-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On 2017-12-12 17:33, grv wrote:
> I see on https://www.qubes-os.org/doc/releases/4.0/schedule/ that
> Dec 11 is the last date mentioned to decide if rc3 is final. Have
> we taken the decision?
>
As far as I know, the decision has not yet been
I’ll disagree with comparison of btrfs to lvm. there is a very significant
difference between btrfs and lvm. btrfs is like a namespace and lvm volumes are
block devices. one can put a namespace on a block device. but yes, layers and
layers of metadata processing required.
BTW, has anyone
I see on https://www.qubes-os.org/doc/releases/4.0/schedule/ that Dec 11 is the
last date mentioned to decide if rc3 is final. Have we taken the decision?
If I install rc3, would I be able to update to QubeOS 4 in place (without
having to migrate my VMs manually) ?
--
You received this
W dniu wtorek, 12 grudnia 2017 15:44:42 UTC+1 użytkownik
leonardo.p...@gmail.com napisał:
> Can anyone give me the instructions necessaries to dump the bios of my PC. So
> that I’m sure while using Qubes that I’m safe?
> Best regards
> Leonardo
How exactly would dumping the bios make sure
groups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/cd959dd7-aada-bc48-c3d4-30cb70146c2b%40riseup.net.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-Dell_Inc_-Precision_M4600-20171212-151033.yml
Description: application/yaml
On 12/12/2017 10:39 AM, 'Tom Zander' via qubes-users wrote:
On Tuesday, 12 December 2017 16:18:25 CET Connor Page wrote:
so in short, first create a qubes storage pool
qvm-pool --add
In the spirit of a “howto”, can you fill in the actual values to allow one to
add a second drive as the
sudo lvcreate -L --type thin-pool --thinpool
qvm-pool --add lvm_thin -o
volume_group=,thin_pool=
qvm-create -P ...
or
qvm-clone -P
set desired private image size using standard tools.
this will put the private volume in the new thin pool. private volumes are
mounted in /rw
btrfs
Hello,
An 12. Dez. 2017, 18:00, Adrian Rocha schrieb:
Hi, I am using Crossover on Qubes 3.2. I suppose that it have to work fine in
Qubes 4. You just have to install it and register on the template VM, like any
other software. After that you can install the Windows apps in the App VM
Hello,
I cloned the out-of-the-box debian-8 and brought it to debian-9 with
apt-get distupgrade. I halted it. After reboot no way to get a shell, or
anything else (not by qvm-run within dom0 either). Is there a way to get
error messages somewhere? Thank you, Bernhard
--
You received this
Hi,
I am using Crossover on Qubes 3.2. I suppose that it have to work fine in Qubes
4.
You just have to install it and register on the template VM, like any other
software. After that you can install the Windows apps in the App VM because
they are installed in the user home dir
--
You
On Tuesday, 12 December 2017 16:24:16 CET cooloutac wrote:
> well I'm no expert but with ps/2 keyboard it will be the only thing
> attached, unlike usb which can have multiple devices on same controller,
> spoofed as other devices. Is there a better option?
The attack modes are two very
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dear Qubes Community,
The Xen Project has published Xen Security Advisories 248 through 251
(XSA-248 through XSA-251). These XSAs do *not* affect the security of
Qubes OS, and no user action is necessary.
These XSAs have been added to the XSA
On Tuesday, 12 December 2017 16:18:25 CET Connor Page wrote:
> so in short, first create a qubes storage pool
> qvm-pool --add
In the spirit of a “howto”, can you fill in the actual values to allow one to
add a second drive as the ‘private’ (home) partition *only* of a Qube?
> if you go
On Monday, December 4, 2017 at 11:09:24 PM UTC-5, tai...@gmx.com wrote:
> On 12/04/2017 07:31 PM, cooloutac wrote:
>
> > I use a usb to ps2 adapter for my keyboard.
> I assume with the mistaken impression that PS/2 is more secure for some
> reason - for the record it sends your keystrokes out on
I agree with Chris. Data specific to a qube should be stored on one of that
qube’s volume. Backups work then.
so in short, first create a qubes storage pool
qvm-pool --add
qvm-create -P
if you go for a thin pool, create it first and use volume group and thin pool
names as options for
Hello David,
>> I'd like to use Crossover to run Office in a
>> Fedora based AppVM.
> You may find it prudent to simply run
> windows, like such:
> https://www.qubes-os.org/doc/windows-appvms/
I know that I can run a Windows VM in Qubes and I have also done so in Qubes
3.2.
Unfortunately
Can anyone give me the instructions necessaries to dump the bios of my PC. So
that I’m sure while using Qubes that I’m safe?
Best regards
Leonardo
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
On 12/11/2017 08:20 PM, Sven Semmler wrote:
When installing R3.2 one is presented with the option to create sys-usb as
sys-net.
Is there a guide somewhere on how to achieve this after the fact?
Is there an guide to bringing up an Ethernet-to-USB adapter?
Context to my previous posts: I’m
18 matches
Mail list logo