-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 05/18/2015 03:30 PM, Paul van der Vlis wrote:
Hello,
When using a Cinnamon desktop in Debian 8, I don't get warnings
when there are security updates. Is there a way to add this?
With regards, Paul van der Vlis.
While I don't know about
Op 18-05-15 om 23:11 schreef Ralph Katz:
On 05/18/2015 03:30 PM, Paul van der Vlis wrote:
Hello,
When using a Cinnamon desktop in Debian 8, I don't get warnings
when there are security updates. Is there a way to add this?
With regards, Paul van der Vlis.
While I don't know about
Chris Bannister cbannis...@slingshot.co.nz writes:
On Wed, May 06, 2015 at 02:27:06PM +1000, Alexis wrote:
Christian Seiler christ...@iwakd.de writes:
Ok, since there appears to be some kind of confusion, I'll
explain.
[snip comprehensive explanatory/summary of what the various
official
On Wed, May 06, 2015 at 02:27:06PM +1000, Alexis wrote:
Christian Seiler christ...@iwakd.de writes:
Ok, since there appears to be some kind of confusion, I'll explain.
[snip comprehensive explanatory/summary of what the various official Debian
repos are used for]
Thank you very much
Christian Seiler christ...@iwakd.de writes:
Ok, since there appears to be some kind of confusion, I'll
explain.
[snip comprehensive explanatory/summary of what the various
official Debian repos are used for]
Thank you very much for all this - it's greatly appreciated! i'd
like to suggest
Hello,
recently I've encountered this problem when doing a server-installation
with FAI from CD. There seems to be some security updates that break the
dependencies I rely on.
As of now I've disabled the security repository on the install-CD and
enable it when the server is rebooted and do
Am 2015-05-04 09:48, schrieb Mathias Friman:
recently Ive encountered this problem when doing a
server-installation
with FAI from CD. There seems to be some security updates that break
the dependencies I rely on.
As of now Ive disabled the security repository on the install-CD and
enable
with
the security updates, but perhaps I've just missed something.
Probably: 'stable' now refers to jessie, not wheezy. So try
changing the line:
deb http://security.debian.org/ stable/updates main
to:
deb http://security.debian.org/ wheezy/updates main
And my guess is that you should also
Am 2015-05-04 12:11, schrieb Alexis:
And my guess is that you should also remove the line:
deb http://http.debian.net/debian/ wheezy-updates main
Why that? wheezy-updates still exists and if it was in there before,
it was probably wanted explicitly.
See:
https://wiki.debian.org/StableUpdates
Christian Seiler christ...@iwakd.de writes:
Am 2015-05-04 12:11, schrieb Alexis:
And my guess is that you should also remove the line:
deb http://http.debian.net/debian/ wheezy-updates main
Why that? wheezy-updates still exists and if it was in there
before, it was probably wanted
On Monday 04 May 2015 11:30:06 Alexis wrote:
Further, afaik, the wheezy-updates line should refer to the same
set of packages as the wheezy/updates line from
security.debian.org. If that's so, then having two different lines
refer to the same package set is merely confusing the config
Am 2015-05-04 12:30, schrieb Alexis:
Further, afaik, the wheezy-updates line should refer to the same set
of packages as the wheezy/updates line from security.debian.org. If
that's so, then having two different lines refer to the same package
set is merely confusing the config further. If not,
2015-05-04 13:03 GMT+02:00 Christian Seiler christ...@iwakd.de:
Am 2015-05-04 12:30, schrieb Alexis:
Further, afaik, the wheezy-updates line should refer to the same set
of packages as the wheezy/updates line from security.debian.org. If
that's so, then having two different lines refer to
scanners, it
seemed
plausible to me that it was indeed the same repo. If, as you
assert, it's not, then i think it's concerning that there are
/two/ distinct repos one needs to enable in order to get all
relevant security updates.
* The page doesn't explain if 'wheezy-updates
Lisi Reisz lisi.re...@gmail.com writes:
One is security, as it says. The other is what used to be
called volatile and is needed if you have e.g. a virus scanner
of any kind.
Sorry, but as i alluded to in my last email to Christian, this
doesn't make sense to me. Shouldn't people
relevant security
updates.
* The page doesn't explain if 'wheezy-updates' is distinct from
'wheezy-backports', and if so, again, why there are two repos
apparently addressing the same issue. (To wit, how to get more
recent
versions of packages than were released with stable.)
* The phrase When
that:
* Since it mentions things like updates to virus scanners, it
seemed
plausible to me that it was indeed the same repo. If, as you
assert, it's not, then i think it's concerning that there are
/two/ distinct repos one needs to enable in order to get all
relevant security updates
- Original Message -
From: Andrei POPESCU
Sent: 05/17/14 05:06 PM
To: debian-user@lists.debian.org
Subject: Re: Security updates for hold package
You haven't yet stated why you need the backports kernel, but if you
want to keep using it install the backports meta-package.
I HAD
On Jo, 15 mai 14, 19:35:40, Theodore Alcapotaxis wrote:
- Original Message -
From: Andrei POPESCU
Sent: 05/15/14 04:50 AM
To: debian-user@lists.debian.org
Subject: Re: Security updates for hold package
Assumptions:
1. You did not change the default priority
- Original Message -
From: Andrei POPESCU
Sent: 05/15/14 04:50 AM
To: debian-user@lists.debian.org
Subject: Re: Security updates for hold package
Assumptions:
1. You did not change the default priority for backports
How does one change default priority for backports? What
Hi,
can anybody explain to me what exactly happens if I place a package on
hold? I have an application which unfortunately requires an older php
version.
If I now mark the package hold does this mean no major upgrade will be
performed for this package or do I prevent security updates as well
or do I prevent security updates as well,
with that action?
APT does not differentiate between major or security or whatever
upgrade, just about version numbers.
However, if you're on stable (or oldstable) there will be no major
upgrades (whether you want them or not) unless you point your
will be
performed for this package or do I prevent security updates as well,
with that action?
Cheers
Frank
No upgrades (changes) will be performed, but you can pin package to
e.g. version 1.0*. But if your package in repo gets upgraded to 1.1
then all security upgrades will be based on 1.1
the system from installing
security updates as long they are available for squeeze?
Cheers
Frank
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/537339f4.6080...@dead
Squeeze to Wheezy, keep the installed php
packages as they are but don't prevent the system from installing
security updates as long they are available for squeeze?
Cheers
Frank
Pin php packages to a=oldstable, 500 Pin-Priority 990. But to
receive security support for squeeze past
On 05/14/2014 11:53 AM, Marko Randjelovic wrote:
Pin php packages to a=oldstable, 500 Pin-Priority 990. But to
receive security support for squeeze past this month, you have to
include squeeze-lts repo.
Excellent, thanks!
Cheers
Frank
--
To UNSUBSCRIBE, email to
On 2014-05-14, Marko Randjelovic marko...@eunet.rs wrote:
Pin php packages to a=oldstable, 500 Pin-Priority 990. But to
receive security support for squeeze past this month, you have to
include squeeze-lts repo.
There is a specific squeeze-lts repository? If so, what should be put in
On Wed, 14 May 2014 14:16:37 + (UTC)
Curt cu...@free.fr wrote:
On 2014-05-14, Marko Randjelovic marko...@eunet.rs wrote:
Pin php packages to a=oldstable, 500 Pin-Priority 990. But to
receive security support for squeeze past this month, you have to
include squeeze-lts repo.
On 2014-05-14, Marko Randjelovic marko...@eunet.rs wrote:
There is a specific squeeze-lts repository? If so, what should be put in
/etc/apt/sources.list to benefit from the long term support?
https://wiki.debian.org/LTS/Development
Thank you; I did search* but, contrary to the biblical
What happens if I am using Debian current stable but my linux-image is 3.12
(wheezy-backports)?
- Original Message -
From: Andrei POPESCU
Sent: 05/14/14 05:35 PM
To: debian-user@lists.debian.org
Subject: Re: Security updates for hold package
However, if you're on stable
On Mi, 14 mai 14, 15:59:08, Theodore Alcapotaxis wrote:
I wrote:
However, if you're on stable (or oldstable) there will be no major
upgrades (whether you want them or not) unless you point your sources to
the next release.
What happens if I am using Debian current stable but my
Carl Johnson ca...@peak.org writes:
Carl Johnson ca...@peak.org writes:
On Thu 24 Apr 2014 at 14:58:52 -0700, Carl Johnson wrote:
I was just noticing that aptitude warns that a number of packages are
listed as untrusted. I checked using 'apt-cache policy' and those
I just now told
On Du, 27 apr 14, 08:48:26, Carl Johnson wrote:
Andrei POPESCU andreimpope...@gmail.com writes:
On Sb, 26 apr 14, 10:02:39, Carl Johnson wrote:
I was just checking again and the problem had returned. This time, I
immediately told aptitude to do an update and the untrusted warnings
On Sb, 26 apr 14, 10:02:39, Carl Johnson wrote:
I was just checking again and the problem had returned. This time, I
immediately told aptitude to do an update and the untrusted warnings
went away again. I suspect they will come back in another day or two,
but they don't after just exiting
Andrei POPESCU andreimpope...@gmail.com writes:
On Sb, 26 apr 14, 10:02:39, Carl Johnson wrote:
I was just checking again and the problem had returned. This time, I
immediately told aptitude to do an update and the untrusted warnings
went away again. I suspect they will come back in
On Jo, 24 apr 14, 15:58:20, Carl Johnson wrote:
I just now told aptitude to do an update, and it appears that all of
those have disappeared now! Maybe I had gotten a bad update the last
time I had updated.
That's a likely explanation.
Sorry for the false alarm and thanks for the reply.
Carl Johnson ca...@peak.org writes:
Brian a...@cityscape.co.uk writes:
On Thu 24 Apr 2014 at 14:58:52 -0700, Carl Johnson wrote:
I was just noticing that aptitude warns that a number of packages are
listed as untrusted. I checked using 'apt-cache policy' and those
I just now told
I was just noticing that aptitude warns that a number of packages are
listed as untrusted. I checked using 'apt-cache policy' and those
appear to be security updates and are from security.debian.org. I
already have the debian-archive-keyring, so I would have expected that
would cover security
On Thu 24 Apr 2014 at 14:58:52 -0700, Carl Johnson wrote:
I was just noticing that aptitude warns that a number of packages are
listed as untrusted. I checked using 'apt-cache policy' and those
May we see the output that aptitude displays to you?
--
To UNSUBSCRIBE, email to
Brian a...@cityscape.co.uk writes:
On Thu 24 Apr 2014 at 14:58:52 -0700, Carl Johnson wrote:
I was just noticing that aptitude warns that a number of packages are
listed as untrusted. I checked using 'apt-cache policy' and those
May we see the output that aptitude displays to you?
Sorry,
Putting on list as I ought to have done in the first place. Sorry Moritz.
On Monday 22 July 2013 22:36:11 Moritz Mühlenhoff wrote:
On Mon, Jul 22, 2013 at 10:19:00PM +0100, Lisi Reisz wrote:
On Sunday 21 July 2013 14:21:20 Moritz Mühlenhoff wrote:
Moritz Muehlenhoff j...@debian.org
Moritz Muehlenhoff j...@debian.org schrieb:
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk are generally ready, but I don't use
Java myself. As such I need some additional real world testing
- Original Message -
From: Moritz Muehlenhoff j...@debian.org
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk are generally ready, but I don't use
Java myself. As such I need some
- Original Message -
From: Rob Owens row...@ptd.net
- Original Message -
From: Moritz Muehlenhoff j...@debian.org
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk
On Sunday 21 July 2013 14:21:20 Moritz Mühlenhoff wrote:
Moritz Muehlenhoff j...@debian.org schrieb:
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk are generally ready, but I don't use
On Mon, Jul 22, 2013 at 10:19:00PM +0100, Lisi Reisz wrote:
On Sunday 21 July 2013 14:21:20 Moritz Mühlenhoff wrote:
Moritz Muehlenhoff j...@debian.org schrieb:
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
- Original Message -
From: Moritz Muehlenhoff j...@debian.org
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk are generally ready, but I don't use
Java myself. As such I need some
On Thu, Jul 18, 2013 at 03:27:27PM -0400, Rob Owens wrote:
- Original Message -
From: Moritz Muehlenhoff j...@debian.org
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk are
Jens Schüßler j...@trash.net schrieb:
* Moritz Muehlenhoff j...@debian.org wrote:
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk are generally ready, but I don't use
Java myself. As such I
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk are generally ready, but I don't use
Java myself. As such I need some additional real world testing
before I'll release them through
* Moritz Muehlenhoff j...@debian.org wrote:
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk are generally ready, but I don't use
Java myself. As such I need some additional real world
On 07/16/2013 07:42 PM, Jens Schüßler wrote:
* Moritz Muehlenhoff j...@debian.org wrote:
As discussed on debian-release some time ago security support
for openjdk will be following upstream releases in the future.
The packages for openjdk are generally ready, but I don't use
Java myself. As
On Wed, 20 Jun 2012 16:23:35 -0800, peasthope wrote:
* From: Camale#xF3;n noela...@gmail.com * Date: Wed, 30 May
2012
14:51:49 + (UTC)
What do you mean? Ensure that you're always running the latest
Iceweasel (or Firefox) version available and that's all.
Well couldn't an
* From: Camale#xF3;n noela...@gmail.com
* Date: Wed, 30 May 2012 14:51:49 + (UTC)
What do you mean? Ensure that you're always running the latest Iceweasel
(or Firefox) version available and that's all.
Well couldn't an Iceweasel backport be handled as a security
update?
Hi all,
After reading the security support on testing[1], I was thinking if I
would use wheezy at the moment on my sources.list instead of testing,
then I would all have the updates from testing plus the security
ones?
Or should I just use 'deb http://security.debian.org testing/updates
main
On 2012-01-29 11:51 +0100, Colin wrote:
After reading the security support on testing[1], I was thinking if I
would use wheezy at the moment on my sources.list instead of testing,
then I would all have the updates from testing plus the security
ones?
No. Also, wheezy and testing are
for a long time? If the latter,
use wheezy instead of testing.
Sven
I see.
I want to stay with testing in the long term but would prefer not to
await for security updates.
Right now security updates are treated as a normal update, that is a
normal package transition from unstable to testing
forever, or do you want to have a
system that remains basically unchanged for a long time? If the latter,
use wheezy instead of testing.
Sven
I see.
I want to stay with testing in the long term but would prefer not to
await for security updates.
Right now security updates are treated
On Sun, Jan 29, 2012 at 3:07 PM, Christofer C. Bell
christofer.c.b...@gmail.com wrote:
To answer your other question, security updates for Testing move through
from Unstable like any other update except for being fast tracked:
Right.
Then I could check debian-testing-security-announce@ to check
On 20120129_122817, Sven Joachim wrote:
On 2012-01-29 11:51 +0100, Colin wrote:
After reading the security support on testing[1], I was thinking if I
would use wheezy at the moment on my sources.list instead of testing,
then I would all have the updates from testing plus the security
On 1/29/12, Paul E Condon pecon...@mesanetworks.net wrote:
OP wouldn't have asked the question unless he were somewhat worried
that each choice had consequences, which, for him, were unknown and
therefore unintended. Because he has asked the question, I think OP
is, like me, a person who wants
On Du, 29 ian 12, 15:17:06, Colin wrote:
Right.
Then I could check debian-testing-security-announce@ to check which
ones were fast tracked?
Although the last post on that list is from Feb 2011 acording to the
archives [1].
Debian Testing Security Advisories are used only when the update
On 29/01/12 21:51, Colin wrote:
Hi all,
After reading the security support on testing[1], I was thinking if I
would use wheezy at the moment on my sources.list instead of testing,
then I would all have the updates from testing plus the security
ones?
Or should I just use 'deb
T o n g wrote:
Bob Proulx wrote:
My box maintaining strategy is, the least maintenance possible the
better. E.g., I only want to upgrade the minimum set of packages. So of
all the packages that I need to upgrade, I only want to upgrade those
security updates. How can I do
On Jo, 29 dec 11, 13:41:46, Bob Proulx wrote:
I think the idea of Testing is incompatible with security upgrades
only. That is where Stable comes in.
Yep
There is the testing updates security archive:
deb http://security.debian.org/ squeeze/updates main contrib non-free
But I
T o n g wrote:
Is there any easy way to installing only the security updates?
Yes. Run Debian Stable which is currently Squeeze and only have
Squeeze archives in your /etc/apt/sources.list file.
Do not run Wheezy nor Sid because those change daily and will offer
much more than security
Hallo,
Ik heb nog een paar machines waarop Etch draait.
Nu zie ik daar opeens security-updates voorbij komen en dat vind ik
raar, want er zit toch geen security-support meer op Etch?
O.a. deze packages:
binutils gnupg gpgv libfam0 libkpathsea4
Weet hier iemand meer van?
Met vriendelijke groet
On 06/02/2010 02:09 PM, Paul van der Vlis wrote:
Ik heb nog een paar machines waarop Etch draait.
Nu zie ik daar opeens security-updates voorbij komen en dat vind ik
raar, want er zit toch geen security-support meer op Etch?
O.a. deze packages:
binutils gnupg gpgv libfam0 libkpathsea4
Weet
On Wed, Jun 02, 2010 at 03:05:44PM +0200, Paul van der Vlis wrote:
Jochem Berndsen schreef:
On 06/02/2010 02:09 PM, Paul van der Vlis wrote:
Ik heb nog een paar machines waarop Etch draait.
Nu zie ik daar opeens security-updates voorbij komen en dat vind ik
raar, want er zit toch geen
Is there any ftp mirror for debian security updates? When I looked at
http://www.debian.org/security/ it just lists an http mirror. However, on
this machine http is not allowed, but ftp is enabled. That is why I am
looking for an ftp repository.
Any ideas/comments/suggestions?
thanks
raju
On 2009-08-19 12:41 +0200, Kamaraju S Kusumanchi wrote:
Is there any ftp mirror for debian security updates? When I looked at
http://www.debian.org/security/ it just lists an http mirror. However, on
this machine http is not allowed, but ftp is enabled. That is why I am
looking for an ftp
Hi,
my system is Debian GNU/Linux Lenny with linux-image 2.6.26-2-486.
When I run:
$ sudo aptitude
and did update I get that there is three packages for sevurity updates
available.
When I hit 'g' to did security updates I get message:
--\ Packages being automatically held in their current
On Wed, Jul 29, 2009 at 11:49 +0200, Csanyi Pal wrote:
Hi,
my system is Debian GNU/Linux Lenny with linux-image 2.6.26-2-486.
When I run:
$ sudo aptitude
and did update I get that there is three packages for sevurity updates
available.
When I hit 'g' to did security updates I get
.
When I hit 'g' to did security updates I get message:
--\ Packages being automatically held in their current state (3)
i A libopenexr6 1.6.1-31.6.1-3+le
i A linux-image-2.6.26-2-4862.6.26-17 2.6.26
get that there is three packages for sevurity updates
available.
When I hit 'g' to did security updates I get message:
--\ Packages being automatically held in their current state (3)
i A libopenexr6
hit 'g' to did security updates I get message:
--\ Packages being automatically held in their current state (3)
i A libopenexr6 1.6.1-31.6.1-3+le
i A linux-image-2.6.26-2-4862.6.26-17 2.6.26-17l
i A linux-libc-dev 2.6.26-172.6.26-17l
These packages could
On Sat, Jul 25, 2009 at 1:36 PM, Ansgar Burchardtans...@43-1.org wrote:
The updates for sarge seem to be available from archive.debian.org as
well. You should try replacing the last line with
deb http://archive.debian.org/debian-security/ sarge main contrib non-free
the issue about security
...):
#
# Official Debian mirror
deb http://archive.debian.org/debian/ sarge main non-free contrib
deb-src http://archive.debian.org/debian/ sarge main non-free contrib
deb-src http://archive.debian.org/debian/ sarge main contrib non-free
# Security updates
deb
# Security updates
deb http://security.debian.org/ sarge/updates main contrib non-free
The updates for sarge seem to be available from archive.debian.org as
well. You should try replacing the last line with
deb http://archive.debian.org/debian-security/ sarge main contrib non-free
On Sat, Jul 25, 2009 at 13:30 +0200, roberto wrote:
hello
i am trying to update an old machine running sarge to etch and then to lenny;
a couple of questions
1. is it still possible ?
I did this successfully on a machine w/o GUI some weeks ago using
apt-get instead of aptitude (didn't read
Hi
When will Security updates to Sarge stop?
I have some servers running it well?
I wnat to upgrade to Etch but want to plan it accordingly.
Thanks
-Siju
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Siju George wrote the following on 24.03.2008 11:00
Hi
When will Security updates to Sarge stop?
I have some servers running it well?
I wnat to upgrade to Etch but want to plan it accordingly.
Thanks
-Siju
http://lists.debian.org/debian-announce/2008/msg1.html
--
bye Thilo
key
On Monday 24 March 2008 03:00:10 am Siju George wrote:
Hi
When will Security updates to Sarge stop?
See the Debian Releases page at http://www.debian.org/releases/
I have some servers running it well?
Was that a statement or a question? I personally have no idea if you have
servers, much
versions of the file and they won't open too. The only thing
that chanched were debian security updates.
I tried to purge gnucash and guile and install them again. It didn't
help. I don't know what to try next. Anyone experiencing similar problems?
Tomasz Szpakowicz
--
To UNSUBSCRIBE, email
security updates.
Do you use scheduled transactions? Try the following from an xterm
gnucash --nofile
then edit-preferences-scheduled transactions and uncheck the box to
run scheduled transactions at startup. Then try loading your file.
Also, you could subscribe to [EMAIL PROTECTED] for more
Thanks for your answer.
But no scheduled transactions.
I know I won't get much help with such an old version. That's why I
asked on debian-users if someone has similar problems. Security updates
where the only changes to this system. I thought if that was the reason
someone might have noticed
On Mon, Jan 07, 2008 at 12:34:24AM +0100, Tomasz Szpakowicz wrote:
Thanks for your answer.
But no scheduled transactions.
I know I won't get much help with such an old version. That's why I
asked on debian-users if someone has similar problems. Security updates
where the only changes
well but I noticed that during the installation
security.debian.org was accessed for updates. As I also have a local
mirror of that: How do I tell the installer to use a local mirror
for security updates?
Thanks in advance, Malte
I assume /etc/apt/sources.list is created during
of ftp.debian.de to the installer. All
went well but I noticed that during the installation
security.debian.org was accessed for updates. As I also have a local
mirror of that: How do I tell the installer to use a local mirror for
security updates?
Thanks in advance, Malte
You can do that doing
to the installer. All
went well but I noticed that during the installation
security.debian.org was accessed for updates. As I also have a local
mirror of that: How do I tell the installer to use a local mirror for
security updates?
Thanks in advance, Malte
You can do that doing preseeding
Malte Forkel wrote:
Bob schrieb:
8 snip etch installer slow as it grabs updates from nonlocal mirror
Just don't let it update at install time but wait until after first
boot when you can hand tune /etc/apt/sources.list alternatively you
could edit the hosts file of your firewall so it
noticed that during the installation
security.debian.org was accessed for updates. As I also have a local
mirror of that: How do I tell the installer to use a local mirror
for security updates?
Thanks in advance, Malte
I assume /etc/apt/sources.list is created during the installation
the installer to
use a local mirror for security updates?
Thanks in advance, Malte
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
the installation
security.debian.org was accessed for updates. As I also have a local
mirror of that: How do I tell the installer to use a local mirror for
security updates?
Thanks in advance, Malte
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL
the installation
security.debian.org was accessed for updates. As I also have a local
mirror of that: How do I tell the installer to use a local mirror for
security updates?
Thanks in advance, Malte
I assume /etc/apt/sources.list is created during the installation. It pointed
Sáb, 2007-08-04 às 22:34 -0300, jefferson alexandre escreveu:
On 8/4/07, Felipe Augusto van de Wiel (faw) [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 04-08-2007 13:18, Jose Paulo Matafome Oleiro wrote:
Sáb, 2007-08-04 às 16:43 +0100, Jose Paulo Matafome
Olá lista...:)
Venho pedir umas luzes para um problema que quero resolver.
Aqui em casa instalei o apt-mirror e estou a fazer mirror do repositório
ftp://ftp.uevora.pt/ apenas dos pacotes da arquitectura i386, e bem o
meu objectivo é reduzir o tempo e a necessidade de utilizar a largura de
banda
Esqueci-me de acrescentar que queria que as actualizações que depois
forem feitas do security debian sejam integradas e cada vez que torne a
executar o apt-mirror as actualizações não desapareçam
Atenciosamente José Oleiro
Sáb, 2007-08-04 às 16:43 +0100, Jose Paulo Matafome Oleiro escreveu:
Olá
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 04-08-2007 13:18, Jose Paulo Matafome Oleiro wrote:
Sáb, 2007-08-04 às 16:43 +0100, Jose Paulo Matafome Oleiro escreveu:
Olá lista...:)
Venho pedir umas luzes para um problema que quero resolver.
Aqui em casa instalei o apt-mirror e estou a
On 8/4/07, Felipe Augusto van de Wiel (faw) [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 04-08-2007 13:18, Jose Paulo Matafome Oleiro wrote:
Sáb, 2007-08-04 às 16:43 +0100, Jose Paulo Matafome Oleiro escreveu:
Olá lista...:)
Venho pedir umas luzes para um
201 - 300 of 583 matches
Mail list logo