Hi,
I have some initial comments about Qubes 4.0rc3 on Lenovo Thinkpad X1
Carbon 5th gen. I'll dig further into issues listed below. But for now I
wouldn't call it "works out of the box", unfortunately :/
- EFI installer do not boot - gets back into grub instantly, /noexitboot
/mapbs do not
On Friday, December 15, 2017 at 4:54:34 PM UTC, jer...@disroot.org wrote:
> ...
You might want to delete your post after confirming (and thereby this thread),
so you help keeping the mail thread list cleaner.
--
You received this message because you are subscribed to the Google Groups
On Wednesday, December 13, 2017 at 1:37:44 PM UTC, Nuno Branco wrote:
> Hi all,
>
> I know this is already a problem on win7 HVMs not having sound by
> default and I guess win10 will be even worse due to lack of tools but
> just wondering if anyone on the list got win10 to work with audio?
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Dec 16, 2017 at 01:54:09AM +0100, Marek Marczykowski-Górecki wrote:
> Hi,
>
> I have some initial comments about Qubes 4.0rc3 on Lenovo Thinkpad X1
> Carbon 5th gen. I'll dig further into issues listed below. But for now I
> wouldn't call
On Friday, December 15, 2017 at 1:54:23 PM UTC, callu...@gmail.com wrote:
> Dear qubes-users,
>
> I've been trying to get a version of Qubes running on an Asus Zenbook UX303
> (albeit by installing to a large USB 3 stick).
>
> Having DD'd the latest image (after verification) to an
i first tried setup for my printer which has USB connected to PC...
using the guide in Using and Managing USB Devices in qubes-os website in docs..
enabled sys-sub using the command
sudo qubesctl top.enable qvm.sys-usb
then the command
sudo qubesctl state.highstate
computer froze, restarted pc,
On Friday, December 15, 2017 at 5:08:55 PM UTC, jer...@disroot.org wrote:
> I first used a konsole, using the guide on qubes's site "Using and Managing
> USB Devices"
> 1. Enable sys-usb
>
> using the command sudo qubesctl top.enable qvm.sys-usb
> 2. Apply the configuration:
> using the command
On Wednesday, December 13, 2017 at 2:05:30 AM UTC, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-12-12 17:33, grv wrote:
> > I see on https://www.qubes-os.org/doc/releases/4.0/schedule/ that
> > Dec 11 is the last date mentioned to decide if rc3 is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-12-15 19:14, Yuraeitha wrote:
> On Wednesday, December 13, 2017 at 2:05:30 AM UTC, Andrew David
> Wong wrote: On 2017-12-12 17:33, grv wrote:
I see on https://www.qubes-os.org/doc/releases/4.0/schedule/
that Dec 11 is the last
Aight, so the idea of this thread, is to get an overview of where we stand,
that is, how far are we away from archiving GPU Passthrough on Qubes.
The underlying reason it's currently not working, appears to be because of its
current state a virtual GPU for a specific VM, would require direct
On 12/15/2017 12:54 PM, Matteo wrote:
I disagree when you say nooone is going to backdoor your bios. I think its
very common nowadays.
Actually no it isn't - unless you have managed to ruffle the feathers of
a state actor such as the FSB or MSS.
I have never heard of a real proven BIOS
On Tuesday, December 12, 2017 at 1:47:06 AM UTC, [799] wrote:
> Hello,
>
> As you might have heard a new version of Crossover for Linux has been
> released.
>
> With Crossover it is possible to run Windows Apps on top of Linux.
> Crossover is based on Wine but has enhancement which are
I just wanted to clarify my questions...I made some edits:
> Scenario #1
> VM---sys-vpn--\
>\
> \
> VM-sys-firewall---sys-net
> /
> /
> VM-/
>
>
>
> Scenario #2
>
On 12/15/2017 05:58 PM, vel...@tutamail.com wrote:
Scenario #1
VM---sys-vpn\
\
\
VM-\sys-firewall---sys-net
/
/
VM---/
Scenario #2
Dear qubes-users,
I've been trying to get a version of Qubes running on an Asus Zenbook UX303
(albeit by installing to a large USB 3 stick).
Having DD'd the latest image (after verification) to an installation stick
using the latest Rufus the installer boots, recognises the target stick and
Hi,
I am tryig to run Tails under 4.0rc3 along with virtual USB storage. I
need the storage
so that I can install Tails on it, and then do some work using the
Persistence volume (for development). Any tops if this can be done?
Kushal
--
Staff, Freedom of the Press Foundation
CPython Core
Am 26.11.2017 um 16:47 schrieb awokd:
> On Sun, November 26, 2017 15:13, evo wrote:
>>
>>
>> Am 26.11.2017 um 16:10 schrieb Unman:
>>> On Sun, Nov 26, 2017 at 01:04:39PM +0100, evo wrote:
>
Hey! Thanks!
i installed qubes-usb-proxy on the webcam-VM and tried to attach it
there,
Hello everyone,
I tried to install Qubes 3.2 on a T470s without success. I have the version
with the Intel graphics. I did everything in Legacy Mode (no EFI). It does boot
but the X server cannot start. Text installation did not work.
Stephan Marwedel says in this thread he managed to install
Thank you for your reply.
Could you explain to me why using EFI would solve the problem of the X server
not starting?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
Hi,
I would try my path, download rEFInd to another usb-stick and boot the
installer from there.
The only file you need is the EFI-file:
https://sourceforge.net/projects/refind/
Also, that is an interesting data point as well, the bootx64.efi loader on
the usb install works if it is started
...
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
> I disagree when you say nooone is going to backdoor your bios. I think its
> very common nowadays.
as far as i know there is computrace that is an anti theft system that
gain persistence over the os by dropping an exe that windows will load
at boot time but this works only over fat32 and
On Fri, December 15, 2017 11:13 am, evo wrote:
> so i've tried it, but i get this error by starting webcam-vm after adding
> the usb-device to it: "libxenlight could not create a new domain
> "webcam-vm"
>
>
> if i try it one more time, i get: UnicodeDecodeError: ascii codec can't
> decode byte
I first used a konsole, using the guide on qubes's site "Using and Managing USB
Devices"
1. Enable sys-usb
using the command sudo qubesctl top.enable qvm.sys-usb
2. Apply the configuration:
using the command sudo qubesctl state.highstate
then it froze, restarted system, and when in passphrase
On Fri, December 15, 2017 1:54 pm, callumvi...@gmail.com wrote:
> The target stick then boots successfully and proceeds to 1st-time setup
> and VM creation, but hangs at a seemingly random point during this
> process (the panning progress bar freezes indefinitely).
Try letting it run overnight
Hello all.
I've installed Kali Linux template on Qubes, and I want to know if it possible
to use the wifi cards computer or to use an external wifi card (like AWUS036h)
?
Cheers.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
Scenario #1
VM---sys-vpn\
\
\
VM-\sys-firewall---sys-net
/
/
VM---/
Scenario #2
VM--sys-vpn--sys-firewall---sys-net(Wireless and ethernet)
27 matches
Mail list logo