Hello,
With the q-menue sync command I can bring the new app into the VM application
menu:
1. start VM
2. terminal dom0
3. qvm-sync-appmenus vmname
This works fine.
But why nautilus / files 3.18.5 open with applications menue is not in sync
afterwards?
I would expect TheBrain Icon, run this
Hello,
I like to open in /Documents my file *.brain with TheBrain.
PB7 can be started via the terminal...
/rw/usrlocal/TheBrain/TheBrain
I open the files 3.18.5 and found the help, which explains how I add a new
application:
1. choose file ... *.brain
2. open with
3. press the button ADD
But
yep i know someone exploit ur app and take control on ur environment.. but ...
if app is in sandbox then he cant take any control on system bcs its a jail or
sanbox.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
philosofy of qubes is that you are safe when your app is isolatet.This is wrong
just keep app in sandboxes or jails and what wrong can be happen?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
after reboot in systems should be to run also on cron
@ reboot
but Qubes is build on Fedora mostly and it not have even cron.
i think best way is to build on debian or FreeBSD not this stupid fedora.For
sake this is so administratively wrong.
--
You received this message because you are
Rudd-O
might be you so nice and explain why it dosent work
https://groups.google.com/forum/#!topic/qubes-users/E2NBXnYazUk
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-14 10:44, 109278409178304917834093 wrote:
> Hello,
>
> I would appreciate more anonymity (I think there is a french group-chat
> platform...).
>
It's quite possible to participate on both Qubes mailing lists anonymously (or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-14 09:13, epicd...@gmail.com wrote:
> I imagine the requirement of a Google account deters many from contributing
> to discussion. All Google accounts require SMS verification of a phone, which
> is very de-anonymizing, and sort of out
On Fri, Oct 14, 2016 at 04:27:16PM -0700, raahe...@gmail.com wrote:
> On Friday, October 14, 2016 at 6:19:01 PM UTC-4, gaikokuji...@gmail.com wrote:
> > On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote:
> > > On Friday, October 14, 2016 at 3:57:06 PM UTC-4,
On Friday, October 14, 2016 at 6:19:01 PM UTC-4, gaikokuji...@gmail.com wrote:
> On Friday, October 14, 2016 at 5:55:35 PM UTC-4, raah...@gmail.com wrote:
> > On Friday, October 14, 2016 at 3:57:06 PM UTC-4, gaikokuji...@gmail.com
> > wrote:
> > > I have been trying to get a program to startup
given qubes separation is it possible to run something like Synapse (or
some similar launcher) in Qubes?
It would be awesome to have times that one could say start typing the VM
Name then start typing the app .
For those of use using Qubes on a laptop with a miserable touchpad a proper
launcher
On Thursday, October 13, 2016 at 8:28:51 AM UTC-4, gal...@gmail.com wrote:
> I'm trying to remotely wake a computer from qubes with these commands:
>
> sudo ether-wake -b MAC
> sudo ether-wake MAC
>
> Neither version works and I get no error messages.
>
> The remote computer wakes remotely from
On Friday, October 14, 2016 at 6:16:16 PM UTC-4, raah...@gmail.com wrote:
> On Thursday, October 13, 2016 at 2:36:30 PM UTC-4, Andrew David Wong wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> >
> > On 2016-10-13 03:45, Robert Mittendorf wrote:
> > > Am 10/13/2016 um 04:50 AM
On Thursday, October 13, 2016 at 2:36:30 PM UTC-4, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-10-13 03:45, Robert Mittendorf wrote:
> > Am 10/13/2016 um 04:50 AM schrieb raahe...@gmail.com:
> >>
> >> feature. I use to make menu shortcuts to launch
On Fri, Oct 14, 2016 at 12:57:06PM -0700, gaikokujinkyofu...@gmail.com wrote:
> I have been trying to get a program to startup when the AppVM that its setup
> in starts up by adding a line to the rc.local file.
>
> I changed rc.local to executable, and after the first few tries added in
>
Thanks for packaging awesome wm for qubes. It mostly works well, but I
have a couple of issues.
(1) the menubar does not scroll. Annoying if you have more vms than can
fit in it. I had a glance at qubes.lua and it looks like there's no easy
way to add sub-directories to split the vms (e.g.
On Thursday, October 13, 2016 at 9:59:08 PM UTC-4, Drew White wrote:
> On Thursday, 13 October 2016 23:26:31 UTC+11, gaikokuji...@gmail.com wrote:
> > On Wednesday, October 12, 2016 at 10:12:48 PM UTC-4, Drew White wrote:
> > > On Thursday, 13 October 2016 07:48:24 UTC+11, Gaiko Kyofusho wrote:
epicd...@gmail.com:
> I imagine the requirement of a Google account deters many from contributing
> to discussion. All Google accounts require SMS verification of a phone, which
> is very de-anonymizing, and sort of out of line with the privacy centric
> nature of Qubes and its users.
>
You
Hello,
I would appreciate more anonymity (I think there is a french group-chat
platform...).
Nice would be some good structure, before you dive inside the big hep of
discussions.
Installation
Newbie questions
Bugs
...
This forum makes a perfect job for onboarding into a new community:
Hello,
It is hard to get TheBrain run perfect under QubesOS.
- no deep link content search (attach a file to PB and type a search-keyword in
the search field and press enter), which seams not to work
- new node F6 and press the type or tag button, which seams not to work
- node, context menue,
https://wiki.xenproject.org/wiki/Migration_from_VMware
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this
https://wiki.xenproject.org/wiki/Migration_from_VMware
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this
> I'm having same issue, I know there is enough space because df -h shows
> 198G available and qemu-img-xen info image.vmdk shows that the virtual
> disk size is 8G
I've had cases with the qemu tools where it reported a write error because
it had trouble reading one of the input files (corrupted,
I imagine the requirement of a Google account deters many from contributing to
discussion. All Google accounts require SMS verification of a phone, which is
very de-anonymizing, and sort of out of line with the privacy centric nature of
Qubes and its users.
--
You received this message
Hello, what is the difference between this implementation and just following
the VPN guide on the Qubes website? Both seem to create a proxyVM.
https://www.qubes-os.org/doc/vpn/
Is your version more leak proof, if so, how?
--
You received this message because you are subscribed to the Google
What im doing wrongso so its not working on fedora-23-minimal
i follow this steps
1.install openvpn in fedora minimal template
2.copy to fedora min template qubes-vpn*.noarch.rpm that i build in git qubes
3.sudo dnf install qubes-vpn*noarch.rpm && mkdir /rw/config/qubes-vpn
4 copy VPN .ovpn
What im doing wrongso so its not working on fedora-23-minimal
i follow this steps
1.install openvpn in fedora minimal template
2.copy to fedora min template qubes-vpn*.noarch.rpm that i build in git qubes
3.mkdir /rw/config/qubes-vpn
4 copy VPN .ovpn config files there
5.create file
On 10/14/2016 01:26 PM, 917832409173409178324097 wrote:
> Hello,
>
> can ASLR tech help to build a hard template VM for Qubes?
>
> https://securityetalii.es/2013/02/03/how-effective-is-aslr-on-linux-systems/
>
> checksec.sh:
> How important it is that all libs and executables are PIE-compiled?
>
Hello,
can ASLR tech help to build a hard template VM for Qubes?
https://securityetalii.es/2013/02/03/how-effective-is-aslr-on-linux-systems/
checksec.sh:
How important it is that all libs and executables are PIE-compiled?
Are 100% of the TVM PIE compliant?
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Oct 13, 2016 at 11:22:08PM -0400, Chris Laprise wrote:
> On 10/13/2016 09:31 PM, Manuel Amador (Rudd-O) wrote:
> >
> > Oops about what? Unlike the official Qubes VPN documentation, which
> > counsels people to write scripts that make
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi Jeremy!
> In Qubes 3.0, I noticed that source files for the "move to VM"
> command would be deleted even if the move failed due to
> insufficient disk space in the destination VM. (It goes without
> saying that this is a Very Bad Thing.)
That
31 matches
Mail list logo