On Thursday, 1 September 2016 01:54:38 UTC+10, Desobediente wrote:
> I use KDE (XFCE is installed but never used) and I don't have the option
> of using the keyboard. The num/caps/scroll lock lights won't change and
> the keyboard doesn't seem to respond.
>
> As I stated, the processes seem to
I made the mistake to run this command in my debian-8 TemplateVM :
sudo apt-get autoremove gnome-keyring
Then I wasn't able to get a terminal for the debian-8 TemplateVM and all
appVM's in relation to this TemplateVM.
So, I used this tutorial to reinstall a new debian-8 TemplateVM :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Aug 31, 2016 at 10:05:59PM -, johnyju...@sigaint.org wrote:
> I'm curious to some mentions-in-passing about Andrew's hate for USB
> keyboards. USB-anything isn't good for security, but what in particular
> so much worse about USB? Both
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Aug 31, 2016 at 03:47:31PM -0700, nekroze.law...@gmail.com wrote:
> Does anyone have any thoughts on a way to template in the IP address of an
> appVM so it can be used to define a file.managed state with the IP in the
> filename such as
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-31 15:50, IX4 Svs wrote:
> On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong
> wrote:
>
>>
>> On 2016-08-15 14:43, IX4 Svs wrote:
>>> On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong
>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Aug 31, 2016 at 09:18:37PM -, johnyju...@sigaint.org wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > Details here:
> > https://www.qubes-os.org/news/2016/08/31/qubes-OS-3-2-rc3-has-been-released/
> >
> > As usual,
On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-15 14:43, IX4 Svs wrote:
> > On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong
> > wrote:
> >
> >> -BEGIN PGP SIGNED
Hello, I searched the archives and saw this has come up before regarding
firewall rules.
https://github.com/QubesOS/qubes-issues/issues/1570
I had half an email composed when I tried something and it unexpectedly
worked.
So for posterity I wanted to add is that it is possible that *no* VM will
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Details here:
> https://www.qubes-os.org/news/2016/08/31/qubes-OS-3-2-rc3-has-been-released/
>
> As usual, you can download new image from:
> https://www.qubes-os.org/downloads/
>
> Users of R3.2 rc1 or rc2 can just install updates, no need
While qvm-block is a wonderfully handy tool for adding individual
partitions to a VM, the Qubes VM Manager can only add entire devices from
its GUI.
I think that it's a pretty strong argument Qubes' spirit of "protecting
the user from him/herself" to make sure this feature (maybe in a nested
menu
Adi Carlisle:
> On Saturday, 27 August 2016 18:50:20 UTC+1, Cube wrote:
>> This would be more in the style of Tails - no persistent state.
>
> TAILS hvm?
>
Would require disposable HVM, I don't think Qubes has implemented that
at this time.
Also DispVMs do not feature anti-forensics yet:
Raphael Susewind:
> Is there an easy way to use the Whonix Tor instance from other VMs,
> namely those assigned a different firewall VM?
>
> I do have a couple of Tor Hidden Services which I'd like to access via
> SSH from my work VM (using connect-proxy). I could of course run my own
> Tor
On 08/31/2016 04:29 PM, Eva Star wrote:
How to change date/timezone reported by `date` at dom0 terminal and used
by other AppVMs?
Previously, I do this with KDE tools, but now with Xfce I can not find
how to change it correctly.
Now, it's reported as EDT (not UTC) at dom0... Why? How to change
On 08/31/2016 04:13 PM, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Details here:
https://www.qubes-os.org/news/2016/08/31/qubes-OS-3-2-rc3-has-been-released/
As usual, you can download new image from:
https://www.qubes-os.org/downloads/
Users of R3.2 rc1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Details here:
https://www.qubes-os.org/news/2016/08/31/qubes-OS-3-2-rc3-has-been-released/
As usual, you can download new image from:
https://www.qubes-os.org/downloads/
Users of R3.2 rc1 or rc2 can just install updates, no need for full
On 2016-08-31 13:25, "Andrew David Wong" wrote:
> Yes, we expect to release R3.2-rc3 today:
>
> https://twitter.com/rootkovska/status/770930679882416128
Thank you for the information! Now, I see it on the FTP site. :-)
--
You received this message because you are
Eva Star:
> 3.2rc2 - clean install (on 3.2rc1 with updates I do not have this problem)
>
> At dom0 pulseaudio proccess always eat 100% of CPU.
> If I kill it, then it starts again!
> Please, help. Hot to fix this issue or how to disable pulseaudio start after
> kill.
>
Had similar symptoms on
On Wednesday, August 31, 2016 at 10:40:23 AM UTC-7, grzegorz@gmail.com
wrote:
> An actual protection would be some kind of a chemical that would destroy the
> ram chips if they ever reach certain (lower than room) temperature.
the epoxy is likely to damage them in most means of removal.
Adi Carlisle:
> OK, update, I reinstalled my Qubes 3.1 but this time I used sys-usb (&
> sys-net option) Sound worked on all VM's.
> **Didn't get a chance to test it on Win7** because I tested the mute function
> now it doesn't work again.
>
https://www.qubes-os.org/doc/windows-appvms/:
>
W dniu środa, 31 sierpnia 2016 18:25:33 UTC+2 użytkownik pixel fairy napisał:
> poured some epoxy over where the ram connects to the motherboard, and where
> the clips are that you would use to take it out. the chips themselves dont
> have any, just the surrounding pcb.
>
> this was couple days
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Aug 30, 2016 at 11:00:30PM +0200, Marek Marczykowski-Górecki wrote:
> On Mon, Aug 29, 2016 at 11:07:33PM -0700, nekroze.law...@gmail.com wrote:
> > Also, I am not sure when, but the pkg.uptodate state does nothing in
> > templates now. It
On Wednesday, August 31, 2016 at 8:54:05 AM UTC-7,
499eph+30e...@guerrillamail.com wrote:
> Hi,
>
> Which of these tools provides a better privacy and security for a threat
> model that intends to protect against massive surveillance (the intention is
> not to protect against state actors as
poured some epoxy over where the ram connects to the motherboard, and where the
clips are that you would use to take it out. the chips themselves dont have
any, just the surrounding pcb.
this was couple days ago. so far its survived 2 reinstalls of test qubes
releases, and is doing one of rc3.
I use KDE (XFCE is installed but never used) and I don't have the option
of using the keyboard. The num/caps/scroll lock lights won't change and
the keyboard doesn't seem to respond.
As I stated, the processes seem to be running, if there's a music
player, I can still hear it.
Will check SETUP
Hi Doug
That might be the clue.
I waited until it happened again, did Ctrl-F2 and then restarted then
xfsettingsd process with a kill -HUP.
Ctrl-F1 then got me back to the login for the X without having to reboot or
restart VMs.
I've only tried this once ... if it's repeatable over the next
El miércoles, 31 de agosto de 2016, 13:02:06 (UTC), Andrew David Wong escribió:
>
> On 2016-08-31 05:42, Pablo Di Noto wrote:
> > El miércoles, 31 de agosto de 2016, 12:26:42 (UTC), Andrew David Wong
> > escribió:
> >
> >> On 2016-08-31 04:48, Pablo Di Noto wrote:
> >>> Hello,
> >>>
> >>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Aug 19, 2016 at 11:58:18AM -0700, kev27 wrote:
> > Secure Encrypted Virtualization (SEV) integrates main memory encryption
> > capabilities with the existing AMD-V virtualization architecture to support
> > encrypted virtual machines.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-31 01:52, katerim...@sigaint.org wrote:
> Hello I have deleted a VM accidentally, is possible to recover it? Thank
> you
>
Without a backup, there's no straightforward way to recover it. (But the data
forensics experts on this list
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-31 04:48, Pablo Di Noto wrote:
> Hello,
>
> Somewhere along the update from 3.1 to 3.2rc1 I started to have all my VMs
> take UTC as their timezone.
>
> dom0 has the correct "America/Argentina/Cordoba" timezone, but all VMs get
>
> On 2016-08-30 01:16, johnyju...@sigaint.org wrote:
>> Say someone compromises the dom0 encrypted drive password, and
>> then goes shuffling through the private.img file of the AppVM's to
>> get at Firefox's passwords...? The VM itself wouldn't have to be
>> running corrupt code for that, and
is there a way to turn on tilt or pressure sensitivity for pens?
using qubes 3.2rc2 with xfce (test box, not production)
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
Hello
I have deleted a VM accidentally, is possible to recover it?
Thank you
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
32 matches
Mail list logo