mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-11-25 06:03:31 -05:00
Merge remote-tracking branch 'upstream/main' into intro-remove-headings
This commit is contained in:
commit
03dc04d4f6
4 changed files with 4 additions and 4 deletions
|
|
@ -11,7 +11,7 @@ What is Qubes OS?
|
|||
-----------------
|
||||
|
||||
Qubes OS is a free and open-source, security-oriented operating system for
|
||||
single-user desktop computing. Qubes OS leverages `Xen-based virtualization <https://wiki.xenproject.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :term:`qubes <qube>`.
|
||||
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :term:`qubes <qube>`.
|
||||
|
||||
These qubes, which are implemented as :term:`virtual machines (VMs) <vm>`, have specific:
|
||||
|
||||
|
|
|
|||
|
|
@ -29,7 +29,7 @@ In this example, the word processor runs in the “work” domain, which has bee
|
|||
|
||||
|r2b3-windows-seamless-1.png|
|
||||
|
||||
Qubes Release 2 can also run Windows AppVMs in seamless mode, integrated onto the common Qubes trusted desktop, just like Linux AppVMs! The seamless GUI integration has been introduced in Qubes R2 Beta 3. This requires :doc:`Qubes Windows Tools </user/templates/windows/qubes-windows-tools-4-1>` to be installed in the Windows VMs first.
|
||||
Qubes Release 2 can also run Windows AppVMs in seamless mode, integrated onto the common Qubes trusted desktop, just like Linux AppVMs! The seamless GUI integration has been introduced in Qubes R2 Beta 3. This requires :doc:`Qubes Windows Tools </user/templates/windows/qubes-windows-tools>` to be installed in the Windows VMs first.
|
||||
|
||||
|
||||
----
|
||||
|
|
|
|||
|
|
@ -209,7 +209,7 @@ Set memory as appropriate and install the OS into this template in the same way
|
|||
|
||||
You can then create a new qube using the new template. If you use this Template as is, then any HVMs based on it will effectively be disposables. All file system changes will be wiped when the HVM is shut down.
|
||||
|
||||
Please see :ref:`this page <user/templates/windows/windows-qubes-4-1:windows as a template>` for specific advice on installing and using Windows-based templates.
|
||||
:ref:`user/templates/windows/qubes-windows:windows as a template` gives specific advice on installing and using Windows-based templates.
|
||||
|
||||
Cloning HVMs
|
||||
------------
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
How to edit a policy
|
||||
====================
|
||||
|
||||
There are three ways to edit a :ref:`policy <user/reference/glossary:policies>`:
|
||||
There are three ways to edit a :term:`policy <policies>`:
|
||||
|
||||
* with :program:`Qubes OS Global Config`, the **recommended way** for the most common policies
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue