diff --git a/docs/building/building-archlinux-template.md b/docs/building/building-archlinux-template.md index 15e705a..c0369af 100644 --- a/docs/building/building-archlinux-template.md +++ b/docs/building/building-archlinux-template.md @@ -18,11 +18,11 @@ Archlinux template building instructions * The qube should be based on a Fedora template. I named the qube `build-archlinux2`, based on the minimal Fedora template. -![arch-template-01](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-01.png) +![arch-template-01](/attachment/wiki/ArchlinuxTemplate/arch-template-01.png) * Ensure there is at least 15GB of free space in the private storage. -![arch-template-02](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-02.png) +![arch-template-02](/attachment/wiki/ArchlinuxTemplate/arch-template-02.png) 2: Create GitHub Account (optional) @@ -30,7 +30,7 @@ Archlinux template building instructions * It can be helpful. Creating only a basic account is all that is needed. This will allow you to help, going forward, with the Qubes project. You could be help edit errors in documentation. It can also be of use building other templates. * Create user account here https://github.com -![arch-template-03](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-03.png) +![arch-template-03](/attachment/wiki/ArchlinuxTemplate/arch-template-03.png) 3: Install necessary packages to `build-archlinux2` qube for "Qubes Automated Build System" ----------------------------------------------------------------------------------------------- @@ -74,69 +74,69 @@ $ make install-deps $ cd /home/user/qubes-builder/ $ ./setup ``` -![arch-template-04](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-04.png) +![arch-template-04](/attachment/wiki/ArchlinuxTemplate/arch-template-04.png) * Install the missing dependencies -![arch-template-05](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-05.png) +![arch-template-05](/attachment/wiki/ArchlinuxTemplate/arch-template-05.png) * First screen will ask you to import 'Qubes-Master-Signing-key.asc'. The 'setup' script not only downloads but confirms the key to that of the key on Qubes-OS website. * Select '**YES**' * Select '**OK**' Press '**Enter**' -![arch-template-06](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-06.png) +![arch-template-06](/attachment/wiki/ArchlinuxTemplate/arch-template-06.png) * Next screen will ask you to import Marek Marczykowski-Goracki (Qubes OS signing key). Again 'setup' will confirm this key to the fingerprint. * Select '**YES**' * Select '**OK**' Press '**Enter**' -![arch-template-07](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-07.png) +![arch-template-07](/attachment/wiki/ArchlinuxTemplate/arch-template-07.png) * This screen will give you the choice of which Qubes Release to build the template for. * Select '**Qubes Release 4.0**' * Select '**OK**' Press '**Enter**' -![arch-template-08](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-08.png) +![arch-template-08](/attachment/wiki/ArchlinuxTemplate/arch-template-08.png) * Screen "**Choose Repos To Use To Build Packages**" * Select 'QubesOS/qubes- Stable - Default Repo' * Select '**OK**' Press '**Enter**' -![arch-template-09](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-09.png) +![arch-template-09](/attachment/wiki/ArchlinuxTemplate/arch-template-09.png) * Screen "**Git Clone Faster**" * Select '**OK**' Press '**Enter**' -![arch-template-10](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-10.png) +![arch-template-10](/attachment/wiki/ArchlinuxTemplate/arch-template-10.png) * Screen '**Choose Pre-Build Packages Repositories**' * Select nothing, Press '**Enter**' -![arch-template-11](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-11.png) +![arch-template-11](/attachment/wiki/ArchlinuxTemplate/arch-template-11.png) * Screen "**Build Template Only?**" * Select '**Yes**' Press '**Enter**' -![arch-template-12](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-12.png) +![arch-template-12](/attachment/wiki/ArchlinuxTemplate/arch-template-12.png) * Screen '**Template Distribution Selection**' will give choices of distributions to build * Deselect everything * Select '**archlinux**' -![arch-template-13](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-13.png) +![arch-template-13](/attachment/wiki/ArchlinuxTemplate/arch-template-13.png) * Screen '**Builder Plugin Selection**' will give choices of builder plugins to use for the build. * Deselect everything * Select '**builder-archlinux**' * Select '**OK**' Press **Enter** -![arch-template-14](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-14.png) +![arch-template-14](/attachment/wiki/ArchlinuxTemplate/arch-template-14.png) * Screen '**Get sources**' wants to download additional packages needed for the choosen plugin/s. * Select '**Yes**' Press '**Enter**' -![arch-template-15](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-15.png) +![arch-template-15](/attachment/wiki/ArchlinuxTemplate/arch-template-15.png) * Then wait for download to finish and press '**OK**' @@ -192,7 +192,7 @@ $ ls qubes-template-archlinux-X.X.X-XXXXXXXXXXXX.noarch.rpm ``` -![arch-template-16](https://www.qubes-os.org/attachment/wiki/ArchlinuxTemplate/arch-template-16.png) +![arch-template-16](/attachment/wiki/ArchlinuxTemplate/arch-template-16.png) * **Transfer the install-templates.sh script file into Dom0** *Note: as there is not a typical file transfer method for Dom0, for security reasons, this less than simple transfer function has to be used* diff --git a/docs/configuration/vpn.md b/docs/configuration/vpn.md index b660ad1..35e9cc1 100644 --- a/docs/configuration/vpn.md +++ b/docs/configuration/vpn.md @@ -48,11 +48,11 @@ Set up a ProxyVM as a VPN gateway using NetworkManager 1. Create a new VM, name it, click the ProxyVM radio button, and choose a color and template. - ![Create\_New\_VM.png](https://www.qubes-os.org/attachment/wiki/VPN/Create_New_VM.png) + ![Create\_New\_VM.png](/attachment/wiki/VPN/Create_New_VM.png) 2. Add the `network-manager` service to this new VM. - ![Settings-services.png](https://www.qubes-os.org/attachment/wiki/VPN/Settings-services.png) + ![Settings-services.png](/attachment/wiki/VPN/Settings-services.png) 3. Set up your VPN as described in the NetworkManager documentation linked above. @@ -92,7 +92,7 @@ Set up a ProxyVM as a VPN gateway using NetworkManager 6. Configure your AppVMs to use the new VM as a NetVM. - ![Settings-NetVM.png](https://www.qubes-os.org/attachment/wiki/VPN/Settings-NetVM.png) + ![Settings-NetVM.png](/attachment/wiki/VPN/Settings-NetVM.png) 7. Optionally, you can install some [custom icons](https://github.com/Zrubi/qubes-artwork-proxy-vpn) for your VPN @@ -107,7 +107,7 @@ Before proceeding, you will need to download a copy of your VPN provider's confi 1. Create a new VM, name it, choose "provides network", and choose a color and template. - ![Create\_New\_VM.png](https://www.qubes-os.org/attachment/wiki/VPN/Create_New_VM.png) + ![Create\_New\_VM.png](/attachment/wiki/VPN/Create_New_VM.png) Note: Do not enable NetworkManager in the ProxyVM, as it can interfere with the scripts' DNS features. If you enabled NetworkManager or used other methods in a previous attempt, do not re-use the old ProxyVM... @@ -310,7 +310,7 @@ Usage Configure your AppVMs to use the VPN VM as a NetVM... -![Settings-NetVM.png](https://www.qubes-os.org/attachment/wiki/VPN/Settings-NetVM.png) +![Settings-NetVM.png](/attachment/wiki/VPN/Settings-NetVM.png) If you want to update your TemplateVMs through the VPN, you can enable the `qubes-updates-proxy` service for your new VPN VM and configure the [qubes-rpc policy](https://www.qubes-os.org/doc/software-update-domu/#updates-proxy). diff --git a/docs/customization/dark-theme.md b/docs/customization/dark-theme.md index d0a8cb7..b469aea 100644 --- a/docs/customization/dark-theme.md +++ b/docs/customization/dark-theme.md @@ -13,10 +13,10 @@ Dark KDE in Dom0 The following text describes how to change the default light theme to a dark theme. This is just an example, feel free to adjust the appearance to your taste. The image below shows the default light theme after installation. -![begin light theme](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-fresh-installed-standard.png) +![begin light theme](/attachment/wiki/Dark-Theme/kde-fresh-installed-standard.png) This is the result after applying the steps described here. -![end result dark theme](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-end-result.png) +![end result dark theme](/attachment/wiki/Dark-Theme/kde-end-result.png) 1. Change `Workspace Appearance` @@ -24,17 +24,17 @@ This is the result after applying the steps described here. Qubes Menu -> System Tools -> System Settings -> Workspace Appearance - ![Workspace Appearance](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-app-appearance-menu-style.png) + ![Workspace Appearance](/attachment/wiki/Dark-Theme/kde-app-appearance-menu-style.png) 2. Go to `Desktop Theme` - ![Desktop Menu](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-appearance-settings-desktop-theme-oxygen.png) + ![Desktop Menu](/attachment/wiki/Dark-Theme/kde-appearance-settings-desktop-theme-oxygen.png) 3. Select `Oxygen` and `Apply` the change 2. (Optional) Remove blue glowing task items - ![blue glowing task bar items](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-taskbar-blue-glowing-border.png) + ![blue glowing task bar items](/attachment/wiki/Dark-Theme/kde-taskbar-blue-glowing-border.png) 1. Adjust Oxygen `Details` @@ -44,11 +44,11 @@ This is the result after applying the steps described here. 3. Change `Theme Item -> Task Items` from `Oxygen Task Items` to `Air Task Items` - ![Change Task items look](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-desktop-theme-details.png) + ![Change Task items look](/attachment/wiki/Dark-Theme/kde-desktop-theme-details.png) 4. Apply changes - ![task bar items blue glowing removed](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-taskbar-blue-glowing-removed.png) + ![task bar items blue glowing removed](/attachment/wiki/Dark-Theme/kde-taskbar-blue-glowing-removed.png) 3. Change `Application Appearance` @@ -58,17 +58,17 @@ This is the result after applying the steps described here. 2. Go to `Colors` - ![colors tab](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-app-appearance-menu-colors.png) + ![colors tab](/attachment/wiki/Dark-Theme/kde-app-appearance-menu-colors.png) 3. Select `Obsidian Coast` - ![set to Obsidian Coast](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-app-appearance-menu-colors-set.png) + ![set to Obsidian Coast](/attachment/wiki/Dark-Theme/kde-app-appearance-menu-colors-set.png) 4. Apply Changes Qubes VM Manager should now look like the image below. - ![result black Qubes Manager](https://www.qubes-os.org/attachment/wiki/Dark-Theme/kde-black-qubes-manager.png) + ![result black Qubes Manager](/attachment/wiki/Dark-Theme/kde-black-qubes-manager.png) **Note:** Changing the `Window Decorations` from `Plastik for Qubes` will remove the border color and the VM name. The problem with `Plastik for Qubes` is that it does not overwrite the background and text color for Minimize, Maximize and Close buttons. The three buttons are therefore hard to read. @@ -78,10 +78,10 @@ Dark XCFE in Dom0 The following text describes how to change the default light theme to a dark theme. This is just an example, feel free to adjust the appearance to your taste. The image below shows the default light theme after installation. -![begin light theme](https://www.qubes-os.org/attachment/wiki/Dark-Theme/xfce-fresh-installed.png) +![begin light theme](/attachment/wiki/Dark-Theme/xfce-fresh-installed.png) This is the result after applying the steps described here. -![end result dark theme](https://www.qubes-os.org/attachment/wiki/Dark-Theme/xfce-end-result.png) +![end result dark theme](/attachment/wiki/Dark-Theme/xfce-end-result.png) 1. Change Appearance @@ -89,7 +89,7 @@ This is the result after applying the steps described here. Qubes Menu -> System Tools -> Appearance - ![appearance dialog](https://www.qubes-os.org/attachment/wiki/Dark-Theme/xfce-appearance-dialog.png) + ![appearance dialog](/attachment/wiki/Dark-Theme/xfce-appearance-dialog.png) 2. Change Style to `Albatross` @@ -101,7 +101,7 @@ This is the result after applying the steps described here. Qubes Menu -> System Tools -> Appearance - ![window manager dialog](https://www.qubes-os.org/attachment/wiki/Dark-Theme/xfce-window-manager-theme.png) + ![window manager dialog](/attachment/wiki/Dark-Theme/xfce-window-manager-theme.png) 2. Change the Theme in the `Style` Tab (e. g. Defcon-IV). All available themes work. @@ -140,7 +140,7 @@ The advantage of creating a dark themed Template VM is, that each AppVM which is 2. Select `Tweak Tool` and press the `>` button to add it - ![Application Dialog](https://www.qubes-os.org/attachment/wiki/Dark-Theme/dialog-add-gnome-tweak-tool.png) + ![Application Dialog](/attachment/wiki/Dark-Theme/dialog-add-gnome-tweak-tool.png) 5. Enable `Global Dark Theme` @@ -153,7 +153,7 @@ The advantage of creating a dark themed Template VM is, that each AppVM which is 2. Start `Tweak Tool` from the VM application menu and set the `Global Dark Theme` switch to `on` - ![Global Dark Theme enabled](https://www.qubes-os.org/attachment/wiki/Dark-Theme/gnome-tweak-tool.png) + ![Global Dark Theme enabled](/attachment/wiki/Dark-Theme/gnome-tweak-tool.png) 6. *(Optional)* Modify Firefox diff --git a/docs/os/pentesting/ptf.md b/docs/os/pentesting/ptf.md index 85747e4..ede8982 100644 --- a/docs/os/pentesting/ptf.md +++ b/docs/os/pentesting/ptf.md @@ -68,7 +68,7 @@ possible to do sudo ptf/ptf sudo ptf - ![PTF start banner](https://www.qubes-os.org/attachment/wiki/PTF/ptf-banner.png) + ![PTF start banner](/attachment/wiki/PTF/ptf-banner.png) 2. Show available modules (tools) diff --git a/docs/os/windows/windows-tools.md b/docs/os/windows/windows-tools.md index 388bd50..f2af660 100644 --- a/docs/os/windows/windows-tools.md +++ b/docs/os/windows/windows-tools.md @@ -184,7 +184,7 @@ Once you start a Windows-based AppVM with Qubes Tools installed, you can easily qvm-run -a my-win7-appvm explorer.exe ~~~ -![windows-seamless-4.png](https://www.qubes-os.org/attachment/wiki/WindowsAppVms/windows-seamless-4.png) ![windows-seamless-1.png](https://www.qubes-os.org/attachment/wiki/WindowsAppVms/windows-seamless-1.png) +![windows-seamless-4.png](/attachment/wiki/WindowsAppVms/windows-seamless-4.png) ![windows-seamless-1.png](/attachment/wiki/WindowsAppVms/windows-seamless-1.png) Also, the inter-VM services work as usual -- e.g. to request opening a document or URL in the Windows AppVM from another VM: @@ -202,7 +202,7 @@ Inter-VM file copy and clipboard works for Windows AppVMs the same way as for Li To simulate CTRL-ALT-DELETE in the HVM (SAS, Secure Attention Sequence), press Ctrl-Alt-Home while having any window of this VM in the foreground. -![windows-seamless-7.png](https://www.qubes-os.org/attachment/wiki/WindowsAppVms/windows-seamless-7.png) +![windows-seamless-7.png](/attachment/wiki/WindowsAppVms/windows-seamless-7.png) Changing between seamless and full desktop mode ----------------------------------------------- @@ -303,7 +303,7 @@ Debug and Verbose levels can generate large volume of logs and are intended for To override global settings for a specific component, create a new key under the root key mentioned above and name it as the executable name, without `.exe` extension. For example, to change qrexec-agent's log level to Debug, set it like this: -![qtw-log-level.png](https://www.qubes-os.org/attachment/wiki/WindowsTools/qtw-log-level.png) +![qtw-log-level.png](/attachment/wiki/WindowsTools/qtw-log-level.png) Component-specific settings currently available: diff --git a/docs/privacy/anonymizing-your-mac-address.md b/docs/privacy/anonymizing-your-mac-address.md index a7b9da8..68943df 100644 --- a/docs/privacy/anonymizing-your-mac-address.md +++ b/docs/privacy/anonymizing-your-mac-address.md @@ -39,7 +39,7 @@ Select the connection to randomize and click Edit. Select the Cloned MAC Address drop down and set to Random or Stable. Stable will generate a random address that persists until reboot, while Random will generate an address each time a link goes up. -![Edit Connection](https://www.qubes-os.org/attachment/wiki/RandomizeMAC/networkmanager-mac-random.png) +![Edit Connection](/attachment/wiki/RandomizeMAC/networkmanager-mac-random.png) Save the change and reconnect the connection (click on Network Manager tray icon and click disconnect under the connection, it should automatically reconnect). diff --git a/docs/security/multifactor-authentication.md b/docs/security/multifactor-authentication.md index 6c2239d..a0de286 100644 --- a/docs/security/multifactor-authentication.md +++ b/docs/security/multifactor-authentication.md @@ -105,15 +105,15 @@ is largely the same. If you are prompted to scan a QR code, instead select the option (if available) to view the secret key as text: - ![Secret Key Example 0](https://www.qubes-os.org/attachment/wiki/Multi-factorAuthentication/secret-key-example-0.png) + ![Secret Key Example 0](/attachment/wiki/Multi-factorAuthentication/secret-key-example-0.png) You should then see the secret key as text: - ![Secret Key Example 1](https://www.qubes-os.org/attachment/wiki/Multi-factorAuthentication/secret-key-example-1.png) + ![Secret Key Example 1](/attachment/wiki/Multi-factorAuthentication/secret-key-example-1.png) Note that the length and format of the secret key may vary by service: - ![Secret Key Example 2](https://www.qubes-os.org/attachment/wiki/Multi-factorAuthentication/secret-key-example-2.png) + ![Secret Key Example 2](/attachment/wiki/Multi-factorAuthentication/secret-key-example-2.png) 2. In your MFA AppVM, you can now use `oathtool` to generate base32 TOTP authentication tokens just like Google Authenticator would. In this example,