Re: Dates? Re: Printing woes...

2008-05-13 Thread Nick Rout
No its not. Here are two lines from your headers:

Received: from paradise.net.nz
 (210-246-27-184.paradise.net.nz [210.246.27.184]) by smtp4.clear.net.nz
 (CLEAR Net Mail) with ESMTP id [EMAIL PROTECTED] for
 linux-users@it.canterbury.ac.nz; Tue, 13 May 2008 17:28:53 +1200 (NZST)
Date: Wed, 14 May 2008 09:29:48 +1200


This shows your message dated tomorrow at 9;29 am but received by
paradise today at 5:28 pm

Your timezone is set right, now as root run:

ntpdate nz.pool.ntp.org

That will set your date right and it should be fine from there on in.

On Wed, May 14, 2008 at 9:29 AM, Barry [EMAIL PROTECTED] wrote:
 Thanks, Please check that its ok now. Its the result of a new install which
 caused me a lot of grief

 Barry

 Craig Falconer wrote:

 On Tue, 2008-05-14 at 05:18 -0400, Barry wrote:
^

 Your clock is one day fast, and you're in the wrong timezone.  So your
 emails are dated 10 hours in the future.

 Just thought you'd like to know...





Re: Dates? Re: Printing woes...

2008-05-13 Thread Steve Holdoway
On Tue, 13 May 2008 18:56:11 +1200
Nick Rout [EMAIL PROTECTED] wrote:

 ntpdate nz.pool.ntp.org
If is whinges that the port is already in use, then

sudo /etc/init.d/ntp stop
( that might be ntpd or ntp-server on Mandriva - not sure )
Then 

sudo ntpdate nz.pool.ntp.org

then

sudo /etc/init.d/ntp start

They ( ntp and ntpdate ) sort of do the same thing, but the ntpdate program is 
designed to be a large mallet, run once to correct the time no matter how wrong 
it is, then the ntp daemon attempts to keep it there, but it can only make 
small changes.

I usually update the /etc/init.d/ntp script so that it calls ntpdate before 
starting the daemon, so the clock's put right when the machine's switched on. 
This used to be standard practice on DEC and HP Unixes ( where are they now! ).

Steve
-- 
Steve Holdoway [EMAIL PROTECTED]


Re: A quick quiz for fun

2008-05-13 Thread Wesley Parish
On Monday 12 May 2008 21:16, Christopher Sawtell wrote:
 Your score: 100 out of 100.

I only scored 100/100.  Guessed the month Linux was released, as well.

The question of Wang VS versus S/390 amused me - those Wangs are museum pieces 
by now, surely! ;)

Wesley Parish

 Not too terribly difficult imho

 I too guessed the the month Linux was released.
 I just tied it in to the Northern academic timetable, surprise surprise.

 On Mon, May 12, 2008 at 8:17 PM, Ross Drummond [EMAIL PROTECTED] wrote:
  On Mon, 12 May 2008, Nick Rout wrote:
http://www.pcworld.idg.com.au/survey/9
   
Post back your results, I got 90/100.
 
   I got 90/100 which surprised me as some of my answers were no more than
  wild guesses.
 
   Cheers Ross Drummond

-- 
Clinersterton beademung, with all of love - RIP James Blish
-
Gaul is quartered into three halves.  Things which are 
impossible are equal to each other.  Guerrilla 
warfare means up to their monkey tricks. 
Extracts from Schoolboy Howlers - the collective wisdom 
of the foolish.
-
Mau e ki, he aha te mea nui?
You ask, what is the most important thing?
Maku e ki, he tangata, he tangata, he tangata.
I reply, it is people, it is people, it is people.


USB drive needs nudge to automount (Ubuntu 7.10)

2008-05-13 Thread Gauland, Michael
At some point, Ubuntu stopped automounting my USB drives. It hasn't been
a major inconvenience, but I thought I'd probe the collective wisdom and
see if I can't come up with a solution.

If I plug in a memory stick, nothing happens. Then I open the Removable
drives and media control panel. *Sometimes* that's enough to get the
system to recognize them, but usually I need to toggle the
automatically mount option off then back on to get the drive to show
up.

Any ideas on why the system needs a little nudge to get it to notice the
drive?

--Mike


**
This electronic message together with any attachments is confidential. If
you receive it in error: (i) you must not use, disclose, copy or retain
it; (ii) please contact the sender immediately by reply email and then
delete the emails. Views expressed in this email may not be those of the
Airways Corporation of New Zealand Limited
**



Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Nick Rout
There is a huge debian/ubuntu (and distros based on them) security
issue through a screw up by debian in removing random number
generation from the generation of keys in libssl (part of openssl) a
couple of years ago.

The reports for ubuntu are here:

https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000705.html
https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000706.html

Oh and openvpn is affected too, although that isn't used by me

https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000707.html

Anyway I am trying to update a system remotely (over ssh of course, how ironic).

The openssh-client and -server updates don't seem to get applied:

[EMAIL PROTECTED]:~$ sudo apt-get upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages have been kept back:
  openssh-client openssh-server
0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.


Any idea why not? aptitude does much the same. This is on hardy, with
no changes to the default sources.list.


Re: Tuesday night meeting...

2008-05-13 Thread Kerry
I'd just like to thank last nights' speaker (was it Chris?) for his
rather impromptu talk on networking last night - it was quite
informative when things works (and sometimes when they weren't).

It's making me seriously consider taking another look at KDE.

Regards,
Kerry



Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Steve Holdoway
On Wed, 14 May 2008 09:16:28 +1200
Nick Rout [EMAIL PROTECTED] wrote:

 There is a huge debian/ubuntu (and distros based on them) security
 issue through a screw up by debian in removing random number
 generation from the generation of keys in libssl (part of openssl) a
 couple of years ago.
 
 The reports for ubuntu are here:
 
 https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000705.html
 https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000706.html
 
 Oh and openvpn is affected too, although that isn't used by me
 
 https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-May/000707.html
 
 Anyway I am trying to update a system remotely (over ssh of course, how 
 ironic).
 
 The openssh-client and -server updates don't seem to get applied:
 
 [EMAIL PROTECTED]:~$ sudo apt-get upgrade
 Reading package lists... Done
 Building dependency tree
 Reading state information... Done
 The following packages have been kept back:
   openssh-client openssh-server
 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
 
 
 Any idea why not? aptitude does much the same. This is on hardy, with
 no changes to the default sources.list.
Well, the irony is at the core of this. It is possible that you'll lose 
connectivity - permanently - if you upgrade over ssh. There are also some key 
upgrade issues that may affect your connectivity. I have no idea how they do 
it, but they do normally manage to keep the connections up.

sudo apt-get install openssh-client openssh-server

works fine over ssh though.

Steve
-- 
Steve Holdoway [EMAIL PROTECTED]


Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Roy Britten
Answering the question,

  Any idea why not?

I believe that this can be due to broken or new dependencies.


Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Roy Britten
2008/5/14 Nick Rout [EMAIL PROTECTED]:
  Anyway I am trying to update a system remotely (over ssh of course, how 
 ironic).

  The openssh-client and -server updates don't seem to get applied:

  [EMAIL PROTECTED]:~$ sudo apt-get upgrade
  Reading package lists... Done
  Building dependency tree
  Reading state information... Done
  The following packages have been kept back:
   openssh-client openssh-server
  0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.


  Any idea why not? aptitude does much the same. This is on hardy, with
  no changes to the default sources.list.

do you need
sudo apt-get dist-upgrade


Re: Tuesday night meeting...

2008-05-13 Thread Roy Britten
2008/5/14 Kerry [EMAIL PROTECTED]:
 I'd just like to thank last nights' speaker (was it Chris?) for his

Indeed -- thanks Chris!

  It's making me seriously consider taking another look at KDE.

I'm just really impressed by the capabilities of fish. Is there any
way of getting that on a gnome desktop without installing konqueror,
or is one part-and-parcel of the other?


Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Steve Holdoway
On Wed, 14 May 2008 10:12:19 +1200
Roy Britten [EMAIL PROTECTED] wrote:

 2008/5/14 Nick Rout [EMAIL PROTECTED]:
   Anyway I am trying to update a system remotely (over ssh of course, how 
  ironic).
 
   The openssh-client and -server updates don't seem to get applied:
 
   [EMAIL PROTECTED]:~$ sudo apt-get upgrade
   Reading package lists... Done
   Building dependency tree
   Reading state information... Done
   The following packages have been kept back:
openssh-client openssh-server
   0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
 
 
   Any idea why not? aptitude does much the same. This is on hardy, with
   no changes to the default sources.list.
 
 do you need
 sudo apt-get dist-upgrade
No, that is intended upgrade to a new distro - gutsy to hardy for example.

Steve
-- 
Steve Holdoway [EMAIL PROTECTED]


Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Nick Rout
On Wed, May 14, 2008 at 10:57 AM, Steve Holdoway [EMAIL PROTECTED] wrote:
 On Wed, 14 May 2008 10:12:19 +1200
 Roy Britten [EMAIL PROTECTED] wrote:

 2008/5/14 Nick Rout [EMAIL PROTECTED]:
   Anyway I am trying to update a system remotely (over ssh of course, how 
  ironic).
 
   The openssh-client and -server updates don't seem to get applied:
 
   [EMAIL PROTECTED]:~$ sudo apt-get upgrade
   Reading package lists... Done
   Building dependency tree
   Reading state information... Done
   The following packages have been kept back:
openssh-client openssh-server
   0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
 
 
   Any idea why not? aptitude does much the same. This is on hardy, with
   no changes to the default sources.list.

 do you need
 sudo apt-get dist-upgrade
 No, that is intended upgrade to a new distro - gutsy to hardy for example.

 Steve
 --
 Steve Holdoway [EMAIL PROTECTED]


No its also useful where a new dependency is introduced (as in here
where there is a new dependency on openssh-blacklist).

see also here http://www.debian-administration.org/articles/69

And indeed I have lost connectivity and will fix it tonight. Never
mind if I cannot log in I suppose no-one else can either :-)

so in short the way to update openssh-* is to use dist-upgrade which
will install the new dependency.

This fubar seems to have rocked confidence in debian, but perhaps
thats another discussion.


Re: Tuesday night meeting...

2008-05-13 Thread Nick Rout
I think you can connect via sftp in a nautilus window. Which should
have the same effect.

On Wed, May 14, 2008 at 10:37 AM, Roy Britten [EMAIL PROTECTED] wrote:
 2008/5/14 Kerry [EMAIL PROTECTED]:
 I'd just like to thank last nights' speaker (was it Chris?) for his

 Indeed -- thanks Chris!

  It's making me seriously consider taking another look at KDE.

 I'm just really impressed by the capabilities of fish. Is there any
 way of getting that on a gnome desktop without installing konqueror,
 or is one part-and-parcel of the other?



Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Steve Holdoway
On Wed, 14 May 2008 11:08:48 +1200
Nick Rout [EMAIL PROTECTED] wrote:

 On Wed, May 14, 2008 at 10:57 AM, Steve Holdoway [EMAIL PROTECTED] wrote:
  On Wed, 14 May 2008 10:12:19 +1200
  Roy Britten [EMAIL PROTECTED] wrote:
 
  2008/5/14 Nick Rout [EMAIL PROTECTED]:
Anyway I am trying to update a system remotely (over ssh of course, how 
   ironic).
  
The openssh-client and -server updates don't seem to get applied:
  
[EMAIL PROTECTED]:~$ sudo apt-get upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages have been kept back:
 openssh-client openssh-server
0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
  
  
Any idea why not? aptitude does much the same. This is on hardy, with
no changes to the default sources.list.
 
  do you need
  sudo apt-get dist-upgrade
  No, that is intended upgrade to a new distro - gutsy to hardy for example.
 
  Steve
  --
  Steve Holdoway [EMAIL PROTECTED]
 
 
 No its also useful where a new dependency is introduced (as in here
 where there is a new dependency on openssh-blacklist).
 
 see also here http://www.debian-administration.org/articles/69
 
 And indeed I have lost connectivity and will fix it tonight. Never
 mind if I cannot log in I suppose no-one else can either :-)
 
 so in short the way to update openssh-* is to use dist-upgrade which
 will install the new dependency.
 
Interesting. I just did exactly as I suggested, whilst ssh'd back in to my pc 
from my server - so ssh out then back in - and had no connectivity problems at 
all. I do just use password authentication here though.
 This fubar seems to have rocked confidence in debian, but perhaps
 thats another discussion.

Also explains why I'm getting so many brute force breakin attempts on my 
servers... picked a good time to be out of the office again!


Steve
-- 
Steve Holdoway [EMAIL PROTECTED]


Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Nick Rout
On Wed, May 14, 2008 at 11:57 AM, Steve Holdoway [EMAIL PROTECTED] wrote:

 so in short the way to update openssh-* is to use dist-upgrade which
 will install the new dependency.

 Interesting. I just did exactly as I suggested, whilst ssh'd back in to my pc 
 from my server - so ssh out then back in - and had no connectivity problems 
 at all. I do just use password authentication here though.

I think mine might have been a problem with a loss of network
connectivity, our internet at the office has been diabolical today.


Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Steve Holdoway
On Wed, 14 May 2008 12:10:40 +1200
Nick Rout [EMAIL PROTECTED] wrote:

 On Wed, May 14, 2008 at 11:57 AM, Steve Holdoway [EMAIL PROTECTED] wrote:
 
  so in short the way to update openssh-* is to use dist-upgrade which
  will install the new dependency.
 
  Interesting. I just did exactly as I suggested, whilst ssh'd back in to my 
  pc from my server - so ssh out then back in - and had no connectivity 
  problems at all. I do just use password authentication here though.
 
 I think mine might have been a problem with a loss of network
 connectivity, our internet at the office has been diabolical today.

There've been a lot of complaints about packet loss in Orcons routers as well 
as the stuff I mentioned over the weekend.

-- 
Steve Holdoway [EMAIL PROTECTED]


Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Brett Davidson

Steve Holdoway wrote:

On Wed, 14 May 2008 11:08:48 +1200
Nick Rout [EMAIL PROTECTED] wrote:

  

On Wed, May 14, 2008 at 10:57 AM, Steve Holdoway [EMAIL PROTECTED] wrote:


On Wed, 14 May 2008 10:12:19 +1200
Roy Britten [EMAIL PROTECTED] wrote:

  

2008/5/14 Nick Rout [EMAIL PROTECTED]:


 Anyway I am trying to update a system remotely (over ssh of course, how 
ironic).

 The openssh-client and -server updates don't seem to get applied:

 [EMAIL PROTECTED]:~$ sudo apt-get upgrade
 Reading package lists... Done
 Building dependency tree
 Reading state information... Done
 The following packages have been kept back:
  openssh-client openssh-server
 0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.


 Any idea why not? aptitude does much the same. This is on hardy, with
 no changes to the default sources.list.
  

do you need
sudo apt-get dist-upgrade


No, that is intended upgrade to a new distro - gutsy to hardy for example.

Steve
--
Steve Holdoway [EMAIL PROTECTED]

  

No its also useful where a new dependency is introduced (as in here
where there is a new dependency on openssh-blacklist).

see also here http://www.debian-administration.org/articles/69

And indeed I have lost connectivity and will fix it tonight. Never
mind if I cannot log in I suppose no-one else can either :-)

so in short the way to update openssh-* is to use dist-upgrade which
will install the new dependency.



Interesting. I just did exactly as I suggested, whilst ssh'd back in to my pc 
from my server - so ssh out then back in - and had no connectivity problems at 
all. I do just use password authentication here though.
  

This fubar seems to have rocked confidence in debian, but perhaps
thats another discussion.



Also explains why I'm getting so many brute force breakin attempts on my 
servers... picked a good time to be out of the office again!


Steve
  


Note doing an apt-get upgrade alone won't fix this - you need to regenerate all your SSH keys 
(user  host)  SSL certificates that have been created using this library as well. Be a 
little careful of just hitting apt-get dist-upgrade or you may be locked out of your 
boxes (openssh-blacklist gets installed and will block insecure keys).

begin:vcard
fn:Brett Davidson
n:Davidson;Brett
org:Net24 Limited;Network Operations
adr:;;404 Barbadoes Street;Christchurch;;8041;New Zealand
email;internet:[EMAIL PROTECTED]
title:Systems Engineer
tel;work:+64 3 962 9518
tel;cell:+64 21 868 137
note:CCNA, RHCE, MCSE, SCSA
x-mozilla-html:TRUE
url:www.net24.co.nz
version:2.1
end:vcard



Re: Updating ubuntu for openssl/openssh vulnerabilities

2008-05-13 Thread Nick Rout
On Wed, May 14, 2008 at 2:56 PM, Brett Davidson [EMAIL PROTECTED] wrote:
 Steve Holdoway wrote:

 On Wed, 14 May 2008 11:08:48 +1200
 Nick Rout [EMAIL PROTECTED] wrote:



 On Wed, May 14, 2008 at 10:57 AM, Steve Holdoway [EMAIL PROTECTED]
 wrote:


 On Wed, 14 May 2008 10:12:19 +1200
 Roy Britten [EMAIL PROTECTED] wrote:



 2008/5/14 Nick Rout [EMAIL PROTECTED]:


  Anyway I am trying to update a system remotely (over ssh of course,
 how ironic).

  The openssh-client and -server updates don't seem to get applied:

  [EMAIL PROTECTED]:~$ sudo apt-get upgrade
  Reading package lists... Done
  Building dependency tree
  Reading state information... Done
  The following packages have been kept back:
  openssh-client openssh-server
  0 upgraded, 0 newly installed, 0 to remove and 2 not upgraded.


  Any idea why not? aptitude does much the same. This is on hardy, with
  no changes to the default sources.list.


 do you need
 sudo apt-get dist-upgrade


 No, that is intended upgrade to a new distro - gutsy to hardy for
 example.

 Steve
 --
 Steve Holdoway [EMAIL PROTECTED]



 No its also useful where a new dependency is introduced (as in here
 where there is a new dependency on openssh-blacklist).

 see also here http://www.debian-administration.org/articles/69

 And indeed I have lost connectivity and will fix it tonight. Never
 mind if I cannot log in I suppose no-one else can either :-)

 so in short the way to update openssh-* is to use dist-upgrade which
 will install the new dependency.



 Interesting. I just did exactly as I suggested, whilst ssh'd back in to my
 pc from my server - so ssh out then back in - and had no connectivity
 problems at all. I do just use password authentication here though.


 This fubar seems to have rocked confidence in debian, but perhaps
 thats another discussion.


 Also explains why I'm getting so many brute force breakin attempts on my
 servers... picked a good time to be out of the office again!


 Steve


 Note doing an apt-get upgrade alone won't fix this - you need to regenerate
 all your SSH keys (user  host)  SSL certificates that have been created
 using this library as well. Be a little careful of just hitting apt-get
 dist-upgrade or you may be locked out of your boxes (openssh-blacklist gets
 installed and will block insecure keys).


True, but I did point to the security advisory which goes through the steps.

host ssh keys *will* be updated but user keys will not.

Not all user keys need re-generating, use ssh-vulnkey to check your keys.

Its all in the advisory.


Totem, Mplayer crash on X error insufficient resources

2008-05-13 Thread Douglas Royds
Totem-xine and Mplayer both play videos fine up to 640x480, but won't 
play DVD or DV, being higher resolution:


Totem:

   The program 'totem' received an X Window System error.
   This probably reflects a bug in the program.
   The error was 'BadAlloc (insufficient resources for operation)'.
 (Details: serial 159 error_code 11 request_code 142 minor_code 19)
 (Note to programmers: normally, X errors are reported asynchronously;
  that is, you will receive the error a while after causing it.
  To debug your program, run it with the --sync command line
  option to change this behavior. You can then get a meaningful
  backtrace from your debugger if you break on the gdk_x_error()
   function.)
   Segmentation fault

Mplayer:

   [snip]
   Starting playback...
   VDec: vo config request - 720 x 576 (preferred colorspace: Planar YV12)
   VDec: using Planar YV12 as output csp (no 0)
   Movie-Aspect is 1.36:1 - prescaling to correct movie aspect.
   VO: [xv] 720x576 = 786x576 Planar YV12
   X11 error: BadAlloc (insufficient resources for operation)?,?% 0 0
   X11 error: BadAlloc (insufficient resources for operation)
   X11 error: BadAlloc (insufficient resources for operation)?,?% 1 0
   X11 error: BadAlloc (insufficient resources for operation)?,?% 2 0
   X11 error: BadAlloc (insufficient resources for operation)?,?% 4 0
   X11 error: BadAlloc (insufficient resources for operation)?,?% 6 0
   X11 error: BadAlloc (insufficient resources for operation)
   X11 error: BadAlloc (insufficient resources for operation)

There have been a number of bugs reported on launchpad:

   * https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/183969
 o The version of xserver-xorg-core that they recommend was the
   one in Gutsy - which didn't work for me
   * https://bugs.launchpad.net/ubuntu/+source/totem/+bug/35229
 o Fixed in Dapper
   * 
https://bugs.launchpad.net/ubuntu/+source/xserver-xorg-video-intel/+bug/124610
 o SiS graphics chip, not Intel

It worked fine in Dapper and Feisty, but broke when I upgraded to Gutsy. 
Hardy hasn't fixed it.


Some people have recommended the following:

   http://ubuntuforums.org/archive/index.php/t-194746.html

   I added these lines to Section Device in xorg.conf:

   Option VideoRam 65536
   Option CacheLines 1980

I've tried this to no avail, but I have little confidence that I got the 
lines in the right place. They are commented out in the attached xorg.conf.


Suggestions?

Thanks,
Douglas.



===
This email, including any attachments, is only for the intended
addressee.  It is subject to copyright, is confidential and may be
the subject of legal or other privilege, none of which is waived or
lost by reason of this transmission.
If the receiver is not the intended addressee, please accept our
apologies, notify us by return, delete all copies and perform no
other act on the email.
Unfortunately, we cannot warrant that the email has not been
altered or corrupted during transmission.
===

# xorg.conf (xorg X Window System server configuration file)
#
# This file was generated by failsafeDexconf, using
# values from the debconf database and some overrides to use vesa mode.
#
# You should use dexconf or another such tool for creating a real xorg.conf
# For example:
#   sudo dpkg-reconfigure -phigh xserver-xorg
Section Files
EndSection

Section Module
Loadglx
LoadGLcore
Loaddri
Loadv4l
EndSection

Section InputDevice
Identifier  Generic Keyboard
Driver  kbd
Option  CoreKeyboard
Option  XkbRules  xorg
Option  XkbModel  pc105
Option  XkbLayout us
EndSection

Section InputDevice
Identifier  Configured Mouse
Driver  mouse
Option  CorePointer
Option  Device/dev/input/mice
Option  Protocol  ImPS/2
Option  ZAxisMapping  4 5
Option  Emulate3Buttons   true
EndSection

Section Device
Identifier  Failsafe Device
Boardname   Matrox Millennium G550 DualHead
Busid   PCI:1:0:0
Driver  mga
Screen  0
Vendorname  Matrox
EndSection

Section Monitor
Identifier  Failsafe Monitor
Vendorname  ViewSonic
Modelname   ViewSonic PT795
Horizsync   30-110
Vertrefresh 50-180
  modeline  [EMAIL PROTECTED] 25.2 640 656 752 800 480 490 492 525 -vsync 
-hsync
  modeline  [EMAIL PROTECTED] 31.5 640 664 704 832 480 489 491 520 -vsync 
-hsync
  modeline  [EMAIL PROTECTED] 31.5 640 656 720 840 480 481 484 500 -vsync 
-hsync
  modeline  [EMAIL PROTECTED] 36.0 640 696 752 832 480 481 484 509 

Re: Totem, Mplayer crash on X error insufficient resources

2008-05-13 Thread Douglas Royds

Sent the wrong xorg.conf.



===
This email, including any attachments, is only for the intended
addressee.  It is subject to copyright, is confidential and may be
the subject of legal or other privilege, none of which is waived or
lost by reason of this transmission.
If the receiver is not the intended addressee, please accept our
apologies, notify us by return, delete all copies and perform no
other act on the email.
Unfortunately, we cannot warrant that the email has not been
altered or corrupted during transmission.
===

# /etc/X11/xorg.conf (xorg X Window System server configuration file)
#
# This file was generated by dexconf, the Debian X Configuration tool, using
# values from the debconf database.
#
# Edit this file with caution, and see the xorg.conf(5) manual page.
# (Type man xorg.conf at the shell prompt.)
#
# This file is automatically updated on xserver-xorg package upgrades *only*
# if it has not been modified since the last upgrade of the xserver-xorg
# package.
#
# If you have edited this file but would like it to be automatically updated
# again, run the following command:
#   sudo dpkg-reconfigure -phigh xserver-xorg

Section Files
FontPath/usr/share/fonts/X11/misc
FontPath/usr/share/fonts/X11/cyrillic
FontPath/usr/share/fonts/X11/100dpi/:unscaled
FontPath/usr/share/fonts/X11/75dpi/:unscaled
FontPath/usr/share/fonts/X11/Type1
FontPath/usr/share/fonts/X11/100dpi
FontPath/usr/share/fonts/X11/75dpi
# path to defoma fonts
FontPath/var/lib/defoma/x-ttcidfont-conf.d/dirs/TrueType
EndSection

Section Module
Loadi2c
Loadbitmap
Loadddc
Loaddri
Loadextmod
Loadfreetype
Loadglx
Loadint10
Loadvbe
EndSection

Section InputDevice
Identifier  Generic Keyboard
Driver  kbd
Option  CoreKeyboard
Option  XkbRules  xorg
Option  XkbModel  pc105
Option  XkbLayout us
EndSection

Section InputDevice
Identifier  Configured Mouse
Driver  mouse
Option  CorePointer
Option  Device/dev/input/mice
Option  Protocol  ImPS/2
Option  ZAxisMapping  4 5
Option  Emulate3Buttons   true
EndSection

Section InputDevice
Driver  wacom
Identifier  stylus
Option  Device/dev/input/wacom
Option  Type  stylus
Option  ForceDevice   ISDV4 # Tablet PC ONLY
EndSection

Section InputDevice
Driver  wacom
Identifier  eraser
Option  Device/dev/input/wacom
Option  Type  eraser
Option  ForceDevice   ISDV4 # Tablet PC ONLY
EndSection

Section InputDevice
Driver  wacom
Identifier  cursor
Option  Device/dev/input/wacom
Option  Type  cursor
Option  ForceDevice   ISDV4 # Tablet PC ONLY
EndSection

Section Device
Identifier  Silicon Integrated Systems [SiS] 630/730 PCI/AGP VGA 
Display Adapter
Driver  sis
BusID   PCI:1:0:0
# Option   VideoRam 65536
# Option   CacheLines 1980
EndSection

Section Monitor
Identifier  Generic Monitor
Option  DPMS
HorizSync   28-51
VertRefresh 43-60
EndSection

Section Screen
Identifier  Default Screen
Device  Silicon Integrated Systems [SiS] 630/730 PCI/AGP VGA 
Display Adapter
Monitor Generic Monitor
DefaultDepth24
SubSection Display
Depth   1
Modes   1024x768
EndSubSection
SubSection Display
Depth   4
Modes   1024x768
EndSubSection
SubSection Display
Depth   8
Modes   1024x768
EndSubSection
SubSection Display
Depth   15
Modes   1024x768
EndSubSection
SubSection Display
Depth   16
Modes   1024x768
EndSubSection
SubSection Display
Depth   24
Modes   1024x768
EndSubSection
EndSection

Section ServerLayout
Identifier  Default Layout
Screen  Default Screen
InputDevice Generic Keyboard
InputDevice Configured Mouse
InputDevice