mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-25 07:35:32 -04:00
tail best updates, pdf macro
This commit is contained in:
parent
11986c34cb
commit
0031e85f7a
15 changed files with 62 additions and 22 deletions
|
@ -10,6 +10,8 @@ tags = ["intro", "linux", "windows", "qubes", "intermediate"]
|
|||
blogimage="/images/qubes-os.png"
|
||||
toc=true
|
||||
dateedit=2023-05-10
|
||||
a4="qubes-a4.pdf"
|
||||
letter="qubes-letter.pdf"
|
||||
+++
|
||||
Qubes OS is a security-oriented [operating system](/glossary#operating-system-os) (OS), meaning it is an operating system designed from the ground up to be more difficult to hack. This is achieved through [compartmentalization](https://www.qubes-os.org/faq/#how-does-qubes-os-provide-security), where each compartment is called a "qube" (using "virtual machines" — more on that below). All other Linux systems like [Tails](/tags/tails/) are *monolithic*, which means that if a hack succeeds anywhere on the system it can take over more easily. In Qubes OS, if one qube is compromised, the others remain safe. You can think of using Qubes OS as like having many different computers on your desk for different activities but with the convenience of a single physical machine, a single unified desktop environment, and a set of tools for using a number of different qubes together securely as parts of a unified system.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue