Re: [qubes-users] How to get Yeti USB mic working with QUBES..?
So I'm having a really hard time assigning USB devices. Here is what happens with the Yeti mic. I am in QUBES 3.2 When I plug in the mic, it actually immediately shows up in the audio mixer, under "capture devices".. I also see it in Pulse audio manager. The question is then just how to get the device to be useable inside of a VM. It seems like it has more to do with passing input audio to the qube, rather than even the USB device... but I could be wrong. Does anyone have any idea...? This is important, because I can get everything else working in QUBES.. but if I have no audio... then I can't do Skype etc. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/15fdaf59-5e9f-4a52-9ffc-aad1a3e1675c%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] How to get Yeti USB mic working with QUBES..?
I have a Blue Mic Yeti and am trying to get it working with QUBES. I tried attaching audio to a VM, but it didn't work. I need a simple step-by-step guide for how to use a USB mic with QUBES. The mic is plug-and-play, and requires no installation, both in Linux and in Windows. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/069ccd67-551e-4340-a392-737114124dd9%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Template installation not being reflected on AppVMs
I am using QUBES 3.0 Fedora-21 When I install certain programs in the template VM for fedora, they do not show up in the AppVMs, even after restarting each of the AppVMs. I installed google-chrome-stable, and yet, it's not reflected in the AppVMs. I have to re-install Chrome inside the actual AppVM every time I start it up. What's up with that...? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/e327d4cc-1915-4558-b79b-ce53f1c94a69%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
Re: [qubes-users] Question about Xen sandbox escape from Oct 2015
OK Version: 4.4.3 Release: 11.fc20 So I am OK. Does QUBES 3.0 come with the patched version though... Have the devs updated the ISO so that it comes patched..? Or am I patched because I did a dom0 update..? Thanks -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/2803962c-fa4d-4a17-aa53-6b12bacbe173%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] Question about Xen sandbox escape from Oct 2015
I have a question about the Xen sandbox escape from Oct 2015 https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-022-2015.txt I am running Qubes 3.0. Qubes 3.0 was released Oct 1 2015. The Xen glitch was Oct 29 2015. Does this mean that Qubes 3.0 does not come shipped with the patch, and that I have to manually patch this myself? Or is Qubes 3.0. safe? I downloaded and installed Qubes 3.0 just a few days ago.. using it for the very first time. -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/d3ab493c-dddf-4d4e-92d4-ee8cc41ed96d%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.
[qubes-users] VM Manager ERROR: "libvirtError: internal error: client socket is closed"
I installed the debian and whonix templates But then, whenever I open VM Manager, I get the following error: "Whoops. A critical error has occured. This is most likely a bug in Qubes Manager. libvirtError: internal error: client socket is closed at line 1268 of the file libvirt.py" Not only this.. but when I click OK, i can browse the VMs.. but I can't attach USB devices to them So... what is the solution here...? Do I Just need to restart the Qubes system.. or has something else gone wrong entirely...? -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/9bd6efba-eb2c-46a9-8192-bbdd7e8e40f2%40googlegroups.com. For more options, visit https://groups.google.com/d/optout.