On Mon, Dec 21, 2020 at 12:36:05AM +0100, Ulrich Windl wrote:
> On 12/15/20 5:40 PM, ser...@da.matta.nom.br wrote:
> > Thank you Unman. I do not use React-OS anymore. It worked fine on Qubes
> > 3. But I really think it was a bad decision to support only xvda. It is
> > not only Android, React-os,
On Sun, Dec 20, 2020 at 04:21:21PM +0100, Morten Eyrich wrote:
> How do I edit network connections in sys-net to remove "automatically
> connect" ?
>
> Den s??n. 20. dec. 2020 kl. 14.38 skrev unman :
>
> > On Sun, Dec 20, 2020 at 01:59:41AM -0800, ME wrote:
> > > Why isn't it possible to
Why isn't it possible to manually control if the pc should enable
networking and wi-fy at login or not ?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Sun, Dec 20, 2020 at 01:27:59AM -0800, ME wrote:
> Lets say I have a USB storage device which has a virus on it that will
> infect a Linux pc when it is inserted.
>
> If I insert the USB storage device in my Qubes OS pc after login to Qubes
> OS, is it then possible for the virus to infect
On Sun, Dec 20, 2020 at 01:59:41AM -0800, ME wrote:
> Why isn't it possible to manually control if the pc should enable
> networking and wi-fy at login or not ?
>
It is.
You can edit network connections in sys-net to remove "automatically
connect".
Or disable autostart for all qubes, disable
Lets say I have a compromised router/networkconnection.
I use a Qubes OS pc to go on the internet through the compromised
router/networkconnection.
Is it then possible for the intruder to see the passwords that I enter and
is being sent through the compromised router/networkconnection ?
--
I installed the updates from security-testing to fix QSB-063. I was still
running kernel 4.19.x, but instead of the fixed 4.19 version, the fixed 5.4
version was installed. It has been running a few days now and I have not
noticed any issues.(Sandy Bridge i5 notebook.)
On Friday, November 27,
On Sun, Dec 20, 2020 at 01:39:19AM -0800, ME wrote:
> Lets say I have a compromised router/networkconnection.
>
> I use a Qubes OS pc to go on the internet through the compromised
> router/networkconnection.
>
> Is it then possible for the intruder to see the passwords that I enter and
> is
Lets say I have a USB storage device which has a virus on it that will
infect a Linux pc when it is inserted.
If I insert the USB storage device in my Qubes OS pc after login to Qubes
OS, is it then possible for the virus to infect my pc immediately after I
have plugged it in before or after
ogle.com/d/msgid/qubes-users/DM6PR10MB3836B8966E0BD1898EC013929CC10%40DM6PR10MB3836.namprd10.prod.outlook.com.
Qubes-HCL-Dell_Inc_-OptiPlex_790-20201220-035756.yml
Description: Qubes-HCL-Dell_Inc_-OptiPlex_790-20201220-035756.yml
I think there is a way to pass /dev/sdX disk device directly to a qube..
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
How do you stream and whatch mp4-video's in your Firefox Browser ?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To
Okay so if I have been using a https connection, then it's no problem... ?
Den søn. 20. dec. 2020 kl. 14.35 skrev unman :
> On Sun, Dec 20, 2020 at 01:39:19AM -0800, ME wrote:
> > Lets say I have a compromised router/networkconnection.
> >
> > I use a Qubes OS pc to go on the internet through
On Sun, 2020-12-20 at 16:17 +0100, Morten Eyrich wrote:
> Okay so if I have been using a https connection, then it's no
> problem... ?
For a simple passive man-in-the-middle attacker, yes, encrypting connections is
sufficient to protect them.
For attackers willing to perform active attacks, or
How do I edit network connections in sys-net to remove "automatically
connect" ?
Den søn. 20. dec. 2020 kl. 14.38 skrev unman :
> On Sun, Dec 20, 2020 at 01:59:41AM -0800, ME wrote:
> > Why isn't it possible to manually control if the pc should enable
> > networking and wi-fy at login or not ?
>
On Sat, 2020-12-19 at 07:15 -0800, Viktor Ransmayr wrote:
> vic...@gmail.com schrieb am Samstag, 19. Dezember 2020 um 14:26:10
> UTC+1:
> > On Sat, 2020-12-19 at 02:01 -0800, Viktor Ransmayr wrote:
> > > Since this morning Qubes Updater does not succeed updating the
> > > 'fedora-32' template
On 12/11/20 3:48 AM, Andrew David Wong wrote:
On 12/10/20 12:23 PM, Ulrich Windl wrote:
On 12/10/20 3:49 AM, Andrew David Wong wrote:
I used to be able to be able to do the following to copy text from
xterm in Fedora and Debian VMs:
1. Select/highlight the desired text, thereby inserting it
On 12/12/20 1:16 AM, 'keyandthegate' via qubes-users wrote:
Oops, I forgot I'm using btrfs.
Well, it's not specific to Qubes OS, but maybe you'd like to read this:
Setting up a HA cluster using Xen PVMs recently, I found a bug that
activated one VM on two nodes at the same time... The VM was
On 12/14/20 7:42 PM, Data Eight wrote:
I am trying to install "Qubes-R4.0.3-x86-64 OS" on Windows 10 UEFI
system. Using Rufus created bootable media (DD image option selected).
The installation is done (till the message that qubes successfully
installed and ready to go) but after first reboot,
On 12/15/20 5:40 PM, ser...@da.matta.nom.br wrote:
Thank you Unman. I do not use React-OS anymore. It worked fine on Qubes
3. But I really think it was a bad decision to support only xvda. It is
not only Android, React-os, Chrome-Os and others. It is about Qubes
users. I will keep using
On 12/16/20 9:32 AM, haaber wrote:
I have still instabilities with the xen kernels 5.x (sudden system
freeze). I also have a small /boot and hold only the last 3 kernels.
I can (outside of Qubes OS) trigger a kernel freeze when the kernel
starts swapping on a thin-provisioned LV. I think I
On 12/17/20 2:32 PM, Stumpy wrote:
I havent played with crontab in forever, and I cant code at all, but I
really wanted to try to automate my backups a wee bit.
I made a basic script (qubackup) in the ~/ dom0 directory:
/home/bob/qvm-backup --yes --verbose --compress --passphrase-file
On 12/17/20 3:14 PM, Stumpy wrote:
On 12/17/20 8:47 AM, haaber wrote:
On 12/17/20 2:32 PM, Stumpy wrote:
I havent played with crontab in forever, and I cant code at all, but I
really wanted to try to automate my backups a wee bit.
I made a basic script (qubackup) in the ~/ dom0 directory:
On 12/20/20 10:27 AM, ME wrote:
Lets say I have a USB storage device which has a virus on it that will
infect a Linux pc when it is inserted.
If I insert the USB storage device in my Qubes OS pc after login to
Qubes OS, is it then possible for the virus to infect my pc immediately
after I
On 12/20/20 10:59 AM, ME wrote:
Why isn't it possible to manually control if the pc should enable
networking and wi-fy at login or not ?
You CAN switch sys-net to manual start, and you can disconnect any VM
from the network.
--
You received this message because you are subscribed to the
On 12/20/20 11:43 AM, ME wrote:
How do you stream and whatch mp4-video's in your Firefox Browser ?
"your" firefox browser? What's that?
--
You received this message because you are subscribed to the Google
Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails
On 12/20/20 4:17 PM, Morten Eyrich wrote:
Okay so if I have been using a https connection, then it's no problem... ?
If they use a wrong certificate for a MITM attack they might decode your
connection... It means nobody between you and the "next endpoint" can
read your password, but how to
On 12/21/20 1:08 AM, Ulrich Windl wrote:
On 12/20/20 4:17 PM, Morten Eyrich wrote:
Okay so if I have been using a https connection, then it's no
problem... ?
If they use a wrong certificate for a MITM attack they might decode your
connection... It means nobody between you and the "next
Hi!
I wonder: What sense is in updating the kernel in a VM (e.g. fedora-32)
when that kernel isn't used when booting the VM?
For example:
user@sys-firewall ~]$ rpm -qa kernel\*
kernel-core-5.9.11-100.fc32.x86_64
kernel-5.9.12-100.fc32.x86_64
kernel-modules-5.9.14-100.fc32.x86_64
29 matches
Mail list logo