Demo Discussion
Forum Config Examples Contributions Vulnerabilities
  Discussion forum about ELOG, Page 762 of 796  Not logged in ELOG logo
ID Dateup Icon Author Author Email Category OS ELOG Version Subject Text Attachments
  69506   Sat Apr 16 10:37:24 2022 Question Maarten de Jongmjg@nikhef.nlQuestionLinux3.1.4Download attachments from command lineWould it be possible to download attachments
(e.g. with elog or wget) from the command
line?
  
  69507   Mon Apr 18 19:16:36 2022 Reply Florian Heiglme@florianheigl.meQuestionWindows3.1.4-a04faf9fRe: Vulnerability?> > I trust Stefan is reading this thread
and will do something about it. My vote would
> > be to remove the download link to the
  
  69508   Mon Apr 18 21:01:23 2022 Reply Konstantin Olchanskiolchansk@triumf.caQuestionLinuxnot knownRe: recovery of elog from backup diskunfortunately instructions do not exist to
cover every possible situation.
  
  69509   Tue Apr 19 10:24:47 2022 Reply Stefan Rittstefan.ritt@psi.chQuestionLinux3.1.4Re: Download attachments from command lineSure. Just figure out the URL from your
browser and then use it in wget, e.g.

  
  69510   Tue Apr 19 15:47:59 2022 Reply Daniel Pfuhldaniel.pfuhl@medizin.uni-leipzig.deQuestionWindows3.1.4-a04faf9fRe: Vulnerability?> I've built the last C version of elog in
git, revision 1ebfd06c using mingw-64 ; the
resulting binaries work for me on Windows
  
  69511   Tue Apr 19 17:02:57 2022 Reply Jan Just Keijserjanjust@nikhef.nlQuestionWindows3.1.4-a04faf9fRe: Vulnerability?> > I've built the last C version of elog
in git, revision 1ebfd06c using mingw-64
; the resulting binaries work for me on Windows
  
  69512   Tue Apr 19 20:13:04 2022 Reply Daniel Pfuhldaniel.pfuhl@medizin.uni-leipzig.deQuestionWindows3.1.4-a04faf9fRe: Vulnerability?> > > I've built the last C version of elog
in git, revision 1ebfd06c using mingw-64
; the resulting binaries work for me on Windows
  
  69513   Tue Apr 19 21:15:19 2022 Reply Konstantin Olchanskiolchansk@triumf.caQuestionWindows3.1.4-a04faf9fRe: Vulnerability?> it would be good if the current state was
listed in https://elog.psi.ch/elogs/Vulnerabilities/
> It seems there's now updated builds for
  
ELOG V3.1.5-2eba886