Solved

problem when install Ktorrent

Posted on 2007-11-19
3
1,038 Views
Last Modified: 2012-08-14
my os is CentOS
when i install Ktorrent igot that error msg
ktorrent-2.2.1-1.el5.rf.i 100% |=========================|  69 kB    00:00
---> Package ktorrent.i386 0:2.2.1-1.el5.rf set to be updated
--> Running transaction check
--> Processing Dependency: rtld(GNU_HASH) for package: ktorrent
--> Processing Dependency: libavahi-common.so.3 for package: ktorrent
--> Processing Dependency: libavahi-client.so.3 for package: ktorrent
--> Processing Dependency: libc.so.6(GLIBC_2.4) for package: ktorrent
--> Finished Dependency Resolution
Error: Missing Dependency: rtld(GNU_HASH) is needed by package ktorrent
Error: Missing Dependency: libavahi-common.so.3 is needed by package ktorrent
Error: Missing Dependency: libavahi-client.so.3 is needed by package ktorrent
Error: Missing Dependency: libc.so.6(GLIBC_2.4) is needed by package ktorrent
0
Comment
Question by:qweasd206
3 Comments
 
LVL 13

Accepted Solution

by:
WizRd-Linux earned 500 total points
ID: 20332809
yum install avahi.i386
yum install glibc.i386

Both of these packages are from the base repository for centos.

Check that you have a file similar to centos.repo in /etc/yum.repos.d/ with the following in it:


[base]
name=CentOS-$releasever - Base
mirrorlist=http://mirrorlist.centos.org/?release=$releasever&arch=$basearch&repo
=os
baseurl=http://mirror.centos.org/centos/$releasever/os/$basearch/
gpgcheck=1
gpgkey=http://mirror.centos.org/centos/RPM-GPG-KEY-CentOS-5

Open in new window

0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question