[04:53] <hatetank138> using 13.04 ubuntu.... the lock/restart/shut down window is hanging on the desktop and doesn't respond.  What's the process I need to look to kill or restart?
[15:52] <earthling_> on Update Manager, there are security updates for 10 files that include headers, images, and kernels.  Should I just install all of them?
[15:55] <holstein> earthling_: there really is no "should"... if you want security updates, take them.. is it "dangerous" to upgrade a kernel? it is in this way.. you update, and the newer kernel doesnt support your hardware
[15:55] <holstein> you can boot the older one easily to test. and i (and many others) suggest leaving the last known good kernel in place
[15:56] <earthling_> I see. it does seem like there are duplicate headers and images, but maybe they serve different purposes
[15:57] <holstein> earthling_: likely updates..
[15:57] <earthling_> do you usually install all the "important security updates" that are sent to Update Manager?
[15:58] <holstein> earthling_: depends..
[15:59] <earthling_> why wouldn't one be applicable?
[15:59] <holstein> i have machines for audio production that i never upgrade.. used more like appliances.. but, they are not online.. so the security is not as important to me
[15:59] <earthling_> oh ok
[15:59] <holstein> for me, the risk of upgrading and having "breakage" is not worth it on the production machine
[16:00] <holstein> but, on my daily netbook, i try and keep current.. though, i do upgrade manually, and read through the upgrades before appying
[16:00] <holstein> applying*
[16:01] <earthling_> I like to read through them too.  I suppose the odds of a rogue update are rare since many eyes are looking on them
[16:02] <holstein> earthling_: its not a rogue update that is the problem.. its a perfectly legitamate one that breaks fucntionality on your particular hardware
[16:03] <holstein> OR, if you have manually setup graphics modules for example.. and you upgrade the kernel, and hte newer kernel doesnt have that module
[16:04] <earthling_> sounds good, have a good one
[16:04] <holstein> earthling_: im just making a distinction.. im not talking about anything malicious
[16:04] <earthling_> I see
[16:04] <earthling_> the odds of something malicious are low because it is a tightly controlled process of putting in updates?
[16:05] <earthling_> reviewed by Canonical
[16:05] <holstein> earthling_: try taking a look at the process by which something could get added to the repos... its quite envolved.. and well reviewed
[16:06] <earthling_> have no idea where that is
[16:06] <earthling_> ubuntuupdates.org ?
[16:06] <earthling_> launchpad?
[16:08] <holstein> earthling_: im just saying.. its not easy.. even if you did want to push a malicious package
[16:08] <holstein> there are trusted keys.. truested access.. build dependencies.. checks for sums.. all kinds of safety in place
[16:08] <holstein> does it happen? sure.. but thats *not* what im talking about here
[16:08] <holstein> i dont remember it having happened to ubuntu
[16:09] <earthling_> good to know
[16:10] <earthling_> and then there is "security through obscurity"
[16:11] <earthling_> we're still a small number of users relative to proprietary OS's
[16:11] <holstein> earthling_: sure.. but again, im not talking about security of the packages.. perfectly legitimate updates that are not compromised can not support your particular hardware case
[16:12] <earthling_> I've had a good run of compatibility with my hardware setup, 2 years now without any big issues
[16:12] <earthling_> I've stuck with LTS editions
[16:13] <holstein> sure.. but it *can* anc *does* break.. if you are asking why you should or shouldnt.. or might or might not want to upgrade
[16:13] <earthling_> though I haven't installed many programs from the software center
[16:14] <earthling_> I see
[16:14] <holstein> earthling_: doesnt matter where, or what package manager you use. the software comes from the official repos
[16:15] <holstein> unless you have added a PPA
[16:15] <earthling_> don't have any PPAs
[16:16] <earthling_> what about flash and java, how secure are they?
[16:16] <holstein> earthling_: as secure as adobe and oracle makes them
[16:17] <holstein> earthling_: java is quite a security issue. but its mostly the web plugin or whatever that is the issue
[16:17] <earthling_> do you use them?
[16:18] <earthling_> I need to research them more
[16:18] <holstein> earthling_: you should read about that.. us, nor ubuntu, nor cannonical support them
[16:19] <holstein> earthling_: i use them, yes
[16:19] <earthling_> always wary of rogue website
[16:19] <holstein> earthling_: ?
[16:19] <holstein> earthling_: be wary of java exploits
[16:19] <earthling_> sure
[16:20] <earthling_> I read that just visiting rogue websites can compramise your system
[16:20] <earthling_> through exploits
[16:23] <earthling_> anyways, good chatting
[16:23] <earthling_> cya