at all.
Are you remembering to create the hidden file to show its customised?
Also, AFTER that you need to run the qvm-create-default-dvm command again
to generate a new dispVMTemplate which embodies your customization, and
this isn't shown in your "steps".
unman
--
You re
> I have no idea why it would switch. It was working well until I updated it.
>
> I will just reinstall and try again.
>
I hope this does solve your problem - if not, try to identify exactly
what is happening and let us know.
Good luck
unman
--
You received this message becau
On Sun, Jun 11, 2017 at 10:18:45PM +0200, Patrik Hagara wrote:
> On 06/11/2017 09:57 PM, nimrod@gmail.com wrote:
> > Is there any way to make sure that the Qubes OS system can recognize all
> > the RAM in my system?
>
> Issuing `xl info` from a dom0 terminal will output the total system RAM
>
On Sun, Jun 11, 2017 at 10:12:48AM -1000, qubester wrote:
>
> I seem to have done this successfully sometime not long ago, but now am
> unable to do it again
>
> 1)
> qvm-block -l
> dom0:sdb3
> 2)
> I then attached to the AppVM I want successfully
> 3)
> However, in the file system it is not list
Internal True
Hides any entry from QubesManager AND the Menu.
Ideal if you are preparing a Qubes box for someone else.
I think this has been requested before but as a combination from the
"View" menu provides the running/internal combo it wasn't felt to be
necessary.
unman
--
You r
nconvenience as another brick in the wall of
privacy.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
ed for specific use cases. Some people HATE this approach.
> > >>
> > >> unman
> > >
> > > Really? Coming from the sort of people with the patience for an OS
> > > like Qubes? I'd think anyone who's involved enough to have an opinion
>
On Fri, Jun 16, 2017 at 10:02:27AM -0700, carr...@gmail.com wrote:
> I mounted a secondary hard drive to my qube using the "qvm-block" cmd and it
> shows up in the file explorer. When I double click it, nothing happens and
> don't have permissions to access it via the terminal. What else do I nee
On Fri, Jun 09, 2017 at 08:16:21AM -0700, Finsh wrote:
> Hello,
> i want to create a shortcut with the windows-key to lock my screen, but
> therefore i guess i would have to know the terminal-command to lock the
> screen, which i dont know? is there a "library" ore something like that to
> searc
On Sat, Jun 17, 2017 at 07:45:43AM -0700, carr...@gmail.com wrote:
> On Friday, June 16, 2017 at 6:24:55 PM UTC-4, Unman wrote:
> > On Fri, Jun 16, 2017 at 10:02:27AM -0700, carr...@gmail.com wrote:
> > > I mounted a secondary hard drive to my qube using the "qvm-block"
On Sun, Jun 18, 2017 at 10:04:05PM +0200, evo wrote:
> Hello!
>
> after i updated my app-template to debian 9 (dom0 is on fedora24) for
> some special apps i can not run ANY filemanager anymore!
>
> i tried to install thunar, caja, nautilus, nemo... they are all now on
> my template... but nothin
r qube. Saving a file in the disposableVM provides the yes/no
prompt you are asking about.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes
On Tue, Jun 20, 2017 at 10:06:36AM -0700, slemmigtor...@gmail.com wrote:
> Or is this a false positive?
>
It's almost certainly a false positive, triggered by the presence of xl,
and nothing more.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group
nder
>
There's a section on this in the docs:
https://www.qubes-os.org/doc/linux-hvm-tips/
See if that works for you.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receivin
n't straightforward. Building your
own Xenial packages would be much better.
On the "lock" issue, I see this sometimes, mainly on Zesty, but then I
see it on vanilla Ubuntu too: if it bothers you you could delete the
file in /rw/config/rc.local.
cheers
unman
--
You received this m
On Thu, Jun 22, 2017 at 02:37:14PM +0200, cubit wrote:
> Is there existing any pre-made templates for Debian 9?
>
Not yet.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an
appearance' of
the database.
I don't believe there's anything in the "Debian 8 code" that would be
responsible for this. Principally because I've successfully transitioned
to Stretch on a number of machines without losing the keepass data.
It would be useful if you coul
t have been done to your Qubes tools?), or qvm-copying the untrusted
PDF in to the storage qube, he copies it to another, converts there and
then moves the trusted PDF in to trusted storage.(I think the "copy back"
is just a mistake.) That "other" qube can be anything you choose -
verification (or else it won't load).
>
There is an alternative approach which would be to use a twitter client
like corebird, and to configure mimeopen so that links are opened in a
disposableVM.
I would certainly use a dedicated qube for this.
unman
--
You received this message because you
On Fri, Jun 23, 2017 at 08:21:07AM -1000, yreb-qusw wrote:
> On 06/23/2017 05:43 AM, Unman wrote:
> > On Thu, Jun 22, 2017 at 07:24:56PM -1000, yreb-qusw wrote:
> > > On 06/21/2017 04:21 PM, cooloutac wrote:
> > > > On Saturday, June 17, 2017 at 5:45:45 PM UTC-4, yre
he boot option rd.qubes.hide_all_usb is intended to stop dom0 from
being compromised by a malicious controller. Since you have VT-d you
should be all right. (Check that you are booting with that option
obviously.)
unman
--
You received this message because you are subscribed to th
cases, the problem is that the NIC requires firmware that isnt
loaded in sys-net.
As with any template based qube, you will have to install the firmware
in the Template used by sys-net. When you do this, remember to close
down the Template and then restart sys-net.
unman
--
You received this message beca
mean the "Side view of four qubes waving around" key?(TM
Rusty Bird)
Use xev and you will probably find it's mapped to Super_L, but "Super" will
probably do. Try it.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
On Sat, Jun 24, 2017 at 04:51:36PM -1000, yreb-qusw wrote:
> forgive me , if this seems off topic. but, somehow I need to have a working
> version of windows that doesn't require me to reboot preferably. And i've
> been looking around, for this answer , but maybe someone else here might
> know:
>
ntu_ubuntu_1604/
>
> Everything was alright until the `make template` step where it would
> fail on the following:
>
> makefile:294: recipe for target 'template-local-xenial+desktop' failed
>
Some of the recent commits have broken the Ubuntu builds.
I'll provide patches soo
On Mon, Jun 19, 2017 at 06:20:14PM -0700, Bob wrote:
> Is there any way to turn down screen brightness, either via terminal or
> system settings? The closest thing I can find is System Tools -- Power
> Manager --Display. That gives options regarding adjusting brightness after
> inactivity, but I
you only had two controllers. - now I see the
significance in the PS/2 comment.
Have you considered a Bluetooth keyboard?
As to hiding specific controllers from dom0, you can boot with
rd.qubes.hide_pci parameter.You could do this with one of the
controllers, I would have thought.
unman
--
You rece
On Mon, Jun 26, 2017 at 01:02:44AM -0700, pixel fairy wrote:
> what does qubes-os do to protect sys-usb from dma or other attacks?
>
The protection against DMA attacks comes from Qubes' use of Xen -
provided you have VT-d Xen will limit the memory available to the device
to that of the qube.
--
On Mon, Jun 26, 2017 at 11:22:23AM -0700, sanderhoog...@gmail.com wrote:
> Hi people,
>
> Can i make a VM in a VM? VM clustering?
> Well, can i run for example virtualbox and run another VM in there?
>
> Can anyone help me out with this?
>
> I'd like to hear of you.
>
> Greetz,
>
> Sander
>
g.)
You haven't shown anything relating to the other NIC - perhaps ifconfig
-a might show something? (When you click on the Network Manager icon can
you see the Ethernet network relating to your card?)
I assume that you have looked through the output of journalctl and dmesg
and don't
On Mon, Jun 26, 2017 at 04:25:23PM -0700, pixel fairy wrote:
> On Monday, June 26, 2017 at 1:02:44 AM UTC-7, pixel fairy wrote:
> > what does qubes-os do to protect sys-usb from dma or other attacks?
>
> im fully aware of how sys-usb protects the rest of system from malicious
> devices. what id l
On Mon, Jun 26, 2017 at 05:48:07PM -0700, pixel fairy wrote:
> On Monday, June 26, 2017 at 5:41:19 PM UTC-7, Unman wrote:
> >
> > Yes, sys-usb can be compromised, and it would be possible for malware to
> > be spread to other devices attached to sys-usb. I'm not cl
On Sun, Jun 25, 2017 at 03:09:34PM +0100, Unman wrote:
> On Sun, Jun 25, 2017 at 04:31:15AM -0700, Michael MENG wrote:
> >
> > I was trying to build the Ubuntu 16.04 Xenial+Desktop template
> > using qubes-builder with help from these instructions:
> >
> > https:
On Tue, Jun 27, 2017 at 08:29:24AM -0700, kennethjohns...@gmail.com wrote:
> On Friday, March 3, 2017 at 7:07:07 AM UTC-8, Unman wrote:
> > > As soon as the PRs are merged I'll post to the list, and you can try it
> > > then. (Or you could merge them yourself of
On Tue, Jun 27, 2017 at 02:42:02PM -0700, Steven Walker wrote:
> I am running qubes off of a flash drive. Could this be causing this?
>
> I just set it up and rebooted. I didn't attach any drive to it yet. And I was
> not able to boot back into the desktop afterwards.
>
When you create a sys-us
On Wed, Jun 28, 2017 at 01:44:03AM +0100, Unman wrote:
> On Tue, Jun 27, 2017 at 08:29:24AM -0700, kennethjohns...@gmail.com wrote:
> > On Friday, March 3, 2017 at 7:07:07 AM UTC-8, Unman wrote:
> > > > As soon as the PRs are merged I'll post to the list, and you can tr
On Tue, Jun 27, 2017 at 04:36:20AM -0700, Finsh wrote:
> Hello,
> i do have a few programs installed in my debain 8 /9 templates (i use deb9
> for Closed Source programs), which i want to pass to my appvms:
> the programs are for example for debian 8: "wipe" debian 9: "Spotify"
>
> How do i pass
On Tue, Jun 27, 2017 at 06:03:28PM -0700, Ken J wrote:
> Hi Unman,
>
> That might be the case more times than not (working on my search
> skills) :) I want to start by thanking you for your work. Amazing
>
> I was a bit confused throughout this process because had the ./set
y, left as an exercise for the reader.
This is, of course a hack, not supported, and undoubtedly breaks your
warranty.
If it all goes horribly wrong, shutdown all qubes, restore the original
files from your backup and restart the network.
unman
--
You received this message because you are subscrib
On Wed, Jun 28, 2017 at 10:20:49PM -0700, Michael MENG wrote:
> Thank you so much for help, Unman, can you please give me step, i dont know
> how to export PATH, because i am very new in linux and qubes.
>
The PR has been merged, so you just need to 'git pull' and 'make
On Fri, Jun 30, 2017 at 05:06:20AM -0700, kennethjohns...@gmail.com wrote:
> There looks to be a dependency issue when using make qubes-os-iso to build a
> trusty ISO. Verbose logging enabled output:
>
>
> The following packages have unmet dependencies:
> systemd-services : Depends: libsystemd-
On Sat, Jul 01, 2017 at 10:33:01AM -0700, motech man wrote:
> On Saturday, July 1, 2017 at 5:37:53 AM UTC-5, Chris Laprise wrote:
> > On 06/29/2017 01:13 PM, motech man wrote:
> > > I updated the fedora 23 template with changes to the hosts /etc/file,
> > > and I noticed that all other VMs that use
On Sat, Jul 01, 2017 at 10:05:36AM -1000, yreb-qusw wrote:
> On 06/28/2017 04:03 PM, cooloutac wrote:
> > so you would put hd0,X X= 1 2 or 3 etc... you said it was 200mb right so
> > just look for something around that in kb's. probably the smallest
> > partition it should say file type too n
On Sat, Jul 01, 2017 at 12:33:31PM -1000, yreb-qusw wrote:
> On 07/01/2017 12:10 PM, Unman wrote:
> > On Sat, Jul 01, 2017 at 10:05:36AM -1000, yreb-qusw wrote:
> > > On 06/28/2017 04:03 PM, cooloutac wrote:
> > > > so you would put hd0,X X= 1 2 or 3 etc... you sa
On Sat, Jul 01, 2017 at 12:49:59PM -1000, yreb-qusw wrote:
> On 07/01/2017 12:10 PM, Unman wrote:
> > Nothing will go wrong if you get the partition specification wrong -
> > Windows wont boot and you will see an error message.
> > From what you have said you have two optio
ing for the dvmTemplate, and so in your case start a disposableVM
attached to the firewall.
If you are starting a disposableVM from a qube (by e.g "open in
disposable VM") then THAT disposableVM will be connected to whatever the
entry for "NetVM for dispVM" says for that qube
On Wed, Jul 05, 2017 at 09:20:48PM +, js...@riseup.net wrote:
> loke...@gmail.com:
> > I have some applications I have installed manually in /usr/local on appvms.
> > I would like to create appmenu entries for these applications. However, the
> > Qubes appmenu management only deals with menus
On Wed, Jul 05, 2017 at 04:45:17AM -0700, andres...@gmail.com wrote:
> cubit 13/01/2017 20:31:05 UTC-2:
> > I'm trying to run the kali iso as a HVM but when running qvm-start in dom0
> > it just fails with the errors below. The template being used is a
> > standalone HVM. Can anyone have pointe
the GRUB menu, select Qubes and press "e" - these instructions are at
the bottom of the screen.
This will allow you to edit the boot options - delete the pesky
"rd.qubes.hide_all_usb" everywhere you see it.
F10 or Ctrl-x to boot.
That should get you in to Qubes, and you w
ill allow you
to track counters as traffic flows.
I think it's neater than your proposal.
You'll also want to keep the rules allowing established traffic back
though sys-net.
You can put these rules in to rc.local, and qubes-firewall-user-script,
as set out here:
www.qubes-os.org/doc/fire
On Thu, Jul 06, 2017 at 08:47:30AM +, imstressedbcsof...@vfemail.net wrote:
>
> Quoting Unman :
>
> > >
> >
> > Keep calm.
> > Reboot the box.
> > At the GRUB menu, select Qubes and press "e" - these instructions are at
> > the bott
On Thu, Jul 06, 2017 at 09:23:55AM -0300, Andres MRM wrote:
> [2017-07-05 19:30] Unman:
>
> > I see this error if there's a typo in the filename or permissions are
> > wrong.
> > Otherwise it works as expected - what versions of the Qubes packages are
> > yo
any times, even moved and renamed to a short path
> (/home/user/a.iso) and set permissions to 777.
>
>
> [2017-07-06 12:20] Andres MRM:
>
> > [2017-07-06 11:33] Unman:
> >
> > > You can see packkage information from QubesManager - About - Qubes OS -
>
On Thu, Jul 06, 2017 at 06:21:57PM +, imstressedbcsof...@vfemail.net wrote:
>
> >
> > So, pressing the Shift Key from Starting the box *should* bring up the
> > Grub menu.
> > Sometimes, I've tried keeping it pressed, or just repeatedly hammering
> > on the key from start.
> >
> > If you rea
On Thu, Jul 06, 2017 at 09:18:05PM +0100, Unman wrote:
> On Thu, Jul 06, 2017 at 04:51:59PM -0300, Andres MRM wrote:
> >
> > I just copied the debian ISO to dom0 and it booted (installing at this very
> > moment, let's see if works).
> > So it can't boot the
There was a thread "How to set file association in disposable VMs" 6
months back - that should have everything you need.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
On Thu, Jul 06, 2017 at 07:22:51PM -0400, Essax wrote:
> Hi Unman
> Thanks ! Thats is exactly what I wanted to accomplish. Although I could use a
> little clarification on a couple things.
>
> > You can examine the IP addresses allocated to the qubes using
> > &quo
On Fri, Jul 07, 2017 at 08:42:46PM -0700, Michael MENG wrote:
> On Friday, June 30, 2017 at 6:59:25 AM UTC+8, Unman wrote:
> > On Wed, Jun 28, 2017 at 10:20:49PM -0700, Michael MENG wrote:
> > > Thank you so much for help, Unman, can you please give me step, i dont
> > &
ttps://www.microsoft.com and https://getharvest.com.
>
This is a well known bug in Chrome - fixed I think in 55, and therefore in the
Debian version.
You really shouldnt be using Fedora 23 any more - update your template
manually or install a new template:
in dom0 sudo qubes-dom0-update qube
as
made clear that the Librem13 was not likely to be certified for Qubes 4.
This doesnt mean that the machine wont work with 4 - if you look at the
requirements page for 4, minimal are VT-x,VT-d SLAT.
A quick look at the HCL and the purism site confirms that the 13 has
CoreI5 6200U, and that CPU does have
On Mon, Jul 10, 2017 at 04:50:34PM +0200, Rune Philosof wrote:
> On Mon, Jul 10, 2017 at 4:20 PM, Unman wrote:
>
> > On Mon, Jul 10, 2017 at 10:03:09AM +0200, Rune Philosof wrote:
> > > I get an error in Fedora 23 Chromium, that I don't get in Firefox or in
On Tue, Jul 11, 2017 at 07:36:08PM +,
baldric-q7wo9g+UVklWk0Htik3J/w...@public.gmane.org wrote:
> Chris Laprise:
> > On 07/10/2017 10:56 AM, Unman wrote:
> >> This simply isn't true - it's clear from the Purism statement that Librem
> >> 13v2 h
r Fedora-25 for both 3.2 and 4 , and the packages
are also available at yum.qubes-os.org. so you can either upgrade
existing templates or install a shiny new one.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
On Thu, Jul 13, 2017 at 11:41:23AM +0200, Noor Christensen wrote:
> On Thu, Jul 13, 2017 at 10:05:34AM +0100, Unman wrote:
> > On Fri, Jun 30, 2017 at 01:19:48AM +0200, Illidan Pornrage wrote:
> > > The latest Fedora template, 24, in the repo will EOL soon on 2017-08-08.
> >
On Thu, Jul 13, 2017 at 12:54:47PM +0100, Unman wrote:
> On Thu, Jul 13, 2017 at 11:41:23AM +0200, Noor Christensen wrote:
> > On Thu, Jul 13, 2017 at 10:05:34AM +0100, Unman wrote:
> > > On Fri, Jun 30, 2017 at 01:19:48AM +0200, Illidan Pornrage wrote:
> > > > The
https://packages.ubuntu.com/xenial/ubuntu-desktop
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To po
On Sat, Jul 15, 2017 at 03:34:00PM -0700, Salmiakki wrote:
> On Saturday, 15 July 2017 23:16:35 UTC+2, PR wrote:
> > Yes, I have setup a local CentOS Repository Server which is holding all
> > packages for other VMs in this datacenter.
>
> Thinking about it that would work but does not actually
On Sun, Jul 16, 2017 at 02:53:14PM -0400, Gaiko Kyofusho wrote:
> I can't figure this one out. two things are indeed different, I am on a new
> ISP using a new modem and when I try to use my VpnVM I can't access the
> Internet (or local LAN for that matter) _however_ I am able to access the
> Inter
g nwtools.com, unless you're
using Tor or a VPN, in which case just log in to the router and check.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an emai
oot.
There is another mechanism - the use of bind-dirs to have a persistent
config file in a Template-based qube. Again, that's covered inn the
docs.
cheers
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe f
On Tue, Jul 18, 2017 at 09:08:20AM -0700, Max wrote:
> On Tuesday, 18 July 2017 23:45:13 UTC+8, Unman wrote:
> > On Tue, Jul 18, 2017 at 08:33:37AM -0700, Max wrote:
> > > Hi,
> > >
> > > I have installed the Bitcoin Core client and wish to allow inbound
he TemplateVM? Can you please copy/paste the command you
> entered and its output?
>
> Maybe it's a bug :-)
>
> -- noor
I would think the error message has been misinterpreted.
If you run qvm-sync-appmenus against a TemplateBasedVM, the error says:
"ERROR: To sync for Templa
On Thu, Jul 20, 2017 at 05:05:24AM -0700, jakis2...@gmail.com wrote:
> On Thursday, July 20, 2017 at 7:55:41 AM UTC-4, Noor Christensen wrote:
> > On Thu, Jul 20, 2017 at 03:09:07AM -0700, jakis2...@gmail.com wrote:
> > > Is there a way to increase the size when you clone a VM? I changed the
> > >
On Mon, Jul 24, 2017 at 08:21:24PM -1000, yreb-qusw wrote:
> Hello,
> I don't really see where , if anywhere, there is official Qubes type
> updates for the OS , other than the canary and QSB thing
> https://www.qubes-os.org/news/
>
> ie., the Docs to see seem a bit static, Maybe that is what th
On Tue, Jul 25, 2017 at 10:14:26AM -0700, darkstrange...@gmail.com wrote:
> Need Help! Can´t get Access to Systemfiles and folders.
> Can´t access to the Grub.d Folder and can´t open the guid.conf files. I´m a
> new Qubes OS User so sorry for this question. But i didn´t find any help yet.
> Can
On Wed, Jul 26, 2017 at 05:07:56AM -0400, 'P R' via qubes-users wrote:
> Hello,
>
> Am 26.07.2017 2:18 vorm. schrieb "Qru" :
>
>
> Then I noticed that starting a dvm takes really long (around 45 Seconds).
> Before it was about 3 seconds, which is somehow acceptable. But 40 seconds?
>
>
> I hav
On Tue, Jul 25, 2017 at 05:14:45PM +0300, private user82 wrote:
> I am concerned about the recent bug affecting Skylake and Kaby Lake gen Intel
> processors - https://lists.debian.org/debian-devel/2017/06/msg00308.html
>
> As BIOS updates aren't yet available from many mobo manufacturers, how can
medium, then you
can write desktop files simply enough, or get them from another user.
I should say that NOT having dom0 entries is in my opinion a good thing
- when I'm preparing Qubes for a new user I almost always delete them,
and radically simplify the menu.
unman
--
You received
e you have you should see content or see
a message from tinyproxy.
You should be able to see the traffic on your firewall, so you can
understand what is happening.
A combination of iptables -L -nv and tinyproxy logging should help you
understand what's going on on the firewall.
That way you wi
10 - specifically ,
wifi and network working.
You don't say which Templates you have tried - I'm sure the base one
installed wont cut it. Try stretch or Fed25, or maybe build a zesty
from source - and you'll need a recent kernel - there's an ongoing
thread about this on the list
customization, and
then run qvm-create-default-template again.
If you want to check the script operations, look at
/usr/lib/qubes/init/mount-dirs.sh and
/usr/lib/qubes/init/setup-dvm-home.sh
They are simple scripts, so it shouldnt take much debugging.
unman
--
You received this message beca
On Tue, Aug 01, 2017 at 12:59:23PM -1000, yreb-qusw wrote:
> On 08/01/2017 01:05 AM, Marek Marczykowski-Górecki wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > On Mon, Jul 31, 2017 at 10:01:50PM -1000, qubester wrote:
> > > Hello,
> > >
> > > when I create a dvm i'm now up
On Wed, Aug 02, 2017 at 07:01:15AM -0700, j...@stonequarter.com wrote:
> I've been doing more digging and came across an FAQ that suggested checking:
> systemctl enable NetworkManager-dispatcher.service
>
> In reviewing the fedora-23 and 25 templates, the service is enabled in both.
>
> This morn
o use it store the file on the filesystem where
it WILL be inherited in a qube. (Not /usr/local as that is linked to
/rw/usrlocal in a qube.)
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
'md5sum .iso', abnd check the output
against that contained in the DIGESTS file.
md5sum -c is used to READ hashes from a file, and check them against the
hash derived from the file.
SO:
md5sum file1 > file1.md5
md5sum -c file1.md5
will produce output:
file1: OK
The DIGESTS
e.
Use iptables -L -nv to watch the traffic on sys-firewall and sys-net,
and you should see outgoing SSH traffic on FORWARD chain, and return
traffic.
Most of the time you can debug the problem without using a sniffer, but
if needed you could run tcpdump on sys-net, to get a handle on what is
happe
On Wed, Aug 02, 2017 at 03:44:20PM -0700, Patrick Bouldin wrote:
> On Wednesday, August 2, 2017 at 6:33:44 PM UTC-4, Patrick Bouldin wrote:
> > Related to earlier email:
> >
> > I installed an app called splunk, and it seems to always install here:
> >
> > /opt/splunk/ (off the root)
> >
> > Ho
the new widget seems to me to be unreliable ,and doesn't keep
updated as qubes start.
Also,the very slow load times and lack of any user feedback on qubes
start are a major UX fail imo. Sometimes I see qubes fail to start for
no apparent reason, or loading with times in excess of 45 secs. Witho
On Wed, Aug 02, 2017 at 12:32:43PM -1000, qubester wrote:
> what I Do see with qvm-ls is this:
>
> whonix-ws-dvm halted whonix-ws template
>
>
> though, as I said I did change it to fedora 25 few days ago.
>
> so, will the DVMs just keep counting up indefinitely into the 100s ?
Yes it
On Thu, Aug 03, 2017 at 12:02:58PM -0700, frkla1...@gmail.com wrote:
> Hi unman,
>
> thx for the response!
>
> I will do each step slowly and poste each problem separate ;-)
>
> Let`s begin with the first step:
>
>
> 1. Download the "qubes-release-3-signi
it from dom0. (i think they used to.) That means that
you'll need to make this change in each qube AND i don't know how those
qubes will cope with the BIOS key swap, but it's worth a try.
unman
--
You received this message because you are subscribed to the Google Gro
On Sat, Aug 05, 2017 at 11:55:28PM -0700, Foppe de Haan wrote:
> In qubes r3.2, any VMs behind a proxy were on a different subnet (e.g.
> anything attached to sys-firewall was on 1.x, while anything behind the tor
> gateway was on 3.x). In r4, from what I'm seeing so far, everything is just
> in
;
you'll see they are only taking a few MB on disk.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups
ould work fine.
It's covered in the documentation as part of the template updating
instructions.
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
t you can add a new panel by right clicking on the existing panel,
selecting Panel -> Panel Preferences, and then hitting + to add a new
panel.
Alternatively you can add new items to the existing panel (in the way
that a netvm will create a network manager applet) - this may be what
you have in mind.
On Sat, Aug 26, 2017 at 08:39:23AM -0700, cyberian@national.shitposting.agency
wrote:
> Does Qubes offer a method of securing /boot? not just against USB evil maid
> attacks, but from tampering in general?
>
> for example, while a laptop is off, what would stop a malicious user from
> live boot
f=/dev/sda1 of=debian-vg bs=512 count=255 skip=1'
Then open the debian-vg file and look for the configuration data -
delete the extraneous material but make sure that you keep the right
format.(You'll need to use a decent editor that copes with binary data,
like vi)
Then see if you
On Mon, Aug 28, 2017 at 09:02:40PM +0100, Unman wrote:
> On Sat, Aug 26, 2017 at 01:36:41AM -0700, ion.437...@mail.md wrote:
> > I wanted to transfer all my data from encrypted HDD(Debian 9) to Qubes OS
> >
> > 1. I attach HDD and run these commands:
> >
> >
d here:
www.qubes-os.org/doc/dispvm-customization
unman
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
ot;qvm-create VM-name -t fedora-25 -l green -C StandaloneVM".
>
> It returned:
>
> "app: Error creating VM: Got empty response from qubesd"
>
> Am i typing the wrong command? Is this a bug?
>
It's the wrong command. A Standalone doesn't have a
501 - 600 of 1843 matches
Mail list logo