If you are not sure, maybe wait until somebody will review it and confirm.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
Okey. I released tool that can automatically capture
fullscreen/windows/regions and upload it to AppVM and imgurl automaticaly.
Now it is in beta state and tested only with Qubes 3.2rc1, but I think it
will work with other Qubes starting from R3.0 or R3.1 (where qvm-run is
available)
Full
I used 'default task bar' in XFCE.
When I start a dom0 terminal, if maximized, it uses all space no the screen.
When I start a VM terminal, even if maximized, it leaves a small area at
the bottom empty. (Even if there is no task bar.)
How to fix this?
Cheers,
Patrick
--
You received this
Interesting, I haven't noticed the thread you mentioned. The thread I
referenced to was more than a year ago.
So if I read through it quickly, this guy had succeeded in passing
through his GTX980, but it went wrong on the driver installation (code
43). This is expected, as nVidia disables the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-02 05:30, Franz wrote:
> With Qubes release 3.x, having USB controller(s) default assigned
> to sys-usb and Xen meddling checking shared resources between
> different USB controllers, it is even more difficult than R2 to
> use external
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-01 20:40, Drew White wrote:
>
> 1. During initial configuration, if you don't create the NetVMs
> because you want to set everything yourself, it has error running a
> command because no matter what, it will try to run the command on
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-02 02:50, Grzesiek Chodzicki wrote:
> The users who are connected to the network are assumed to be
> authorized. The firewall restriction is not meant to protect the
> share against malicious users, it is supposed to protect against
>
On 07/02/2016 02:19 PM, Achim Patzner wrote:
> Hi!
>
>
> Am I the only one who would like an integrated name service management
> for local services that will be provisioned at the time of VM creation
> (e. g. if you create a machine "builder" its assigned IP address could
> be added to the
2. Jul 2016 08:02 by drew.qu...@gmail.com:
> I'll list the rest in time, no need to overload you with the bugs.
Now would be a good time. If you don't make the bugs know they may not be
found until after 3.2 is released.
> I wish it was at least tested before it came out to the public
Is nested virtualization possible in R3.1? I've looked at some of the other
topic questions similar to this but I couldn't find a concrete answer.
I've been attempting to run VMWare in Whonix but I keep running into this error
"Before you can run VMware, several modules must be compiled and
>
>
> > Will this tool be available at the system when KDE will be removed by
> > default?
>
> Your guess is right - when KDE is not installed, there is also no
> ksnapshot tool. But there are others, for example there is
> xfce4-screenshooter, which support mostly the same features.
>
Now,
On 07/01/2016 10:31 PM, Marek Marczykowski-Górecki wrote:
> On Fri, Jul 01, 2016 at 07:50:51PM +, amad...@riseup.net wrote:
>> On 2016-07-01 18:26, Marek Marczykowski-Górecki wrote:
>>> Anyway, probably harmless.
>>
>> I did fresh install and restored some templatevms and appvms from
>> R3.1.
Hello Andrew,
the idea is, if crypt-methods may help...
E.g. can holomorphic encryption be used to do all the crypt-key calculation on
encrypted data (instead of the plain-text of the key) - so "nobody" can leak
key-bis, also if N VMs work in parallel?
Kind Regards
--
You received this
did you get it to set up VMs? Or did you say you would do it manually?
I get that error when I don't let it set them up itself, but it doesn't
mean anything.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and
Qubes 3.2 = broken qubes.
I'll list the rest in time, no need to overload you with the bugs.
I wish it was at least tested before it came out to the public though.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
Hello Andrew,
super!
It works much better with some order.
E.g. so my test VMs find quite a good place, to find them again.
Merci!
Kind Regards
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
Merci
Perfect!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to
Hello Chris,
Hello Andrew,
The problem in theory is always the same, if some malicious intended party is
involved...
Business Case for confidentiality and integrity:
i)
Avoid that some information shows up, which should be secret (like a business
plan)
ii)
Avoid that some important
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 01/07/16 18:19, raahe...@gmail.com wrote:
> On Friday, July 1, 2016 at 7:47:11 AM UTC-4, Duncan Guthrie wrote:
>
>
> On 01/07/16 02:05, raahe...@gmail.com wrote:
On Thursday, June 30, 2016 at 8:49:16 PM UTC-4, Duncan
Guthrie wrote: On
19 matches
Mail list logo