diff --git a/netvm/dbus-nm-applet.conf b/netvm/dbus-nm-applet.conf
new file mode 100644
index 0000000..0d0f082
--- /dev/null
+++ b/netvm/dbus-nm-applet.conf
@@ -0,0 +1,42 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ 512
+
+
diff --git a/rpm_spec/core-appvm.spec b/rpm_spec/core-appvm.spec
index 9b97616..1a97cb5 100644
--- a/rpm_spec/core-appvm.spec
+++ b/rpm_spec/core-appvm.spec
@@ -48,17 +48,12 @@ The Qubes core files for installation inside a Qubes AppVM.
%pre
-# Remove password for root, so PolicyKit will not ask for it
-usermod -p '' root
-
if [ "$1" != 1 ] ; then
-# remove user password if this is upgrade
-usermod -p '' user
# do this whole %pre thing only when updating for the first time...
exit 0
fi
-adduser -p '' --create-home user
+adduser --create-home user
su user -c 'mkdir -p /home/user/.gnome2/nautilus-scripts'
su user -c 'ln -s /usr/lib/qubes/qvm-copy-to-vm2.gnome /home/user/.gnome2/nautilus-scripts/"Copy to other AppVM"'
su user -c 'ln -s /usr/bin/qvm-open-in-dvm2 /home/user/.gnome2/nautilus-scripts/"Open in DisposableVM"'
diff --git a/rpm_spec/core-commonvm.spec b/rpm_spec/core-commonvm.spec
index 97b1c8e..0da0f39 100644
--- a/rpm_spec/core-commonvm.spec
+++ b/rpm_spec/core-commonvm.spec
@@ -80,6 +80,9 @@ cp /var/lib/qubes/serial.conf /etc/init/serial.conf
%post
+# Disable gpk-update-icon
+sed 's/^NotShowIn=KDE;$/\0QUBES;/' -i /etc/xdg/autostart/gpk-update-icon.desktop
+
if [ "$1" != 1 ] ; then
# do this whole %post thing only when updating for the first time...
exit 0
diff --git a/rpm_spec/core-netvm.spec b/rpm_spec/core-netvm.spec
index a4c966b..07200b4 100644
--- a/rpm_spec/core-netvm.spec
+++ b/rpm_spec/core-netvm.spec
@@ -66,6 +66,9 @@ mkdir -p $RPM_BUILD_ROOT/var/run/qubes
mkdir -p $RPM_BUILD_ROOT/etc/xen/scripts
cp ../common/vif-route-qubes $RPM_BUILD_ROOT/etc/xen/scripts
+mkdir -p $RPM_BUILD_ROOT/etc/dbus-1/system.d
+cp ../netvm/dbus-nm-applet.conf $RPM_BUILD_ROOT/etc/dbus-1/system.d/qubes-nm-applet.conf
+
%post
# Create NetworkManager configuration if we do not have it
@@ -88,6 +91,11 @@ if [ "$1" = 0 ] ; then
chkconfig qubes_core_netvm off
fi
+%triggerin -- NetworkManager
+# Fix PolicyKit settings to allow run as normal user not visible to ConsoleKit
+sed 's#$#\0yes#' -i /usr/share/polkit-1/actions/org.freedesktop.NetworkManager.policy
+
+
%clean
rm -rf $RPM_BUILD_ROOT
@@ -100,3 +108,4 @@ rm -rf $RPM_BUILD_ROOT
/etc/NetworkManager/dispatcher.d/qubes_nmhook
/etc/NetworkManager/dispatcher.d/30-qubes_external_ip
/etc/xen/scripts/vif-route-qubes
+/etc/dbus-1/system.d/qubes-nm-applet.conf