=== Cinos_ is now known as Cinos === cipi is now known as CiPi === Lcawte|Away is now known as Lcawte [08:27] Good morning. === masACC is now known as maswan === CiPi is now known as cipi === Lcawte is now known as Lcawte|Away === Lcawte|Away is now known as Lcawte === ztane_ is now known as ztane [14:00] Hello. I have a production LAMP server and I need to install somepackages but apt sais that they deppend on linux-image-3.13.0-54-generic and I need to use apt-get -f install in order to resolve them. My current version is linux-image-3.13.0-53-generic. My question is - is there any risk in updating to linux-image-3.13.0-54-generic? [14:12] there's no risk and you should probably update that anyway [14:16] AvatarA: will it require reboot [14:20] until you reboot you'll still be using 0-53 [14:21] I see. Thank you. [14:31] PeterGriffin: Which Ubuntu do you have? [14:31] 14.04 [14:32] Then you should read this: https://wiki.ubuntu.com/Kernel/LTSEnablementStack [14:32] The current kernel for 14.04.3 is 3.19.x [14:34] thanks [15:02] enablement stack is a completely different thing [15:02] and wouldn't solve his issue [15:02] it will cause him more issues infact, based on what he is attempting [15:05] Hey guys. I have been informed by my server provider that I have the Cutwail spambot in one of my servers. Does any one know how can I remove it? I am using 14.04 [15:06] that is the least of your worries [15:06] if you have one, you have others [15:06] patdk-lap, that is for me? [15:06] normal removal steps, involve reinstalling [15:07] So there is no way to save the system without starting over? [15:07] cause you have to make sure you remove every single thing they did, and everything they looked at [15:07] sure, you can save it [15:07] but I wouldn't *use* it [15:07] keeping it offline for reference purposes only [15:08] Well, I use that machine as proxy, since I need a fixed IP... It is kinda important... :( [15:08] you sure it is infected then? [15:09] Yep. DigitalOcean send me a ticket, giving me all the info [15:09] If I dont fix it, they might even suspend my account [15:09] I use the machine as proxy, means, anything that uses that machine as a proxy, could be infected, and not the proxy itself [15:09] > It affects computers running Microsoft Windows. [15:09] unless wikipedia lies [15:09] jelly, you mean that Cutwail spambot is just for Windows? [15:10] yes, except it's not me that does the meaning but some author of https://en.wikipedia.org/wiki/Cutwail_botnet [15:11] In that case, it could mean that someone in my team, that is using that proxy, is infected? [15:11] yes [15:11] Ok, that is interesting.... [15:11] Windows Defender doesnt seem to inform me of anything. I will talk with other teammembers [15:12] access logs of said proxy might show clues as to the source [15:12] heh? windos defender isn't made to locate that [18:55] What is the best way to check if a Ubuntu server has been infecter with some sort of spambot or any malicious software? Is there something like "Microsoft Defender" for Ubuntu servers? [18:55] *infected [19:03] clamav? [19:03] dbugger: there's no 'antivirus' no, but you can start by seeing if you recognize any suspicious processes running [19:03] dbugger: clamav *may* help, but if you suspect you're infected by a spambot or something you should probably disconnect the thing from the 'net to limit further malicious activity === Darkman802_ is now known as Darkman802 [21:13] How do I fix unmet dependencies [21:13] I have tried everything [21:14] Apt-get install -f I have also tried apt-get install packetfence still doesn't work. [21:19] Any ideas [21:34] jvwjgames: that normally only happens when you add non-ubuntu sources to ubunru [21:36] And once you do that, you pretty much hose your install [21:36] Sometimes it's possible to fix if it's just a few packages, but if you did something like install a non-ubuntu libc, forget it [22:10] Hi… i’ve just upgraded a server from 12.04 to 15.04. I had one upstart script that I want to continue to use… it detected CD insertion and ran a shell script. Should this be done in systemd now? I can’t seem to find any information about how to respond to events from dbus ( i think…) [22:10] I had this before: start on block-device-changed and then checkd like this: if [ "${ID_CDROM_MEDIA_STATE}" = 'complete' ] ; then ... [22:11] Any hints? === Lcawte is now known as Lcawte|Away [23:19] bwlang: the "foo.path" bit here looks useful https://wiki.ubuntu.com/SystemdForUpstartUsers [23:48] sarnold: hmm - maybe, still not sure how I trigger this I don’t think PathExistsGlob will do … I’ll try. [23:50] bwlang: yeah, it might not be perfect, especially if there's no filesystem on the cd yet..