On 7/29/19 1:54 PM, Chris Laprise wrote:
On 7/28/19 10:23 PM, Jon deps wrote:
On 7/29/19 12:02 AM, Chris Laprise wrote:
On 7/28/19 4:55 PM, Jon deps wrote:
On 7/28/19 7:52 PM, Jon deps wrote:
On 7/28/19 1:36 AM, Chris Laprise wrote:
On 7/27/19 8:27 PM, Jon deps wrote:
pardon my
On 7/28/19 10:23 PM, Jon deps wrote:
On 7/29/19 12:02 AM, Chris Laprise wrote:
On 7/28/19 4:55 PM, Jon deps wrote:
On 7/28/19 7:52 PM, Jon deps wrote:
On 7/28/19 1:36 AM, Chris Laprise wrote:
On 7/27/19 8:27 PM, Jon deps wrote:
pardon my non-sysadmin query :
any chance of some real
On 7/29/19 12:02 AM, Chris Laprise wrote:
On 7/28/19 4:55 PM, Jon deps wrote:
On 7/28/19 7:52 PM, Jon deps wrote:
On 7/28/19 1:36 AM, Chris Laprise wrote:
On 7/27/19 8:27 PM, Jon deps wrote:
pardon my non-sysadmin query :
any chance of some real world examples? quite a few new terms
On 7/28/19 4:55 PM, Jon deps wrote:
On 7/28/19 7:52 PM, Jon deps wrote:
On 7/28/19 1:36 AM, Chris Laprise wrote:
On 7/27/19 8:27 PM, Jon deps wrote:
pardon my non-sysadmin query :
any chance of some real world examples? quite a few new terms
there .
so install into Debian-9
but
On 7/28/19 7:52 PM, Jon deps wrote:
On 7/28/19 1:36 AM, Chris Laprise wrote:
On 7/27/19 8:27 PM, Jon deps wrote:
pardon my non-sysadmin query :
any chance of some real world examples? quite a few new terms there .
so install into Debian-9
but step 2 am already lost
eg how and where
On 7/28/19 1:36 AM, Chris Laprise wrote:
On 7/27/19 8:27 PM, Jon deps wrote:
pardon my non-sysadmin query :
any chance of some real world examples? quite a few new terms there .
so install into Debian-9
but step 2 am already lost
eg how and where amd I "activating" vm-boot-protect
On 7/27/19 8:27 PM, Jon deps wrote:
pardon my non-sysadmin query :
any chance of some real world examples? quite a few new terms there .
so install into Debian-9
but step 2 am already lost
eg how and where amd I "activating" vm-boot-protect in the templatevm ?
or during install
On 7/18/19 3:53 PM, Chris Laprise wrote:
Description:
Qubes-VM-hardening
Leverage Qubes template non-persistence to fend off malware at VM
startup: Lock-down, quarantine and check contents of /rw private storage
that affect the execution environment.
* Acts at VM startup
Thank you, this is a great tool. Everything is working perfectly as far as
I can tell. It also works with fish shell by adding .config/fish to $chdirs.
I was thinking about what kinds of files, not present in the default
installation but possibly added to a user's system, might need to be added