[qubes-users] Re: Updated HCL report - Dell Precision 5520

2018-12-04 Thread robertwickstrom
On Sunday, May 6, 2018 at 9:46:32 AM UTC-4, Yassine wrote: > Updating previous report as reinstalling from 4.0-rc3 to 4.0 > > Needed to edit xen EFI config to remove mapbs/noexitboot keys and disable > nouveau modesetting (nouveau.modeset=0) Jim, Were you able to successfully install Qubes UEFI

Re: [qubes-users] Paste not working from one appvm to another appvm's bash (4.0)

2018-12-04 Thread Sven Semmler
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 12/4/18 6:06 PM, s.w.i.m.on.qu...@gmail.com wrote: > I also do not have a middle mouse key, again, somewhere online > said that could be used as well. Yep, that's how I do it > Is there some way I can do this? Sure. 1) pipe the output of the

[qubes-users] Paste not working from one appvm to another appvm's bash (4.0)

2018-12-04 Thread s . w . i . m . on . qubes
I have a Fedora minimal install hat I need to copy a very long cipher key into it's terminal from a file on another appvm. In the source appvm I can hit Ctl+C then Ctl+Shift+C and it will say 1Kb copied from 'appvm'. Going into the destination appvm xterm window (using passwordless sudo,

Re: [qubes-users] Installed KDE, removed KDE, now lightdm and startx are broken

2018-12-04 Thread Ranguvar
On Tue, Dec 4, 2018 at 5:41 PM wrote: > Hey all! > > Using Qubes 4.0.1-rc1, been updating with qubes-dom0-update > --releasever=4.0 > > I installed @kde-desktop-qubes, and then later uninstalled it. > > This seems to have ripped out lightdm and some other parts of X/Xfce. > > Now I don't have

[qubes-users] Installed KDE, removed KDE, now lightdm and startx are broken

2018-12-04 Thread ranguvar13
Hey all! Using Qubes 4.0.1-rc1, been updating with qubes-dom0-update --releasever=4.0 I installed @kde-desktop-qubes, and then later uninstalled it. This seems to have ripped out lightdm and some other parts of X/Xfce. Now I don't have lightdm to login, and startx fails to load any video

[qubes-users] Q4 qube-manager broke after dom0 software update yesterday

2018-12-04 Thread Steve Coleman
I was away for a week and dutifully did all my software updates upon returning. After updating Dom0 the qube-manager that was running started having problems, so I restarted it, but it then refused to run. RuntimeError: the PyQt4.QtCore and PyQt5.QtCore modules both wrap the QtObject class

Re: [qubes-users] Q4.0 qvm-prefs kernel property vs the installed/latest kernel

2018-12-04 Thread Steve Coleman
On 11/22/18 8:00 PM, unman wrote: On Tue, Nov 20, 2018 at 01:03:43PM -0500, Steve Coleman wrote: I have two up to date fedora-26 templates, that have long since been upgraded to fc28, that are both apparently 'stuck' at kernel version 4.14.74-1. I apparently can not set either template to a

Re: [qubes-users] connecting AppVM via jack to remote jack for sound output

2018-12-04 Thread dimi
No specific requirements, i just knew about Jack and there is a plethora of options jack1, jack2, netjack, JackTrip etc. but i will now dive into pulseaudio and see where it leads me, thanks for the hint Ivan. -- You received this message because you are subscribed to the Google Groups

Re: [qubes-users] connecting AppVM via jack to remote jack for sound output

2018-12-04 Thread Ivan Mitev
On 12/4/18 5:16 PM, dimi wrote: Have been reading up on jack audio control kit and decided to try out to get sound from my surfing AppVM over to a rpi3 which is connected to my PA. I'd prefer not to lay 25m Audio cables which is bad for sound quality and it also would free up my Desk from

Re: [qubes-users] Decrypting and mounting a partition while qube starts

2018-12-04 Thread tinseal374
mike: I would decrypt in dom0 and attach decrypted to qubes. You can script this in dom0 as part of startup process - if you are content with dom0 encryption you can store the password, rather than enter it each time. Cool -- I like the idea! What approach would you recommend for these: a)

Re: [qubes-users] Decrypting and mounting a partition while qube starts

2018-12-04 Thread mike
> I would decrypt in dom0 and attach decrypted to qubes. You can script > this in dom0 as part of startup process - if you are content with dom0 > encryption you can store the password, rather than enter it each time. Cool -- I like the idea! What approach would you recommend for these: a) if