This Chromebook has been modified by install Coreboot from John Lewis.
https://johnlewis.ie/custom-chromebook-firmware/rom-download/
I also added 16GB of RAM and an SSD 480 GB Hard Drive. All seems to be
working well.
--
Regards,
Paul
about.me/pauljamesharper
GnuPG Fingerprint: B3C2 6A80
On 16/07/28 20:25, Chris Laprise wrote:
On 07/27/2016 04:27 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-26 20:01, Chris Laprise wrote:
On 07/26/2016 08:45 PM, el...@tutanota.com wrote:
What is best way to verify our system supports these things?
I
A fileVM would be a mountable filesystem that 2 or more AppVMs can share.
A fileVM could be a normal partition like MSDOS/FAT32, an encrypted filesystem,
or even a distributed or cloud filesystem.
There are numerous uses for this, for example, installing Dropbox on a Linux
AppVM and sharing
Hi there.
I want to get networking on Dom0... I know everything you are going to say... I
use qubes for investigate, I dont have ANY sensitive data, and I want to use
Qubes, not another OS.
I need to get a program that uses internet and 3D. As I have only one video
card (passtrougth is
On Thu, Jul 28, 2016 at 8:00 PM, Steve Coleman
wrote:
> On 07/26/2016 06:25 PM, Franz wrote:
>
>>
>>
>> On Tue, Jul 26, 2016 at 11:38 AM, Steve Coleman
>> > wrote:
>>
>> Another hack to avoid having to
On 07/27/2016 04:27 PM, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-26 20:01, Chris Laprise wrote:
On 07/26/2016 08:45 PM, el...@tutanota.com wrote:
What is best way to verify our system supports these things?
I think you can also check out the
Thank you guys, great work.
Just a little side note, yesterday when I updated it seemed to break my window
borders in KDE. I am now using XFCE and all seems fine.
I have not tried KDE again today, just trying to get use to XFCE now as that is
your focus now.
--
You received this message
El jueves, 25 de febrero de 2016, 23:26:21 (UTC-3), Nom escribió:
> Is there anyway to get networking on Dom0 to work?
>
> Before everyone screams "UNACCEPTABLE!", (Don't pretend you weren't going
> to). I know it doesn't fit the security model of the OS. But my threat model
> - quite
On 07/26/2016 06:25 PM, Franz wrote:
On Tue, Jul 26, 2016 at 11:38 AM, Steve Coleman
> wrote:
Another hack to avoid having to manually type in the addresses is
done with the attached script. Its like Mareks solution, but does
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jul 28, 2016 at 03:31:12PM -0300, Desobediente wrote:
> What that option means is to not actually create a new "sys-usb" qube to
> handle the USB controllers, but rather use the already existing "sys-net"
> qube to handle the USB
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jul 28, 2016 at 03:05:59PM -0700, neilhard...@gmail.com wrote:
> Based on 2 Xen exploits in just the last 1 year, QUBES 4.0 is moving over to
> using SLAT / EPT for memory isolation, and to using HVM/PVH rather than PV.
>
> Certainly, in
Based on 2 Xen exploits in just the last 1 year, QUBES 4.0 is moving over to
using SLAT / EPT for memory isolation, and to using HVM/PVH rather than PV.
Certainly, in the last 2 Xen exploits, it has only affected PV and not HVM.
However, is it possible that using Intel's EPT is even riskier..?
On 07/28/2016 08:43 PM, neilhard...@gmail.com wrote:
OK thanks for the explanation.
Let me follow up with another question.
Do I need to create a USB qube in order to take advantage of the VT-D/IOMMU
protection for my internal WiFi chip... or is sys-net OK in that regard..?
Hi Neil,
In my
I'm having the worst time trying to get my wireless drivers working and am
wondering if there is a wireless card that works out of the box? With out the
need to download any drivers as I'm using my phone as a hotspot to access the
net.
--
You received this message because you are subscribed
I'd like to add that I also use CIDR notation for the firewall rules, in
addition to the name rules, and it works in most cases.
Sometimes some services change their addresses, but the time consumed to
add new entries is not relevant.
I use the 'dig' tool to find out in which block they are.
On Wed, Jul 27, 2016 at 5:35 PM, R.B. wrote:
> On 07/27/2016 12:25 AM, Franz wrote:
>
>>
>>
>> On Tue, Jul 26, 2016 at 11:38 AM, Steve Coleman
>> > wrote:
>>
>> Another hack to avoid having to manually type in
OK thanks for the explanation.
Let me follow up with another question.
Do I need to create a USB qube in order to take advantage of the VT-D/IOMMU
protection for my internal WiFi chip... or is sys-net OK in that regard..?
--
You received this message because you are subscribed to the Google
What that option means is to not actually create a new "sys-usb" qube to
handle the USB controllers, but rather use the already existing "sys-net"
qube to handle the USB controllers.
Since the "sys-net" qube already handles networking, the option states
"both networking and USB devices".
Having
I am installing QUBES 3.2 to a new laptop.
With the 1st option:
[X] "Create a USB qube holding all USB controllers (sys-usb) [experimental]"
There is then a 2nd option underneath:
[ ] "Use sys-net qube for both networking and USB devices"
Is it recommended to check the box for the 2nd option
Does this come with the newest Xen patch after the exploit yesterday?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
[Solved]
Yum crashed because there's no more RAM. Include sys-firewall in memory
balancing solved this problem.
However "No updates available" is bit confusing.
Regards
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
Okey,
I did step by step (I hope every needed line) in quebes-dom0-update and on
sys-firewall.
Finally I runned yum and... some packages are checked and sys-firewall lagged
for a while. After all it looks like that:
http://pastebin.com/0SnJZh7M
It seems like qubes-download-dom0-updates.sh
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Details here:
https://www.qubes-os.org/news/2016/07/28/qubes-OS-3-2-rc2-has-been-released/
As usual, you can download new image from:
https://www.qubes-os.org/downloads/
Users of R3.2 rc1 can just install updates, no need for full reinstall.
For
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, Jul 28, 2016 at 09:44:46AM +0200, donoban wrote:
>
> On 28/07/16 09:42, admix...@gmail.com wrote:
> > Apart from the dom0 update, there is a something nasty in quebes-os
> > debian jessie repository (debian-8, whonix-ws and gw):
> >
> > W:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Jul 27, 2016 at 10:31:10PM -0700, admix...@gmail.com wrote:
> Hi,
> I'm trying to update qubes but there still show that there is no updates (for
> few moths).
> I thought that was true until I tried to download update for xen.
>
> Some
> On July 28, 2016 at 10:43 AM ab0f1...@opayq.com wrote:
>
> On Thursday, 28 July 2016 11:39:24 UTC+3, Andrew David Wong wrote:
>
> > I don't think that's what he's saying. I think he's just pointing out that
> > it
> > can be very problematic. It's still worth trying if you have an AMD rig,
>
Ok, maybe, but...
I've got xen-4.6.0-13.fc20.x86_64 (rpm -qa | grep xen) instead of the new
version mentioned in *-devel forum:
http://yum.qubes-os.org/r3.1/current/dom0/fc20/rpm/xen-4.6.1-20.fc20.x86_64.rpm
and qubes-dom0-update report always "No new updates available"
I've tried run with
On Thursday, 28 July 2016 12:57:43 UTC+3, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-07-28 01:43, ab0f1...@opayq.com wrote:
> > On Thursday, 28 July 2016 11:39:24 UTC+3, Andrew David Wong wrote:
> >> I don't think that's what he's saying. I think
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-07-28 01:43, ab0f1...@opayq.com wrote:
> On Thursday, 28 July 2016 11:39:24 UTC+3, Andrew David Wong wrote:
>> I don't think that's what he's saying. I think he's just pointing out
>> that it can be very problematic. It's still worth trying
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 28/07/16 11:13, Marek Marczykowski-Górecki wrote:
> Should be ok now.
>
Perfect, thanks Marek.
-BEGIN PGP SIGNATURE-
Version: GnuPG v2
iQIcBAEBCAAGBQJXmc/cAAoJEBQTENjj7Qil27EP/j2j0vZdIin0lw1KRQxQz5CO
El jueves, 28 de julio de 2016, 10:24:10 (UTC+2), randal...@gmail.com escribió:
> I cant get my bcm4360 drivers to install properly and when I paste the code
> into sys-net terminal I get this error. please help me out thanks!
>
>
> [user@sys-net ~]$ wget http://git.io/vuLC7 -v -O
>
I've even turned off secure boot, but it still gives me the WL error.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
I've even turned off secure boot, but it still gives me the WL error.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
On Tuesday, 20 August 2013 21:12:12 UTC+3, Eric Shelton wrote:
> VT-d, which provides IOMMU services, is a very important feature for
> realizing the security promises of Qubes OS. Without it, although the CPU
> isolates VMs, their memory lies open to relatively easy DMA-based attacks,
> with
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 28/07/16 09:42, admix...@gmail.com wrote:
> Apart from the dom0 update, there is a something nasty in quebes-os
> debian jessie repository (debian-8, whonix-ws and gw):
>
> W: Failed to fetch
>
35 matches
Mail list logo