On Tuesday, February 27, 2018 at 3:42:07 PM UTC-6, qube...@go-bailey.com wrote:
> Do the Qubes devs recommend a specific payload to use with coreboot and
> Qubes 4?
>
> For those who are using coreboot with the Qubes 4 release candidates,
> what payload are you using?
>
> Have you run into any
On 02/28/2018 08:23 PM, 'awokd' via qubes-users wrote:
On Thu, March 1, 2018 1:14 am, billol...@gmail.com wrote:
This is not qubes-specific. It hasn't worked in fedora for a long time,
and I don't think it works in ubuntu/debian either, as long as
NetworkManager is turned on. In regular fedo
On 02/28/2018 03:58 PM, Yuraeitha wrote:
On Wednesday, February 28, 2018 at 9:14:30 PM UTC+1, vel...@tutamail.com wrote:
Chris if you could replicate the simplicity in your instruction for a
"kill-switc-VPN" for the this feature that would be awesome...
This seems like a great feature...I am g
On 02/28/2018 08:23 PM, 'awokd' via qubes-users wrote:
On Thu, March 1, 2018 1:14 am, billol...@gmail.com wrote:
This is not qubes-specific. It hasn't worked in fedora for a long time,
and I don't think it works in ubuntu/debian either, as long as
NetworkManager is turned on. In regular fedo
On 02/15/2018 01:57 AM, tsdel...@gmail.com wrote:
Tried Qubes 4.0-rc4
VM's won't boot, likely due to lack of IOMMU. I could not change the Kernel or
VT mode to PV from the GUI. I didn't try via terminal.
=
Qubes Release 4.0 (R4.0)
Brand: Hewlett-Packard
Model: HP ProBook 6565b
On Wednesday, February 28, 2018 at 1:30:55 PM UTC-5, Yuraeitha wrote:
> On Wednesday, February 28, 2018 at 7:10:33 PM UTC+1, Braden wrote:
> > On Wednesday, February 28, 2018 at 12:50:23 PM UTC-5, Unman wrote:
> > > On Wed, Feb 28, 2018 at 09:48:43AM -0800, Yuraeitha wrote:
> > > > On Wednesday, Fe
On Thu, March 1, 2018 1:14 am, billol...@gmail.com wrote:
>
> This is not qubes-specific. It hasn't worked in fedora for a long time,
> and I don't think it works in ubuntu/debian either, as long as
> NetworkManager is turned on. In regular fedora, you can use macchanger
> if you turn off Networ
On Wednesday, February 28, 2018 at 1:34:28 PM UTC-5, Chris Laprise wrote:
> Hi,
>
> The macchanger section of the doc hasn't worked for a long time (search
> the mailing list to see issues) and it never did work correctly, IMO.
>
> > What should i do?
> >
>
> You should use the MAC randomizat
On Wednesday, 28 February 2018 17:41:06 UTC, thorsten...@gmail.com wrote:
> > Could you try this:
> > qvm-prefs sys-firewall | grep netvm
> > it should say sys-net? Y/N
>
> yes, result is sys-net
>
>
> > Even if it states sys-net, let's try to force it again
> > qvm-prefs sys-firewall -s netvm
Hello Yuraeitha,
Original-Nachricht
An 28. Feb. 2018, 21:39, Yuraeitha schrieb:
> It seems from time to time that various
> people have shared a good unofficial script,
> guides and 'how to's', and even code, for
> Qubes related content, on their github page or
> similar. The pr
Today opening sys-net I get these errors in the terminal , though
sys-net continues on and seems OK , I suppose by now, it is expected
behavior that sys-net takes a long time and sometimes never shutsdown ??
File "/usr/bin/qvm-start", line 136, in
main()
File "/usr/bin/qvm-start", lin
web visit
https://groups.google.com/d/msgid/qubes-users/6f5459a6-87b5-14c9-dafd-f53173f0d538%40cryptocartel.com.
For more options, visit https://groups.google.com/d/optout.
Qubes-HCL-Dell_Inc_-XPS_8920-20180228-144337.yml
Description: application/yaml
Qubes-HCL-Dell_Inc_-XPS_8920-20180228-1443
Hi,
I'm not able to get the user crontab running, apparently this happens because
threre's no crond service nor unit files:
systemctl status crond
Unit crond.service could not be found.
Being the only service available the cron mount:
systemctl | grep -i cron
var-spool-cron.mount loaded active
On Wednesday, February 28, 2018 at 9:14:30 PM UTC+1, vel...@tutamail.com wrote:
> Chris if you could replicate the simplicity in your instruction for a
> "kill-switc-VPN" for the this feature that would be awesome...
>
> This seems like a great feature...I am getting up to speed on the Linux
> c
It seems from time to time that various people have shared a good unofficial
script, guides and 'how to's', and even code, for Qubes related content, on
their github page or similar. The problem however is that while shared, it
isn't very visible, and even if they are from time to time mentione
Chris if you could replicate the simplicity in your instruction for a
"kill-switc-VPN" for the this feature that would be awesome...
This seems like a great feature...I am getting up to speed on the Linux
commands but I suspect a lot of the laypeople(who likely need the security)
would apprecia
On 02/28/2018 01:49 PM, awokd wrote:
On Wed, February 28, 2018 6:34 pm, Chris Laprise wrote:
On 02/28/2018 11:31 AM, klausdiet...@mail2tor.com wrote:
Hey guys,
i have a big problem with "Anonymizing your MAC Address with macchanger
and scripts". I used this Tutorial on the Qubes Doc:
https
On 02/28/2018 01:49 PM, awokd wrote:
On Wed, February 28, 2018 6:34 pm, Chris Laprise wrote:
On 02/28/2018 11:31 AM, klausdiet...@mail2tor.com wrote:
Hey guys,
i have a big problem with "Anonymizing your MAC Address with macchanger
and scripts". I used this Tutorial on the Qubes Doc:
https
On Tuesday, February 27, 2018 at 7:55:09 PM UTC+1, Allen Larocque wrote:
> Thanks for the help.
>
> The intel audio pci device is indeed listed in the qvm-pci list, and the
> pulseaudio manager is 'connected', However, under 'devices' there's nothing
> about the intel device - just 'combined mon
On Wed, February 28, 2018 6:34 pm, Chris Laprise wrote:
> On 02/28/2018 11:31 AM, klausdiet...@mail2tor.com wrote:
>
>> Hey guys,
>>
>>
>> i have a big problem with "Anonymizing your MAC Address with macchanger
>> and scripts". I used this Tutorial on the Qubes Doc:
>> https://www.qubes-os.org/doc
On 02/28/2018 11:31 AM, klausdiet...@mail2tor.com wrote:
Hey guys,
i have a big problem with "Anonymizing your MAC Address with macchanger
and scripts". I used this Tutorial on the Qubes Doc:
https://www.qubes-os.org/doc/anonymizing-your-mac-address/
Hi,
The macchanger section of the doc hasn
On Wednesday, February 28, 2018 at 7:10:33 PM UTC+1, Braden wrote:
> On Wednesday, February 28, 2018 at 12:50:23 PM UTC-5, Unman wrote:
> > On Wed, Feb 28, 2018 at 09:48:43AM -0800, Yuraeitha wrote:
> > > On Wednesday, February 28, 2018 at 6:38:49 PM UTC+1, Unman wrote:
> > > > On Wed, Feb 28, 2018
On Wednesday, February 28, 2018 at 12:50:23 PM UTC-5, Unman wrote:
> On Wed, Feb 28, 2018 at 09:48:43AM -0800, Yuraeitha wrote:
> > On Wednesday, February 28, 2018 at 6:38:49 PM UTC+1, Unman wrote:
> > > On Wed, Feb 28, 2018 at 08:52:07AM -0800, Braden wrote:
> > > > Performing some modifications t
On Wednesday, February 28, 2018 at 5:55:03 PM UTC+1, klausd...@mail2tor.com
wrote:
> Hey guys,
>
> i have a big problem with "Anonymizing your MAC Address with macchanger
> and scripts". I used this Tutorial on the Qubes Doc:
> https://www.qubes-os.org/doc/anonymizing-your-mac-address/
>
> Every
On Wednesday, February 28, 2018 at 6:51:14 PM UTC+1, Braden wrote:
> On Wednesday, February 28, 2018 at 12:50:17 PM UTC-5, Braden wrote:
> > On Wednesday, February 28, 2018 at 12:38:49 PM UTC-5, Unman wrote:
> > > On Wed, Feb 28, 2018 at 08:52:07AM -0800, Braden wrote:
> > > > Performing some modif
On Wed, February 28, 2018 5:53 pm, Unman wrote:
>
> By design dom0 has no networking.
> If you MUST break Qubes , and you cant use the admin features in 4.0
> (see my last post),then you'll have to use some service to pass data in
> and out of dom0 WITHOUT networking.
Another option for remote ac
On Wed, Feb 28, 2018 at 09:50:17AM -0800, Braden wrote:
> On Wednesday, February 28, 2018 at 12:38:49 PM UTC-5, Unman wrote:
> > On Wed, Feb 28, 2018 at 08:52:07AM -0800, Braden wrote:
> > > Performing some modifications to dom0, but when I run apps like wget from
> > > dom0 terminal I am unable t
On Wednesday, February 28, 2018 at 12:50:17 PM UTC-5, Braden wrote:
> On Wednesday, February 28, 2018 at 12:38:49 PM UTC-5, Unman wrote:
> > On Wed, Feb 28, 2018 at 08:52:07AM -0800, Braden wrote:
> > > Performing some modifications to dom0, but when I run apps like wget from
> > > dom0 terminal I
On Wednesday, February 28, 2018 at 12:38:49 PM UTC-5, Unman wrote:
> On Wed, Feb 28, 2018 at 08:52:07AM -0800, Braden wrote:
> > Performing some modifications to dom0, but when I run apps like wget from
> > dom0 terminal I am unable to resolve addresses. Same if I were to try
> > running firefox
On Wed, Feb 28, 2018 at 09:48:43AM -0800, Yuraeitha wrote:
> On Wednesday, February 28, 2018 at 6:38:49 PM UTC+1, Unman wrote:
> > On Wed, Feb 28, 2018 at 08:52:07AM -0800, Braden wrote:
> > > Performing some modifications to dom0, but when I run apps like wget from
> > > dom0 terminal I am unable
On Wednesday, February 28, 2018 at 6:38:49 PM UTC+1, Unman wrote:
> On Wed, Feb 28, 2018 at 08:52:07AM -0800, Braden wrote:
> > Performing some modifications to dom0, but when I run apps like wget from
> > dom0 terminal I am unable to resolve addresses. Same if I were to try
> > running firefox f
> Could you try this:
> qvm-prefs sys-firewall | grep netvm
> it should say sys-net? Y/N
yes, result is sys-net
> Even if it states sys-net, let's try to force it again
> qvm-prefs sys-firewall -s netvm sys-net
that command did not work due to wrong syntax, so I did:
qvm-prefs --set sys-firewa
On Wed, Feb 28, 2018 at 08:52:07AM -0800, Braden wrote:
> Performing some modifications to dom0, but when I run apps like wget from
> dom0 terminal I am unable to resolve addresses. Same if I were to try running
> firefox from dom0. Know this is because of security benefits, but how can I
> enab
On Wednesday, February 28, 2018 at 12:11:34 PM UTC-5, Yuraeitha wrote:
> On Wednesday, February 28, 2018 at 5:52:07 PM UTC+1, Braden wrote:
> > Performing some modifications to dom0, but when I run apps like wget from
> > dom0 terminal I am unable to resolve addresses. Same if I were to try
> > r
On Wednesday, February 28, 2018 at 5:52:07 PM UTC+1, Braden wrote:
> Performing some modifications to dom0, but when I run apps like wget from
> dom0 terminal I am unable to resolve addresses. Same if I were to try running
> firefox from dom0. Know this is because of security benefits, but how ca
On Wednesday, February 28, 2018 at 5:52:07 PM UTC+1, Braden wrote:
> Performing some modifications to dom0, but when I run apps like wget from
> dom0 terminal I am unable to resolve addresses. Same if I were to try running
> firefox from dom0. Know this is because of security benefits, but how ca
On Tuesday, February 27, 2018 at 11:50:14 PM UTC+1, Alex Dubois wrote:
> On Tuesday, 27 February 2018 11:39:03 UTC, Yuraeitha wrote:
> > On Tuesday, February 27, 2018 at 3:06:36 AM UTC+1, brenda...@gmail.com
> > wrote:
> > > On Monday, February 26, 2018 at 7:21:11 PM UTC-5, [799] wrote:
> > > > A
Hey guys,
i have a big problem with "Anonymizing your MAC Address with macchanger
and scripts". I used this Tutorial on the Qubes Doc:
https://www.qubes-os.org/doc/anonymizing-your-mac-address/
Everytime it happens the same:
1) I create the file macspoof@.service with sudo gedit
/etc/systemd/sys
On Tuesday, February 27, 2018 at 11:16:46 PM UTC+1, [799] wrote:
> Hello Yuraeitha,
>
> Thanks for the clarification, I think we share some common values.
>
>
>
> --
> Qubes 4rc3 > Lenovo X230 + Lenovo W540
>
> Gesendet von ProtonMail mobile
>
>
>
>
> Original-Nachricht
Performing some modifications to dom0, but when I run apps like wget from dom0
terminal I am unable to resolve addresses. Same if I were to try running
firefox from dom0. Know this is because of security benefits, but how can I
enable networking from there. Say I wanted to connect to dom0 from a
On Tuesday, February 27, 2018 at 7:42:54 PM UTC+1, Chris Laprise wrote:
> On 02/27/2018 12:42 PM, Yuraeitha wrote:
> > On Tuesday, February 27, 2018 at 6:08:57 PM UTC+1, awokd wrote:
> >> On Tue, February 27, 2018 5:00 pm, Yuraeitha wrote:
> >>
> >>> I'm working on an update script btw, which might
Hi,
I get an error when installing Kali rolling using the Qubes-guide :
https://www.qubes-os.org/doc/pentesting/kali/#create-a-kali-linux-rolling-template
The error comes when installing kali-defaults, which seems to collide
with qubes-core-agent:
user@Kali-Rolling:~$ sudo apt --fix-broken
MirrorWay:
Thank you. Very helpful to know.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send
On Wednesday, 28 February 2018 06:37:14 UTC, ThierryIT wrote:
> Le samedi 24 février 2018 21:49:49 UTC+2, Alex Dubois a écrit :
> > On Wednesday, 21 February 2018 09:01:45 UTC, ThierryIT wrote:
> > > Le mercredi 14 février 2018 09:49:37 UTC+2, ThierryIT a écrit :
> > > > Le dimanche 11 février 20
44 matches
Mail list logo