Qubes OS dom0 is based on Fedora, so I imagine
sudo qubes-dom0-update system-config-language
sudo system-config-language
and then a reboot. I installed and ran it but haven't actually changed
the language... might be worth a try.
--
public key:
Thanks Del, your update is reflected in this pull request:
https://github.com/QubesOS/qubes-hcl/pull/80
... and will be available on the website soon!
/Sven
--
public key: https://www.svensemmler.org/2A632C537D744BC7.asc
fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63 2C53 7D74 4BC7
--
You
On 7/12/21 6:01 PM, ydir...@free.fr wrote:
Not sure how this information can fit in the HCL:)
Thank you for updating! This thread is linked from your HCL report so
others who want to install on the same kind of machine will find your
additional information here.
/Sven
--
public key:
On 7/11/21 3:23 PM, 799 wrote:
Not sure if there is a big benefit using Debian over Fedora 33 but I would
like to hear if there is a benefit.
Personally I like that once I setup a Debian qube, it'll run and receive
security updates for many years. I haven't looked up how quickly a
Fedora
Hi one7two99,
there is another way.
Your sys-net is a named disposable VM, which is based on an AppVM that
has the "template_for_dispvm" property set true. This AppVM is in turn
based on your fedora-33-minimal clone.
The reason you have an AppVM as template for disposable VMs is the
On 7/5/21 8:37 AM, 'Del' via qubes-users wrote:
My contribution to the install base. Soon to upgrade RAM from 12GB to
16GB.
Thank you Del for your HCL report, which is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/76
... and will be visible on the website soon!
Thank you Muhammad for your HCL report, which is now part of this pull
request:
https://github.com/QubesOS/qubes-hcl/pull/75
... and will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/2A632C537D744BC7.asc
fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63
Thank you Steve for your HCL report, which is now part of this pull
request:
https://github.com/QubesOS/qubes-hcl/pull/74
... and will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/2A632C537D744BC7.asc
fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63 2C53
On 7/1/21 7:47 AM, Dominique wrote:
Search the web to see which firmware needs to be installed in debian
to support that card
If your WiFi is Intel just install the "firmware-iwlwifi"
--
public key: https://www.svensemmler.org/2A632C537D744BC7.asc
fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B
On 6/24/21 11:54 AM, José Almeida wrote:
i should report this whonix bug, how can i do it?
I types "whonix report bug" in the search field of my browser and the
first hit was:
https://www.whonix.org/wiki/Reporting_Bugs
;-)
/Sven
--
public key:
On 6/24/21 6:23 AM, Stumpy wrote:
I swear I havent changed anything, and actually dont remember any > centos
updates within the last few days... huh?
My guess is that you made necessary changes (e.g. installed something)
in the template and then forgot to shut the template down before
Hi Michael,
I don't have the time currently to figure this out and send you a
working solution. So instead I'll share things I know:
1) if you inquire the window property "_QUBES_VMNAME" of the active
window, you'll get the name of the qube
2) you should be able to get to this with wmctrl
Hi @stumpy,
I don't know what your goals are exactly, but if you'd like a
debian-minimal based qube to connect to a OpenVPN than this will work
for sure:
Template (cloned from debian-minimal):
apt install qubes-repo-contrib
apt update
apt install qubes-tunnel openvpn
On 6/18/21 4:44 PM, Zanobi Wilbum wrote:
when I tried to use it, it wouldn't attach.
Then you are probably missing the pulseaudio-qubes package in the qube
you are trying to attach to.
Is it supposed to go through sys-usb like everything else,
No, as I explained in the forum.
and if not,
What happens when you type 'notify-send test' in your VPN qube?
--
public key: https://www.svensemmler.org/2A632C537D744BC7.asc
fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63 2C53 7D74 4BC7
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
On 6/17/21 8:59 AM, Stumpy wrote:
I guess I will just grin and bear it as its not crucial, I was just
hoping the fix might be simple like Sven's suggestion (thanks for the
suggestion though Sven!).
No problem. To further drill down and what could be the cause ... what
happens when you type
Do you have a notification daemon installed? If unsure, install and run
dunst and see if it works then.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On 6/10/21 3:12 PM, Sven Semmler wrote:
The one I've used is the i7-3740QM which was recommended by @Plexus.
It's a tiny bit less powerful than the i7-3840QM but about half the
price (if you shop right and not just go for the first listing on Amazon
as I did).
Actually at least in the US
On 6/10/21 2:06 PM, BGW wrote:
I see that on the Nitrokey site that they say the i7 73740 is NOT
QUBES compatible? Did I get that right?
There are three chips we should talk about to clarify this:
i7-3632QM (listed by Nitrokey, not compatible with Qubes OS)
i7-3740QM (the one I used, NOT
I forgot to mention the Nitrokey. But a Libremkey or Yubikey will do the
same job. Whatever you already have or suits your wallet / location etc.
/Sven
--
public key: https://www.svensemmler.org/2A632C537D744BC7.asc
fingerprint: DA59 75C9 ABC4 0C83 3B2F 620B 2A63 2C53 7D74 4BC7
--
You
On 6/9/21 3:54 PM, Ulrich Windl wrote:
How many $$$ (€)?
Laptop:
$244.46 ThinkPad T430
$237.62 i7-3740QM 2.70 GHz
$39.75 CPU Cooling Fan Heatsink (04W3269 0B41088 04X3788)
$84.32 Crucial RAM 16GB Kit (2x8GB) DDR3
$219.99 870 QVO 2TB SSD
$115.50 B140HAN01.3 FHD 1920x1080 High
60 (rev 73)
memory: |
16148
scsi: |
Samsung SSD 870 Rev: 1B6Q
DVD-RW DS8A8SH Rev: KU54
usb: |
4
versions:
- works:
'yes'
qubes: |
R4.0
xen: |
4.8.5-32.fc25
kernel: |
4.19.182-1
remark: |
credit: |
Sven Semmler
lin
On 5/30/21 12:37 AM, Adam Mercer wrote:
this opens a dialog asking me to select a target domain
check your /etc/qubes-rpc/policy/qubes.OpenURL
If you want your example to work add this line before all others:
$anyvm browser allow
The first is the source qube ... the one calling
On 5/25/21 6:00 AM, t...@yvt.net.au wrote:
Machine purpose built to run Qubes
ASRock-B560Pro, Intel i5-11500
Thank you for your HCL report, which is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/66
... and will be visible on the website soon!
/Sven
--
public
TLDR: installing O365 using CrossOver is a normal Linux thing and has
nothing Qubes OS specific to it -- whatever works in a "normal" Linux
will work on Qubes OS too; if done with a standard Debian/Fedora qube
all Qubes OS features will work.
experience running CrossOver in Qubes
I don't
On 5/26/21 11:01 AM, Ulrich Windl wrote:
most spammers want "to buy our products" ;-) Still we are not able to
use Office 365.
That one went straight over my head, possibly been away from Germany for
too long (15 years). Sorry for being a bit grumpy. Didn't sleep much
last night.
For others
On 5/26/21 8:53 AM, Ulrich Windl wrote:
On 5/13/21 2:36 PM, 'taran1s' via qubes-users wrote:
due to my work assignment, I will need to use MS Office 365 and I
would like to keep using my Qubes laptop.
IMHO running Office 365 from Qubes OS makes very little sense
The entire idea of Qubes OS
On 5/25/21 6:00 AM, t...@yvt.net.au wrote:
No recognition of Intel i219-v NIC
That NIC shows up in 35 positive HCLs ... just checked.
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
--
You received this message
On 5/25/21 6:00 AM, t...@yvt.net.au wrote:
"Unable to reset PCI device... no FLR PM reset etc..."
Have you tried https://www.qubes-os.org/doc/pci-devices/#no-strict-reset ?
If not, maybe I hold off adding your HCL to the next pull request until
you had a chance to try? Let me know.
/Sven
Hallo Olaf & Liesbeth,
Danke fuer den HCL Report, er ist jetzt Teil dieses Pull Requests und
wird bald auf der Webseite verfuegbar sein.
https://github.com/QubesOS/qubes-hcl/pull/64
Thank you for you HCL request, which is now part of the above pull
request and will be visible on the website
Hi Philémon,
thank you for your HCL report. It is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/63
... and will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B
On 5/13/21 10:08 AM, 'taran1s' via qubes-users wrote:
I believe that I could possibly to get out with the MS Office 2019
instead of Office 365. Would this change the equation and make things
easier?
When using a Windows VM I don't think it really makes a difference. In
both cases you need
On 5/12/21 2:02 PM, 'awokd' via qubes-users wrote:
newer laptops often only have one, in the continued pursuit of saving a
few pennies at the customer's expense
Yep, my ThinkPad P51 came with just one. Got an additional express card
to have a second one.
/Sven
--
public key:
need to use MS Office 365
Condolences.
workaround other than necessity to install whole Windows OS
https://www.codeweavers.com/compatibility/crossover/microsoft-office-365
WIN7 or WIN10 [...] point me to a how to guide?
https://github.com/elliotkillick/qvm-create-windows-qube
But if
On 5/1/21 2:51 AM, longridge wrote:
CAN YOU ADVISE WHEN THE DOWNLOAD WILL BE UPDATED TO USE FEDORA 33?
There are no plans communicated for a release after R4.0.4 ... there
might or might not be a R4.0.5
Fedora templates EOL rather rapidly so reinstalling or re-releasing
Qubes OS every time
On 4/21/21 9:07 AM, 'Ólafur Jens Sigurðsson' via qubes-users wrote:
When we open an attachment from emails, like .odf files and such, and
start writing in them, meaning to send the edited file back to the
sender. Then there is a slight chance of a person saving the file,
closing the editor and
On 4/30/21 5:07 AM, ydir...@free.fr wrote:
Is it useful to add this information to the HCL entry itself ?
Is there any kernel with which VFIO is supported, or is it simply "VFIO
not supported"?
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D
Hi A Luciani,
thank you for this additional HCL report which is now part of the same
pull request:
https://github.com/QubesOS/qubes-hcl/pull/60
... and will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC
Hi Yann,
you did an excellent job preparing your HCL report. The edits I've made
where for consistencies sake with all the other HCL reports and I
shortened you remarks to what has to be done.
Feel free to reply to this thread with more details if you like. I will
be linked from your report
On 4/22/21 4:38 PM, A Luciani wrote:
sys-usb don't work, i'm currently trying to see why, maybe i have to
check something in the BIOS because the VM will boot if there is no
PCI (USB) device in "device" option.
Thank you for your HCL report, it is not part of this pull request:
Hi Johnathon,
thank you for your HCL report! It is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/60
... and will be visible on the website soon.
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B
Hi celiashc,
thank you for your HCL report, which is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/59
It will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54
Hi Ben,
thank you for this HCL report. It is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/59
... and will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54
Hi Ben,
you wrote:
Installed in legacy mode - will try another install at some point to see
if I can get UEFI working.
Thank you for your HCL report! Are you aware that there was a thread
about this machine in 2019?
https://groups.google.com/g/qubes-users/c/WMc88pfT-hM/m/4r7sS6d7BQAJ
Thank you Encrypted Giraffe!
Your HCL report is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/58
... and will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54
Hi Ulrich,
have you considered asking those questions over at forums.whonix.org?
swdate is part of Whonix which is packaged with Qubes OS but a separate
project.
Here is a thread that would probably connect you with the right people
to answer your questions:
i3 is supported by Qubes OS and can simply be installed like so:
sudo qubes-dom0-update i3 i3-settings-qubes
... the second package contains all the scripts required for a smooth
Qubes OS experience with i3.
Lots of people use it instead of the XFCE default. I did for several years.
/Sven
Thank you A Luciani for yet another report. It too is now part of
https://github.com/QubesOS/qubes-hcl/pull/57
... and will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
--
You
Thank you A Luciani for your HCL report, it is now part of this pull
request:
https://github.com/QubesOS/qubes-hcl/pull/57
... and will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54
Thank you A. Luciani for your HCL report!
Since you haven't provided any notes/comments I assume everything works
for you?
Your HCL report is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/57
... and will be visible on the website soon!
/Sven
--
public key:
Greetings from a fellow gaijin,*
thank you for your HCL report! It is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/55
... and will be visible on the website soon!
/Sven
*(lived & worked in Tokyo from 2006-2010)
--
public key:
Hi Eddie,
you wrote:
could it be because of better support of "newer" hardware (i7, 9th
generation) in version 4.0.4
Yes absolutely, that's one of the major reasons to have those
point-point releases: make all the updates that happened available in
the install medium.
Technically if you
Thank you Henrik!
Your HCL report is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/54
... and will be visible on the website soon!
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
--
On 3/18/21 7:44 PM, Ernesto Dorado Puga wrote:
Could you confirm me if there is a limit of size of the file that can be
opened into a DispVM?.
Yes, it's whatever size you gave to the private volume of the DVM Template.
So let's say your Template is called 'fedora-32-dvm', then open it's
Hi Josef,
thank you for sending your HCL report. It is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/53
... and will be merged into the website soon.
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E
On 3/14/21 5:43 PM, 'followentropy' via qubes-users wrote:
Didn't test extensively so far. The computer isn't waking up from hibernation.
Thank you for your HCL report, it is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/52
... and will be merged in by the website
Thank you Robert!
Your HCL report is now a pull request ...
https://github.com/QubesOS/qubes-hcl/pull/51
... and the website maintainer will merge it in soon.
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
--
On 3/10/21 10:28 AM, Stephen Edworthy wrote:
Please find attached the reports that have been run on our Star LabTop Mk
IV (Intel Core i3)
Thank you! Your report is now part of this pull request:
https://github.com/QubesOS/qubes-hcl/pull/50
... and will be merged by the website maintainer
On 3/7/21 9:51 AM, Lothar Zießau wrote:
Qubes could be installed on the HDD without probleme (I am
beginner 2 days).
Welcome to qubes-users and thank you for your HCL report submission!
In case you are not yet aware there is also a very active Qubes OS Forum
here:
On 3/5/21 5:48 PM, Vít Šesták wrote:
Well, I have to correct the claim about rdrand in Fedora 33: It does not
resolve the issue. The issue is a bit random, but it still appears.
Hi Vít,
just keep posting your findings to this thread, which is linked from
your HCL report. So others looking at
On 3/5/21 2:59 PM, Vít Šesták wrote:
I'm posting HCL report for my computer with this ASRock B550 Phantom
Gaming 4/ac and Ryzen 7 5800X.
Hi Vít,
thank you for your post. Your HCL report is now waiting as a pull
request to be merged in by the website maintainer.
Thank you for your HCL submission. It is waiting as PR #48 to be merged
by the maintainer into the website [1].
I have removed your remark:
booting UEFI no kernel parameters needed.Previous Qubes versions
needed UEFI work-arounds for Nividia Quadro M1200
... because for the R4.1 you are
On 2/25/21 9:41 PM, 'Ben Moody' via qubes-users wrote:
Some prior reports report these machines are working
Hi Ben,
I could only find one report for this exact machine and that's the
report from Jan Fabo [1]. But even then your machines are not 100% the
same. Jan's machine runs an older
On 2/19/21 2:02 PM, 'p-trenz' via qubes-users wrote:
generated the HCL report over the terminal like it says on your
website.
I'm a complete newbie to qubes
Welcome to the Qubes OS community! Your HCL is now a PR for the website
and once the maintainer merges it you will be able to see it
This is Kaby Lake chipset with Intel® HD Graphics 615
https://ark.intel.com/content/www/us/en/ark/products/97461/intel-core-i5-7y57-processor-4m-cache-up-to-3-30-ghz.html
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
On 2/16/21 11:28 AM, Guil Dev wrote:
mouse from the keyboard does not work for now
You mean the touchpad?
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
--
You received this message because you are subscribed
On 2/6/21 3:37 AM, tburkh...@cock.li wrote:
No ethernet out the box as the motherboard ethernet controller is
Realtek RTL8125 which wasn't added to the kernel until 5.9
Everything else works as expected
Hi tburkhart,
did you mean to attach the HCL report?
/Sven
--
public key:
On 2/5/21 12:18 AM, 'st0rmth3g8s' via qubes-users wrote:
How do I change the default to "Safest", as when I try to change the
settings in the whonix-ws-15-dvm and whonix-ws-15 templatevm it says
I should run tor browser in them (which is totally understandable)?
In case of dispVMs the
On 2/1/21 3:58 PM, Ulrich Windl wrote:
Couldn't there be conflicts between the updates in the AppVM and the
template? If not, wouldn't that waste space by keeping some updates
more than once?
If the AppVM is not a disposable one, the updates are still lost?
Wouldn't that mean any (e.g.) update
So you don't base AppVMs on the minimal template, but have multiple
"adjusted" almost-minimal templates?
Unman is the actual maintainer of the debian templates
(https://www.qubes-os.org/team/#unman)
My understanding of what he wrote is that he bases "almost *all*" of his
"working qubes" on
On 1/29/21 3:48 PM, 'awokd' via qubes-users wrote:
Be aware though that starting your dispvm's from a common .mozilla
config instead of a freshly created one every time may result in
increased fingerprintability. Some of the values in there seemed to be
unique, and if unchanged between
On 1/29/21 3:58 AM, Josefa Hays wrote:
I use dispvm's all the time (both Fedora and Debian dispvms). Thus, I
am quite annoyed to see varios "first run" issues every time i start
Firefox in a disp-vm. I would like to perform the following changes
in the template-vms, preferably from CLI, so I
Ignore please. Sorry for the noise.
This appears to have been a temporary issue.
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
--
You received this message because you are subscribed to the Google Groups
To make it more interesting: qubes-dom0-update via sys-whonix also fails
with "Cannot retrieve repository metadata (repomd.xml) for repository:
fedora"
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6 A7AA DA6E 167B 8F54 1FB6
--
You
Ok, it's actually more complicated than that, but it didn't all fit into
the subject.
Here is my setup:
sys-net <-> sys-firewall <-> sys-whonix <-> sys-firewall-anon
sys-firewall-anon runs apt-cacher-ng with is configured to also work
with fedora qubes. In qubes.UpdatesProxy all templates
On 1/15/21 7:39 PM, unman wrote:
If you use a single template and load it with software[...] By
contrast, if you use a minimal template and install a single
application, the attack surface is smaller.
Now I see.
In my system, almost*all* my working qubes are based on adapted
minimal
On 1/15/21 6:10 PM, unman wrote:
at the expense of security, since all AppVMs based on that template
will have a large number of applications/libraries which may be ripe
for exploit.
Could you please elaborate? I am not sure I understand.
I'm not altogether clear on what you mean here.
I
On 1/14/21 4:21 PM, Sven Semmler wrote:
Not sure where to go from here.
Can't seem to make it work on the plain debian templates. So my choices are:
a) debian-minimal based kicksecure
b) fedora-minimal
The reason I wanted to have "plain" debian-minimal was to get more
minimal (
On 1/13/21 9:11 PM, Sven Semmler wrote:
So my strategy is to see which additional packages kicksecure installs
in the system.
Didn't work out. None of the packages that are not specific to
kicksecure and are part of the normal debian repo fix the issue. Neither
does debian-10 full
On 1/14/21 11:06 AM, Sven Semmler wrote:
Actually I am unsure about debian-10 ... but definitely kicksecure
(debian based) and fedora.
Yup, debian-10 full also doesn't work.
Found this: https://github.com/QubesOS/qubes-issues/issues/4276
Ignore, this is unrelated.
--
public key: https
On 1/13/21 9:11 PM, Sven Semmler wrote:
That was with kicksecure (installed on top of debian-10-minimal by
following https://www.whonix.org/wiki/Kicksecure/Debian) as well as
a full debian-10 and fedora-?? (long ago) template.
Actually I am unsure about debian-10 ... but definitely kicksecure
I am re-building all my templates based on debian-10-minimal. HiDPI
scaling works with all programs (Xft.dpi in
/etc/X11/Xresources/x11-common) except for JRE based programs.
In the past, if I installed gnome-settings-daemon and then set the
scaling factor in gnome-tweaks it also worked with
On 1/7/21 9:29 AM, DEBBIE FLEMING wrote:
I am going to apologize upfront for this email. I know it isn't something
you want on your group postings- but I need some help.My son is a computer
geek and he is also in prison for the next 10 years. He wants to have some
subscriptions to computer
On 1/7/21 10:12 AM, superiorimmunity wrote:
Though it seems that page doesn't exist anymore, there is page with
similar instructions
Thank you! I will point your post with the next update of the HCL.
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D
On 12/30/20 4:30 AM, RastaBaby wrote:
now I figured out that I need the file *libpcre.so.1()(64bit) *to update
qt5 ... I just found a package for fc26 but I don't find any solution do
install libpcre...
Hi RastaBaby,
it appears the version of Qt you need does not come with Fedora 25,
which
On 12/29/20 3:52 AM, Max Parker wrote:
dell link no longer works:(
@ADW: what do we want to do in such a case? Already checked the internet
archive and couldn't find any cached versions.
/Sven
--
public key: https://www.svensemmler.org/0x8F541FB6.asc
fingerprint: D7CA F2DB 658D 89BC 08D6
On 12/28/20 4:28 AM, RastaBaby wrote:
I am trying to install latte dock in dom [...] I downloaded the new
version from GitHub but don't know how to install the install.sh,
I assume you understand the security implications of this?
If you are actually at risk: don't do this! Do not modify,
On 12/16/20 4:07 AM, 'keyandthegate' via qubes-users wrote:
When my computer is laggy key sometimes the UI will freeze for a
second, and then the last key i pressed before it froze will be
repeated as if it was held down the entire time (I like setting my
key repeat rather low).
Does this
On 12/13/20 4:17 PM, 'Reece O'Bryan' via qubes-users wrote:
I am wondering if anyone has any ideas as to how I could run a screen
reader in Qubes. I use Orca with Debian-based systems, would it be
possible to do the same thing?
I am afraid that's going to be a though one. The way I understand
Hi Rainer, you wrote:
Okay, lets say, we can trust Intel and the computer manufacturer.
But is it really necesarry to install the update as long as I work
with Qubes OS?
I answer so you know I am not ignoring you. The fact is that I am not
qualified to answer this question. I hope someone
Hi Rainer,
On 12/1/20 7:36 AM, you wrote:
A) What could be the reason for the output "FIXME" in the report?
These are fields the tool can't fill automatically and is asking you to
fill in. Many HCL reports submitted on this list still have FIXME for
cpu-short, chipset-short and gpu-short.
*
I am not sure who wrote:
The other question is when I want to open all links in a DVM
(starting a new DVM/browser for every link looks like overkill to
me), how can I set APPVMNAME correctly (it will have a name like
"disp9474", changing whenever on is started). And can such DVM be
started
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/12/20 11:41 AM, Alex Smirnoff wrote:
> Is there a browser plugin that adds "open URL in disposable VM"
> function? like private tab on steroids :)
https://github.com/raffaeleflorio/qubes-url-redirector
- --
public key:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 11/9/20 11:22 AM, 'M' via qubes-users wrote:
> Shall I just assign the projector the same way when using
> USB-devices or how does it work with a external HDMI device ?
It should just show up in dom0 as another display. In XFCE you can use
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 8/26/20 3:07 AM, 54th Parallel wrote:
> the wider point I want to make is that people jump on Chrome OS
> simply for being an OS by Google.
Well, that is a bit understandable. Google earns almost all their money
by selling user data / presenting
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 8/22/20 10:10 AM, unman wrote:
> To deal with the question here, I use debian minimal templates
> extensively, (NOT with qubes-vm-hardening), and have never seen
> this issue - neither the unreliable firewall nor the warning
> prompts issue. I've
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 8/22/20 5:11 AM, 54th Parallel wrote:
> I don't want to get into an argument with you, so all I'll say is
> that you should probably read up more on ChromeOS.
Here are my thoughts: security is on a spectrum, here are two extremes:
a)
- -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 8/10/20 11:05 AM, Toptin wrote:
> I'm currently digging my way through the exceptional good Qubes
> documentation. Everything is nicely explained as to why a certain
> decision / implementation was made, except for the use of Fedora as
> main
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 7/5/20 5:32 AM, Jason Long wrote:
> I just want to use Qubes-OS in general and not use its
> Virtualization feature. Is it secure or just secure in
> Virtualization?
Please always answer to the list so others can follow and contribute
to our
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 7/4/20 2:40 PM, 'Jason Long' via qubes-users wrote:
> The Qubes-OS is secure in nature or just secure in Virtualization?
> How about the system resourced that it using by default?
Could you please explain your question a bit more?
Qubes OS is
101 - 200 of 421 matches
Mail list logo