If i am so smart to check this whole code i probobly work in NASA or CERN.I
dont have so much skills ,i just ask.OK so its secure system for desktop.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
On Sun, Oct 9, 2016 at 1:39 AM, wrote:
> I didnt done anything wrong just my computer start to different being like
> alice in chains or smth... i wonder could it might be some blue pill
> backdoor inside this OS.
>
>
Perhaps it is the phantom you evoked in your email image.
I didnt done anything wrong just my computer start to different being like
alice in chains or smth... i wonder could it might be some blue pill backdoor
inside this OS.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this
I realy think about it bcs after install it that OS my computer get rid into
strange behavior,boot screen took 20 sec insted 5 sec and connected devices
work or not work.This is strange.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-08 07:23, m.j.p@gmail.com wrote:
> hello, i'm just starting with qubes and wanted to have vm with intellij
> installed.
>
> i've choosen hvm to have my working apps only on one vm than via template.
> so i run these command:
>
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2016-10-08 01:14, Shakthi Kannan wrote:
> Hi,
>
> I have installed Qubes 3.1 on a Lenovo E460 with VT-d enabled in the
> BIOS. Also, booting with "Legacy only" and "Secure boot" disabled.
>
> (I initially tried with 3.2, but, after loading
This was with Qubes 3.2.
So far everything works phenomenally well. I had trouble getting VPN going
on v3.1 but it started up no problems on 3.2.
Sleep hangs *occasionally* but works mor often than not.
haven't tried hibernate.
networking hardware buttons etc all recognized from the start.
so
On 10/08/2016 07:05 PM, Ilpo Järvinen wrote:
> On Sat, 8 Oct 2016, neilhard...@gmail.com wrote:
>
>> DMA allows network card to read/write RAM.
>>
>> DMA attack allows one already-compromised VM to read the RAM of another
>> VM, thus breaching Qubes isolation... unless you use VT-D, although
>>
Is it possible at all to create a new VM or HVM from a Virtualbox .ova file?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Sat, 8 Oct 2016, neilhard...@gmail.com wrote:
> DMA allows network card to read/write RAM.
>
> DMA attack allows one already-compromised VM to read the RAM of another
> VM, thus breaching Qubes isolation... unless you use VT-D, although
> flaws in VT-D have been shown.
>
> Remote DMA
DMA allows network card to read/write RAM.
DMA attack allows one already-compromised VM to read the RAM of another VM,
thus breaching Qubes isolation... unless you use VT-D, although flaws in VT-D
have been shown.
Remote DMA attack allows packets sent to the network card directly over the
Dear Qubes Users,
first of all I would thank the developers for this great peace of
software! It (3.2) works on two Laptops and now I made the step to
install it on the "main"-PC. Very unfortunate suspend-to-ram does not
work ... really. Maybe someone has a cure for this unfortunate
behaviour.
On 10/08/2016 04:36 PM, neilhard...@gmail.com wrote:
> I've been going through some of the networking modules on my Qubes system.
> [...]
>
Let's start from the beginning.
Can you explain to us how a DMA attack works?
--
Rudd-O
http://rudd-o.com/
--
You received this message because
Which options exist to copy files in and out Qubes HVMs?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to
hello, i'm just starting with qubes and wanted to have vm with intellij
installed.
i've choosen hvm to have my working apps only on one vm than via template.
so i run these command:
qvm-start test --cdrom=work-net:/home/Downloads/mint.iso
and got these errors:
--> Loading the VM (type =
On Thursday, May 26, 2016 at 8:10:01 AM UTC-4, gaikokuji...@gmail.com wrote:
> As I haven't managed to elicit any responses from my previous post
> (https://groups.google.com/forum/#!topic/qubes-users/Hp-lOV-jdvU the output
> from my rdsosreport can be found there) I thought I'd try giving more
On 10/07/2016 11:25 PM, neilhard...@gmail.com wrote:
> OK. This is getting confusing.
>
> So you are now saying that you can't do a DMA attack over the web..?
>
> If I had one computer connected to another via Ethernet crossover, could one
> computer infect the other via DMA by sending the DMA
OK, so we've gone from not do-able remotely, to "may or may not be possible",
and "this is hard"
Are there any proven such attacks on Ethernet? Any proof of concepts?
Also, would USB Ethernet make this attack any easier..? Something like a USB
Ethernet dongle?
http://i.imgur.com/l5ntqFe.jpg
OK, so we've gone from not do-able remotely, to "may or may not be possible",
and "this is hard"
Are there any proven such attacks on Ethernet? Any proof of concepts?
Also, would USB Ethernet make this attack any easier..? Something like a USB
Ethernet dongle?
http://i.imgur.com/l5ntqFe.jpg
Hi,
I have installed Qubes 3.1 on a Lenovo E460 with VT-d enabled in the
BIOS. Also, booting with "Legacy only" and "Secure boot" disabled.
(I initially tried with 3.2, but, after loading initrd.img, the boot
messages proceeded until "Dom0 has 2 CPUS" and the installer failed to
start.)
Couple
20 matches
Mail list logo