for reasons I have to send the input from an audio interface to an other.
I can do this with
pactl load-module module-loopback \
and this works as desired.
Currently I have to issue this command (realized as procedure) after each login.
I want a permanent solution. Where to place this command? Or is there an other
permant solution beside this command?
BTW, rc.local doesnt't work.
Any pointer welcome.
Kind regards, Frank
Old "Fedora 20-x86_64" installed and working. Due to a problem,
I Changed my motherboard and lost network(Internet) connection.
How to recover connection before install Fedora-Kde-live-25-1-3?
Does anyone have experience with installing Fedora on a NUC?
In case anyone here doesn't know what a NUC is: it happens to stand for
Next Unit of Computing. It is a 5.4 x 4.9 x 4.5-/inch/ box having the
minimal number of components to support desktop functions. You equip it
with your own hard drive, keyboard, mouse, etc., and can drive up to a
4K Ultra-style monitor. Some people use its VESA mount to mount it on
the back of their TV. Result: instant smart TV--smarter than any TV in
the store, because it can handle word processing and regular Web apps in
addition to video and audio streaming.
Word is that it normally ships with Windows 10, but can support any
number of distributions of Linux. I want to know whether Fedora is one
It sounds like the ideal small office/media lab/home theater solution.
Pair it with a good NAS and you have all the computing power you need,
with a fraction of the physical--and carbon--footprint.
Comments? Suggestions? Success stories? Horror stories?
Good day, friends.
Have some trouble with a52dec package. During dnf upgrade a52dec it need liba52, and finaly we get conflict
file /usr/lib64/liba52.so.0.0.0 from installing package liba52-0.7.4-25.fc24.x86_64 conflict with file from package a52dec-libs-0.7.4-20.fc24.x86_64
Please fix this.
Информация, содержащаяся в этом документе и приложениях к нему, может быть использована только получателем. Отправитель не несет юридической ответственности за содержание данного сообщения. Если это письмо попало к Вам случайно, пожалуйста, срочно удалите данный документ. Не посвящайте в содержание этого документа кого либо еще и не делайте копий. Совершение данных действий является противозаконным.
I am using a DWA-192 usb WiFi adapter in F25 hence I need to get a
driver from github to be compiled on my system so that I can use the
adapter. This driver compiled and worked quite happily with kernel
4.9.9, not that the kernel version is necessarily an indicator of
compile success. It had been a month or more since I had apply any
system updates, so I did so two days ago, which as part of the update
updated the kernel to 4.11.5, and when dkms went to compile the driver
for the new kernel the compile failed with error messages about implicit
function definitions and messages about warnings having been converted
I tried doing a search on the net for a DWA-192 driver and got a
link to github to a driver version that seemed to be the same version as
the driver I already had, but I downloaded it anyway and did a manual
compile of that but it failed to compile with the same errors.
Does anyone know if there is an updated driver that will compile
with the current level of F25 or whether it has yet to be updated for
compatibility with F25 and hence I will need to continue to use Ethernet
I'm using Fedora 25 on an HP laptop with KDE. I commonly use a VPN
service, but it leaks ipv6 addresses. This seems to be a common
problem with VPN and ipv6, from what I've read on the internet.
So, I've turned off ipv6 for my wireless interface, and that seems to
solve the problem. However, I just can't help but think that this will
eventually cause a problem somewhere.
Is there a better solution for ipv6 leakage with a vpn on Fedora 25
other than just turning it off?
(f25 home workstation)
While looking at journalctl output yesterday and today for other reasons (separate thread), I saw many "authentication failure" messages, over half also saying "user=root". I also saw many "password check failed for user (root)" messages. I saw many unknown user login attempts, and a few invalid user login attempts, and some attempts using one of the valid regular user names. Why? I am not yet good at reading journalctl output, so I don't know if these connection attempts are coming from "outside" or within this system. I don't know if I should be concerned or not. I do not intend anyone or anything to be able to get in to this system except for things that I initiate (examples: Firefox activity, Thunderbird activity, "dnf upgrade", installs, etc.). And it doesn't make sense to me that any of those would be trying to log in to this system to do what I want. I also don't see why anything on this system would try to log in to this same system except me personally (su, sudo, and
actual logins). I am the only actual user.
What's going on? How do I determine where they're coming from? Is there really someone or something trying to hack in? If no, what really is going on?
How do I prevent connections from outside?
I did an upgrade from F24 to F25.
Everything seems to be working fine.
I use xscreensaver instead of gnome-screensaver with a Gnome desktop.
I have noticed that the timer for the screensaver is not being reset
when I type or use the mouse. I can be using the machine and the
screensaver will activate and then deactivate (since I'm typing or
using the mouse).
Has anyone else noticed this kind of behavior?
Is this something with xscreensaver or is the timer reset somewhere
Wikileaks released a document about an attack against CentOS / Rhel.
Here's the text, there are some docs there also.
29 June, 2017
Today, June 29th 2017, WikiLeaks publishes documents from the
OutlawCountry project of the CIA that targets computers running the
Linux operating system. OutlawCountry allows for the redirection of all
outbound network traffic on the target computer to CIA controlled
machines for ex- and infiltration purposes. The malware consists of a
kernel module that creates a hidden netfilter table on a Linux target;
with knowledge of the table name, an operator can create rules that
take precedence over existing netfilter/iptables rules and are
concealed from an user or even system administrator.
The installation and persistence method of the malware is not described
in detail in the document; an operator will have to rely on the
available CIA exploits and backdoors to inject the kernel module into a
target operating system. OutlawCountry v1.0 contains one kernel module
for 64-bit CentOS/RHEL 6.x; this module will only work with default
kernels. Also, OutlawCountry v1.0 only supports adding covert DNAT
rules to the PREROUTING chain.
My first take is that this doesn't represent a very serious threat. Do