Am 10/11/2016 um 08:05 PM schrieb Unman:
qvm-prefs -s internal True
Simple as that ? - thank you!
I checked the config files and did not find the "internal" switch
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
However I would not use the "move to VM" command like this, as I
experienced those requests getting lost One time files were
actually deleted, since that time I always use copy instead of
move.
Sounds troubling. Do you remember the last Qubes release version
where you experienced this kind of
Hi! I am Doris from Eltima Software.
Did you try to use it on Qubes? What exact issues appeared?
You may send me your logs on doriss.l...@eltima.com and our team will try to
solve the appeared issue.
Regards,
Doris.
--
You received this message because you are subscribed to the Google
Am 10/13/2016 um 04:12 PM schrieb Manuel Amador (Rudd-O):
On 10/11/2016 09:42 AM, Robert Mittendorf wrote:
Hey folks,
sometimes the sys-firewall (more likely a service within it) crashes
and does no longer allow connected VMs to resolve DNS.
The ProxyVM must be the responsible entity, because
On 2016-10-17 08:39, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-16 22:51, Pawel Debski wrote:
On 2016-10-16 23:22, Marek Marczykowski-Górecki wrote:
On Sun, Oct 16, 2016 at 08:21:17PM +0200, Pawel Debski wrote:
Folks,
I'm planning R3.1 -> 3.2 upgrade
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-17 08:24, katerim...@sigaint.org wrote:
> Sorry, maybe it is a bug
> There is network manager applet but it is invisible
>
Yes, this is a known issue:
https://github.com/QubesOS/qubes-issues/issues/2242
- --
Andrew David Wong (Axon)
Marek Marczykowski-Górecki:
> On Mon, Oct 17, 2016 at 07:50:26PM +, Emil Cronjäger wrote:
> Take a look at those instructions (in order):
> https://www.qubes-os.org/doc/upgrade-to-r3.0/
That got me a shell in one of the two VM's - thanx! There were some
problems with the ip-commands though,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Oct 17, 2016 at 11:08:35PM +, Emil Cronjäger wrote:
>
>
> Marek Marczykowski-Górecki:
> > On Mon, Oct 17, 2016 at 07:50:26PM +, Emil Cronjäger wrote:
> > Take a look at those instructions (in order):
> >
> Hello,
>
> I need to add some static routes since I'm using a network with different
> GWs. For that reason I've tried to add some static routes through the
> NetworkManager which maps all the configuration into a file called
> qubes-uplink-eth0 . Strangely and since this file is within the
I just did a clean install of Qubes 3.2. For some reason the resolution off
apps in Fedora VMs is wildly inconsistent. The borders of the windows, dom0,
and the Debian VMs are correct but the apps in Fedora VMs range from consistent
with the others to so low as to be almost unusable. I can't
Hi everyone,
in the last months I've been getting a lot (say, twice a week?) of
notifications of dom0 updates available which turn out to be false. I run
$ sudo qubes-dom0-update
but it tells me that there are no updates available.
I can't really recall exactly when this started, nor can I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-16 22:51, Pawel Debski wrote:
> On 2016-10-16 23:22, Marek Marczykowski-Górecki wrote:
>> On Sun, Oct 16, 2016 at 08:21:17PM +0200, Pawel Debski wrote:
>>> Folks,
>>>
>>> I'm planning R3.1 -> 3.2 upgrade and need explanation:
>>>
>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-16 23:35, Alex wrote:
> Hi everyone,
> in the last months I've been getting a lot (say, twice a week?) of
> notifications of dom0 updates available which turn out to be false. I run
> $ sudo qubes-dom0-update
> but it tells me that there
On 10/17/2016 08:42 AM, Andrew David Wong wrote:
> On 2016-10-16 23:35, Alex wrote:
>> [...]
>
>
> I get them too. It's a known issue:
>
> https://github.com/QubesOS/qubes-issues/issues/2086
>
Thank you for the reply; I don't know wether the two issues are related
(the icon persisting seems more
On Mon, Oct 17, 2016 at 02:12:52PM -, johnyju...@sigaint.org wrote:
> Lines of code added/removed:
interesting numbers, thanks for posting them here.
> Now, about 4.7. Note that the page for only lists individual names, does
> not list any company affiliations or employers at all. An odd
>
>> Now, about 4.7. Note that the page for only lists individual names,
>> does
>> not list any company affiliations or employers at all. An odd
>> change/omission?
>
> could there be a simpler explanation?
Certainly. Maybe some intern generating the stats page was too lazy to
summarize it by
On 10/17/2016 09:42 AM, Robert Mittendorf wrote:
Currently your easiest option is not to click on the links, but to
copy-paste them to an open dispVM. Small sacrifice for a major
security gain.
Well, the "easiest" option is to use a net-vm directly. What is the
security gain? Its a dispVM
Hi,
Does anyone knows how to achieve this on Qubes?
Thanks
Sent using GuerrillaMail.com
Block or report abuse:
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D
--
You received this message because you are subscribed to the Google Groups
Sorry, maybe it is a bug
There is network manager applet but it is invisible
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
The data copied to that VM (i.e. the pdf file or whatever you opened)
must be considered leaked if the VM gets compromised via e.g. drive-by
exploits.
Agreed, it's limited to that data, but nevertheless an unexpected
potential impact. And depending on your data it can be critical.
Well, that
On 10/16/2016 02:02 PM, pl1...@sigaint.org wrote:
On 10/15/2016 08:59 AM, pl1...@sigaint.org wrote:
Anyone?
Instructions for MAC anonymization have just been updated:
https://www.qubes-os.org/doc/anonymizing-your-mac-address/
Chris
Ok, is recommend to use debian as sys-net
My question is
Yes, the symlink is in place:
ls /etc/NetworkManager/system-connections
131205 lrwxrwxrwx 1 root root 32 Oct 17 21:17
/etc/NetworkManager/system-connections -> /rw/config/NM-system-connections/
The /dev/xvdb is properly mounted on /rw :
/dev/xvdb on /rw type ext4
On 10/16/2016 08:50 AM, 4lpt9o+3m11o9qubb38o via qubes-users wrote:
You don't need to manually add the iptables rules. When enable the
'qubes-yum-proxy' on the VPNVM the rule to iptables is automatically added:
Chain PR-QBS-SERVICES (1 references)
pkts bytes target prot opt in out
Hello Rudd-O,
here is an interessting concept, in some way they reach the RAM randomization
by one central DLL (for Windows Plattforms only), but it works direct on the
fly for all apps and libs!!!
http://www.morphisec.com/how-it-works/
Wow, not bad!
This will be much more robust.
And in
Hi,
I have a 3-year old backup of an old Qubes system that I cannot access
on my new, up-to-date system.
Two templates are standalone VM's: I can integrate them with the
Qubes-backup tool, so they appear in Qubes Manager, but they wont start:
"ERROR: Cannot execute qrexec-daemon!"
Two VM's are
Hello,
Tails is also using ASLR security tech now...
https://fossbytes.com/tails-2-6-secure-linux-os-snowden-updated-tor-and-kernel/
Kind Regards
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Mon, Oct 17, 2016 at 07:50:26PM +, Emil Cronjäger wrote:
> Hi,
>
> I have a 3-year old backup of an old Qubes system that I cannot access
> on my new, up-to-date system.
>
> Two templates are standalone VM's: I can integrate them with the
>
27 matches
Mail list logo