Q4.0 upgrade path ? am I eventually going to have to reinstall as
Q4.0 or will it be 3.2 be 'upgradeable' ?
Guesstimate when does it turn into "stable" ?
3) re: security advisorys, is there ever any suggestion what to do about
them?
.or just keep upgrading dom0 and magically some
-Original Message-
From: taii...@gmx.com [mailto:taii...@gmx.com]
Sent: Tuesday, August 15, 2017 2:50 AM
To: Wim Vervoorn ; qubes-users
Cc: raahe...@gmail.com
Subject: Re: [qubes-users] UEFI secureboot issue
Secure boot is a stupid Microsoft controlled project to eventually remove the
On 2017-07-31 at 12:15 +, Kelly Dean wrote:
> In Qubes 3.2 with i3, in any qube, regardless of which template I use, and
> regardless of which physical keyboard I use, the right Alt key is useless
> when mapped as AltGr, because it generates spurious Alt_L events.
>
> With a standard America
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Aug 15, 2017 at 02:43:42PM +, Rusty Bird wrote:
> Marek Marczykowski-Górecki:
> > On Tue, Aug 15, 2017 at 01:59:59PM +, Holger Levsen wrote:
> > > So, "sudo qubes-dom0-update" for the first paragraph, and
> > > "sudo qubes-dom0-updat
On Tue, Aug 15, 2017 at 04:05:27PM +0200, Marek Marczykowski-Górecki wrote:
> Actually:
> sudo qubes-dom0-update --enablerepo=qubes-dom0-security-testing
done this now, worked nicely, also rebooted into it and everything seems
to be fine. thanks!
--
cheers,
Holger
--
You received this
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Marek Marczykowski-Górecki:
> On Tue, Aug 15, 2017 at 01:59:59PM +, Holger Levsen wrote:
> > So, "sudo qubes-dom0-update" for the first paragraph, and
> > "sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing" for the
> > 2nd…
> > (II
On Tue, Aug 15, 2017 at 04:05:27PM +0200, Marek Marczykowski-Górecki wrote:
> Actually:
> sudo qubes-dom0-update --enablerepo=qubes-dom0-security-testing
q.e.d. & thanks!
--
cheers,
Holger
--
You received this message because you are subscribed to the Google Groups
"qubes-users" gro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Aug 15, 2017 at 01:59:59PM +, Holger Levsen wrote:
> Hi,
>
> first of all: thanks for this handling this update!
>
> On Tue, Aug 15, 2017 at 08:31:31AM -0500, Andrew David Wong wrote:
> > Patching
> > =
> [...]
> > The packages
Hi,
first of all: thanks for this handling this update!
On Tue, Aug 15, 2017 at 08:31:31AM -0500, Andrew David Wong wrote:
> Patching
> =
[...]
> The packages are to be installed in dom0 via the qubes-dom0-update command or
> via the Qubes VM Manager. A system restart will be required aft
On 10.08.2017 16:55, hugonco...@gmail.com wrote:
> On Tuesday, 8 August 2017 13:45:09 UTC+1, Janik Besendorf wrote:
>> Hi,
>>
>> I tried 4.0 today and that worked. But I dont think that I want to use
>> the RC on my productive system.
>> I attached my UEFI settings in the mail.
>>
>>
>>
>> On 08
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
We have just published Qubes Security Bulletin (QSB) #32:
Xen hypervisor and Linux kernel vulnerabilities (XSA-226 through XSA-230).
The text of this QSB is reproduced below. This QSB and its accompanying
signatures will always
Windows AppVMs sometimes fail to boot in Seamless GUI mode due to Safe Mode
prompt appearing. Luckily it can be disabled using following commands in
Command
Prompt:
bcdedit /set {bootmgr} displaybootmenu no
bcdedit /set {default} bootstatuspolicy ignoreallfailures
@Andrew can we add this to th
12 matches
Mail list logo