My setup consists of Mac OS X system that runs RealVNC client to connect to Ubuntu Server machine that is a KVM host via VNC.
When working in guest VM graphical console (as opposed to text console which usually requires additional configuration of guest VM) you may end up clicking into the black area.
That would grab your mouse pointer.
Actually, you don’t have to click VM screen area if all you want to do is type in something but if you must use mouse to click something inside the terminal view it’s going to get locked.
To release your mouse pointer normally you’d press Ctrl_L+Alt_L, as it is stated in the window title.
However, it didn’t work on Mac.
Instead you need to use:
which has the same effect.
PS: interestingly it is one of the top blog posts on this blog. I guess way too many people run into this problem? If you’re one of them let me know in the comments section down below.
What I mean by the title of this post is that sometimes ubuntu folks push security updates to $release-updates repository. I’m told this is so that they propagate faster across all the mirrors. So, when that happens, to APT they look as coming from $release-updates repository ONLY.
Which means unattended-upgrade is fooled into thinking there are no security updates available and so it never installs them automatically despite all the configuration instructing it to do so.
Good thing my little software updates report script can show these security updates regardless, that’s how I know about this.
The trick to dealing with this quirk is as simple as to have a separate APT sources list file for security repositories. You then need to pass this file as an argument to apt commands with the help of the -o flag.
sudo sh -c 'grep ^deb /etc/apt/sources.list |grep securi >> /etc/apt/sources.security.repos.only.list'
apt-get -s dist-upgrade -o Dir::Etc::SourceList=/etc/apt/sources.security.repos.only.list