-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-27 16:35, Adi Carlisle wrote:
> Message in Qubes VM manager -- Error starting
> VM: Internal error: Unable to reset PCI device :00:1f.3: no
> FLR, PM reset or bus reset available --
>
> The
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-27 08:59, Cube wrote:
> Assume you have a disconnected Vault VM with your passwords, and a
> Shopping VM where you access Amazon, etc. Highest security is to
> copy/paste passwords over from the Vault as needed. Less secure
> (but
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-27 13:09, B, Pat wrote:
> Following the Recipe
>
> https://www.qubes-os.org/doc/uefi-troubleshooting/ Note: The
> recipe isn't quite correct, it says to hit 'e' from GRUB menu. The
> 'e' option is only available after you select 1.
If I install LibreOffice in a Fedora 23 Template using Qubes 3.2, the
"Presentation Display" setting works properly with no issues, so I can
see my notes on my main display and the presentation shows up on my
external display.
However, this doesn't work properly under Debian 8 or Whonix 13. It
Hi is there any thing I can do to get Asus g752vl touch-pad working in Qubes?
Also laptop has a i7-6700HQ & a Nivda gtx 965m - can the igpu be made to work
instead of the Nvida gpu?
Thanks for any help!
--
You received this message because you are subscribed to the Google Groups
Message in Qubes VM manager
--
Error starting VM: Internal error: Unable to reset PCI device :00:1f.3: no
FLR, PM reset or bus reset available
--
The machine is from custom built from PCspecialist: Lafitte ii 13'
Can someone help me with a workaround
On Saturday, August 27, 2016 at 1:50:22 PM UTC-7, johny...@sigaint.org wrote:
> BTW, keepassx rocks. I'm working on some scripts to make it a little less
> painful with all the Ctrl-Alt-C and Ctrl-Alt-V'ing (which also conflicts
> with the standard konsole paste shortcuts).
I have no problem
On 08/27/2016 08:09 PM, B, Pat wrote:
Following the Recipe
https://www.qubes-os.org/doc/uefi-troubleshooting/
Note: The recipe isn't quite correct, it says to hit 'e' from GRUB menu.
The 'e' option is only available after you select
1. Troubleshoot
2. Boot from device
Was able to install
Hey, does anyone have any luck with getting any form of OSX to fire up
under Qubes?
After several other failures, I was able to get some iPC ISO build to get
to a certain point in an HVM, but the mouse didn't work, so I couldn't do
much, and I couldn't figure out how to get it to any kind of
> On 08/27/2016 07:36 PM, Cube wrote:
>> On Saturday, August 27, 2016 at 9:31:31 AM UTC-7, Alex wrote:
>>> On 08/27/2016 05:59 PM, Cube wrote: For specific services (say, the
>>> mentioned Amazon) I keep a keepassx database on the specific AppVM
>>> in which the service is expected to be used -
send email to qubes-users@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/CAFCr0KGP6z_Fa%3DPm6x9JoUcXZnOSfAewyS-dcDJRLDqmDh1r2g%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-LENOVO-20F6CTO1WW-20160
On Saturday, August 27, 2016 at 10:50:20 AM UTC-7, Cube wrote:
> This would be more in the style of Tails - no persistent state.
Wups, there is some thought on this already
https://www.whonix.org/wiki/Qubes/Disposable_VM
There are issues, anybody try this?
--
You received this message because
On Saturday, August 27, 2016 at 2:49:52 PM UTC, johny...@sigaint.org wrote:
> >> Whether using an "isolating proxy" (multiple machines) or not, using a
> >> white-listing proxy like Corridor can help ensure all of your traffic
> >> passes through Tor (Entry Guard, at least).
> >>
> >
> > That's
This would be more in the style of Tails - no persistent state.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
On Saturday, August 27, 2016 at 9:31:31 AM UTC-7, Alex wrote:
> On 08/27/2016 05:59 PM, Cube wrote:
> For specific services (say, the mentioned Amazon) I keep a keepassx
> database on the specific AppVM in which the service is expected to be
> used - the Amazon account I use to buy work stuff is
On Wednesday, August 24, 2016 at 6:17:39 PM UTC-7, angelo "angico" costa wrote:
> Hi, all!
>
> I'm using Qubes 3.1 and I'm new with all this compartimented system idea.
>
> I use Node.js for my work and study, and several of its modules should to be
> installed globally. My question is: Should
Assume you have a disconnected Vault VM with your passwords, and a Shopping VM
where you access Amazon, etc. Highest security is to copy/paste passwords over
from the Vault as needed. Less secure (but still highly secure) is to cache
them in the Firefox database.
What path do people generally
On Friday, August 26, 2016 at 4:09:34 PM UTC-7, Connor Page wrote:
> you should use the drive as normal in sys-usb. just make the private image
> large enough and copy whatever it is you want to burn to that vm.
Thanks! I had forgotten now that with Salt Qubes has a nice way of doing USB
VM's.
Figure it out, documented here for others.
The problem is for whatever reason the kernel module for my card (Intel laptop
WIFI) wasn't being properly probed for and loaded. So I added the following
line to /rw/config/rc.local and made the file executable
cp /rw/config/iwlwifi-net.conf
after giving it a thought I decided keep usb devices out of dom0. the solution
for debian is real 2FA but ykfde is for lazy people. I gave it as an example of
dracut hooks. theoretically you can rearrange hooks so that yubikey
authentification happens before rd.qubes.hide_all_usb is processed
>> Whether using an "isolating proxy" (multiple machines) or not, using a
>> white-listing proxy like Corridor can help ensure all of your traffic
>> passes through Tor (Entry Guard, at least).
>>
>
> That's right. Also, using Firefox with those extensions is *not* the same
> as
> using Tor
> Am 25.08.2016 um 21:33 schrieb johnyju...@sigaint.org:
>
>> While it's a bit slower, I prefer booting from DVD, a read-only medium.
>
> There are verifyably hardware-controlled (physical switch) unwritable
> USB storage devices. A bit expensive but you can get one.
I might look into that, it
Am 25.08.2016 um 21:33 schrieb johnyju...@sigaint.org:
> While it's a bit slower, I prefer booting from DVD, a read-only medium.
There are verifyably hardware-controlled (physical switch) unwritable
USB storage devices. A bit expensive but you can get one.
Achim
--
You received this message
Il giorno giovedì 4 agosto 2016 09:55:49 UTC+2, NewbieG ha scritto:
> On Thursday, August 4, 2016 at 5:29:45 AM UTC, J. Eppler wrote:
> > On Monday, August 1, 2016 at 8:58:56 AM UTC-5, NewbieG wrote:
> > > Hello list,
> > >
> > > I'm running Qubes OS 3.1 and I'm trying to have a Kali VM (2016.1).
> this is an interesting idea. initramfs is generated by dracut. read this
> https://github.com/nj0y/ykfde/blob/master/README-dracut.md
Yes, I gave ykfde a try. Problem is that Qubes still shows its custom
FDE password screen on startup, and never the ykfde second factor one...
(possibly - but
25 matches
Mail list logo