On Sunday, November 6, 2016 at 11:07:43 PM UTC-5, raah...@gmail.com wrote:
> On Sunday, November 6, 2016 at 9:27:04 PM UTC-5, David Renz wrote:
> > Hello everyone,
> >
> > currently I don't have QubesOS installed unfortunately, so I can't check
> > this by myself, and it might take some time
On Sunday, November 6, 2016 at 9:27:04 PM UTC-5, David Renz wrote:
> Hello everyone,
>
> currently I don't have QubesOS installed unfortunately, so I can't check this
> by myself, and it might take some time until I'll be able to install it,
> therefore I'm asking about this on the list:
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-06 14:34, yaqu wrote:
> Hello,
>
> When I work on laptop with lid closed and external monitor connected,
> and when I suspend Qubes, reconnect it to another docking station with
> different monitor, and wake it up, then screen on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-06 04:43, pixel fairy wrote:
> crypt setup has a lot of options. what do you recommend for a usb disk for
> backups and file transfer between qubes and bare metal linux systems?
>
My personal favorite is:
# cryptsetup -v --hash
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-05 01:32, David Renz wrote:
> Hello everyone,
>
> currently I don't have QubesOS installed unfortunately, so I can't check this
> by myself, and it might take some time until I'll be able to install it,
> therefore I'm asking about
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-11-06 11:36, trash wrote:
> Good Evening
>
> The last week I've read something very interesting about Qubes-os in a French
> magazine. I've tested it for several days and it remains some important
> questions.
> I sent a mail to
Hello everyone,
currently I don't have QubesOS installed unfortunately, so I can't check this
by myself, and it might take some time until I'll be able to install it,
therefore I'm asking about this on the list:
I think that AIDE is the most sophisticated tool for checking file system
On 11/05/2016 03:54 PM, Max wrote:
>
> Thanks for the response!
>
> I ran this and also ran 'sudo dnf install go' when I came across the
> following error: 'go is needed by qubes-network-server-0.0.4-1.fc23.noarch'.
A commit is now out which eliminates this dependency.
> I then did the cd into
On Friday, 4 November 2016 14:04:53 UTC+11, entr0py wrote:
> Drew White:
> > Hi folks,
> >
> > If I'm using the Whonix Gateway guest, and I have it as a ProxyVM, is it
> > safe to assume that if I use a normal AppVM, (non-whonix) behind it, then
> > that means that everything is still going
Hello,
When I work on laptop with lid closed and external monitor connected,
and when I suspend Qubes, reconnect it to another docking station with
different monitor, and wake it up, then screen on external monitor has
old resolution, not matching resolution of currently connected monitor.
Is it
On Sunday, November 6, 2016 at 2:07:38 PM UTC-6, Marek Marczykowski-Górecki
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Sun, Nov 06, 2016 at 11:44:25AM -0800, Richard wrote:
> > However, I noticed that the Qubes VM Manager is not reflecting the changes
> > (i.e. it is
On Sunday, November 6, 2016 at 11:24:55 AM UTC-6, Richard wrote:
> I just finished doing an in-place upgrade to 3.2 following
> https://www.qubes-os.org/doc/upgrade-to-r3.2/
>
> However, I ran into a problem when I reached step "6. Update configuration
> files."
>
> The system will not allow
I just finished doing an in-place upgrade to 3.2 following
https://www.qubes-os.org/doc/upgrade-to-r3.2/
However, I ran into a problem when I reached step "6. Update configuration
files."
The system will not allow me to open Konsole (I can open run command, choose
Konsole and nothing
Hello,
I have been using this Thinkpad T520 for 1.5 years with Qubes R2, R3.0
and now R3.2 without major hardware issues (not tested with R3.1).
Well, I had a problem with Intel gfx and R3.2, but it's fixed now
(details somewhere below).
Long story short: it works.
CPU: i5-2520M 2.50GHz
VT-x:
The current VMWare Fusion v8 allows to run multiple instances of OSX.
They even advertise it on their website:
http://www.vmware.com/products/fusion.html
"macOS Sierra-Ready
Launch virtual machines on Macs with macOS 10.12 Sierra, or safely test the
new macOS in a sandbox on your current Mac
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 06.11.2016 13:43, pixel fairy wrote:
> crypt setup has a lot of options. what do you recommend for a usb disk for
> backups and file transfer between qubes and bare metal linux systems?
>
Hi
I would go with AES-256 as cipher and sha512 has
crypt setup has a lot of options. what do you recommend for a usb disk for
backups and file transfer between qubes and bare metal linux systems?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving
Am 06.11.2016 um 10:42 schrieb Alex:
> On 11/06/2016 10:31 AM, Jeremy Rand wrote:
> Actually reading the license of OSX available at
> https://store.apple.com/Catalog/US/Images/MacOSX.htm is very easy
> because they are awfully short and simple, compared to a lot of other
> software.
>
> And in
Hallo,
It looks like I was wrong, this kind of browserless security setup is might not
be a part of the far future, it is up and running (in the testmode)...
The Boing Black Phone...
Hello Rudd-O,
many times technology can be used in both sides good and e*
My first concern with this internet and lack of IT-security is, that in some
main-stream browsers you have enough backdoors to book in the second you type
in your credit-card information in parallel for you on another
20 matches
Mail list logo