How does one go about connecting to an appvm from another device on your
LAN? Is there any documentation on this?
Just to avoid confusion a device on the same network as where sys-net
gets it's network from.
--
You received this message because you are subscribed to the Google Groups
On 8/3/20 1:05 PM, Chris Laprise wrote:
On 8/3/20 4:11 AM, fiftyfourthparal...@gmail.com wrote:
Your Qubes-VM-Hardening tool was one of the first things installed
into my first Qubes, but I'm still not very familiar with how it
works. I think vm-boot-protect might be blocking me from adding
'Антон Чехов' via qubes-users:
> I don't need the Personalization Tool very often. On the contrary, once the
> slots are configured they usually stay that way for a long time.
>
> My conclusion for now is, that I can live with this message. Or is this not
> the expected behavior? What do you
BGW:
> I have a personal debian app vm that starts automatically with qubes. I
> can't launch anything within the vm. If I stop the vm it will then restart
> automatically without being told to do so. But I still can't launch
> anything in the vm (browser, files etc).
Temporarily disable
How do we configure mouse wheel and button behavior on Debian?
I have found one for Debian imwheel, perhaps that's what people are
already using on their Debian systems?
I am busy ditching Fedora for Debian, but I wouldn't mind knowing how we
would do it on Fedora as well if someone knows
Great discussion,
In many industries a vendor analysis is conducted on a multitude of parameters
to indentify the best vendor. As many from outside the Qubes world have
gravitated to Qubes for those reasons.
>From what I am reading, we need all hands on deck and a war chest.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello guys, I would like to suggest a few changes and while you may not
have them in qubes by default, I ask you to give an option to the users
such that they be able to make it easily.
With GUI VM coming in 4.1, I request you to have linux-libre
On 2020-08-12 14:55, Eva Star wrote:
> sudo iptables -t nat -A PREROUTING -p tcp -j REDIRECT --to-ports 1080
>
> this rule not work :-(
>
Maybe your proxy should be running in some kind of transparent mode.
Have you tested before with an iptables redirect?
--
You received this message because
sudo iptables -t nat -A PREROUTING -p tcp -j REDIRECT --to-ports 1080
this rule not work :-(
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
Sven Semmler:
> On 8/10/20 11:05 AM, Toptin wrote:
>> I'm currently digging my way through the exceptional good Qubes
>> documentation. Everything is nicely explained as to why a certain
>> decision / implementation was made, except for the use of Fedora as
>> main distribution.
>
> This issue is
Mike Keehan:
> On 8/11/20 7:21 PM, Mike Keehan wrote:
>> On 8/11/20 7:13 PM, Toptin wrote:
>>> Mike Keehan:
On 8/11/20 6:08 PM, Toptin wrote:
> Toptin:
>> Dear Qubes Users,
>>
>> I'm currently digging my way through the exceptional good Qubes
>> documentation. Everything
On Sunday, August 9, 2020 at 10:07:25 PM UTC+2 awokd wrote:
> 'Антон Чехов' via qubes-users:
>
> > I have a handful ob Yubikeys (v.2 to v.4) and I really want to make use
> of
> > them with Qubes as well. So the next thing will be U2Fproxy and
> > YubikeyLogin.
> > There is some weird (?)
Hello,
How to redirect all traffic to specific socks5 port in vpnVM (not
system-wide, but from connected AppVMs) ?
I want to create vpnVM. It is not using openvpn as client, but other
specific software with opened socks5 port. I want to redirect all incoming
connections from connected appvsm
13 matches
Mail list logo