On Saturday, 15 July 2017 23:16:35 UTC+2, PR wrote:
> Yes, I have setup a local CentOS Repository Server which is holding all
> packages for other VMs in this datacenter.
Thinking about it that would work but does not actually help me as that will
sync all packages even the ones that I do not
Has anybody managed to set up a proxy or mirror of sorts in the net-vm or
firewall-vm or something similar to avoid downloading all the packages several
times for updating all the templates?
My connection is a bit slow and also data limited so it would be great to save
those repeated
But those should work in 3.2 just fine, right?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group,
I liked this idea, so I wanted to try.
This seems to work:
in /etc/qubes/autostart/qubes-pulseaudio.desktop.d/30_qubes.conf
put this:
[Desktop Entry]
OnlyShowIn=X-AppVM;
Now only AppVMs have audio.
Putting a name in there did not work for me but going to an AppVM and doing
this:
mkdir
And according to the README in /etc/qubes/autostart you can override everything
from within the VM using ~/.config/autostart:
> This mechanism overrides only content of /etc/xdg/autostart, files placed in
> ~/.config/autostart are unaffected, so can be used to override settings per-VM
> basis.
On Wednesday, 12 July 2017 00:58:11 UTC+2, daltong defourne wrote:
> Is it possible to do this on a per-app-VM basis and not on a per-template
> basis?
>
> > TemplateVMs. There is a "OnlyShowIn" that can be used to define in what VMs
> > the application should autostart, either **by name** or
So what is required to get a new template? If I understand correctly third
parties create templates for other distros as well, right?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from
Since it just came out I would like to know if it is safe to upgrade or if
there are specific things that should be taken into account.
Can the same instruction as for the upgrade from 23 to 24 be used?
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
https://googleprojectzero.blogspot.be/2017/04/over-air-exploiting-broadcoms-wi-fi_4.html
I assume Qubes protects us from this? Does it require IOMMU?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop
*snip*
On Tuesday, April 4, 2017 at 3:25:49 PM UTC+2, Andrew David Wong wrote:
> Discussion
> ===
>
> This is another bug resulting from the overly-complex memory
> virtualization required for PV in Xen. As we announced last year [5],
> the upcoming Qubes OS 4.0 will no longer use PV.
Just curious if this affects Qubes, or not.
https://bugs.chromium.org/p/project-zero/issues/detail?id=1035=6=
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to
On Friday, November 25, 2016 at 1:36:42 PM UTC+1, Desobediente wrote:
> As for these checking algorithms, everything can be faked,
Not really pertinent to this discussion but PUFs:
https://en.wikipedia.org/wiki/Physical_unclonable_function
--
You received this message because you are
You would need "GPU passthrough" and give the entire GPU to one VM. Some people
try; most fail. It's not supported and finicky.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it,
On Friday, November 25, 2016 at 12:55:27 AM UTC+1, Drew White wrote:
> Is there any way that I can pass through all real hardware specifics to the
> guest to make it not think it's running under xen? (primarily Windows)
It depends on what exactly is used as input to creating this device
On Tuesday, November 22, 2016 at 7:57:56 PM UTC+1, kev27 wrote:
> I saw this being retweeted by the Qubes account on Twitter. Can Grsec support
> still land in Qubes 4.0, or should we expect it for 4.1 or 4.2, etc?
>
> I think if Grsec would be enabled by default in Qubes, it would be no
>
On Friday, November 25, 2016 at 3:55:04 AM UTC+1, Drew White wrote:
> How do I attach am IMG to appear as an FDD?
A floppy? You mean in Windows? I've never seen anything about that being
supported.
--
You received this message because you are subscribed to the Google Groups
"qubes-users"
On Tuesday, November 22, 2016 at 8:14:04 PM UTC+1, Loren Rogers wrote:
> I'm not sure if this is the expected behavior. When a VM is starting up,
> if I launch an application from the Applications menu, it gives me this
> error:
>
> > domain '' qrexec not connected
>
> I also get a warning in
Copy/Paste between dom0 and other domains is intentionally prohibited.
https://www.qubes-os.org/doc/copy-paste/#copypaste-between-dom0-and-other-domains
Or maybe you want this:
https://www.qubes-os.org/doc/copy-from-dom0/
--
You received this message because you are subscribed to the Google
On Thursday, November 17, 2016 at 8:27:49 AM UTC+1, nezn...@xy9ce.tk wrote:
> anyone?
Can you tell us what you tried and ask a more specific question? I cannot tell
what your actual problem is.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
> I can map the phone device but then mounting with simple-mtpfs inb dom0
> gives me a blank directory.
Just out of curiosity, where did you get this simple-mtpfs?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group
Connecting USB devices to Dom0 is discouraged for security reasons.
I use a VM with an attached USB controller and it works without a problem. The
only thing I have to do is switch the phone to file transfer mode instead of
charging otherwise I get an empty folder as well.
--
You received
On Tuesday, November 15, 2016 at 2:46:51 PM UTC+1, Andrew David Wong wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-11-15 03:52, pixel fairy wrote:
> > management is interested in qubes, but still need windows for some tasks.
> > this means buying a laptop that comes with
On Wednesday, November 16, 2016 at 9:03:12 AM UTC+1, nezn...@xy9ce.tk wrote:
> If i have intel processor with the vPro technology - should i afraid some
> "factory vulnerabilities" of that technology and some manipulation with my
> BIOS. Or security of Qubes is higher of that level?
Qubes
On Monday, November 14, 2016 at 10:31:25 AM UTC+1, Robert Mittendorf wrote:
> On 2016-11-11 14:58, Marek Marczykowski-Górecki wrote:
> >
> > >> Actually I don't think it is a good idea. File copy protocol is
> > >> intentionally very simple, including being unidirectional. We don't
> > want
> > >>
On Monday, June 27, 2016 at 7:22:26 PM UTC+2, David Hobach wrote:
> (qvm-block can mount files from one VM to
> another)
If this is true, why is it not a massive security issue?
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe
It should be an option in the installer and then you only have to select it
in the login screen
On Monday, June 27, 2016 at 7:14:14 PM UTC+2, Albin Otterhäll wrote:
>
> How do I install XFCE in dom0? The instructions provided in the
> documentation[1] doesn't work.
>
> [1]
Yes, I have been using them with qubes 3.1 for quite a while already
On Monday, June 27, 2016 at 8:30:39 PM UTC+2, raah...@gmail.com wrote:
>
> On Sunday, June 26, 2016 at 9:33:20 AM UTC-4, Salmiakki wrote:
> > Currently the installer does not allow me to create USB qubes bec
Thanks Marcus! Interesting thread. How do I apply any of their solutions in
the installer, though?
Also, since it is just a little tedious (to click on every button and hold
and drag etc.) or can be fixed with a different mouse (at least according
to that thread) people might be interested to
Yeah, but the installer does not seem to know that and refuses to create a
USB qube for me which would be pretty handy even if I have to assign the
controllers afterwards.
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from
29 matches
Mail list logo