Guest:
> I doubt that. The CPU has virtualization capabilities and I imagine that
> these are the corresponding interrupts? The info is the same on the debian
> installation.
>
>> Try checking /proc/interrupts in a different distro too, like Mint maybe.
>
> Done. Please check below.
Thanks.
On 8/29/19 8:52 PM, scoobyscra...@gmail.com wrote:
> You may want to take a look at Fedora's Silverblue immutable desktop
> operating system. I had problems installing the latest version but
> conceptually the OS in time will be a good alternative to Qubes which I
> use as my daily driver.
The below info was collected from a debian running on the B116-M. Have added
/poc/cpuinfo for completeness (see below).
Thanks for your looking into this!
At 19:55 01/09/2019, 'awokd' via qubes-users wrote:
>'awokd' via qubes-users:
>> 'awokd' via qubes-users:
>>
HYP: 0
On 8/29/19 2:36 AM, Brendan Hoar wrote:
> On Thu, Aug 29, 2019 at 3:02 AM rec wins
> wrote:
>
>>
>> OTP won't , if the key does more than U2F you may need to get a
>> configuration application for the key and make sure it's U2F only
>> slot 1 , 2 etc
>>
>
> Yubikey OTP works through
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 01/09/2019 9.29 AM, Steven Walker wrote:
> Is there any timeline for the release of 4.0.2 Final?
>
> Steve
>
This is a very appropriate question, since we mentioned in our 4.0.2-rc1
announcement that "If no major issues are discovered in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
When recently updating to qubes-core-agent-networking
(4.0.47-1+deb10u1) in whonix-gw-15 and whonix-ws-15, I noticed the
following output, which I don't recall ever seeing before:
```
Setting up qubes-core-agent-networking (4.0.47-1+deb10u1) ...
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 01/09/2019 12.51 PM, Claudia wrote:
> I don't suppose it's possible to install Qubes in a Qubes VM?
Yes, Qubes OS can be installed inside of itself, with certain
limitations. (IIRC: must be an HVM, must contain only HVMs, and only
nested one
Description:
Qubes-VM-hardening
Leverage Qubes template non-persistence to fend off malware at VM
startup: Lock-down, quarantine and check contents of /rw private storage
that affect the execution environment.
* Acts at VM startup before private volume /rw mounts
* User:
Andrew David Wong:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 01/09/2019 8.03 AM, Claudia wrote:
Andrew David Wong:
On 31/08/2019 11.23 AM, Claudia wrote:
The "Custom Installation" doc gives instructions about how to
create a non-default dm-crypt partition, or other custom setup,
and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/09/2019 4.33 AM, Martin Thygesen wrote:
> Is there a particular approval process required to augment the
> existing documentation structure.
>
> I want to augment the existing Time update documentation with
> relevant details on using NTP
Is there a particular approval process required to augment the existing
documentation structure.
I want to augment the existing Time update documentation with relevant
details on using NTP correctly
Per
https://www.qubes-os.org/doc/change-time-zone/
I want to update this documentation with
11 matches
Mail list logo