On 12/03/2017 12:09 AM, Michael Siepmann wrote:
On 11/30/2017 10:14 PM, Chris Laprise wrote:
On 11/30/2017 11:44 PM, Michael Siepmann wrote:
On Jun 12, 2017, Andrew Morgan wrote:
Did you follow the "Set up a ProxyVM as a VPN gateway using
iptables and
CLI scripts" section of the Qubes VPN d
On Sunday, December 3, 2017 at 6:10:37 AM UTC+1, Person wrote:
> When I try to update a Fedora 23 VM in Qubes 3.2, I get this error message:
>
> https://imgur.com/a/nuKDG
try adding a few gb to the root volume.
--
You received this message because you are subscribed to the Google Groups
"qubes
Yeah that worked, thanks
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-user
I would consider purchasing one of unicomps excellent mechanical
keyboards, they don't have re-writable firmware so a malicious computer
can't install a virus (unlike most keyboards) and they are also made in
america thus much more trustworthy.
Truly a pleasure to type on, they are made with t
When I try to update a Fedora 23 VM in Qubes 3.2, I get this error message:
https://imgur.com/a/nuKDG
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users
On 11/30/2017 10:14 PM, Chris Laprise wrote:
> On 11/30/2017 11:44 PM, Michael Siepmann wrote:
>>
>> On Jun 12, 2017, Andrew Morgan wrote:
>>
>>> Did you follow the "Set up a ProxyVM as a VPN gateway using iptables
>>> and
>>> CLI scripts" section of the Qubes VPN docs
>>> (https://www.qubes-os.org
Is this a common problem?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-use
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-12-02 09:13, Stumpy wrote:
>
>
> On 02.12.2017 01:36, Andrew David Wong wrote: On 2017-12-01 13:24,
> Stumpy wrote:
On 01.12.2017 10:05, Tom Zander wrote:
> On Friday, 1 December 2017 00:37:47 CET Stumpy wrote:
>> I
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Sat, Dec 02, 2017 at 01:02:52AM -0800, Joe Hemmerlein wrote:
> Danke, Stephan, your pointers were very valuable!
>
> At first, I decided to just borrow an external DVD drive and boot off a DVD
> burned from the ISO, in UEFI mode. The result howe
How well does it work just installing in a standalone hvm? can you pass usb
devices? if not the qubes filtered "filesystem only" etc flavor, then raw usb
pass through?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this gro
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Nov 22, 2017 at 11:02:11AM +0100, Bernhard wrote:
> Hello,
>
> I brought myself in trouble, when I (badly) followed the vm-sudo
> instructions : as non-root, I modified (using each time sudo) the file
> /etc/pam.d/common-auth in debian-8.
>
On Saturday, December 2, 2017 at 9:26:36 AM UTC-8, tech...@tutanota.com wrote:
> Hi,
>
> I understand generally how to customize guid options via the
> /etc/qubes/guid.conf file in Dom0 as per
> https://www.qubes-os.org/doc/full-screen-mode
>
> My question is, if I want this to effect disposabl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Wed, Nov 29, 2017 at 08:14:52AM -0800, Sergio Matta wrote:
> I am already using RC3 and everything is working fine, but:
>
> qubes-hcl-report says
> HVM: Active
> I/O MMU: Active
> HAP/SLAT Yes
> Remapping: no
>
> xl dmesg says
> (XEN)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, Dec 01, 2017 at 02:46:55AM -0800, pr0xy wrote:
> On 2017-12-01 10:30, awokd wrote:
> > On Thu, November 30, 2017 22:36, pr0xy wrote:
> >
> >> Specifically I need to pass HTTP, HTTPS and FTP through
> >> the corporate proxies. I modified your
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-11-29 15:03, genevieve.c.gauth...@gmail.com wrote:
> On Wed, 2017-11-29 at 15:59 +, Unman wrote:
>> In the Fedora documentation there ARE methods described for
>> getting bug reports out of the install process, but they require
>> activ
On Fri, Dec 1, 2017 at 1:10 PM, Matty South wrote:
> I love the Qubes project! I've been thinking of ways to improve the security
> when it comes to USB Keyboards.
>
> I'm sure a lot of us who use Qubes as our day-to-day OS have a nice keyboard
> attached to the system. Upon plugging in the USB
Hi, I have an old (2nd gen) drobo and was able to connect to it using
nautilus on my debian appvms, I would attach the drobo/block dev via the
qbes vm manager (am still on 3.2) and then it would show up under other
locations. Well my DebVM is not behaving for some reason, audio not
working AND
On Saturday, December 2, 2017 at 3:41:26 AM UTC-8, Stephan Marwedel wrote:
> Now we have a nice recipe to install Qubes on modern Thinkpads. This
> should become part of the official documentation.
Pull request: https://github.com/QubesOS/qubes-doc/pull/490
--
You received this message because
Hi,
I was looking for Riseup invite as well, would be very helpful if I could
get a code. Please send me an email if anyone is willing to.
Thank you
On Wed, Nov 29, 2017 at 9:21 PM, wrote:
> Hi, Can you send me rise up invitation code please.
>
> Thanks
>
> --
> You received this message beca
W dniu piątek, 1 grudnia 2017 19:10:07 UTC+1 użytkownik Matty South napisał:
> I love the Qubes project! I've been thinking of ways to improve the security
> when it comes to USB Keyboards.
>
> I'm sure a lot of us who use Qubes as our day-to-day OS have a nice keyboard
> attached to the system
W dniu sobota, 2 grudnia 2017 18:26:36 UTC+1 użytkownik tech...@tutanota.com
napisał:
> Hi,
>
> I understand generally how to customize guid options via the
> /etc/qubes/guid.conf file in Dom0 as per
> https://www.qubes-os.org/doc/full-screen-mode
>
> My question is, if I want this to effect d
Le samedi 2 décembre 2017 00:07:44 UTC+1, charly LEMMINKÄINEN a écrit :
> Le vendredi 1 décembre 2017 21:33:52 UTC+1, Yethal a écrit :
> > W dniu piątek, 1 grudnia 2017 19:34:14 UTC+1 użytkownik charly LEMMINKÄINEN
> > napisał:
> > > Le vendredi 1 décembre 2017 18:53:50 UTC+1, Yethal a écrit :
> >
Hi,
I understand generally how to customize guid options via the
/etc/qubes/guid.conf file in Dom0 as per
https://www.qubes-os.org/doc/full-screen-mode
My question is, if I want this to effect disposable vms only, not globally,
what do use for the VM name in the VM: {} block in the file?
Than
On 02.12.2017 01:36, Andrew David Wong wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-12-01 13:24, Stumpy wrote:
On 01.12.2017 10:05, Tom Zander wrote:
On Friday, 1 December 2017 00:37:47 CET Stumpy wrote:
I am not so familiar with google groups but I don't have a google
a
Hi Joe,
thanks for the concise summary :-)
I actually forgot to mention the necessary changes to the xen.cfg that
you correctly described.
Now we have a nice recipe to install Qubes on modern Thinkpads. This
should become part of the official documentation.
Using this recipe will try to in
On Friday, December 1, 2017 at 2:01:47 PM UTC-8, Stephan Marwedel wrote:
> I have installed Qubes 3.2 successfully on my Thinkpad T470p
> (20J6CTO1WW). This machine is pretty similar to the T470, except
> that is has a quad-core i7 CPU. It runs perfectly and all Qubes
> functiona
On 12/02/2017 03:11 AM, taii...@gmx.com wrote:
> On 11/23/2017 07:55 AM, Leo Gaspard wrote:
>
>> Can you please avoid ranting against secure boot once again?
>>
>> Secure boot is *not* useless. It *does* bring security benefits,
>> although not as good as measured boot with a TPM: it requires an
>
27 matches
Mail list logo