El martes, 2 de agosto de 2016, 12:25:38 (UTC), Facundo Curti escribió:
> Hi there. Someone can help me?
> I'm trying to make an archlinux template on qubes 3.2. But i'm having
> troubles to compile.
>
> When I do:
> $ make vmm-xen-vm
>
> I get:
> /home/user/qubes-src/vmm-xen/PKGBUILD: line
On 08/02/2016 06:10 PM, grzegorz.chodzi...@gmail.com wrote:
>
> Easier troubleshooting/updating/diagnostics. Modern UEFI installed on e.g
> gaming motherboards can update itself over Ethernet connection, reinstall
> itself from scratch and sometimes contains a built-in mini-linux. If you do
>
That's great to hear Peter.
Things are getting better all the time. Great work Qubes team.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
neilhard...@gmail.com:
> I have a question about Whonix/Tor Browser exploits.
>
> I have played around a bit with Metasploit to see how browser exploits work.
>
> They basically rig a web page with exploits, and then it does what's known as
> "arbitrary code execution", to open up a "remote
Marek Marczykowski-Górecki:
> On Mon, Aug 01, 2016 at 07:35:26PM +, 468ezc+5r0fnwy87qeag via
> qubes-users wrote:
>> Hi,
>
>> My MicroSD while attached is assigned to dom0 and not sys-usb as is
>> supposed. Notwithstanding, USB devices are still assigned to sys-usb.
>
>> Is this the
I'm seriously taking this thread on a tangent, but are there any FOSS GUIs
that have been specifically built for Xen? Heck, any free proprietary GUIs?
I see paid options, abandoned projects, and cross-hypervisor solutions
(those don't tend to be great), but one reason I never delved into Xen is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-02 17:00, jamiesmithdat...@gmail.com wrote:
> HI!
>
> I have tried to figure stuff out on my own, but as a very non-techy person,
> I find it hard!
>
> What's the best way to secure my install of Qubes OS? I want to boot from
> a USB
On Tue, Aug 2, 2016 at 9:00 PM, wrote:
> HI!
>
> I have tried to figure stuff out on my own, but as a very non-techy
> person, I find it hard!
>
> What's the best way to secure my install of Qubes OS? I want to boot from
> a USB device on my PC when I want to use
On Tue, Aug 2, 2016 at 8:19 PM, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-02 09:29, 46co2u+d7n6f69py4nlk via qubes-users wrote:
> > Hi,
> >
> > Is this possible and how can it be done? Unfortunately I didn't find any
> > how to
HI!
I have tried to figure stuff out on my own, but as a very non-techy person, I
find it hard!
What's the best way to secure my install of Qubes OS? I want to boot from a USB
device on my PC when I want to use Qubes - is it possible to encrypt this USB
and then boot from it?
Or... is there
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-02 09:29, 46co2u+d7n6f69py4nlk via qubes-users wrote:
> Hi,
>
> Is this possible and how can it be done? Unfortunately I didn't find any
> how to explaining this.
>
>
> Thank you
>
Sorry, that's not supported:
"Other devices, such
I have a question about Whonix/Tor Browser exploits.
I have played around a bit with Metasploit to see how browser exploits work.
They basically rig a web page with exploits, and then it does what's known as
"arbitrary code execution", to open up a "remote shell".
As far as I can tell.. the
m...@lamarciana.com:
>> If I understand correctly, permanently changing /etc/resolv.conf in the
>> ProxyVM to show:
>>
>> nameserver 208.67.222.222
>> nameserver 208.67.220.220
>>
>> should achieve that in a standalone ProxyVM.
>
> Thanks for your answer. I thought that changing
>Easier troubleshooting/updating/diagnostics. Modern UEFI installed on e.g
>gaming
>motherboards can update itself over Ethernet connection, reinstall itself from
>scratch and
>sometimes contains a built-in mini-linux. If you do not need such bonuses then
>legacy BIOS
>will do just fine.
Try disabling VT-d in the BIOS. It's a common Lenovo problem.
Cheers
BillW
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
W dniu poniedziałek, 1 sierpnia 2016 00:41:08 UTC+2 użytkownik Stephen Moreno
napisał:
> Hi,
>
>
>
> I'm looking to build a new desktop system for Qubes. In an ideal world I
> would use a motherboard with a Libreboot open source BIOS, however this is
> currently not practical.
>
>
>
> I
Hi,
Is this possible and how can it be done? Unfortunately I didn't find any how to
explaining this.
Thank you
Sent using GuerrillaMail.com
Block or report abuse:
https://www.guerrillamail.com/abuse/?a=UFR2AB5NVqcQmh2U93EQdRjCStifx8dDiadNcQ%3D%3D
--
You received this message
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Aug 02, 2016 at 03:39:42PM +, 46cikr+6jqihtc138d2g via qubes-users
wrote:
> Hi,
>
> I have a windows HVM running, is it possible to do USB passthrough and attach
> a USB device to it?
> How can this be done?
Unfortunately no,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Aug 02, 2016 at 03:16:46AM -0700, pixel fairy wrote:
> Any laptops on the market meet these requirements yet?
According to this post[1], Thinkpad x320 (with coreboot installed)
should be ok. But we haven't tested it, and it isn't certified
Hi,
Qubes advice to use ps2 mouse and keyboard but is impossible to find one
in local shop.
I have bought some usb/ps2 adapter to connet usb keyboard and mouse to
my ps2 port. My keyboard is working well, but I have tried several model
of mouse unsuccessfully.
Do you know the reason because my
Hi there. Someone can help me?
I'm trying to make an archlinux template on qubes 3.2. But i'm having
troubles to compile.
When I do:
$ make vmm-xen-vm
I get:
/home/user/qubes-src/vmm-xen/PKGBUILD: line 49: autoreconf: command not
found
But autoreconf is already installed:
$ whereis autoreconf
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 08/02/2016 11:44 AM, donoban wrote:
>
>
> On 07/31/2016 02:33 PM, Marek Marczykowski-Górecki wrote:
>> On Sun, Jul 31, 2016 at 01:53:26PM +0200, donoban wrote:
>>> Hi,
>
>>> I tried to do the experimental process for upgrading to Qubes
>>>
Summary of Problem: During a fresh installation of Qubes R3.1, all restored
Debian TemplateVMs crash during the apt-get dist-upgrade and can no longer be
restarted.
Details: My preferred Qubes upgrade method is to do a fresh install to a new
disk and backup/restore AppVMs and TemplateVMs from
Any laptops on the market meet these requirements yet?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this
thought it should work. pretty standard i7 with intel graphics. no problems in
linux. but ive tried 3 releases now and always get that Q in rainbow static
trying to install it.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 07/31/2016 02:33 PM, Marek Marczykowski-Górecki wrote:
> On Sun, Jul 31, 2016 at 01:53:26PM +0200, donoban wrote:
>> Hi,
>
>> I tried to do the experimental process for upgrading to Qubes
>> 3.2. I followed the steps from
>>
26 matches
Mail list logo