On Fri, Mar 24, 2017 at 03:32:47PM -0700, Nemo wrote:
> On Friday, March 24, 2017 at 6:07:51 PM UTC-4, Unman wrote:
> > On Thu, Mar 23, 2017 at 08:00:57PM -0700, Nemo wrote:
> > > On Thursday, March 23, 2017 at 10:37:58 PM UTC-4, Andrew David Wong wrote:
> > > > -BEGIN PGP SIGNED MESSAGE-
On Friday, March 24, 2017 at 6:07:51 PM UTC-4, Unman wrote:
> On Thu, Mar 23, 2017 at 08:00:57PM -0700, Nemo wrote:
> > On Thursday, March 23, 2017 at 10:37:58 PM UTC-4, Andrew David Wong wrote:
> > > -BEGIN PGP SIGNED MESSAGE-
> > > Hash: SHA512
> > >
> > > On 2017-03-23 19:28, Nemo
On Thu, Mar 23, 2017 at 08:00:57PM -0700, Nemo wrote:
> On Thursday, March 23, 2017 at 10:37:58 PM UTC-4, Andrew David Wong wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA512
> >
> > On 2017-03-23 19:28, Nemo wrote:
> > > I've been writing a bash script that manages firewall settings
On Fri, Mar 24, 2017 at 04:26:10PM +, William Fisher wrote:
> Can you give an example of the mkfs command to create a compatible storage
> drive for my Qubes system since the SSD is booting and running Qubes?
> On Fri, Mar 24, 2017 at 10:46 AM Unman wrote:
>
> >
My TemplateVMs have a recurring and unpredictable problem starting dnf.
dnf will display no output for a number of minutes and then exit with an error
like (not always this)
Error: Failed to synchronize cache for repo 'qubes-vm-r3.2-current'
or
Error: Failed to synchronize cache for repo
I have good news.
First, I have tried some tasks where I lacked GPU performance, and it is much
better now. Not sure what was improved since Qubes 3.0, but it is better in
both PVMs (Debian) and HVMs (where GPU emulation is probably handled by
stubdom).
Second, I got OpenSWR working on Debian
Hello!
After install Qubes have some issue with sys-net, network not working.
Finding some information on https://www.qubes-os.org/doc/assigning-devices/
In dom0 come to root and add
echo -n "1" > /sys/bus/pci/devices/:04:00.0/remove solved the problem,
but after reboot laptop this
Am Mittwoch, 22. März 2017 13:10:47 UTC+1 schrieb Marcus Dilger:
> Hello,
> i try to connect a group of AppVMs to different VLAN Networks. The VLAN
> networks are available at the physical network adapter (LAN Adapter).
>
> What i have done :
> Setup up an VLAN Interface in the netVM via
Hello All,
Just a very simple problem: My screenlock does not work. After fiddling around
a lot I discovered that the screenlock starts correctly if I set the screen
lock timer as 15 seconds or less.
Experimenting a bit more, I discovered that if I give, say,
xset s 30 30
then the screen never
On 03/23/2017 09:01 AM, nazzaroth.yout...@web.de wrote:
Hello everyone
Originally while i installed Qubes for the first time i had a problem configuring it. I
had the standard choices and also whonix templates set but while the setup configured
qubes at some point it always stoped working. I
Hello,
I've assigned my scanner (and the complete usb controller) via this description
https://www.qubes-os.org/doc/assigning-devices/ into a virtual machine.
I can use scanimage to use the scanner but it takes about 5 minutes to scan a
page.
Everything works however.
Using Scanimage -L also
Can you give an example of the mkfs command to create a compatible storage
drive for my Qubes system since the SSD is booting and running Qubes?
On Fri, Mar 24, 2017 at 10:46 AM Unman wrote:
> On Fri, Mar 24, 2017 at 03:30:31PM +, William Fisher wrote:
> > Thank
On Fri, Mar 24, 2017 at 02:22:17PM +0100, Sven Eriksson wrote:
> Hi,
>
> Using 'qvm-open-in-vm' to open a pdf-file in another appvm fails for me
> in the following way:
>
> First time it opens correctly, spawning evince and opening the pdf in
> the other vm. However, when closing the evince
On Fri, Mar 24, 2017 at 10:51 AM, Manuel Cornejo
wrote:
> Doesn't Qubes need and antivirus? What happend if on Qubes we set a VM with
> Windows 7 in it? Would you install antivirus on the virtual machine hoping
> that is going to be (the same /more) effective than
It actually does work for limited use cases. I sometimes run Qubes
inside Qubes for quickly testing things ;) The outer VM must be HVM,
and the inner-inner VMs must be PVM, or else you must enable some
less-tested and potentially dangerous code paths in Xen (nestedhvm=1)
which Qubes (on purpose)
On Fri, Mar 24, 2017 at 03:30:31PM +, William Fisher wrote:
> Thank you!
> On Fri, Mar 24, 2017 at 10:25 AM Reg Tiangha
> wrote:
>
> > On 03/24/2017 08:31 AM, William Fisher wrote:
> > > On Friday, March 24, 2017 at 10:12:21 AM UTC-4, William Fisher wrote:
> > >> On
- If we consider a compromised VM with:
- passwords saved in the browser: an attacker can obtain all passwords
- your proposed password manager: an attacker can still obtain all
passwords, just needs to wait for them to be used
- If we consider a non-compromised VM with:
- passwords saved
Thank you!
On Fri, Mar 24, 2017 at 10:25 AM Reg Tiangha
wrote:
> On 03/24/2017 08:31 AM, William Fisher wrote:
> > On Friday, March 24, 2017 at 10:12:21 AM UTC-4, William Fisher wrote:
> >> On Friday, March 24, 2017 at 1:42:54 AM UTC-4, Reg Tiangha wrote:
> >>> On
On 03/24/2017 08:31 AM, William Fisher wrote:
> On Friday, March 24, 2017 at 10:12:21 AM UTC-4, William Fisher wrote:
>> On Friday, March 24, 2017 at 1:42:54 AM UTC-4, Reg Tiangha wrote:
>>> On 03/23/2017 11:41 PM, William Fisher wrote:
Thank you. I'll try it. What's the command to start
El miércoles, 22 de marzo de 2017, 4:32:05 (UTC+1), a.mc...@yandex.com
escribió:
> Hi,
>
> KasperskyOS is system for embbeded devices, for industrial devices. I don't
> see any advantages for home usage in Qubes OS. Besides, it's a closed source
> peace of software. Just forget about it,
On Friday, March 24, 2017 at 10:12:21 AM UTC-4, William Fisher wrote:
> On Friday, March 24, 2017 at 1:42:54 AM UTC-4, Reg Tiangha wrote:
> > On 03/23/2017 11:41 PM, William Fisher wrote:
> > > Thank you. I'll try it. What's the command to start gparted?
> > >
> > You can type gparted on the
On Friday, March 24, 2017 at 1:42:54 AM UTC-4, Reg Tiangha wrote:
> On 03/23/2017 11:41 PM, William Fisher wrote:
> > Thank you. I'll try it. What's the command to start gparted?
> >
> You can type gparted on the command line, or it'll show up in your
> application menu and you can start it that
Hi,
Using 'qvm-open-in-vm' to open a pdf-file in another appvm fails for me
in the following way:
First time it opens correctly, spawning evince and opening the pdf in
the other vm. However, when closing the evince window, I get a message:
"Failed to remove file at exit".
Next time around, the
Nested Virtualization seems to work generally well, albeit slower, even with
different hypervisors.
Despite the advice given in the install docs:
> Note: We don’t recommend installing Qubes in a virtual machine! It will
> likely not work.
I tried it an the Kernel comes up, as does the
On Thursday, March 23, 2017 at 9:40:57 PM UTC+1, Opal Raava wrote:
> On Thursday, March 23, 2017 at 8:23:15 PM UTC+1, Opal Raava wrote:
> > On Thursday, March 23, 2017 at 12:11:51 PM UTC+1, Unman wrote:
> > > On Thu, Mar 23, 2017 at 03:40:34AM -0700, lokedhs wrote:
> > > > On Thursday, 23 March
> This is actually worse than not using a password manager at all,
> because the window you are about to enter the password into has full
> control over its title, and so this opens a race condition where the
> site could change its title right before dom0 checks it (perhaps
> triggered by "I am
Hi
thanks for the tips.
I followed everything you said, first time it didnt work cause i got an error
every time i started sys-net with ethernet controller added.
Then i guess i messed up somehow cause at some point qubes stoped to boot
again. well after a complete fresh reinstall i could start
On Fri, Mar 24, 2017 at 2:55 AM, Shane Optima wrote:
> However, I justed noticed that R3.2 introduced a Dom0-to-hyperboard[1] copy
> function, and since Dom0 knows the window title text... couldn't there be
> another hypervisor keyboard shortcut that would use the window
I know this isn't an ideal solution, but I suspect it would be pretty darn easy
to implement:
Obviously, the holy grail of password management should involve not storing
passwords (encrypted or otherwise) on any online VM until they instant they are
needed. I've been implementing this via
29 matches
Mail list logo