On Thu, Oct 13, 2016 at 10:34 PM, Manuel Amador (Rudd-O)
wrote:
> On 10/13/2016 11:36 PM, Toni S wrote:
> > Only annoyance with the stick so far has been that it locks itself
> automatically right after it loses power, and for some reason there is a
> short power break in
Rusty Bird:
> Hi Robert,
>
>> However I would not use the "move to VM" command like this, as I
>> experienced those requests getting lost One time files were
>> actually deleted, since that time I always use copy instead of
>> move.
>
> Sounds troubling. Do you remember the last Qubes release
On 10/13/2016 09:31 PM, Manuel Amador (Rudd-O) wrote:
Oops about what? Unlike the official Qubes VPN documentation, which
counsels people to write scripts that make non-atomic modifications to
their firewall, which actually and demonstrably have a leak between
Qubes firewall updates and VPN
On Thursday, 13 October 2016 23:26:31 UTC+11, gaikokuji...@gmail.com wrote:
> On Wednesday, October 12, 2016 at 10:12:48 PM UTC-4, Drew White wrote:
> > On Thursday, 13 October 2016 07:48:24 UTC+11, Gaiko Kyofusho wrote:
> > > I haven't seen much mention of ReactOS on the list but was thinking
On 10/13/2016 09:56 PM, Desobediente wrote:
> Assuming that Manuel described your case, you would have to set a
> static port, not random, and forward the port in the firewall VM and
> also in every device in the middle of the way (routers, etc.)
That is right. You want to set a static port on
On 10/13/2016 11:36 PM, Toni S wrote:
> Only annoyance with the stick so far has been that it locks itself
> automatically right after it loses power, and for some reason there is a
> short power break in booting the Qubes, just before the graphical loading
> screen and crypto unlock. Then you
On 10/14/2016 12:32 AM, Chris Laprise wrote:
> On 10/13/2016 11:39 AM, Manuel Amador (Rudd-O) wrote:
> * Interdependent packet marking, detection and routing rules are
> needlessly complex
FWMARK was the only way to get blackholing to work reliably without
interference from the
On 10/13/2016 11:39 AM, Manuel Amador (Rudd-O) wrote:
* Interdependent packet marking, detection and routing rules are
needlessly complex
FWMARK was the only way to get blackholing to work reliably without
interference from the Qubes OS firewalling system.
So you added complexity where simply
Assuming that Manuel described your case, you would have to set a static
port, not random, and forward the port in the firewall VM and also in every
device in the middle of the way (routers, etc.)
--
iuri.neocities.org
--
You received this message because you are subscribed to the Google
Hello,
I install Win7 inside a HVM.
$ top
load 0.15
4028848 KiB used
55784 KiB free
no swaping
298 tasks
So it looks normal, I think.
Kind Regards
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
Hello,
I had also strange broken screens, now I try to run the Win7 installation
process alone and don't have other apps running.
But it seems very slow to me and something with the multitasking is quite odd.
Kind Regards
--
You received this message because you are subscribed to the Google
I'm having same issue, I know there is enough space because df -h shows 198G
available and qemu-img-xen info image.vmdk shows that the virtual disk size is
8G
On Wednesday, April 27, 2016 at 6:39:18 AM UTC-5, TheGrandQubes wrote:
> How do you know there is enough space?
>
>
> If the vmdk
Hello,
If you don't need it, you can choose under software in the installation if you
install whonix - or not. So it is totally up to you.
Someone might or might not use whonix also as a command and control server, so
I by myself disabled it.
Kind Regards
--
You received this message
Good day
When I go to options of my wifi network (always spoofed the MAC address),
in the field "device" there is written my real MAC. Has been detected by
network?
Another question, always in the field "device" there are 2 options: mac
address and wlp0s0+mac address. What do I have to select? (I
Hello,
is this normal, that the installation of Win7 into a HVM takes hours?
top:
load.average 0.16
I don't run any in parallel, because I have seen also 2 times a window
bluescreens, which aborts my Win7 installation...
Kind Regards
--
You received this message because you are subscribed
Template VM Hierachy?
Was still some topic (and would meet the user logic to design more foundation
TVM's and higher specific TVM's on top of them)...
https://groups.google.com/forum/#!searchin/qubes-users/vm$20hierachy%7Csort:relevance/qubes-users/iLJjTTQqgrw/-0OG1jrZPgAJ
--
You received
Hello,
how I found out, if the minimal Templates D8 or F22 will contain only "exploit
proof" applications, which support all ASLR - against code injection - like the
browsers?
Or if not, how can I build an ASLR D8 template for Qubes?
Kind Regards
--
You received this message because you are
Hello,
sounds quite interessting :-)
How would be a encrypted software-database. Inside are all compressed folders,
pathes and files and if you run some app, it will payed in this DVMs?
Nice would be, if the protocols and logs get played back inside this database.
And they are also compressed
Hello,
as far I know, the Win7-VM will today not support the sound features.
Would it be possible to use a USB-Bluethooth device (e.g. Blue Fritz), which is
paired with some bluetooth sound-box and play the sound in this way?
This would be great!
Kind Regards
--
You received this message
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-13 03:45, Robert Mittendorf wrote:
> Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com:
>>
>> feature. I use to make menu shortcuts to launch programs in dispvms
>> inheriting firewall rules. But xfce only lets you edit already
On 10/13/2016 12:45 PM, Robert Mittendorf wrote:
Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com:
feature. I use to make menu shortcuts to launch programs in dispvms
inheriting firewall rules. But xfce only lets you edit already
existing rules, not create new ones :( editing a
On 10/13/2016 02:14 PM, Chris Laprise wrote:
>
> So this is dependent on OpenVPN's features, again.
Yes, I make no secret of the fact that my software depends on OpenVPN.
I accept contributions to make it work with other VPN solutions.
>
> And is forcing your routing schema on an unknown VPN
Google Maps is like that everywhere else
I guess maybe it's just the fact that Qubes Manager allow you to see easily
how much they are ripping the memory and the processor that made you
realize this
--
iuri.neocities.org
--
You received this message because you are subscribed to the Google
On Wednesday, October 12, 2016 at 12:06:15 PM UTC-4, Manuel Amador (Rudd-O)
wrote:
> Do your files show on the file manager?
Manuel, thank you for responding. Yes, they do. So, there is no way to access
the files through the connection created by the file manager?
--
You received this
On 10/13/2016 01:08 AM, Manuel Amador (Rudd-O) wrote:
On 10/13/2016 03:13 AM, Chris Laprise wrote:
Here is a rundown of initial concerns...
* Routing tables should not be manipulated when VPN clients will
surely do this as well
The program prohibits OpenVPN from manipulating routing tables.
On 10/11/2016 09:42 AM, Robert Mittendorf wrote:
> Hey folks,
>
> sometimes the sys-firewall (more likely a service within it) crashes
> and does no longer allow connected VMs to resolve DNS.
> The ProxyVM must be the responsible entity, because the connection
> will be fine again If I restart the
On 10/11/2016 11:18 PM, yorp wrote:
> For some reason using a bittorrent client in an AppVM will not connect to
> internet.
It's usually the case that they listen to ports locally and expect
remote ends to connect to those ports, which they open using UPNP. UPNP
firewall port opening is not
On 10/13/2016 12:16 AM, equi...@icloud.com wrote:
> Very interested to know if any reason why a USB network gateway software
> would not work in Qubes?
>
> For anyone interested, a USB network gateway provides USB functionality to a
> client over IP. USB network gate by Eltima has Linux,
On 10/13/2016 12:31 AM, Drew White wrote:
> On Thursday, 13 October 2016 00:39:04 UTC+11, Manuel Amador (Rudd-O) wrote:
>> On 10/12/2016 05:25 AM, Drew White wrote:
>>> So what do those packages require as dependancies though?
>>> The dependancies are also required for full integration.
>>> Just
On 10/13/2016 12:28 PM, galt...@gmail.com wrote:
> I'm trying to remotely wake a computer from qubes with these commands:
>
> sudo ether-wake -b MAC
> sudo ether-wake MAC
These commands only work from a NetVM by default because they require
knowledge of the target machine's MAC address, and that
I found a solution by disabling WebGL. There were errors in the console
indicating that the operation executed by the page are slow.
It is possible to set webgl.disable to true in about:config.
Now it's acceptably slow :)
--
You received this message because you are subscribed to the Google
On Thursday, October 13, 2016 at 4:36:28 AM UTC-4, koto...@gmail.com wrote:
> Hello,
>
> I have consistently issues when accessing Google Maps from a DispVM (or VM)
> with Firefox: the site becomes unresponsive or extremely slow and the CPU
> usage is between 70 and 99%.
>
> Do other users
On Wednesday, 12 October 2016 08:56:33 UTC+1, gal...@gmail.com wrote:
> I upgraded to 3.2 by backing up in 3.1 and restoring in 3.2. I was using xfce
> in 3.1 and had 4 workspaces (or activities) and each had its own background
> image and I had different icons placed on each one. Now in 3.2
Hi,
a friend recommended QubesOS to me and I thought I'd try the latest
version of it. I'd like to share my experience and ask for help; I'll
have a summary of my questions at the end of the mail.
I like the idea, but I had some Problems:
right now, for testing purposes, I installed it on a
34 matches
Mail list logo