amazinggg
понедельник, 11 октября 2021 г. в 23:51:52 UTC, a...@qubes-os.org:
> Dear Qubes Community,
>
> After many years of work, the team is pleased to announce the first
> release candidate for Qubes 4.1!
>
> Qubes 4.1 includes several major new features, each of which is
> explained in depth
I reinstalled the template and then removed it again. Looks like issue
fixed now. Also I reboot the system and saw the message about converting
database from qdb (or something like this) to sqlite after I run dom0
update again.
--
You received this message because you are subscribed to the Goo
> Is your template used by another AppVM?
>
No, it show as removed.
[user dom0 ~]$ sudo dnf remove qubes-template-fedora-32
No match for argument: qubes-template-fedora-32
Error: No packages marked for removal.
> suggests also `dnf remove`, but if it failed, suggest a [manual
> uninst
Hello,
After I remove old fedora-32 template (sudo dnf remove)
qubes-dom0-update download it again to cache each time or want to process
it each time.
How to fix?
Thanks
Dependencies resolved.
Package
interesting. bump
суббота, 13 февраля 2021 г. в 17:15:19 UTC, qu...@ixls.eu:
> Dear Qubes-Users,
>
> how can I grab/capture the audio-output of one VM?
>
> It should be possible in Dom0 somehow.
>
> Thanks a lot in advance for any hint
> G.
>
>
>
--
You received this message because you are su
iptables -I FORWARD -i eth0 -j DROP
ip6tables -I FORWARD -o eth0 -j DROP
ip6tables -I FORWARD -i eth0 -j DROP
воскресенье, 17 января 2021 г. в 21:48:37 UTC, evado...@gmail.com:
>
> I'm successfully run wireguard now with new Fedora kernel. But have the
> trouble with leak. Pr
I'm successfully run wireguard now with new Fedora kernel. But have the
trouble with leak. Previous openvpn solution use specific qvpn group to
prevent leaks. What is about wireguard? How to setup everything to prevent
leaks if tunnel will down?
Thanks
--
You received this message because you
:-( thanks for your research anyway
> Chances we get seamless windows apps anytime soon are slim.
>
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+u
looks like not it's at buster-backports...
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on th
very interesting, but if it will be user then need to solve the say
WinVM-to-AppVM file transfers.
And not sure about clipboard.
вторник, 1 декабря 2020 г. в 13:52:03 UTC, Stumpy:
> On 12/1/20 8:47 AM, Alex Smirnoff wrote:
> > It would be an ideal solution for me. And should not be very hard. W
New 5.4 kernel announced support Wireguard? Can I install it and them
create fedora AppVM with wireguard?
Or what is the better way now to install wireguard appvm? Only the way to
go with Debian 10?
Thanks
--
You received this message because you are subscribed to the Google Groups
"qubes-u
> Why not just have an alternate passphrase that, when entered, shuts down
> the PC (or, as you suggest, wipes the LUKS header)? Why a timer?
>
At least because it is not constant that attacker will ask you to do
something and will not begin dump your memory immediately.
--
You received
if some someone want physical protection from torture. It is possible to
improve this concept and destroy LUKS disk header before shutdown. Then it
will be useless to torture.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
tor: LUKS password
пятница, 30 октября 2020 г. в 07:54:14 UTC, haa...@web.de:
> On 10/29/20 11:06 PM, evado...@gmail.com wrote:
> > Proof of Concept.
> >
> > github.com/evadogstar/qubes-sleepkeeper
> >
> > Qubes-Sleepkeeper protects you from physical attack wh
Proof of Concept.
github.com/evadogstar/qubes-sleepkeeper
Qubes-Sleepkeeper protects you from physical attack when the attacker force
you to enter the password of your Qubes after it wakeup from sleep or from
password guessing after wakeup. The attacker have very limited time to do
so or Qube
SPLAY not found.
So, the problem is that I don't know how to run program that request X
session on Qubes if it run from service...
Any help?
вторник, 27 октября 2020 г. в 12:58:11 UTC, evado...@gmail.com:
>
> Look like I found the solution and know how to make it. Only need to
>
Qubes by default protected from this key combinations?
Backdoor #1: Ctrl-Alt-Backspace.
This keystroke kills the X server, and on some systems, leaves you at a
text console. If the user launched X11 manually, that text console will
still be logged in. To disable this keystroke globally and
Look like I found the solution and know how to make it. Only need to
develop interface & test. When I will have time and if I will not have any
problems with the code it will be released.
вторник, 27 октября 2020 г. в 08:32:29 UTC, haa...@web.de:
> > Any ideas how to start shutdown process af
Ok! I will look into it when I will have time!
четверг, 8 октября 2020 г. в 06:24:51 UTC, a...@qubes-os.org:
> On 10/7/20 2:24 PM, evado...@gmail.com wrote:
> > Nice!
> > P.S. old version of qubes-screenshot-tool in repo. There is already next
> > version available.
>
Any ideas how to start shutdown process after wake up from sleep if user
will not unlock pc in expected time period (e.g. 30-60 seconds).
Maybe run some script before PC goes to sleep with timer and after it wake
up timer will continue and only user will have access to click "cancel"
when he w
Nice!
P.S. old version of qubes-screenshot-tool in repo. There is already next
version available.
вторник, 6 октября 2020 г. в 01:00:35 UTC, a...@qubes-os.org:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Dear Qubes Community,
>
> Marek has just published the following announcement:
anbox dot io
is it possible to start use with qubes?
Looks promising! But request some kernel modules and as I understand it is
the problem.
Any ideas how to run it?
or any other alternative?
thanks
--
You received this message because you are subscribed to the Google Groups
"qubes-users" gro
I'm not sure, but try to install new qubes template fedora-32 and change
sys-usb and other to use new template.
четверг, 27 августа 2020 г. в 21:32:33 UTC, qubes os:
> I need help recovering my OS!
>
> When I have fully started QubesOS, only *dom0 is up and ready* for use -
> but *no Qube is b
Hello,
What apps do you use on Qubes to get notifications of upcoming events?
I'm searching for some app to manage notifications (want to start it
automatically on boot of my main appVM)
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsub
24 matches
Mail list logo