why not apply the workround in the installer or synaptic ?
I did look at some of the upstream reports a little while ago, but I
dont remember being convinced that there was any reason why a hack
couldnt be tacked onto the end of the gtk set sensitive code, providing
it respected the visibility status
why not apply the workround in the installer or synaptic ?
I did look at some of the upstream reports a little while ago, but I
dont remember being convinced that there was any reason why a hack
couldnt be tacked onto the end of the gtk set sensitive code, providing
it respected the visibility status
Have you tried any experiments for yourself?
_ _______ _______ _______ _______ _______ _______ _______ _______ __ uk.promotions. yahoo.com/ forgood/ environment. html
Want ideas for reducing your carbon footprint? Visit Yahoo! For Good http://