Both the xscreensaver and the i3lock accept any password.
I have not manually changed the files in /etc/pam.d/ but note some have
the "nullok" option.
I've run tail -f against /var/log/* and /var/log/*/* but no changes
occur after locking and unlocking the screen.
Expected behaviour: the
On Thu, Mar 30, 2017 at 5:31 AM, Chris Laprise wrote:
> xdotool also lets you inject keystrokes into windows.
>
> With a shortcut-key assignment this can be easily scripted by the user (you
> said this was for power users).
Automatically injecting the keystrokes removes
On 03/30/2017 10:34 AM, Jean-Philippe Ouellet wrote:
On Thu, Mar 30, 2017 at 5:31 AM, Chris Laprise wrote:
xdotool also lets you inject keystrokes into windows.
With a shortcut-key assignment this can be easily scripted by the user (you
said this was for power users).
Without a TPM you will be limited as to what you can do with any TCG
Opal compliant self encrypting drives (SED), and for a laptop this is a
very interesting feature to loose. Most all SSD's I know are Opal
compliant and many laptop spinning drives are as well. Take a look at
the rpm package
On Monday, March 27, 2017 at 1:16:10 AM UTC-4, Shane Optima wrote:
> >which may or may not be *detected* by a sharply observant user, but could
> >still not be *prevented* by one
>
> Um, that is incorrect. I'm not sure you understand at all what I'm talking
> about here so let's go over it
On Thu, Mar 30, 2017 at 5:31 AM, Chris Laprise wrote:
> You don't even need to rely on the window title for the security aspect: The
> _QUBES_VMNAME window property will tell you. For example:
>
> $ CUR_WINDOW=`xdotool getwindowfocus`
> $ VMNAME=`xprop _QUBES_VMNAME -id
>Yeah, it could be dangerous, but still might be worth writing for oneself if
>the threat model seems appropriate. I wouldn't suggest this as a Qubes feature.
As an out of the box official Qubes feature, no, but it seems like an excellent
stopgap and stepping stone given the ease of
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-03-30 04:06, to...@vmail.me wrote:
> Both the xscreensaver and the i3lock accept any password. I have
> not manually changed the files in /etc/pam.d/ but note some have
> the "nullok" option.
>
> I've run tail -f against /var/log/* and
On Wed, Mar 29, 2017 at 06:02:17AM -0700, Nemo wrote:
> >
> > You can add the rule like this:
> > 'sudo iptables -I INPUT -p tcp --dport 8082 -j ACCEPT'
> >
> > '-I INPUT' Inserts the rule at the top of the INPUT chain (You can
> > specify a number here, like '-I INPUT 2' to specify position.)
>
I get the feeling when you talk about people contributing, you mean
/other/ people. That's fine, but in my estimation what you're proposing
would take under 30 lines of bash code.
You should write it yourself as a way to learn about Linux and Qubes.
--
Chris Laprise, tas...@openmailbox.org
Hello,
I upgraded my Debian 8 "Jessie" template from Debian Qubes r3.1 to Qubes r3.2.
Now, I have problems with the audio output. When I try to play audio files I do
not hear anything and music player - web or deskotp - skip through songs very
fast without playing them.
I tried to play
On Thursday, March 30, 2017 at 5:27:12 PM UTC-4, Chris Laprise wrote:
> I get the feeling when you talk about people contributing, you mean
> /other/ people. That's fine, but in my estimation what you're proposing
> would take under 30 lines of bash code.
I think I've already covered this exact
> As Qubes works by means of the principle of security by isolation and every
> part of the hardware is running in a virtual machine. Does it make any sense
> to use Kaspersky Security for virtualization over the xen hypervisor to
> improve security and antihacker security?
The KasperskyOS
On Wed, Mar 29, 2017 at 12:22:57AM -0700, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2017-03-01 01:01, Andrew David Wong wrote:
> > Dear Qubes community,
> >
> > Qubes OS releases are normally supported for six months after each
> > subsequent
> > major
On Thu, Mar 30, 2017 at 6:21 PM, Shane Optima wrote:
> Maybe if you (or someone) could write a Firefox extension to modify all
> browser page titles to be a concatenation of the page title and a short token
> of characters generated from a salted hash of the URL (so that
Hello,
I am Barr Kong Khemara, I humbly ask if you are related to my client who died
couple of
years ago in a car accident here in my country Cambodia. I wish to also inquire
if
it is possible to have different families with the same last name as yours by
coincidence
who do not share the same
16 matches
Mail list logo