On Wednesday, 15 July 2020 05:10:30 UTC+8, awokd wrote:
>
>
> In either case, don't forget to have a line in
> /etc/qubes-rpc/policy/qubes.UpdatesProxy like:
>
> $type:TemplateVM $default allow,target=sys-whonix
>
>
I didn't know about this, so this helps haaber's comment make a lot more
On 7/14/20 9:57 PM, Qubes wrote:
I installed a clean Fedora-32 template today, but I have some issues and
I am not sure where to start.
After installing the F-32 template I switched the default-mgmt-dvm qube
to use the F-32 template.
I then created a new qube basing it on the F-32 template,
Robert Spigler:
> How would I go about properly creating a fedora-32-dvm with the
> 'template_for_dvms' flag set?
https://www.qubes-os.org/doc/disposablevm-customization/
--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste
haaber:
>> <<--snip-->>
>> Though it's not clear to me whether this is actually an issue, I figured
>> I'd do it anyways. My question is, if I wanted to disable
>> qubes-update-check service, how would I go about updating my templates
>> over tor? Do I create debian and fedora templates linked to
shamaarmarti...@gmail.com:
> I wanted to use the uninstall reinstall method to upgrade whonix 14 to 15 on
> qubes 4.0
>
> Procedure:
> 1. Delete all whonix template packages
> 2. Make sure dom0 is updated
> 3. Adjust whonix version to 15
> 4. Attempt to download and configure TemplateVMs with
tomas.schutz...@gmail.com:
> I am still looking into this, it is a lot of to think of. Do you know any
> sites where is threat modeling for average user? I was trying dozens of
> phrases... and i didn't find any threat model website. Everything only for
> companies and developers, which were
shamaarmarti...@gmail.com:
> I turned off auto start rebooted turned it back on rebooted again. Now I have
> what appears to be a command screen but I can’t interact with it. The screen
> is blocking the qubes icon and I keep restarting it and it’s lets me type for
> a second then disappears
On 2020-07-14 16:54, 'J.M. Porup' via qubes-users wrote:
hi,
Has anyone written a guide to setting up a Kali vm in Qubes for
pen testing?
I'm studying for the OSCP, and the Qubes firewall port forwarding
guide suggests a fragile and finicky setup that I'm reluctant to
rely on. Punching holes
alexhisf via qubes-users:
>
> The solution at
> http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion/doc/pci-devices/
> Bringing PCI Devices Back to dom0
> echo > /sys/bus/pci/drivers/pciback/unbindMODALIAS=`cat
> /sys/bus/pci/devices//modalias`MOD=`modprobe -R $MODALIAS |
Frédéric Pierret:
> Hi
>
> On 2020-07-07 11:50, david russo wrote:
>> The main issu is when I want to use internet acces as Firefox comboned with
>> TOR, I checked my IP on the websit « monip » and Nothing change, tor doesn’t
>> support the hide IP.
If I understand you right, you are using
E. Foster:
> Or do some updates occur because a template VM has been changed in a
> repository, and the update package is then pushed to the respective VMs
> using the template?
This. Qubes Updater (Qubes menu/System Tools) runs periodically and
checks for updates in repos.
> Bizarrely, I
tirsdag den 14. juli 2020 kl. 17.54.43 UTC+2 skrev jm:
>
> hi,
>
> Has anyone written a guide to setting up a Kali vm in Qubes for
> pen testing?
>
I have Kali rolling installed and happy using it for CTF gaming and small
stuff. I love Qubes and Kali together, but for reverse shell, etc.
joshkane...@gmail.com:
> Booting into Kali (forensics mode) and unlocking the ssd failed.
>
> I typed out the passphrase to a text document, confirmed it was correct,
> and pasted it into the prompt.
>
> "incorrect passphrase"
>
> This implies to me that the header was altered in some way. 2
I installed a clean Fedora-32 template today, but I have some issues and
I am not sure where to start.
After installing the F-32 template I switched the default-mgmt-dvm qube
to use the F-32 template.
I then created a new qube basing it on the F-32 template,
test-fedora-32-template, just to
hi,
Has anyone written a guide to setting up a Kali vm in Qubes for
pen testing?
I'm studying for the OSCP, and the Qubes firewall port forwarding
guide suggests a fragile and finicky setup that I'm reluctant to
rely on. Punching holes from sys-net to sys-firewall to vpn-vm to
an an appvm
Thank you both.
For security reasons, in case the DVMTemplate has been compromised, I
deleted it.
How would I go about properly creating a fedora-32-dvm with the
'template_for_dvms' flag set?
Thank you
--
You received this message because you are subscribed to the Google Groups
Cool. Even better! Works!
On Tuesday, July 14, 2020 at 2:30:43 PM UTC+2, GWeck wrote:
>
> There is a somewhat lengthy discussion in
> https://github.com/QubesOS/qubes-issues/issues/5863.
>
> For me, setting
>
> showframewindow=false
> in ~/snap/zoom-client/current/.config/zoomus.conf worked.
>
There is a somewhat lengthy discussion in
https://github.com/QubesOS/qubes-issues/issues/5863.
For me, setting
showframewindow=false
in ~/snap/zoom-client/current/.config/zoomus.conf worked.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
Oh. it works now!
I needed to share first, and then do the xdotool trick...
On Tuesday, July 14, 2020 at 2:12:23 PM UTC+2, peter@gmail.com wrote:
>
>
>
> On Sunday, May 10, 2020 at 8:00:57 PM UTC+2, Vít Šesták wrote:
>>
>> The problem with Zoom is probably that it opens a transparent
On Sunday, May 10, 2020 at 8:00:57 PM UTC+2, Vít Šesták wrote:
>
> The problem with Zoom is probably that it opens a transparent overlay,
> likely because of annotations. However, Qubes OS does not support
> transparency. There is a workaround that hides the overlay:
>
> xdotool selectwindow
> <<--snip-->>
Though it's not clear to me whether this is actually an issue, I figured
I'd do it anyways. My question is, if I wanted to disable
qubes-update-check service, how would I go about updating my templates
over tor? Do I create debian and fedora templates linked to sys-whonix
just to
21 matches
Mail list logo