I am not aware of any change that could have affected it. And I have no further
ideas what to check. 😔
Regards,
Vít Šesták 'v6ak'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it,
On Monday, June 5, 2017 at 8:50:44 AM UTC-4, Paulo Marques wrote:
> I guys, I've tried already with another image and another Disk, an 500GB
> seagate and the results are the same. is it possible to be a disk driver
> (from Cubes installation setup ) problem or a disk/bios problem? Both disks,
>
On Monday, June 5, 2017 at 4:54:04 PM UTC-4, Stephan Marwedel wrote:
> On 6/5/17 1:10 AM, cooloutac wrote:
> > On Friday, June 2, 2017 at 3:59:09 PM UTC-4, Stephan Marwedel wrote:
> >> On 6/2/17 7:11 AM, cooloutac wrote:
> >>> On Thursday, June 1, 2017 at 2:31:10 PM UTC-4, Stephan Marwedel wrote:
>
On Tuesday, 6 June 2017 05:40:48 UTC+10, Connor Page wrote:
> On Monday, 5 June 2017 01:42:40 UTC+1, Drew White wrote:
> >
> > So PFSense is NOT the first line of defense then?
> > It is behind another guest?
>
> It was the first line of defense from Internet threats. But at the same time
> it
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes community,
Thank you to everyone who has donated [1] to the Qubes OS Project! As
many of you know, there are two ways to donate: through our Bitcoin
fund [2] and through Open Collective [3]. Some of you may have noticed
that we haven't sp
please see the thread on this, if you like codes
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group,
On 2017-06-04 09:57, Franz wrote:
> On Thu, Jun 1, 2017 at 12:10 PM, Damon Gant wrote:
>
>> I've been trying to get the Arch template running following the guide at
>> https://www.qubes-os.org/doc/templates/archlinux/ [1] on a brand new install.
>>
>> I can get it to a point where the VM boots
On Mon, Jun 05, 2017 at 05:46:17PM -0400, Chris Laprise wrote:
> On 06/05/2017 04:53 PM, Vít Šesták wrote:
> >It seems I've violated some Qubes assumption. When I try to update debian-8
> >template via qubes-manager, it does nothing.
> >
> >I've tried to debug a bit:
> >
> >$ qvm-run -a -p -u root
On 06/05/2017 04:53 PM, Vít Šesták wrote:
It seems I've violated some Qubes assumption. When I try to update debian-8
template via qubes-manager, it does nothing.
I've tried to debug a bit:
$ qvm-run -a -p -u root debian-8 /etc/qubes-rpc/qubes.InstallUpdatesGUI
Warning: This program is an suid
On 6/5/17 1:10 AM, cooloutac wrote:
On Friday, June 2, 2017 at 3:59:09 PM UTC-4, Stephan Marwedel wrote:
On 6/2/17 7:11 AM, cooloutac wrote:
On Thursday, June 1, 2017 at 2:31:10 PM UTC-4, Stephan Marwedel wrote:
I have trouble booting the installer. Using the standard UEFI setup of
the T470p
It seems I've violated some Qubes assumption. When I try to update debian-8
template via qubes-manager, it does nothing.
I've tried to debug a bit:
$ qvm-run -a -p -u root debian-8 /etc/qubes-rpc/qubes.InstallUpdatesGUI
Warning: This program is an suid-root program or is being run by the root us
On 06/05/2017 03:16 PM, e...@riseup.net wrote:
VMs by default check for available updates and notify Qubes VM Manager
if there are any. Is there a genereic dom0 terminal command that
corresponds to Qubes VM Manager's "Update VM"?
You can call the VM's update script with:
$ qvm-run -a -u root v
On Mon, Jun 5, 2017 at 4:32 PM, Vít Šesták <
groups-no-private-mail--contact-me-at--contact.v6ak@v6ak.com> wrote:
> > But the link to split the ethereum installation into two different VMs
> should be heavily adapted to your specific case that you did not mention.
>
> You're right, I've missed
On Monday, 5 June 2017 01:42:40 UTC+1, Drew White wrote:
>
> So PFSense is NOT the first line of defense then?
> It is behind another guest?
It was the first line of defense from Internet threats. But at the same time it
was connected to bridges in Fedora netvms that themselves were only connec
On Monday, June 5, 2017 at 10:01:11 AM UTC-7, meower...@gmail.com wrote:
> On Monday, June 5, 2017 at 8:36:22 AM UTC-7, meower...@gmail.com wrote:
> > I just finished installing Qubes yesterday. The installer gave an error
> > saying IIRC that it could not make Qubes EFI bootable, so I followed th
> But the link to split the ethereum installation into two different VMs should
> be heavily adapted to your specific case that you did not mention.
You're right, I've missed this link and focused on the latter one.
> I appreciate the reply but what is the advantage of "splitting" my virtual
>
VMs by default check for available updates and notify Qubes VM Manager
if there are any. Is there a genereic dom0 terminal command that
corresponds to Qubes VM Manager's "Update VM"?
--
e3b
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To uns
On 06/05/2017 04:06 PM, Unman wrote:
On Mon, Jun 05, 2017 at 03:59:26PM +, 7v5w7go9ub0o wrote:
On 06/05/2017 01:42 PM, Andrew David Wong wrote:
1. The date of issue of this canary is June 2, 2017.
5. We plan to publish the next of these canary statements in the first
two weeks of
Frans, Unman -
I appreciate the reply but what is the advantage of "splitting" my virtual
wallet between 2 VMs?
Sorry if that is a simple question but I have difficulty understanding
these technical things.
As Vit pointed earlier, I am using Qubes 2.0. Would it be helpful if I got
the most rece
On Mon, Jun 5, 2017 at 11:49 AM, Christopher Thacker
wrote:
> Francesco, it is actually not ethereum or bitcoin. it is another crypto
> coin. Would the information you linked still be valid?
>
>
The link that explains how template VM work yes is valid. But the link to
split the ethereum install
On Monday, June 5, 2017 at 8:36:22 AM UTC-7, meower...@gmail.com wrote:
> I just finished installing Qubes yesterday. The installer gave an error
> saying IIRC that it could not make Qubes EFI bootable, so I followed the
> steps in the last section of the uefi troubleshooting doc, except for the
On Mon, Jun 05, 2017 at 03:59:26PM +, 7v5w7go9ub0o wrote:
>
> On 06/05/2017 01:42 PM, Andrew David Wong wrote:
>
>
>
> > 1. The date of issue of this canary is June 2, 2017.
>
>
>
> >
> > 5. We plan to publish the next of these canary statements in the first
> > two weeks of September 2
Wireshark is a great tool. It analyzes all the traffic and parses various
formats… And this is also exactly what's wrong with it. The parsers are complex
and potentially vulnerable (well, [1] suggests that “potentially” is maybe an
understatement) and the attacker can often choose what parser wi
On 06/05/2017 01:42 PM, Andrew David Wong wrote:
> 1. The date of issue of this canary is June 2, 2017.
>
> 5. We plan to publish the next of these canary statements in the first
> two weeks of September 2017. Special note should be taken if no new canary
> is published by that time or if t
On Sun, Jun 04, 2017 at 07:16:39PM -0700, Christopher Thacker wrote:
> Hi.
>
> I have Qubes 2.0 on my laptop. 8 GB ram and about 100 GB ssd with plenty of
> room.
>
> I want to install a .deb file. I clicked the "Open With" icon then clicked
> the "Software Installer" icon.
>
> I received th
The information linked by Francesco is general and not related to a specific
software.
I am sorry for the offtopic, but why are you using unsupported Qubes 2.0? See
https://www.qubes-os.org/doc/supported-versions/ for supported versions.
Regards,
Vít Šesták 'v6ak'
--
You received this message
I just finished installing Qubes yesterday. The installer gave an error saying
IIRC that it could not make Qubes EFI bootable, so I followed the steps in the
last section of the uefi troubleshooting doc, except for the last step I made a
rEFInd menuentry instead of using efibootmgr. I booted my
Francesco, it is actually not ethereum or bitcoin. it is another crypto coin.
Would the information you linked still be valid?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, se
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-06-05 08:42, Andrew David Wong wrote:
> Dear Qubes community,
>
> We have just published Qubes Canary #12. The text of this canary is
> reproduced below. This canary and its accompanying signatures will always be
> available in the Qubes Sec
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes community,
We have just published Qubes Canary #12. The text of this canary is
reproduced below. This canary and its accompanying signatures will always be
available in the Qubes Security Pack (qubes-secpack).
View Canary #12 in the qube
I guys, I've tried already with another image and another Disk, an 500GB
seagate and the results are the same. is it possible to be a disk driver (from
Cubes installation setup ) problem or a disk/bios problem? Both disks, the SSD
275GB Crucial and the 500GB Seagate are functioning well as I did
Hi, I would like to subscribe to an account on riseup.net, I'm looking for
someone who can give me an INVITE CODE, thank you for your help.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails
Hello,
to harden a system is much more efficient, as to hunt the hacker inside the
network.
QubesOS makes a great job and I have personally much less "infections" as with
other desktop OS, but perhaps this only a personal view.
Security Playbook - rule 3 - assume always to be hacked and hunt t
On Sun, Jun 4, 2017 at 11:16 PM, Christopher Thacker
wrote:
> Hi.
>
> I have Qubes 2.0 on my laptop. 8 GB ram and about 100 GB ssd with plenty
> of room.
>
> I want to install a .deb file. I clicked the "Open With" icon then
> clicked the "Software Installer" icon.
>
> I received the message:
34 matches
Mail list logo