qubes-doc/user/reference/glossary.md

150 lines
5.5 KiB
Markdown
Raw Normal View History

2014-08-30 06:43:42 -04:00
---
lang: en
2015-04-10 16:17:45 -04:00
layout: doc
permalink: /doc/glossary/
redirect_from:
- /en/doc/glossary/
- /doc/Glossary/
- /wiki/Glossary/
ref: 140
title: Glossary
2014-08-30 06:43:42 -04:00
---
2021-06-18 09:25:06 -04:00
## app qube
2021-06-18 09:25:06 -04:00
Any [qube](#qube) that depends on a [template](#template) for its root
filesystem.
2021-06-18 09:25:06 -04:00
* Historical note: This term originally meant "a qube intended for running user
software applications" (hence the name "app").
2021-06-18 09:25:06 -04:00
* Historical note: This is the preferred term replacing the deprecated term
2021-06-18 09:42:30 -04:00
"TemplateBasedVM."
2016-03-14 09:10:51 -04:00
2021-06-18 09:25:06 -04:00
## disposable
2016-03-14 09:10:51 -04:00
2021-06-18 09:42:30 -04:00
See [How to Use Dispoables](/doc/how-to-use-disposables/). A temporary [app
2021-06-18 09:25:06 -04:00
qube](#app-qube) based on a [disposable template](#disposable-template) that
can quickly be created, used, and destroyed.
2016-03-14 09:10:51 -04:00
2021-06-18 09:25:06 -04:00
## disposable template
A type of [app qube](#app-qube) on which [disposables](#disposable) are based.
2021-06-18 09:25:06 -04:00
(Not to be confused with the concept of a [template](#template) that is itself
disposable, which does not exist in Qubes OS.)
2014-08-30 06:43:42 -04:00
2021-06-18 09:25:06 -04:00
Disposable templates are not [templates](#template), since (being app qubes)
they do not have root filesystems of their own to provide to other qubes.
Rather, disposable templates are complementary to templates insofar as
disposable templates provide their own user filesystems to the disposables
based on them.
2020-09-16 21:21:36 -04:00
2021-06-18 09:25:06 -04:00
## dom0
2021-06-18 09:25:06 -04:00
[Domain](#domain) Zero. Also known as the **host** domain, dom0 is the initial
qube started by the Xen hypervisor on boot. Dom0 runs the Xen management
toolstack and has special privileges relative to other domains, such as direct
access to most hardware.
2021-06-18 09:42:30 -04:00
* The term "dom0" is not a proper noun and should not be capitalized unless
it's the first word in a sentence.
2016-03-14 09:10:51 -04:00
2021-06-18 09:25:06 -04:00
* The use of [domain](#domain) as a synonym for [VM](#vm) is specific to Xen.
Qubes diverges from this practice. See: [domain](#domain).
2014-08-30 06:43:42 -04:00
2021-06-18 09:25:06 -04:00
## domain
_This term is deprecated in the context of Qubes OS._
2021-06-18 09:25:06 -04:00
In Xen, a synonym for [VM](#vm). See ["domain" on the Xen
Wiki](https://wiki.xenproject.org/wiki/Domain).
2014-08-30 06:43:42 -04:00
2021-06-18 09:25:06 -04:00
## domU
2021-06-18 09:25:06 -04:00
Unprivileged [domain](#domain). Also known as **guest** domains, domUs are the
counterparts to dom0. In Xen, all VMs except dom0 are domUs. By default, most
domUs lack direct hardware access.
2021-06-18 09:25:06 -04:00
* The term "domU" is not a proper noun and should not be capitalized unless it
is the first word in a sentence.
2021-06-18 09:25:06 -04:00
* The use of [domain](#domain) as a synonym for [VM](#vm) is specific to Xen.
Qubes diverges from this practice. See: [domain](#domain).
2016-03-14 09:10:51 -04:00
2021-06-18 09:25:06 -04:00
## HVM
2021-06-18 09:25:06 -04:00
[Hardware-assisted Virtual Machine](/doc/standalones-and-HVM/). Any fully
virtualized, or hardware-assisted, [VM](#vm) utilizing the virtualization
extensions of the host CPU. Although HVMs are typically slower than
paravirtualized qubes due to the required emulation, HVMs allow the user to
create domains based on any operating system.
2021-06-18 09:25:06 -04:00
## qube
2021-06-18 09:25:06 -04:00
A secure compartment in Qubes OS. Currently, qubes are implemented as Xen
[VMs](#vm), but Qubes OS is independent of its underlying compartmentalization
technology. VMs could be replaced with a different technology, and qubes would
still be called "qubes."
2014-08-30 06:43:42 -04:00
2021-06-18 09:25:06 -04:00
* **Important:** The term "qube" should be lowercase unless it is the first
word in a sentence. Note that starting a sentence with the plural of "qube"
(i.e., "Qubes...") can be ambiguous, since it may not be clear whether the
referent is a collection of qubes or [Qubes OS](#qubes-os).
2021-06-18 09:25:06 -04:00
* Example usage: "In Qubes OS, you do your banking in your 'banking' qube and
your web surfing in your 'untrusted' qube. That way, if your 'untrusted' qube
is compromised, your banking activities will remain secure."
2014-08-30 06:43:42 -04:00
2021-06-18 09:25:06 -04:00
* Historical note: The term "qube" was originally invented as an alternative to
"VM" intended to make it easier for less technical users to understand Qubes
OS and learn how to use it.
2021-06-18 09:25:06 -04:00
## Qubes OS
2014-08-30 06:43:42 -04:00
2021-06-18 09:25:06 -04:00
A security-oriented operating system (OS). The main principle of Qubes OS is
security by compartmentalization (or isolation), in which activities are
compartmentalized (or isolated) in separate [qubes](#qube).
2021-06-18 09:25:06 -04:00
* **Important:** The official name is "Qubes OS" (note the capitalization and
the space between "Qubes" and "OS"). However, in casual conversation this is
often shortened to "Qubes." Only in technical contexts where spaces are not
permitted (e.g., usernames) may the space be omitted, as in `@QubesOS`.
2014-08-30 06:43:42 -04:00
2021-06-18 09:25:06 -04:00
## Qubes Windows Tools
2021-06-18 09:25:06 -04:00
[Qubes Windows Tools (QWT)](/doc/windows-tools/) are a set of programs and
drivers that provide integration of Windows qubes with the rest of the Qubes OS
system. Also see [Windows](/doc/windows/).
2014-08-30 06:43:42 -04:00
2021-06-18 09:25:06 -04:00
## service qube
2021-06-18 09:25:06 -04:00
A [qube](#qube) the primary purpose of which is to provide a service or
services to other qubes. `sys-net` and `sys-firewall` are examples of service
qubes.
2016-09-21 21:09:09 -04:00
2021-06-18 09:25:06 -04:00
## standalone
2021-06-18 09:42:30 -04:00
See [Standalones and HVMs](/doc/standalones-and-hvm/). A type of [qube](#qube)
2021-06-18 09:25:06 -04:00
that does not depend on any other qube for its root filesystem. The opposite of
an app qube. A standalone is created by cloning a template. Unlike templates,
however, standalones do not supply their root filesystems to other qubes.
2016-12-11 03:07:37 -05:00
2021-06-18 09:25:06 -04:00
## template
2021-06-18 09:25:06 -04:00
See [Templates](/doc/templates/). Any [qube](#qube) that supplies its root
filesystem to another qube. Templates are intended for installing and updating
software applications, but not for running them.
2018-01-29 22:19:19 -05:00
2021-06-18 09:25:06 -04:00
* Since every template supplies its *own* root filesystem to at least one other
qube, no template can be based on another template. In other words, no
template is an [app qube](#app-qube).
2021-06-18 09:25:06 -04:00
* Since every template supplies its *root* filesystem to at least one other
qube, no [disposable template](#disposable-template) is a template.
2014-08-30 06:43:42 -04:00
2021-06-18 09:25:06 -04:00
## VM
2021-06-18 09:25:06 -04:00
An abbreviation for "virtual machine." A software implementation of a machine
(for example, a computer) that executes programs like a physical machine.