dose qubes os work with HP ENVY x360 15 i7-1065G7
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To view this discus
. Hardened
> security is a great thing, but actually my prime reason for using Qubes is
> its superior organisation and ease to use.
where exactly did you put this smt=on option in?
thanks
ron
>
> Although I expect the heat issue to be a bug of some kind.
>
--
You received th
describing.
>
>
thanks for this hint. I'll search for this approach. I just want to find a
solution that avoids typing in the long passwords.
ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this grou
took me a little while to figure out how to restore them).
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com
On Friday, November 17, 2017 at 6:22:03 AM UTC-7, Styles Grant wrote:
> I did see some evidence of one guy who got a ryzen to work, and another who
> got an a 10 series to work. I'd nab an a 10, but this old fx 8350 is on sale.
>
> What do you think?
I'm running on an FX-6300, and it's working g
eparate, encrypted, mirrored drive. A nice little feature too is that since
I used the same passphrase for md0 as for the SSD, it only prompts once for
them during boot.
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
Hi,
I'm new to Qubes/Linux and would like to know how to change/add/remove
passphrases applied to the USB I installed Qubes 3.2 on. I looked around
at Qubes FAQs and elsewhere, which was helpful, but not giving a
step-by-step of what to do.
[user@untrusted ~]$ lsblk
NAME MAJ:MIN RM SI
r me. But then, I'm not using a Yubikey.
getarg rd.luks.uuid outputs "luks-", where lsblk shows that partition
name to be a "crypt [SWAP]" on sda3 (sda1 being my /boot/efi/, and sda2
containing "crypt /".
Not sure if/how any of this helps, but there it is.
Ron
--
You
t; So even if the Storage AppVM gets compromissed, the data should be encrypted
> (and therof protected).
...
> Interested to get your feedback.
>
>
> [799]
Have you considered using SSHFS rather than NFS? I'm no security expert, but it
would seem to me to be more secure than NFS.
Ron
Just a quick note that I've switch to a new email address dedicated to this
group, and unsubscribed my old ronhd at shaw address. It's still active,
but I won't see posts to the group ML on it.
Thanks,
Ron
--
You received this message because you are subscribed to the Google
On 10/12/2017 12:37 AM, Patrik Hagara wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 10/12/2017 01:42 AM, Ron Hunter-Duvar wrote:
Does anyone know how to turn off QubesOs' quiet boot (splash
screen instead of kernel messages)?
...
This is with EFI booting. No grub (don't e
t;“/home/user/Downloads is the directory in sys-net and the second is the
>directory in dom0.)
Where you show the command you typed, you're missing the output redirection
(the ">"). So instead of the shell doing the redirection to the file, it passes
it as an argument to the
is is with EFI booting. No grub (don't even have a grub.cfg file in
/boot).
Thanks,
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-user
On 10/08/2017 07:27 AM, Ron Hunter-Duvar wrote:
On October 7, 2017 10:43:55 PM MDT, Reg Tiangha
wrote:
On 2017-10-07 1:19 PM, Ron Hunter-Duvar wrote:
...
It's weird, but it seems like every distro *but* Fedora has released an
updated version or version with a backported fix. Even Re
rt swapping, even if there was lots of memory
available on the machine?
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroup
On October 7, 2017 10:43:55 PM MDT, Reg Tiangha
wrote:
>On 2017-10-07 1:19 PM, Ron Hunter-Duvar wrote:
>
>> Well, I did all this, and confirmed that the sys-* servicevms are all
>> using Fedora 25, but it still has dnsmasq version 2.76. According to
>> US-CERT, 2
s secure because no one
would guess some letters were switched with numbers.
https://thehackernews.com/2015/09/lenovo-laptop-virus.html
Note: (1) confirmed, (2) 3 times, (3) one of them was BIOS-embedded.
https://thehackernews.com/2015/08/lenovo-rootkit-malware.html
Ron
--
You received
mment on Qubes-specific issues, or your particular
requirements.
3) are there a Qubes user out there who are already using a laptop with touch
screen and enough ram, running Qubes? What laptop model are you using and would
you recommend it?
Ron
--
You received this message because you are s
On 10/06/2017 09:04 PM, Ron Hunter-Duvar wrote:
On October 6, 2017 5:05:49 PM MDT, Unman wrote:
On Thu, Oct 05, 2017 at 12:41:32PM -0600, Ron Hunter-Duvar wrote:
...
The install disk still contains fed23 templates and you're expected to
update as soon as you have installed.
To install
looked closely at the vm that most of the
memory used is for caching. That's a good thing. No point having memory
sit unused and forcing to to keep downloading the same files. The moment
the cache is needed for something else, it'll be reallocated.
Ron
--
You received this mess
On October 6, 2017 5:05:49 PM MDT, Unman wrote:
>On Thu, Oct 05, 2017 at 12:41:32PM -0600, Ron Hunter-Duvar wrote:
>> On 10/05/2017 01:52 AM, Ilpo Järvinen wrote:
>> > On Wed, 4 Oct 2017, Ron Hunter-Duvar wrote:
...
>> > FC23 has been EOL'ed for long time, you
On 10/05/2017 01:52 AM, Ilpo Järvinen wrote:
On Wed, 4 Oct 2017, Ron Hunter-Duvar wrote:
Saw the news earlier today about the major dnsmasq vulnerabilities (remote
code execution), and already received the update for the debian-8 template,
but not for the fedora-23 template or dom0.
Anyone
Hi,
Saw the news earlier today about the major dnsmasq vulnerabilities
(remote code execution), and already received the update for the
debian-8 template, but not for the fedora-23 template or dom0.
Anyone know of an ETA for this?
Thanks,
Ron
--
You received this message because you are
ise.
You should be able to find it (as root) by running:
# find /root /home -name '*.iso'
If it's not found in either of them, then you either put it somewhere
else (like /tmp or /var/lib/qubes), or the copy didn't work.
As for what to do with it once it's copied, I can
swap partition, despite the installer's whining). Second time
around I gave in and created one.
lsblk shows sda2 with a luks-encrypted / within it, and sda3 with a
luks-encrypted swap. If it were LVM-on-LUKS, it would be a single
luks-encrypted partition two logical volumes within it.
Ron
rom starting, but qrexec-daemon seems to
be rather brittle. No idea how you would fix it. Might require either digging
into the code or help from one of the developers to track down and resolve.
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users
es, did you? If so, that would probably be your problem.
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
l
No guarantees, and be careful what you remove/edit, but it's worth a shot.
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsu
, I've been more careful in setting up
sys-usb, and it's working fine so far.
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+u
On 09/26/2017 09:36 AM, Ron Hunter-Duvar wrote:
On September 26, 2017 9:20:57 AM MDT, 'One7two99' via qubes-users
wrote:
Hello Ron,
Original Message
Subject: Re: [qubes-users] How to recover VMs copied before
reinstall?
Local Time: 26 September 2017 4:58 P
Thanks, 799, I'll take a look at them when I get a chance.
Ron
On 09/27/2017 03:52 AM, 'One7two99' via qubes-users wrote:
Hello Ron,
Me:
>> I've written a handful scripts which will take the default
>> qubes-templates and apply all updates / packe installation
On September 26, 2017 9:20:57 AM MDT, 'One7two99' via qubes-users
wrote:
>Hello Ron,
>
>> Original Message
>> Subject: Re: [qubes-users] How to recover VMs copied before
>reinstall?
>> Local Time: 26 September 2017 4:58 PM
>> From: ro
On September 26, 2017 4:20:34 AM MDT, Chris Laprise wrote:
>On 09/25/2017 07:12 PM, Ron Hunter-Duvar wrote:
>> Hi,
>>
>> My first Qubes install ended up unbootable, and I didn't have a
>recent enough backup of my VMs. So I booted from a Ubuntu live cd,
>mo
pvms/, but they don't show
up in the VM Manager.
Can anyone tell me how to get these appvms useable again?
Thanks,
Ron
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails f
34 matches
Mail list logo