re: /var/tmp is dom0 I am unable to cut and paste from
dom0 what I see is /dev/mapper/qubes_dom0-root 952848292
780151168(used) 123272164(available) 87% / and various others
smaller directories ; I don't know what a "partial restore"
would look like ; I never
Le dimanche 24 décembre 2017 11:03:56 UTC+1, awokd a écrit :
> On Sun, December 24, 2017 9:47 am, Frédéric Pierret (fepitre) wrote:
>
> > Hi, I have also some free time (holidays!), as I have already prepared
> > updated ISO for myself, I will give you some help on it.
>
> Thanks! I'll ping you
On Saturday, December 23, 2017 at 8:40:08 PM UTC-5, Marek Marczykowski-Górecki
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Wed, Dec 20, 2017 at 10:35:26AM -0800, cooloutac wrote:
> > Thinking of upgrading to 4.0.
> > if I want to restore vms from 3.2, possibly compromised,
On Saturday, December 23, 2017 at 5:45:47 PM UTC-5, jerry wrote:
>
https://www.qubes-os.org/doc/dom0-tools/qvm-clone/
then install printer in the cloned template, using your printer models linux
instructions. You can download the drivers using a disposable vm then transfer
them to the
On Friday, December 15, 2017 at 8:25:53 PM UTC-5, tai...@gmx.com wrote:
> On 12/15/2017 12:54 PM, Matteo wrote:
>
> >> I disagree when you say nooone is going to backdoor your bios. I think
> >> its very common nowadays.
> Actually no it isn't - unless you have managed to ruffle the feathers
On Tue, December 26, 2017 10:40 am, Frédéric Pierret (fepitre) wrote:
> Le dimanche 24 décembre 2017 11:03:56 UTC+1, awokd a écrit :
>
>> On Sun, December 24, 2017 9:47 am, Frédéric Pierret (fepitre) wrote:
>>
>>
>>> Hi, I have also some free time (holidays!), as I have already
>>> prepared
Le mardi 26 décembre 2017 00:05:28 UTC+1, tai...@gmx.com a écrit :
> On 12/25/2017 12:16 PM, Blooorp wrote:
>
> > Le lundi 25 décembre 2017 16:27:11 UTC+1, awokd a écrit :
> >> On Mon, December 25, 2017 3:07 pm, Blooorp wrote:
> >>> "Devices/Add a VGA BIOS image (don't specify location or IDs,
On Tue, Dec 26, 2017 at 8:18 PM, cooloutac wrote:
>
> wonder if your system runs low on ram? Could also try using system without
> iommu and see if it still happens.
>
I have 32GB here on a T470. I hope that is okay :)
Kushal
--
Staff, Freedom of the Press Foundation
On Friday, December 15, 2017 at 2:19:40 PM UTC-5, evo wrote:
> Am 15.12.2017 um 20:11 schrieb awokd:
> > On Fri, December 15, 2017 11:13 am, evo wrote:
> >
> >> so i've tried it, but i get this error by starting webcam-vm after adding
> >> the usb-device to it: "libxenlight could not create a new
>> ...switch to cookie authentication and forget the password, that way when
>> the zero-day
>> happens you only lose your cookie which is probably not as powerful as
>> the actual password(ie I dont think you can change your password with
>> just the cookie) plus the zero day can't "permanently"
On Tuesday, 26 December 2017 00:56:30 CET mmm...@gmail.com wrote:
> "So make sure your software is from a trusted source."
> Right but even if it is trusted at one point it can become less
> trustworthy later(infection) so I wanted to keep it perfectly "fresh" by
> using disposables.
Aha.
In
Le mardi 26 décembre 2017 13:36:40 UTC+1, awokd a écrit :
> On Tue, December 26, 2017 10:40 am, Frédéric Pierret (fepitre) wrote:
> > Le dimanche 24 décembre 2017 11:03:56 UTC+1, awokd a écrit :
> >
> >> On Sun, December 24, 2017 9:47 am, Frédéric Pierret (fepitre) wrote:
> >>
> >>
> >>> Hi, I
wonder if your system runs low on ram? Could also try using system without
iommu and see if it still happens.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Friday, December 15, 2017 at 12:08:55 PM UTC-5, jer...@disroot.org wrote:
> I first used a konsole, using the guide on qubes's site "Using and Managing
> USB Devices"
> 1. Enable sys-usb
>
> using the command sudo qubesctl top.enable qvm.sys-usb
> 2. Apply the configuration:
> using the
Kk, thanks for all the information as long as that AppVM thing is true I'm
happy enough.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
Le mardi 26 décembre 2017 22:26:10 UTC+1, Blooorp a écrit :
> I installed Qubes with Encryption on my laptop, all looked fine exept for a
> popup saying that my hardware doesn't support Interrupt Remapping, which
> shouldn't fail my install.
>
> Then on first boot, after I enter my password,
3DOCRzL5eq%3DB0pavDnYr1e2Jd9RkuUQFQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-Intel_Corporation-NUC7i5BNH-20171226-140508.cpio.gz
Description: GNU Zip compressed data
Qubes-HCL-Intel_Corporation-NUC7i5BNH-20171226-140508.yml
Description: application/yaml
On Tue, December 26, 2017 7:15 pm, yreb...@riseup.net wrote:
> fwiw, I am unable to actually add backupVM diskspace for the same reason,
> duh. I think my only option is to remove the huge dom0 file , but I'm
> still wondering how do I get a system wide understanding of how 3.2 is
> using the
x x xxx xx x xxx "xj
Gesendet von ProtonMail mobile
Original-Nachricht
An 26. Dez. 2017, 15:53, cooloutac schrieb:
> On Saturday, December 23, 2017 at 5:45:47 PM UTC-5, jerry wrote:
>>
>
> https://www.qubes-os.org/doc/dom0-tools/qvm-clone/
>
> then install printer in the
In short, software is to be installed in your template exactly the same as
you would do it in the ‘upstream’ way.
So if you are using a debian template, you’d be able to go to the debian
wiki pages that explain how to do it.
So your question 1 and two are answers with; “like in the upstream
Per this, in Qubes 4.0 software is to be installed using Qubes tools.
https://groups.google.com/d/msg/qubes-users/aBE-U9YKhjU/0t7hspsbAgAJ
Is there at this time any documentation of how that's done? The current list of
CLI tools doesn't seem to include anything that relates.
I looked at Yum
Sorry, I guess I'm not understanding your answer. The 'usual way' to install in
an upstream distro would be to connect to the network. Again, as I understand
it, in Qubes 4, we can't do that anymore from templates:
Templates don't have Net-VM's in Qubes 4. All updates are run over the
fwiw, I am unable to actually add backupVM diskspace for the same
reason, duh. I think my only option is to remove the huge dom0 file ,
but I'm still wondering how do I get a system wide understanding of how
3.2 is using the 1GB HD, seems should be otherwise plenty of room to
run 3.2 ...
On 2017-12-26 10:14, awokd wrote:
> On Tue, December 26, 2017 7:15 pm, yreb...@riseup.net wrote:
>> fwiw, I am unable to actually add backupVM diskspace for the same reason,
>> duh. I think my only option is to remove the huge dom0 file , but I'm
>> still wondering how do I get a system wide
On 12/26/2017 03:25 PM, 'Tom Zander' via qubes-users wrote:>>
"Personally, I' d avoid thunderbird and anything from mozilla, but thats
>> just me."
>> Do they have a bad track record(I planned on researching my apps later
>> =p).
>
> Just last month they added an invisible plugin in their binary
On Tuesday, 26 December 2017 23:58:36 CET Eric Scoles wrote:
> Sorry, I guess I'm not understanding your answer. The 'usual way' to
> install in an upstream distro would be to connect to the network.
Your ‘yum’, ‘pacman’, ‘apt-get’ have access to the internet via a proxy
solution.
Please give
Attempting to upgrade KeePassX to KeePassX 2.0, using backports, borked my
debian template by removing qubes-gui-agent and pulseaudio.
Was unable to find way to undo damage.
Opted to reinstall template, but I cannot download it without my connection
dropping, and thus timing me out. dnf does
On Tuesday, December 26, 2017 at 6:02:57 PM UTC-8, dangm...@gmail.com wrote:
> Attempting to upgrade KeePassX to KeePassX 2.0, using backports, borked my
> debian template by removing qubes-gui-agent and pulseaudio.
>
> Was unable to find way to undo damage.
>
> Opted to reinstall template,
28 matches
Mail list logo