I have a Windows VM where I run Outlook for work purposes. It works great and I
keep it in a separate xfce workspace. I'm running it in desktop mode (i.e. the
Windows desktop is in a single Xfce window).
After a certain amount of time (hard to say how long, but I'd guess it's in the
30 minute
I have QREXEC installed in the Windows 7 Guest.
I do NOT have the GUI Agent, not have seamless turned on.
Yet upon starting, it hides the UI for Windows.
Here are the prefs...
-
[{user}@dom0 ~]$ qvm-prefs win7x64-tpl
name :
On Wed, Apr 12, 2017 at 11:15:26PM +, Nick Darren wrote:
> Hello,
>
> If building xenial template using qubes-builder, I found that some
> "important" repos from 'Ubuntu Update Repos' that includes both
> `xenial-security` and `xenial-updates` went missing inside
> `sources.list`. How comes
Hello.
I am trying to achieve a network between two HVMs one Windows and one Linux, My
setup is as follows:
NetVM---FirewallVM---Linux VM (ubuntu)/Windows HVM.
I have followed the directions here:
https://www.qubes-os.org/doc/firewall/
but these directions do not work fully. I can establish a
Hello,
If building xenial template using qubes-builder, I found that some
"important" repos from 'Ubuntu Update Repos' that includes both
`xenial-security` and `xenial-updates` went missing inside
`sources.list`. How comes it doesn't include both the repos by default?
There's no qubes-specific
Hello, i hope you can help me.
After I install Qubes to the SSD and reboot, it does not recognize the SSD as a
bootable device. Using the same install procedures on another SSD (SATA),
everything works fine. When using Qubes from the SSD (SATA) to access the M.2
SSD, the BOOT file is empty, so
Hello, i hope you can help me.
After I install Qubes to the SSD and reboot, it does not recognize the SSD as a
bootable device. Using the same install procedures on a HDD, everything works
fine. When using Qubes from the HDD to access the SSD, the BOOT file is empty,
so there are no files to
Any clue why Windows 7 won't boot when I have MirageOS selected as the firewall?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
I follow the tips on that thread, firstly giving 4GB ram and 50GB
partition but windows 7 freezes always at the start, after changing
'xen' to 'cirrus', in this case libvirt defines 'cirrus' an invalid
argument.
On 4/4/2017 at 1:54 PM, "Ted Brenner" wrote:Check out this thread.
On Wednesday, April 12, 2017 at 10:08:20 PM UTC+3, Hack wrote:
> On 04/12/2017 08:35 PM, daltong defourne wrote:
> > On Wednesday, April 12, 2017 at 8:48:30 PM UTC+3, cooloutac wrote:
> >> On Wednesday, April 12, 2017 at 1:16:36 PM UTC-4, daltong defourne wrote:
> >>> I know this (and similar
On Wednesday, April 12, 2017 at 3:20:30 PM UTC-4, Chris Laprise wrote:
> On 04/12/2017 02:37 PM, Jean-Philippe Ouellet wrote:
> > On Wed, Apr 12, 2017 at 2:07 PM, Sam Hentschel
> > wrote:
> >> On Wednesday, April 12, 2017 at 4:15:08 AM UTC-4, Unman wrote:
> >>> On Tue, Apr
On 04/12/2017 07:16 PM, daltong defourne wrote:
I know this (and similar matters) has been discussed in different places, on
and off
For example here:
https://groups.google.com/forum/#!topic/qubes-users/jtjyq8N6bY0/discussion
https://groups.google.com/forum/#!topic/qubes-users/gCklOzk9xYg
cooloutac:
> On Wednesday, April 12, 2017 at 10:55:08 AM UTC-4, qubenix wrote:
>> Unman:
>>> On Tue, Apr 11, 2017 at 06:20:38AM -0700, Dominique St-Pierre Boucher wrote:
On Monday, April 10, 2017 at 5:06:30 PM UTC-4, qubenix wrote:
> qubenix:
>> Andrew David Wong:
>>> On
I know this (and similar matters) has been discussed in different places, on
and off
For example here:
https://groups.google.com/forum/#!topic/qubes-users/jtjyq8N6bY0/discussion
https://groups.google.com/forum/#!topic/qubes-users/gCklOzk9xYg
https://github.com/QubesOS/qubes-issues/issues/2627
On Wednesday, April 12, 2017 at 1:12:11 PM UTC-4, jacoblor...@gmail.com wrote:
> installed qubes with tor for everything option, how to change it without a
> complete reinstall?
I mean, I want some VM's to not automatically go through tor, as they do now.
During install there was an experimental
installed qubes with tor for everything option, how to change it without a
complete reinstall?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Sunday, April 9, 2017 at 2:24:50 PM UTC-4, Daniel Acevedo wrote:
> On Sat, 8 Apr 2017 09:31:18 -0700 (PDT)
> cooloutac wrote:
>
> > On Friday, April 7, 2017 at 2:51:11 AM UTC-4, sl98077 wrote:
> > > On Thursday, March 9, 2017 at 11:56:52 PM UTC-5, cooloutac wrote:
> > >
On Wednesday, April 12, 2017 at 12:00:00 PM UTC-4, Holger Levsen wrote:
> On Wed, Apr 12, 2017 at 08:42:49AM -0700, jacoblorenzipo...@gmail.com wrote:
> > bios update resulted in loosing qubes option in efi boot menu
> > I can boot into qubes boot repair but not sure what to do after
> > Any
On Tuesday, April 11, 2017 at 6:29:40 PM UTC-4, Reg Tiangha wrote:
> So I've been playing around with kernels in Qubes and successfully run
> kernel 4.10 in dom0 and any domUs where grsecurity-based kernels create
> too many issues. My next goal is to try and see if I can get coldkernel
> running
On Wednesday, April 12, 2017 at 4:34:48 AM UTC-4, Bernhard wrote:
> > What exactly makes subgraph special and not just another
> > apparmor/selinux MAC type clone?
> >
> > The firewall is a neat bit of progress however, but again that can
> > also be accomplished with an apparmor MAC default
On Wednesday, April 12, 2017 at 10:55:08 AM UTC-4, qubenix wrote:
> Unman:
> > On Tue, Apr 11, 2017 at 06:20:38AM -0700, Dominique St-Pierre Boucher wrote:
> >> On Monday, April 10, 2017 at 5:06:30 PM UTC-4, qubenix wrote:
> >>> qubenix:
> Andrew David Wong:
> > On 2017-04-09 15:25,
On Wed, Apr 12, 2017 at 08:42:49AM -0700, jacoblorenzipo...@gmail.com wrote:
> bios update resulted in loosing qubes option in efi boot menu
> I can boot into qubes boot repair but not sure what to do after
> Any suggestions?
after you chrooted into the system as suggested by the repair script,
bios update resulted in loosing qubes option in efi boot menu
I can boot into qubes boot repair but not sure what to do after
Any suggestions?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
On 04/12/2017 10:39 AM, henrydoblin...@gmail.com wrote:
Ok. I found the network connections setup (from my previous post "Newbie question on
VPN"). Now I want to download the ca certificate.
However "wget" doesn't work (on the dom0 terminal). No problem there is a manual about a
qubes builder
Unman:
> On Tue, Apr 11, 2017 at 06:20:38AM -0700, Dominique St-Pierre Boucher wrote:
>> On Monday, April 10, 2017 at 5:06:30 PM UTC-4, qubenix wrote:
>>> qubenix:
Andrew David Wong:
> On 2017-04-09 15:25, Joonas Lehtonen wrote:
>> Hi,
>
>> if you setup MAC randomization via
Ok. I found the network connections setup (from my previous post "Newbie
question on VPN"). Now I want to download the ca certificate.
However "wget" doesn't work (on the dom0 terminal). No problem there is a
manual about a qubes builder (wich maybe a bit of an overkill for my task).
Anyway,
I would appreciate it if two people would be so generous to send me invitation
codes.
Thank you
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 04/12/2017 10:34 AM, Bernhard wrote:
> I perfectly agree that this 'phone home' business is inaccaptable.
> If you consider that this type of firewall is easy to set up within
> qubes I invite you to write a small tutorial on the subject for
>
> What exactly makes subgraph special and not just another
> apparmor/selinux MAC type clone?
>
> The firewall is a neat bit of progress however, but again that can
> also be accomplished with an apparmor MAC default profile however
> allow app to access site etc is only on an IP basis not a DNS
On Tue, Apr 11, 2017 at 11:12:50PM -0400, Sam Hentschel wrote:
> I am trying to figure out a way to securely handle my encrypted drives
> without two things: connecting the USB directly to the Vault (as this is
> obviously a bad idea for security), and decrypting the USB in sys-usb
> (also
I went through the process just a couple of nights ago. So far the clearest
instructions I've found are listed here. Related to the Xen video driver as a
previous member has mentioned.
https://github.com/QubesOS/qubes-issues/issues/2488
--
You received this message because you are subscribed
31 matches
Mail list logo