On Wednesday, 22 May 2019 01:03:44 UTC, qtpie wrote:
> Chris Laprise:
> > On 12/09/2018 10:38 AM, Chris Laprise wrote:
> >> 'Sparsebak'
> >>
> >> Fast Time Machine-like disk image backups for Qubes OS and Linux LVM.
> >>
> >
> > And of course, a link to the project :)
> >
> > https://github
On 4/23/19 3:06 PM, unman wrote:
> On Sat, Apr 20, 2019 at 06:45:04PM +0300, Ivan Mitev wrote:
>> re- "Google "Season of Docs" -- deadline April 22"
>> [new post to avoid polluting the original one that is linked to in the
>> gsod web page.]
>>
On 4/20/19 9:59 PM, Andrew David Wong wrote:
> On 20/04/2019 10.45 AM, Ivan Mitev wrote:
>> re- "Google "Season of Docs" -- deadline April 22"
>> [new post to avoid polluting the original one that is linked to in the
>> gsod web page.]
>
>>
re- "Google "Season of Docs" -- deadline April 22"
[new post to avoid polluting the original one that is linked to in the
gsod web page.]
I thought about posting about GSoD back in January but in my opinion
making documentation easier to contribute should be a prerequisite to
finding cool topics a
Hi,
On 1/12/19 2:43 PM, Achim Patzner wrote:
> Hi!
>
> Would it be possible to modify their environment to run them with
> smaller virtual screen size and scale their output on the way to their
> X window? A lot of things that need to run in a HVM is not necessarily
> able to scale very well (or
On 12/16/18 4:59 PM, unman wrote:
On Sun, Dec 16, 2018 at 02:27:39PM +0200, Ivan Mitev wrote:
On 12/16/18 2:16 PM, unman wrote:
On Tue, Dec 11, 2018 at 08:54:45AM +0200, Ivan Mitev wrote:
On 12/10/18 10:05 PM, daltong defourne wrote:
Hello!
I'm trying to exclude a service th
On 12/16/18 2:16 PM, unman wrote:
On Tue, Dec 11, 2018 at 08:54:45AM +0200, Ivan Mitev wrote:
On 12/10/18 10:05 PM, daltong defourne wrote:
Hello!
I'm trying to exclude a service that is started by XDG-autostart from starting
up only on SOME app-VMs based on same template-V
On 12/11/18 8:46 PM, Chris Laprise wrote:
On 12/11/2018 11:19 AM, Ivan Mitev wrote:
On 12/11/18 5:20 PM, Steve Coleman wrote:
I was attempting to "send" all my VM's private sections to a drive
mounted on sys-usb, and I seem to have run into a problem with one
particular
On 12/11/18 5:20 PM, Steve Coleman wrote:
On 12/9/18 10:38 AM, Chris Laprise wrote:
'Sparsebak'
Fast Time Machine-like disk image backups for Qubes OS and Linux LVM.
I tested the new version this morning and had worked around a few issues
such as first trying to run from /usr/local/sparse
On 12/10/18 10:05 PM, daltong defourne wrote:
Hello!
I'm trying to exclude a service that is started by XDG-autostart from starting
up only on SOME app-VMs based on same template-VM (so deleting the .desktop
file from appvm completely is not an option)
After reading some comments on github
On 12/10/18 7:57 PM, Chris Laprise wrote:
On 12/10/2018 05:23 AM, Ivan Mitev wrote:
That's really great work.
On 12/9/18 5:38 PM, Chris Laprise wrote:
Status - Alpha version
--
Can do full or incremental backups of Linux thin-provisioned LVM to
local dom0 or VM filesystems o
That's really great work.
On 12/9/18 5:38 PM, Chris Laprise wrote:
Status - Alpha version
--
Can do full or incremental backups of Linux thin-provisioned LVM to
local dom0 or VM filesystems or via ssh, as well as simple volume
retrieval for restore and verify.
I'm not familiar with the
I've seen some users written bash completion plugins for qvm-* commands.
We'd need to integrate one. For example this one:
https://groups.google.com/forum/#!msg/qubes-users/C1zUZGbVFok/l-akx0p1BQAJ
(or something based on it)
FWIW the following has been working for me without any problem for
On 05/22/2018 08:02 AM, Sven Semmler wrote:
> On 05/02/2018 09:22 AM, Ivan Mitev wrote:
>> I'm trying to implement "semi-persistent" dispVMs (in 4.0) that could
>> be used for more than one time, until the service call ends (eg. the
>> browser is closed by t
On 05/06/2018 05:20 AM, Manuel Amador (Rudd-O) wrote:
> On 2018-04-23 10:41, Ivan Mitev wrote:
>> Hi,
>>
>> In 4.0, when creating an AppVM based on a TemplateVM, is it expected
>> that none of the new VM's prefs are copied from the template VM ?
>>
&
On 05/02/2018 09:25 PM, Ivan Mitev wrote:
>
> On 05/02/2018 06:29 PM, Marek Marczykowski-Górecki wrote:
>> On Wed, May 02, 2018 at 05:22:55PM +0300, Ivan Mitev wrote:
>>> Hi,
>>
>>> I'm trying to implement "semi-persistent" dispVMs (in 4.0) t
On 05/02/2018 06:29 PM, Marek Marczykowski-Górecki wrote:
> On Wed, May 02, 2018 at 05:22:55PM +0300, Ivan Mitev wrote:
>> Hi,
>
>> I'm trying to implement "semi-persistent" dispVMs (in 4.0) that could be
>> used for more than one time, until the service
Hi,
I'm trying to implement "semi-persistent" dispVMs (in 4.0) that could be
used for more than one time, until the service call ends (eg. the
browser is closed by the user). The idea is to save resources/time and
allow several consecutive links to be opened in the *same* dispVM until
the user dec
Hi,
In 4.0, when creating an AppVM based on a TemplateVM, is it expected
that none of the new VM's prefs are copied from the template VM ?
For instance: (test2 is a TemplateVM)
qvm-prefs test2 kernel -> ''
qvm-prefs test2 virt_mode -> 'hvm'
qvm-prefs test2 memory -> '2096'
qvm-create --template
Thanks for the quick, informative answer !
On 04/20/2018 11:21 AM, Marek Marczykowski-Górecki wrote:
> On Fri, Apr 20, 2018 at 09:27:13AM +0300, Ivan Mitev wrote:
>> Hi,
>
>> Given that linux templates boot a kernel provided by qubes, what's the
>> rationale of hav
Hi,
Given that linux templates boot a kernel provided by qubes, what's the
rationale of having kernel packages installed in the default linux
templates ? Is it only to be able to run them as HVM ?
If yes, when using pv, can they be safely removed or is there something
else that depends on those pa
On 02/11/18 06:36, joevio...@gmail.com wrote:
[No responses from qubes-users, trying here next!]
https://github.com/QubesOS/qubes-issues/issues/3558
In RC4.0... After suspend/resume
Any monitors that were inverted or rotated, will be black.
The mouse does move across the screen... but no obj
@ bowabos & awokd
On 02/09/18 20:19, bowa...@gmail.com wrote:
On Friday, 9 February 2018 18:10:24 UTC, awokd wrote:
On Fri, February 9, 2018 5:56 pm, Ivan Mitev wrote:
I saw on qubes-users that you're updating the official documentation,
that's great.
Not only me! Some of
On 02/09/18 18:05, 'awokd' via qubes-devel wrote:
On Thu, February 8, 2018 4:50 pm, Ivan Mitev wrote:
IMHO a public wiki - official or not - should not replace the current
documentation: someone may add unsecure instructions (willingly or not)
and there will always be users who
FYI I've just added a "Fresh install on R4" section. It's still a work
in progress though: I get a cryptic msg in guest-win7-dm.log file a bit
after the first part of the setup reboots the VM.
qemu: /home/user/qubes-src/vmm-xen-stubdom-linux/build/qemu/exec.c:1187:
cpu_physical_memory_snapsh
On 02/08/18 22:03, brendan.h...@gmail.com wrote:
On Thursday, February 8, 2018 at 2:19:19 PM UTC-5, Ivan Mitev wrote:
On 02/08/18 20:00, Brendan Hoar wrote:
For your win7 HVMs did you, in this order:
- On the last tab, Services, add "meminfo-writer" and then uncheck the
checkmark?
On 02/08/18 20:00, brendan.h...@gmail.com wrote:
On Thursday, February 8, 2018 at 11:50:23 AM UTC-5, Ivan Mitev wrote:
FYI I've just added a "Fresh install on R4" section. It's still a work
in progress though: I get a cryptic msg in guest-win7-dm.log file a bit
after t
On 02/08/18 17:31, Yuraeitha wrote:
@Ivan
On Thursday, February 8, 2018 at 1:22:06 PM UTC+1, Ivan Mitev wrote:
- I think it's great if you post your guide for others to see :) You
can always leave a disclaimer, such as no code has not been audited in
this particular case, however th
- I think it's great if you post your guide for others to see :) You
can always leave a disclaimer, such as no code has not been audited in
this particular case, however that it worked for a few of users who
tried it (it worked for me on my first try, more to come though). If
people have all
On 02/08/18 00:18, Yuraeitha wrote:
@Ivan
On Monday, February 5, 2018 at 7:50:30 AM UTC+1, Ivan Mitev wrote:
On 02/04/18 19:26, Yuraeitha wrote:
On Sunday, February 4, 2018 at 6:00:15 PM UTC+1, Ivan Mitev wrote:
Also it seems like some functions "might (maybe)" work as int
Hi Marek,
On 02/08/18 03:13, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Feb 07, 2018 at 02:18:59PM -0800, Yuraeitha wrote:
@Ivan
On Monday, February 5, 2018 at 7:50:30 AM UTC+1, Ivan Mitev wrote:
On 02/04/18 19:26, Yuraeitha wrote:
On Sunday
On 02/04/18 19:26, Yuraeitha wrote:
On Sunday, February 4, 2018 at 6:00:15 PM UTC+1, Ivan Mitev wrote:
Also it seems like some functions "might (maybe)" work as intended, for example
I can copy files between VM's and Win7, on a Win7 that was installed on Qubes 3.2., but
bac
Also it seems like some functions "might (maybe)" work as intended, for example
I can copy files between VM's and Win7, on a Win7 that was installed on Qubes 3.2., but
backup restored on Qubes 4. Others seem like they can do this too. Also it seems it's a
common problem not to be internet in
It's been a while since the last update on the status of donations and
IMHO there should be more regular updates on Qubes' financial status:
- people who have never thought about donating may then consider doing so.
- it would also serve as a reminder for people who have already donated
once
On 01/28/18 14:12, 'awokd' via qubes-devel wrote:
On Sun, January 28, 2018 8:44 am, Ivan Mitev wrote:
I'm kind of lucky, most of [my] issues magically disappear at some point :)
Remind me to stay on your good side!
aha - will do :)
--
You received this message because you
On 01/28/18 02:16, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jan 25, 2018 at 02:21:35PM +0200, Ivan Mitev wrote:
On 01/25/18 13:27, Marek Marczykowski-Górecki wrote:
So, the question is why sys-net crashes. Take a look at
/var/log/xen/console
Hi Andrew,
On 01/27/18 15:31, Andrew Clausen wrote:
Hi Ivan,
On 27 January 2018 at 12:57, Ivan Mitev wrote:
I don't see the benefit of using a DVD (we're talking about USB DVD
readers here) but maybe it's only me being thick...
If the machine used to copy or checksum the
On 01/27/18 13:33, Sebastian Götte wrote:
On 01/22/2018 08:33 AM, Peter Todd wrote:
Note that flash drives with physical write protect switches are available, such
as the Kanguru FlashBlu30 line.
While better than a regular r/w USB drive, I would not actually trust these.
There's only going
On 01/25/18 13:27, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jan 25, 2018 at 01:05:04PM +0200, Ivan Mitev wrote:
Hi,
IIRC in R3.2 VMs were started at boot time according to their dependency on
other VMs. Eg. - for a basic setup without whonix
Hi,
IIRC in R3.2 VMs were started at boot time according to their dependency
on other VMs. Eg. - for a basic setup without whonix/tor/... - sys-net
would start first, then sys-firewall, and then other VMs configured to
start at boot time (in my case sys-usb, untrusted and work).
In R4.0 (rc3
On 01/23/18 16:05, 'Tom Zander' via qubes-devel wrote:
On Tuesday, 23 January 2018 05:56:05 CET Chris Laprise wrote:
But at some point the hardware will make or break us, and the
hardware we got now is Wintel; even Linux is an afterthought when you're
not looking at server components.
I'm no
On 01/19/18 21:32, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi all,
I'm building what hopefully will be R4.0-rc4 and I have two
reflections:
1. After upgrading templates to fedora-26 and debian-9, there is no way
the installation image will fit on DVD.
Hi,
Are there any plans to include the acpi-call kernel module [1] in the
upcoming R4 kernels ? It's required to set charging thresholds on
(relatively) newer Thinkpads, which seem to be used by many fellow Qubes
users and developers.
Except compiling/installing a custom kernel, the only "qu
On 05/09/2017 09:46 PM, Hack wrote:
Hi,
Why do you use GitHub instead of GitLab?
Most likely because the devs historically chose github and it works well
for the project's needs ?
If your question is instead related to the trust/security/... (or lack
thereof) of github vs. gitlab, github
On 04/04/2017 06:42 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-04-04 08:35, Hack wrote:
How to enable security-testing repository? I did not find any
documentation on the website.
https://www.qubes-os.org/doc/software-update-dom0/#testing-reposito
On 04/04/2017 03:13 AM, Trammell Hudson wrote:
On Mon, Apr 03, 2017 at 11:21:14PM +, Rusty Bird wrote:
Did you try the "rd.luks.key=LUKSUUID=KEYFILE" workaround? IIRC, this
shouldn't trigger the buggy if branch.
I haven't tried that one, although I did build a patched version of
systemd
On 04/01/2017 08:39 PM, iry wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Radoslaw, thank you very much for your reply!
Radoslaw Szkodzinski:
Easy to answer: The proof of freshness is simply to show these
were not made ahead of time and then released later after a
compromise to f
47 matches
Mail list logo