mirror of
https://github.com/Qubes-Community/Contents.git
synced 2024-12-22 21:59:26 -05:00
55e58d4e60
Took some of the documentation from the current Split GPG page to create this little how-to. Originally created as a PR to the main docs: https://github.com/QubesOS/qubes-doc/pull/1203 |
||
---|---|---|
.. | ||
building | ||
common-tasks | ||
configuration | ||
coreboot | ||
customization | ||
hardware | ||
localization | ||
misc | ||
mumble | ||
os | ||
privacy | ||
security | ||
system | ||
troubleshooting | ||
user-setups | ||
wireguard | ||
qubes-doc-folders.txt | ||
README.md |
User-contributed documentation and links ( icon) to third party docs
common-tasks
configuration
- use Qubes 3.2 OS as a network server
- use Qubes OS as a smartTV
- VM hardening (fend off malware at VM startup)
- VPN configuration
- Run wireguard on server and use as VPN for Qubes
- Exposing Mumble server running in Qubes using Wireguard
- Make an HTTP Filtering Proxy
- Ansible Qubes (see Rudd-O's other repos as well)
- shrink VM volumes
- script to create Windows qubes automatically
- Manage Qubes via dmenu
- Pihole qube (old post, but also work on QubesOS 4.0)
- Newer Pihole qube, with cloudflared or NextDNS servers
- Using multiple languages in dom0
coreboot
customization
- change DPI scaling in dom0 and VMs
- setup mirage firewall
- windows 7 gaming HVM with GPU passthrough
- Choose deafult terminal settings for a TemplateVM
- Screenlockers
hardware
localization
misc
system
- understanding and fixing issues with time/clock
- restoring 3.2 templates/standalones to 4.0
- connect to a VM console
- display reminders to make regular backups
- mount a VM's private storage volume in another VM
user-setups
- examples of user setups (templates and VMs used, productivity tips, customizations, ...)