Command Line Interface (CLI)

A command-line interface or command language interpreter (CLI), also known as command-line user interface, console user interface, and character user interface (CUI), is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines).

Fixing W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: http://dl.hhvm.com trusty InRelease: The following signatures couldn’t be verified because the public key is not available: NO_PUBKEY B4112585D386EB94

An error occurred during the signature verification - NO_PUBKEY B4112585D386EB94 - blackMOREOps 2

I was trying to update one of my server that has some HHVM repositories and received this error “W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: http://dl.hhvm.com trusty InRelease: The following signatures couldn’t be verified …

Read More »

Fixing W: GPG error: http://download.opensuse.org Release: The following signatures were invalid: KEYEXPIRED 1501595774 error

Fixing W GPG error http download.opensuse.org Release The following signatures were invalid KEYEXPIRED 1501595774 error - blackMORE Ops - 1

I was trying to update one of my server that has some Opensuse repositories and received this error “W: GPG error: http://download.opensuse.org Release: The following signatures were invalid: KEYEXPIRED 1501595774” root@someserver:~# apt-get update . . . ---SNIP---- Ign http://download.opensuse.org Translation-en Fetched 481 B in 4s (97 B/s) Reading package lists... …

Read More »

Top 30 SSH shenanigans

Top 30 SSH shenanigans - blackMORE Ops

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with …

Read More »

Privacy Policy on Cookies Usage

Some services used in this site uses cookies to tailor user experience or to show ads.