mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-26 15:59:24 -05:00
Fix Markdown syntax and clean up text
This commit is contained in:
parent
d048740d01
commit
055776a87c
@ -246,15 +246,15 @@ Using DisposableVMs in this manner is ideal for untrusted qubes which require pe
|
||||
[user@dom0 ~]$ qvm-prefs disp-sys-usb autostart true
|
||||
|
||||
7. Users should now follow instructions on [How to hide USB controllers from dom0](/doc/usb/#how-to-hide-all-usb-controllers-from-dom0)
|
||||
8. At this point your mouse may not work. In which case you should follow this qubes guide https://www.qubes-os.org/doc/usb/
|
||||
|
||||
Edit the qubes.InputMouse policy file in dom0, which is located here:
|
||||
8. At this point, your mouse may not work.
|
||||
Edit the `qubes.InputMouse` policy file in dom0, which is located here:
|
||||
|
||||
/etc/qubes-rpc/policy/qubes.InputMouse
|
||||
/etc/qubes-rpc/policy/qubes.InputMouse
|
||||
|
||||
Add a line like this to the top of the file:
|
||||
Add a line like this to the top of the file:
|
||||
|
||||
disp-sys-usb dom0 allow,user=root
|
||||
disp-sys-usb dom0 allow,user=root
|
||||
|
||||
|
||||
#### Starting the DisposableVMs ####
|
||||
|
Loading…
Reference in New Issue
Block a user