Hello
I have deleted a VM accidentally, is possible to recover it?
Thank you
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.
Is there any way to boot an HVM from an external USB drive?
I would have thought that simply setting the "additional drive" on a new
HVM to a USB device in another HVM (or dom0) would have allowed it to boot
from that drive.
I have a USB drive that contains a Linux system (partition table, /boot,
is there a way to turn on tilt or pressure sensitivity for pens?
using qubes 3.2rc2 with xfce (test box, not production)
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an em
> On 2016-08-30 01:16, johnyju...@sigaint.org wrote:
>> Say someone compromises the dom0 encrypted drive password, and
>> then goes shuffling through the private.img file of the AppVM's to
>> get at Firefox's passwords...? The VM itself wouldn't have to be
>> running corrupt code for that, and kee
qubes-3.2rc2 tried setting a screenshot taken from dom0 as the background.
but, when trying to set that background, its grayed out. all the other
background images are grayed out too.
is this intentional?
--
You received this message because you are subscribed to the Google Groups
"qubes-use
3.2rc2 - clean install (on 3.2rc1 with updates I do not have this problem)
At dom0 pulseaudio proccess always eat 100% of CPU.
If I kill it, then it starts again!
Please, help. Hot to fix this issue or how to disable pulseaudio start after
kill.
--
You received this message because you are sub
Hello,
Somewhere along the update from 3.1 to 3.2rc1 I started to have all my VMs take
UTC as their timezone.
dom0 has the correct "America/Argentina/Cordoba" timezone, but all VMs get
incorrectly set to "Argentina/Cordoba", which does not exists thus leaving them
at UTC.
I know may have manu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-31 04:48, Pablo Di Noto wrote:
> Hello,
>
> Somewhere along the update from 3.1 to 3.2rc1 I started to have all my VMs
> take UTC as their timezone.
>
> dom0 has the correct "America/Argentina/Cordoba" timezone, but all VMs get
> incor
El miércoles, 31 de agosto de 2016, 12:26:42 (UTC), Andrew David Wong escribió:
> On 2016-08-31 04:48, Pablo Di Noto wrote:
> > Hello,
> >
> > Somewhere along the update from 3.1 to 3.2rc1 I started to have all my VMs
> > take UTC as their timezone.
> >
> > dom0 has the correct "America/Argenti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-30 22:54, Raphael Susewind wrote:
> Is there an easy way to use the Whonix Tor instance from other VMs, namely
> those assigned a different firewall VM?
>
> I do have a couple of Tor Hidden Services which I'd like to access via SSH
> from
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-31 01:52, katerim...@sigaint.org wrote:
> Hello I have deleted a VM accidentally, is possible to recover it? Thank
> you
>
Without a backup, there's no straightforward way to recover it. (But the data
forensics experts on this list might
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-31 05:42, Pablo Di Noto wrote:
> El miércoles, 31 de agosto de 2016, 12:26:42 (UTC), Andrew David Wong
> escribió:
>
>> On 2016-08-31 04:48, Pablo Di Noto wrote:
>>> Hello,
>>>
>>> Somewhere along the update from 3.1 to 3.2rc1 I started
Hello,
I urgently need to do a fresh install of a system. It would be a shame to
install RC2, then see RC3 released a few hours later...
Just asking if R3.2rc3 is really expected today 2016-08-31, as noted on
the roadmap. If not, no problem, will just do RC2. (Hopefully in-place
upgrade will work
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-31 06:16, throw_a...@sigaint.org wrote:
> Hello,
>
> I urgently need to do a fresh install of a system. It would be a shame to
> install RC2, then see RC3 released a few hours later...
>
> Just asking if R3.2rc3 is really expected today
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Aug 19, 2016 at 11:58:18AM -0700, kev27 wrote:
> > Secure Encrypted Virtualization (SEV) integrates main memory encryption
> > capabilities with the existing AMD-V virtualization architecture to support
> > encrypted virtual machines. Encrypt
El miércoles, 31 de agosto de 2016, 13:02:06 (UTC), Andrew David Wong escribió:
>
> On 2016-08-31 05:42, Pablo Di Noto wrote:
> > El miércoles, 31 de agosto de 2016, 12:26:42 (UTC), Andrew David Wong
> > escribió:
> >
> >> On 2016-08-31 04:48, Pablo Di Noto wrote:
> >>> Hello,
> >>>
> >>> Somew
Hi Doug
That might be the clue.
I waited until it happened again, did Ctrl-F2 and then restarted then
xfsettingsd process with a kill -HUP.
Ctrl-F1 then got me back to the login for the X without having to reboot or
restart VMs.
I've only tried this once ... if it's repeatable over the next f
Hi,
Which of these tools provides a better privacy and security for a threat model
that intends to protect against massive surveillance (the intention is not to
protect against state actors as this is barely impossible) and compromised
networks?
Does the Whonix browser that's shipped which Qub
I use KDE (XFCE is installed but never used) and I don't have the option
of using the keyboard. The num/caps/scroll lock lights won't change and
the keyboard doesn't seem to respond.
As I stated, the processes seem to be running, if there's a music
player, I can still hear it.
Will check SETUP se
poured some epoxy over where the ram connects to the motherboard, and where the
clips are that you would use to take it out. the chips themselves dont have
any, just the surrounding pcb.
this was couple days ago. so far its survived 2 reinstalls of test qubes
releases, and is doing one of rc3.
On Wednesday, August 31, 2016 at 8:54:05 AM UTC-7,
499eph+30e...@guerrillamail.com wrote:
> Hi,
>
> Which of these tools provides a better privacy and security for a threat
> model that intends to protect against massive surveillance (the intention is
> not to protect against state actors as th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Aug 30, 2016 at 11:00:30PM +0200, Marek Marczykowski-Górecki wrote:
> On Mon, Aug 29, 2016 at 11:07:33PM -0700, nekroze.law...@gmail.com wrote:
> > Also, I am not sure when, but the pkg.uptodate state does nothing in
> > templates now. It us
W dniu środa, 31 sierpnia 2016 18:25:33 UTC+2 użytkownik pixel fairy napisał:
> poured some epoxy over where the ram connects to the motherboard, and where
> the clips are that you would use to take it out. the chips themselves dont
> have any, just the surrounding pcb.
>
> this was couple days
Adi Carlisle:
> OK, update, I reinstalled my Qubes 3.1 but this time I used sys-usb (&
> sys-net option) Sound worked on all VM's.
> **Didn't get a chance to test it on Win7** because I tested the mute function
> now it doesn't work again.
>
https://www.qubes-os.org/doc/windows-appvms/:
> Ther
On Wednesday, August 31, 2016 at 10:40:23 AM UTC-7, grzegorz@gmail.com
wrote:
> An actual protection would be some kind of a chemical that would destroy the
> ram chips if they ever reach certain (lower than room) temperature.
the epoxy is likely to damage them in most means of removal.
i
Eva Star:
> 3.2rc2 - clean install (on 3.2rc1 with updates I do not have this problem)
>
> At dom0 pulseaudio proccess always eat 100% of CPU.
> If I kill it, then it starts again!
> Please, help. Hot to fix this issue or how to disable pulseaudio start after
> kill.
>
Had similar symptoms on
On 2016-08-31 13:25, "Andrew David Wong" wrote:
> Yes, we expect to release R3.2-rc3 today:
>
> https://twitter.com/rootkovska/status/770930679882416128
Thank you for the information! Now, I see it on the FTP site. :-)
--
You received this message because you are subscribed to the Google Gro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Details here:
https://www.qubes-os.org/news/2016/08/31/qubes-OS-3-2-rc3-has-been-released/
As usual, you can download new image from:
https://www.qubes-os.org/downloads/
Users of R3.2 rc1 or rc2 can just install updates, no need for full reinstall.
How to change date/timezone reported by `date` at dom0 terminal and used
by other AppVMs?
Previously, I do this with KDE tools, but now with Xfce I can not find
how to change it correctly.
Now, it's reported as EDT (not UTC) at dom0... Why? How to change it
for dom0? How to change timezone fo
Good news. Thanks :)
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@go
On 08/31/2016 04:13 PM, Marek Marczykowski-Górecki wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Details here:
https://www.qubes-os.org/news/2016/08/31/qubes-OS-3-2-rc3-has-been-released/
As usual, you can download new image from:
https://www.qubes-os.org/downloads/
Users of R3.2 rc1
On 08/31/2016 04:29 PM, Eva Star wrote:
How to change date/timezone reported by `date` at dom0 terminal and used
by other AppVMs?
Previously, I do this with KDE tools, but now with Xfce I can not find
how to change it correctly.
Now, it's reported as EDT (not UTC) at dom0... Why? How to change
Raphael Susewind:
> Is there an easy way to use the Whonix Tor instance from other VMs,
> namely those assigned a different firewall VM?
>
> I do have a couple of Tor Hidden Services which I'd like to access via
> SSH from my work VM (using connect-proxy). I could of course run my own
> Tor instan
Adi Carlisle:
> On Saturday, 27 August 2016 18:50:20 UTC+1, Cube wrote:
>> This would be more in the style of Tails - no persistent state.
>
> TAILS hvm?
>
Would require disposable HVM, I don't think Qubes has implemented that
at this time.
Also DispVMs do not feature anti-forensics yet:
http
While qvm-block is a wonderfully handy tool for adding individual
partitions to a VM, the Qubes VM Manager can only add entire devices from
its GUI.
I think that it's a pretty strong argument Qubes' spirit of "protecting
the user from him/herself" to make sure this feature (maybe in a nested
menu
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Details here:
> https://www.qubes-os.org/news/2016/08/31/qubes-OS-3-2-rc3-has-been-released/
>
> As usual, you can download new image from:
> https://www.qubes-os.org/downloads/
>
> Users of R3.2 rc1 or rc2 can just install updates, no need fo
Hello, I searched the archives and saw this has come up before regarding
firewall rules.
https://github.com/QubesOS/qubes-issues/issues/1570
I had half an email composed when I tried something and it unexpectedly
worked.
So for posterity I wanted to add is that it is possible that *no* VM will
st
Now the audio broke itself.
Anyone got a solution that doesn't involved avoiding Qubes?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@go
> Lately, I've been leaving it on, but with an alternative OS
> (another Linux) whose sole purpose is to know if somebody's been mucking
> around. My actual useful drive, data, passwords, go with me.
My keyboard also goes with me, which is the main inconvenience currently.
I think most common ke
On Thursday, September 1, 2016 at 2:33:29 AM UTC+10, Marek Marczykowski-Górecki
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> On Tue, Aug 30, 2016 at 11:00:30PM +0200, Marek Marczykowski-Górecki wrote:
> > On Mon, Aug 29, 2016 at 11:07:33PM -0700, nekroze.law...@gmail.com wrote:
On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-08-15 14:43, IX4 Svs wrote:
> > On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong
> > wrote:
> >
> >> -BEGIN PGP SIGNED MESSAGE- Hash: SHA512
> >>
> >> On 2016-08-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Aug 31, 2016 at 09:18:37PM -, johnyju...@sigaint.org wrote:
> > -BEGIN PGP SIGNED MESSAGE-
> > Hash: SHA256
> >
> > Details here:
> > https://www.qubes-os.org/news/2016/08/31/qubes-OS-3-2-rc3-has-been-released/
> >
> > As usual, y
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-31 13:39, Chris Laprise wrote:
> On 08/31/2016 04:13 PM, Marek Marczykowski-Górecki wrote:
>>
>> Details here: https://www.qubes-os.org/news/2016/08/31/
>> qubes-OS-3-2-rc3-has-been-released/
>>
>> As usual, you can download new image f
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-08-31 15:50, IX4 Svs wrote:
> On Wed, Aug 24, 2016 at 11:10 PM, Andrew David Wong
> wrote:
>
>>
>> On 2016-08-15 14:43, IX4 Svs wrote:
>>> On Mon, Aug 15, 2016 at 10:19 AM, Andrew David Wong
>>> wrote:
>>>
On 2016-08-14 15:2
I built my "Workstation" myself a couple weeks ago, here are the first results:
Tested this with Qubes 3.1, 3.2-RC2 and just now with 3.2-RC3.
== Hardware ==
Mainboard: ASRock Z170 Extreme4
BIOS Version: P3.40
CPU: Intel Core i7 6700K
Graphics: Intel HD Graphics 530
TPM Chip: ASRock TPM-S Module (
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Aug 31, 2016 at 03:47:31PM -0700, nekroze.law...@gmail.com wrote:
> Does anyone have any thoughts on a way to template in the IP address of an
> appVM so it can be used to define a file.managed state with the IP in the
> filename such as ti
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Aug 31, 2016 at 10:05:59PM -, johnyju...@sigaint.org wrote:
> I'm curious to some mentions-in-passing about Andrew's hate for USB
> keyboards. USB-anything isn't good for security, but what in particular
> so much worse about USB? Both
On Thursday, 1 September 2016 07:44:59 UTC+10, Daniel Wilcox wrote:
> Hello, I searched the archives and saw this has come up before regarding
> firewall rules.
> https://github.com/QubesOS/qubes-issues/issues/1570
>
> I had half an email composed when I tried something and it unexpectedly
> wo
On Thursday, 1 September 2016 01:54:38 UTC+10, Desobediente wrote:
> I use KDE (XFCE is installed but never used) and I don't have the option
> of using the keyboard. The num/caps/scroll lock lights won't change and
> the keyboard doesn't seem to respond.
>
> As I stated, the processes seem to be
I made the mistake to run this command in my debian-8 TemplateVM :
sudo apt-get autoremove gnome-keyring
Then I wasn't able to get a terminal for the debian-8 TemplateVM and all
appVM's in relation to this TemplateVM.
So, I used this tutorial to reinstall a new debian-8 TemplateVM :
https://ww
> On Wed, Aug 31, 2016 at 10:05:59PM -, johnyju...@sigaint.org wrote:
>> I'm curious to some mentions-in-passing about Andrew's hate for USB
>> keyboards. USB-anything isn't good for security, but what in particular
>> so much worse about USB? Both USB and PS/2 can keylog, or play
>> predefin
51 matches
Mail list logo