On Tue, Apr 14, 2020 at 03:49:33PM -0700, Vít Šesták wrote:
> b. When you have a StandaloneVM you don't run often, it might miss some 
> updates, so you are more likely to run some software with known 
> vulnerabilities after boot. This does not happen for Temlate-based-VM 
> provided that you use some other VMs from the same template.

That is true if you depend on the build-in mechanism to update your
qubes. It's however very easy to write a simple shell script in dom0
that calls something like ...

qvm-run -a qube "sudo apt update && sudo apt upgrade -y" 

... for every template and standalone qube. You can even go a step
further and have cron run it once a day. 

/Sven

-- 
 public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20200414232412.GA2174%40app-email-private.

Attachment: signature.asc
Description: PGP signature

Reply via email to