Linux - DesktopThis forum is for the discussion of all Linux Software used in a desktop context.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
i attempted to install calibre using synaptic and was informed that i i have held broken packages. i've attempted everything in the below linked thread and the issue is still there. please any other ideas on rectifying this would be great. as for calibre i found a 1 line command on their site for installing it, and it worked perfectly. thanks
i attempted to install calibre using synaptic and was informed that i i have held broken packages. i've attempted everything in the below linked thread and the issue is still there. please any other ideas on rectifying this would be great. as for calibre i found a 1 line command on their site for installing it, and it worked perfectly. thanks
that last oneliner has potential for desaster.
one would need to know what is being executed with root privileges here. we don't know. maybe it installed a botnet on your computer.
but, no matter.
please post every command you used to fix the problem, with its complete output.
that last oneliner has potential for desaster.
one would need to know what is being executed with root privileges here. we don't know. maybe it installed a botnet on your computer.
but, no matter.
please post every command you used to fix the problem, with its complete output.
that last ONELINER was abd is directly from calibre as i stated, so no botware. but pretty sure you already knew that before making the statement.
this is exactly why peeps should never disable viewing signatures, cause i have my specs in my signature. no i'm not on xubuntu. i'm running the below listed. like i said i looked for that repository and am not seeing it, which is odd in and of itself.
KDE Neon 64 Bit: Kernel 5.1.0
AMD FX 6300, Asus 970 Gaming/Aura, Samsung 120 Gig 850 EVO, 16Gig DDR3,
USB 3 Card, AOC 29" Ultra Wide 2560x1080. nVidia 750Ti(430 Driver),
SATA 1TB, 750 & 500Gig Drives, USB 3 2TB & 1.5TB Drives
I don't see how you implied that the system in suspect is what you have in the signature. Many people have multiple os's installed and i thought that was the case with you.
Post the outputs of...
Code:
cat /etc/apt/sources.list
ls /etc/apt/sources.list.d/
cat /etc/apt/sources.list.d/*
# deb cdrom:[neon user _Bionic_ - Build amd64 LIVE Binary 20190430-13:12]/ bionic main multiverse restricted universe
# See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
# newer versions of the distribution.
deb http://us.archive.ubuntu.com/ubuntu/ bionic main restricted
# deb-src http://us.archive.ubuntu.com/ubuntu/ bionic main restricted
## Major bug fix updates produced after the final release of the
## distribution.
deb http://us.archive.ubuntu.com/ubuntu/ bionic-updates main restricted
# deb-src http://us.archive.ubuntu.com/ubuntu/ bionic-updates main restricted
## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu
## team. Also, please note that software in universe WILL NOT receive any
## review or updates from the Ubuntu security team.
deb http://us.archive.ubuntu.com/ubuntu/ bionic universe
# deb-src http://us.archive.ubuntu.com/ubuntu/ bionic universe
deb http://us.archive.ubuntu.com/ubuntu/ bionic-updates universe
# deb-src http://us.archive.ubuntu.com/ubuntu/ bionic-updates universe
## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu
## team, and may not be under a free licence. Please satisfy yourself as to
## your rights to use the software. Also, please note that software in
## multiverse WILL NOT receive any review or updates from the Ubuntu
## security team.
deb http://us.archive.ubuntu.com/ubuntu/ bionic multiverse
# deb-src http://us.archive.ubuntu.com/ubuntu/ bionic multiverse
deb http://us.archive.ubuntu.com/ubuntu/ bionic-updates multiverse
# deb-src http://us.archive.ubuntu.com/ubuntu/ bionic-updates multiverse
## N.B. software from this repository may not have been tested as
## extensively as that contained in the main release, although it includes
## newer versions of some applications which may provide useful features.
## Also, please note that software in backports WILL NOT receive any review
## or updates from the Ubuntu security team.
deb http://us.archive.ubuntu.com/ubuntu/ bionic-backports main restricted universe multiverse
# deb-src http://us.archive.ubuntu.com/ubuntu/ bionic-backports main restricted universe multiverse
## Uncomment the following two lines to add software from Canonical's
## 'partner' repository.
## This software is not part of Ubuntu, but is offered by Canonical and the
## respective vendors as a service to Ubuntu users.
# deb http://archive.canonical.com/ubuntu/ bionic partner
# deb-src http://archive.canonical.com/ubuntu/ bionic partner
deb http://security.ubuntu.com/ubuntu/ bionic-security main restricted
# deb-src http://security.ubuntu.com/ubuntu/ bionic-security main restricted
deb http://security.ubuntu.com/ubuntu/ bionic-security universe
# deb-src http://security.ubuntu.com/ubuntu/ bionic-security universe
deb http://security.ubuntu.com/ubuntu/ bionic-security multiverse
# deb-src http://security.ubuntu.com/ubuntu/ bionic-security multiverse
deb [arch=i386,amd64] http://repo.vivaldi.com/stable/deb/ stable main
# deb-src [arch=i386,amd64] http://repo.vivaldi.com/stable/deb/ stable main
deb https://dl.winehq.org/wine-builds/ubuntu/ bionic main
# deb-src https://dl.winehq.org/wine-builds/ubuntu/ bionic main
# deb-src https://dl.winehq.org/wine-builds/ubuntu/ disco main
# deb https://dl.winehq.org/wine-builds/ubuntu/ bionic main
# deb-src https://dl.winehq.org/wine-builds/ubuntu/ bionic main
deb http://us.archive.ubuntu.com/ubuntu/ bionic-proposed multiverse restricted main universe
# deb-src https://dl.winehq.org/wine-builds/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/ubuntu-mozilla-security/ppa/ubuntu/ bionic main
deb http://ppa.launchpad.net/agornostal/ulauncher/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/agornostal/ulauncher/ubuntu/ bionic main
deb http://ppa.launchpad.net/agornostal/ulauncher/ubuntu bionic main
# deb-src http://ppa.launchpad.net/agornostal/ulauncher/ubuntu bionic main
deb http://ppa.launchpad.net/atareao/atareao/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/atareao/atareao/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/atareao/atareao/ubuntu/ bionic main
deb http://ppa.launchpad.net/atareao/atareao/ubuntu bionic main
# deb-src http://ppa.launchpad.net/atareao/atareao/ubuntu bionic main
# deb-src http://ppa.launchpad.net/atareao/atareao/ubuntu bionic main
deb http://ppa.launchpad.net/dawidd0811/neofetch/ubuntu/ bionic main
deb-src http://ppa.launchpad.net/dawidd0811/neofetch/ubuntu/ bionic main
deb http://ppa.launchpad.net/dawidd0811/neofetch/ubuntu/ bionic main
deb-src http://ppa.launchpad.net/dawidd0811/neofetch/ubuntu/ bionic main
deb http://ppa.launchpad.net/font-manager/staging/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/font-manager/staging/ubuntu/ bionic main
deb http://ppa.launchpad.net/font-manager/staging/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/font-manager/staging/ubuntu/ bionic main
deb http://ppa.launchpad.net/gezakovacs/ppa/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/gezakovacs/ppa/ubuntu/ bionic main
deb http://ppa.launchpad.net/gezakovacs/ppa/ubuntu bionic main
# deb-src http://ppa.launchpad.net/gezakovacs/ppa/ubuntu bionic main
###
###
###
###
###
### THIS FILE IS AUTOMATICALLY CONFIGURED ###
# You may comment out this entry, but any other modifications may be lost.
deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main
###
###
###
###
### THIS FILE IS AUTOMATICALLY CONFIGURED ###
# You may comment out this entry, but any other modifications may be lost.
deb [arch=amd64] http://dl.google.com/linux/chrome/deb/ stable main
deb http://ppa.launchpad.net/graphics-drivers/ppa/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/graphics-drivers/ppa/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/graphics-drivers/ppa/ubuntu/ bionic main
deb http://ppa.launchpad.net/graphics-drivers/ppa/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/graphics-drivers/ppa/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/graphics-drivers/ppa/ubuntu/ bionic main
deb http://ppa.launchpad.net/hluk/copyq/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/hluk/copyq/ubuntu/ bionic main
deb http://ppa.launchpad.net/hluk/copyq/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/hluk/copyq/ubuntu/ bionic main
deb http://download.opensuse.org/repositories/home:/osmc/xUbuntu_16.04/ /
deb http://ppa.launchpad.net/jonathonf/calibre/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/jonathonf/calibre/ubuntu/ bionic main
deb http://ppa.launchpad.net/morphis/anbox-support/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/morphis/anbox-support/ubuntu/ bionic main
deb http://ppa.launchpad.net/morphis/anbox-support/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/morphis/anbox-support/ubuntu/ bionic main
deb http://ppa.launchpad.net/nathan-renniewaldock/qdirstat/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/nathan-renniewaldock/qdirstat/ubuntu/ bionic main
deb http://ppa.launchpad.net/nathan-renniewaldock/qdirstat/ubuntu bionic main
# deb-src http://ppa.launchpad.net/nathan-renniewaldock/qdirstat/ubuntu bionic main
deb http://archive.neon.kde.org/user/ bionic main
deb-src http://archive.neon.kde.org/user/ bionic main
deb http://archive.neon.kde.org/user/ bionic main
deb-src http://archive.neon.kde.org/user/ bionic main
deb http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu/ bionic main
deb http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu bionic main
# deb-src http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu bionic main
# deb-src http://ppa.launchpad.net/nilarimogard/webupd8/ubuntu bionic main
deb http://ppa.launchpad.net/oguzhaninan/stacer/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/oguzhaninan/stacer/ubuntu/ bionic main
deb http://ppa.launchpad.net/oguzhaninan/stacer/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/oguzhaninan/stacer/ubuntu/ bionic main
deb https://downloads.plex.tv/repo/deb/ public main
deb https://downloads.plex.tv/repo/deb/ public main
deb http://ppa.launchpad.net/qbittorrent-team/qbittorrent-stable/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/qbittorrent-team/qbittorrent-stable/ubuntu/ bionic main
deb http://ppa.launchpad.net/qbittorrent-team/qbittorrent-stable/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/qbittorrent-team/qbittorrent-stable/ubuntu/ bionic main
deb http://ppa.launchpad.net/rvm/smplayer/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/rvm/smplayer/ubuntu/ bionic main
deb http://ppa.launchpad.net/rvm/smplayer/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/rvm/smplayer/ubuntu/ bionic main
### TeamViewer DEB repository list
### NOTE: Manual changes to this file
### - prevent it from being updated by TeamViewer package updates
### - will be lost after using the 'teamviewer repo' command
### The original file can be restored with this command:
### cp /opt/teamviewer/tv_bin/script/teamviewer.list /etc/apt/sources.list.d/teamviewer.list
### which has the same effect as 'teamviewer repo default'
### NOTE: It is preferred to use the following commands to edit this file:
### teamviewer repo - show current repository configuration
### teamviewer repo default - restore default configuration
### teamviewer repo disable - disable the repository
### teamviewer repo main [stable] - make all TeamViewer packages available (default)
### teamviewer repo tv14 [stable] - make TeamViewer 14 packages available
### stable omit preview and beta releases
### Choose stable main to receive updates for TeamViewer 14 and upcoming major releases
### Choose preview main to receive early updates for TeamViewer 14 and to receive major beta releases
### Choose stable tv14 to receive updates for TeamViewer 14
### Choose preview tv14 to receive early updates for TeamViewer 14
deb http://linux.teamviewer.com/deb/ stable main
# deb http://linux.teamviewer.com/deb/ preview main
# deb http://linux.teamviewer.com/deb/ stable tv14
# deb http://linux.teamviewer.com/deb/ preview tv14
### TeamViewer DEB repository list
### NOTE: Manual changes to this file
### - prevent it from being updated by TeamViewer package updates
### - will be lost after using the 'teamviewer repo' command
### The original file can be restored with this command:
### cp /opt/teamviewer/tv_bin/script/teamviewer.list /etc/apt/sources.list.d/teamviewer.list
### which has the same effect as 'teamviewer repo default'
### NOTE: It is preferred to use the following commands to edit this file:
### teamviewer repo - show current repository configuration
### teamviewer repo default - restore default configuration
### teamviewer repo disable - disable the repository
### teamviewer repo main [stable] - make all TeamViewer packages available (default)
### teamviewer repo tv14 [stable] - make TeamViewer 14 packages available
### stable omit preview and beta releases
### Choose stable main to receive updates for TeamViewer 14 and upcoming major releases
### Choose preview main to receive early updates for TeamViewer 14 and to receive major beta releases
### Choose stable tv14 to receive updates for TeamViewer 14
### Choose preview tv14 to receive early updates for TeamViewer 14
deb http://linux.teamviewer.com/deb/ stable main
# deb http://linux.teamviewer.com/deb/ preview main
# deb http://linux.teamviewer.com/deb/ stable tv14
# deb http://linux.teamviewer.com/deb/ preview tv14
deb http://ppa.launchpad.net/teejee2008/ppa/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/teejee2008/ppa/ubuntu/ bionic main
deb http://ppa.launchpad.net/teejee2008/ppa/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/teejee2008/ppa/ubuntu/ bionic main
deb http://ppa.launchpad.net/tista/plata-theme/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/tista/plata-theme/ubuntu/ bionic main
deb http://ppa.launchpad.net/tista/plata-theme/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/tista/plata-theme/ubuntu/ bionic main
deb http://ppa.launchpad.net/ubuntu-mozilla-security/ppa/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/ubuntu-mozilla-security/ppa/ubuntu/ bionic main
deb http://ppa.launchpad.net/ubuntu-mozilla-security/ppa/ubuntu bionic main
# deb-src http://ppa.launchpad.net/ubuntu-mozilla-security/ppa/ubuntu bionic main
###
### THIS FILE IS AUTOMATICALLY CONFIGURED ###
# You may comment out this entry, but any other modifications may be lost.
# deb http://repo.vivaldi.com/stable/deb/ stable main
### THIS FILE IS AUTOMATICALLY CONFIGURED ###
# You may comment out this entry, but any other modifications may be lost.
#deb http://repo.vivaldi.com/stable/deb/ stable main
###
### THIS FILE IS AUTOMATICALLY CONFIGURED ###
# You may comment out this entry, but any other modifications may be lost.
# deb http://repo.vivaldi.com/snapshot/deb/ stable main
### THIS FILE IS AUTOMATICALLY CONFIGURED ###
# You may comment out this entry, but any other modifications may be lost.
#deb http://repo.vivaldi.com/snapshot/deb/ stable main
deb http://ppa.launchpad.net/webupd8team/java/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/webupd8team/java/ubuntu/ bionic main
deb http://ppa.launchpad.net/webupd8team/java/ubuntu/ bionic main
# deb-src http://ppa.launchpad.net/webupd8team/java/ubuntu/ bionic main
home:osmc.list
deb http://download.opensuse.org/repositories/home:/osmc/xUbuntu_16.04/
^^^
The smoking gun. You have added an xUbuntu 16.04 repository that only has osmc-installer package in it.
I don't know what osmc-installer is or what it does but since 16.04 is not getting any updates anymore I suggest you uninstall it and delete the repository.
home:osmc.list
deb http://download.opensuse.org/repositories/home:/osmc/xUbuntu_16.04/
^^^
The smoking gun. You have added an xUbuntu 16.04 repository that only has osmc-installer package in it.
I don't know what osmc-installer is or what it does but since 16.04 is not getting any updates anymore I suggest you uninstall it and delete the repository.
that might very well have been the result of a command like that in post #1.
it obviously wasn't calibre in this case, but it could've been something very similar:
etc.
the point is: you're executing untrusted code without looking at it, straight from the net, with su privileges.
it doesn't need to be malicious to break your system.
similar goes for using the '-y' switch with apt and the like. something which many app developers like to post, because they can then claim that their app is "easy to install, just one command" (no painful reading).
the point is: you're executing untrusted code without looking at it, straight from the net, with su privileges.
it doesn't need to be malicious to break your system.
similar goes for using the '-y' switch with apt and the like. something which many app developers like to post, because they can then claim that their app is "easy to install, just one command" (no painful reading).
that might very well have been the result of a command like that in post #1.
it obviously wasn't calibre in this case, but it could've been something very similar:
etc.
the point is: you're executing untrusted code without looking at it, straight from the net, with su privileges.
it doesn't need to be malicious to break your system.
similar goes for using the '-y' switch with apt and the like. something which many app developers like to post, because they can then claim that their app is "easy to install, just one command" (no painful reading).
don't need to be lectured. i will say it ONE more time and not mention it again. "the line of code was and is DIRECTLY from calibre." now if you need a definition of directly google is your friend. i do not use code from just any site. i would never do that in windows and i sure as ...... wouldn't do it in linux. i ALWAYS make sure i trust the site.
don't need to be lectured. i will say it ONE more time and not mention it again. "the line of code was and is DIRECTLY from calibre." now if you need a definition of directly google is your friend. i do not use code from just any site. i would never do that in windows and i sure as ...... wouldn't do it in linux. i ALWAYS make sure i trust the site.
see, that is windows mentality.
in gnu/linux you install software from repositories, via packet management, and not from websites.
in other words: you trust your distro's package management (and not the site) - like i said: it doesn't have to be malicious to break your system.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.