On 18/01/2017 06:27, Asterysk wrote:
> It struck me that Qubes could be very useful for Detection of "malware" by
> placing a monitoring capability . My question is in two parts:
>
> (1) Is Wireshark the best tool to use for this within Qubes
> (2) Should it be placed in Dom 0 (if indeed thats pos
> Sorry to resurrect this thread. The link above doesn't really help (probably
> because I'm a newbie and missing some solid background in linux and xen).
> Here's the driver I'm trying to install -
> https://01.org/linuxgraphics/downloads
> (intel-linux-graphics-installer-1.4.0-23.intel20161.x
On 2017-01-18 04:35, raahe...@gmail.com wrote:
On Friday, January 13, 2017 at 9:03:03 PM UTC-5, Gaijin wrote:
All of the audio for videos played on my AppVMs, regardless of what
template it's based on (Fedora 24/Debian 8), or what browser I try
(Firefox/Chrome/Vivaldi), is completely out of sync
It struck me that Qubes could be very useful for Detection of "malware" by
placing a monitoring capability . My question is in two parts:
(1) Is Wireshark the best tool to use for this within Qubes
(2) Should it be placed in Dom 0 (if indeed thats possible) or in the sys-net
or sys-firewall
--
On Friday, January 13, 2017 at 9:03:03 PM UTC-5, Gaijin wrote:
> All of the audio for videos played on my AppVMs, regardless of what
> template it's based on (Fedora 24/Debian 8), or what browser I try
> (Firefox/Chrome/Vivaldi), is completely out of sync. It's not just
> YouTube, but Vimeo, sel
On Saturday, January 14, 2017 at 9:03:15 AM UTC-5, Pushpins4u wrote:
> Forwarding to list.
>
>
>
>
>
> copy the file to some other untrusted or disposablevm and see if it works
> there.
>
>
>
> That gave a clue. Copying the untrusted PDF to my untrusted domain and
> attempting the conver
On Saturday, January 14, 2017 at 10:43:35 AM UTC-5, B&B wrote:
> Hello, for starters, pardon my ignorance, I am at the very beginning of the
> learning curve.
> I am planning out a new workstation build, I want to plan it out with Qubes
> in mind. But I have few questions, as I do not have a Qube
On Tuesday, January 17, 2017 at 11:26:27 PM UTC-5, raah...@gmail.com wrote:
> On Saturday, January 14, 2017 at 12:15:17 PM UTC-5, Arnulf Maria Bultmann
> wrote:
> > > > did you try this? You can remove cached packages by executing 'dnf
> > > > clean packages'
> > >
> > > Yes I tried it several
On Saturday, January 14, 2017 at 12:15:17 PM UTC-5, Arnulf Maria Bultmann wrote:
> > > did you try this? You can remove cached packages by executing 'dnf clean
> > > packages'
> >
> > Yes I tried it several times with the same result
>
> I solved my problem by downloading the rpm in a appvm and
On Saturday, January 14, 2017 at 2:20:23 PM UTC-5, tai...@gmx.com wrote:
> On 01/14/2017 12:15 PM, qmaster...@gmail.com wrote:
>
> > суббота, 14 января 2017 г., 5:01:34 UTC-5 пользователь Chris Willard
> > написал:
> >> Hello All,
> >>
> >> I am using my on-board video but only getting 1024x768
On Monday, January 16, 2017 at 11:57:30 AM UTC-5, Doug Hill wrote:
> Recently two appvms refused to start, reporting that:
>
> VM: VM kernel does not exist: /var/lib/qubes/vm-kernels/4.4.12-9/vmlinuz
>
> Qubes Manager shows the kernel is set to 4.4.38-11.
>
> Using 'qvm-prefs myappvm -s kernel 4
On Monday, January 16, 2017 at 2:38:40 PM UTC-5, Alex wrote:
> Has it ever been considered a feature the fact that all of the activity
> of a user in Qubes OS happens in a VM, from the point of view that a lot
> of malware has anti-debugging features that usually alter their
> behaviour when they d
On Thursday, December 29, 2016 at 6:13:34 PM UTC-5, superlative wrote:
> On Thursday, December 22, 2016 at 7:34:55 PM UTC-8, raah...@gmail.com wrote:
> > you will have to print from a sys-usb qubes then most likely if using usb.
> > the template you install printer drivers to is that one. You can
On Tuesday, January 17, 2017 at 5:30:38 PM UTC-5, Hariharan Gopalan wrote:
> Hello Group
>
> I am getting the following error while trying to install qubes-windows-tools:
>
> [1848:184C][2017-01-17T22:22:27]i299: Plan complete, result: 0x0
> [1848:184C][2017-01-17T22:22:27]i300: Apply begin
> [18
On Tuesday, January 17, 2017 at 11:18:06 PM UTC+4, qmast...@gmail.com wrote:
> вторник, 17 января 2017 г., 10:16:18 UTC-5 пользователь steve@gmail.com
> написал:
> > On Saturday, January 14, 2017 at 3:26:04 PM UTC+4, qmast...@gmail.com wrote:
> > > 26 December 2016 г., 18:00:43 UTC-5 tai...@gm
On Tuesday, January 17, 2017 at 6:20:38 AM UTC-8, adoni...@gmail.com wrote:
> On Tuesday, January 17, 2017 at 6:13:20 AM UTC-5, J. Eppler wrote:
> > Hello,
> >
> > the better way is to create Kali template or standalone VM. Here is the
> > guide:
> > https://www.qubes-os.org/doc/pentesting/kali/
Original Message
Subject: Re: [qubes-users] Network hardware not recognized in Debian-based NetVM
Local Time: January 11, 2017 5:26 PM
UTC Time: January 11, 2017 10:26 PM
From: a...@qubes-os.org
To: Joshua Bashir Gabriel ,
qubes-users@googlegroups.com
-BEGIN PGP SIGNED MESS
Dear Rusty,
Thank you very much! I did try the text secret, however without success.
What I did notice is, that there might be interference with cryptsetup. As long
as I have AEM on, the system does ask for the TPM password, does not show the
secret and does NOT ask for the disk password before
Hello Group
I am getting the following error while trying to install qubes-windows-tools:
[1848:184C][2017-01-17T22:22:27]i299: Plan complete, result: 0x0
[1848:184C][2017-01-17T22:22:27]i300: Apply begin
[1848:184C][2017-01-17T22:23:02]e000: Error 0x800700e8: Failed to wait for
child to connect
Dan Wilson wrote:
>
> I don't see the menu item "Boot from device" as described in the link
> https://www.qubes-os.org/doc/uefi-troubleshooting/
>
> Please suggest a way to get past the BIOS boot loop and install Qubes R3.2
> on my Lenovo T450.
It sounds like you aren't getting to the GRUB menu.
Thanks answering.
I'll try with Refind, and let you know.
But as speaking of my issue someone told me too that my p may be too old for
that (no VT-d afaik), anyway i'll check the cpu and MB specs.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group
вторник, 17 января 2017 г., 10:16:18 UTC-5 пользователь steve@gmail.com
написал:
> On Saturday, January 14, 2017 at 3:26:04 PM UTC+4, qmast...@gmail.com wrote:
> > 26 December 2016 г., 18:00:43 UTC-5 tai...@gmx.com написал:
> > > Lenovo is a shitty company if you care about security, they have
17. Jan 2017 00:31 by spfmcgu...@gmail.com:
> What steps did you do before this step? Did you create the HVM using
> qvm-create?
>
> Have you referenced the Docs page for setting up Kali?
> https://www.qubes-os.org/doc/pentesting/kali
I followed https://www.qubes-os.org/doc/pentesting/kali/#
On Tuesday, January 17, 2017 at 7:32:08 PM UTC+3, Opal Raava wrote:
> On Tuesday, January 17, 2017 at 10:23:15 AM UTC+1, daltong defourne wrote:
> > Well, first, the good thing:
> > Dual head windows HVM booted without issue.
> >
> > (Qubes proper is also working with the second monitor and extend
On Tuesday, January 17, 2017 at 12:17:32 PM UTC-5, J. Eppler wrote:
> Hello,
>
> try the following:
>
> 1) select the VM you want to upgrade in Qubes OS manager
> 2) do a right click and select VM settings
> 3) switch to the Firewall rules tab
> 4) enable allow full access for x minutes
>
> try
Hello,
try the following:
1) select the VM you want to upgrade in Qubes OS manager
2) do a right click and select VM settings
3) switch to the Firewall rules tab
4) enable allow full access for x minutes
try to upgrade again.
--
You received this message because you are subscribed to the Googl
Hello,
I have the same issue.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qu
On Tuesday, January 17, 2017 at 10:23:15 AM UTC+1, daltong defourne wrote:
> Well, first, the good thing:
> Dual head windows HVM booted without issue.
>
> (Qubes proper is also working with the second monitor and extending the qubes
> desktop to it, all fine)
>
> Now, the bad thing - apparently
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Tue, Jan 17, 2017 at 04:40:24PM +0100, john.david.r.smith wrote:
> > > 6)
> > > currently i really don't like the way the configuration works.
> > > i have a top file where i execute some states for dom0
> > > these states create and configure my
1)
even when some states fail for some vm, the cli tool displays ok. it would
be better, if it displayed error in case of an error (some errors are
displayed).
Can you provide example error which wasn't detected? Regardless of the
result, output is logged to /var/log/qubes/mgmt-*.log in dom0.
On Saturday, January 14, 2017 at 3:26:04 PM UTC+4, qmast...@gmail.com wrote:
> 26 December 2016 г., 18:00:43 UTC-5 tai...@gmx.com написал:
> > Lenovo is a shitty company if you care about security, they have stuck
> > irremovable rootkits their BIOS 4 separate times and they are partially
> > own
> I suspect you too may be suffering
> https://github.com/QubesOS/qubes-issues/issues/2182
>
> Look at /var/log/libvirt/libxl/libxl-driver.log and see if there is a
> line like
> xc: error: X86_PV_VCPU_MSRS record truncated: length 8, min 9: Internal
> error
>
> The reason that directly booting
вторник, 4 октября 2016 г., 22:10:17 UTC+3 пользователь habib.b...@gmail.com
написал:
> I have a brand new Lenovo t450s I just bought for the purpose of installing
> qubes onto it and I have thoroughly followed all the instructions
>
> Iam using a USB device which I used Rufus to instal the ISO
Hi,
delayed thanks for your feedback. I guess this should work, and one could
probably replace the kernel rpms (to be installed) with the newer ones, but the
hurdle for me was to get a valid iso image back to the usb stick .. [I assume
this is simple, provided one knows how to ..]
Anyways, time
On Tuesday, January 17, 2017 at 6:13:20 AM UTC-5, J. Eppler wrote:
> Hello,
>
> the better way is to create Kali template or standalone VM. Here is the guide:
> https://www.qubes-os.org/doc/pentesting/kali/
>
> the advantage it integrates better into Qubes. The disadvantage you will not
> be abl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-01-16 13:22, haxy wrote:
> On 2017-01-14 20:04, haxy wrote:
> On Sat, Jan 14, 2017 at 12:08:25AM -, haxy wrote:
>> Going back to the first post.
>>
>> "Qubes repository will allow changing the "http" to
>> "https" in
Hi to all, new bug. Any ideas?
error: failed to prepare transaction (could not satisfy dependencies)
:: qubes-vm-gui: installing xorg-server (1.19.1-1) breaks dependency
'xorg-server<1.19.0'
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To un
On 17/01/2017 12:51, Zrubi wrote:
> On 01/17/2017 11:14 AM, john.mayo...@gmail.com wrote:
> > I'm not a Xen expert, so don't flog me too harshly, and I did
> > search the posts for this subject, but couldn't find it.
>
> > There is a painfully well known problem of having to "trust" Intel
> > to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 01/17/2017 11:14 AM, john.mayo...@gmail.com wrote:
> I'm not a Xen expert, so don't flog me too harshly, and I did
> search the posts for this subject, but couldn't find it.
>
> There is a painfully well known problem of having to "trust" Intel
>
Hello,
the better way is to create Kali template or standalone VM. Here is the guide:
https://www.qubes-os.org/doc/pentesting/kali/
the advantage it integrates better into Qubes. The disadvantage you will not be
able to use the normal menu.
--
You received this message because you are subscrib
I'm not a Xen expert, so don't flog me too harshly, and I did search the posts
for this subject, but couldn't find it.
There is a painfully well known problem of having to "trust" Intel to properly
implement their "Intel Management Engine". Only very recently has there been a
hardware solution
Well, first, the good thing:
Dual head windows HVM booted without issue.
(Qubes proper is also working with the second monitor and extending the qubes
desktop to it, all fine)
Now, the bad thing - apparently, enabling "extend desktop to this monitor" in
windows does literally nothing (seamless
42 matches
Mail list logo