[qubes-users] USB hardware firewall (was: epoxy on ram to prevent cold boot attacks?)

2016-09-03 Thread Robert Fisk
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 09/01/2016 06:55 PM, johnyju...@sigaint.org wrote: > I was thinking earlier that some form of a "USB Firewall" hardware > device might be cool to create; one that goes into each USB port in > between each device and the PC, and only passes a

[qubes-users] App shortcuts in XFCE

2016-09-03 Thread Gaijin
I just upgraded from 3.1 to 3.2R3 and was wondering of the best way to restore some of my App shortcuts. I use some portable apps and executables that don't show up in the Applications shortcuts. In KDE I was used to the Menu Editor. I'm not familiar with XFCE and didn't see a similar option.

Re: [qubes-users] Re: Benefits of running Qubes on server-grade hardware?

2016-09-03 Thread pixel fairy
does qubes do any rowhammer mitigation? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send

Re: [qubes-users] seafile applet integration with the panel is not working

2016-09-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-03 07:37, kotot...@gmail.com wrote: > Hello, > > The seafile-applet (a kind of open-souce dropbox) is not being > displayed in the xfce panel when started. > > Is there something specific to check or fix to get it working? > Do you

Re: [qubes-users] 3.2-rc1, xfce4 volume control

2016-09-03 Thread sebastian . jug
I've found the issue, if we go to System Tools -> Settings Editor -> xfce4-mixer you need to set the property "active-card" to the value of the card you want to change volume for. This is independent of which card is active for alsa by default. However the mute is still broken. When you press

Re: [qubes-users] Announcement: Qubes OS 3.0 reaches EOL on 2016-09-09

2016-09-03 Thread Dave Ewart
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Saturday, 03.09.2016 at 19:50 +0200, Marek Marczykowski-Górecki wrote: > On Sat, Sep 03, 2016 at 06:40:46PM +0100, Dave Ewart wrote: > > On Friday, 02.09.2016 at 12:17 -0700, Andrew David Wong wrote: > > > > > As a reminder, Qubes OS 3.0

Re: [qubes-users] Re: Benefits of running Qubes on server-grade hardware?

2016-09-03 Thread Ilpo Järvinen
On Sat, 3 Sep 2016, Andrew David Wong wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-09-03 04:58, grzegorz.chodzi...@gmail.com wrote: > > W dniu sobota, 3 września 2016 13:37:27 UTC+2 użytkownik pixel > > fairy napisał: > >> On Saturday, September 3, 2016 at 2:32:54 AM

Re: [qubes-users] R3.2 USB passthough Windows HVM

2016-09-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Sep 03, 2016 at 11:33:06AM -0700, Lorenzo Lamas wrote: > Does the new USB passthrough feature also work with Windows HVMs? > > For work I need to use software that is only available on Windows and it uses > a DRM system which requires a

[qubes-users] R3.2 USB passthough Windows HVM

2016-09-03 Thread Lorenzo Lamas
Does the new USB passthrough feature also work with Windows HVMs? For work I need to use software that is only available on Windows and it uses a DRM system which requires a connected USB flash drive counterpart in order to start the software(I think it's from Codemeter, but I'm not sure). I'd

Re: [qubes-users] Announcement: Qubes OS 3.0 reaches EOL on 2016-09-09

2016-09-03 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On Sat, Sep 03, 2016 at 06:40:46PM +0100, Dave Ewart wrote: > On Friday, 02.09.2016 at 12:17 -0700, Andrew David Wong wrote: > > > As a reminder, Qubes OS 3.0 reaches EOL on 2016-09-09. If you're a > > current 3.0 user, we strongly urge you to

Re: [qubes-users] Announcement: Qubes OS 3.0 reaches EOL on 2016-09-09

2016-09-03 Thread Dave Ewart
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Friday, 02.09.2016 at 12:17 -0700, Andrew David Wong wrote: > As a reminder, Qubes OS 3.0 reaches EOL on 2016-09-09. If you're a > current 3.0 user, we strongly urge you to upgrade to a newer release > before 2016-09-09. You can read the full

Re: [qubes-users] 3.2-rc1, xfce4 volume control

2016-09-03 Thread sebastian . jug
In 3.2-rc3 the volume buttons still don't work for me either. I had to set the master card to #1 rather than #0 but I don't know how to change this for xfce4-volumed. On Wednesday, July 13, 2016 at 11:38:01 PM UTC-4, raah...@gmail.com wrote: > On Wednesday, July 13, 2016 at 6:27:41 PM UTC-4,

[qubes-users] seafile applet integration with the panel is not working

2016-09-03 Thread kototamo
Hello, The seafile-applet (a kind of open-souce dropbox) is not being displayed in the xfce panel when started. Is there something specific to check or fix to get it working? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from

Re: [qubes-users] Re: Benefits of running Qubes on server-grade hardware?

2016-09-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-03 05:15, grzegorz.chodzi...@gmail.com wrote: > W dniu sobota, 3 września 2016 14:11:04 UTC+2 użytkownik Andrew > David Wong napisał: >> >> On 2016-09-03 04:58, grzegorz.chodzi...@gmail.com wrote: >>> W dniu sobota, 3 września 2016

Re: [qubes-users] Re: Benefits of running Qubes on server-grade hardware?

2016-09-03 Thread grzegorz . chodzicki
W dniu sobota, 3 września 2016 14:11:04 UTC+2 użytkownik Andrew David Wong napisał: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > On 2016-09-03 04:58, grzegorz.chodzi...@gmail.com wrote: > > W dniu sobota, 3 września 2016 13:37:27 UTC+2 użytkownik pixel > > fairy napisał: > >> On

Re: [qubes-users] Re: Benefits of running Qubes on server-grade hardware?

2016-09-03 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-03 04:58, grzegorz.chodzi...@gmail.com wrote: > W dniu sobota, 3 września 2016 13:37:27 UTC+2 użytkownik pixel > fairy napisał: >> On Saturday, September 3, 2016 at 2:32:54 AM UTC-7, >> grzegorz@gmail.com wrote: >>> I know that

[qubes-users] Re: Benefits of running Qubes on server-grade hardware?

2016-09-03 Thread grzegorz . chodzicki
W dniu sobota, 3 września 2016 13:37:27 UTC+2 użytkownik pixel fairy napisał: > On Saturday, September 3, 2016 at 2:32:54 AM UTC-7, grzegorz@gmail.com > wrote: > > I know that QubesOS is developed mostly with notebook use in mind, however > > some users, me included, opt to run it on desktop

[qubes-users] Re: making hvm iso to block device?

2016-09-03 Thread pixel fairy
On Saturday, September 3, 2016 at 2:05:23 AM UTC-7, grzegorz@gmail.com wrote: > Why would You want to do that? You can pass the .iso file as an rgument of > the --drive or --cdrom arguments for the qvm-start script > > If the iso resides in a vm all You need to do is do it like this

Re: [qubes-users] [3.2rc2] Pulseaudio 100% CPU load at dom0

2016-09-03 Thread David Hobach
On 09/02/2016 07:10 PM, entr0py wrote: David Hobach: On 08/31/2016 08:14 PM, entr0py wrote: Eva Star: 3.2rc2 - clean install (on 3.2rc1 with updates I do not have this problem) At dom0 pulseaudio proccess always eat 100% of CPU. If I kill it, then it starts again! Please, help. Hot to fix

[qubes-users] Benefits of running Qubes on server-grade hardware?

2016-09-03 Thread grzegorz . chodzicki
I know that QubesOS is developed mostly with notebook use in mind, however some users, me included, opt to run it on desktop computers. The question is, is there any advantage of building a Qubes-dedicated machine on workstation/server components? Will Qubes be able to take advantage of higher

[qubes-users] Re: Making screenshots of Installation..

2016-09-03 Thread grzegorz . chodzicki
W dniu piątek, 2 września 2016 23:52:43 UTC+2 użytkownik Fabian Wloch napisał: > Hello, > I have the following problem: I want to make some screenshots during the > installation / record the installation process on video, but I can't boot > into the installer at all. > My reason for this is to

[qubes-users] Re: making hvm iso to block device?

2016-09-03 Thread grzegorz . chodzicki
Why would You want to do that? You can pass the .iso file as an rgument of the --drive or --cdrom arguments for the qvm-start script If the iso resides in a vm all You need to do is do it like this (assuming the VM which holds the iso is named test and the hvm is named test2) qvm start test2