On 4/1/19 2:15 AM, Mindus Amitiel Debsin wrote:
On Sunday, March 31, 2019 at 2:22:21 PM UTC-7, awokd wrote:
Try finding the BDF of that SATA controller with lspci in dom0, then
making Xen/Qubes ignore it by adding xen-pciback.hide=(0x:0y.z) to the
boot options (where xyz=BDF). It might not like
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 02/04/2019 8.04 AM, Ryan Tate wrote:
>> On Apr 1, 2019, at 10:01 PM, Andrew David Wong
>> wrote: On 01/04/2019 2.54 PM, Ryan Tate
>> wrote:
>>>
>>> If the wish is not “restore” but rather to copy some files —
>>> “some files and scripts that I
awokd,
> You do have to do it with sudo. In dom0, you are trying "sudo ls
> /var/log/libvirt/libxl"?
Thank you. I tried that and it did not work. You brought me back and now its
working.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
Claudio Chinicz:
Hi Folks,
I'm willing to use my Qubes notebook as my main notebook in a corporate
environment. One of the things I use daily is an external keyboard,
which cannot be hooked to my Linux Mint 19.1 Cinnamon 64 bits HVM
because qurexec is not present.
Anyone has done it
You need to enable the qubes-update-proxy service - this creates the
necessary file at /var/run/qubes-service/qubes-updates-proxy
There's another issue in that the service file refers to
/usr/sbin/tinyproxy but the exec is in /usr/bin
Fix this by editing
Hi Folks,
I'm willing to use my Qubes notebook as my main notebook in a corporate
environment. One of the things I use daily is an external keyboard,
which cannot be hooked to my Linux Mint 19.1 Cinnamon 64 bits HVM
because qurexec is not present.
Anyone has done it before? I'm looking for
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Apr 02, 2019 at 01:20:54PM +1100, haaber wrote:
> > On Tue, Apr 02, 2019 at 07:19:46AM +1100, haaber wrote:
> > >
> > > So do I understand that correctly: if I have, say, a debian-XYZ AppVM on
> > > clearnet it will check if the
I could accomplish Windows 10 and 7 X64 installation by following the steps
given in the link below:
https://www.qubes-os.org/doc/windows-vm/
I have followed steps given under Qubes 4.0 - Windows VM installation. I have
not installed QWT in Windows 10 and 7 X64. I notice that both
On Wednesday, March 27, 2019 at 2:45:12 PM UTC+5:30, Lorenzo Lamas wrote:
> Afaik the specific attack only worked on Intel CPU's, OpenBSD disables SMT on
> other manufacturers as well as they believe other CPU's have similar issues.
> I run Qubes on an Intel machine, so I have SMT disabled, but
> On Apr 1, 2019, at 10:01 PM, Andrew David Wong wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 01/04/2019 2.54 PM, Ryan Tate wrote:
>>
>> If the wish is not “restore” but rather to copy some files — “some
>> files and scripts that I need” — then it is up to the user
On 4/1/19 6:36 PM, 'awokd' via qubes-users wrote:
Ryan Tate wrote on 4/1/19 7:54 PM:
On Apr 1, 2019, at 2:33 PM, Ryan Tate wrote:
Now I see there is a folder in my dom0 home dir called
‘home-restore-2019-04-01-etcetc’.
But what do I do with this? I just have to manually figure out what
11 matches
Mail list logo