I use many minimal VMs that don’t have a terminal emulator. So I use qvm-console-dvm to use them, which spawns a terminal of a disp based on default-mgmt-dvm.
The problem is that the terminal that spawns is a white-background very-very-small-font terminal, and it’s xterm. I know how to customize xterm: It’s by adding those lines in /home/user/.Xresources:
xterm*faceName: Monospace
xterm*faceSize: 20
xterm*background: black
xterm*foreground: white
I was wondering about the security risk(s) of doing such thing.
Also, please suggest the more secure command (if that’s a thing,) for example using echo "text" >> .Xresources or cat << EOF | tee .Xresources or nano or vim, or something I haven’t mentioned. When said the more secure command, then only say its security risks; you don’t have to say the security risks of others that we’ll not use anyway.
Also, please suggest the more secure command (if that’s a thing,) for example using echo "text" >> .Xresources or cat << EOF | tee .Xresources or nano or vim, or something I haven’t mentioned.
You could edit the config file in another qube and qvm-copy it to your default-mgmt-dvm.
Generally, I think it is not necessary to even have an xterm installed. You can use qvm-console-dispvm. See NOTE below.
When said the more secure command, then only say its security risks; you don’t have to say the security risks of others that we’ll not use anyway.
I have asked a few things about that special qube in the past, as I was/am willing to use a minimal template for it (NOTE: but have not explored further since then, due to lack of free time). In case you are interested: