On Mon, Jan 18, 2021 at 11:42 AM 'awokd' via qubes-users < firstname.lastname@example.org> wrote: > Shawn Creighton: > > > > I have a Sandisk Cruzer 8GB flash drive I've had for a few years, when I > > plug it in to Qubes it shows up in the available devices but when I > connect > > it to any appvm
On 1/17/21 11:38 PM, evado...@gmail.com wrote: Seems it works with rules below. Is it enough to prevent all leaks? Openvpn has more rules or other rules only drop traffic from proxyvm? Should I worry about this traffic? Is it the way to block it like openvpn solution from docs do for wireguard?
Shawn Creighton: I have a Sandisk Cruzer 8GB flash drive I've had for a few years, when I plug it in to Qubes it shows up in the available devices but when I connect it to any appvm it's not rshowing up in the file manager. Other newer flash drives work fine. Any ideas? NTFS format vs. ExFAT
I might add that at first after installing it gave me a black screen with a blinking prompt. to fix this issue I had to go in the BIOS and change the UEFI settings which had a choice between "windows systems" and "others" De : Stat Pow Envoyé : 18 janvier 2021
7.CANPRD01.PROD.OUTLOOK.COM. Qubes-HCL-ASUS-All_Series-20210118-082645.yml Description: Qubes-HCL-ASUS-All_Series-20210118-082645.yml Qubes-HCL-ASUS-All_Series-20210118-083409.cpio.gz Description: Qubes-HCL-ASUS-All_Series-20210118-083409.cpio.gz
BTW, I've started the reimplementation of qubes-i3status as a Python wrapper around i3status. I am trying to be quite conservative – in the default settings, there should be no visible difference except CPU load, periodic freezes and bug fixes (battery status). * Some indicators (battery, load
unman schrieb am Samstag, den 16.01.2021 um 01:39: ... > Many attacks rely on chaining exploits and loopholes in an assortment of > applications and libraries. > You see this very often in "capture the flag" contests, and in real > world attacks. ... > Are there risks? Of course. Sorry for