[04:53] using 13.04 ubuntu.... the lock/restart/shut down window is hanging on the desktop and doesn't respond. What's the process I need to look to kill or restart? [15:52] on Update Manager, there are security updates for 10 files that include headers, images, and kernels. Should I just install all of them? [15:55] earthling_: there really is no "should"... if you want security updates, take them.. is it "dangerous" to upgrade a kernel? it is in this way.. you update, and the newer kernel doesnt support your hardware [15:55] you can boot the older one easily to test. and i (and many others) suggest leaving the last known good kernel in place [15:56] I see. it does seem like there are duplicate headers and images, but maybe they serve different purposes [15:57] earthling_: likely updates.. [15:57] do you usually install all the "important security updates" that are sent to Update Manager? [15:58] earthling_: depends.. [15:59] why wouldn't one be applicable? [15:59] i have machines for audio production that i never upgrade.. used more like appliances.. but, they are not online.. so the security is not as important to me [15:59] oh ok [15:59] for me, the risk of upgrading and having "breakage" is not worth it on the production machine [16:00] but, on my daily netbook, i try and keep current.. though, i do upgrade manually, and read through the upgrades before appying [16:00] applying* [16:01] I like to read through them too. I suppose the odds of a rogue update are rare since many eyes are looking on them [16:02] earthling_: its not a rogue update that is the problem.. its a perfectly legitamate one that breaks fucntionality on your particular hardware [16:03] OR, if you have manually setup graphics modules for example.. and you upgrade the kernel, and hte newer kernel doesnt have that module [16:04] sounds good, have a good one [16:04] earthling_: im just making a distinction.. im not talking about anything malicious [16:04] I see [16:04] the odds of something malicious are low because it is a tightly controlled process of putting in updates? [16:05] reviewed by Canonical [16:05] earthling_: try taking a look at the process by which something could get added to the repos... its quite envolved.. and well reviewed [16:06] have no idea where that is [16:06] ubuntuupdates.org ? [16:06] launchpad? [16:08] earthling_: im just saying.. its not easy.. even if you did want to push a malicious package [16:08] there are trusted keys.. truested access.. build dependencies.. checks for sums.. all kinds of safety in place [16:08] does it happen? sure.. but thats *not* what im talking about here [16:08] i dont remember it having happened to ubuntu [16:09] good to know [16:10] and then there is "security through obscurity" [16:11] we're still a small number of users relative to proprietary OS's [16:11] earthling_: sure.. but again, im not talking about security of the packages.. perfectly legitimate updates that are not compromised can not support your particular hardware case [16:12] I've had a good run of compatibility with my hardware setup, 2 years now without any big issues [16:12] I've stuck with LTS editions [16:13] sure.. but it *can* anc *does* break.. if you are asking why you should or shouldnt.. or might or might not want to upgrade [16:13] though I haven't installed many programs from the software center [16:14] I see [16:14] earthling_: doesnt matter where, or what package manager you use. the software comes from the official repos [16:15] unless you have added a PPA [16:15] don't have any PPAs [16:16] what about flash and java, how secure are they? [16:16] earthling_: as secure as adobe and oracle makes them [16:17] earthling_: java is quite a security issue. but its mostly the web plugin or whatever that is the issue [16:17] do you use them? [16:18] I need to research them more [16:18] earthling_: you should read about that.. us, nor ubuntu, nor cannonical support them [16:19] earthling_: i use them, yes [16:19] always wary of rogue website [16:19] earthling_: ? [16:19] earthling_: be wary of java exploits [16:19] sure [16:20] I read that just visiting rogue websites can compramise your system [16:20] through exploits [16:23] anyways, good chatting [16:23] cya