Advisories
Mandriva Advisories
|
![]() |
Problem Description |
With the change of the distribution to Mandriva, and the various domain
name changes, it is necessary to update mdkonline to point to the
correct servers. Updated packages resolve this issue.
Updated Packages |
Mandrakelinux 10.0
7500d5f5ea20540dde588aca38111779 10.0/RPMS/mdkonline-1.2-1.1.100mdk.noarch.rpm 64d44b4c8befd8b0eaae67e8cd1f02f5 10.0/SRPMS/mdkonline-1.2-1.1.100mdk.src.rpm
Mandrakelinux 10.0/AMD64
7500d5f5ea20540dde588aca38111779 amd64/10.0/RPMS/mdkonline-1.2-1.1.100mdk.noarch.rpm 64d44b4c8befd8b0eaae67e8cd1f02f5 amd64/10.0/SRPMS/mdkonline-1.2-1.1.100mdk.src.rpm
Mandrakelinux 10.1
c9fbe45282b5063d258a070a36cf2ab1 10.1/RPMS/mdkonline-1.2-1.1.101mdk.noarch.rpm 58681e99a503a16b2bed671c76e6b7cc 10.1/SRPMS/mdkonline-1.2-1.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64
c9fbe45282b5063d258a070a36cf2ab1 x86_64/10.1/RPMS/mdkonline-1.2-1.1.101mdk.noarch.rpm 58681e99a503a16b2bed671c76e6b7cc x86_64/10.1/SRPMS/mdkonline-1.2-1.1.101mdk.src.rpm
Corporate Server 3.0
ea920a85f9f5c0a65a5c19b678c03bc5 corporate/3.0/RPMS/mdkonline-1.2-1.1.C30mdk.noarch.rpm cf6a734d6ca827704832e88a9e5b8169 corporate/3.0/SRPMS/mdkonline-1.2-1.1.C30mdk.src.rpm
Corporate Server 3.0/X86_64
ea920a85f9f5c0a65a5c19b678c03bc5 x86_64/corporate/3.0/RPMS/mdkonline-1.2-1.1.C30mdk.noarch.rpm cf6a734d6ca827704832e88a9e5b8169 x86_64/corporate/3.0/SRPMS/mdkonline-1.2-1.1.C30mdk.src.rpm
Multi Network Firewall 2.0
ab4de82b2a15a3067bb4b136ce59283f mnf/2.0/RPMS/mdkonline-1.2-1.2.M20mdk.noarch.rpm 4a30c86706c783b108675ab388316807 mnf/2.0/SRPMS/mdkonline-1.2-1.2.M20mdk.src.rpm
Mandriva Linux LE2005
c634b26cf146f96fa39302fcfc1a7879 10.2/RPMS/mdkonline-1.2-1.1.102mdk.noarch.rpm 200b2e9e66486a1db0963bd6ac637851 10.2/SRPMS/mdkonline-1.2-1.1.102mdk.src.rpm
Mandriva Linux LE2005/X86_64
c634b26cf146f96fa39302fcfc1a7879 x86_64/10.2/RPMS/mdkonline-1.2-1.1.102mdk.noarch.rpm 200b2e9e66486a1db0963bd6ac637851 x86_64/10.2/SRPMS/mdkonline-1.2-1.1.102mdk.src.rpm
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.