среда, 18 января 2017 г., 5:46:30 UTC+3 пользователь steve@gmail.com
написал:
> On Tuesday, January 17, 2017 at 11:18:06 PM UTC+4, qmast...@gmail.com wrote:
> > вторник, 17 января 2017 г., 10:16:18 UTC-5 пользователь steve@gmail.com
> > написал:
> > > On Saturday, January 14, 2017 at 3:26
W dniu sobota, 14 stycznia 2017 16:43:35 UTC+1 użytkownik B&B napisał:
> Hello, for starters, pardon my ignorance, I am at the very beginning of the
> learning curve.
> I am planning out a new workstation build, I want to plan it out with Qubes
> in mind. But I have few questions, as I do not hav
среда, 18 января 2017 г., 7:21:37 UTC+3 пользователь raah...@gmail.com написал:
> On Saturday, January 14, 2017 at 2:20:23 PM UTC-5, tai...@gmx.com wrote:
> > On 01/14/2017 12:15 PM, qmaster...@gmail.com wrote:
> >
> > > суббота, 14 января 2017 г., 5:01:34 UTC-5 пользователь Chris Willard
> > > н
> >
> > ya weird. not sure why, did you make any changes to the templates
>
> is there a clean all command maybe u can try.
sorry I don't understand what you mean writing "is there a clean all command
...".
The template itself is unchanged.
--
You received this message because you are subsc
What about PCIe USB cards? Could I assign such pcie device to specific cube, so
USB ports on that card are available only for that qube, as there is another
controller on the card(I think so at least), or is my reasoning wrong?
W dniu środa, 18 stycznia 2017 10:58:00 UTC+1 użytkownik Grzesiek Ch
>First of all we need to make sure that you are prepared for flashing. coreboot
>image cannot be >flashed internally on Lenovo G505S through a purely software
>way (I tried with >internal:laptop=force_I_want_a_brick flashrom option, it
>always fails, cant do that!) .
>To install a coreboot, yo
On Wednesday, 18 January 2017 13:32:26 UTC+4, qmast...@gmail.com wrote:
> среда, 18 января 2017 г., 5:46:30 UTC+3 пользователь steve@gmail.com
> написал:
> > On Tuesday, January 17, 2017 at 11:18:06 PM UTC+4, qmast...@gmail.com wrote:
> > > вторник, 17 января 2017 г., 10:16:18 UTC-5 пользоват
On Tuesday, January 17, 2017 at 11:17:07 PM UTC-8, Sae wrote:
> On 18/01/2017 06:27, Asterysk wrote:
> > It struck me that Qubes could be very useful for Detection of "malware" by
> > placing a monitoring capability . My question is in two parts:
>
> I would create a proxyVM that dumps your traf
Has any one successfully installed PFSense ? If so, are there any benefits
compared to the standard sys-firewall other than having the ability to play
with PFSense, thx
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this gr
I absolutely agree!
I routinely run various engineering tools which are typically
"distributed" (to put it generously) as massive "untar this and run
some script as root -- up to you to resolve dependency hell", and
qubes makes this amazingly clean.
I used to have such hesitation at installing su
mich...@schefczyk.net:
> What I did notice is, that there might be interference with cryptsetup. As
> long as I have AEM on, the system does ask for the TPM password, does not
> show the secret and does NOT ask for the disk password before starting up
> anyway.
Is your TPM password the same as
Please find the output of qubes-hcl-report at the end of this mail.
NOTE that presently installing is NOT TRIVIAL, as the xen/kernel combination on
the installer image leads to an infinite reboot (as described earlier on
this list), and I would assume that the default xen/kernel installation woul
среда, 18 января 2017 г., 14:34:29 UTC+3 пользователь Asterysk написал:
> >First of all we need to make sure that you are prepared for flashing.
> >coreboot image cannot be >flashed internally on Lenovo G505S through a
> >purely software way (I tried with >internal:laptop=force_I_want_a_brick
>
Hello,
I am testing coldkernel and I have a few questions. Does or should it work with
a vpn gateway? Do I have to change some config file or special permissions?
I did not use grsec much in the past so I am in the process of learning.
I could connect to my coldkernel appvm via vpn gateway after
On Thursday, 28 August 2014 19:47:34 UTC+1, Mihai Genescu wrote:
> Hi,
> Thanks for Qubes OS!
>
>
> HVM: Yes, windows and linux HVMs created
> Qubes version: R2rc1 and R2rc2
> Net+wireless net work, suspend works, sound works, fn+keys for suspend,
> wireless, brightness work.
>
> Brightness hw
Hi!
Is anyone using the mirage firewall in connection with a proxyVM? How do you
configure it properly? Does it handle qubes-firewall-users-scripts?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receivi
среда, 18 января 2017 г., 14:39:47 UTC+3 пользователь Asterysk написал:
> On Wednesday, 18 January 2017 13:32:26 UTC+4, qmast...@gmail.com wrote:
> > среда, 18 января 2017 г., 5:46:30 UTC+3 пользователь steve@gmail.com
> > написал:
> > > On Tuesday, January 17, 2017 at 11:18:06 PM UTC+4, qmas
bb.alas...@gmail.com wrote:
> What about PCIe USB cards? Could I assign such pcie device to specific
> cube, so USB ports on that card are available only for that qube, as there
> is another controller on the card(I think so at least), or is my reasoning
> wrong?
Keep in mind you can passthrough a
daltong defourne wrote:
> Well, first, the good thing:
> Dual head windows HVM booted without issue.
How did you configure this? I got it working under VMM on Debian by adding
a secondary video adapter to the VM config but haven't been able to figure
out where I'd do the same under Qubes.
> What
On Wednesday, January 18, 2017 at 12:27:54 AM UTC-5, Asterysk wrote:
> It struck me that Qubes could be very useful for Detection of "malware" by
> placing a monitoring capability . My question is in two parts:
>
> (1) Is Wireshark the best tool to use for this within Qubes
> (2) Should it be pla
On Wednesday, January 18, 2017 at 5:01:54 AM UTC-5, Arnulf Maria Bultmann wrote:
> > >
> > > ya weird. not sure why, did you make any changes to the templates
> >
> > is there a clean all command maybe u can try.
>
> sorry I don't understand what you mean writing "is there a clean all command
On Wednesday, January 18, 2017 at 5:00:14 AM UTC-5, qmast...@gmail.com wrote:
> среда, 18 января 2017 г., 7:21:37 UTC+3 пользователь raah...@gmail.com
> написал:
> > On Saturday, January 14, 2017 at 2:20:23 PM UTC-5, tai...@gmx.com wrote:
> > > On 01/14/2017 12:15 PM, qmaster...@gmail.com wrote:
>
On Wednesday, January 18, 2017 at 4:58:00 AM UTC-5, Grzesiek Chodzicki wrote:
> W dniu sobota, 14 stycznia 2017 16:43:35 UTC+1 użytkownik B&B napisał:
> > Hello, for starters, pardon my ignorance, I am at the very beginning of the
> > learning curve.
> > I am planning out a new workstation build,
On Sunday, August 7, 2016 at 12:29:24 PM UTC-4, Dima Puntus wrote:
> Hi,
>
>
> I'd like to know if there's a way to fix the terrible screen tearing that I'm
> getting both on internal laptop screen and external monitor.
>
>
> System info:
>
>
> HP Elitebook 2570p:
> Intel HD4000 graphics
> C
On Wednesday, January 18, 2017 at 12:44:28 AM UTC-5, Gaijin wrote:
> On 2017-01-18 04:35, raahe...@gmail.com wrote:
> > On Friday, January 13, 2017 at 9:03:03 PM UTC-5, Gaijin wrote:
> >> All of the audio for videos played on my AppVMs, regardless of what
> >> template it's based on (Fedora 24/Debi
On 2017-01-18 7:14 AM, Антон Чехов wrote:
> Hello,
>
> I am testing coldkernel and I have a few questions. Does or should it work
> with a vpn gateway? Do I have to change some config file or special
> permissions?
> I did not use grsec much in the past so I am in the process of learning.
> I c
On Friday, January 13, 2017 at 6:48:06 PM UTC-5, justin.h...@gmail.com wrote:
> I have a recent desktop machine running Qubes 3.2 on a 4GHz i7 with 16GB of
> RAM
> and integrated Intel graphics. Until yesterday, I'd been happily watching
> Netflix and Youtube videos without any trouble.
>
> Then
On Wednesday, 18 January 2017 18:12:31 UTC+4, qmast...@gmail.com wrote:
> среда, 18 января 2017 г., 14:34:29 UTC+3 пользователь Asterysk написал:
> > >First of all we need to make sure that you are prepared for flashing.
> > >coreboot image cannot be >flashed internally on Lenovo G505S through a
I thought it would be a less cumbersome way to do it than attaching a device,
and then manually running two commands to attach, and also two to detach the
device. Every single time I use any device. That is less than ideal, that is
why I thought I might be able to assign one USB controller to ea
среда, 18 января 2017 г., 19:44:03 UTC+3 пользователь Asterysk написал:
> On Wednesday, 18 January 2017 18:12:31 UTC+4, qmast...@gmail.com wrote:
> > среда, 18 января 2017 г., 14:34:29 UTC+3 пользователь Asterysk написал:
> > > >First of all we need to make sure that you are prepared for flashing.
On 01/17/2017 06:49 PM, 'Joshua Bashir Gabriel' via qubes-users wrote:
Update: Got it working. It needed the wifi drivers for Debian 8/9, as
well as a couple of other utilities, found here:
https://wiki.debian.org/WiFi.
Also, I added the client for PrivateInternetAccess.com to the Net VM
so I
My problem exactly. Had Qubes running well on an old Lenovo & would love to
run it on this more capable Zenbook.
Did you get this working in the end? Alternative is to spare myself the
headache & keep running Mint until the next release.
--
You received this message because you are subscri
As always physical access is a checkmate situation, you need to not be
an idiot and don't leave your stuff in overseas hotel rooms or not have
secure locks on your door.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this g
On 2017-01-18 7:30 AM, Антон Чехов wrote:
> Hi!
>
> Is anyone using the mirage firewall in connection with a proxyVM? How do you
> configure it properly? Does it handle qubes-firewall-users-scripts?
>
I've run a Mirage-based firewall both in front of and behind a
firewallVM and they chain toget
Hi folks,
Here is what I was trying to do..
Pass the drive to the guest.
[{user}@dom0 {folder}]$ qvm-block -a {vmname} dom0:/dev/sdc
Usage: qvm-block -l [options]
usage: qvm-block -a [options] :
usage: qvm-block -A [options] :
usage: qvm-block -d [options] :
usage: qvm-block -d [options]
List
This fixed the issue for me. Thank you S MUCH!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group
On 2017-01-18 16:23, raahe...@gmail.com wrote:
On Wednesday, January 18, 2017 at 12:44:28 AM UTC-5, Gaijin wrote:
On 2017-01-18 04:35, raahe...@gmail.com wrote:
> On Friday, January 13, 2017 at 9:03:03 PM UTC-5, Gaijin wrote:
>> All of the audio for videos played on my AppVMs, regardless of what
On Thursday, January 19, 2017 at 12:48:17 AM UTC, Drew White wrote:
> Hi folks,
>
> Here is what I was trying to do..
> Pass the drive to the guest.
>
>
> [{user}@dom0 {folder}]$ qvm-block -a {vmname} dom0:/dev/sdc
> Usage: qvm-block -l [options]
> usage: qvm-block -a [options] :
> usage: qvm-b
On Thursday, 19 January 2017 12:05:07 UTC+11, 01v3g4n10 wrote:
> On Thursday, January 19, 2017 at 12:48:17 AM UTC, Drew White wrote:
> > Hi folks,
> >
> > Here is what I was trying to do..
> > Pass the drive to the guest.
> >
> >
> > [{user}@dom0 {folder}]$ qvm-block -a {vmname} dom0:/dev/sdc
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-01-16 13:22, haxy wrote:
>> On 2017-01-14 20:04, haxy wrote:
>> On Sat, Jan 14, 2017 at 12:08:25AM -, haxy wrote:
>>> Going back to the first post.
>>>
>>> "Qubes repository will allow changing the "http" to
>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-18 18:00, haxy wrote:
> On 2017-01-16 13:22, haxy wrote:
On 2017-01-14 20:04, haxy wrote: Qubes onion repos have just
been implemented. Minimal documentation available here:
https://www.qubes-os.org/doc/hidden-service-
Hi guys,
I'm having a hard time trying to figure out this. When I installed Qubes OS I
think I chose Whonix as the default to update VMs, but eventually I ended up
changing it after a couple of days and set the UpdateVM to "sys-firewall".
Now, everything seems to be fine, except for when I try
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-18 08:08, raahe...@gmail.com wrote:
> On Wednesday, January 18, 2017 at 5:01:54 AM UTC-5, Arnulf Maria
> Bultmann wrote:
ya weird. not sure why, did you make any changes to the
templates
>>>
>>> is there a clean all co
On 01/18/2017 09:26 PM, drew.qu...@gmail.com wrote:
Hi folks,
I'm wondering how I would connect to a Guests Display/Monitor as a
stream/feed ?
Or what do I need to listen to to get the next page?
Sincerely,
Drew.
VNC?
This isn't a devel conversation, you should have posted this in the
qube
On Thursday, 19 January 2017 03:04:32 UTC+4, tai...@gmx.com wrote:
> As always physical access is a checkmate situation, you need to not be
> an idiot and don't leave your stuff in overseas hotel rooms or not have
> secure locks on your door.
Unless USB port seals (e.g.
http://www.padjack.com/
I have been able to get my machine up and running Qubes 3.2 with good hardware
support: keyboard, touchpad, touchscreen and stylus all work nicely. The one
sticking point is wireless networking.
In terms of the hardware build, I'm dealing with a machine that has everything
mentioned above on on
I'm trying to have my phone connected via USB to my win7 VM so that I can flash
it with custom firmware.
I have three different USB controllers so I don't mind giving up one of the
controllers to the win7 VM.
The controllers work just fine when connected to sys-usb, but when I connect
either o
47 matches
Mail list logo