-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-28 17:25, Chris Laprise wrote:
> On 07/27/2016 04:27 PM, Andrew David Wong wrote:
>> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512
>>
>> On 2016-07-26 20:01, Chris Laprise wrote:
>>> On 07/26/2016 08:45 PM, el...@tutanota.com wrote:
>>>
On 16/07/28 20:25, Chris Laprise wrote:
On 07/27/2016 04:27 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-26 20:01, Chris Laprise wrote:
On 07/26/2016 08:45 PM, el...@tutanota.com wrote:
What is best way to verify our system supports these things?
I
On 07/27/2016 04:27 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-26 20:01, Chris Laprise wrote:
On 07/26/2016 08:45 PM, el...@tutanota.com wrote:
What is best way to verify our system supports these things?
I think you can also check out the processo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-26 20:01, Chris Laprise wrote:
> On 07/26/2016 08:45 PM, el...@tutanota.com wrote:
>>> What is best way to verify our system supports these things?
>> I think you can also check out the processor with Intel.. ark.intel.com
>> You can sear
On 07/27/2016 03:01 AM, Chris Laprise wrote:
On 07/26/2016 08:45 PM, el...@tutanota.com wrote:
What is best way to verify our system supports these things?
I think you can also check out the processor with Intel..
ark.intel.com
You can search through the different processors if you are looking
On 07/26/2016 11:34 PM, Marek Marczykowski-Górecki wrote:
> On Tue, Jul 26, 2016 at 04:25:41PM -0700, raahe...@gmail.com wrote:
> > "Of course, to be compatible with Qubes OS, the BIOS must properly
> expose all the VT-x, VT-d, and SLAT functionality that the underlying
> hardware offers (and which
On Wednesday, 27 July 2016 09:34:17 UTC+10, Marek Marczykowski-Górecki wrote:
> > "Of course, to be compatible with Qubes OS, the BIOS must properly expose
> > all the VT-x, VT-d, and SLAT functionality that the underlying hardware
> > offers (and which we require)."
>
> The easiest way is to u
On 07/26/2016 08:45 PM, el...@tutanota.com wrote:
What is best way to verify our system supports these things?
I think you can also check out the processor with Intel..
ark.intel.com
You can search through the different processors if you are looking to pick up a
new computer.
A guide I found
On Tuesday, July 26, 2016 at 11:34:17 PM UTC, Marek Marczykowski-Górecki wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Tue, Jul 26, 2016 at 04:25:41PM -0700, raahe...@gmail.com wrote:
> > "Of course, to be compatible with Qubes OS, the BIOS must properly expose
> > all the VT-
> What is best way to verify our system supports these things?
I think you can also check out the processor with Intel..
ark.intel.com
You can search through the different processors if you are looking to pick up a
new computer.
--
You received this message because you are subscribed to the G
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Jul 26, 2016 at 04:25:41PM -0700, raahe...@gmail.com wrote:
> "Of course, to be compatible with Qubes OS, the BIOS must properly expose all
> the VT-x, VT-d, and SLAT functionality that the underlying hardware offers
> (and which we require
"Of course, to be compatible with Qubes OS, the BIOS must properly expose all
the VT-x, VT-d, and SLAT functionality that the underlying hardware offers (and
which we require). Among other things, this implies proper DMAR ACPI table
construction."
What is best way to verify our system supports
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Jul 27, 2016 at 01:13:29AM +0200, Achim Patzner wrote:
> > Am 26.07.2016 um 19:42 schrieb Andrew David Wong :
> >
> > The updated requirements for Qubes R4.x-certified hardware are
> > explained here:
> >
> > https://www.qubes-os.org/news/2
> Am 26.07.2016 um 19:42 schrieb Andrew David Wong :
>
> The updated requirements for Qubes R4.x-certified hardware are
> explained here:
>
> https://www.qubes-os.org/news/2016/07/21/new-hw-certification-for-q4/
>
> Although the requirements for Qubes-certified hardware are likely to
> be more s
Dear Qubes users,
We have just released a new Qubes Security Bulletin (QSB #24) for a critical bug
in the Xen hypervisor:
https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
Please install the updates, immediately.
Thanks. Undated&rebooted successfully on Q3.2rc1
--
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Dear Qubes users,
We have just released a new Qubes Security Bulletin (QSB #24) for a critical bug
in the Xen hypervisor:
https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
Please install the updates, immediately.
Regards,
16 matches
Mail list logo