Aktuelles
Digital Eliteboard - Das Digitale Technik Forum

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Registriere dich noch heute kostenlos, um Mitglied zu werden! Sobald du angemeldet bist, kannst du auf unserer Seite aktiv teilnehmen, indem du deine eigenen Themen und Beiträge erstellst und dich über deinen eigenen Posteingang mit anderen Mitgliedern unterhalten kannst! Zudem bekommst du Zutritt zu Bereichen, welche für Gäste verwehrt bleiben

Oscam lässt sich weder installieren noch compilieren

    Nobody is reading this thread right now.
# deb cdrom:[Debian GNU/Linux 6.0.6 _Squeeze_ - Official i386 NETINST Binary-1 20120930-15:55]/ squeeze main

#deb cdrom:[Debian GNU/Linux 6.0.6 _Squeeze_ - Official i386 NETINST Binary-1 20120930-15:55]/ squeeze main

deb squeeze main
deb-src squeeze main

deb squeeze/updates main
deb-src squeeze/updates main

# squeeze-updates, previously known as 'volatile'
deb squeeze-updates main
deb-src squeeze-updates main

root@Serveur ~ > cat /etc/apt/sources.list
#

# deb cdrom:[Debian GNU/Linux 6.0.6 _Squeeze_ - Official i386 NETINST Binary-1 20120930-15:55]/ squeeze main

#deb cdrom:[Debian GNU/Linux 6.0.6 _Squeeze_ - Official i386 NETINST Binary-1 20120930-15:55]/ squeeze main

deb squeeze main
deb-src squeeze main

deb squeeze/updates main
deb-src squeeze/updates main

# squeeze-updates, previously known as 'volatile'
deb squeeze-updates main
deb-src squeeze-updates main

[spoiler/]
 
Zuletzt bearbeitet von einem Moderator:
Hi,

schreibe mal das hier in die /etc/apt/sources.list:

Code:
deb http://ftp.de.debian.org/debian/ jessie main contrib non-free
deb-src http://ftp.de.debian.org/debian/ jessie main contrib non-free
deb http://security.debian.org/ jessie/updates main contrib non-free
deb-src http://security.debian.org/ jessie/updates main contrib non-free
deb http://ftp.de.debian.org/debian/ jessie-updates main contrib non-free
deb-src http://ftp.de.debian.org/debian/ jessie-updates main contrib non-free

Danach:

Code:
sudo apt-get autoremove && sudo apt-get update && sudo apt-get upgrade && sudo apt-get dist-upgrade

Gruß
 
Dann mach einfach folgendes:
Code:
nano /etc/apt/sources.list
Und dort überall squeeze durch wheezy ersetzen.
Danach
Code:
apt-get update && apt-get dist-upgrade -y
 
root@Serveur ~ > sudo apt-get autoremove && sudo apt-get update && sudo apt-get upgrade && sudo apt-get dist-upgrade
Paketlisten werden gelesen... Fertig
Abhängigkeitsbaum wird aufgebaut
Statusinformationen werden eingelesen... Fertig
0 aktualisiert, 0 neu installiert, 0 zu entfernen und 342 nicht aktualisiert.
OK jessie/updates Release.gpg
Ign jessie/updates/contrib Translation-de
Ign jessie/updates/contrib Translation-en
Ign jessie/updates/main Translation-de
Ign jessie/updates/main Translation-en
Ign jessie/updates/non-free Translation-de
Ign jessie/updates/non-free Translation-en
OK jessie/updates Release
OK jessie Release.gpg
Ign jessie/contrib Translation-de
Ign jessie/contrib Translation-en
Ign jessie/main Translation-de
Ign jessie/main Translation-en
Ign jessie/non-free Translation-de
Ign jessie/non-free Translation-en
OK jessie-updates Release.gpg
Ign jessie-updates/contrib Translation-de
Ign jessie-updates/contrib Translation-en
Ign jessie-updates/main Translation-de
Ign jessie-updates/main Translation-en
Ign jessie-updates/non-free Translation-de
Ign jessie-updates/non-free Translation-en
OK jessie Release
OK jessie-updates Release
OK jessie/updates/main Sources
OK jessie/updates/contrib Sources
OK jessie/updates/non-free Sources
OK jessie/updates/main i386 Packages
OK jessie/updates/contrib i386 Packages
OK jessie/updates/non-free i386 Packages
OK jessie/main Sources
OK jessie/contrib Sources
OK jessie/non-free Sources
OK jessie/main i386 Packages
OK jessie/contrib i386 Packages
OK jessie/non-free i386 Packages
OK jessie-updates/main Sources
OK jessie-updates/contrib Sources
OK jessie-updates/non-free Sources
Hole:1 jessie-updates/main i386 Packages/DiffIndex [8.392 B]
OK jessie-updates/contrib i386 Packages
Hole:2 jessie-updates/non-free i386 Packages/DiffIndex [736 B]
Es wurden 9.128 B in 0 s geholt (39,0 kB/s)
Paketlisten werden gelesen... Fertig
W: Es gibt keine öffentlichen Schlüssel für die folgenden Schlüssel-IDs:
9D6D8F6BC857C906
W: Es gibt keine öffentlichen Schlüssel für die folgenden Schlüssel-IDs:
7638D0442B90D010
NO_PUBKEY CBF8D6FD518E17E1
W: Es gibt keine öffentlichen Schlüssel für die folgenden Schlüssel-IDs:
7638D0442B90D010
Paketlisten werden gelesen... Fertig
Abhängigkeitsbaum wird aufgebaut
Statusinformationen werden eingelesen... Fertig
Die folgenden Pakete sind zurückgehalten worden:
acpid analog apache2 apache2-mpm-prefork apache2-utils apache2.2-bin apache2.2-common apt apt-utils aptitude aspell aspell-de at base-files base-passwd bash bc
bind9-host bsdmainutils bsdutils busybox ca-certificates console-common console-setup coreutils cpio cpp cron debconf debconf-i18n debianutils dialog
dictionaries-common diffutils dmsetup dnsutils dpkg e2fslibs e2fsprogs exim4 exim4-base exim4-config exim4-daemon-light fail2ban fancontrol file findutils
fontconfig-config ftp gcc gettext-base gnupg grep grub-common grub-pc gzip htop ifupdown info ingerman initramfs-tools initscripts install-info iproute iptables
iputils-ping isc-dhcp-client isc-dhcp-common ispell keyboard-configuration klibc-utils less libacl1 libapache2-mod-perl2 libapache2-mod-php5 libapache2-mod-python
libapr1 libaprutil1 libaprutil1-dbd-sqlite3 libaprutil1-ldap libapt-pkg-perl libaspell15 libattr1 libauthen-pam-perl libblkid1 libbsd-resource-perl libbsd0
libbz2-1.0 libc-bin libc-dev-bin libc6 libc6-dev libc6-i686 libcap2 libcomerr2 libcurl3 libcwidget3 libdevmapper1.02.1 libdrm-intel1 libdrm-radeon1 libdrm2 libedit2
libexpat1 libfontconfig1 libfontenc1 libfreetype6 libgc1c2 libgcc1 libgdbm3 libgeoip1 libgl1-mesa-dri libgl1-mesa-glx libgomp1 libgpg-error0 libgpgme11 libgpm2
libgssapi-krb5-2 libgssglue1 libgssrpc4 libhtml-parser-perl libice6 libidn11 libio-pty-perl libio-socket-ssl-perl libk5crypto3 libkeyutils1 libklibc libkrb5-3
libkrb5support0 libldap-2.4-2 liblocale-gettext-perl liblockfile1 libmagic1 libmailtools-perl libmpfr4 libncurses5 libncursesw5 libnet-libidn-perl
libnet-ssleay-perl libnewt0.52 libnfnetlink0 libnfsidmap2 libonig2 libpam-modules libpam0g libpci3 libpcre3 libpcsclite1 libpng12-0 libpopt0 libpth20 libreadline6
librpcsecgss3 libsasl2-2 libsasl2-modules libselinux1 libsensors4 libsepol1 libsigc++-2.0-0c2a libslang2 libsm6 libsqlite3-0 libss2 libssh2-1 libstdc++6
libtext-charwidth-perl libtext-iconv-perl libusb-0.1-4 libusb-1.0-0 libusb-1.0-0-dev libusb-dev libuuid-perl libuuid1 libwrap0 libwww-perl libx11-6 libx11-data
libxapian22 libxau6 libxaw7 libxcb1 libxdamage1 libxdmcp6 libxext6 libxfixes3 libxft2 libxi6 libxinerama1 libxml2 libxmu6 libxmuu1 libxpm4 libxrender1 libxt6
libxtst6 libxv1 libxxf86dga1 libxxf86vm1 lm-sensors locales login logrotate lsb-release m4 man-db module-init-tools mount mutt nano ncftp ncurses-bin netbase
netcat-traditional nfs-common ntpdate openssh-client openssh-server openssl passwd patch pciutils perl perl-base perl-modules php5 php5-cgi php5-cli php5-common
php5-curl php5-sqlite procps psmisc python python-apt python-minimal python-reportbug reportbug rsyslog sendemail sgml-base sqlite3 sudo sysv-rc sysvinit
sysvinit-utils tar tasksel tasksel-data texinfo ttf-dejavu-core udev util-linux vim-common vim-tiny w3m wget whiptail whois x11-utils xkb-data xml-core xterm
xz-utils zlib1g
Die folgenden Pakete werden aktualisiert (Upgrade):
acpi acpi-support-base adduser apache2-doc apt-listchanges apt-show-versions aspell-de-alt bash-completion binutils bsd-mailx console-data dash dc ddclient
debian-archive-keyring debian-faq ding discover discover-data dmidecode doc-debian geoip-database gpgv groff-base host hostname insserv installation-report
iso-codes libapache2-reload-perl libdevel-symdump-perl libdiscover2 libhtml-format-perl libhtml-tree-perl libpam-runtime libqdbm14 libsqlite0 libtimedate-perl
liburi-perl libutempter0 linux-base linux-libc-dev locate lockfile-progs lsb-base lsof manpages manpages-de manpages-dev mawk mime-support mlocate ncurses-base
ncurses-term net-tools openssh-blacklist openssh-blacklist-extra os-prober procmail python-apt-common python-support readline-common sed sensible-utils ssl-cert
tcpd time tofrodos traceroute trans-de-en tzdata ucf usbutils wamerican wngerman x11-common xauth xbitmaps
78 aktualisiert, 0 neu installiert, 0 zu entfernen und 264 nicht aktualisiert.
Es müssen noch 0 B von 32,4 MB an Archiven heruntergeladen werden.
Nach dieser Operation werden 4.449 kB Plattenplatz zusätzlich benutzt.
Möchten Sie fortfahren [J/n]? j
Lese Changelogs... Fertig

During the upgrade from earlier versions, you will be prompted to
update configuration files which refer to device names that may
change. You can choose to do this yourself or to follow an automatic
upgrade process. All changed configuration files are backed up with
a suffix of '.old' (or '^old' in one case).

-- Ben Hutchings <ben@decadent.org.uk> Wed, 16 Mar 2011 13:19:34 +0000

lsb (4.1+Debian1) unstable; urgency=low

This version implements a new "Fancy output" in the form of "[....] "
blocks prepended to the daemon status messages:

Before:
Starting/stopping long daemon name: daemond daemon2d
After:
[....] Starting/stopping long daemon name: daemond daemon2d

This block will become either a green [ ok ], a yellow [warn]
or a red [FAIL] depending on the daemon exit status.

The "Fancy output" can be disabled by setting the FANCYTTY variable to 0
in the /etc/lsb-base-logging.sh configuration file.

-- Didier Raboud <odyx@debian.org> Thu, 19 Apr 2012 11:25:01 +0200

pam (1.1.2-1) unstable; urgency=low

* Name of option for minimum Unix password length has changed

The Debian-specific 'min=n' option to pam_unix for specifying minimum
lengths for new passwords has been replaced by a new upstream option
called 'minlen=n'. If you are using 'min=n' in
/etc/pam.d/common-password, this will be migrated to the new option name
for you on upgrade. If you have configured pam_unix password changing
elsewhere on your system, such as in a PAM profile under
/usr/share/pam-configs or in other files in /etc/pam.d, you will need to
update them by hand for this change.

-- Steve Langasek <vorlon@debian.org> Tue, 31 Aug 2010 23:09:30 -0700

(
[spoiler/]
 
Zurück
Oben