Hello,
did you had any luck with this documentation:
https://www.qubes-os.org/doc/#building
The first question what other OS do you want to use?
Second if the instructions are not helpful have a look at the source code.
Qubes has a builder framework. The building process, for templates and
WHERE is VT-D implemented..?
Intel VT-d is a hardware virtualization feature and it is implemented in
hardware.
Xen uses Intel VT-d. Xen does not call it Intel VT-d, instead Xen uses the more
general term IOMMU (I/O MMU).
For the rest look at Zrubi's answer.
--
You received this message
Hello,
it would be helpful to know the brand and model of your laptop. Maybe other
people run into a similar issue or solve the issue.
best regards
J. Eppler
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
I'm trying to install into a preexisting encrypted btrfs partition.
One: The installer won't create /boot on encrypted btrfs. What's up with
that? My Manjaro /boot lives there, and works just fine.
Two: I put /boot on a USB key. Create /, /var, and /home subvolumes on the
btrfs
Mr. Eppler,
I'm seeing that I made a mistake by wading into this Qubes pond. I've spent
the last few hours with a brand new laptop that boots into qubes and launches
dom0, net-vm and firewall-vm, but can't get any wired internet access in the
Fedora23 template. And that's not even talking
Good day,
Kindly find the attached purchase order contract draft for your reference.
Study carefully and inform me if you have any corrections or inclusions to
make.
Thanks
--
*Bees digital*
No.649/1/1,Galle Road, Panadura.
E mail: beesdigital...@gmail.com
Tel. 038 22 350 50 / 077 10 99 284
I should also mention, I'm wanting to build from source, not just install from
RPMs. That way it will be fully compatible.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
Hi folks,
how do I disable all propriety drivers as well as the noveau drivers and just
stick to the VESA settings that are supposed to work with everything?
Sincerely,
Drew.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
Hello,
> Progress!
great.
> Now a different error message appears when I try to launch a copy of the
> sys-net template: "Cannot execute qrexec-daemon!"
okay, did you copy the sys-net template or the VM? Can you explain in more
detail what you did?
--
You received this message because
Hi folks,
I want to build Qubes packages to have a different Dom0, as well as building
new template for running under Qubes.
Since not even one person has been able to tell me what packages I need to be
able to run Qubes I have decided that there must not be any real dependencies
like that
On Wednesday, 21 September 2016 00:59:00 UTC+10, raah...@gmail.com wrote:
> On Saturday, September 10, 2016 at 11:06:35 PM UTC-4, digitaldijjn wrote:
> > it mainly seems to be around either updating a vm, vm shutting down, and
> > once copying something to another vm. I tried to make sense of
On Wednesday, 21 September 2016 02:25:15 UTC+10, johny...@sigaint.org wrote:
> > On Sunday, September 11, 2016 at 11:11:28 PM UTC-4, Drew White wrote:
> >> On Friday, 9 September 2016 18:58:51 UTC+10, Thomas Ernst wrote:
> >> > Hi all,
> >> >
> >> > Does Qubes support NVIDIA GeForce graphics
Heyas,
Well, I'm running Windows not in seamless mode, and I resized the window...
Now it's jumping around doing who knows what...
It's just following the same path, going ballistic. I have to use ALT GRAB to
catch the window to TRY to stop it from doing it.
Most of the time it works, but
I plug in a USB WiFi adapter.
I go to sys-usb, and run "lsusb".
It shows up there as, "Bus 002 Device 028: ID 148f:3070 Ralink Technology,
Corp. RT2870/RT3070 Wireless Adapter"
What happens next..?
How do I get this to the point where it can be used..?
Thanks
--
You received this message
On Tuesday, September 20, 2016 at 6:55:05 PM UTC-4, Clark Venable wrote:
> By 'assign the ethernet controller to a net-VM', do you mean in
> VMSettings-->Devices?
>
> When I go there for the VM sys-net that controller is already in the
> 'Selected' pane on the right.
>
> I then right-clicked
Hello,
I would do the following:
> should I investigate from the Nix side how to automatically create symlinks
> to `/usr/share/applications`?
in the other case you would have to modify `qvm-sync-appmenus`, which is
implemented in python.
However, I think for a single VM it is easier to go
By 'assign the ethernet controller to a net-VM', do you mean in
VMSettings-->Devices?
When I go there for the VM sys-net that controller is already in the 'Selected'
pane on the right.
I then right-clicked the sys-net VM in VM Manager and chose to run a command as
above.
Got a pop up error
I forgot to mention: Open a terminal (Konsole) in Dom0. Dom0 is your main
Desktop. You shoul be able to open it in `Menu -> Terminal` or `Menu -> System
-> Konsole` or something like that.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
Andrew:
> Mathew Evans:
>> Long story short I'd like to share my keyboard and mouse from my Qubes
>> environment to a windows environment (physically different machine) with
>> synergy. Any ideas of best way to achieve this? short of adding networking
>> to dom0 which I'm not willing to do.
>>
Mathew Evans:
> Long story short I'd like to share my keyboard and mouse from my Qubes
> environment to a windows environment (physically different machine) with
> synergy. Any ideas of best way to achieve this? short of adding networking to
> dom0 which I'm not willing to do.
>
With the
Long story short I'd like to share my keyboard and mouse from my Qubes
environment to a windows environment (physically different machine) with
synergy. Any ideas of best way to achieve this? short of adding networking to
dom0 which I'm not willing to do.
--
You received this message because
On 09/20/2016 01:16 PM, mittend...@digitrace.de wrote:
Hey,
Firewall rules are set for a specific VM/Qube. From common
understanding people would probably think that those rules are active
no matter what happens outside of that very VM/Qube, but in fact it
seems like those rules are active
I know it's more than a year after this thread was last active, but this could
solve my problems, I think, if I could just get some more details on how to
apply the fix described.
I have a new System76 Lemur laptop which I have installed Qubes 3.1 onto. As
described in this thread, when I try
how can I install flux into my qubes ?
f.lux fixes this: it makes the color of your computer's display adapt to the
time of day, warm at night and like sunlight during the day.
https://justgetflux.com/
I know it needs to be installed in dom0 but what command do i need to type to
also get
On Tuesday, September 20, 2016 at 10:06:06 AM UTC-7, Pawel Debski wrote:
> On 2016-09-20 18:27, entr0py wrote:
> > Pawel Debski:
> >> W dniu niedziela, 18 września 2016 17:21:47 UTC+2 użytkownik ludwig jaffe
> >> napisał:
> >>> On Saturday, September 17, 2016 at 3:55:58 AM UTC-4, Pawel Debski
Quite frequently, under Debian-8, when I go to assign a device, it quietly
appears to work (Qubes Manager shows it assigned), but the device never
shows up, and the VM's dmesg shows things like this:
[Tue Sep 20 13:17:09 2016] xenwatch: page allocation failure: order:5,
mode:0x240c0c0
[Tue Sep 20
Hey,
Firewall rules are set for a specific VM/Qube. From common understanding
people would probably think that those rules are active no matter what
happens outside of that very VM/Qube, but in fact it seems like those
rules are active if and only if there is an ProxyVM connected to that
On 2016-09-20 18:27, entr0py wrote:
Pawel Debski:
W dniu niedziela, 18 września 2016 17:21:47 UTC+2 użytkownik ludwig jaffe
napisał:
On Saturday, September 17, 2016 at 3:55:58 AM UTC-4, Pawel Debski wrote:
Folks,
I have Qubes 3.2 up, updated &
running like a charm. Now the
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-09-19 13:36, johnyju...@sigaint.org wrote:
>>> I've finally got Qubes set up in a way I'm comfortable working every
>>> day.
>>>
>>> Now I wanted to move that same installation to another drive for its
>>> permanent home.
>>
>> Oh, I
Pawel Debski:
> W dniu niedziela, 18 września 2016 17:21:47 UTC+2 użytkownik ludwig jaffe
> napisał:
>> On Saturday, September 17, 2016 at 3:55:58 AM UTC-4, Pawel Debski wrote:
>>> Folks,
>>>
>>> I have Qubes 3.2 up, updated &
>>> running like a charm. Now the Microsoft challenge.
> On Sunday, September 11, 2016 at 11:11:28 PM UTC-4, Drew White wrote:
>> On Friday, 9 September 2016 18:58:51 UTC+10, Thomas Ernst wrote:
>> > Hi all,
>> >
>> > Does Qubes support NVIDIA GeForce graphics cards? The reason for
>> asking is that I am planing to buy a Lenovo ThinkPad T460p Laptop,
Yes, my script is already posted here. I was implying sh shebang, as we're
talking about a file that contains it before any changes done. But thanks for
checking.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
On Saturday, September 10, 2016 at 11:06:35 PM UTC-4, digitaldijjn wrote:
> it mainly seems to be around either updating a vm, vm shutting down, and once
> copying something to another vm. I tried to make sense of the logs, something
> about a writing to a read only config file. I'm using 3.2
On Sunday, September 11, 2016 at 11:11:28 PM UTC-4, Drew White wrote:
> On Friday, 9 September 2016 18:58:51 UTC+10, Thomas Ernst wrote:
> > Hi all,
> >
> > Does Qubes support NVIDIA GeForce graphics cards? The reason for asking is
> > that I am planing to buy a Lenovo ThinkPad T460p Laptop,
> the source code of qvm-run is your best documentation of how applications are
> run without logging in :)
> here is the session that is started in vms. I like the hangman :)
> https://github.com/QubesOS/qubes-gui-agent-linux/blob/master/appvm-scripts/usrbin/qubes-session
Thanks for the link,
the source code of qvm-run is your best documentation of how applications are
run without logging in :)
here is the session that is started in vms. I like the hangman :)
https://github.com/QubesOS/qubes-gui-agent-linux/blob/master/appvm-scripts/usrbin/qubes-session
--
You received this message
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-09-20 05:16, York Keyser wrote:
> Dear Group
>
> is there a way to use CDC Ethernet emulation under Qubes. I have a USB-Armory
> and i want to connect to it from a VM.
> When I connect the USB-Armory I get following errors from DOM0
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-09-20 03:20, tom...@gmail.com wrote:
> Hi all,
>
> I'm on Qubes3.1 (with regular updates in dom0).
> When mouse or screen is not touched for 10 minutes I got screen becoming
> black and asking for password if I fail to move the mouse in
would you mind posting the whole script?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-09-19 19:15, Sebastian Jug wrote:
> Hi Andrew,
>
> Thanks for the response.
> I can watch youtube a variety of different ways with different codecs and
> decoders, however, they all use a ton of CPU usage at 720p or greater.
> VAAPI is
Hello,
After upgrading from R3.0 to R3.2-rc3, I am no longer able to hotplug
ExpressCard devices (e.g. USB 3.0 adapter). Is it a bug or feature?
When I connect adapter to running Qubes, nothing happens - it is not
detected, not reported by lspci, also there is nothing in dmesg.
When I boot
Dear Group
is there a way to use CDC Ethernet emulation under Qubes. I have a
USB-Armory and i want to connect to it from a VM.
When I connect the USB-Armory I get following errors from DOM0
probe of 3-1:1.0 failed with error -22
probe of 3-1:1.0 failed with error -16
Nevertheless, I see the
try Presentation mode in the power manager panel plugin.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to
> On 09/19/2016 05:48 AM, asdfg...@sigaint.org wrote:
>> Hello
>> I have this configuration
>>
>> sys-whonix--->proxyVM(with VPN)--->appVM
>>
>> when I surf in appVM, see ip of tor and not ip of VPN. Why?
>>
>> Regards
>>
>
> If the appvm is directly using the vpn vm as its netvm (uplink), you
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-09-19 02:48, asdfg...@sigaint.org wrote:
>> Hello
>> I have this configuration
>>
>> sys-whonix--->proxyVM(with VPN)--->appVM
>>
>> when I surf in appVM, see ip of tor and not ip of VPN. Why?
>>
>> Regards
>>
>
> Please clarify your
I'd like to create my own personal email server but don not feel
technically competent to set it up securely. However I've read about a
"out of the box" solution called Mail-In-A-Box. Do any Qubes users have
experience or thoughts on this potential solution?
--
You received this message because
On 09/20/2016 02:44 AM, neilhard...@gmail.com wrote:
> WHERE is VT-D protection against DMA attacks implemented..?
VT-D is implemented in Xen and it is actually protecting PCI passtrough
feature:
https://wiki.xen.org/wiki/Xen_PCI_Passthrough
Because Qubes using Xen, all the VM's are protected
47 matches
Mail list logo