[08:27] <lordievader> Good morning.
[14:00] <PeterGriffin> Hello. I have a production LAMP server and I need to install somepackages but apt sais that they deppend on linux-image-3.13.0-54-generic and I need to use apt-get -f install in order to resolve them. My current version is linux-image-3.13.0-53-generic. My question is  - is there any risk in updating to linux-image-3.13.0-54-generic?
[14:12] <AvatarA> there's no risk and you should probably update that anyway
[14:16] <PeterGriffin> AvatarA: will it require reboot
[14:20] <AvatarA> until you reboot you'll still be using 0-53
[14:21] <PeterGriffin> I see. Thank you.
[14:31] <bekks> PeterGriffin: Which Ubuntu do you have?
[14:31] <PeterGriffin> 14.04
[14:32] <bekks> Then you should read this: https://wiki.ubuntu.com/Kernel/LTSEnablementStack
[14:32] <bekks> The current kernel for 14.04.3 is 3.19.x
[14:34] <PeterGriffin> thanks
[15:02] <patdk-lap> enablement stack is a completely different thing
[15:02] <patdk-lap> and wouldn't solve his issue
[15:02] <patdk-lap> it will cause him more issues infact, based on what he is attempting
[15:05] <dbugger> Hey guys. I have been informed by my server provider that I have the Cutwail spambot in one of my servers. Does any one know how can I remove it? I am using 14.04
[15:06] <patdk-lap> that is the least of your worries
[15:06] <patdk-lap> if you have one, you have others
[15:06] <dbugger> patdk-lap, that is for me?
[15:06] <patdk-lap> normal removal steps, involve reinstalling
[15:07] <dbugger> So there is no way to save the system without starting over?
[15:07] <patdk-lap> cause you have to make sure you remove every single thing they did, and everything they looked at
[15:07] <patdk-lap> sure, you can save it
[15:07] <patdk-lap> but I wouldn't *use* it
[15:07] <patdk-lap> keeping it offline for reference purposes only
[15:08] <dbugger> Well, I use that machine as proxy, since I need a fixed IP... It is kinda important... :(
[15:08] <patdk-lap> you sure it is infected then?
[15:09] <dbugger> Yep. DigitalOcean send me a ticket, giving me all the info
[15:09] <dbugger> If I dont fix it, they might even suspend my account
[15:09] <patdk-lap> I use the machine as proxy, means, anything that uses that machine as a proxy, could be infected, and not the proxy itself
[15:09] <jelly> > It affects computers running Microsoft Windows.
[15:09] <jelly> unless wikipedia lies
[15:09] <dbugger> jelly, you mean that Cutwail spambot is just for Windows?
[15:10] <jelly> yes, except it's not me that does the meaning but some author of https://en.wikipedia.org/wiki/Cutwail_botnet
[15:11] <dbugger> In that case, it could mean that someone in my team, that is using that proxy, is infected?
[15:11] <jelly> yes
[15:11] <dbugger> Ok, that is interesting....
[15:11] <dbugger> Windows Defender doesnt seem to inform me of anything. I will talk with other teammembers
[15:12] <jelly> access logs of said proxy might show clues as to the source
[15:12] <patdk-lap> heh? windos defender isn't made to locate that
[18:55] <dbugger> What is the best way to check if a Ubuntu server has been infecter with some sort of spambot or any malicious software? Is there something like "Microsoft Defender" for Ubuntu servers?
[18:55] <dbugger> *infected
[19:03] <bearface> clamav?
[19:03] <teward> dbugger: there's no 'antivirus' no, but you can start by seeing if you recognize any suspicious processes running
[19:03] <teward> dbugger: clamav *may* help, but if you suspect you're infected by a spambot or something you should probably disconnect the thing from the 'net to limit further malicious activity
[21:13] <jvwjgames> How do I fix unmet dependencies
[21:13] <jvwjgames> I have tried everything
[21:14] <jvwjgames> Apt-get install -f I have also tried apt-get install packetfence still doesn't work.
[21:19] <jvwjgames> Any ideas
[21:34] <qman__> jvwjgames: that normally only happens when you add non-ubuntu sources to ubunru
[21:36] <qman__> And once you do that, you pretty much hose your install
[21:36] <qman__> Sometimes it's possible to fix if it's just a few packages, but if you did something like install a non-ubuntu libc, forget it
[22:10] <bwlang> Hi… i’ve just upgraded a server from 12.04 to 15.04.  I had one upstart script that I want to continue to use… it detected CD insertion and ran a shell script. Should this be done in systemd now?  I can’t seem to find any information about how to respond to events from dbus ( i think…)
[22:10] <bwlang> I had this before: start on block-device-changed   and then checkd like this: if [ "${ID_CDROM_MEDIA_STATE}" = 'complete' ] ; then ...
[22:11] <bwlang> Any hints?
[23:19] <sarnold> bwlang: the "foo.path" bit here looks useful https://wiki.ubuntu.com/SystemdForUpstartUsers
[23:48] <bwlang> sarnold: hmm - maybe, still not sure how I trigger this I don’t think PathExistsGlob will do … I’ll try.
[23:50] <sarnold> bwlang: yeah, it might not be perfect, especially if there's no filesystem on the cd yet..