I'm curious if and how someone could hack into your appVMs if there is a
firewall VM in the way. How would they detect that there is a VM on your PC
that is accessing the network connection provided by that VM? Would it just
appear to them that all the network traffic is coming from
There seems to not be much information on this. Are there any steps you can or
should take to harden your firewall vm? There are services in the qube settings
called: qubes-firewall, qubes-network, qubes-update-check, qubes-updates-proxy.
Neither of them are used in sys-net or sys-firewall.
Services include for example: clocksync, cups, qubes-firewall.
I would in particular like to know what meminfo-writer does as
https://qubes-os.org/doc/disposablevm-customization/ tells you to disable the
service on any new sys-net VM that you create. This is confusing because the
service
On Monday, 6 May 2019 17:14:46 UTC+1, daniel wrote:
> On Sun, 5 May 2019 20:24:07 +
> "'awokd' via qubes-users" wrote:
>
> > Eccentric Butterfly:
> > > When I go to backup my Qubes, the backup screen shows a red error
> > > at the bottom of th
On Monday, 6 May 2019 22:35:55 UTC+1, Eccentric Butterfly wrote:
> On Monday, 6 May 2019 17:14:46 UTC+1, daniel wrote:
> > On Sun, 5 May 2019 20:24:07 +
> > "'awokd' via qubes-users" wrote:
> >
> > > Eccentric Butterfly:
> > > > When I
When I go to backup my Qubes, the backup screen shows a red error at the bottom
of the window saying "Warning: unrecognized data found in configuration files".
Why is this? Is there anything I need to do? Will this have any effect on my
ability to backup and restore?
--
You received this
When I go to backup Qubes, the backup screen shows a red error at the bottom of
the window saying "Warning: unrecognized data found in configuration files"
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop