li_software
Verschillen
Dit geeft de verschillen weer tussen de geselecteerde revisie en de huidige revisie van de pagina.
| Volgende revisie | Vorige revisie | ||
| li_software [2014/04/02 16:25] – aangemaakt admpvi | li_software [Ongeldige datum] (huidige) – verwijderd - Externe bewerking (Ongeldige datum) 127.0.0.1 | ||
|---|---|---|---|
| Regel 1: | Regel 1: | ||
| - | ====Software & Installatie==== | ||
| - | ===Wireshark=== | ||
| - | == Enabling Non-root Capture == | ||
| - | * Stap 1: Install setcap | ||
| - | |||
| - | setcap is part of the libcap2-bin package. | ||
| - | |||
| - | stretch@Sandbox: | ||
| - | |||
| - | * Stap 2: Maak een Wireshark Group (Optioneel) | ||
| - | |||
| - | Since the application we'll be granting heightened capabilities can by default be executed by all users, you may wish to add a designated group for the Wireshark family of utilities (and similar applications) and restrict their execution to users within that group. However, this step isn't strictly necessary. | ||
| - | |||
| - | root@Sandbox# | ||
| - | root@Sandbox# | ||
| - | |||
| - | After adding yourself to the group, your normal user may have to log out and back in. Or, you can run newgrp to force the effect of the new group (you' | ||
| - | |||
| - | stretch@Sandbox$ newgrp wireshark | ||
| - | |||
| - | We assign the dumpcap executable to this group instead of Wireshark itself, as dumpcap is responsible for all the low-level capture work. Changing its mode to 750 ensures only users belonging to its group can execute the file. | ||
| - | |||
| - | root@Sandbox# | ||
| - | root@Sandbox# | ||
| - | |||
| - | * Step 3: Grant Capabilities | ||
| - | |||
| - | Granting capabilities with setcap is a simple matter: | ||
| - | |||
| - | root@Sandbox# | ||
| - | |||
| - | In case you're wondering, that =eip bit after the capabilities list grants them in the effective, inheritable, | ||
| - | |||
| - | To verify our change, we can use getcap: | ||
| - | |||
| - | root@Sandbox# | ||
| - | |||
| - | de output moet zijn : / | ||
| - | |||
| - | You may need to log out and back in for the new group assignment to take effect. | ||
| - | Now, as the user who we added to the wireshark group in step 2, execute Wireshark. You should now see the full list of available adapters and can begin sniffing. (If not, double-check that the wireshark group is listed in the output of groups.) | ||
| - | |||
| - | ==Links== | ||
| - | [http:// | ||
| - | ---- | ||
| - | ===Timidity / Tuxguitar=== | ||
| - | == Geen geluid in Tuxguitar == | ||
| - | * Start op de cli timidity met de volgende parameters: | ||
| - | pvi@laptop-pvi ~ $ timidity -iA -Os | ||
| - | Requested buffer size 32768, fragment size 8192 | ||
| - | ALSA pcm ' | ||
| - | TiMidity starting in ALSA server mode | ||
| - | Opening sequencer port: 129:0 129:1 129:2 129:3 | ||
| - | * Wijzig nu de geluidsinstelling van Tuxguitar, zet midi op port 129:0 (of anders) | ||
li_software.1396448753.txt.gz · Laatst gewijzigd: 2022/05/06 21:58 (Externe bewerking)
