On Wed, 18 Jun 2014 21:31:29 -0700 (PDT)
Curt, WE7U curt.w...@gmail.com wrote:
On Wed, 18 Jun 2014, Jason KG4WSV wrote:
On Wed, Jun 18, 2014 at 2:00 PM, Curt, WE7U curt.w...@gmail.com
wrote:
Xastir does this, but would you want to trust security of your
system to a bunch of hobbyists?
On 06/23/2014 06:36 AM, Liz wrote:
On Wed, 18 Jun 2014 21:31:29 -0700 (PDT)
Curt, WE7U curt.w...@gmail.com wrote:
On Wed, 18 Jun 2014, Jason KG4WSV wrote:
On Wed, Jun 18, 2014 at 2:00 PM, Curt, WE7U curt.w...@gmail.com
wrote:
Xastir does this, but would you want to trust security of your
On Mon, 23 Jun 2014 10:53:26 -0400
David A Aitcheson david.aitche...@gmail.com wrote:
It depends how one sets the options in the config files; you can set
certain programs to automatically be sudo'd without additional
entering of a password. Me I just let them run and make me a semi-root
On Tue, 24 Jun 2014, Liz wrote:
On Mon, 23 Jun 2014 10:53:26 -0400
David A Aitcheson david.aitche...@gmail.com wrote:
It depends how one sets the options in the config files; you can set
certain programs to automatically be sudo'd without additional
entering of a password. Me I just let them
On Mon, Jun 23, 2014 at 6:36 AM, Liz ed...@billiau.net wrote:
On Wed, 18 Jun 2014 21:31:29 -0700 (PDT)
Curt, WE7U curt.w...@gmail.com wrote:
On Wed, 18 Jun 2014, Jason KG4WSV wrote:
On Wed, Jun 18, 2014 at 2:00 PM, Curt, WE7U curt.w...@gmail.com
wrote:
Xastir does this, but would
On Jun 17, 2014, at 7:41 PM, David A Aitcheson david.aitche...@gmail.com
wrote:
chmod 4755 /usr/local/bin/xastir
This is not a good idea - from a security standpoint it's very bad, and unless
xastir is designed to drop/escalate the euid as needed you will end up with
files in the users
On 06/18/2014 07:41 AM, Jason KG4WSV wrote:
On Jun 17, 2014, at 7:41 PM, David A Aitcheson david.aitche...@gmail.com
wrote:
chmod 4755 /usr/local/bin/xastir
This is not a good idea - from a security standpoint it's very bad, and
unless xastir is designed to drop/escalate the euid as
On Wed, 18 Jun 2014, Jason KG4WSV wrote:
chmod 4755 /usr/local/bin/xastir
This is not a good idea - from a security standpoint it's very bad, and unless
xastir is designed to drop/escalate the euid as needed you will end up with
files in the users directory that are owned by root, leading
On Wed, Jun 18, 2014 at 2:00 PM, Curt, WE7U curt.w...@gmail.com wrote:
Xastir does this, but would you want to trust security of your system to a
bunch of hobbyists? ;-)
'cause that's not something linux users are familiar with. :|
We do what we can, but I wouldn't say Xastir has been
Hi All..A couple of days ago i used ./update-xastir on my Linux Mint 17
box update was ok but i found i couldnt access my AX25 tncport
socket: Operation not permitted message came up in terminal that i
started
it in..went round and round trying to find the answer..not too much
Curt/Tom,
This occurrence leads me to wonder if we should consider adding chmod
4755 /usr/local/bin/xastir as the last line (or near to the last line)
to the script ./update-xastir for the next release?
73
Dave
KB3EFS
On 06/17/2014 05:58 PM, David wrote:
Hi All..A couple of days ago i
Actually that line is in the file just commented out and replaced with
chmod 755 /usr/local/bin/xastir
Thus for Dave VK4BDJ's benefit a simple edit of the update-xastir script
would fix the problem as long as update-xastir does not get changed with
each update.
Which would be the equal of a dog
Hi David..i t is a problem that ears its head if you use a AX25 Tnc port
but it could impact other things at times
i will do some testing of the update-xastir script with the line added
an see if it works with each update
thanks for the info David
73 David VK4BDJ
On 18/06/14 12:45,
13 matches
Mail list logo