[qubes-users] Blue/Purple Lock Flashing On-screen

2016-09-02 Thread anthonythomassweeney
For some reason a blue-purplish lock is flashing on my screen well browsing the computer. It only seems to happen when sys-Whonix is running, although, I could be wrong. Anyone know how to fix this? -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] Re: epoxy on ram to prevent cold boot attacks?

2016-09-02 Thread johnyjukya
> On Wednesday, August 31, 2016 at 10:40:23 AM UTC-7, grzegorz@gmail.com > wrote: > >> An actual protection would be some kind of a chemical that would destroy >> the ram chips if they ever reach certain (lower than room) temperature. > > the epoxy is likely to damage them in most means of

Re: [qubes-users] Anonymizing MAC adress through dvm ?

2016-09-02 Thread nishiwaka46
Thank you very much for your support :) I understand better how Qubes handles MAC addresses now thanks to you, I was curious about that ^^ -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails

Re: [qubes-users] [3.2rc2] Pulseaudio 100% CPU load at dom0

2016-09-02 Thread entr0py
David Hobach: > On 08/31/2016 08:14 PM, entr0py wrote: >> Eva Star: >>> 3.2rc2 - clean install (on 3.2rc1 with updates I do not have this >>> problem) >>> >>> At dom0 pulseaudio proccess always eat 100% of CPU. If I kill it, >>> then it starts again! Please, help. Hot to fix this issue or how >>>

Re: [qubes-users] Firewall rules

2016-09-02 Thread katerimmel
> On 07/14/2016 04:51 PM, katerim...@sigaint.org wrote: >>> On 07/14/2016 10:39 AM, katerim...@sigaint.org wrote: Good day I'm using a VPN in sys-net and would setup firewall rules to stop internet connection if VPN crash. In sys-net isn't possible to insert ip addresses,

[qubes-users] Re: epoxy on ram to prevent cold boot attacks?

2016-09-02 Thread Anon
Marek Marczykowski-Górecki: > If you (or someone else) plug a malicious USB device that will exploit > some bug in one of million USB device drivers, it can do whatever it > want with the other USB devices on the same bus. And if that USB > controller live in dom0, it's game over even without

[qubes-users] Broken applications menu/shortcuts with xfce

2016-09-02 Thread kij7u5
I installed 3.2rc3 from scratch today after having been on 3.1. I restored my appvms from 3.1 but not my fedora-23 template. After installing some packages into my (new) fedora-23 template none of the app shortcuts for any VM based on that template work. They launch the VM but no applications

[qubes-users] Announcement: Qubes OS 3.0 reaches EOL on 2016-09-09

2016-09-02 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 As a reminder, Qubes OS 3.0 reaches EOL on 2016-09-09. If you're a current 3.0 user, we strongly urge you to upgrade to a newer release before 2016-09-09. You can read the full announcement here:

Re: [qubes-users] Broken applications menu/shortcuts with xfce

2016-09-02 Thread kij7u5
On 09/03/2016 05:43 AM, Marek Marczykowski-Górecki wrote: > On Sat, Sep 03, 2016 at 05:11:38AM +1000, kij...@larky.me wrote: >> I installed 3.2rc3 from scratch today after having been on 3.1. I >> restored my appvms from 3.1 but not my fedora-23 template. > >> After installing some packages into

[qubes-users] Suggestions for running media server?

2016-09-02 Thread Connor Page
No. 4 makes sense. sys-usb shouldn't know the encryption keys. encrypted block device can be attached to a server vm where it would be appropriately decrypted and mounted, possibly from dom0 via qvm-run (you can start a vm, attach storage, decrypt and mount it by a short script using qvm-*

[qubes-users] Display Calibration and Audio Equalizer for Dom0 ?

2016-09-02 Thread Connor Page
I have calibrated my yellow screen using argyllcms. I don't attach usb devices to dom0 so installed it in sys-usb as well. used https://encrypted.pcode.nl/blog/2013/11/24/display-color-profiling-on-linux/ as a rough guide. to get the calibration done you just need to run dispcal and then

[qubes-users] Suggestions for running media server?

2016-09-02 Thread Anon
I'm looking for some suggestions for running a "maximally-secure" media server that will access an encrypted USB hard drive for it's storage. It can and probably should be read-only to the media-server software. A few possibilities I can think of listed from assumed lowest security to highest

Re: [qubes-users] Qubes 3.1 and 3.2(rc2) video driver question

2016-09-02 Thread Dima Puntus
On Mon, Aug 8, 2016 at 10:45 AM, Andrew David Wong wrote: > > > On 2016-08-08 10:31, Dima Puntus wrote: > > On 2016-08-07 09:29, Dima Puntus wrote: > >> Hi, > >> > >> I'd like to know if there's a way to fix the terrible screen tearing > >> that I'm getting both on internal

Re: [qubes-users] QubesOS under VMware - I know I know ...

2016-09-02 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 2016-09-01 23:51, p.@.com wrote: > On Thursday, September 1, 2016 at 7:20:45 PM UTC+1, Andrew David Wong > wrote: >> Note that Qubes can be installed to a portable USB drive. It will run >> more slowly from such a device, but it can make testing

[qubes-users] Re: QubesOS under VMware - I know I know ...

2016-09-02 Thread p.@.com
On Friday, September 2, 2016 at 2:55:42 AM UTC+1, Drew White wrote: > On ESXi I installed directly on ESXi 5.5, worked first time. Which QubesOS version did you install on ESXi ? Best regards Przemek -- You received this message because you are subscribed to the Google Groups "qubes-users"

Re: [qubes-users] QubesOS under VMware - I know I know ...

2016-09-02 Thread p.@.com
On Thursday, September 1, 2016 at 7:20:45 PM UTC+1, Andrew David Wong wrote: > Note that Qubes can be installed to a portable USB drive. It will run > more slowly from such a device, but it can make testing more > accessible, since it doesn't disturb your existing OS. > > At least one user has