Le lundi 20 août 2007 à 18:00 +0200, Tim Boykett a écrit :
Hi Olivier,
I seem to be having the problem again that some
paranoid program is snipping off the dv.sh script because
it might contain a virus!
Did you mean the following script:
mkdir -p /dev/ieee1394/dv/host0/PAL
mknod -m 666 /dev/ieee1394/dv/host0/PAL/in c 171 34
mknod -m 666 /dev/ieee1394/dv/host0/PAL/out c 171 35
exactly
I copied this from the article that you linked below. If it is
this, then Hurrah! it works.
Do you have any idea why it is necessary to create these nodes, while
Kino seems to find the devices without any trouble? It would
be nice if this just worked out of the box on linux.
not really, i cant read in the guts of *nix
Cheers,
tim
Glad it worked!
I shoud have shared it at the time I ran into this article
++
O.
On 16/08/2007, at 10:12 AM, Olivier Heinry wrote:
WARNING: This e-mail has been altered by MIMEDefang. Following this
paragraph are indications of the actual changes made. For more
information about your site's MIMEDefang policy, contact
JKU Network Administration [EMAIL PROTECTED]. For more information
about MIMEDefang, see:
http://www.zid.jku.at/virusinfo/mimedefang.html
An attachment named dv.sh was removed from this document as it
constituted a security hazard. If you require this document,
please contact
the sender and arrange an alternate means of receiving it.
As far as i remeber, it was due to some nodes lacking, whichj are
erased by udev and need to be rebuilt by the follwing bash script.
I'll try drop by at the other computer's station and have a look at
the original patch.
good luck
O.
signature.asc
___
PD-list@iem.at mailing list
UNSUBSCRIBE and account-management -
http://lists.puredata.info/listinfo/pd-list