Ubuntu :: Prevent A Certain Application From Having Access To ALSA?
Jan 20, 2011How can I prevent a certain application from having access to ALSA. It keeps stealing my audio.
View 2 RepliesHow can I prevent a certain application from having access to ALSA. It keeps stealing my audio.
View 2 RepliesHow can I prevent a certain application from having access to ALSA. It keeps stealing my audio.
View 1 Replies View RelatedI've made custom launchers for programs that can only run in terminal. They open fine within the Terminal window, but it closes right after the program is finished, before I can read the report.
Is there a way to keep the Terminal window open, using launchers? I don't want to manually type the commands after opening a Terminal.
Code:
#!/bin/bash
ulimit -c unlimited
while true; do ./executeable; done
When i will write this in console it will run executeable file and it will generate report : core.pid after crash so i can gdb the report. The application after crash will restart how can i prevent restarting the application after it's crash?
I'll spare the details, but is there a way to use iptables to do the following:
Allow all port 80 traffic to work for squid, yum ,etc. but prevent firefox from talking to port 80?
(That way if they don't use squid proxy, it won't work)
I have a users, that log in from a terminal. They should not have any shell access, so currently their login script, at the end, starts the program that they use, and after that program ends, the login script moves on to log them back out. The problem is, they could press ctrl+c, while the login script is running, and it quits the login script and spits them out at a shell prompt. -- Is there any way I can prevent this?
View 4 Replies View RelatedI would like to use my laptop at home, where I don't have internet access (don't ask, long story). My question are two-fold;
** How do I prevent various pieces of software trying to access the net for updates etc. I presume they are likely to hang, lock up, and generally cause trouble.
** Can anyone recommend a working practice for installing updates and/or new software, either from USB or CDROM/DVD? I have good (legitimate!) access to assorted computer facilities at my office. I am using 11.04
I'm doing a research to protect my pc from physical access. What I'm facing here is that my company created a program for fedora 8 and plans to sell the unit away. We created a function where you can configure the program using any web browser from a network so we do not want anybody to have access to the fedora except for out personnel.
Based on my research, I've found [URL] this guide to protect people from accessing grub and single user. I am currently researching on preventing others to clone the harddisk. I would like to know if there are any other methods to prevent people from unauthorized access to fedora.
Launching OpenOffice takes several minutes because it's trying to connect to the Internet. The problem gets worse in a dial-up connection. Turning off the Internet takes less than a second to start. How can I prevent OpenOffice from trying to access the Internet when it starts?
View 2 Replies View RelatedI'm using some software that using mount point such as truecrypt. I also mount shared folder on other machine (fileserver) and publish it using ftp. The problem is when the truecrypt volume dismounted or the shared folder mount point loosing connection to the fileserver, user can write to the mount point without knowing that they actually not writing to the truecrypt volume or to the shared folder.
My question is, when sometime the server reboot and truecrypt volume is not mounted yet, how to prevent write to the mount point? I dont run truecrypt mount automatically for security reason.Some question for shared folder, if fileserver restart and the shared folder mount point got disconnected, how to prevent write to the mount point?
I'm working on creating a bootable Linux CD to distribute a sandbox environment to customers that will work on multiple PCs.One requirement of this environment is that we do not want the user to have any access to the underlying hard drives in the computer to prevent any accidental and/or malicious damage. I can prevent the disks from automounting with a few udev custom rules, but is there any way to prevent/block the user from manually mounting the hard drives after boot up.
View 2 Replies View RelatedI have recently been forced to do a hardware upgrade (my previous mobo died). Now, sounds works ok with,amarok because kde has recognized the new hardware and switched to it.
..... does not work, likely because flash uses alsa-oss which is probably not configured automatically. I have tried uninstalling and reinstalling both alsa-oss and flash, but it didn't solve the problem.
when i want to open one file, there are many ms access in my application,please my attachment,what's wrong?
View 1 Replies View Relatedsome weeks ago, I started getting the prompt from the keyring manager after each login:Enter password for keyring 'Default' to unlock.An application wants access to the keyring 'Default', but it is locked.I don't know what I could have changed, but this is getting pretty annoying. I know that it is not the network-manager, it is configured for "all users" and my Wifi is working even when I cancel the dialog. In fact, canceling the dialog seems to have no effect at all.
Is there any way to find out which application might be trying to access the keyring (and to stop it from doing so)? I already tried disabling some of the startup applications (which seem to be all default anyway) but that didn't help.Please note that I do NOT want to set an empty password for the keyring because I think protecting it is a good thing. I just want to be prompted for the password only when I use it.
I just got a brand new usb wireless adapter. Plugged it in, picked it up but then a window came up and said "The application nm-applet wants to access the keyring. Please enter password." I entered my password, the window goes away for about 1 second, then comes back up again. With my old usb wireless adapter, it never did this.
View 3 Replies View RelatedIs there a way to identify exactly what application is asking for keyring access at the given time? I get this query every boot and it's getting annoying. The annoyance is there, but more importantly and from a personal security standpoint on desktop systems, it's pretty bad that it doesn't say what application want's the access.
View 7 Replies View RelatedOn startup, I get two notifications that an application is requesting access to my default keyring. the problem is that I have no idea which applications are doing this. Is there any way to see what's making the request?
View 2 Replies View RelatedI have written a simple server application (with an HTTP interface). I want to ensure that only calls from the local machine are processed - i.e. I want to prevent outsiders from accessing/using my server.
How may I restrict outsiders (i.e. requests from remote machines)?
I have 2 LANs in my network. They are:
LAN 1: 192.168.0.0
LAN 2: 192.168.1.0
Both LANs, communicate with each other. And both have an application server. In LAN1, I can access the web server, internal and external. At LAN2, only works on the internal network.The rule that I'm using is as follows: iptables -t nat -A PREROUTING -p tcp -d my_ip --dport 80 -j DNAT --to 192.168.1.254:80
This rule works for LAN1, but not for LAN2. Anyone know what that is can be lockin access?
I'm currently on a project to allow mobile computers in our vehicles to access a web application. Unfortunately, most of our users are just smart enough to be dangerous...I would like to create a large private network over a wireless (3g, 4g, whatever), but in a way that forces the users to be on that network so that I (the evil IT guy) can control what they have access to. VPN seems like a good bet, but I want to be sure that the users are forced to only connect through it. As it stands, they're going to be using XP-based toughbooks.
View 2 Replies View Relatedi want to know that which application in linux will give me access to the router like in windows we use hyper terminal or i have to install a particular package
View 2 Replies View RelatedI am using CentOS LiveCD i386 without internet access. I would like to make the application sys_basher, but make is not installed and I cannot find how to add packages without yum.
View 2 Replies View RelatedI've created a application,i tried to deploy in JBoss application server..that application working fine.so i tried to run my allication in apache web server,i have done some configuration in apache & installed apache-tomcat connector also..its working fine.but i will try access next page its showing error.
View 1 Replies View RelatedIam using snmp to access the remote system data.But according to the requirement iam encoding the snmp request data to OAMPDU packet format and sending to remote system.the remote system receives the OAMPDU packet,decodes it and is sending the snmp packet to snmp agent through UDP socket which is bind to port 161.but iam unable to receive the response from snmp agent.i have created a udp socket which is bind to 161 port to receive the response.
if i use any other free port number other than 161 for receiving snmp agent is not sending the response to that port.can any one please suggest me how to overcome this problem.Can we configure the different ports for tx,rx ?How do we know on which port does snmp sends the response ???
is there a way to give an application (controlaula) write access to a folder /var/lib/monitorprofe and files on that folder.
View 3 Replies View RelatedI have a computer with redhat installed that once it boots up it comes to an application login screen. I want to bypass that and get root access to reformat hard drive and install latest version of Debian Linux.
View 1 Replies View RelatedI'm trying to update ALSA, following the instructions here: SDB:Alsa-update - openSUSE.I'm not sure how to proceed at STEP THREE. There are two sets of instructions, based on whether or not the kernel has been updated. I'm not sure if it has been. How can I make sure?
View 2 Replies View RelatedThis "An Application wants access to the keyring "default", but it is locked. Goes on and I've a few question about the procedure.
The first is how do I determine WHAT application wants access. Seems to me that I need to know what is going on with programs trying to log in.
If I knew what program is needing access, I could determine if I wanted to provide permanent, temporary, or no access.
How can I determine what is happening at startup.
application to monitor application wise network usage?
View 3 Replies View RelatedHow do I make an application launcher in the panel launch more than one application? Is there some sort of a symbol I type between the apps in the command line? Like ;
View 1 Replies View Related