I am concerned about the recent bug affecting Skylake and Kaby Lake gen Intel
processors - https://lists.debian.org/debian-devel/2017/06/msg00308.html
As BIOS updates aren't yet available from many mobo manufacturers, how can we
Qubes users best defend ourselves against an exploit? In this post
Hi,
some days ago I installed the fedora-25 template, but didn't use it
because first I wanted to test it.
I also updated my templates (around 20) and dom0.
Then I noticed that starting a dvm takes really long (around 45
Seconds).
Before it was about 3 seconds, which is somehow acceptable.
On Mon, Jul 24, 2017 at 6:57 PM, Oleg Artemiev wrote:
> Hello.
>
> No sound by dedefault, no vt-d
actually sound works, sorry for mistake.
> Though, this is temporary laptop till I'll have fully compatible purism one.
> I'ven't removed any numbers. This laptop is obviously
On Monday, 24 July 2017 08:25:43 UTC+12, dava...@gmail.com wrote:
> Hi,
>
> Running the command "sudo qubes-dom0-update @kde-desktop-qubes" in dom0
> returns the following error:
> "Warning: Group 'kde-desktop-qubes' does not exists."
>
> Am I doing something wrong?
I have the same issue;
On Tue, Jul 25, 2017 at 10:14:26AM -0700, darkstrange...@gmail.com wrote:
> Need Help! Can´t get Access to Systemfiles and folders.
> Can´t access to the Grub.d Folder and can´t open the guid.conf files. I´m a
> new Qubes OS User so sorry for this question. But i didn´t find any help yet.
> Can
On Mon, Jul 24, 2017 at 08:21:24PM -1000, yreb-qusw wrote:
> Hello,
> I don't really see where , if anywhere, there is official Qubes type
> updates for the OS , other than the canary and QSB thing
> https://www.qubes-os.org/news/
>
> ie., the Docs to see seem a bit static, Maybe that is what
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Micah Lee:
> How hard would it be to build a Qubes version of Soft U2F that stores
> the secret in a separate VM, similar to split gpg? This could make using
> U2F much more usable and secure inside of Qubes, I think.
I suppose the most secure way
Ok Manny thanks and cam u Tell a noob how it goes?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this
On 07/25/2017 03:15 PM, darkstrange...@gmail.com wrote:
how i can change it to change and edit system files?
If your shell is running in dom0 and root can't alter system files, then
has your / filesystem been mounted as read-only? This can happen if a
problem was encountered during boot.
On 07/25/2017 12:49 PM, mittend...@digitrace.de wrote:
Hello Qubes users.
I use qvm-run to start a firefox in a disp-vm.
The command is
/usr/bin/qvm-run --dispvm firefox "$url"
or
/usr/bin/qvm-run --dispvm "firefox "$url""
This works fine, as long as there is no & in the url. If there is an
how i can change it to change and edit system files?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this
On 07/25/2017 12:49 PM, mittend...@digitrace.de wrote:
Hello Qubes users.
I use qvm-run to start a firefox in a disp-vm.
The command is
/usr/bin/qvm-run --dispvm firefox "$url"
or
/usr/bin/qvm-run --dispvm "firefox "$url""
This works fine, as long as there is no & in the url. If there is an
GitHub has released an interesting piece of Mac software called Soft
U2F: https://githubengineering.com/soft-u2f/
It's basically a virtual security key, and it stores its secret in the
macOS keyring. When you login to a website with 2FA, instead of using a
physical USB security key, you just
Need Help! Can´t get Access to Systemfiles and folders.
Can´t access to the Grub.d Folder and can´t open the guid.conf files. I´m a new
Qubes OS User so sorry for this question. But i didn´t find any help yet. Can
anyone tell me how i can open the folder and edit the System Files?
Many thanks
Hello Qubes users.
I use qvm-run to start a firefox in a disp-vm.
The command is
/usr/bin/qvm-run --dispvm firefox "$url"
or
/usr/bin/qvm-run --dispvm "firefox "$url""
This works fine, as long as there is no & in the url. If there is an &,
this letter and all following symbols are removed.
If
E2-YYMa12A%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-LENOVO-80QL-20170725-115139.yml
Description: application/yaml
> Yeah, using a different network adapter worked fine. Even though the onboard
> NIC is listed for passthrough to net-sys, the net-sys always indicated a
> modulo error when booted.
>
>
> I bought some cheap gb adapters off amazon for like 4$ a while back, and it
> worked without any
yreb-qusw:
> updated to F25? that may be
> recommended ?
I did it four weeks ago (upgraded the existing F24 templates) an haven't
been run in no issues at all.
So: recommended from my point of view.
https://www.qubes-os.org/doc/template/fedora/upgrade-24-to-25/
Cheers, Rob
--
You received
Hello,
I don't really see where , if anywhere, there is official Qubes type
updates for the OS , other than the canary and QSB thing
https://www.qubes-os.org/news/
ie., the Docs to see seem a bit static, Maybe that is what this mailing
list is for in part.
For Example, is there a show of
19 matches
Mail list logo