Solved

Sync Palm with Evolution Works With Root, but not Standard Use

Posted on 2004-10-08
3
483 Views
Last Modified: 2010-04-20
Hello-

I can successfully sync my Palm Pilot IIIc while logged in as root, but we I switch to my user account it doesn't work.  

Thank you.

0
Comment
Question by:aaeandcee
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 5

Expert Comment

by:ddunlea
ID: 12259124
Check the file permissions on the port that the Palm Pilot connects to. Make sure that the use you are logged in as has permissions to read and write the port.
0
 

Author Comment

by:aaeandcee
ID: 12260091
I'm rather new to Linux.  How do I do that?
0
 
LVL 5

Accepted Solution

by:
ddunlea earned 50 total points
ID: 12260152
Well, assuming first of all that you're using a serial port, the port would be /dev/ttyS0 for COM1 or /dev/ttyS1 for COM2 etc.

So at a command prompt, type:

ls -l /dev/ttyS0

And you'll get something like this:

crw-rw----    1 root     uucp       4,  64 2003-10-02 21:45 /dev/ttyS0

If this is the case, then you need to type

chmod 666 /dev/ttyS0

And retry

ls -l /dev/ttyS0

And you should get:

crw-rw-rw-    1 root     uucp       4,  64 2003-10-02 21:45 /dev/ttyS0

The last rw means that all users are now allowed to read and write COM1. Change all ttyS0 references above to the relevant port for your device. If it's not connecting to one of the COM ports, then tell me what port it is connecting to.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
Suggested Courses

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question