in loss of significant part of
> > files. I plan to make another set of copies from original CDs.
...
> 3/ When I was investigating this issue I came to the conclusion that
> "M-Disk"s were the best current solution;
> this involves (a) buying an M-disk capable DVD R/W (most Blue-Ray
> drives) (b) a supply of M-Disks (25- 100)GB
...
That looks like an excellent suggestion! But...
I tried to check Verbatim, who seems to be closest to the original developer
Millenniata. They offer "External Slimline CD/DVD Writer" with notice
"Software compatible with Windows operating systems only". That may mean
included Nero burning SW only, but even that may be a show stopper - in
discussion on another site somebody complained that his attempt to use M-Disk
failed (on Win...) and it was suggested that he should use Nero. As Nero is
included with Verbatim drive it may indicate that not all burning SW would be
compatible.
It would be nice if there would be some experience with using linux for
burning of M-Disk.
And I still have to find the best way how to recover data from my old and
suspicious CDs... (M-Disk writer may be good enough for that too.)
Regards, Petr Baum
Hi,
I have got a big box of about 25 years old CD ROM disks with scanned B/W
70-100 years old photo negatives. I was using copies from HDD for many years
but failure of my server resulted in loss of significant part of files. I plan
to make another set of copies from original CDs.
Some of these CDs had reading problems when new and it is unlikely that
readability improved over time. I may use Roadkil's Unstoppable Copier and/or
Ddrescue but as a first step I would like to get the best external CD ROM
drive available for linux.
Can you recommend me what to buy?
Thanks,
Petr Baum
--
<pb-luv(a)baum.com.au>
Petr Baum, P.O.Box 2364, Rowville 3178
fax +61-3-97643342
This message was created in naturally virus-free operating system: Linux
I have a friend who is looking for someone to develop and support a tool
to import approximately 4,500 products from a CSV file to WooCommerce
(backed by a MySQL database).
Please let me know if you would be able to help!
Cheers,
Andrew
Hi All,
Two events, Ubuntu update and power outage.
I cannot access my btrfs RAID drives, system reports it is mounted as
read only.
Thunderbird is not working browsers are not working
Sane scanner is working
Darktable is reporting as running but not responsive.
KPatience is not working
So, in general, I have a system which boots but the programs are not
starting properly. Is this a symptom of LockFiles not reporting correctly?
If I cannot access my RAID drives I am in a world of pain.
Any suggestions on how to solve this would be truly appreciated.
Andrew Greig
Further information: On trying to mount the RAID file-system it failed
because the fs was readonly.
I normally have mc installed on every computer but it has disappeared on
the desktop computer and I cannot install mc as the system is readonly.
I figured I may have to edit the fstab and I use mc as I am not familiar
with vim or vi. No luck there.
Cheers
Andrew
I've just booked my early bird tickets and flights to LCA2020 on the
Gold Coast. Flights are cheap right now, get 'em while they last!
Accommodation on the other hand is expensive as this year's conference
is being held at the Gold Coast Convention Centre and not at a
University, so there is no student accommodation available this year.
Is anyone else going and would like to share a hotel room?
Cheers,
Andrew
Hi all,
My camera has just ticked over 10,000 images in around 8 months, and so
another folder has opened up on the SD card, prior to today the file
folder was 100EOS5D, the new folder is 101EOS5D, but the counter has
reset from 6H9A9999 to 6H9A0001. At this rate I cannot afford to have
the same file numbers repeating in the same calendar year. I can go into
the Camera and change the file numbering to 6J9Axxxx, but how can I run
a bulk renaming of my Raw Files - not being a scripter I am at a (self
imposed) disadvantage,
I have tried to understand the several ways to achieve this,but I have
not grasped it.
Rename 6H9A0001.CR2 6J9A0001.CR2
Rename 6H9A0002.CR2 6J9A0002.CR2
Rename 6H9A0003.CR2 6J9A0003.CR2
Rename 6H9A0004.CR2 6J9A0004.CR2
to
Rename 6H9A0085.CR2 6J9A0085.CR2
Any help would be gratefully received.
Andrew Greig
Quoting David Zhan (david.zhan.list(a)gmail.com):
> Hi everyone,
Everyone: 'Hi!'
> I am thinking about running a public DNS server (with Pi-Hole) at
> home, but not sure if that's safe.
Safe against what?
In the security field, we tend to use concepts like 'threat model' and
'attack surface'. You may want to look those up and consider what your
concerns are and how to articulate them.
Exposing any network daemon to remote networks, not to mention the
public Internet, necessarily expands your attack surface. This is
why you should (1) not run public-facing software without compensating
benefit, (2) be picky about which software option you elect to run and
how it's configured, and (3) maintain your system, e.g., roll out
necessary fixes that may addresss security problems in a timely manner.
Relevant to that, you may be pondering choice of software. Here are
some good maintained open-source DNS daemons available for Linux:
Authoritative-only:
------------------
Knot DNS
NSD for small/medium-sized deployments
PowerDNS Authoritative Server for large sites
YADIFA
Recursive-only:
--------------
Deadwood
dnscache from djbdns/dbndns, which appears to be the best-maintained fork
of djbdns
PowerDNS Recursor
Unbound
Generally, I prefer NSD (auth-only) and Unbound (recursive-only).
Notably absent from that list is BIND9. Some more details about that
are in my DNS software bestiary:
http://linuxmafia.com/faq/Network_Other/dns-servers.html
If the category distinctions (authoritative, recursive, etc.) are
unfamilary, my somewhat puckish allegory about the 'Village of Lan'
(that I penned in 2010) may help:
http://linuxmafia.com/~rick/lan.html
> I planned to share this server with my friends in Melbourne but I
> don't want them be able locate my home.
Well, far be it from me to criticise what you say you want to do, but,
FWIW, I long ago decided that, for my _own_ Internet presence, I would
pointedly take the opposite approach, e.g., in the (totally
discretionary) LOC (location) reference records I publish in my domain
zones, e.g.:
$ dig -t LOC linuxmafia.com. @ns1.linuxmafia.com. +short
37 25 53.825 N 122 11 52.128 W 15.00m 1m 10000m 10m
$
In fact, to lampshade the joke, I also publish an 'ICBM address' on my
personal Web page, accurate to about a centimetre, giving the exact
location of my favourite chair in my living room.
ICBM: 122.204196°W, 37.430410°N, 49.28 metres elevation
I have it on good authority that my 'Here, let me make it trivial for you
to determine the exact physical location of me and my computing gear'
spooked at least a couple of people who set out to 'doxx' me and found
it worrying that I rolled out the red carpet for them. ;->
> Questions:
>
> Will my user be able to locate my home accurately?
> (To suburb is acceptable, but street is a bit scary......)
Assuming you don't do as I do and flamboyantly publish that information
in LOC records and ICBM address data, then the user's ability to do that
would be limited to the accuracy of geoIP data, which also tends to cost
money to the consumers of that data. Ever notice that Google News makes
a guess at your physical location based on your public IP address?
That's using geoIP services. But notice that it's fairly approximate,
at most isolating the IP's location to a neighbourhood. and sometimes
it's comically wrong, depending.
> Will I be facing other risks?
Of course you will.
This is where you start studying security, the way we sysadmins do.
One modest starting point, a piece I wrote about a LinuxWorld Expo
security talk in 2000:
http://web.archive.org/web/20080427075329/http://security.itworld.com/4352/…
> P.S.: I will put that server behind a properly configured firewall, so
> the server itself should be alright.
{headdesk}
Nope.
Most people use 'firewall' to mean 'set of IP/port filter rulesets'.
Consider a hypothetical example server. It has a minimally configured
instance of NSD for authoritative nameservice to the public Internet, it
runs Portable OpenSSH for remote administrative access, runs atop Linux,
and has no other network services whatsoever. Therefore, the attack
surface consists of:
o code exposed on port 22 (SSH)
o code exposed on port 53 (NSD)
o Linux TCP/IP stack
Add to that a 'properly configured firewall'. What does your attack
surface now consist of? Answer: the same, except there is additional
possible exposure to stack congestion on account of the netfilter rules.
>
> _______________________________________________
> luv-main mailing list
> luv-main(a)luv.asn.au
> https://lists.luv.asn.au/cgi-bin/mailman/listinfo/luv-main