USB qubes description

Signed-off-by: xn0px90 <xn0px90@users.noreply.github.com>
This commit is contained in:
xn0px90 2023-11-08 19:17:30 -05:00 committed by xn0px90
parent b316a4988f
commit 832c1c5320
1 changed files with 1 additions and 1 deletions

View File

@ -165,7 +165,7 @@ Contributions *very welcome* but first see [Contributing](#contributing).
- [Template implementation](https://www.qubes-os.org/doc/template-implementation/) - Describes template implementation.
- [Template manager](https://www.qubes-os.org/doc/template-manager/) - A template manager application.
- [Tips for Using Linux in an HVM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md) - Tips for Linux in HVM domain.
- [USB Qubes](https://www.qubes-os.org/doc/usb-qubes/)
- [USB Qubes](https://www.qubes-os.org/doc/usb-qubes/) - A USB qube acts as a secure handler for potentially malicious USB devices, preventing them from coming into contact with dom0 (which could otherwise be fatal to the security of the whole system). I
- [Xfce templates](https://www.qubes-os.org/doc/templates/xfce/) - If you would like to use Xfce (more lightweight compared to GNOME desktop environment) Linux distribution in your Qubes, you can install one of the available Xfce templates for Fedora, CentOS or Gentoo.
## VM-Hardening