Iread this idea was described in
brainstorm.ubuntu.com, but it feels it is dead, and the forums are full of examples of updates breaking things, that's why I feel something needs to be done about this topic.
Maybe it wouldn't be the best idea to go without the -y switch - to have more control about the process (to avoid broken dependencies). Most of you wouldn't break their finger while do a few verification "y"
Unfortunately there is no way to do this yet. Filesystem level snapshot/rollback is one of the features of the upcoming btrfs, but it has a ways yet to become feature complete and stable enough to use as the default filesystem.
When doing a major upgrade, I clone the disk using Clonezilla. Burn it on a CD, have a spare (external) HDD available and follow the instructions on the Clonezilla LiveCD. Choose the partition-image mode, this uses the least space.
If you think you've broken your system (or wish to revert any changes), simply boot in the Clonezilla LiveCD, select the image on your (external) HDD and restore it. As these images are a literal copy of every bit on your disk, this might take a few hours depending on your disk speed and connection speed (the connection between the data, usually an external USB HDD, and the computer).
You can install an older version of a given package (downgrade) with apt or dpkg easily. Finding an older version of the package is the problem as these often disappear from the pool and mirrors as updates roll in.
If you install the package from an install CD or an outdated mirror or a cache, you will also need to keep it pinned to the old version so it won't be upgraded until you allow that. Which means you have to watch for updates and test them until your problem is fixed. This is of course a problem since meanwhile (maybe forever) you'll be left with the unfixed, possibly insecure package. That means every user with some kind of system issue will be left in some random state until they can resolve it.
All software also isn't forwards compatible, so an older version of something may well not behave right when fed with newer configuration or data files. Obviously this is impossible to solve unless you also roll back all user data to a state before the upgrade was done.
It would be great if there was a way to do this, but it is massively problematic. Anyone who thinks there is a coherent solution should write a proposal and invite comments or, better yet, make a proof of concept solution (code, script, document). Trolling and whining is not constructive.
Because there is no clean technical solution, most software is developed (and integrated) with "the only way is forward" mentality. Trying to manage outdated versions is a waste of everyone's time. Found problems are fixed in newer versions ASAP. As a minor solution, I would like to see an archive of previous package versions kept somewhere for the occasional temporary workaround.
Meanwhile you can report bugs and don't expect bleeding edge software to never fail. A fix, once found, should be in the next update. Devs are humans (mostly), and therefore fallible. Computers are fiddly and full of insane variety and detail. Defensively maintained systems using well-supported components and stable integrated software distribution can be very stable without becoming insecure or non-upgradeable despite this.
Type "sudo apt autoremove" through terminal and press enter key on the keyboard. It will autoremove all the redundant and unwanted library packages (and hopefully those packages that broke your system).
For any performance that incorporates backing tracks or other pre-recorded elements, reliability is crucial to ensuring a smooth performance. Unfortunately, smartphone batteries die, laptops freeze up, and Murphy's Law will always apply. The Backtrack creates a redundant system to ensure that you can instantly switch over to a backup device should any problems arise with your primary playback source. This can be accomplished easily with the push of a button on the Backtrack or via a remote JR-2 footswitch, giving you peace of mind and freeing you up to focus on your performance without worry.
Take the balanced or unbalanced line-level outputs of two stereo amp modeling devices into the Backtrack; it will automatically balance the signal at the XLR outputs to the PA. Should one amp simulator go down, use the JR-2 to easily switch to the backup unit.
The Radial SW4 is a four channel balanced audio switcher designed for wireless systems, mixing consoles and digital guitar processors to provide backup or greater operational flexibility in a live performance or concert setting.
Penetration (Pen) testing and security auditing are now part of every system administrator's "other duties as assigned." BackTrack Linux ( -
linux.org/) is a custom distribution designed for security testing for all skill levels from novice to expert. It is the largest collection of wireless hacking, server exploiting, web application assessing, social-engineering tools available in a single Linux distribution.
BackTrack Linux is a fine example of a specialized Linux distribution. Its only purpose is to test your network, devices, and systems for security vulnerabilities. BackTrack is packed with every security and hacker tool used by security professionals and professional hackers. If you're looking for all of the tools in one place, this is it.
You must love the command line to use this distro, although it does contain a few graphical tools, such as zenmap and wireshark. Even in graphical mode (which comes up with the Gnome desktop), most of the applications open in a terminal window. Fortunately, each command line application opens and displays the help text so you can refer to the command reference right there on the screen.
BackTrack is a highly customized, Debian-based Linux distribution that you should only update through BackTrack's own repositories ( -
linux.org/).
BackTrack Linux contains more than 300 security tools and utilities that are all open source. Many security professionals prefer them over expensive commercial programs. And, hackers certainly prefer hundreds of no cost, high-end applications to anything commercial. One reason for BackTrack's popularity is its anonymity. You don't have to register (Registration is optional). No names, bank accounts, or user accounts are associated with obtaining the ISO image. Additionally, no spyware will report back to any vendor.
In short, BackTrack's tagline says it all: "The quieter you become, the more you are able to hear."
The distro is a bootable, live DVD that's approximately 2GB in size. If you decide to install it to a hard disk or USB drive, the installation expands to almost 7GB. BackTrack is perfectly suited to installation to a USB drive, so that it's portable and stealthier than a hard disk install. A 16GB USB drive holds the installation with plenty of room for saving files and data.
Remember that you'll need to save your data from your information gathering exercises so that you can write security audit reports for your clients. The Live DVD is powerful but considerably slower than a hard disk or USB disk. If you use the DVD, use a USB drive or mountable hard disk partition to save the information you gather.
Under each of the main headings, you'll find subheadings. For example, under the first selection, Information Gathering, you have Network Analysis, Web Application Analysis, Database Analysis, and Wireless Analysis. Under each of those subheadings, you have multiple types of analyses. The Network Analysis subheading contains an extensive list of network analysis types from DNS Analysis to VPN Analysis, as shown in Figure 1.
At the final level, you'll find multiple choices for each type of analysis. For example, under Network Scanners, you have a list of 11 different network scanning tools from which to choose. See Figure 2.
But those tools, which are supposed to make schools safer and more efficient, have become a flashpoint for controversy. Several states are now banning or restricting the use of the technology in schools, as worries over student privacy have risen amid breaches of government and commercial computer databases.
This year, Florida became the first state to ban the use of biometric identification in its schools. Kansas said biometric data cannot be collected without student or parental consent. New Hampshire, Colorado and North Carolina said the state education departments cannot collect and store biometric data as part of student records.
Jay Fry, CEO of the biometric-in-schools firm identiMetrics, said biometric identification is used in more than 1,000 school districts in 40 states from Alaska to Long Island, New York. West Virginia uses the technology in 70 percent of its 57 school districts, he said.
Other schools are embracing RFID systems. Students are issued badges or tags with embedded chips that either broadcast a radio signal, (battery-powered active systems) or are read when they are near a radio-frequency reader (passive systems). Such tags are widely used by government and the private sector for building security and for tracking packages.
3a8082e126