[qubes-users] Installation on MacBook Pro

2021-09-27 Thread Qubes User
Hi,

I am trying to install Qubes on Macbook Pro(15,5) 2019 Model but I can't 
get past the boot screen. I burned an image using Etcher but when I try to 
boot my Mac, the screen goes blank and the system freezes. I don't see any 
errors whatsoever.

Any suggestions on how to troubleshoot and get it running will be greatly 
appreciated.


Best regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/255611f2-fb22-440e-a30f-b4934a20b0c3n%40googlegroups.com.


Re: [qubes-users] How can I install new software in DOM0 ?

2021-08-08 Thread qubes user
Thank you very much for your answer but the guide didn't help. The software 
I want to install is not in the repos and I cannot add a new repo. I have 
little knowledge, it would be great if you could point out how I can 
install directly from an new repo.

On Sunday, August 8, 2021 at 12:40:22 PM UTC+3 a...@qubes-os.org wrote:

> On 8/7/21 5:27 AM, qubes user wrote:
> > How can I install a screen recorder program in DOM0. I tried to install
> > "OBS" or "simplescreenrecorder" but everything I tried failed. Could you
> > please explain how I can install a program in dom0?
> > 
>
> https://www.qubes-os.org/doc/how-to-install-software-in-dom0/
>
> -- 
> Andrew David Wong
> Community Manager
> The Qubes OS Project
> https://www.qubes-os.org
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/afc6c1c3-9ebe-41e4-8313-620d15109397n%40googlegroups.com.


[qubes-users] Re: How can I install new software in DOM0 ?

2021-08-08 Thread qubes user

>
> I am aware of the security risk it poses, I only need to install software 
> because I have to record screen. I want to learn how I can add a new repo 
> and download software from this repo.
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7bfa5e67-b3ec-455e-bcf9-b24bbc8f0b64n%40googlegroups.com.


[qubes-users] How can I install new software in DOM0 ?

2021-08-07 Thread qubes user
How can I install a screen recorder program in DOM0. I tried to install 
"OBS" or "simplescreenrecorder" but everything I tried failed. Could you 
please explain how I can install a program in dom0?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c4fc3b9d-cfd1-4830-864e-d115e04a8d42n%40googlegroups.com.


[qubes-users] Qubes won't boot

2021-05-06 Thread Qubes User
Hello,

 

I was using Qubes for about 3 months and didn't use it last month.

Yesterday it wouldn't boot.

 

Using Qubes rescue didn't help. After typing passphrase it says Linux system not found so it doesn't mount.

So i found a way to mount disk manually. Going through directories found out that boot folder is empty.

 

Also if that is not an option i want to save my files but seems like private.img are missing. There is only icon.png file in VM folders.

 

Is there any way to recover boot files so i can boot it again or at least save files from VMs somehow?



-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/trinity-b05fda5f-b9b7-48bc-94c1-aa98fb89ee53-1620324425410%403c-app-mailcom-lxa10.


Re: [qubes-users] How do I get Started?

2019-12-05 Thread Qubes User
Hi everyone,
Thank you for all your help and discussion. I posted the HCL for the device 
I'm troubleshooting -- the latest Lenovo Flex 14 with the i5-10210U. You 
can find it here: 
https://groups.google.com/forum/#!topic/qubes-users/kamMImlGMNQ

I'm guessing the plan is to set up networking, update the templates and 
dom0, then troubleshoot the trackpad and external monitor. I plugged in the 
monitor with HDMI and it didn't show up under System Tools > Display, and 
my touchpad doesn't show up under System Tools > Mouse and Touchpad. .

Here are the outputs of some of the suggested commands in my sys-net 
terminal. My sys-net is based of Fedora 29.

> [user@sys-net ~]$ iwconfig
> lono wireless extensions.
>
> vif3.0no wireless extensions.
>
> [user@sys-net ~]$ ifconfig
> lo: flags=73UP,LOOPBACK,RUNNING  mtu 65536
> inet 127.0.0.1  netmask 255.0.0.0
> inet6 ::1  prefixlen 128  scopeid 0x10host
> loop  txqueuelen 1000  (Local Loopback)
> RX packets 1606  bytes 129550 (126.5 KiB)
> RX errors 0  dropped 0  overruns 0  frame 0
> TX packets 1606  bytes 129550 (126.5 KiB)
> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
> vif3.0: flags=4163UP,BROADCAST,RUNNING,MULTICAST  mtu 1500
> inet 10.137.0.5  netmask 255.255.255.255  broadcast 0.0.0.0
> inet6 fe80::fcff::feff:  prefixlen 64  scopeid 
> 0x20link
> ether fe:ff:ff:ff:ff:ff  txqueuelen 32  (Ethernet)
> RX packets 1093  bytes 67624 (66.0 KiB)
> RX errors 0  dropped 0  overruns 0  frame 0
> TX packets 170  bytes 15418 (15.0 KiB)
> TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
>
> [user@sys-net ~]$ iwlist
> Usage: iwlist [interface] scanning [essid NNN] [last]
>   [interface] frequency
>   [interface] channel
>   [interface] bitrate
>   [interface] rate
>   [interface] encryption
>   [interface] keys
>   [interface] power
>   [interface] txpower
>   [interface] retry
>   [interface] ap
>   [interface] accesspoints
>   [interface] peers
>   [interface] event
>   [interface] auth
>   [interface] wpakeys
>   [interface] genie
>   [interface] modulation
>
> [user@sys-net ~]$ lsusb -v
>
> Bus 001 Device 002: ID 0627:0001 Adomax Technology Co., Ltd
> Couldnt open device, some information will be missing
> Device Descriptor:
>   bLength18
>   bDescriptorType 1
>   bcdUSB   2.00
>   bDeviceClass0
>   bDeviceSubClass 0
>   bDeviceProtocol 0
>   bMaxPacketSize064
>   idVendor   0x0627 Adomax Technology Co., Ltd
>   idProduct  0x0001
>   bcdDevice0.00
>   iManufacturer   1
>   iProduct3
>   iSerial 5
>   bNumConfigurations  1
>   Configuration Descriptor:
> bLength 9
> bDescriptorType 2
> wTotalLength   0x0022
> bNumInterfaces  1
> bConfigurationValue 1
> iConfiguration  7
> bmAttributes 0xa0
>   (Bus Powered)
>   Remote Wakeup
> MaxPower  100mA
> Interface Descriptor:
>   bLength 9
>   bDescriptorType 4
>   bInterfaceNumber0
>   bAlternateSetting   0
>   bNumEndpoints   1
>   bInterfaceClass 3 Human Interface Device
>   bInterfaceSubClass  0
>   bInterfaceProtocol  0
>   iInterface  0
> HID Device Descriptor:
>   bLength 9
>   bDescriptorType33
>   bcdHID   0.01
>   bCountryCode0 Not supported
>   bNumDescriptors 1
>   bDescriptorType34 Report
>   wDescriptorLength  74
>  Report Descriptors:
>** UNAVAILABLE **
>   Endpoint Descriptor:
> bLength 7
> bDescriptorType 5
> bEndpointAddress 0x81  EP 1 IN
> bmAttributes3
>   Transfer TypeInterrupt
>   Synch Type   None
>   Usage Type   Data
> wMaxPacketSize 0x0008  1x 8 bytes
> bInterval   4
>
> Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
> Couldnt open device, some information will be missing
> Device Descriptor:
>   bLength   

[qubes-users] HCL - Lenovo 81XG, Flex 14 inch, Model 81XG000EUS

2019-12-04 Thread Qubes User
*Installation*
Installed to hard drive. Secure boot was disabled.
Legacy boot mode can be enabled, but EUFI works fine; no troubleshooting 
was required.
Trackpad/touchpad didn't work during installation. I used a Logitech M510 
USB mouse. 
To make the hard drive visible during installation, in the BIOS, change the 
Storage Controller from RST to AHCI.
USB Qubes not configurable from initial configuration menu. The keyboard 
could be a USB keyboard. 
Or maybe the USB Mouse prevented me from configuring the USB Qubes.
On start-up and shut-down, I get 

> [FAILED] Failed to start Load Kernel Modules.
> See 'systemctl status systemd-modules-load.service' for details.
>

*Works without further troubleshooting*
Lock screen


*Requires Troubleshooting*
Wifi
Trackpad/touchpad
Suspend
Touchscreen
HDMI external display
Troubleshooting steps may be similar to those listed at 
https://groups.google.com/forum/#!msg/qubes-users/zCLYDy1bRKw/E58GDOgRBAAJ

*Untested*
Fingerprint scanner
Bluetooth
Camera
Ethernet
Microphone (although it shows up in devices with other USB drives)

*Thoughts*
There appears to be no TPM.
Built-in keyboard and USB mouse are a bit laggy. 
This model uses a 10th gen i5-10210U processor; a newer model.
This was the cheapest 16gb ram laptop available at Costco.com at this time 
at $721 after tax and shipping. Making newer, cheaper models compatible 
with Qubes could be a way to bring more new users to the OS. 

*Purchase Link:*
https://www.costco.com/lenovo-flex-14-2-in-1-touchscreen-laptop---10th-gen-intel-core-i5-10210u---1080p.product.100517162.html

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b68621d3-a579-4473-b55a-d1e6f73f9abb%40googlegroups.com.


Qubes-HCL-LENOVO-81XG-20191204-102948.yml
Description: Binary data


Re: [qubes-users] How do I get Started?

2019-12-03 Thread Qubes User
Thank you for your help. 

On Tuesday, December 3, 2019 at 12:10:11 PM UTC-8, Claudia wrote:
>
> Qubes User: 
> > I just installed Qubes on a new laptop. I'm trying to do some basic 
> things 
> > not listed on https://www.qubes-os.org/getting-started/ 
> > 
> > 1. How do I get connected to my wi-fi? 
>
> The networkmanager applet should appear in the task tray (next to the 
> clock). Just click on that and select a network. Make sure sys-net is 
> running. Can you manually launch networkmanager in sys-net? Do you see 
> your network card in iwconfig, ifconfig, lsusb, lspci, in sys-net? 
>
> When I click the applet, I see: 
Ethernet Network
device not managed
VPN Connections >
I don't see my WiFi networks. When I launch network manager in sys-net, I 
tried
to manually input the information for my WiFi (with the SSID and 
WPA2/Personal), 
but it doesn't connect after. 

When I run "lsusb" in the dom0 terminal, I get:
Realtek Semiconductor Corp
VIA Labs, Inc.
Linux Foundation 3.0 root hub
blank
Chicony Electronics Co., Ltd
VIA Lbs, Inc.
Logitech, Inc. Unifying Receiver (for my usb mouse)
Terminus Technology Inc.
VIA Labs, Inc.
Intel Corp.
Linux Foundation 2.0 root hub
None of these are my network cards, right? 
 

> > 2. How do I use an external display with HDMI? (just plugging it in 
> doesn't 
> > work for me) 
>
> What do you see when you plug it in? "No signal"? Blank screen? 
>
> You might have to do some configuration in XFCE. Look under system tools 
> for monitor/screen settings. Otherwise, you could try installing KDE. 
>
> https://www.qubes-os.org/doc/kde/ 
>
> Note that a lot of hardware features don't always work in Qubes. HDMI is 
> not tested very often by Qubes users, so I don't know if HDMI usually 
> works or not. 
>
> Does it work when running a Fedora 25 live CD? Did you have it working 
> on this machine on any other operating systems? 
>
When I plug in my HDMI, nothing happens. On Windows, the external display
works when I plug it in. I can try running Fedora on a live usb to see what 
happens. 

>
> > 3. How do I reduce the lag on my USB mouse? 
>
> I'm afraid I don't know much about this. Are you using dom0 or sys-usb? 
> Is anything else laggy? Does the touchpad (if any) work alright? 
>
> You can try temporarily disabling sys-usb so devices are attached to 
> dom0. See if it works any better that way. 
> https://www.qubes-os.org/doc/usb-qubes/#removing-a-usb-qube

I don't think I have usb-qubes enabled. I wasn't able to enable them after 
installation,
maybe because I have a USB keyboard. 
However, my touchpad/trackpad doesn't work. What can I do about that?

>
>
> - 
> This free account was provided by VFEmail.net - report spam to 
> ab...@vfemail.net  
>   
> ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of 
> the NSA's hands! 
> $24.95 ONETIME Lifetime accounts with Privacy Features!   
> 15GB disk! No bandwidth quotas! 
> Commercial and Bulk Mail Options!   
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/38321cc0-496a-4811-9cf7-46249e16ee4b%40googlegroups.com.


[qubes-users] How do I get Started?

2019-12-02 Thread Qubes User
I just installed Qubes on a new laptop. I'm trying to do some basic things 
not listed on https://www.qubes-os.org/getting-started/

1. How do I get connected to my wi-fi?
2. How do I use an external display with HDMI? (just plugging it in doesn't 
work for me)
3. How do I reduce the lag on my USB mouse?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a48b2391-9159-46b3-b465-9ba3b6066938%40googlegroups.com.


[qubes-users] Re: HCL - Thinkpad X1 Carbon 5th gen - Qubes 4.0-rc3

2019-12-02 Thread Qubes User
How do you add psmouse.synaptics_intertouch=1 to the dom0 kernel parameter?

On Friday, December 15, 2017 at 5:57:20 PM UTC-8, Marek 
Marczykowski-Górecki wrote:
>
> -BEGIN PGP SIGNED MESSAGE- 
> Hash: SHA256 
>
> On Sat, Dec 16, 2017 at 01:54:09AM +0100, Marek Marczykowski-Górecki 
> wrote: 
> > Hi, 
> > 
> > I have some initial comments about Qubes 4.0rc3 on Lenovo Thinkpad X1 
> > Carbon 5th gen. I'll dig further into issues listed below. But for now I 
> > wouldn't call it "works out of the box", unfortunately :/ 
> > 
> >  - EFI installer do not boot - gets back into grub instantly, 
> /noexitboot 
> >/mapbs do not help 
> >  - legacy mode install works fine (although I've noticed small graphics 
> >glithes once or twice) 
> >  - at next boot grub is horribly slow (you can see drawing each char) 
> >  - system starts with default kernel (4.9.56) 
> >  - trackpoint/touchpad do not work: 
> >   
> >  psmouse serio1: TouchPad at isa0060/serio1/input0 lost sync at byte 
> 1 
> >  psmouse serio1: TouchPad at isa0060/serio1/input0 lost sync at byte 
> 1 
> >  psmouse serio1: TouchPad at isa0060/serio1/input0 lost sync at byte 
> 1 
> >  psmouse serio1: TouchPad at isa0060/serio1/input0 lost sync at byte 
> 1 
> >  psmouse serio1: TouchPad at isa0060/serio1/input0 lost sync at byte 
> 1 
> >  psmouse serio1: issuing reconnect request 
> >  psmouse serio1: synaptics: queried max coordinates: x [..5678], y 
> [..4758] 
> >  psmouse serio1: synaptics: queried min coordinates: x [1266..], y 
> [1094..] 
>
> Fixed by adding psmouse.synaptics_intertouch=1 dom0 kernel parameter 
> (available in 4.14+). 
>
> >   
> >  - suspend: hang on suspend (green light flash quickly) 
> > 
> > Next step: upgrade dom0 (only!) kernel to 4.14.6 
> > (https://github.com/QubesOS/qubes-linux-kernel/pull/13). You need to 
> > build it yourself, there is no 
> > binary package available, yet. 
> > 
> > Then add iwlmvm and iwlwifi to /rw/config/suspend-module-backlist in 
> sys-net 
> > 
> >  - this fixed suspend issue, wireless also works after suspend 
> >  - touchpad/trackpoint still do not work 
> > 
> > Other issues: 
> >  - https://github.com/QubesOS/qubes-issues/issues/3108 
> > 
> > 
> > Untested: 
> >  - mic 
> >  - camera 
> >  - ethernet 
> >  - thunderbolt (and do not plan to) 
> >  - WiGig (does it even have Linux support?) 
> >  - bluetooth 
> >  - NFC 
> >  - fingerprint reader (do not plan to test) 
> > 
> > Attached hardware info. 
> > 
>
>
>
>
>
> - -- 
> Best Regards, 
> Marek Marczykowski-Górecki 
> Invisible Things Lab 
> A: Because it messes up the order in which people normally read text. 
> Q: Why is top-posting such a bad thing? 
> -BEGIN PGP SIGNATURE- 
> Version: GnuPG v2 
>
> iQEcBAEBCAAGBQJaL3qDAAoJENuP0xzK19csKzYH/iu1x869BqLeOkf2tthetBaK 
> njaKZb9SfP8QvX8XUPZcVOwCOldFuHjzGGf+zrCM3IRtsUKf3Ry6suKH7YRrmP2a 
> qUScHkusfDePDH47XpFnKvE2vRINCbd6j709dttr/GZtAHTKx8J6B6ZDuQl1YkSH 
> gqyQkW0FDtC3jEEQnAyh5249OwJjxW56EM/WvlVOqykBkx7GkmTPGk5PSVB76i+b 
> W3QFlj+XEmryMSbp51Nzzb1yuK7nkMiKcZBC74bg+/jOjipH/j4vphAnzMzZ/5MK 
> wi3vXzjf4G+M+IrsGbSOerURadQMsQTiEwVaeydquQOc7Op72vD5LsvoJUhOu8U= 
> =aCgK 
> -END PGP SIGNATURE- 
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c97c0518-a3ef-419e-9efe-da562300c8f3%40googlegroups.com.


[qubes-users] Docker Bridge Mode Not Working in Qubes

2019-03-17 Thread Qubes User
Hi, So basically:    docker run -it --network=bridge ubuntu No internet...    docker run -it network=host ubuntu Internet! (apt-get update works) Bridged mode works on my laptop but not on Qubes with the same version of docker. (18.09.1 from docker.io package) I'm new to docker so if I have any misconceptions then please forgive me. I also read this: https://www.qubes-os.org/doc/network-bridge-support/ and am not sure if it is relevant to the situation and if so how I can get it working with that. Thank you.



-- 
You received this message because you are subscribed to the Google Groups "qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/3424181552870329%40iva3-a2a8aac410a1.qloud-c.yandex.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Issue finishing install. after reboot

2019-02-02 Thread New User
So, I've tried looking for an answer and can't find anything. I've tried using 
different settings on Rufus. All the ones that work end with this same issue.

I can install qubes. Mostly. When I get to the part after reboot is where I 
have issues. It tells me something along the lines of being unable to create 
the sys net qube.

Then I press ok and finish and there no way to connect to the internet besides 
an Ethernet connection.

I went to the terminal and did sudo journalctl . I'm going to start putting in 
everything that says failed or error or is just in red. Hopefully there's not 
too much...

Failed to find module 'uniput' line 655

ACPI Error: Field [TBF3] at bit offset/length 188416/196608 exceeds size of 
target buffer (368640 bits) (20170728/dsopcode-235) line 784

ACPI Error: Method parse/execution failed \_SB.PCI0.PEG.VID.GETB, 
AE_AML_BUFFER_LIMIT (20170728/psparse-550) line 785

ACPI Error: Method parse/execution failed \_SB.PCI0.PEG.VID.GETB, 
AE_AML_BUFFER_LIMIT (20170728/psparse-550) line 786

TBD: tbd_open_ex: could not open file /var/lib/xenstored/tbd: No such file or 
directory line 1269

Checking store ... Line 1270

Checking store complete. Line 1276

Error loading modules: Error opening directory '/usr/lib64/udisks2/modules': No 
such file or directory  line 1337

['/usr/bin/qvm-start', 'sys-firewall'] failed:
stdout: ""
stderr: "Cannot connect to qrexec agent for 60 seconds, see 
/var/log/xen/console/guest-sys-net.log for details
"  lines 4829-4832

Can't find send mail at /usr/sbin/send mail, not mailing output line 5170

I don't think I missed anything, but if there's something specific you want me 
looking for...

I'm using a lenovo Thinkpad w530.
I have both legacy and bios enabled with legacy first. Secure boot off.

I did have qubes working at one point, but it crashed last week...I probably 
broke it with my noobishness. This is me trying to just do a fresh install.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/DB6PR0801MB1350119589517E45F72FB5BBC1930%40DB6PR0801MB1350.eurprd08.prod.outlook.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Time Sync Failed and one other problem

2017-03-28 Thread 'qubes-user-000' via qubes-users
I have two problems right now in Qubes.
When I do qubes-dom0-update, the first thing it says is 'Time Sync Failed! - 
Exiting'.
When I do qvm-sync-clock, it says the same thing.
I did timedatectl set-ntp 1 to see if that would fix it, same error.

The other problem also comes up when I run qubes-dom0-update.
Qubes is still downloading updated for Fedora 23 when I've had Fedora 24 for 
months.
I don't have the Fedora 23 template anywhere on the machine (that I know of).
To clarify what I mean, it is NOT installing updates for Fedora 24 (which I am 
using), it is looking for updates for Fedora 23.

I've had many problems since installing the Fedora 24 template but I just 
noticed this one.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a5a56999-dd66-452d-82ff-34c5ebebc9e9%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Turn standalone VM to a template VM

2017-03-21 Thread 'qubes-user-000' via qubes-users
Hello,
I have a Standalone Windows 7 VM that I want to convert to a Template VM so I 
can deploy clones from it like in vSphere Server.

Is there a way to convert an existing Standalone VM to a Template VM?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e356b6d2-9363-4d61-a48d-5f2d2de54ea3%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: epoxy on ram to prevent cold boot attacks?

2017-03-15 Thread thinkpad user
On Wednesday, August 31, 2016 at 8:25:33 PM UTC+4, pixel fairy wrote:
> poured some epoxy over where the ram connects to the motherboard

modern RAM keeps data after hours after disconnecting in from MB. (wont search 
that paper now, plz search on your own). there are also physical traces of RAM 
state on RAM device. thats why some folks are moving keys in RAM(xoring it 
actually) every 10 seconds or so, in their opensource encryption software. 
there is papper on in too, with photo of such physical micro traces. paper also 
explains why RAM manufacturers are trying to keep volts as low as possible.

imo encrypted RAM is more safe. but where to store keys? CPU cache, VRAM? or 
separate PCI device? unsure about speed of PCI vs RAM though. but safe storing 
keys in HW of major, massive vendors is a wrong idea because of obligatory 
unofficial backdooring. maybe it is possible to only encrypt part of RAM with 
PCI located key(original PCI storage device). example: main system is in RAM, 
VM's RAM is encrypted (using driver) and the key is on PCI storage device.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/512950a4-6d96-4698-833d-ccf20ba33f9d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: USG - AFirewall For USB's

2017-03-15 Thread thinkpad user
as far as i understand general method(control everything in data stream), 
adding support for new type of device is difficult, IF such HW firewall is 
connected to HW USB. i recall some device which transfers USB data over LAN, so 
user can connect any USB HW over LAN. by this way it is possible to have 
special VM with fresh state for every USB dev connection. after device is used, 
every possible not wanted effects are gone with the reset of VM. such VM could 
start automatically upon each USB plugin event. there is no real reason also to 
store such mini temp VM in SSD. it can be located in RAM.

i believe Gbit LAN has potential. right now am considering some perverted 
"immortal SSD" idea based on following:
SODIMM CHEAP (used) RAM modules (1,2,4 GB) in few motherboards. RAM disc is 
created in such motherboard upon boot and then shared over Gbit LAN. i believe 
it is possible to make very compact version for notebook(thats what am planning 
to do after i figure out how to connect about 16 RAMs. without having lots of 
notebook motherboards). motherboards are backed up by battery.
how to use: before actual task, the contents of SSD copied to LAN disk. before 
shutdown, HW SSD (or even HDD actually) gets only updated data from this shared 
over LAN RAM disk. on RAM disk user can have VMs. WHY? there are plenty of 
cheap 1 2 4 GB used RAM modules. as far as i can remember RAM module have long 
lifespan. so user actually gets cheap SSD which capacity only gets bigger over 
time. i believe there can be one trusted HW machine and lots of untrusted HW 
devices shared over LAN or SPI. LAN or SPI opensource HW.
LAN speed is just fine unless you want USB display or Kinect.
again: main idea is to transport original HW USB data stream to the emulated 
(Virtual) USB connected to VM, _without firewalling it at all_. using LAN or 
other means.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fb160e8a-c1e5-413b-88f3-b097a2f2d5b1%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Feature request: "HDD Airbag" analog

2017-03-15 Thread thinkpad user
Feature request: "HDD Airbag" analog

overview:
https://support.lenovo.com/nl/en/solutions/ht003517
list of supported devices:
http://support.lenovo.com/nl/en/downloads/ds015000

is it possible to add this feature to Qubes? or atleast provide some interface 
to poweroff/park HDD? yes, Qubes requires SSD for good operation, but imo most 
users like to have SSD + large HDD for media or other content. i believe qubes 
can be really friendly for not so geeky user, by having such features or 
atleast providing support so user could write such soft.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/16be7dee-54e1-404a-9e42-581fba972bb8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Remove menu entries in XFCE on Qubes

2017-02-02 Thread qubes-user-000
My mistake, it was in here > ~/.local/share/applications/
I got rid of it by doing rm fedora-23*
Thanks for the help.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fb834344-e5f8-4d68-8b2b-ebcfc5575cac%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Remove menu entries in XFCE on Qubes

2017-02-02 Thread qubes-user-000
On Wednesday, February 1, 2017 at 1:21:18 PM UTC-5, raah...@gmail.com wrote:
> On Tuesday, January 31, 2017 at 10:36:03 AM UTC-5, qubes-user-000 wrote:
> > I'm trying to remove an entry in the applications menu for fedora 23 that's 
> > still there from when I updated to 24. How can I do this?
> 
> I think its alt f3 to get the editing mode for start menu.

This works to hide it but hidden is still there in a sense. Seems a little 
goofy that there's no way to do this, no?
I understand Qubes has its parts separate intentionally but I think there's a 
problem in some places, like this one; where you aren't able to do something as 
simple as remove a menu entry.
Just my 2c if there really is no way to do this properly.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f844d4ad-0e6e-408c-8554-4e26f362dcf6%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL - Lenovo Thinkpad X250

2016-12-24 Thread thinkpad user
Thanks for sharing the info! Is there any issues left, or everything works fine?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/23b14322-a88d-464c-8108-ab381c968336%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: HCL Lenovo Thinkpad X250 i3-5010U

2016-12-24 Thread thinkpad user
On Friday, March 11, 2016 at 2:45:50 AM UTC+4, Pablo Di Noto wrote:
> So far, everything works as expected

Thanks for sharing info! Have you tested graphics software yet (especially 3d 
editing/games)? Webcam working?
Have any other issues?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/ea6b25ac-780c-4e77-8c97-4f020d6ddbdf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Qubes refuses to boot

2016-12-23 Thread user
On Friday, December 23, 2016 at 2:07:51 PM UTC-5, raah...@gmail.com wrote:
> from windows you can try rawrite32.exe  thats what I use. 
> https://www.netbsd.org/~martin/rawrite32/download.html  might sound like a 
> long shot, but worth a try at least.I have had Qubes usb problems myself 
> cause either bad drive or not enough space.  one time everything worked right 
> and I was just missing a kernel I wanted to install from the repos, or for 
> some reason I had a different default kernel,  and i coudln't figure out why 
> lol.

On Friday, December 23, 2016 at 2:09:06 AM UTC-5, tai...@gmx.com wrote:
> I have had many problems with rufus fucking up linux iso writing.
> 
> Try using dd to write the iso in linux (NOTE: BE VERY CAREFUL - Use 
> /dev/disk/by-id to do writing instead of /dev/sdX or else you could 
> easily nuke your data)
> 
> Whats the model of your laptop you want to install on? I check manual 
> for you to see what is up.

I don't think it's an error with writing the iso to my usb because my other 
(older) laptop can boot from the live usb fine. My main laptop I'm trying to 
boot from is an Alienware M17X (which is on the compatibility list). 

So far, I've tried booting from the live iso and installed qubes with varying 
success. On my Alienware, I can't boot the live iso and get a blinking cursor 
booting the installed qubes. On an old Gateway laptop, I can boot the live iso 
fine, but the installed qubes reboots. Finally, on an old desktop, both the 
live and the installation yield a blinking cursor (with the live's appearing a 
few minutes after selecting from the GRUB menu).

I'm about ready to just give up and wait until Qubes gets broader hardware 
compatibility and stability.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4d189780-eb7e-4ee9-825c-016791bcbe3d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Maybe a provocative question

2016-10-15 Thread QubesOS User
You mentioned some good points about QubesOS. One thing I definitely dislike 
about QubesOS (and that's no offense of course - it's simply unavoidable, and 
of course that's not the developers' fault - in contrast I couldn't imagine how 
they could optimize it even more [maybe one could do so as a user by switching 
from Fedora to a distro template which needs very few ressources despite having 
to run multiple VMs]) is that it consumes a really huge amount of CPU and 
memory, even on modern hardware.

Well, another approach for isolation (not in the way by VMs employed on any 
Linux distro, it's a totally different approach) is GNU Hurd, but it's still 
experimental and only works on QEMU as far as I know (didn't follow it for 
quite a while). However, those guys are really enthusiastic as well and maybe 
that could be another promising approach someday.


Yes, if the NSA etc. really wouldn't be able to break into your QubesOS system, 
then they'll certainly have plenty of other means to gain access to your data 
(refer to the NSA-ANT catalogue, papers about key strokes and radio sginal 
interception etc.).

No, I don't agree to your last paragraph. Any well-configured Linux distro plus 
a good firewall (pfsense etc.) / router (like Turris Omnia) will prevent any 
(super professional) hacker from breaking into your system, if you set up 
everything in the best possible way AND choose the right (open-source) hardware.


Kind regards and all the best


16.10.2016, 03:47, "raahe...@gmail.com" <raahe...@gmail.com>:
> On Saturday, October 15, 2016 at 9:16:52 PM UTC-4, QubesOS User wrote:
>>  16.10.2016, 01:03, "raahe...@gmail.com" <raahe...@gmail.com>:
>>  > On Saturday, October 15, 2016 at 5:09:46 PM UTC-4, QubesOS User wrote:
>>  >>  Hello everyone,
>>  >>
>>  >>  I could imagine that this question has been discussed before already, 
>> and if this should be the case, then I'm very sorry for posting this (I'd be 
>> thankful for an according link if so though).
>>  >>
>>  >>  I think that I've gained quite much knowledge about possible attack 
>> surfaces provided on hardware and software level during the last 15 years, 
>> trying to keep up-to-date and often doing research on new approaches in this 
>> field. First of all, I'd like to stress that the 'objection' (which I don't 
>> mean as such) I may raise by this post does not have any intention of 
>> criticizing the great work and effort done by the QubesOS developers and the 
>> community (it's not meant as an unhelpful 'critique' at all). Much rather I 
>> have a huge respect for the commitment shown by everyone involved in the 
>> development of QubesOS.
>>  >>
>>  >>  Having compared various approaches in this field (e. g. OpenBSD, Linux 
>> using a hardened security kernel, GNU Hurd), I'd basically come to the 
>> conclusion that QubesOS is the most promising approach, especially if VT-d 
>> isolation is available.
>>  >>
>>  >>  However, the main points I'd like to address are:
>>  >>
>>  >>  1) XEN is developed by people working for a company based in the U.S. 
>> (I know the difference between open-source and proprietary software, but 
>> still they belong to the same team/company). If even developers of TrueCrypt 
>> received one of those 'blue letters' - What is the reason to assume that the 
>> XEN developers didn't receive one of those as well? Seen from the 
>> perspective of the NSA it looks totally odd and irrational to me if they 
>> would not to so, since they can do so, and it's their task to thwart any 
>> efforts which might hinder them from collecting data. I don't regard those 
>> people as being 'evil' or anything like that (nor do I regard this as being 
>> positive, which should go without saying), I just look at things in a 
>> rational way: If QubesOS is a great approach to ensure security, then one 
>> must be naive to assume that this won't automatically lead to classifiying 
>> this as a 'high priority target' - With all the consequences.
>>  >>
>>  >>  1.2) Since this looks so obvious to me: Why isn't it a top priority for 
>> QubesOS developers to make use of a supervisor (or develop an independent 
>> one, which would surely need endless efforts, but wouldn't it be worth it?), 
>> which is not subjected to the objections I tried to express?
>>  >>
>>  >>  2) QubesOS totally relies on 2.1) trusting XEN developers to completely 
>> understand the more than just complex x64 architecture being used today and 
>> 2.2) on trusting Intel's VT technology.
>>  >>  Regarding 2.2): Just assuming Intel would hav

Re: [qubes-users] Re: Maybe a provocative question

2016-10-15 Thread QubesOS User


16.10.2016, 01:03, "raahe...@gmail.com" <raahe...@gmail.com>:
> On Saturday, October 15, 2016 at 5:09:46 PM UTC-4, QubesOS User wrote:
>>  Hello everyone,
>>
>>  I could imagine that this question has been discussed before already, and 
>> if this should be the case, then I'm very sorry for posting this (I'd be 
>> thankful for an according link if so though).
>>
>>  I think that I've gained quite much knowledge about possible attack 
>> surfaces provided on hardware and software level during the last 15 years, 
>> trying to keep up-to-date and often doing research on new approaches in this 
>> field. First of all, I'd like to stress that the 'objection' (which I don't 
>> mean as such) I may raise by this post does not have any intention of 
>> criticizing the great work and effort done by the QubesOS developers and the 
>> community (it's not meant as an unhelpful 'critique' at all). Much rather I 
>> have a huge respect for the commitment shown by everyone involved in the 
>> development of QubesOS.
>>
>>  Having compared various approaches in this field (e. g. OpenBSD, Linux 
>> using a hardened security kernel, GNU Hurd), I'd basically come to the 
>> conclusion that QubesOS is the most promising approach, especially if VT-d 
>> isolation is available.
>>
>>  However, the main points I'd like to address are:
>>
>>  1) XEN is developed by people working for a company based in the U.S. (I 
>> know the difference between open-source and proprietary software, but still 
>> they belong to the same team/company). If even developers of TrueCrypt 
>> received one of those 'blue letters' - What is the reason to assume that the 
>> XEN developers didn't receive one of those as well? Seen from the 
>> perspective of the NSA it looks totally odd and irrational to me if they 
>> would not to so, since they can do so, and it's their task to thwart any 
>> efforts which might hinder them from collecting data. I don't regard those 
>> people as being 'evil' or anything like that (nor do I regard this as being 
>> positive, which should go without saying), I just look at things in a 
>> rational way: If QubesOS is a great approach to ensure security, then one 
>> must be naive to assume that this won't automatically lead to classifiying 
>> this as a 'high priority target' - With all the consequences.
>>
>>  1.2) Since this looks so obvious to me: Why isn't it a top priority for 
>> QubesOS developers to make use of a supervisor (or develop an independent 
>> one, which would surely need endless efforts, but wouldn't it be worth it?), 
>> which is not subjected to the objections I tried to express?
>>
>>  2) QubesOS totally relies on 2.1) trusting XEN developers to completely 
>> understand the more than just complex x64 architecture being used today and 
>> 2.2) on trusting Intel's VT technology.
>>  Regarding 2.2): Just assuming Intel would have received some kind of 
>> 'advice' (they may even find motivation without getting such - I certainly 
>> don't think that Intel is an 'NSA subcontractor', but they are simply a big 
>> and profit-orientated company, not an idealistic open-source community like 
>> the QubesOS developers etc.) - Then how realistic is it that an absolutely 
>> professionally designed and implemented backdoor etc. as the result of sheer 
>> endless human, technological and financial ressources gets discovered by 
>> people like the QubesOS community, no matter how enthusiastic, intelligent, 
>> cautious and sceptical those are?
>>
>>  Referring once again to 2.1) I'd like to point to and quote from a highly 
>> interesting Qubes Security Bulletin 
>> (https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-018-2015.txt):
>>  "2) We are not entirely convinced if the way Xen Security Team decided to 
>> address this vulnerability is really optimal, security wise. It seems like a 
>> more defensive approach would be to get rid of this
>>  dangerous construct of reusing the same memory for both an internal pointer 
>> and VM-provided data. Apparently Xen developers believe that they can fully 
>> understand the code, with all its execution paths, for decoding x86 
>> operands. This optimistic attitude seems surprising, given the very bug 
>> we're discussing today."
>>  [One should read the whole bulletin to know the context, but I didn't want 
>> this to become too long.]
>>
>>  One might also like to take a look at this bulletin, which gives me, among 
>> other XEN-related informations and facts, the strong impression that seeking 
&g

[qubes-users] Maybe a provocative question

2016-10-15 Thread QubesOS User
Hello everyone,

I could imagine that this question has been discussed before already, and if 
this should be the case, then I'm very sorry for posting this (I'd be thankful 
for an according link if so though).


I think that I've gained quite much knowledge about possible attack surfaces 
provided on hardware and software level during the last 15 years, trying to 
keep up-to-date and often doing research on new approaches in this field. First 
of all, I'd like to stress that the 'objection' (which I don't mean as such) I 
may raise by this post does not have any intention of criticizing the great 
work and effort done by the QubesOS developers and the community (it's not 
meant as an unhelpful 'critique' at all). Much rather I have a huge respect for 
the commitment shown by everyone involved in the development of QubesOS.


Having compared various approaches in this field (e. g. OpenBSD, Linux using a 
hardened security kernel, GNU Hurd), I'd basically come to the conclusion that 
QubesOS is the most promising approach, especially if VT-d isolation is 
available.


However, the main points I'd like to address are:

1) XEN is developed by people working for a company based in the U.S. (I know 
the difference between open-source and proprietary software, but still they 
belong to the same team/company). If even developers of TrueCrypt received one 
of those 'blue letters' - What is the reason to assume that the XEN developers 
didn't receive one of those as well? Seen from the perspective of the NSA it 
looks totally odd and irrational to me if they would not to so, since they can 
do so, and it's their task to thwart any efforts which might hinder them from 
collecting data. I don't regard those people as being 'evil'  or anything like 
that (nor do I regard this as being positive, which should go without saying), 
I just look at things in a rational way: If QubesOS is a great approach to 
ensure security, then one must be naive to assume that this won't automatically 
lead to classifiying this as a 'high priority target' - With all the 
consequences.

1.2) Since this looks so obvious to me: Why isn't it a top priority for QubesOS 
developers to make use of a supervisor (or develop an independent one, which 
would surely need endless efforts, but wouldn't it be worth it?), which is not 
subjected to the objections I tried to express?

2) QubesOS totally relies on 2.1) trusting XEN developers to completely 
understand the more than just complex x64 architecture being used today and 
2.2) on trusting Intel's VT technology.
Regarding 2.2): Just assuming Intel would have received some kind of 'advice' 
(they may even find motivation without getting such - I certainly don't think 
that Intel is an 'NSA subcontractor', but they are simply a big and 
profit-orientated company, not an idealistic open-source community like the 
QubesOS developers etc.) - Then how realistic is it that an absolutely 
professionally designed and implemented backdoor etc. as the result of sheer 
endless human, technological and financial ressources gets discovered by people 
like the QubesOS community, no matter how enthusiastic, intelligent, cautious 
and sceptical those are?

Referring once again to 2.1) I'd like to point to and quote from a highly 
interesting Qubes Security Bulletin 
(https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-018-2015.txt):
"2) We are not entirely convinced if the way Xen Security Team decided to 
address this vulnerability is really optimal, security wise. It seems like a 
more defensive approach would be to get rid of this
dangerous construct of reusing the same memory for both an internal pointer and 
VM-provided data. Apparently Xen developers believe that they can fully 
understand the code, with all its execution paths, for decoding x86 operands. 
This optimistic attitude seems surprising, given the very bug we're discussing 
today."
[One should read the whole bulletin to know the context, but I didn't want this 
to become too long.]

One might also like to take a look at this bulletin, which gives me, among 
other XEN-related informations and facts, the strong impression that seeking an 
alternative hyperadvisor should have higest priority for the QubesOS 
development (believe me, I'd more than like to contribute to doing so by 
myself, too, and if I shold be able to aquire the necessary skills, I'll 
definitely try to do so):
https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-024-2016.txt
"A more radical reader might be of the opinion that we should completely 
replace Xen with some other hypervisor. Such an opinion is surely not 
unfounded, as we have previously expressed our disappointment in the Xen 
security process [5]. Sadly, not much has improved over the past several 
months. Moreover, even though Qubes is now based on a hypervisor-abstracting 
architecture ("Odyssey"), which should make switching to a different VMM a 
relatively easy task, the primary problem that 

Re: [qubes-users] feature request: luksAddNuke

2016-07-05 Thread thinkpad user
On Tuesday, February 17, 2015 at 3:17:08 PM UTC+4, Andrew wrote:
> (and only ever work on clones of your disk).

this will work only with clones of _not corrupted_ data.
ofcourse user can have special method of destroying data, but having such extra 
method encapsulates key data nature (location of headers, ...) from user.

if user somehow has low tech knowledge level, it should design and develop 
tools for traceless data destruction, if failed to find existing. R isnt fast 
and easy task.

> Even if you encountered such a miraculously dumb government, you might
> still be exposing yourself to criminal liability (or worse) for
> knowingly causing the destruction.

only in case of provable intentional destruction

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b3c876c2-0568-4500-9e7f-f52c8feb99e8%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] how to run Windows quest vm in Qubes on hw without required features (vt-d)?

2016-07-05 Thread thinkpad user
more specific - Lenovo Y580 is listed in hcl as having no proper hw 
features.(vt-d)

what for?
1) using Qubes instead of non-hypervisor based OS is more safer, even 
without features like hardware virtualization. .
2) using hypervisor is more convenient than using virtualization soft like 
VirtualBox

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5f2547cd-b9ad-472b-9bf1-d5aef957b4be%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.