-terminal is launched, then two terminal console windows
> are displayed) Something definitively went wrong with this update...
>
Tracking:
https://github.com/QubesOS/qubes-issues/issues/2201
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.o
to the port owned by the controller
assigned in step 2.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXhmp1AAoJENtN07w5UDAww3AQAKDCYp2cstbjNmaq4T+b56fO
+G3ViddqCWQ3zW2WCaKIwTDIOY92
//www.qubes-os.org/doc/user-faq/#i-created-a-usbvm-and-assigned-
usb-controllers-to-it-now-the-usbvm-wont-boot
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXhXoxAAoJENtN07w5UDAwmbMP/2H
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-14 16:09, Drew White wrote:
> Also, that link is "Error starting VM: (0, 'Error')" not "Error starting VM
> 'GUEST NAME': (2, 'No such file or directory')"
>
There are two links. Look at the first one.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-14 15:49, Drew White wrote:
> On Friday, 15 July 2016 08:38:08 UTC+10, Andrew David Wong wrote:
>> I'm not sure what you mean. Normally, you can update any version of Qubes
>> by running qubes-dom0-update. That shou
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-14 15:35, Drew White wrote:
> On Friday, 15 July 2016 08:14:05 UTC+10, Andrew David Wong wrote:
>> You can try based on what's described here, combining "How to downgrade a
>> specific package" with "Ker
der would be fast, yes.
> Cons: Not water-proof against Quantum Computer Attacks (you will need more
> modern ciphers)
As far as we know, AES-256 will remain resistant to post-quantum attacks.
Effective key length will be halved, so AES-256 should be roughly as strong as
pre-quantum AES-128, bu
to the Application Launcher Menu (aka
"Start Menu")?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXleWWAAoJENtN07w5UDAwoxgQALFdyyneSg9seI63S9qxqYWo
1U3UtFtFmeD7Gp03gqx+VChbW0z
/QubesOS/qubes-issues/issues/1495
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXlYIsAAoJENtN07w5UDAwCAoP/1UYjBjB3v089zcH3ZGKSCj5
gSJzTFXhs0TLPksCXf0FKTXiLt1YqjaSie+7W8KwxB8jTMJqTYitg/nqY/G8zc/Z
dAUd4GGDeRwL+lx/E6DLnCFk8uz4hXv
don't know whether there's an equivalent option in XFCE.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXlYvBAAoJENtN07w5UDAwrzIP/2I+cxxwbTiYEJjAMNaz/SiU
0Lb9iA+ALVND1XkeYeqPsTj
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-28 01:43, ab0f1...@opayq.com wrote:
> On Thursday, 28 July 2016 11:39:24 UTC+3, Andrew David Wong wrote:
>> I don't think that's what he's saying. I think he's just pointing out
>> that it can be very problematic. It's sti
com/en-us/kb-articles/Pages/GPU120AMDRVICPUsHyperVWin8.aspx
>
> Basically, anything recent that isn't too cost-reduced.
>
> Chris
>
Chris, I think you may have accidentally pasted the same link twice.
- --
Andrew David Wong (Axon)
Communit
an by "MP3 support"?
FWIW, I installed VLC media player in a Fedora 23 template, and I have no
problem using it to play mp3s.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXlBVbAAoJENtN07w5UDAw
shut down the Debian 8 TemplateVM after making your
changes to Google Chrome but before starting the AppVM based on it?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXk/30AAoJENtN07w5UDAwEgoP/0gIFOsYey1d/oiw4sLZ
use of a TPM would make a difference here, for the reason Andrew points
out.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXkqY8AAoJENtN07w5UDAwZXAP/ij0gz89b4uLroC8FGvUpq7i
BeeNmyZzTYJzrRpp/BuUzUeCRJpbiNX1qaNTgQrhCvErXcPtj0UB1p
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-22 16:39, Chris Laprise wrote:
> On 07/22/2016 07:03 PM, Andrew David Wong wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512
>>
>> On 2016-07-22 08:15, TheFactory wrote:
>>> Another good use for th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-24 10:56, Achim Patzner wrote:
>
>> Am 23.07.2016 um 00:41 schrieb Andrew David Wong <a...@qubes-os.org>:
>>
>> Your best bet is to whitelist the entire CIDR block of bank's domain
>> (and hope the s
'm using EFI. I've a MSI motherboard, it says the BIOS version is
> "E7758IMT V2.34B5".
>
> Any help would be much appreciated.
>
Do you have the option to try legacy boot instead of EFI?
- --
Andrew David Wong (Axon)
Community Manager,
y depends on the specific model.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXnAM2AAoJENtN07w5UDAwvqoQALYWRqREao2ANQuvWsne37RT
CTybWZG+EbSv+kZim8xGWmcG4qDe32MextBWK7mwM1V/fqc4ELaVTEuR3wSwvpsR
FkF3FAQsTkjqvYgC+kXHSut
robably an oversight, since all power saving measures should be disabled
while the OS is being installed.
Tracking:
https://github.com/QubesOS/qubes-issues/issues/2212
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAG
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-31 17:53, Adrian Rocha wrote:
> El domingo, 31 de julio de 2016, 17:53:01 (UTC-6), Marek
> Marczykowski-Górecki escribió: On Sun, Jul 31, 2016 at 04:40:16PM -0700,
> Andrew David Wong wrote:
>>>> On 2016-07-31 15:3
watts you're pulling before
and after?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXnx75AAoJENtN07w5UDAw5igQAMEWZYnYBQoDK17fpIk+RVTH
3aR3cRkNEAl6JEGESEnOGkS6T7n/dI6s4ZKJ+cY83gCw5PAYo3K
nstall or install packages when you're entire certain what will happen as a
result). By cloning the template first, it's very easy to recover from a
mistake. You simply delete the messed up clone, and you still have the working
original template (which you can then clone from again).
- --
Andrew David
sys-whonix). I just wait
for a new circuit or manually request a new identity via tor-arm in
sys-whonix by pressing 'n', and that usually fixes it.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCg
t,
depending on your security needs and level of paranoia, you may have to throw
out your laptop and get a new one).
> However, thank you both for your answers so far. -Fabian
>
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-issues/issues/2213
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXnS8pAAoJENtN07w5UDAwrhcP/3vym+GdifMH3dhJuhmIzSCC
2F1QbgUYlvkNeBPNc/P+QhodaV+agvfWnPn04G6JX5gBnfFCCF1ALRlAt2fB1Wel
iQijVuEqakmFD/+iOvQQNOXQs2+U21D
om the ISO, you should still be able to install
it from the repos. We don't have documentation for this yet, but if the
command matches Xfce, it should be:
$ sudo qubes-dom0-update @kde-desktop-qubes
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-31 13:42, Andrew David Wong wrote:
> On 2016-07-31 13:38, Marek Marczykowski-Górecki wrote:
>> On Sun, Jul 31, 2016 at 01:30:42PM -0700, Andrew David Wong wrote:
>>> On 2016-07-31 10:41, donoban wrote:
>>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-31 13:38, Marek Marczykowski-Górecki wrote:
> On Sun, Jul 31, 2016 at 01:30:42PM -0700, Andrew David Wong wrote:
>> On 2016-07-31 10:41, donoban wrote:
>>> On 07/30/2016 11:52 PM, Marek Marczykowski-Górecki wrote:
&
h it next
> time got the error on the screenshot.
>
> Thanks :)
>
Already tracking here:
https://github.com/QubesOS/qubes-issues/issues/2094
Added link to your thread.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https:/
uot; list :)
> Is it tracked?
>
By "ALL ICONs from ALL domains," do you mean all shortcuts to start programs
in AppVMs?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXnnhb
any reason, then it's perfectly fine to write to
the mailing list instead. (Not a big deal either way.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXnm50AAoJENtN07w5U
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-31 13:45, Andrew David Wong wrote:
> On 2016-07-31 13:42, Andrew David Wong wrote:
>> On 2016-07-31 13:38, Marek Marczykowski-Górecki wrote:
>>> On Sun, Jul 31, 2016 at 01:30:42PM -0700, Andrew David Wong wrote:
>&g
;
Tracking:
https://github.com/QubesOS/qubes-issues/issues/2216
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXnnfgAAoJENtN07w5UDAwAk0QALYNEznbKj+6DwIwmAjAlc2h
Ao14nDJqnm5zF8j5pm0fSZZ
the
> list):
>
> https://i.imgur.com/3qk2Cl7.png
>
Thanks. Tracking:
https://github.com/QubesOS/qubes-issues/issues/2217
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJ
g?
>
Which Qubes OS version, VM OS, and browser?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXmSbhAAoJENtN07w5UDAw6WcP/1M0fyJP3reB2IlrGP4YWM0R
mrgbTSaeC2ov7jh+dWTe6081DD8P17B0UHdVNp2rd/JIDZlV90kxRcygKOLTfSrS
This must mean the latest 3.1
> Qubes is bugged for my system
>
> On Aug 10, 2016 3:30 AM, "Andrew David Wong" <a...@qubes-os.org> wrote:
>> I would recommend trying R3.2-rc2, at least to see whether it installs
>> and boots successfully, even if you don't
pported:
"Other devices, such as USB webcams, will also work, but they will be
accessible only from the USB qube itself, as explained above."
https://www.qubes-os.org/doc/usb/#tocAnchor-1-1-3
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qub
ke:
https://www.qubes-os.org/doc/encryption-config/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXoVV+AAoJENtN07w5UDAwPMwP/irWB17ia1PdFTVLaIvPmSKP
ELbFTv/bcgYkpSltvqLa19s7mpBmdgYHw4QP22kfgIS+ZoeRopo3AdX
https://github.com/QubesOS/qubes-issues/issues/1028
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXn+HSAAoJENtN07w5UDAwxNYP/jwehY9vTgc7g7tSdd8TwkIC
I4Bij0JNkq5xRztE/CFPuxBzRJPSXnRqJSSaM7H9vCes+g
ct your NAS to the VM in
which CrashPlan is running (how to do this depends on your NAS and your
preferences).
> - uses Windows to use Office and lightroom and photoshop
You can read all about Windows VMs here:
https://www.qubes-os.org/doc/windows-appvms/
- --
Andrew David Wong (Axon)
Community Man
ck for Qubes, so another possibility
is that your hardware is compatible with earlier versions of Qubes but not
with these later versions. Unfortunately, this is very hard to diagnose.
> On Wednesday, August 10, 2016 at 3:30:20 AM UTC-5, Andrew David Wong
> wrote:
>> The live USB version
been
started in any of those cases would be very welcome.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXrNaUAAoJENtN07w5UDAwkxwP/RMU50WhokjQy8h/gGmIQosQ
5+4M3pNvMu1POyRUvCNK2+LZMYLAfdM6BkarkUBTIypDRqc9OzkVezb8emxS7x1B
fstP5If
es-issues/issues/2226
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXowt6AAoJENtN07w5UDAwVjIQAK5MyNgnCqNiHSaELbj92W9h
6UfsL4n5qTmcUoYz3BHDrxPwQccLJ0zof7f/wdG+fZaOh6mZpYN0LE3ZItfjNF0X
NF3Yh+Z5YTFo8jb3GFw7
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-13 14:51, Marek Marczykowski-Górecki wrote:
> On Fri, Aug 12, 2016 at 11:45:35PM -0700, Andrew David Wong wrote:
>> On 2016-08-12 11:19, johnroberts19...@gmail.com wrote:
>>> Hello
>>>
>>> i disabl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-13 20:53, Daniel Franke wrote:
> /13/16, Andrew David Wong <a...@qubes-os.org> wrote:
>> Which Qubes release and desktop environment are you using?
>
> I'm on 3.2-rc2 under Xfce.
>
Ok, well, the process should
lick "Edit Applications..."
3. Select the "DisposableVM" menu.
4. Click "New Item".
5. Assign the name, icon, description (if any), and comment (if any) as you see
fit.
6. In the "Command" box, add your command. For example:
sh -c 'echo chromium | /usr/li
's private.img file along with things like
firewall.xml. You can explore the contents for yourself by following the
instructions here:
https://www.qubes-os.org/doc/backup-emergency-restore-v3/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-14 15:22, IX4 Svs wrote:
> Just spent a few minutes to figure this out so I thought I'd share.
>
Thanks, Alex! Would you mind if we added this to the docs at some point?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
message of this type (copied by hand): Failed to start
> media check on /dev/sdc See 'systemctl status checkisomd5@-dev-sdc.service'
> and 'journal.ctl-xn' for details 5. I couldn't check anything because the
> system was halted
>
> What can I do? Thank you in advance!
>
Did you us
ur new
information, it's possible there's actually a common root cause. Tracking your
new issue here:
https://github.com/QubesOS/qubes-issues/issues/2246
P.S. - Please avoid top posting.
>
> On Sat, Aug 13, 2016 at 8:47 AM, Andrew David Wong <a...@qubes-os.org>
> wrote:
>
> On
ct. It's simply the disconnection notification that (incorrectly)
persists. Correct?
Also, I assume you're using Xfce4. Is that correct?
Tracking here:
https://github.com/QubesOS/qubes-issues/issues/2244
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
---
oot in mind. I'm not sure
how to enable TRIM on UEFI (CCing Marek).
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXrvJsAAoJENtN07w5UDAwnc8P/35kWSsRqTEPB4cA/F2dbTg/
m4eieEBI+qyo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-12 11:27, johnroberts19...@gmail.com wrote:
> On Thursday, August 11, 2016 at 8:50:53 PM UTC+2, Andrew David Wong wrote:
> On 2016-08-11 05:08, amad...@riseup.net wrote:
>>>> My understanding is that by default Qubes
> System is an AMD64 with 4G memory, JMicron SATA->USB Controller on a 2.5"
> 500G Samsung drive.
>
> JJ
>
Thanks for the report. Tracking here:
https://github.com/QubesOS/qubes-issues/issues/2245
Please let us know how it goes when you try moving the drive onto the SATA bus.
tence.")
>
> By the way, I intend all my comments as constructive or for discussion.
> It's an awesome system, kudos to Joanna and the team. It's been my main
> platform for a couple of weeks now, and I'm loving it, despite a few
> glitches and some confusing bits. I hop
ase you
weren't already aware of it, you mind find some useful information:
https://www.qubes-os.org/doc/vpn/
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXrveoAAoJENtN07w5UDAw95sQAMwNGL/ezWe5XfftkyjV1Yb
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-13 01:48, johnroberts19...@gmail.com wrote:
> On Saturday, August 13, 2016 at 8:45:42 AM UTC+2, Andrew David Wong wrote:
> On 2016-08-12 11:19, johnroberts19...@gmail.com wrote:
>>>> Hello
>>>>
>>>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-13 07:28, Gabriele Bini wrote:
> Il giorno sabato 13 agosto 2016 12:22:04 UTC+2, Andrew David Wong ha
> scritto: On 2016-08-13 01:25, Gabriele Bini wrote:
>>>> I used dd: my current system is a Linux Mint
.0. Methods 2 and 3
should still support it.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXrBgyAAoJENtN07w5UDAwQzoP/1pDq5GuaaYqPVgcIlcBcra0
LM7kpsAGXepBPSWfIzllvfmLaeubBUpx3HxJPgyECMKPitf7tCpv9SdB4zOyIr4r
MMUvJY
it might be. I
have no way of knowing. Personally, I find the protection offered by having a
dedicated USB qube to be far more important than the bootloader issue, but
your situation may not be the same as mine.
- --
Andrew David Wong (Axon)
Community Manager, Q
s/issues/1502
Should be fixed soon. You can try switching to Chrome in the meantime.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXqvdBAAoJENtN07w5UDAwEIoP/3kMiTm1S8eWVYQ46Ao5Ydzf
nOkxS3yRPYm84FP37KQIq3gZ422o7IIBCA
way to keep VMs organized. I don't
yet know what the new system will look like, so I can't say whether a
folder-based system (like the app menu) will make sense, but something like
that could be a good idea. I've added this suggestion as a comment with a link
back to this thread.
- --
Andrew
obile=true#!msg/qubes-users/DQUzJ39H9Cc/Ar
m1sU3gBQAJ
>
>
>
Issue opened:
https://github.com/QubesOS/qubes-issues/issues/2170
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXhow/AAoJENtN07w5UDAw8bMQAL
pic/qubes-devel/cekPfBqQMOI/discussion
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXh0hKAAoJENtN07w5UDAwUYAP+gNwippPA6V9YnlaWgSynTo7
SgUN/0xMl25L0LebrK8KnQhmVWThjXVAXdbQm1K0w8n6f1rgr0p7bStTX
, it's not dangerous at all.
> And in case I want to do that, is it correct that I should do it by
> installing ufw in the TemplateVM, and then enable it in sys-net?
>
Yes. You may want to clone your TemplateVM or use a minimal template to do
that, but it's up to you.
- --
Andrew D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-13 15:03, Cannon wrote:
> On 07/12/2016 11:16 PM, Andrew David Wong wrote:
>> Please see this FAQ entry:
>>
>> https://www.qubes-os.org/doc/user-faq/#i-created-a-usbvm-and-assigned-
>> usb-controllers-to
he
> conversation, similarly any email client that does a threading view will
> have it separate from the original thread.
>
>
>
>
> Maybe others have better suggestions
>
I'm not sure if using Gmane allows you to reply to old threads, but it's also
worth looking into. Informat
;long" uptime?
>
This and the Qubes Manager memory leak are the only two I know of.
https://github.com/QubesOS/qubes-issues/issues/860
(Note that the latter was recently fixed, but the package is in the R3.2
dom0 testing repo.)
- --
Andrew David Wong (Axon)
Community Manager, Qubes
still
> fails with "ssh: port 22: No route to host" messages.
>
> At this point I resort to rebooting my Qubes machine and going through the
> process again with similar results.
>
> I can do similar transfers between other home machines just fine.
>
> Any i
ready enabled the RPM Fusion repo in your TemplateVM?
https://www.qubes-os.org/doc/software-update-vm/#tocAnchor-1-1-11
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXjVPEAAoJENtN07w5UDAwtEMQAM57br31foMWxuXQs9HCkHoV
this cron job (in dom0):
/etc/cron.d/qubes-sync-clock.cron
...which uses the qvm-sync-clock command.
Check your cron log to see if it's been running:
$ cat /var/log/cron
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCg
gt; would be.
>
>
> New guy. If you're going to drop a lot of cli-fu on me, go slowly.
>
> Many thanks,
>
> Rick
>
There's probably a problem with your ISO. You can download the correct one
legally and for free from Microsoft's website following these instructions:
ht
or the devs to do it, rather than me
> trying to find it and follow everything through to fix it. :}
>
Take a look at this issue (and the linked message and thread):
https://github.com/QubesOS/qubes-issues/issues/2149
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https:/
hines before either
> closing the issue[1] or inquiring upstream.
>
> Thanks, Chris
>
> 1. https://github.com/QubesOS/qubes-issues/issues/2155
>
Thanks for all of your work on this, Chris. I might have some time to help
test this soon.
- --
Andrew David Wong (Axon
ing
> physical acccess to some USB port.
>
> But, just exploiting a browser in an AppVM isn't enough, as normal AppVM do
> not have any PCI device assigned (unless you do that manually).
>
Clear and lucid answer, as always. Thanks, Marek! Added to the FAQ:
https://g
t;
> How can I do this please?
>
You can try based on what's described here, combining "How to downgrade a
specific package" with "Kernel Upgrade," but I don't know whether it'll work:
https://www.qubes-os.org/doc/software-update-dom0/#tocAnchor-1-1-3
- --
Andrew D
> Thanks in advance
>
I think someone just asked this question recently. Have you already tried
searching the archives?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXiA7vAAoJENtN07w5UDAwm5AP/jzPpNFLoVaeux3huU
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-11 00:24, Drew White wrote:
> On Monday, 11 July 2016 00:10:10 UTC+10, Andrew David Wong wrote:
>>> https://www.deepdotweb.com/2016/03/12/
>>> does-qube-os-has-a-leak-hole/ Has some Qubes dev contact
lease try to avoid top posting.)
> On Tue, Jul 12, 2016 at 9:43 AM, Andrew David Wong <a...@qubes-os.org>
> wrote:
>
> On 2016-07-11 18:31, Adam wrote:
>>>> Hi
>>>>
>>>> Does the Fedora Minimal Template still exist? I am unable to install
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-11 19:43, Adam Steen wrote:
> On Tue, Jul 12, 2016 at 10:35 AM, Andrew David Wong <a...@qubes-os.org>
> wrote:
>
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512
>>
>> On 2016-07-11 19:17, Adam Steen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-11 20:13, Marek Marczykowski-Górecki wrote:
> On Mon, Jul 11, 2016 at 07:49:28PM -0700, Andrew David Wong wrote:
>> On 2016-07-11 19:43, Adam Steen wrote:
>>> On Tue, Jul 12, 2016 at 10:35 AM, Andrew David Wong
ll be available. (I'm currently using it.)
You issued this command in dom0, correct?
$ sudo qubes-dom0-update qubes-template-fedora-23-minimal
What was the output?
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
---
ion page. That will show you the last commit (near the top of
the page), and you can see the rest of the available commit history by
clicking the "History" button.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQ
attached USB devices..?
>
> Let's say that I have a USB disk plugged in. Where would I actually now
> find this device in the VM...?
>
You'd probably be able to see it in your file manager, and it would probably
be /dev/sda (or /dev/sdb if you already have a /dev/sda, and so on).
- --
A
tools * sudo qubes-dom0-update
> --enablerepo=qubes-*-testing qubes-windows-tools
>
Are you downloading updates via Tor (sys-whonix)? If so, it's possible
that you just temporarily had a bad exit node.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.q
cation at the top. https://i.imgur.com/gctZoJl.png
Added:
https://github.com/QubesOS/qubes-issues/issues/1870#issuecomment-
230376093
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXex
? Is it compatibility
> issue? Why not to write it on C++ with Gt/Gtk ?
>
>
> Some additational questions:
>
> Is it "safe" to give "yes to all" permissions to vm with
> Enigmail(PGP) to access vaultVM through slip-pgp-key?
>
(Replied on duplicate thr
ne getting different
> special routes in tor using whonix.
>
This sounds like something that should be reported to the Tor project
or Whonix.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJXe4O8AAoJENtN07w5U
ntended way to run a command
in dom0 is simply to open a terminal in dom0.
We agree that this is confusing from a UX perspective, and we are
working on it:
https://github.com/QubesOS/qubes-issues/issues/1382
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-B
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-06 12:33, juris...@gmail.com wrote:
> Em quarta-feira, 6 de julho de 2016 12:37:31 UTC-3, Andrew David
> Wong escreveu: On 2016-07-05 12:35, juris...@gmail.com wrote:
>>>> Em terça-feira, 5 de julho de 2016 06:5
ere regarding enabling
> networkmanager.dispatcher. I have tried as much as I know or
> understand. Looking forward to some resolution to diminish
> frustrations of qubes.
>
So, are you still having problems updating dom0 and your templates? If
so, can you explain the prob
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-05 12:35, juris...@gmail.com wrote:
> Em terça-feira, 5 de julho de 2016 06:54:14 UTC-3, Andrew David
> Wong escreveu: On 2016-07-04 22:46, juris...@gmail.com wrote:
>>>> 1) qubes is a system for security and isola
had a chance to read these pages, you may find
it useful to learn about how TemplateVMs work in general:
https://www.qubes-os.org/getting-started/
https://www.qubes-os.org/doc/templates/
The basic TemplateVM principle is the same when it comes to Windows
TemplateVMs.
- --
Andrew David Wong (Axo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-06 14:24, juris...@gmail.com wrote:
> Em quarta-feira, 6 de julho de 2016 17:28:49 UTC-3, Andrew David
> Wong escreveu: On 2016-07-06 12:33, juris...@gmail.com wrote:
>>>> Em quarta-feira, 6 de julho de 2016 12:3
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-06 20:36, Drew White wrote:
> On Thursday, 7 July 2016 12:45:56 UTC+10, Andrew David Wong
> wrote:
>> Not sure what you mean. Is this way unreliable?
>
> Only in such a way that the file could be changed or corru
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-06 18:46, Drew White wrote:
> On Thursday, 7 July 2016 00:49:29 UTC+10, Andrew David Wong
> wrote:
>>
>> In dom0:
>>
>> $ cat /etc/qubes-release
>>
>
> Is there a reliable way?
>
N
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-06 23:00, Drew White wrote:
> On Thursday, 7 July 2016 13:50:45 UTC+10, Andrew David Wong
> wrote:
>> It's the only way that I'm aware of, and it seems to be a
>> standard way of storing version information:
>&g
s set correctly (to allow
traffic to the correct IP address, range, or CIDR block) from
whichever VMs you want to access those devices from, it should work,
even if connected to the FirewallVM.
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qube
e network to local, or vice-versa, takes
> way too long.
>
Thanks for the suggestion! Tracking it here:
https://github.com/QubesOS/qubes-issues/issues/2160
- --
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
iQIcBAEBCgAGBQJX
101 - 200 of 1609 matches
Mail list logo