mirror of
https://github.com/tasket/Qubes-VM-hardening.git
synced 2024-10-01 06:35:42 -04:00
19 lines
657 B
Plaintext
19 lines
657 B
Plaintext
|
Source: Qubes-VM-hardening
|
||
|
Section: admin
|
||
|
Priority: optional
|
||
|
Maintainer: Christopher Laprise <tasket@protonmail.com>
|
||
|
Build-Depends: debhelper (>= 10)
|
||
|
Standards-Version: 4.1.2
|
||
|
Homepage: https://www.qubes-os.org
|
||
|
|
||
|
Package: qubes-vm-hardening
|
||
|
Architecture: all
|
||
|
Depends: ${misc:Depends} qubes-core-agent
|
||
|
Description: Prevent malware persistence in Qubes virtual machines.
|
||
|
Reconfigures Qubes VM templates to block casual sudo access,
|
||
|
protects user startup scripts, and includes a service that can
|
||
|
quarantine, whitelist and check file hashes at startup before
|
||
|
the /rw volume comes online.
|
||
|
|
||
|
See https://www.github.com/tasket/Qubes-VM-hardening for more info.
|