[qubes-users] How to open a file in a certain AppVM by a single double click (for secure file management)?

2020-12-15 Thread Rainer Neumann
Dear Qubes community,

I am looking for a safe and easy way to manage my documents, downloaded from 
the internet and saved on an external hard drive, with Qubes.

A) Files in my file management qube (based on a template without any programm, 
that could open a file) should be openable in a certain AppVM or in the same 
dispVM. It takes a too long time to open every file in an extra dispVM.

B) It would be very useful, if the file in the file management qube opens only 
by a double click in a certain qube for file view.

Does anybody have a solution?

Many thanks,
Rainer Neumann

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/099557dd-e4a1-6fa3-3005-488f57822ada%40posteo.de.


Re: [qubes-users] How to open a file in a certain AppVM by a single double click (for secure file management)?

2020-12-15 Thread unman
On Tue, Dec 15, 2020 at 10:55:50AM +0100, Rainer Neumann wrote:
> Dear Qubes community,
> 
> I am looking for a safe and easy way to manage my documents, downloaded from 
> the internet and saved on an external hard drive, with Qubes.
> 
> A) Files in my file management qube (based on a template without any 
> programm, that could open a file) should be openable in a certain AppVM or in 
> the same dispVM. It takes a too long time to open every file in an extra 
> dispVM.
> 
> B) It would be very useful, if the file in the file management qube opens 
> only by a double click in a certain qube for file view.
> 
> Does anybody have a solution?
> 
> Many thanks,
> Rainer Neumann
> 

Create a named disposableVM 
Then use `qvm-open-in-vm` to open files in the new named qube.
Test this at the command line in your file management qube first.
You will also have to set policy in /etc/qubes-rpc/policy/qubes.OpeninVM
in dom0

Then set this ( qvm-open-in-vm  ) as the default file handling
application - the right place to do this will depend on your DE -
perhaps ~/.local/share/applications/mimeapps.lst

If you want the disposableVM to close down when there are no open
windows, install the shutdown-idle service, and enable it in that qube.
Adjust the timer to whatever suits you: by default I think it is 5
minutes without an open window.

Having this work by double click will (probably) vary depending on what file
manager you are using.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20201215112119.GC27878%40thirdeyesecurity.org.


Re: [qubes-users] How to edit Qubes R4.0.3 ISO image file in Windows 10 system

2020-12-15 Thread load...@gmail.com
Maybe you will find something useful here:

https://groups.google.com/g/qubes-users/c/gssEGXnNhZM/m/yvx3ofzIAwAJ
https://github.com/QubesOS/qubes-issues/issues/3198

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8c6f5279-fbaf-4fc0-a0f7-f3196a37f3dcn%40googlegroups.com.


Re: [qubes-users] qubes-os // stand-alone reactos fails

2020-12-15 Thread ser...@da.matta.nom.br
Thank you Unman. I do not use React-OS anymore. It worked fine on Qubes 3. 
But I really think it was a bad decision to support only xvda. It is not 
only Android, React-os, Chrome-Os and others. It is about Qubes users.  I 
will keep using Qubes-OS 4 even with his limitations, but I hope Qubes-os 
chooses to be  easier to his users, in the future.

Em terça-feira, 15 de dezembro de 2020 às 00:21:31 UTC-3, unman escreveu:

> On Mon, Dec 14, 2020 at 01:05:59PM -0800, ser...@da.matta.nom.br wrote:
> > Dear Unman, 
> > Please, why Qubes chooses to use /dev/xvda differently then the other 
> > softwares are expecting?
> > Since there is already a patch, it should be permanent to minimize 
> problems.
> > Thank you
> > Em domingo, 13 de dezembro de 2020 ??s 21:54:58 UTC-3, unman escreveu:
> > 
> > > On Sun, Dec 13, 2020 at 03:07:06PM -0800, ludwig...@gmail.com wrote:
> > > > Hi I am trying to install reactos 0.4.13 as stand alone with 16G 
> system 
> > > and 
> > > > 16g private.
> > > > I know, way too much.
> > > > Reactos fails with blue screen and red print: "Setup could not find 
> a 
> > > > harddisk"
> > > > Enter = Reboot computer.
> > > > 
> > > > So why there is no harddisk in the vm?
> > > > Is there an editor to configure more options to the vm? So I would 
> like
> > > > to see if the devices are there.
> > > > 
> > > > BTW: If someone could contribute a reactos template with common
> > > > tools like peazip and sumatrapdf it would be nice for all to play 
> with 
> > > some
> > > > old windows stuff.
> > > > 
> > > > Regards
> > > > 
> > > > Ludwig
> > > > 
> > >
> > > This has come up a number of times on the list, both for ReactOS and
> > > Android installs.
> > > The issue is that ReactOS *has* to see a disk at /dev/sda or /dev/hda,
> > > whereas Qubes presents disks at /dev/xvda etc.
> > > Take a look at 
> https://github.com/unman/notes/blob/master/disks_in_Qubes 
> > > If you look at https://github.com/unman/change_disk you'll see a
> > > possible solution: how to use those files is explained at 
> > > https://github.com/unman/notes/blob/master/InstallingAndroid.md
> > >
> > > Basically, you redefine the disks so that they are presented as disks
> > > that ReactOS will accept. Then you can just install to /dev/sda
> > >
> > > If you need help, just ask.
> > >
> > 
>
> Qubes is based on Xen, and Xen decided many moons ago to using xvdX for
> block devices, instead of sdX. You might ask why ReactOS and Android are
> so hidebound in their expectations for block devices.
> This is more of a hack than a patch, so I think it unlikely it will be
> incorporated in to Qubes.
>
> On the issue of a template, you can install reactos as a template HVM,
> and spawn other qubes off it. I could point you to an example if that
> would be helpful.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/23460d00-e1ed-4cb6-b007-119841e2ad16n%40googlegroups.com.