mirror of
https://github.com/Qubes-Community/Contents.git
synced 2024-12-22 13:55:08 -05:00
4f8379ffd3
The archlinux building guide had a lot of different format types and styles of writing which make it harder to read than necessary. Furhtermore, some information was added that is of no special interest there. This commit tries to use a consistent and simple style for formatting the content and uses wordings that tells the reader what to do. |
||
---|---|---|
.. | ||
building | ||
common-tasks | ||
configuration | ||
coreboot | ||
customization | ||
hardware | ||
localization | ||
misc | ||
mumble | ||
os | ||
privacy | ||
security | ||
system | ||
troubleshooting | ||
user-setups | ||
wireguard | ||
qubes-doc-folders.txt | ||
README.md |
User-contributed documentation and links ( icon) to third party docs
common-tasks
configuration
- use Qubes 3.2 OS as a network server
- use Qubes OS as a smartTV
- VM hardening (fend off malware at VM startup)
- VPN configuration
- Run wireguard on server and use as VPN for Qubes
- Exposing Mumble server running in Qubes using Wireguard
- Make an HTTP Filtering Proxy
- Ansible Qubes (see Rudd-O's other repos as well)
- shrink VM volumes
- script to create Windows qubes automatically
- Manage Qubes via dmenu
- Pihole qube (old post, but also work on QubesOS 4.0)
- Newer Pihole qube, with cloudflared or NextDNS servers
- qubes-dns
- Using multiple languages in dom0
coreboot
customization
- change DPI scaling in dom0 and VMs
- setup mirage firewall
- windows gaming HVM with GPU passthrough
- Choose deafult terminal settings for a TemplateVM
- Screenlockers
hardware
localization
misc
security
system
- understanding and fixing issues with time/clock
- restoring 3.2 templates/standalones to 4.0
- connect to a VM console
- display reminders to make regular backups
- mount a VM's private storage volume in another VM
user-setups
- examples of user setups (templates and VMs used, productivity tips, customizations, ...)