Update README.md

Signed-off-by: xn0px90 <xn0px90@users.noreply.github.com>
This commit is contained in:
xn0px90 2023-11-08 19:17:30 -05:00 committed by GitHub
parent a8badc71a5
commit 7215c54e7d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -165,7 +165,7 @@ Contributions *very welcome* but first see [Contributing](#contributing).
- [Template implementation](https://www.qubes-os.org/doc/template-implementation/) - Describes template implementation.
- [Template manager](https://www.qubes-os.org/doc/template-manager/) - A template manager application.
- [Tips for Using Linux in an HVM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md) - Tips for Linux in HVM domain.
- [USB Qubes](https://www.qubes-os.org/doc/usb-qubes/)
- [USB Qubes](https://www.qubes-os.org/doc/usb-qubes/) - A USB qube acts as a secure handler for potentially malicious USB devices, preventing them from coming into contact with dom0 (which could otherwise be fatal to the security of the whole system). I
- [Xfce templates](https://www.qubes-os.org/doc/templates/xfce/) - If you would like to use Xfce (more lightweight compared to GNOME desktop environment) Linux distribution in your Qubes, you can install one of the available Xfce templates for Fedora, CentOS or Gentoo.
## VM-Hardening