Difference between revisions of "Pacman troubleshooting"

no edit summary
imported>Verityproductions
imported>Verityproductions
Line 1: Line 1:
= Installation: "Unable to lock database" Error =
= Software Installation =
 
== "Unable to lock database" Error ==


When downloading and installing software from the repositories, a special database lock file will be created in order to ensure that the current installation process is the only one running at that time. Otherwise, attempting to install multiple files from multiple sources simultaneously may corrupt the downloaded files, cause file conflicts - or worse still - damage your system. Once the installation has been completed, the lock file will then be automatically deleted. This error may therefore occur due to two possible reasons:
When downloading and installing software from the repositories, a special database lock file will be created in order to ensure that the current installation process is the only one running at that time. Otherwise, attempting to install multiple files from multiple sources simultaneously may corrupt the downloaded files, cause file conflicts - or worse still - damage your system. Once the installation has been completed, the lock file will then be automatically deleted. This error may therefore occur due to two possible reasons:
Line 13: Line 15:




= Installation: "corrupted database" / "PGP signature" Error =
== "Corrupted database" / "PGP signature" Error ==


We all have our own unique signatures which are used to authenticate who we are and to prevent fraudulent or even malicious activities by others. This is also the case with software packages available from the software repositories. They all contain an encrypted codes (signature keys) unique to their developers to ensure that they are authentic and not malicious in nature.  
We all have our own unique signatures which are used to authenticate who we are and to prevent fraudulent or even malicious activities by others. This is also the case with software packages available from the software repositories. They all contain an encrypted codes (signature keys) unique to their developers to ensure that they are authentic and not malicious in nature.