On Wednesday, January 13, 2016 at 5:15:06 AM UTC-8, mariusz...@gmail.com wrote:
> Same as topic name. I am currently running mac os with heavy virtual machines
> usage to get more security/privacy. I will probably switch to linux soon but
> since i plan on using a lot of one time use VMs or even
On Tue, Feb 27, 2018 at 03:23:50PM +0100, haaber wrote:
> to have the shell behave nicer. If I have some free time, I might
> customize this stub to suggest available options to all qvm-* and
> qubes-* commands. I am surprised that I might be the first one to
> discuss this subject (?!)
On Fri, March 2, 2018 7:10 pm, Holger Levsen wrote:
> On Tue, Feb 27, 2018 at 03:23:50PM +0100, haaber wrote:
>
>> to have the shell behave nicer. If I have some free time, I might
>> customize this stub to suggest available options to all qvm-* and
>> qubes-* commands. I am surprised that I might
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Mar 02, 2018 at 07:13:56PM -, 'awokd' via qubes-users wrote:
> On Fri, March 2, 2018 7:10 pm, Holger Levsen wrote:
> > On Tue, Feb 27, 2018 at 03:23:50PM +0100, haaber wrote:
> >
> >> to have the shell behave nicer. If I have some free
On 03/02/2018 05:56 AM, Unman wrote:
On Fri, Mar 02, 2018 at 05:38:11AM -0500, Chris Laprise wrote:
On 03/02/2018 04:04 AM, donoban wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 03/02/2018 08:38 AM, Robert Walz wrote:
[robert@dom0 ~]$ qvm-run --pass-io tempDebian 'cat
On 2018-03-01 18:47, awokd wrote:
> On Fri, March 2, 2018 4:20 am, yreb...@riseup.net wrote:
>> On 2018-03-01 18:16, awokd wrote:
>>
>>> On Fri, March 2, 2018 4:10 am, yreb...@riseup.net wrote:
>>>
>>>
When you see the message "Will you specify the DeviceURI ?",
For USB
On 03/02/2018 10:22 AM, Unman wrote:
>
> Try this:
>
> _qvm()
> { local cur
> COMPREPLY=()
> cur="${COMP_WORDS[COMP_CWORD]}"
> VMS=`qvm-ls --raw-list`
> COMPREPLY=( $(compgen -W "${VMS}" -- ${cur}) )
> }
works perfectly, thank you. Should be completed (haha) by
complete -F
Those are interesting points [799] & Ivan, I agree with both of your views. I
also like the concept of moving guides/scripts over to the official Qubes doc's
for final review if it reaches a certain minimum of quality. Keeping it
separate in some sense to differentiate quality, seems like a
On 03/02/2018 06:12 PM, andrewashbac...@gmail.com wrote:
> On Wednesday, January 13, 2016 at 5:15:06 AM UTC-8, mariusz...@gmail.com
> wrote:
>> Same as topic name. I am currently running mac os with heavy virtual
>> machines usage to get more security/privacy. I will probably switch to linux
>>
On 03/02/2018 05:43 AM, Unman wrote:
On Thu, Mar 01, 2018 at 05:52:48AM -0800, billol...@gmail.com wrote:
On Thursday, March 1, 2018 at 12:08:19 AM UTC-5, Chris Laprise wrote:
On 02/28/2018 08:23 PM, 'awokd' via qubes-users wrote:
BTW, as an example of Qubes-specifics in this issue, on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-02 23:16, Andrew David Wong wrote:
> On 2018-03-02 15:05, Yuraeitha wrote:
>> Some of the issues/questions addressed seems like they could be
>> solved quite effectively and efficiently on a highly
>> customize-able forum?
>
>> [...]
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2018-03-02 15:05, Yuraeitha wrote:
> Some of the issues/questions addressed seems like they could be
> solved quite effectively and efficiently on a highly
> customize-able forum?
>
> [...]
>
> Thoughts about using a forum?
>
FYI, in case
Hi,
I'm trying to follow the instructions here for adding app menus:
https://www.qubes-os.org/doc/managing-appvm-shortcuts/
But I can't get it to work. I noticed that only templateVMs have an
"apps.templates" directory so I added a new vuescan.desktop file to my
template's dir from Dom0
Hello,
I know that this might be slightly Offtopic, but I am sure that I am not the
only one working with davmail.
QUESTION:
Who else is using Davmail to connect Exchange to their favorite Linux Outlook
replacement?
And are you able to delete an appointment from Evolution or maybe khal?
I am
On 03/01/2018 11:09 AM, '[799]' via qubes-users wrote:
Hello,
Original-Nachricht
An 1. März 2018, 14:46, Jo schrieb:
If you strip down ME, you should
blacklist me / ime, to speed up boot.
I've read this within this thread sometimes, what exactly needs to be done here?
I
On 03/02/2018 01:27 AM, Tim W wrote:
No it does not yet it gets repeatedly mentioned to where it makes people think
its viable option which it is not.
The op wants a high end laptop which also eliminates all the old coreboot
laptops. as he wants a laptop it also removes the asusu amd server
On Saturday, February 24, 2018 at 8:11:21 PM UTC-5, ad...@adammccarthy.co.uk
wrote:
> Hello,
>
> I currently run Qubes OS on an XPS 13 from 2015 with an i5-6200U, 8GB
> RAM, slow NVMe. It can't really handle Qubes OS - it's quite laggy and
> struggles to play video on the 4K screen. The CPU
Everyone knows those issues on this board and its understood. Point being he
asked for present day high end laptop but at the same time I will agree with
you that for most basic use models its not so much the processor as it is ram
amount but one thing for sure is you can not recommend a PC
On Friday, March 2, 2018 at 4:05:30 AM UTC-5, Unman wrote:
> On Fri, Mar 02, 2018 at 12:41:29AM -0800, Tim W wrote:
> > On Tuesday, February 27, 2018 at 2:37:46 AM UTC-5, Frédéric Pierret
> > (fepitre) wrote:
> > > Le mardi 27 février 2018 00:30:10 UTC+1, Tim W a écrit :
> > > > Great that was
Has mac spoofing been preinstalled in Q4 rc4? I cant find any documentation on
it, but the cmd: ip link show wls1
changes every 10 minutes or so. I actually want to stop it and I cant seem to
make it static. Lil help!!
Ive tried everything I can think of. Im not entirely understanding the
On Tue, Feb 27, 2018 at 11:48:41AM +0100, haaber wrote:
> > Since Q4 much admin work is done on the command line. So it makes sense
> > to learn bash to autocomplete nicely. I tried this in dom0:
> >
> > _qvm()
> > { local cur VMS
> > COMPREPLY=()
> > cur="${COMP_WORDS[COMP_CWORD]}"
> >
Dear Qubes community,
after using 3.1 and 3.2 in production on my primary laptop
(Lenovo X220), and having used that machine to test Qubes since R2,
I now have the need to make my built in camera available in an App VM (I choose
untrusted, but may a dedicated one later on).
However, I am
On Tuesday, February 27, 2018 at 2:37:46 AM UTC-5, Frédéric Pierret (fepitre)
wrote:
> Le mardi 27 février 2018 00:30:10 UTC+1, Tim W a écrit :
> > Great that was failing basically on all non standard templates i.e. not
> > fedora, debain, or whonix. They would all fail but it seems each had
On Friday, March 2, 2018 at 7:07:17 AM UTC+1, Tim W wrote:
> On Thursday, March 1, 2018 at 3:30:52 AM UTC-5, jer...@disroot.org wrote:
> > where do i find support for security, privacy? (some place where i can post
> > with anonimity too, reddit privacy requires java script i think, doesn't it
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 03/02/2018 06:19 AM, 'awokd' via qubes-users wrote:
> On Fri, March 2, 2018 5:04 am, Chris Laprise wrote:
>> Whenever I try to assign a running appVM to a different (running)
>> netVM, networking always becomes blocked. I have to restart the
>>
On Tuesday, February 27, 2018 at 2:47:37 AM UTC-5, Frédéric Pierret (fepitre)
wrote:
> Le mardi 27 février 2018 00:23:32 UTC+1, Tim W a écrit :
> > If you get it working I am happy 5o write up a hpw to doc for qubes doc.
>
> Thank you! Yesterday I was thinking about releasing a first pre-version
On Fri, Mar 02, 2018 at 12:41:29AM -0800, Tim W wrote:
> On Tuesday, February 27, 2018 at 2:37:46 AM UTC-5, Frédéric Pierret (fepitre)
> wrote:
> > Le mardi 27 février 2018 00:30:10 UTC+1, Tim W a écrit :
> > > Great that was failing basically on all non standard templates i.e. not
> > > fedora,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 03/02/2018 08:38 AM, Robert Walz wrote:
> [robert@dom0 ~]$ qvm-run --pass-io tempDebian 'cat
> "/home/user/meta.raw"' >
> /var/lib/qubes/appvms/metasploitable/root.img I stopped the command
> with Ctrl+C, because the root.img became bigger than
Hi 799,
> have you tried this:
> qvm-prefs usbVM -s pci_strictreset false
> See also:
> https://www.qubes-os.org/doc/assigning-devices/
no, I didn't, and yes, that did the trick. Thanks!
Best,
Akira
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
On Fri, Mar 02, 2018 at 04:10:24AM -, 'awokd' via qubes-users wrote:
> On Fri, March 2, 2018 3:38 am, Glen H wrote:
> > On Thursday, March 1, 2018 at 10:37:26 PM UTC-5, Glen H wrote:
> >
> >> Hi,
> >>
> >>
> >> My primary SSD is out of space and I have a second hard drive. I've
> >> formatted
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 02/24/2018 01:26 PM, 'awokd' via qubes-users wrote:
> I'm attempting to convert the above into a Qubes doc
> (https://github.com/awokd/qubes-doc/blob/transproxy/configuration/tran
sparent-proxy.md)
>
>
but don't have a Squid proxy to test
Hello,
Unfortunately after the last update of Qubes 4.0 I have a kernel
panic: "unable to mount root fa on unknown block" and would appreciate
if somebody here could give me a tip.
I installed Qubes 4.0-RC1 and since then been only updating.
After the next-to-last update I was not able to
On Fri, March 2, 2018 9:29 am, Zrubi wrote:
>
> So it seems your corporate have normal proxies, not transparent ones.
> So the title (and the usage of the term: "transparent proxy") is
> misleading.
I caught that too after the email, the PR I submitted doesn't talk about
"transparent" any more.
On Fri, Mar 02, 2018 at 10:04:53AM +0100, donoban wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On 03/02/2018 08:38 AM, Robert Walz wrote:
> > [robert@dom0 ~]$ qvm-run --pass-io tempDebian 'cat
> > "/home/user/meta.raw"' >
> > /var/lib/qubes/appvms/metasploitable/root.img I
On 03/02/2018 04:04 AM, donoban wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 03/02/2018 08:38 AM, Robert Walz wrote:
[robert@dom0 ~]$ qvm-run --pass-io tempDebian 'cat
"/home/user/meta.raw"' >
/var/lib/qubes/appvms/metasploitable/root.img I stopped the command
with Ctrl+C, because
On Fri, Mar 02, 2018 at 05:38:11AM -0500, Chris Laprise wrote:
> On 03/02/2018 04:04 AM, donoban wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > On 03/02/2018 08:38 AM, Robert Walz wrote:
> > > [robert@dom0 ~]$ qvm-run --pass-io tempDebian 'cat
> > > "/home/user/meta.raw"'
I seem to have it working; I'll outline the steps in case others
run into this. Nevertheless, I'd appreciate an 'authoritative answer'
since I was 'fishing blindly'. [More see inline]
Am Freitag, 2. März 2018 09:34:18 UTC+1 schrieb sbor...@gmail.com:
> Dear Qubes community,
>
> after using 3.1
1 email or multiple emails.
says sending message when clicking send (stuck) in thunderbird.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
38 matches
Mail list logo