one7tw...@gmail.com wrote on 10/7/18 9:50 PM:
What are those files for:
1) private-cow.img
2) private-cow.img.old
Your understanding of the other files looks right. Not sure about those
last two either- can you rollback changes to an AppVM?
If I want to scan my AppVMs it should be enough
Hello,
On Thursday, 4 October 2018 20:30:37 UTC+2, airele...@tutanota.com wrote:
> An implementation of a similar idea across several VMs is:
> [...]
> VM3: DisposableVM based on the above, which is offline, that does the actual
> scanning. To scan a VM, use qvm-block to attach a VM's private
>
> An implementation of a similar idea across several VMs is:
>
>
>
> VM1: any TemplateVM with clamav installed.
>
>
>
>
>
> VM2: AppVM based on above, which is network-connected so it can download new
> virus definitions. /var/lib/clamav contains the virus definitions so make it
> a
> Going beyond that, antivirus is an option. One way to run it is from a dispVM
> to which you attach various private volumes (one at a time) for scanning.
>
An implementation of a similar idea across several VMs is:
VM1: any TemplateVM with clamav installed.
VM2: AppVM based on
so..
have anyone really tried ANY anti virus with qubes OS?
indeed even for ubuntu,
the one that free, keep update, official, is sophos anti virus for linux.
others like comodo etc dunt update.
please, thanks
On Thursday, October 4, 2018 at 11:49:27 AM UTC+8, Chris Laprise wrote:
> On
On 10/03/2018 11:09 PM, ccchan...@gmail.com wrote:
hi~
i got enough CPU and RAM and SSD,
I want an extra layer of protection in addition to qubes 's protection.
what can I do?
I used to use ubuntu with sophos free anti virus for linux.
What can I install on a qubes OS?
thanks
Before