It looks like it's a common problem.
Updates:
You can now choose from a number of pre-installed themes
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
#17
Linux Support / Re: Unable to boot to desktop
November 30, 2018, 01:29:52 PM
Managed to fix the problem.
I Googled 'ubuntu has booted to busybox' and viewed a few results and found the command to fix the error...
While still in 'Busybox', I typed the command below
NOTE: Change the sda1 to where ever you have your OS installed.
I Googled 'ubuntu has booted to busybox' and viewed a few results and found the command to fix the error...
While still in 'Busybox', I typed the command below
Code Select
fsck /dev/sda1
NOTE: Change the sda1 to where ever you have your OS installed.
#18
Linux Support / Re: Unable to boot to desktop
November 29, 2018, 11:22:22 PMQuote from: Mark Greaves (PCNetSpec) on November 29, 2018, 09:03:11 PM
Good god, a million drives....
There's a few not connected, I've got 6 external HD's in total.
2 * 3Tb
2 * 4Tb
2 * 8Tb
2 * 2Tb internal
1 * 120Gb boot drive
#19
Linux Support / Re: Unable to boot to desktop
November 29, 2018, 11:18:39 PM
The boot device is sda , the 120gb drive
#20
Linux Support / Re: Need help installing dbg for Dolphin but the repo has the wrong version.
November 27, 2018, 02:40:15 PMQuote from: Mark Greaves (PCNetSpec) on November 23, 2018, 12:42:04 PM
You could always force dolphin back to 4.15 .. but if you have the backports repo installed (which is **supposed** to seamlessly move you to the latest KDE), I can't guarantee that won't give you other problems.
As we can see, it doesn't as shouldn't I have the latest version of Dolphin installed?
QuoteAs dolphin 4.16 now doesn't appear to require dolphin-dbg, it might be worth seeing what would happen if you simply uninstalled dolphin-dbg .. what's the output from dolphin-dbg
According to the reply from someone dealing with the bug report I filed, the info that dolphin-dbg provides was not included in my debug info which was automatically uploaded, so it looks like dolphin-dbg is not included in the installation of dolphin 16.04.
QuoteAs I am unable to provide you with the output from my desktop version (as it's currently crashed), I can provide you with the output from my laptop, which I am having the same problem;Code Selectsudo apt-get -s remove --purge dolphin-dbg
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Unable to locate package dolphin-dbg
Quote
the above command is only a "simulated dry run", nothing will actually get uninstalled .. it'll just tell us what would happen if we ran it without the "-s" option, so we can check if it'd be safe.
#21
Linux Support / Re: Unable to boot to desktop
November 27, 2018, 02:12:44 PMQuote from: Mark Greaves (PCNetSpec) on November 27, 2018, 01:13:35 PM
Have you got a LiveUSB ?
(really you should always have one of these)
I have, you've probably forgot you helped me install Multiboot (I think it was written by someone French).
Well, I've got the boot repair, gparted and multiple os'es and lots of other stuff.
QuoteIf so, boot to it, and post the output from:
Code Select
df -h
Filesystem Size Used Avail Use% Mounted on
udev 16G 4.0K 16G 1% /dev
tmpfs 3.2G 1.6M 3.2G 1% /run
/dev/sdi1 117G 38G 80G 33% /isodevice
/dev/loop0 1.1G 1.1G 0 100% /cdrom
/dev/loop1 1.1G 1.1G 0 100% /rofs
/cow 16G 342M 16G 3% /
none 4.0K 0 4.0K 0% /sys/fs/cgroup
tmpfs 16G 12K 16G 1% /tmp
none 5.0M 4.0K 5.0M 1% /run/lock
none 16G 76K 16G 1% /run/shm
none 100M 20K 100M 1% /run/user
Code Select
mount
/cow on / type overlay (rw)
proc on /proc type proc (rw,noexec,nosuid,nodev)
sysfs on /sys type sysfs (rw,noexec,nosuid,nodev)
udev on /dev type devtmpfs (rw,mode=0755)
devpts on /dev/pts type devpts (rw,noexec,nosuid,gid=5,mode=0620)
tmpfs on /run type tmpfs (rw,noexec,nosuid,size=10%,mode=0755)
/dev/sdi1 on /isodevice type vfat (rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,errors=remount-ro)
/dev/loop0 on /cdrom type iso9660 (ro,noatime)
/dev/loop1 on /rofs type squashfs (ro,noatime)
none on /sys/fs/cgroup type tmpfs (rw)
none on /sys/fs/fuse/connections type fusectl (rw)
none on /sys/kernel/debug type debugfs (rw)
none on /sys/kernel/security type securityfs (rw)
tmpfs on /tmp type tmpfs (rw,nosuid,nodev)
none on /run/lock type tmpfs (rw,noexec,nosuid,nodev,size=5242880)
none on /run/shm type tmpfs (rw,nosuid,nodev)
none on /run/user type tmpfs (rw,noexec,nosuid,nodev,size=104857600,mode=0755)
none on /sys/fs/pstore type pstore (rw)
systemd on /sys/fs/cgroup/systemd type cgroup (rw,noexec,nosuid,nodev,none,name=systemd)
Code Select
sudo fdisk -l
Disk /dev/sda: 120.0 GB, 120034123776 bytes
255 heads, 63 sectors/track, 14593 cylinders, total 234441648 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0x0007593a
Device Boot Start End Blocks Id System
/dev/sda1 * 2048 234438655 117218304 83 Linux
Disk /dev/sdb: 2000.4 GB, 2000398934016 bytes
255 heads, 63 sectors/track, 243201 cylinders, total 3907029168 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 4096 bytes
I/O size (minimum/optimal): 4096 bytes / 4096 bytes
Disk identifier: 0xd1567197
Device Boot Start End Blocks Id System
/dev/sdb1 2048 3907028991 1953513472 83 Linux
Disk /dev/sdc: 2000.4 GB, 2000398934016 bytes
255 heads, 63 sectors/track, 243201 cylinders, total 3907029168 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0x0009b408
Device Boot Start End Blocks Id System
/dev/sdc1 2048 3907028991 1953513472 83 Linux
WARNING: GPT (GUID Partition Table) detected on '/dev/sdd'! The util fdisk doesn't support GPT. Use GNU Parted.
Disk /dev/sdd: 8001.6 GB, 8001563221504 bytes
255 heads, 63 sectors/track, 972801 cylinders, total 15628053167 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 4096 bytes
I/O size (minimum/optimal): 4096 bytes / 33553920 bytes
Disk identifier: 0x9a9c01c5
Device Boot Start End Blocks Id System
/dev/sdd1 1 4294967295 2147483647+ ee GPT
Partition 1 does not start on physical sector boundary.
WARNING: GPT (GUID Partition Table) detected on '/dev/sdg'! The util fdisk doesn't support GPT. Use GNU Parted.
Note: sector size is 4096 (not 512)
Disk /dev/sdg: 3000.6 GB, 3000592982016 bytes
255 heads, 63 sectors/track, 45600 cylinders, total 732566646 sectors
Units = sectors of 1 * 4096 = 4096 bytes
Sector size (logical/physical): 4096 bytes / 4096 bytes
I/O size (minimum/optimal): 4096 bytes / 4096 bytes
Disk identifier: 0x00000000
Device Boot Start End Blocks Id System
/dev/sdg1 1 732566645 2930266580 ee GPT
WARNING: GPT (GUID Partition Table) detected on '/dev/sdh'! The util fdisk doesn't support GPT. Use GNU Parted.
Disk /dev/sdh: 8001.6 GB, 8001563221504 bytes
255 heads, 63 sectors/track, 972801 cylinders, total 15628053167 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 4096 bytes
I/O size (minimum/optimal): 4096 bytes / 33553920 bytes
Disk identifier: 0x00000000
Device Boot Start End Blocks Id System
/dev/sdh1 1 4294967295 2147483647+ ee GPT
Partition 1 does not start on physical sector boundary.
Disk /dev/sdi: 125.1 GB, 125061562368 bytes
255 heads, 63 sectors/track, 15204 cylinders, total 244260864 sectors
Units = sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0xe921f7a6
Device Boot Start End Blocks Id System
/dev/sdi1 * 1953 244260863 122129455+ c W95 FAT32 (LBA)
#22
Linux Support / Re: Unable to boot to desktop
November 27, 2018, 12:18:18 PM
Just tried booting to a previous kernel and still the same problem...
#23
Linux Support / [SOLVED] Unable to boot to desktop
November 27, 2018, 12:14:20 PM
I have just rebooted my computer* and all seemed well until just after the splash screen, when I got this...
BusyBox v1.22.1 (Ubuntu 1:1.22.0-15ubuntu1) built-in shell (ash)
Enter 'help' for a list of built-in commands.
(initramfs) _ <--- flashing cursor
I have already tried boot repair disk (https://sourceforge.net/projects/boot-repair-cd/) and then rebooted and it booted to the same state as above.
* Just before shut-down of the system to reboot, a couple of warnings popped up telling me that it was unable to write to disk, probably something to do with writing the state of the system to disk!
BusyBox v1.22.1 (Ubuntu 1:1.22.0-15ubuntu1) built-in shell (ash)
Enter 'help' for a list of built-in commands.
(initramfs) _ <--- flashing cursor
I have already tried boot repair disk (https://sourceforge.net/projects/boot-repair-cd/) and then rebooted and it booted to the same state as above.
* Just before shut-down of the system to reboot, a couple of warnings popped up telling me that it was unable to write to disk, probably something to do with writing the state of the system to disk!
#24
News and Events / Trojan miner for Linux removes antiviruses
November 24, 2018, 04:52:52 AM
Found this story on exploit.in (a Russian site)
The Doctor Web specialists have discovered a trojan designed for the extraction of cryptocurrency, which can infect other network devices and remove antiviruses running in the system. The threat received the identifier Linux.BtcMine.174 and is a large script written in the command shell language containing more than 1000 lines of code.
Malware consists of several components. So, when launching, the trojan checks the availability of the server from which it subsequently downloads other modules, and searches for a folder on the disk with write permissions into which these modules will then be loaded. After this, the script is moved to a previously selected folder named diskmanagerd and re-launched as a daemon. For this, the trojan uses the nohup utility. If it is not in the system, it automatically downloads and installs the coreutils utilities package, including nohup.
If the installation is successful on the device, the malicious script downloads one of the versions of the Linux.BackDoor.Gates.9 Trojan. The backdoors of this family allow you to execute commands from attackers and carry out DDoS attacks.
After installation, malware looks for competing miners in the system and, upon detection, completes their processes. If the trojan was not launched on behalf of the superuser (root), it uses a set of exploits to escalate its privileges on the infected system. Analysts of Doctor Web have identified at least two problems exploited by him: these are CVE-2016-5195 (aka DirtyCow ) and CVE-2013-2094 . At the same time, the sources of the exploit for DirtyCow are downloaded from the Internet by the Trojan compiles directly on the infected machine.
After this, the malware tries to find antivirus services running under the names safedog, aegis, yunsuo, clamd, avast, avgd, cmdavd, cmdmgd, drweb-configd, drweb-spider-kmod, esets and xmirrord. If they are detected, the malware does not just end the antivirus process, but with the help of package managers, deletes its files and the directory in which the anti-virus product was installed.
Then the trojan registers itself at startup, downloads and launches a rootkit on an infected device. This module is also designed as a sh script and is based on source code that was previously published in the public domain. Among the functions of the rootkit module, you can highlight the theft of user-supplied passwords for the su command, hiding files in the file system, network connections and running processes. The trojan collects information about network nodes that were previously connected via the ssh protocol and tries to infect them.
After completing all these steps, the Trojan finally launches the miner, designed for the production of Monero cryptocurrency (XMR), in the system. At intervals of one minute, the malware checks to see if this miner is running, and automatically restarts it if necessary. It also connects to the managing server in a continuous loop and downloads updates from there, if they are available.
Source: https://xakep.ru/2018/11/20/linux-btcmine-174/
Source of the above story...
https://translate.google.com/translate?hl=en&sl=ru&u=https://exploit.in/&prev=search
The Doctor Web specialists have discovered a trojan designed for the extraction of cryptocurrency, which can infect other network devices and remove antiviruses running in the system. The threat received the identifier Linux.BtcMine.174 and is a large script written in the command shell language containing more than 1000 lines of code.
Malware consists of several components. So, when launching, the trojan checks the availability of the server from which it subsequently downloads other modules, and searches for a folder on the disk with write permissions into which these modules will then be loaded. After this, the script is moved to a previously selected folder named diskmanagerd and re-launched as a daemon. For this, the trojan uses the nohup utility. If it is not in the system, it automatically downloads and installs the coreutils utilities package, including nohup.
If the installation is successful on the device, the malicious script downloads one of the versions of the Linux.BackDoor.Gates.9 Trojan. The backdoors of this family allow you to execute commands from attackers and carry out DDoS attacks.
After installation, malware looks for competing miners in the system and, upon detection, completes their processes. If the trojan was not launched on behalf of the superuser (root), it uses a set of exploits to escalate its privileges on the infected system. Analysts of Doctor Web have identified at least two problems exploited by him: these are CVE-2016-5195 (aka DirtyCow ) and CVE-2013-2094 . At the same time, the sources of the exploit for DirtyCow are downloaded from the Internet by the Trojan compiles directly on the infected machine.
After this, the malware tries to find antivirus services running under the names safedog, aegis, yunsuo, clamd, avast, avgd, cmdavd, cmdmgd, drweb-configd, drweb-spider-kmod, esets and xmirrord. If they are detected, the malware does not just end the antivirus process, but with the help of package managers, deletes its files and the directory in which the anti-virus product was installed.
Then the trojan registers itself at startup, downloads and launches a rootkit on an infected device. This module is also designed as a sh script and is based on source code that was previously published in the public domain. Among the functions of the rootkit module, you can highlight the theft of user-supplied passwords for the su command, hiding files in the file system, network connections and running processes. The trojan collects information about network nodes that were previously connected via the ssh protocol and tries to infect them.
After completing all these steps, the Trojan finally launches the miner, designed for the production of Monero cryptocurrency (XMR), in the system. At intervals of one minute, the malware checks to see if this miner is running, and automatically restarts it if necessary. It also connects to the managing server in a continuous loop and downloads updates from there, if they are available.
Source: https://xakep.ru/2018/11/20/linux-btcmine-174/
Source of the above story...
https://translate.google.com/translate?hl=en&sl=ru&u=https://exploit.in/&prev=search
#25
Linux Support / Re: Need help installing dbg for Dolphin but the repo has the wrong version.
November 23, 2018, 02:48:40 AM
That's strange as I've not forced the installation of 16.04, it may be because I've got backports repo loaded, even then, the backports repo is installed on a fresh install. So, I'm stuck!!!
#26
Linux Support / Re: Need help installing dbg for Dolphin but the repo has the wrong version.
November 22, 2018, 01:39:13 PM
Is there a way I can force install the latest version of Dolphin. I've had a Google but I could not find any specifics on how to install other versions.
#27
Linux Support / Re: Problem removing a source
November 22, 2018, 01:51:35 AM
I get the error when I execute the following...
[spoiler]Hit:1 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial InRelease
Ign:2 http://dl.google.com/linux/chrome/deb (http://dl.google.com/linux/chrome/deb) stable InRelease
Get:3 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates InRelease [109 kB]
Hit:4 http://dl.google.com/linux/chrome/deb (http://dl.google.com/linux/chrome/deb) stable Release
Get:5 http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu (http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu) xenial InRelease [17.5 kB]
Hit:6 http://archive.canonical.com/ubuntu (http://archive.canonical.com/ubuntu) xenial InRelease
Get:7 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-backports InRelease [107 kB]
Hit:8 http://ppa.launchpad.net/deadsnakes/ppa/ubuntu (http://ppa.launchpad.net/deadsnakes/ppa/ubuntu) xenial InRelease
Get:9 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-security InRelease [107 kB]
Hit:10 http://ppa.launchpad.net/fengestad/stable/ubuntu (http://ppa.launchpad.net/fengestad/stable/ubuntu) xenial InRelease
Hit:11 http://ppa.launchpad.net/flexiondotorg/youtube-dl-gui/ubuntu (http://ppa.launchpad.net/flexiondotorg/youtube-dl-gui/ubuntu) xenial InRelease
Ign:12 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) InRelease
Get:13 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release [1,034 B]
Hit:14 http://ppa.launchpad.net/inkscape.dev/stable/ubuntu (http://ppa.launchpad.net/inkscape.dev/stable/ubuntu) xenial InRelease
Get:15 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release.gpg [481 B]
Hit:16 http://ppa.launchpad.net/kubuntu-ppa/backports/ubuntu (http://ppa.launchpad.net/kubuntu-ppa/backports/ubuntu) xenial InRelease
Hit:18 http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu (http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu) xenial InRelease
Hit:19 https://repo.skype.com/deb (https://repo.skype.com/deb) stable InRelease
Ign:20 https://mkvtoolnix.download/ubuntu (https://mkvtoolnix.download/ubuntu) xenial InRelease
Hit:21 http://ppa.launchpad.net/obsproject/obs-studio/ubuntu (http://ppa.launchpad.net/obsproject/obs-studio/ubuntu) xenial InRelease
Get:22 https://mkvtoolnix.download/ubuntu (https://mkvtoolnix.download/ubuntu) xenial Release [6,597 B]
Hit:23 http://ppa.launchpad.net/team-xbmc/ppa/ubuntu (http://ppa.launchpad.net/team-xbmc/ppa/ubuntu) xenial InRelease
Get:24 https://mkvtoolnix.download/ubuntu (https://mkvtoolnix.download/ubuntu) xenial Release.gpg [833 B]
Get:25 http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu (http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu) xenial/main amd64 Packages [1,364 B]
Get:26 http://archive.getdeb.net/ubuntu (http://archive.getdeb.net/ubuntu) xenial-getdeb InRelease
Err:26 http://archive.getdeb.net/ubuntu (http://archive.getdeb.net/ubuntu) xenial-getdeb InRelease
Clearsigned file isn't valid, got 'NOSPLIT' (does the network require authentication?)
Get:27 http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu (http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu) xenial/main i386 Packages [1,368 B]
Get:28 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/main amd64 Packages [884 kB]
Get:29 http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu (http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu) xenial/main Translation-en [932 B]
Get:30 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/main i386 Packages [786 kB]
Get:31 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/main amd64 DEP-11 Metadata [320 kB]
Ign:32 http://liveusb.info/multisystem/depot (http://liveusb.info/multisystem/depot) all InRelease
Get:33 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/main DEP-11 64x64 Icons [227 kB]
Hit:34 http://liveusb.info/multisystem/depot (http://liveusb.info/multisystem/depot) all Release
Get:35 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/universe amd64 Packages [706 kB]
Get:36 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/universe i386 Packages [647 kB]
Get:37 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/universe amd64 DEP-11 Metadata [247 kB]
Get:38 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/universe DEP-11 64x64 Icons [333 kB]
Get:39 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/multiverse amd64 DEP-11 Metadata [5,960 B]
Get:40 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/multiverse DEP-11 64x64 Icons [14.3 kB]
Get:41 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-backports/universe amd64 DEP-11 Metadata [5,104 B]
Get:42 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-backports/main amd64 DEP-11 Metadata [3,328 B]
Get:43 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-security/universe amd64 DEP-11 Metadata [108 kB]
Get:44 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-security/universe DEP-11 64x64 Icons [145 kB]
Ign:15 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release.gpg
Hit:45 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Packages
Fetched 4,783 kB in 3s (1,368 kB/s)
Reading package lists... Done
W: GPG error: http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 4ABE1AC7557BEFF9
W: The repository 'http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release' is not signed.
N: Data from such a repository can't be authenticated and is therefore potentially dangerous to use.
N: See apt-secure(
manpage for repository creation and user configuration details.
E: Failed to fetch http://archive.getdeb.net/ubuntu/dists/xenial-getdeb/InRelease (http://archive.getdeb.net/ubuntu/dists/xenial-getdeb/InRelease) Clearsigned file isn't valid, got 'NOSPLIT' (does the network require authentication?)
E: Some index files failed to download. They have been ignored, or old ones used instead.[/spoiler]
Code Select
sudo apt-get update
[spoiler]Hit:1 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial InRelease
Ign:2 http://dl.google.com/linux/chrome/deb (http://dl.google.com/linux/chrome/deb) stable InRelease
Get:3 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates InRelease [109 kB]
Hit:4 http://dl.google.com/linux/chrome/deb (http://dl.google.com/linux/chrome/deb) stable Release
Get:5 http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu (http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu) xenial InRelease [17.5 kB]
Hit:6 http://archive.canonical.com/ubuntu (http://archive.canonical.com/ubuntu) xenial InRelease
Get:7 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-backports InRelease [107 kB]
Hit:8 http://ppa.launchpad.net/deadsnakes/ppa/ubuntu (http://ppa.launchpad.net/deadsnakes/ppa/ubuntu) xenial InRelease
Get:9 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-security InRelease [107 kB]
Hit:10 http://ppa.launchpad.net/fengestad/stable/ubuntu (http://ppa.launchpad.net/fengestad/stable/ubuntu) xenial InRelease
Hit:11 http://ppa.launchpad.net/flexiondotorg/youtube-dl-gui/ubuntu (http://ppa.launchpad.net/flexiondotorg/youtube-dl-gui/ubuntu) xenial InRelease
Ign:12 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) InRelease
Get:13 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release [1,034 B]
Hit:14 http://ppa.launchpad.net/inkscape.dev/stable/ubuntu (http://ppa.launchpad.net/inkscape.dev/stable/ubuntu) xenial InRelease
Get:15 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release.gpg [481 B]
Hit:16 http://ppa.launchpad.net/kubuntu-ppa/backports/ubuntu (http://ppa.launchpad.net/kubuntu-ppa/backports/ubuntu) xenial InRelease
Hit:18 http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu (http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu) xenial InRelease
Hit:19 https://repo.skype.com/deb (https://repo.skype.com/deb) stable InRelease
Ign:20 https://mkvtoolnix.download/ubuntu (https://mkvtoolnix.download/ubuntu) xenial InRelease
Hit:21 http://ppa.launchpad.net/obsproject/obs-studio/ubuntu (http://ppa.launchpad.net/obsproject/obs-studio/ubuntu) xenial InRelease
Get:22 https://mkvtoolnix.download/ubuntu (https://mkvtoolnix.download/ubuntu) xenial Release [6,597 B]
Hit:23 http://ppa.launchpad.net/team-xbmc/ppa/ubuntu (http://ppa.launchpad.net/team-xbmc/ppa/ubuntu) xenial InRelease
Get:24 https://mkvtoolnix.download/ubuntu (https://mkvtoolnix.download/ubuntu) xenial Release.gpg [833 B]
Get:25 http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu (http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu) xenial/main amd64 Packages [1,364 B]
Get:26 http://archive.getdeb.net/ubuntu (http://archive.getdeb.net/ubuntu) xenial-getdeb InRelease
Err:26 http://archive.getdeb.net/ubuntu (http://archive.getdeb.net/ubuntu) xenial-getdeb InRelease
Clearsigned file isn't valid, got 'NOSPLIT' (does the network require authentication?)
Get:27 http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu (http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu) xenial/main i386 Packages [1,368 B]
Get:28 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/main amd64 Packages [884 kB]
Get:29 http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu (http://ppa.launchpad.net/alessandro-strada/ppa/ubuntu) xenial/main Translation-en [932 B]
Get:30 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/main i386 Packages [786 kB]
Get:31 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/main amd64 DEP-11 Metadata [320 kB]
Ign:32 http://liveusb.info/multisystem/depot (http://liveusb.info/multisystem/depot) all InRelease
Get:33 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/main DEP-11 64x64 Icons [227 kB]
Hit:34 http://liveusb.info/multisystem/depot (http://liveusb.info/multisystem/depot) all Release
Get:35 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/universe amd64 Packages [706 kB]
Get:36 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/universe i386 Packages [647 kB]
Get:37 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/universe amd64 DEP-11 Metadata [247 kB]
Get:38 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/universe DEP-11 64x64 Icons [333 kB]
Get:39 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/multiverse amd64 DEP-11 Metadata [5,960 B]
Get:40 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-updates/multiverse DEP-11 64x64 Icons [14.3 kB]
Get:41 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-backports/universe amd64 DEP-11 Metadata [5,104 B]
Get:42 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-backports/main amd64 DEP-11 Metadata [3,328 B]
Get:43 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-security/universe amd64 DEP-11 Metadata [108 kB]
Get:44 http://ubuntu.mirrors.uk2.net/ubuntu (http://ubuntu.mirrors.uk2.net/ubuntu) xenial-security/universe DEP-11 64x64 Icons [145 kB]
Ign:15 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release.gpg
Hit:45 http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Packages
Fetched 4,783 kB in 3s (1,368 kB/s)
Reading package lists... Done
W: GPG error: http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 4ABE1AC7557BEFF9
W: The repository 'http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04 (http://download.opensuse.org/repositories/isv:/ownCloud:/desktop/Ubuntu_16.04) Release' is not signed.
N: Data from such a repository can't be authenticated and is therefore potentially dangerous to use.
N: See apt-secure(

E: Failed to fetch http://archive.getdeb.net/ubuntu/dists/xenial-getdeb/InRelease (http://archive.getdeb.net/ubuntu/dists/xenial-getdeb/InRelease) Clearsigned file isn't valid, got 'NOSPLIT' (does the network require authentication?)
E: Some index files failed to download. They have been ignored, or old ones used instead.[/spoiler]
#28
Linux Support / Re: Problem removing a source
November 20, 2018, 12:55:39 AM
I'm not sure how to ask or do it, what I need to do is remove owncloud which is causing problems.
#29
Linux Support / Re: Need help installing dbg for Dolphin but the repo has the wrong version.
November 20, 2018, 12:46:53 AM
Lol Mark, you sound like my dad 
The PPA's didn't cause the problem as they came after the installation of Dolphin as that was installed upon installation of the OS ages ago.

Recent versions don't have external PPA's, so what you're saying is that from version XX the dbg is built in?
So, if I want to escape this bug, how can I install the latest (or higher) version?

The PPA's didn't cause the problem as they came after the installation of Dolphin as that was installed upon installation of the OS ages ago.

Recent versions don't have external PPA's, so what you're saying is that from version XX the dbg is built in?
So, if I want to escape this bug, how can I install the latest (or higher) version?
#30
Linux Support / Need help installing dbg for Dolphin but the repo has the wrong version.
November 19, 2018, 04:11:08 PM
I have entered a bug report but it is incomplete due to Dolphin being unable to report its crash properly as the version of the dbg file is a lower version than the version of Dolphin I have installed, which is 4:16.04.3-0ubuntu2.1~ubuntu16.04~ppa1 and the repo version is 4:15.12.3-0ubuntu1