-
Search Results
-
If you have to reinstall antiX for some reason from ISO you’ll notice much work will have to be done until basic things like email are back to normal.
Probably, when upgrading to a new antiX version from ISO it is not a good idea to keep (or copy) complete ./home folder from previous installation, since multiple version mismatches of all the config files living there are to be expected. Also some program specific files need to be treated one by one, following the upgrade instructions of the respective program rather than copying the old files 1:1 to the new version.
Part 1:
Claws Mail.In order to all emails received and sent as well as all existing email account setup from an old antiX installation to a new one (e.g. on a different PC) some steps are to be observed:
1.) Copy complete the following folders recursively to the new antiX system, matching your email account names assigned by claws mail:
~/.claws-mail ~/<account.name-1> ~/<account.name-2> ...(You need to preserve/adapt ownership while copying. You need to preserve permissions of all files and folders while copying)
Start Claws-Mail. Everything from your old system should be present and usable immediately.
2.) In case you have used use S/MIME encryption (see Claws-Mail email encryption thread) you will notice existing sent or received encrypted emails are not readable on the new system.
From claws-mail menu bar „Configuration” choose „Plugins and Addons”, activate the pluginsPGP/core PGP/inline PGP/MIME S/MIMEAccept and close claws-mail
Additionally copy the complete folder recursively to the fresh antiX system (Don’t apply this when you already have created a gpg key on the new system, since it will get lost):
~/.gnupg(Again, you need to preserve/adapt ownership while copying. You need to preserve permissions of all files and folders while copying)
After restart of claws-mail all old encrypted emails should be readable again immediately.
—–
General hint: Don’t use samba / connectshare for file copy here, it will remove/change ownership and permissions while transferring. If using an USB stick for transfer it must be formatted ext4. Don’t use fat/fat32/exfat formatted file systems for transfer, it will remove/change ownership and permissions.As a safe alternative transfer method you can use the scp command in console window:
scp -rp ~/.claws-mail <user@host:path> scp -rp ~/<account.name> <user@host:path> scp -rp ~/.gpg <user@host:path>(this will transfer all files via SSH to the target PC)
Also you can simply copy the folders in zzzFM by drag and drop (as long neither source nor target are remote) if both file systems are formatted to ext4 (ext2 and ext3 should be fine also).
Windows is like a submarine. Open a window and serious problems will start.
#################################################################################
Error messages when installing Samba – packages could not be installed – broken packages
#################################################################################
Hi All.
Been using antix past fortnight, so far really enjoying it, thank you so much devs.
I have a lot of tweaks to make and stuff to learn,
but overall it is running really well on a low-spec system. Great work.I am getting an error message when trying to install Samba as below.
error message from :
sudo apt install samba——————
Reading package lists…
Building dependency tree…
Reading state information…
Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:The following packages have unmet dependencies:
samba : Depends: python3-samba but it is not going to be installed
Depends: samba-common-bin (= 2:4.13.13+dfsg-1~deb11u5) but it is not going to be installed
Depends: libwbclient0 (= 2:4.13.13+dfsg-1~deb11u5) but 2:4.17.4+dfsg-2~bpo11+1 is to be installed
Depends: samba-libs (= 2:4.13.13+dfsg-1~deb11u5) but it is not going to be installed——————
I tried installing all the dependencies mentioned – and received similar error messages to the original one.
——————
I read through this thread
https://www.antixforum.com/forums/topic/how-to-fix-broken-packages-after-upgrade/Unlike the guy in the thread, I have not added any repos (to my knowledge)
other than the following for brave browser (if that even counts as adding a repo – probably not) :sudo curl -fsSLo /usr/share/keyrings/brave-browser-archive-keyring.gpg https://brave-browser-apt-release.s3.brave.com/brave-browser-archive-keyring.gpg
echo “deb [signed-by=/usr/share/keyrings/brave-browser-archive-keyring.gpg arch=amd64] https://brave-browser-apt-release.s3.brave.com/ stable main”|sudo tee /etc/apt/sources.list.d/brave-browser-release.list
sudo apt update
sudo apt install brave-browserAs suggested to the guy in the thread,
I tried :sudo apt update && sudo apt upgrade
Then retried install of samba, which returned the same error message as the original :
$ sudo apt install samba
Reading package lists… Done
Building dependency tree… Done
Reading state information… Done
Some packages could not be installed. This may mean that you have
requested an impossible situation or if you are using the unstable
distribution that some required packages have not yet been created
or been moved out of Incoming.
The following information may help to resolve the situation:The following packages have unmet dependencies:
samba : Depends: python3-samba but it is not going to be installed
Depends: samba-common-bin (= 2:4.13.13+dfsg-1~deb11u5) but it is not going to be installed
Depends: libwbclient0 (= 2:4.13.13+dfsg-1~deb11u5) but 2:4.17.4+dfsg-3~bpo11+1 is to be installed
Depends: samba-libs (= 2:4.13.13+dfsg-1~deb11u5) but it is not going to be installed
E: Unable to correct problems, you have held broken packages.——————–
I am hoping there is some option other than “reinstall your entire system”
as suggested to the guy in the thread I quoted 😛As I mentioned –
I have not intentionally / consciously installed any repos, and this is something I try to avoid,
and very rarely do (and probably won’t do on this system).
————-
Thanks in advance for any assistance, and to anybody who is developing and participating in supporting such an awesome operating system.Hi,
I was searching on multiple forum which include antiX forum, MX Linux forum, Linux and Unix forum etc but not able to solve my problem which is unable to detect my USB external HD. It is able to detect in MX Linux. Please help..I attached:
1. inxi -F
2. lsblk
3. udevil.conf (in which even I had allowed devices)
4. photos type of USB external drive (FAT32/NTFS format)===============================================================================
From Terminal:$ inxi -F System: Host: user2831 Kernel: 5.10.142-antix.2-686-smp-pae arch: i686 bits: 32 Desktop: IceWM v: 3.3.0 Distro: antiX-22_386-full Grup Yorum 18 October 2022 Machine: Type: Desktop System: Gigabyte product: N/A v: N/A serial: <superuser required> Mobo: Gigabyte model: H61M-S2P-R3 serial: <superuser required> BIOS: American Megatrends v: F2 date: 04/26/2013 CPU: Info: dual core model: Intel Core i3-2120 bits: 32 type: MT MCP cache: L2: 512 KiB Speed (MHz): avg: 1646 min/max: 1600/3300 cores: 1: 1797 2: 1596 3: 1596 4: 1596 Graphics: Device-1: Intel 2nd Generation Core Processor Family Integrated Graphics driver: i915 v: kernel Device-2: Logitech Webcam C310 type: USB driver: snd-usb-audio,uvcvideo Display: x11 server: X.Org v: 1.20.11 driver: X: loaded: modesetting unloaded: fbdev,vesa gpu: i915 resolution: 1024x768~60Hz OpenGL: renderer: Mesa DRI Intel HD Graphics 2000 (SNB GT1) v: 3.3 Mesa 20.3.5 Audio: Device-1: Intel 6 Series/C200 Series Family High Definition Audio driver: snd_hda_intel Device-2: Logitech Webcam C310 type: USB driver: snd-usb-audio,uvcvideo Sound Server-1: ALSA v: k5.10.142-antix.2-686-smp-pae running: yes Network: Device-1: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet driver: r8169 IF: eth0 state: down mac: 74:d4:35:23:00:48 Device-2: Qualcomm Atheros TP-Link TL-WN322G v3 / TL-WN422G v2 802.11g [Atheros AR9271] type: USB driver: ath9k_htc IF: wlan0 state: up mac: 94:0c:6d:8c:46:9f Drives: Local Storage: total: 614.81 GiB used: 8.25 GiB (1.3%) ID-1: /dev/sda vendor: Western Digital model: WD5000AAKX-193CA0 size: 465.76 GiB ID-2: /dev/sdb vendor: Hitachi model: HDT721016SLA380 size: 149.05 GiB Partition: ID-1: / size: 89.67 GiB used: 8.25 GiB (9.2%) fs: btrfs dev: /dev/sdb1 Swap: Alert: No swap data was found. Sensors: System Temperatures: cpu: 89.0 C mobo: N/A Fan Speeds (RPM): N/A Info: Processes: 176 Uptime: 2m Memory: 3.77 GiB used: 983.1 MiB (25.5%) Shell: Bash inxi: 3.3.19===============================================================================
$ lsblk NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT sda 8:0 0 465.8G 0 disk ├─sda1 8:1 0 100M 0 part ├─sda2 8:2 0 115.3G 0 part ├─sda3 8:3 0 1K 0 part ├─sda4 8:4 0 80G 0 part └─sda5 8:5 0 270.3G 0 part sdb 8:16 0 149.1G 0 disk ├─sdb1 8:17 0 89.7G 0 part / └─sdb2 8:18 0 59.4G 0 part sr0 11:0 1 1024M 0 rom =============================================================================== file udevil.conf ############################################################################## # # udevil configuration file /etc/udevil/udevil.conf # # This file controls what devices, networks, and files users may mount and # unmount via udevil (set suid). # # IMPORTANT: IT IS POSSIBLE TO CREATE SERIOUS SECURITY PROBLEMS IF THIS FILE # IS MISCONFIGURED - EDIT WITH CARE # # Note: For greater control for specific users, including root, copy this # file to /etc/udevil/udevil-user-USERNAME.conf replacing USERNAME with the # desired username (eg /etc/udevil/udevil-user-jim.conf). # # Format: # OPTION = VALUE[, VALUE, ...] # # DO NOT USE QUOTES except literally # Lines beginning with # are ignored # ############################################################################## # To log all uses of udevil, set log_file to a file path: # log_file = /var/log/udevil.log # Approximate number of days to retain log entries (0=forever, max=60): log_keep_days = 10 # allowed_types determines what fstypes can be passed by a user to the u/mount # program, what device filesystems may be un/mounted implicitly, and what # network filesystems may be un/mounted. # It may also include the 'file' keyword, indicating that the user is allowed # to mount files (eg an ISO file). The $KNOWN_FILESYSTEMS variable may # be included to include common local filesystems as well as those listed in # /etc/filesystems and /proc/filesystems. # allowed_types_USERNAME, if present, is used to override allowed_types for # the specific user 'USERNAME'. For example, to allow user 'jim' to mount # only vfat filesystems, add: # allowed_types_jim = vfat # Setting allowed_types = * does NOT allow all types, as this is a security # risk, but does allow all recognized types. allowed_types = $KNOWN_FILESYSTEMS, file, cifs, smbfs, nfs, curlftpfs, ftpfs, sshfs, davfs, tmpfs, ramfs #allowed_types = $KNOWN_FILESYSTEMS, file # allowed_users is a list of users permitted to mount and unmount with udevil. # Wildcards (* or ?) may be used in the usernames. To allow all users, # specify "allowed_users=*". UIDs may be included using the form UID=1000. # For example: allowed_users = carl, UID=1000, pre* # Also note that permission to execute udevil may be limited to users belonging # to the group that owns /usr/bin/udevil, such as 'plugdev' or 'storage', # depending on installation. # allowed_users_FSTYPE, if present, is used to override allowed_users when # mounting or unmounting a specific fstype (eg nfs, ext3, file). # Note that when mounting a file, fstype will always be 'file' regardless of # the internal fstype of the file. # For example, to allow only user 'bob' to mount nfs shares, add: # allowed_users_nfs = bob # The root user is NOT automatically allowed to use udevil in some cases unless # listed here (except for unmounting anything or mounting fstab devices). allowed_users = * # allowed_groups is a list of groups permitted to mount and unmount with # udevil. The user MUST belong to at least one of these groups. Wildcards # or GIDs may NOT be used in group names, but a single * may be used to allow # all groups. # Also note that permission to execute udevil may be limited to users belonging # to the group that owns /usr/bin/udevil, such as 'plugdev' or 'storage', # depending on installation. # allowed_groups_FSTYPE, if present, is used to override allowed_groups when # mounting or unmounting a specific fstype (eg nfs, ext3, file). For example, # to allow only members of the 'network' group to mount smb and nfs shares, # use both of these lines: # allowed_groups_smbfs = network # allowed_groups_nfs = network # The root user is NOT automatically allowed to use udevil in some cases unless # listed here (except for unmounting anything or mounting fstab devices). allowed_groups = * # allowed_media_dirs specifies the media directories in which user mount points # may be located. The first directory which exists and does not contain a # wildcard will be used as the default media directory (normally /media or # /media/$USER). # The $USER variable, if included, will be replaced with the username of the # user running udevil. Wildcards may also be used in any directory EXCEPT the # default. Wildcards will not match a /, except a /** suffix for recursion. # allowed_media_dirs_FSTYPE, if present, is used to override allowed_media_dirs # when mounting or unmounting a specific fstype (eg ext2, nfs). For example, # to cause /media/network to be used as the default media directory for # nfs and ftpfs mounts, use these two lines: # allowed_media_dirs_nfs = /media/network, /media, /media/$USER # allowed_media_dirs_ftpfs = /media/network, /media, /media/$USER # NOTE: If you want only the user who mounted a device to have access to it # and be allowed to unmount it, specify /media/$USER as the first # allowed media directory (only /media/$USER is created on demand). # IMPORTANT: If an allowed file is mounted to a media directory, the user may # be permitted to unmount its associated loop device even though internal. # INCLUDING /MNT HERE IS NOT RECOMMENDED. ALL ALLOWED MEDIA DIRECTORIES # SHOULD BE OWNED AND WRITABLE ONLY BY ROOT. allowed_media_dirs = /media/$USER, /run/media/$USER # allowed_devices is the first criteria for what block devices users may mount # or unmount. If a device is not listed in allowed_devices, it cannot be # un/mounted (unless in fstab). However, even if a device is listed, other # factors may prevent its use. For example, access to system internal devices # will be denied to normal users even if they are included in allowed_devices. # allowed_devices_FSTYPE, if present, is used to override allowed_devices when # mounting or unmounting a specific fstype (eg ext3, ntfs). For example, to # prevent all block devices containing an ext4 filesystem from being # un/mounted use: # allowed_devices_ext4 = # Note: Wildcards may be used, but a wildcard will never match a /, except # for "allowed_devices=*" which allows any device. The recommended setting is # allowed_devices = /dev/* # WARNING: ALLOWING USERS TO MOUNT DEVICES OUTSIDE OF /dev CAN CAUSE SERIOUS # SECURITY PROBLEMS. DO NOT ALLOW DEVICES IN /dev/shm allowed_devices = /dev/* # allowed_devices = * # allowed_internal_devices causes udevil to treat any listed block devices as # removable, thus allowing normal users to un/mount them (providing they are # also listed in allowed_devices). # allowed_internal_devices_FSTYPE, if present, is used to override # allowed_internal_devices when mounting or unmounting a specific fstype # (eg ext3, ntfs). For example, to allow block devices containing a vfat # filesystem to be un/mounted even if they are system internal devices, use: # allowed_internal_devices_vfat = /dev/sdb* # Some removable esata drives look like internal drives to udevil. To avoid # this problem, they can be treated as removable with this setting. # WARNING: SETTING A SYSTEM DEVICE HERE CAN CAUSE SERIOUS SECURITY PROBLEMS. # allowed_internal_devices = allowed_internal_devices = * # allowed_internal_uuids and allowed_internal_uuids_FSTYPE work similarly to # allowed_internal_devices, except that UUIDs are specified instead of devices. # For example, to allow un/mounting of an internal filesystem based on UUID: # allowed_internal_uuids = cc0c4489-8def-1e5b-a304-ab87c3cb626c0 # WARNING: SETTING A SYSTEM DEVICE HERE CAN CAUSE SERIOUS SECURITY PROBLEMS. # allowed_internal_uuids = # forbidden_devices is used to prevent block devices from being un/mounted # even if other settings would allow them (except devices in fstab). # forbidden_devices_FSTYPE, if present, is used to override # forbidden_devices when mounting or unmounting a specific fstype # (eg ext3, ntfs). For example, to prevent device /dev/sdd1 from being # mounted when it contains an ntfs filesystem, use: # forbidden_devices_ntfs = /dev/sdd1 # NOTE: device node paths are canonicalized before being tested, so forbidding # a link to a device will have no effect. forbidden_devices = # allowed_networks determines what hosts may be un/mounted by udevil users when # using nfs, cifs, smbfs, curlftpfs, ftpfs, or sshfs. Hosts may be specified # using a hostname (eg myserver.com) or IP address (192.168.1.100). # Wildcards may be used in hostnames and IP addresses, but CIDR notation # (192.168.1.0/16) is NOT supported. IP v6 is supported. For example: # allowed_networks = 127.0.0.1, 192.168.1.*, 10.0.0.*, localmachine, *.okay.com # Or, to prevent un/mounting of any network shares, set: # allowed_networks = # allowed_networks_FSTYPE, if present, is used to override allowed_networks # when mounting or unmounting a specific network fstype (eg nfs, cifs, sshfs, # curlftpfs). For example, to limit nfs and samba shares to only local # networks, use these two lines: # allowed_networks_nfs = 192.168.1.*, 10.0.0.* # allowed_networks_cifs = 192.168.1.*, 10.0.0.* allowed_networks = * # forbidden_networks and forbidden_networks_FSTYPE are used to specify networks # that are never allowed, even if other settings allow them (except fstab). # NO REVERSE LOOKUP IS PERFORMED, so including bad.com will only have an effect # if the user uses that hostname. IP lookup is always performed, so forbidding # an IP address will also forbid all corresponding hostnames. forbidden_networks = # allowed_files is used to determine what files in what directories may be # un/mounted. A user must also have read permission on a file to mount it. # Note: Wildcards may be used, but a wildcard will never match a /, except # for "allowed_files=*" which allows any file, and a /** suffix, which matches # all files recursively. # For example, to allow only files in the /share directory to be mounted, use: # allowed_files = /share/* # To allow all files in the /share directory AND all subdirectories use: # allowed_files = /share/** # NOTE: Specifying allowed_files_FSTYPE will NOT work because the fstype of # files is always 'file'. allowed_files = * # forbidden_files is used to specify files that are never allowed, even if # other settings allow them (except fstab). Specify a full path. # Note: Wildcards may be used, but a wildcard will never match a /, except # for "forbidden_files = *", or a /** suffix, which matches all recursively. # NOTE: file paths are canonicalized before being tested, so forbidding # a link to a file will have no effect. forbidden_files = # default_options specifies what options are always included when performing # a mount, in addition to any options the user may specify. # Note: When a device is present in /etc/fstab, and the user does not specify # a mount point, the device is mounted with normal user permissions using # the fstab entry, without these options. # default_options_FSTYPE, if present, is used to override default_options # when mounting a specific fstype (eg ext2, nfs). # The variables $USER, $UID, and $GID are changed to the user's username, UID, # and GID. # FOR GOOD SECURITY, default_options SHOULD ALWAYS INCLUDE: nosuid,noexec,nodev # WARNING: OPTIONS PRESENT OR MISSING CAN CAUSE SERIOUS SECURITY PROBLEMS. default_options = nosuid, noexec, nodev, noatime default_options_file = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, ro # mount iso9660 with 'ro' to prevent mount read-only warning default_options_iso9660 = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, ro, utf8 default_options_udf = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID default_options_vfat = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, utf8 default_options_exfat = nosuid, noexec, nodev, noatime, uid=1000, gid=1000 default_options_msdos = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID default_options_umsdos = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID default_options_ntfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, utf8 default_options_cifs = nosuid, noexec, nodev, uid=$UID, gid=$GID default_options_smbfs = nosuid, noexec, nodev, uid=$UID, gid=$GID default_options_sshfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, nonempty, allow_other default_options_curlftpfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID, nonempty, allow_other default_options_ftpfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID default_options_davfs = nosuid, noexec, nodev, uid=$UID, gid=$GID default_options_tmpfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID default_options_ramfs = nosuid, noexec, nodev, noatime, uid=$UID, gid=$GID # allowed_options determines all options that a user may specify when mounting. # All the options used in default_options above must be included here too, or # they will be rejected. If the user attempts to use an option not included # here, an error will result. Wildcards may be used. # allowed_options_FSTYPE, if present, is used to override allowed_options # when mounting a specific fstype (eg ext2, nfs). # The variables $USER, $UID, and $GID are changed to the user's username, UID, # and GID. # If you want to forbid remounts, remove 'remount' from here. # WARNING: OPTIONS HERE CAN CAUSE SERIOUS SECURITY PROBLEMS - CHOOSE CAREFULLY allowed_options = nosuid, noexec, nodev, noatime, fmask=0133, dmask=0022, uid=$UID, gid=$GID, ro, rw, sync, flush, iocharset=*, utf8, remount allowed_options_nfs = nosuid, noexec, nodev, noatime, ro, rw, sync, remount, port=*, rsize=*, wsize=*, hard, proto=*, timeo=*, retrans=* allowed_options_cifs = nosuid, noexec, nodev, ro, rw, remount, port=*, user=*, username=*, pass=*, password=*, guest, domain=*, uid=$UID, gid=$GID, credentials=* allowed_options_smbfs = nosuid, noexec, nodev, ro, rw, remount, port=*, user=*, username=*, pass=*, password=*, guest, domain=*, uid=$UID, gid=$GID, credentials=* allowed_options_sshfs = nosuid, noexec, nodev, noatime, ro, rw, uid=$UID, gid=$GID, nonempty, allow_other, idmap=user, BatchMode=yes, port=* allowed_options_curlftpfs = nosuid, noexec, nodev, noatime, ro, rw, uid=$UID, gid=$GID, nonempty, allow_other, user=* allowed_options_ftpfs = nosuid, noexec, nodev, noatime, ro, rw, port=*, user=*, pass=*, root=*, uid=$UID, gid=$GID #allowed_options_exfat = nosuid, noexec, nodev, noatime, fmask=0133, dmask=0022, uid=$UID, gid=$GID, umask=0077, namecase=*, ro, rw, sync, flush, iocharset=*, remount, nonempty # mount_point_mode, if present and set to a non-empty value, will cause udevil # to set the mode (permissions) on the moint point after mounting If not # specified or if left empty, the mode is not changed. Mode must be octal # starting with a zero (0755). # mount_point_mode_FSTYPE, if present, is used to override mount_point_mode # when mounting a specific fstype (eg ext2, nfs). # NOT SETTING A MODE CAN HAVE SECURITY IMPLICATIONS FOR SOME FSTYPES mount_point_mode = 0755 # don't set a mode for some types: mount_point_mode_sshfs = mount_point_mode_curlftpfs = mount_point_mode_ftpfs = # Use the settings below to change the default locations of programs used by # udevil, or (advanced topic) to redirect commands to your scripts. # When substituting scripts, make sure they are root-owned and accept the # options used by udevil (for example, the mount_program must accept --fake, # -o, -v, and other options valid to mount.) # Be sure to specify the full path and include NO OPTIONS or other arguments. # These programs may also be specified as configure options when building # udevil. # THESE PROGRAMS ARE RUN AS ROOT # mount_program = /bin/mount # umount_program = /bin/umount # losetup_program = /sbin/losetup # setfacl_program = /usr/bin/setfacl # validate_exec specifies a program or script which provides additional # validation of a mount or unmount command, beyond the checks performed by # udevil. The program is run as a normal user (if root runs udevil, # validate_exec will NOT be run). The program is NOT run if the user is # mounting a device without root privileges (a device in fstab). # The program is passed the username, a printable description of what is # happening, and the entire udevil command line as the first three arguments. # The program must return an exit status of 0 to allow the mount or unmount # to proceed. If it returns non-zero, the user will be denied permission. # For example, validate_exec might specify a script which notifies you # of the command being run, or performs additional steps to authenticate the # user. # Specify a full path to the program, with NO options or arguments. # validate_exec = # validate_rootexec works similarly to validate_exec, except that the program # is run as root. validate_rootexec will also be run if the root user runs # udevil. If both validate_exec and validate_rootexec are specified, # validate_rootexec will run first, followed by validate_exec. # The program must return an exit status of 0 to allow the mount or unmount # to proceed. If it returns non-zero, the user will be denied permission. # Unless you are familiar with writing root scripts, it is recommended that # rootexec settings NOT be used, as it is easy to inadvertently open exploits. # THIS PROGRAM IS ALWAYS RUN AS ROOT, even if the user running udevil is not. # validate_rootexec = # success_exec is run after a successful mount, remount, or unmount. The # program is run as a normal user (if root runs udevil, success_exec # will NOT be run). # The program is passed the username, a printable description of what action # was taken, and the entire udevil command line as the first three arguments. # The program's exit status is ignored. # For example, success_exec might run a script which informs you of what action # was taken, and might perform further actions. # Specify a full path to the program, with NO options or arguments. # success_exec = # success_rootexec works similarly to success_exec, except that the program is # run as root. success_rootexec will also be run if the root user runs udevil. # If both success_exec and success_rootexec are specified, success_rootexec # will run first, followed by success_exec. # Unless you are familiar with writing root scripts, it is recommended that # rootexec settings NOT be used, as it is easy to inadvertently open exploits. # THIS PROGRAM IS ALWAYS RUN AS ROOT, even if the user running udevil is not. # success_rootexec ================================================================================
Thanks…
- This topic was modified 4 months ago by rokytnji. Reason: Needed code tags
Dear forum members:
I’ve used Linux in my office for some 12 years and antiX for about half of that time. My old office desktop motherboard went to heaven a few days ago, and it’s replacement, a motherboard with a quad core and 2 GB of RAM and my old 2 hd (old spinning disks) is great for office work:
antiX running IceWM (no dekstop icons but with Conky running) with a nice looking theme (+ tint2 toolbar and a jgmenu- AKA FT10) + Firefox with 3 tabs open (one, very heavy- Gmail, this forum and one page I need for work), zzzfm with 3 tabs, Thunderbird, LibreOffice WriterRAM usage: 1460mb, no Swap used
CPU usage: 11 – 13%So, if you want to use antiX for real office work, with this very well known Open Source pieces of software (well zzzfm is a gem probably known only to us), you can do it- hell, you can use GUI scripts to mount Samba Shared Folders or Cloud Drives, so probably you can do most office work (involving webpages, e-mail, text documents or spreadsheets) with plenty of resources to spare, as long as you have more than 1 CPU core and 2Gb of RAM.
Edit: most modern OSes probably require about 1.4Gb of RAM just to be idle! If I really wanted I could, of course, shave one or two dozens of mb of RAM usage.
This system, on idle, uses about 150-160Mb of RAM and about 1% of CPU.P.
- This topic was modified 4 months, 4 weeks ago by PPC.
- This topic was modified 4 months, 4 weeks ago by PPC.
