mirror of
https://github.com/xn0px90/awesome-qubes-os.git
synced 2025-04-10 17:59:01 -04:00
defenitions
This commit is contained in:
parent
19b92a7b1a
commit
39ee63415f
18
README.md
18
README.md
@ -89,19 +89,19 @@ Contributions *very welcome* but first see [Contributing](#contributing).
|
||||
|
||||
## System Information & Requirements
|
||||
|
||||
- [Architecture](https://www.qubes-os.org/doc/architecture/)
|
||||
- [Audio virtualization](https://www.qubes-os.org/doc/audio-virtualization/)
|
||||
- [Architecture](https://www.qubes-os.org/doc/architecture/) - Qubes implements a security-by-compartmentalization approach.
|
||||
- [Audio virtualization](https://www.qubes-os.org/doc/audio-virtualization/) - VMs on Qubes OS have access to virtualized audio through the PulseAudio module.
|
||||
- [Certified Hardware](https://www.qubes-os.org/doc/certified-hardware/) - We aim for these vendors to be as diverse as possible in terms of geography, cost, and availability.
|
||||
- [Community-recommended hardware](https://www.qubes-os.org/doc/community-recommended-hardware/) - Community-recommended computers.
|
||||
- [Hardware compatibility list (HCL)](https://www.qubes-os.org/hcl/) - The HCL is a compilation of reports generated and submitted by users across various Qubes versions about their hardware’s compatibility with Qubes.
|
||||
- [System Requirements](https://www.qubes-os.org/doc/system-requirements/) - User documentation / Choosing your hardware.
|
||||
- [Security design goals](https://www.qubes-os.org/doc/security-design-goals/)
|
||||
- [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/)
|
||||
- [Storage pools](https://www.qubes-os.org/doc/storage-pools/)
|
||||
- [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/)
|
||||
- [Networking](https://www.qubes-os.org/doc/networking/)
|
||||
- [Config files](https://www.qubes-os.org/doc/config-files/)
|
||||
- [Disposable customization](https://www.qubes-os.org/doc/disposable-customization/)
|
||||
- [Security design goals](https://www.qubes-os.org/doc/security-design-goals/) -
|
||||
- [Security-critical code](https://www.qubes-os.org/doc/security-critical-code/) - A list of security-critical (i.e., trusted) code components in Qubes OS.
|
||||
- [Storage pools](https://www.qubes-os.org/doc/storage-pools/) - Qubes OS implements a security-by-isolation (or security-by-compartmentalization) approach by providing the ability to easily create many security domains.
|
||||
- [Secondary storage](https://www.qubes-os.org/doc/secondary-storage/) - hese steps assume you have already created a separate volume group and thin pool (not thin volume) for your HDD.
|
||||
- [Networking](https://www.qubes-os.org/doc/networking/) - In Qubes, the standard Xen networking is used, based on backend driver in the driver domain and frontend drivers in VMs.
|
||||
- [Config files](https://www.qubes-os.org/doc/config-files/) - These files are placed in /rw, which survives a VM restart. That way, they can be used to customize a single VM instead of all VMs based on the same template. The scripts here all run as root.
|
||||
- [Disposable customization](https://www.qubes-os.org/doc/disposable-customization/)
|
||||
- [How to install software in dom0](https://www.qubes-os.org/doc/how-to-install-software-in-dom0/)
|
||||
- [How to make any file persistent (bind-dirs)](https://www.qubes-os.org/doc/bind-dirs/)
|
||||
- [How to mount a Qubes partition from another OS](https://www.qubes-os.org/doc/mount-from-other-os/)
|
||||
|
Loading…
x
Reference in New Issue
Block a user