Correct on both counts, yes. Just a minor glitch/very slight annoyance.
On Aug 13, 2016 1:35 AM, "Andrew David Wong" wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-12 08:07, arthur.summ...@gmail.com wrote:
> > This is not a huge "bug" but just a superficial flaw. After
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-12 11:27, johnroberts19...@gmail.com wrote:
> On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote:
> On 2016-08-11 05:08, amad...@riseup.net wrote:
My understanding is that by default Qubes Dom0 is protected from
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-12 11:24, Gabriele Bini wrote:
> Hello, I have exactly the same problem. This is what I did: 1. I downloaded
> the Qubes-R3.1-x86_64.iso ISO from the Torrent. 2. I checked the signature
> and the hash values in the DIGEST file (I checked j
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-12 11:19, johnroberts19...@gmail.com wrote:
> Hello
>
> i disable all the option auto update options but qubes still pop the
> update icon in my qubes vm manager.
>
> qubes vm manager "System - Global Settings" Disable dom0 and VM update
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-12 08:07, arthur.summ...@gmail.com wrote:
> This is not a huge "bug" but just a superficial flaw. After I suspend my
> system, upon resume, I get a notification from Network Manager that the
> network connection has been disconnected. Th
I'm thinking transferring for example all *.PDF-files (I allways print out
interesting pages to PDF, in addition to bookmarking them sometimes) from
personal/private/pseudonymous/anonymous VMs (having increasing anonymity,
privacy and security), and then just kicking them off to tarsnap.
--
Yo
Just thought I'd leave this here.
Maybe it works for you, maybe it does not.
1. Shutdown whatever VMs are needed, and the sys-firewall
2. Open terminal in dom0, qvm-clone the sys-firewall
3. Set it to deny all traffic except to the IP that you want to
https://xpra.org/ into your win7 HVM from. VN
Hi all, I'm a new qubes user and have been following the guides to get trim
enabled for the dom0. Everything seems to have gone smoothly until the grub
steps. I can't find a grub.cfg file anywhere. The only abnormality to my
installation is that it's UEFI. So the closest thing I did find to this
On Fri, 12 Aug 2016 07:56:23 -0700 (PDT)
lol lol wrote:
> Hi guys, it doesn't work on a step 9 after compiling.
>
> /home/user/qubes-src/vmm-xenPKGBUILD: line 49: autoreconf: command
> not found ==> ERROR: A failure occurred in build().
> Aborting...
> /home/user/qubes-builder/qubes-src/bu
I realize USB drives (or USB *anything*) is a stupid, stupid idea when it
comes to being security conscious, but while trying out Qubes, I do have
my root drive on an external USB HD.
(And there's something to be said for taking your drive with you.)
It works great in general, is fast enough, and
Greetings, Qubers.
Say you have a VM (e.g. "Banking only"), which has a NetVM of
sys-firewall, but for which you have disallowed or greatly restricted
networking, turned off DNS and ICMP, but left on "allow connection to
updates proxy."
As I understand it, this creates rules in sys-firewall to en
On 08/12/2016 01:27 PM, johnroberts19...@gmail.com wrote:
> On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote:
> On 2016-08-11 05:08, amad...@riseup.net wrote:
My understanding is that by default Qubes Dom0 is protected from USB
attacks by disallowing access to USB
On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-11 05:08, amad...@riseup.net wrote:
> > My understanding is that by default Qubes Dom0 is protected from USB
> > attacks by disallowing access to USB's. To
Hello,
I have exactly the same problem. This is what I did:
1. I downloaded the Qubes-R3.1-x86_64.iso ISO from the Torrent.
2. I checked the signature and the hash values in the DIGEST file (I checked
just the hash values in a second PC) and everything was fine.
3. I used dd to copy the ISO in a U
Hello
i disable all the option auto update options but qubes still pop the update
icon in my qubes vm manager.
qubes vm manager "System - Global Settings" Disable dom0 and VM updates
Fedorar 23 Template VM disable firewall rule "Allow connections to Updates
Proxy"
and even then from time to ti
Hi all,
I installed Qubes 3.2 with KDE and XFCE with the intention of continuing
to use KDE as I did before. However, there were so many problems and
bugs that I decided to use XFCE in the hope of having less of those.
Although, it is not bug free, it works a lot better, so I would like to
remove
This is not a huge "bug" but just a superficial flaw. After I suspend my
system, upon resume, I get a notification from Network Manager that the network
connection has been disconnected. This notification won't go away unless I
click to close it. There is a bug that was reported back in 2011 tha
On 08/12/2016 01:39 PM, neilhard...@gmail.com wrote:
> I would like to be able to do something like:
>
> 1. Use Whonix/Tor as a disposable VM
>
> 2. Record browsing history using an external software
>
> One of the reasons I don't use Tor that much (other than slow speed, captchas
> etc) is becaus
Hi guys, it doesn't work on a step 9 after compiling.
:: Running post-transaction hooks...
(1/2) Updating manpage index...
mandb: can't set the locale; make sure $LC_* and $LANG are correct
--
bsdtar: Failed to set default locale
I would like to be able to do something like:
1. Use Whonix/Tor as a disposable VM
2. Record browsing history using an external software
One of the reasons I don't use Tor that much (other than slow speed, captchas
etc) is because I actually want to have a record of the websites I have visited.
this is the instructions in the driver files from the tl-wn823n website.
I have no success so far how to do it with qubes ?
want to attach the usb wifi stick to my sys net. this device does not even get
recognized by qubes but lsusb shows there is a device plugged in.
1. Development Environment
On Fri, 12 Aug 2016 00:37:59 -0700
Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-10 04:32, RSS wrote:
> > Everything should be update, with Qubes stretch "testing" sources
> > turned on.
> >
> > This has been broken for a while, is it a known proble
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Aug 11, 2016 at 11:07:54AM -0700, Adrian Rocha wrote:
> Hi,
>
> I have two network devices and one only USB controller, so both devices are
> in the same VM (sys-usb). I want to route some app-VMs by one network and the
> rest by the other
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-10 04:32, RSS wrote:
> Everything should be update, with Qubes stretch "testing" sources turned
> on.
>
> This has been broken for a while, is it a known problem? If I try to start
> it manually with debug turned on, there seems to be ze
Everything should be update, with Qubes stretch "testing" sources turned
on.
This has been broken for a while, is it a known problem? If I try to
start it manually with debug turned on, there seems to be zero useful
information:
$ pulseaudio --start --log-level=debug -n
--file=/etc/pulse/qubes-de
Andrew,
THANK YOU very much. I really really appreciate your work, your answers.
wish there are more people like you that helps other people getting a clearer
idea how to do jobs correct.
thank you again and again
Nick
--
You received this message because you are subscribed to the Google Groups
26 matches
Mail list logo