Sec Tester:
> I Really dislike Dolphin. Thumbnail previews dont even seem to work,
> and its kinda annoying to use. I'd like to swap it out for something
> lite and simple (like the fedora-23 file browser)
>
> Just wanted to check thats not going to break anything?
>
> Looking at the package
On 10/29/2016 03:09 AM, Gaiko Kyofusho wrote:
> Is it possible to set up a VpnVM to automatically/randomly switch
> between vpn servers? At the moment I have to manually replace
> openvpn-client.opvn file with another file (with other server info)
> every time I want to change, would be great if I
On 11/07/2016 02:29 PM, Max wrote:
>
> This worked first time!
>
> I pinged from the Debian AppVM to a new Fedora AppVM. I checked that the
> pinging did not work first and then went through the steps to change the
> Fedora AppVM to connect to the proxy server NetVM, assign a static IP,
>
On 11/09/2016 01:38 PM, SEC Tester wrote:
> Hey Rudd-O,
>
> Thanks for your effort and great contribution to the Qubes community. Not
> sure why Chris was critical, especially without specifically showing evidence
> of any problems. Maybe just a troll?
>
> I haven't tried your program out yet,
I Really dislike Dolphin. Thumbnail previews dont even seem to work, and its
kinda annoying to use. I'd like to swap it out for something lite and simple
(like the fedora-23 file browser)
Just wanted to check thats not going to break anything?
Looking at the package removal list, i think it
On 11/12/2016 08:58 PM, Chris Laprise wrote:
>
> That was my first reaction, too. But years later, I am so, s glad
> ITL de-emphasized kernel-based security.
>
> If they had kept it as a supported security layer, the
> "security-in-depth" mindset would have dominated most of our
> discussions
On 11/17/2016 04:20 AM, Sec Tester wrote:
> It also raises the question,
>
> Is there any benefit running a VPN-Proxy-VM through sys-firewall?
>
> Or maybe save the overhead and just connect VPN-Proxy-VM directly to sys-Net?
>
Either works. With the firewall in between, you can limit the
Setting a boot password in the BIOS should mitigate adequately since
initrd does not execute until after boot password entry.
On 11/17/2016 12:20 AM, Vít Šesták wrote:
According to the description, it looks likely to affect Qubes.
According to my experience, I remember getting in the shell
The amendment worked like a charm.
Thanks,
Vincent
Vincent "Kim" Elliott
ITC Consultant
Kingston, Jamaica
876-381-0661
On Thu, Nov 17, 2016 at 10:24 AM, wrote:
> On Thursday, November 17, 2016 at 9:54:09 AM UTC-5, Vincent Elliott wrote:
> > Just adding my 2 cents to this
61117200447.679b1ee9%40outoftheblue.pl.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-SAMSUNG_ELECTRONICS_CO___LTD_-400B4B_400B5B_200B4B_200B5B-20161117-162307.yml
Description: application/yaml
17. Nov 2016 15:33 by dmoer...@gmail.com:
> On Wednesday, November 16, 2016 at 10:21:33 PM UTC-5, george wrote:
>> Yes. I get the same issue too. I can read the message, but I can't write,
>> and I'm also in Debian-8 VM on Qubes 3.2, with Enigmail and Thunderbird. I
>> can READ messages, but I
W dniu niedziela, 13 listopada 2016 21:30:25 UTC+1 użytkownik Grzesiek
Chodzicki napisał:
> W dniu niedziela, 13 listopada 2016 20:54:06 UTC+1 użytkownik yaqu napisał:
> > On Sun, 13 Nov 2016 11:23:35 -0800 (PST), Grzesiek Chodzicki
> > wrote:
> >
> > > Following
--
Securely sent with Tutanota. Claim your encrypted mailbox today!
https://tutanota.com
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Wednesday, November 16, 2016 at 10:21:33 PM UTC-5, george wrote:
> Yes. I get the same issue too. I can read the message, but I can't write, and
> I'm also in Debian-8 VM on Qubes 3.2, with Enigmail and Thunderbird. I can
> READ messages, but I can't send them, nor verify/encrypt/sign them.
On Thursday, November 17, 2016 at 9:54:09 AM UTC-5, Vincent Elliott wrote:
> Just adding my 2 cents to this conversation...
>
> The file "/rw/config/rc.local" does not consistently execute on Debian-8 and
> I find that the VM has to be restarted (sometimes multiple times) for it to
> take
seek, and ye shall find
I was also thinking about std Fedora dnf upgrade plugin
(https://fedoraproject.org/wiki/DNF_system_upgrade), but the Qubes
instruction better explains the intricacies of Qubes environment.
Many thanks.
Z powazaniem / Best Regards
Mit freundlichen Gruessen /
On Thu, 17 Nov 2016 05:16:12 -0800 (PST), Pawel Debski
wrote:
> I have upgraded dom0 as described in
> https://www.qubes-os.org/doc/upgrade-to-r3.2/ and than executed:
>
> sudo dnf install --refresh qubes-upgrade-vm
> sudo dnf upgrade --refresh
> sudo dnf install
On Monday, 22 August 2016 18:46:12 UTC-5, johny...@sigaint.org wrote:
> > On 2016-08-22 07:52, johnyju...@sigaint.org wrote:
> >> /rw/config/rc.local doesn't seem to be run on startup in debian-8
> >> (3.2-testing).
> >>
> >> What is supposed to launch this? systemd, another startup script, or
>
Am 11/17/2016 um 01:18 PM schrieb kotot...@gmail.com:
> Is there a bug somewhere in the kernel, in Xen or Qubes which prevent them to
> properly use this BIOS power management system correctly?
>
> Have other users experience something similar?
Thanks for sharing. Maybe power management does
I have upgraded dom0 as described in
https://www.qubes-os.org/doc/upgrade-to-r3.2/ and than executed:
sudo dnf install --refresh qubes-upgrade-vm
sudo dnf upgrade --refresh
sudo dnf install qubes-mgmt-salt-vm-connector
apparently everything went ok, however the template vm still is in version
Cant understand this "how to". I should on the PC with fedora 18 system and
fedora's repos get something with "pvops.qubes" in the name (because my dom0
kernel is 4.1.13-9.pvops.qubes.x86_64) ? How is that?
--
You received this message because you are subscribed to the Google Groups
I installed fedora 18 and added rpm-fusion repo. Now i have question - how i
can get the kernel-devel "matching my Qubes dom0 kernel"?
I have 4.1.13-9.pvops.qubes.x86_64 kernel.
>fedora 18 system
>4.1.13-9.pvops.qubes.x86_64
pick one?!?
--
You received this message because you are subscribed
Copy/Paste between dom0 and other domains is intentionally prohibited.
https://www.qubes-os.org/doc/copy-paste/#copypaste-between-dom0-and-other-domains
Or maybe you want this:
https://www.qubes-os.org/doc/copy-from-dom0/
--
You received this message because you are subscribed to the Google
On Thursday, November 17, 2016 at 8:27:49 AM UTC+1, nezn...@xy9ce.tk wrote:
> anyone?
Can you tell us what you tried and ask a more specific question? I cannot tell
what your actual problem is.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
Hello community,
I was wondering why one of my program was taking ~15 seconds to compile when my
colleague compiled it within ~3 seconds on his system. I know there are a
performance price to pay for the virtualisation but nonetheless. I was super
annoyed and I vaguely thinking about switching
On Thu, Nov 17, 2016 at 5:27 AM, Marek Marczykowski-Górecki <
marma...@invisiblethingslab.com> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Wed, Nov 16, 2016 at 07:29:35PM -0800, Sec Tester wrote:
> > So im finally getting around to rebuilding the sys-firewall VM on a
>
> I can map the phone device but then mounting with simple-mtpfs inb dom0
> gives me a blank directory.
Just out of curiosity, where did you get this simple-mtpfs?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
Connecting USB devices to Dom0 is discouraged for security reasons.
I use a VM with an attached USB controller and it works without a problem. The
only thing I have to do is switch the phone to file transfer mode instead of
charging otherwise I get an empty folder as well.
--
You received
28 matches
Mail list logo