Hello Everybody,
I want to install QubesOS R4.0.2 on a Tuxedo Book XC1510 (Intel i7-9750H, Nvidia GeForce GTX 1660Ti, 32 GB RAM, Samsung 970 EVO Plus M.2 SSD, insydeH2O BIOS 1.07.14RTR1)
I downloaded the *.iso, multiple verified key-fingerprints, signatures and checksums and "dd" the
January 21, 2020 7:04 PM, "Dan Krol" wrote:
> So to clarify:
>
>> Sys-net and sys-firewall (and sys-vpn if you use it) will need it enabled.
>
> When you say "need it enabled", you're just referring again to "provides
> network", is that correct?
>
> And secondly: Do I understand correctly
January 22, 2020 2:48 AM, anbe2...@joker.ms wrote:
> Hello Everybody,
>
> I want to install QubesOS R4.0.2 on a Tuxedo Book XC1510 (Intel i7-9750H,
> Nvidia GeForce GTX
> 1660Ti, 32 GB RAM, Samsung 970 EVO Plus M.2 SSD, insydeH2O BIOS 1.07.14RTR1)
>
> I downloaded the *.iso, multiple verified
January 22, 2020 2:48 AM, anbe2...@joker.ms wrote:
> Hello Everybody,
>
> I want to install QubesOS R4.0.2 on a Tuxedo Book XC1510 (Intel i7-9750H,
> Nvidia GeForce GTX
> 1660Ti, 32 GB RAM, Samsung 970 EVO Plus M.2 SSD, insydeH2O BIOS 1.07.14RTR1)
>
> I downloaded the *.iso, multiple verified
January 16, 2020 5:55 PM, "M" wrote:
> I read about a TemplateVM and a StandaloneVM in the “Glossary of Qubes
> Terminology”. But I’m still
> not sure about which kind of VM to choose for a Windows 10 VM.
>
> Can someone please tell me more clearly when to chose these kinds of VM’s,
> and
> So to clarify:
>
> > Sys-net and sys-firewall (and sys-vpn if you use it) will need it enabled.
>
> When you say "need it enabled", you're just referring again to "provides
> network", is that correct?
>
Yes.
> And secondly: Do I understand correctly so long as any qube sits in between
>
Is it possible to add tools or commands to the tray icon "Qubes Domains" ?
One example: When using a DVM I often want to move downloaded files to a
persistent VM. In such cases I "run terminal" and start nautilus. It
would be nice if nautilus was available directly. Is there a way for
such a
A few times people have observed that Fedora's package signing leaves a
few things to be desired. While Qubes' security model doesn't depend on
Fedora entirely, a compromised template compromises the machine -- and
package repos are a good way to compromise a template.
Why does Qubes still seem
Thank you for your ideas. From my understanding all your ideas that
would mean to open a Terminal and run
./script.sh a.ext b.ext c.ext d.ext
typing this is not much simpler than
1. start dispvm with nautilus
2. send files from source-vm nautilus
3. open files in destination-vm nautilus
in my
> Hello,
>
> I was wondering if there are guides in the docs that I missed which
> describe proper creation/upgrades of "special" VMs (sys-net, sys-firewall,
> and possibly vault). I preferred Debian for my vault. I created a new VM with
> a
> black lock icon and no network connectivity. Other
> On 1/20/20 3:09 PM, tortuga verde wrote:
>
> > Also, since it was not listed in systemctl status, how would I be able
> > to easily enumerate all such services, so that if I want to see if any
> > service is running because I failed to disable it at install time, I can
> > find and disable
Trying to configure dom0s /etc/qubes-rpc/qubes.OpenInVM I get an
unexpected result.
The current config is
cat /etc/qubes-rpc/qubes.OpenInVM:
office @dispvm ask,default_target=internet
@anyvm @anyvm ask
Using Nautilus command "View in DisposibleVM" in VM office I get a
separate dispvm for every
On 2020-01-21 05:38, Major Lazor wrote:
APL external email warning: Verify sender r.wiesb...@web.de before clicking
links or attachments
Thank you for your ideas. From my understanding all your ideas that
would mean to open a Terminal and run
./script.sh a.ext b.ext c.ext d.ext
typing this
Interesting to see and thank you for sharing.
In the mean time I tried to find out how to get the number of the dispvm
that you have started and I still think there is no way to do so by
design. However there can be policies which VM to use in OpenInVM using
the file /etc/qubes-rpc/qubes.OpenInVM
So to clarify:
> Sys-net and sys-firewall (and sys-vpn if you use it) will need it enabled.
When you say "need it enabled", you're just referring again to "provides
network", is that correct?
And secondly: Do I understand correctly so long as any qube sits in between
two other qubes in the
15 matches
Mail list logo