Where can I get Woof?
Where can I get Woof?
Ok. I feel like a moron.
I cannot remember where to get a copy of Woof from and I know it's something that is staring me in the face laughing hysterically at me.
Feel free to laugh at me...
I cannot remember where to get a copy of Woof from and I know it's something that is staring me in the face laughing hysterically at me.
Feel free to laugh at me...
[url=http://totalelectronics.us]TotalElectronics.us[/url]
Gotta "git" yer feet wet >> http://www.murga-linux.com/puppy/viewtopic.php?t=90822
>>> Living with the immediacy of death helps you sort out your priorities. It helps you live a life less trivial <<<
On a fresh frugal install (with devx) of upup-3.9.9.1, without updating openssl, this works:
mkdir root/Downloads/woof-CE
cd root/Downloads/woof-CE
git config --global http.sslverify false
git clone https://github.com/puppylinux-woof-CE/woof-CE.git
Result:
Cloning into 'woof-CE'...
remote: Counting objects: 19291, done.
remote: Compressing objects: 100% (13/13), done.
remote: Total 19291 (delta 5), reused 1 (delta 0)
Receiving objects: 100% (19291/19291), 25.71 MiB | 378 KiB/s, done.
Resolving deltas: 100% (10571/10571), done.
mkdir root/Downloads/woof-CE
cd root/Downloads/woof-CE
git config --global http.sslverify false
git clone https://github.com/puppylinux-woof-CE/woof-CE.git
Result:
Cloning into 'woof-CE'...
remote: Counting objects: 19291, done.
remote: Compressing objects: 100% (13/13), done.
remote: Total 19291 (delta 5), reused 1 (delta 0)
Receiving objects: 100% (19291/19291), 25.71 MiB | 378 KiB/s, done.
Resolving deltas: 100% (10571/10571), done.
You should of course run
git config --global http.sslverify true
afterward, and update openssl to version 1.0.1g or newer (or downgrade to version 1.0.0.(x))
From http://en.wikipedia.org/wiki/Heartbleed
Affected OpenSSL installations
The affected versions of OpenSSL are OpenSSL 1.0.1 through 1.0.1f (inclusive). Later versions (1.0.1g and ulterior) and previous versions (1.0.0 branch and older) are not vulnerable. Installations of the affected versions are vulnerable unless OpenSSL was compiled with -DOPENSSL_NO_HEARTBEATS.
git config --global http.sslverify true
afterward, and update openssl to version 1.0.1g or newer (or downgrade to version 1.0.0.(x))
From http://en.wikipedia.org/wiki/Heartbleed
Affected OpenSSL installations
The affected versions of OpenSSL are OpenSSL 1.0.1 through 1.0.1f (inclusive). Later versions (1.0.1g and ulterior) and previous versions (1.0.0 branch and older) are not vulnerable. Installations of the affected versions are vulnerable unless OpenSSL was compiled with -DOPENSSL_NO_HEARTBEATS.