Greetings fellow Qubes enthusiasts,
I find myself often in a situation where I often do not need the display window
of an StandaloneVM. This is often because I have opted to SSH or RDP into it
from another AppVM. Obviously one solution is just to keep the window
minimised, however I would like
clutter the mailing list, hopefully Qubes R4.1 has a newer libvirt
version!
Tonux
On 7/24/21 10:45 PM, Thomas Clarke wrote:
Greetings fellow Qubes enthusiasts,
I find myself often in a situation where I often do not need the display window
of an StandaloneVM. This is often because I have opted to
Xen packages version 4.8.5-36 still not in 4.0 stable repository yet? This
isn't the first time 'two weeks' have turned into almost a month. Or is there
something wrong with my setup?
On 11/24/21 8:19 AM, Andrew David Wong wrote:
Dear Qubes Community,
We have just published Qubes Security Bul
This is not Qubes specific. Please consult the documentation for the
distribution your AppVM's are based on. For example, if your AppVM's are using
a Fedora template, consult Fedora's documentation.
On 1/18/22 19:23, William Fisher wrote:
or "Mount"
On Tuesday, January 18, 2022 at 1:22:49 PM
Hi there,
I'm curious to what would be an acceptable method of accessing JSON data in a
AppVM from Dom0. I understand the general consensus is it is a risk to do so,
but I have some conky's on my desktop which need data from some AppVM's.
My current method is this:
`qvm-run --pass-io --user u
Hi,
You can list your pools with `qvm-pool`. And list options for a pool with
(where my pool is pool00) `qvm-pool info pool00`. Then you can set
`revisions_to_keep` for a pool like `qvm-pool set -o revisions_to_keep=0
pool00`.
I'm not sure if this will work retroactively on already created vo