-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-18 18:00, haxy wrote:
> On 2017-01-16 13:22, haxy wrote:
On 2017-01-14 20:04, haxy wrote: Qubes onion repos have just
been implemented. Minimal documentation available here:
On Thursday, January 19, 2017 at 12:48:17 AM UTC, Drew White wrote:
> Hi folks,
>
> Here is what I was trying to do..
> Pass the drive to the guest.
>
>
> [{user}@dom0 {folder}]$ qvm-block -a {vmname} dom0:/dev/sdc
> Usage: qvm-block -l [options]
> usage: qvm-block -a [options] :
> usage:
On 2017-01-18 16:23, raahe...@gmail.com wrote:
On Wednesday, January 18, 2017 at 12:44:28 AM UTC-5, Gaijin wrote:
On 2017-01-18 04:35, raahe...@gmail.com wrote:
> On Friday, January 13, 2017 at 9:03:03 PM UTC-5, Gaijin wrote:
>> All of the audio for videos played on my AppVMs, regardless of
This fixed the issue for me. Thank you S MUCH!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this
On Wednesday, January 18, 2017 at 12:27:54 AM UTC-5, Asterysk wrote:
> It struck me that Qubes could be very useful for Detection of "malware" by
> placing a monitoring capability . My question is in two parts:
>
> (1) Is Wireshark the best tool to use for this within Qubes
> (2) Should it be
bb.alas...@gmail.com wrote:
> What about PCIe USB cards? Could I assign such pcie device to specific
> cube, so USB ports on that card are available only for that qube, as there
> is another controller on the card(I think so at least), or is my reasoning
> wrong?
Keep in mind you can passthrough
What about PCIe USB cards? Could I assign such pcie device to specific cube, so
USB ports on that card are available only for that qube, as there is another
controller on the card(I think so at least), or is my reasoning wrong?
W dniu środa, 18 stycznia 2017 10:58:00 UTC+1 użytkownik Grzesiek