defenitions

This commit is contained in:
xn0px90 2023-02-10 12:47:46 -07:00
parent 19b92a7b1a
commit 39ee63415f

View File

@ -89,19 +89,19 @@ Contributions *very welcome* but first see [Contributing](#contributing).
## System Information & Requirements
- [Architecture](https://www.qubes-os.org/doc/architecture/)
- [Audio virtualization](https://www.qubes-os.org/doc/audio-virtualization/)
- [Architecture](https://www.qubes-os.org/doc/architecture/) - Qubes implements a security-by-compartmentalization approach.
- [Audio virtualization](https://www.qubes-os.org/doc/audio-virtualization/) - VMs on Qubes OS have access to virtualized audio through the PulseAudio module.
- [Certified Hardware](https://www.qubes-os.org/doc/certified-hardware/) - We aim for these vendors to be as diverse as possible in terms of geography, cost, and availability.
- [Community-recommended hardware](https://www.qubes-os.org/doc/community-recommended-hardware/) - Community-recommended computers.
- [Hardware compatibility list (HCL)](https://www.qubes-os.org/hcl/) - The HCL is a compilation of reports generated and submitted by users across various Qubes versions about their hardwares compatibility with Qubes.
- [System Requirements](https://www.qubes-os.org/doc/system-requirements/) - User documentation / Choosing your hardware.
- [Security design goals](https://www.qubes-os.org/doc/security-design-goals/)
- [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/)
- [Storage pools](https://www.qubes-os.org/doc/storage-pools/)
- [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/)
- [Networking](https://www.qubes-os.org/doc/networking/)
- [Config files](https://www.qubes-os.org/doc/config-files/)
- [Disposable customization](https://www.qubes-os.org/doc/disposable-customization/)
- [Security design goals](https://www.qubes-os.org/doc/security-design-goals/) -
- [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/) - A list of security-critical (i.e., trusted) code components in Qubes OS.
- [Storage pools](https://www.qubes-os.org/doc/storage-pools/) - Qubes OS implements a security-by-isolation (or security-by-compartmentalization) approach by providing the ability to easily create many security domains.
- [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/) - hese steps assume you have already created a separate volume group and thin pool (not thin volume) for your HDD.
- [Networking](https://www.qubes-os.org/doc/networking/) - In Qubes, the standard Xen networking is used, based on backend driver in the driver domain and frontend drivers in VMs.
- [Config files](https://www.qubes-os.org/doc/config-files/) - These files are placed in /rw, which survives a VM restart. That way, they can be used to customize a single VM instead of all VMs based on the same template. The scripts here all run as root.
- [Disposable customization](https://www.qubes-os.org/doc/disposable-customization/)
- [How to install software in dom0](https://www.qubes-os.org/doc/how-to-install-software-in-dom0/)
- [How to make any file persistent (bind-dirs)](https://www.qubes-os.org/doc/bind-dirs/)
- [How to mount a Qubes partition from another OS](https://www.qubes-os.org/doc/mount-from-other-os/)