From 055776a87cb858db6b62955605ded885e76179db Mon Sep 17 00:00:00 2001 From: Andrew David Wong Date: Mon, 21 Jan 2019 21:51:52 -0600 Subject: [PATCH] Fix Markdown syntax and clean up text --- customization/disposablevm-customization.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/customization/disposablevm-customization.md b/customization/disposablevm-customization.md index 2a482455..6394b45a 100644 --- a/customization/disposablevm-customization.md +++ b/customization/disposablevm-customization.md @@ -246,15 +246,15 @@ Using DisposableVMs in this manner is ideal for untrusted qubes which require pe [user@dom0 ~]$ qvm-prefs disp-sys-usb autostart true 7. Users should now follow instructions on [How to hide USB controllers from dom0](/doc/usb/#how-to-hide-all-usb-controllers-from-dom0) -8. At this point your mouse may not work. In which case you should follow this qubes guide https://www.qubes-os.org/doc/usb/ -Edit the qubes.InputMouse policy file in dom0, which is located here: +8. At this point, your mouse may not work. + Edit the `qubes.InputMouse` policy file in dom0, which is located here: -/etc/qubes-rpc/policy/qubes.InputMouse + /etc/qubes-rpc/policy/qubes.InputMouse -Add a line like this to the top of the file: + Add a line like this to the top of the file: -disp-sys-usb dom0 allow,user=root + disp-sys-usb dom0 allow,user=root #### Starting the DisposableVMs ####