On Sunday, 2 August 2020 22:42:31 UTC+8, Chris Laprise wrote:
>
> You can check out my github for some interesting stuff. The 
> 'Qubes-scripts' project has a (serial) template updater that lets you 
> select by certain criteria. It could be parallelized pretty easily. 
>
> [...]
>
> Finally, there is a VPN tool and one to enhance VM internal security. 
>
> -- 
> Chris Laprise, [email protected] <javascript:> 
> https://github.com/tasket 
> https://twitter.com/ttaskett 
> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886 
>

I tested your halt-vm-by-window and system-stats-xen and found them very 
useful. I also tried your qubes4-multi-update but ran into three issues: 
one is that it relies on curl, which my Fedora minimal wasn't happy about; 
another is that it [Y/n] prompts me for upgrades, which it shouldn't do, 
according to the script; the last is that it attempts to update mirage 
firewall standalones and when it fails, the whole process stops.

Your Qubes-VM-Hardening tool was one of the first things installed into my 
first Qubes, but I'm still not very familiar with how it works. I think 
vm-boot-protect might be blocking me from adding a .desktop file into 
~/.config/autostart, as Steve suggested (Steve: does this need to be done 
in templates? If done in an appVM, wouldn't it get purged upon restart?).

Anyways, your tools are very convnient and I think they should be more 
widely known, if not integrated into Qubes proper. Thank you

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9909dcfd-4b72-4f7f-b44a-4152b837fe0eo%40googlegroups.com.

Reply via email to