On 2/11/21 6:06 AM, Peter Todd wrote:
> I'd like to see btrfs added for its checksums as well. I've personally had
> `btrfs scrub` catch hardware problems before more data got silently corrupted.
It isn't default but is official supported [1]. The only problem is that
it could be a little tricky i
On 2/5/21 5:24 PM, Jinoh Kang wrote:
> Possible solutions would be:
>
> - Patch dm-thin. Now to implement this properly, dm-thin must first
> slice the range, have it ref'd somewhere and then issue discards (so
> that it can handle power disruptions).
> - Switch to reflinks. BTRFS has been ar
On 12/12/20 4:36 PM, Demi M. Obenour wrote:
> Thunderbird states that the signature on this message was not properly
> signed, FYI. Thunderbird bug?
>
Same here. Your mail also reports same error :\
--
You received this message because you are subscribed to the Google Groups
"qubes-devel" gro
WoW,
It is really nice to have someone working on this!
On 2020-08-01 17:39, Jason M wrote:
>
>
> One thing to consider is also enabling memory deduplication in KVM
> (KSM). This should nicely save memory when running multiple similar
> VMs,
> but at the same time is risky in li
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2020-03-29 14:55, unman wrote:
>> What you mean with Template manager? If you refer to the
>> "Template Manager" integrated with Qubes Manager, I am working on
>> a rewrite of Qube Manager using QT model/view which simplifies
>> things like multip
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 2020-03-28 18:49, 黃于軒 wrote:
> Hi.
>
> I am William Huang, an undergrad studying at National Taiwan
> University. I have had experience with Qubes OS and (albeit
> limited) interactions on the mailing lists (under the handle
> WillyPillow) since t
On 9/10/19 3:07 PM, Private Name wrote:
>
>
> Okay great, thank you again! One last question please: Do you know if the
> password can be changed without a disc or external drive but just through
> accessing the emergency mode as shown in my original post?
>
You can't fix this without bootin
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 4/3/19 4:15 PM, Marek Marczykowski-Górecki wrote:> You're correct.
Right now the only way to restore to a specific pool is
> to switch the default before restoring. But you can do that
> multiple times, for example:
>
> 1. qubes-prefs default_poo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi,
I would like to switch a 512GB hard disk with a new 2TB and I think I
will do a full reinstall with a backup restore.
For this purpose, it would be nice to have some method for specify
where restore each qube. Currently qvm-backup-restore says:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 12/9/18 4:38 PM, Chris Laprise wrote:
> 'Sparsebak'
>
> Fast Time Machine-like disk image backups for Qubes OS and Linux
> LVM.
>
>
> Introduction
>
> Sparsebak is aimed at incremental backup management for logical
> volumes. The
10 matches
Mail list logo