Activity for Canina
Type | On... | Excerpt | Status | Date |
---|---|---|---|---|
Comment | Post #283816 |
@#53919 The `mpv` man page has several more options one can try; those are just the ones that happened to do the trick for me. Look at the "low latency playback" section. In particular, the man page notes that `--untimed` can break streams that have audio. (Which, aside from the fact that I'm not rea... (more) |
— | over 2 years ago |
Comment | Post #283816 |
I ended up having to add `--profile=low-latency --untimed` to avoid a few-seconds latency in playback due apparently to buffering, but this works nicely after I added my user account to the `video` group which owns the /dev/video\* device nodes. (more) |
— | over 2 years ago |
Edit | Post #283846 |
Post edited: Improved formatting |
— | over 2 years ago |
Suggested Edit | Post #283846 |
Suggested edit: Improved formatting (more) |
helpful | over 2 years ago |
Comment | Post #283804 |
@#36356 Right now I don't have any specific software in mind other than Microsoft Teams running inside a Windows VM which I'm stuck with for work. It may well turn out to be various web applications running inside a browser instance, for one thing. Also, I would rather have *one* solution which works... (more) |
— | over 2 years ago |
Edit | Post #283804 | Initial revision | — | over 2 years ago |
Question | — |
With a V4L2-compatible webcam, how to see its video feed for the purpose of adjusting aiming? I have ordered (but am still waiting for it to arrive) a USB-connected webcam that is supposed to be V4L2 compatible. Once it arrives, I'm obviously going to want to mount it such that it provides a reasonable picture with minimal ongoing adjustments. I imagine that the easiest way to do so is to ... (more) |
— | over 2 years ago |
Comment | Post #283682 |
@#53892 Reinstalling from scratch just because a certain amount of time has passed seems on the one hand quite heavy-handed, and on the other not quite enough (imagine if the system is compromised immediately after the reinstallation through a vulnerability which has been patched but for which you ha... (more) |
— | over 2 years ago |
Edit | Post #283682 |
Post edited: |
— | over 2 years ago |
Edit | Post #283678 |
Post edited: |
— | over 2 years ago |
Edit | Post #283682 | Initial revision | — | over 2 years ago |
Answer | — |
A: How to detect if a Linux Docker host has had unwelcome guests? You can't expect an attacker to abide by any particular rulebook. In fact, if they did, then the defenders' job would be so much easier. That's why attackers don't do it. Remember the adage: a defender has to defend against every possible attack everywhere, but an attacker only has to find one ... (more) |
— | over 2 years ago |
Suggested Edit | Post #283678 |
Suggested edit: (more) |
helpful | over 2 years ago |
Edit | Post #282723 |
Post edited: |
— | over 2 years ago |
Comment | Post #283368 |
This answer would be much more useful if, instead of just stating the package name needed for one particular printer, it were to describe how you arrived at the conclusion that this was the correct course of action. Not only does that allow other answers that propose better alternatives, it is also m... (more) |
— | over 2 years ago |
Edit | Post #282723 | Initial revision | — | almost 3 years ago |
Answer | — |
A: How to give password in shell script? > That's my bash script. Actually, no, it isn't. Assuming for a second that the shebang line is `#!/bin/sh` (not `#!bin/sh` as you have it in the question), it's a sh shell script, not a bash shell script. Assuming that your /bin/sh is actually bash (which it need not be; for example, Debian uses ... (more) |
— | almost 3 years ago |
Comment | Post #282646 |
I don't think this is on topic for Linux Systems Codidact, as there is nothing in it that is clearly specific to any kind of Unix; it's a question about LibreOffice, which runs on many platforms, not all of them Unix-like. It would probably be a better fit on Power Users. See https://linux.codidact.c... (more) |
— | almost 3 years ago |
Comment | Post #282547 |
@#54151 Try with `-p` also. (more) |
— | almost 3 years ago |
Comment | Post #282547 |
The MySQL `root` user has nothing to do with the system `root` user; the two user namespaces are separate. Also, best practice is to avoid running processes, especially complicated programs, as uid root if possible. Is there any particular reason why you suggest using `sudo` when invoking `mysql`? (more) |
— | almost 3 years ago |
Comment | Post #282549 |
Usually, such version tags are used where different versions may introduce incompatibilities. Is this change somehow guaranteed to work (even with just the two specific versions mentioned in the question), or does it have the potential to lead to weird follow-on errors or even differences in behavior... (more) |
— | almost 3 years ago |
Comment | Post #282494 |
@#54146 See my edit. As for what makes the explanation of the scenario not quite clear, I wouldn't be surprised if the specifics (for example, what type of hardware for each system) make it harder to see the relevant information (for example, what the role of each system is with relation to the other... (more) |
— | almost 3 years ago |
Edit | Post #282494 |
Post edited: |
— | almost 3 years ago |
Edit | Post #282494 |
Post edited: |
— | almost 3 years ago |
Edit | Post #282494 |
Post edited: |
— | almost 3 years ago |
Edit | Post #282494 |
Post edited: |
— | almost 3 years ago |
Edit | Post #282494 | Initial revision | — | almost 3 years ago |
Answer | — |
A: How to forward SSH access of one machine, through another, to the rest of a network? I'm having trouble visualizing exactly what your setup is like, but if I understand correctly, then: You have one client that you are connecting from You have one server that you are able to connect to You have some number of hosts which are only reachable through that server, to which you... (more) |
— | almost 3 years ago |
Comment | Post #282409 |
I spun up a Debian 10.10 VM real quick using the netinst image and defaults throughout except for keyboard layout and even going as far as to uncheck everything (including "standard system utilities") in the tasksel step, and even then I have `modprobe` and, after adding `non-free` and doing `apt-get... (more) |
— | almost 3 years ago |
Comment | Post #282409 |
@#53922 If you don't even have `modprobe` installed, then your system is bare enough that there's probably a good number of other things missing which will cause headaches down the road; `modprobe` is provided by `kmod` which has priority `important`, same as `apt` which provides `apt-get`. (Please d... (more) |
— | almost 3 years ago |
Comment | Post #282409 |
@#53922 I edited just now; please check again. (more) |
— | almost 3 years ago |
Edit | Post #282409 |
Post edited: |
— | almost 3 years ago |
Edit | Post #282409 |
Post edited: |
— | almost 3 years ago |
Edit | Post #282409 |
Post edited: |
— | almost 3 years ago |
Edit | Post #282409 | Initial revision | — | almost 3 years ago |
Answer | — |
A: Intel® Centrino® Advanced-N 6205 not found in Debian As a general rule of thumb, Debian is restrictive about installing during the initial installation what, according to the Debian Free Software Guidelines, is non-free software. That's why the installer offers you to provide the firmware files from a different media, in case you need to get network... (more) |
— | almost 3 years ago |
Edit | Post #282166 |
Post edited: Include text of error message as text, not as image |
— | almost 3 years ago |
Suggested Edit | Post #282166 |
Suggested edit: Include text of error message as text, not as image (more) |
helpful | almost 3 years ago |
Edit | Post #281850 | Initial revision | — | almost 3 years ago |
Answer | — |
A: What is the best way to identify changes from the default configuration in Raspbian systems? > How does the list of packages differ from that in a fresh install? The easiest way, if you have the data for it, would probably be to parse the APT logs (particularly /var/log/apt/history.log\) to see what's been installed and removed, respectively. However, those only go back so far, so unless ... (more) |
— | almost 3 years ago |
Edit | Post #281832 |
Post edited: |
— | almost 3 years ago |
Edit | Post #281832 |
Post edited: full site name of Photography |
— | almost 3 years ago |
Edit | Post #281832 | Initial revision | — | almost 3 years ago |
Answer | — |
A: Tag/category suggestions Categories should be used for broad categories of posts. For example, see how Writing separates the main Q&A from writing challenges, or how Cooking separates its Q&A from recipes, or how Meta separates Q&A from blog. A reasonable question to ask to indicate whether a separate category might be usefu... (more) |
— | almost 3 years ago |
Comment | Post #281718 |
@IncnisMrsi No, I haven't, but how would that be relevant? That page seems to be about how to make KeePass use a master password that is stored in the Gnome Keyring; I fail to see how that would help me here. Also, even if it works, having to edit the PAM configuration to change the default for a set... (more) |
— | almost 3 years ago |
Edit | Post #281718 | Initial revision | — | almost 3 years ago |
Question | — |
How to configure GNOME Keyring to by default NOT automatically unlock keyrings whenever logged in, on Debian? On a Debian Buster system I use, the password for connecting to a VPN is stored in the GNOME Keyring. Therefore, whenever I want to connect to the VPN in question, I get prompted to unlock my keyring. This is unproblematic. However, that dialog has a checkbox "Automatically unlock this keyring whe... (more) |
— | almost 3 years ago |
- ← Previous
- 1
- 2
- 3
- Next →