On 12/20/2016 06:57 PM, Mike Mez wrote:
"Search for "VFIO NVIDIA Error 43" on your favorite search engine.
Pretty much it just shuts off 3D mode and gives you Error 43 in device
manager if it detects some hardware virt features, there is a way
around it but I wasted hours until I figured out w
On 12/20/2016 06:57 PM, Mike Mez wrote:
This is/immensely/ helpful. To reiterate... to make sure I understand,
with "windows problems" easy is easy and impossible is basically
impossible (which I can say with experience is fairly on the money of
my experience as well). With Linux, the difficult
On Tuesday, December 20, 2016 at 5:46:56 PM UTC-5, raah...@gmail.com wrote:
> I have to reset preferences. even deleted the vm it comes back. for example
> bandcamp or soundcloud, you click and nothing happens, it constantly tries to
> load/play but nothing. I'm ready to go back to firefox for
Hi, compared to running a certain app in windows (Anki), installing it in the
Fedora template in Qubes means the first time to run is very slow to launch.
Maybe up to a minute. To install it to the template I just said "sudo yum
install anki"
Otherwise, other things running are very fast. If I
Hi Andrew,
That is great, I am getting further. I now know to investigate the Fedora text
based installer (Anaconda).
I would be happy to try and report back on the Fedora bare metal install, as my
laptop is new and has nothing on it yet (hopefully Qubes soon).
Do you happen to know what versio
I would get the radeon definitely, AMD is more foss/linux friendly than
NVIDIA as well.
Things to get:
a kgpe-d16, the best available g34 socket 16 core opteron 62xx CPU in
your price range off ebay (such as 6284SE, 6282SE or 6276) and 32GB DDR3
ECC RDIMM RAM (I would go with 4, 8gb sticks for
"I understand your position. At this point, I think you should read,
learn, and try (i.e., download, install, and use) as much as you can
about your viable options to figure out which solution is right for you.
While there is a fair amount of code and functionality that is unique
to Qubes, knowled
"Search for "VFIO NVIDIA Error 43" on your favorite search engine.
Pretty much it just shuts off 3D mode and gives you Error 43 in device
manager if it detects some hardware virt features, there is a way around it
but I wasted hours until I figured out what was going on.
It is a gpu only thing, f
This is* immensely* helpful. To reiterate... to make sure I understand,
with "windows problems" easy is easy and impossible is basically impossible
(which I can say with experience is fairly on the money of my experience as
well). With Linux, the difficultly curve of problems are kind of inverted
w
On Mon, Dec 19, 2016 at 6:13 PM, Eva Star wrote:
> Hello,
>
> Will be issue with a lot of virtual machines fixed at new Qubes Manager at
> Q4.0?
I also have lots of virtual machines, and this is a problem I intend
to address eventually unless someone else does it first ;)
> Now it's not possible
On Tuesday, December 20, 2016 at 9:11:58 AM UTC-5, jasonwals...@gmail.com wrote:
> There is a typo in my last message but it was written as "journald-dev-log"
> rather than "journal-dev-log".
>
> Is there something to do with my problems with dom0 ? At the bare minimum I
> would like at least t
I have to reset preferences. even deleted the vm it comes back. for example
bandcamp or soundcloud, you click and nothing happens, it constantly tries to
load/play but nothing. I'm ready to go back to firefox for a while again but
unfortunately firefox don't work fullscreen, so we kind of stu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Dec 20, 2016 at 04:24:37PM -0500, Jean-Philippe Ouellet wrote:
> On Tue, Dec 20, 2016 at 10:22 AM, wrote:
> > it wouldn't require external services like TOTP and other variations.
>
> The reason TOTP isn't useful is not specifically becaus
On Mon, Dec 19, 2016 at 11:56 AM, '103948'109438'0194328'0914328098
wrote:
> the new rusty security OS, RedoxOS
Neat!
Thanks for pointing this out. I was not aware of it.
My favorite of your random links so far :)
--
You received this message because you are subscribed to the Google Groups
"
On Tue, Dec 20, 2016 at 10:22 AM, wrote:
> it wouldn't require external services like TOTP and other variations.
The reason TOTP isn't useful is not specifically because it requires
an external service, but because the passphrase to be used on the next
boot is not known the previous time the com
On Tue, Dec 20, 2016 at 4:09 PM, Jean-Philippe Ouellet wrote:
> It does now somehow detect that your computer has been evil-maided, nor
> prevent it from being so.
"does now" should be "does not"
It's been a rough day >_>
--
You received this message because you are subscribed to the Google G
On Tue, Dec 20, 2016 at 4:00 PM, Jean-Philippe Ouellet wrote:
> Unless you can come up with some cryptographically-sound way to
> integrate the information provided by a 2nd factor as a hard
> requirement to complete the secrets-unsealing-at-boot process, then
> the evil-maided computer could simp
If I understand correctly, it would be completely useless.
The point of AEM is ultimately to somehow authenticate the computer to
the user, rather than the more common direction of authenticating the
identify of a user to the computer (which IIUC is all that U2F can
provide, where in the U2F case
On Tue, Dec 20, 2016 at 3:08 PM, 5n7xyb+qphld0j5ytif4l via qubes-users
wrote:
> I also don't want to remove the password from my private key since I used it
> in different devices and I don't want to use a different template as I have
> many things installed on my debian 8 template.
Using a sep
Hi,
I'm also facing the same problem. The split-gpg no longer caches the password
through the set timeout on the QUBES_GPG_AUTOACCEPT variable.
I also don't want to remove the password from my private key since I used it in
different devices and I don't want to use a different template as I have
Thanks for your help, Andrew. I did indeed check and the signature says its
good and signed on Sep 2016.
Sent using Guerrillamail.com
Block or report abuse:
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D
--
You received this message because you ar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Dec 20, 2016 at 12:37:21PM -0500, Chris Laprise wrote:
> Regarding the "Alternate Patching Method" using normal apt update: Its
> possible the template was attacked via updates even before the bug was
> announced, or sometime between the Debi
Regarding the "Alternate Patching Method" using normal apt update: Its
possible the template was attacked via updates even before the bug was
announced, or sometime between the Debian announcement and now. The
"check InRelease" only helps if the attack occurs only during the next
update and not
I was wondering how much additional security this could give AEM if it
supported adding Fido U2F as 2FA. it wouldn't require external services like
TOTP and other variations. Additionally it would dramatically slow down an
offline attack and greatly increase the cost to do it.
What do you think
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-20 06:59, 5n3sjd+a8dtbz87x13a0 via qubes-users wrote:
> My idea of resolving this by browsing to the Qubes partitions in
> the drive with a Lubuntu live CD doesn't seem like it's going to
> work: When I unencrypt the LUKS partition (virtua
My idea of resolving this by browsing to the Qubes partitions in the drive with
a Lubuntu live CD doesn't seem like it's going to work: When I unencrypt the
LUKS partition (virtual drive?), it seems to be unreadable.
Also, another point that I didn't bring up before, but has me scratching my
he
There is a typo in my last message but it was written as "journald-dev-log"
rather than "journal-dev-log".
Is there something to do with my problems with dom0 ? At the bare minimum I
would like at least to recover my files from my VMs.
Thanks
--
You received this message because you are subs
I've installed Qubes before, but never had this amount of trouble. I've been
battling with it for the past two days and cannot get it to work, so I'm
unfortunately having to bother some of you for help.
## What I've tried so far:
- vanilla Qubes 3.1 install
- vanilla Qubes 3.2 install
- Followed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-18 18:29, almightyl...@gmail.com wrote:
> So I made a HVM Template and renamed it through VM Manager, something went
> wrong and the VM Manager did not reflect the name change. (Can't seem to
> reproduce this bug)
>
> I was just wonderi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-20 04:53, pl1...@sigaint.org wrote:
> Hello The network applet of my sys-net based on debian 9 is
> invisible although I can connect to ethe/wifi/vpn. With that based
> on fedora the applet appears.
>
That appears to be this issue:
http
Next error is for core3-admin.get-sources, repo not found, this is from your
repo, can you fix this? Any chance you can meet me on some chat so we can work
out all errors at once?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
Hello
The network applet of my sys-net based on debian 9 is invisible although I
can connect to ethe/wifi/vpn. With that based on fedora the applet
appears.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop r
Subscribe
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Dear Qubes community,
We have just published Qubes Security Bulletin (QSB) #28: Debian update
mechanism vulnerability.
The current text of this QSB is reproduced below. The latest version,
including any future corrections, will always be available i
THIS message has NO further comments below, just FYI:
I have spun off a new discussion for the Grub issue:
"[qubes-users] GRUB fix GUI: Qubes community invitation to the other
Linuxes for a collaboration?"
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users
I have long wondered when the various Linux communities will finally be
able to co-operate and make a common solution for having the system fix
Grub by itself through a GUI that newcomers have a chance of using
without technical knowledge.
Something like a simple menu with "fix Grub" options l
On 12/20/2016 04:04 AM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-19 16:29, Mike Mez wrote:
Wow! I wasn't actually expecting my "dream" scenario to be so
possibly ... probably ... maybe in fact viable. I understand that
since the main focus in Qubes ea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-19 16:29, Mike Mez wrote:
> Wow! I wasn't actually expecting my "dream" scenario to be so
> possibly ... probably ... maybe in fact viable. I understand that
> since the main focus in Qubes early stages (or perhaps it's far
> more prope
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-12-19 16:51, Marek Marczykowski-Górecki wrote:
> On Sun, Dec 18, 2016 at 10:02:54PM -0800, Andrew David Wong wrote:
>> There's also:
>
>> qvm-remove --just-db
>
>> which only removes the entry from the Qubes Xen DB without
>> removing any
39 matches
Mail list logo