mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-07 06:02:26 -04:00
Fix a few typos
This commit is contained in:
parent
5ae0d5dfb0
commit
0baa097f9b
39 changed files with 211 additions and 218 deletions
|
@ -43,7 +43,7 @@ stored on or accessed by this computer, such as health records, confidential
|
|||
communications, or thoughts written in a private journal. Malware can also
|
||||
interfere with the activities you perform with your computer. For example,
|
||||
if you use your computer to conduct financial transactions, the malware
|
||||
might allow its creator to make fradulent transactions in your name.
|
||||
might allow its creator to make fraudulent transactions in your name.
|
||||
|
||||
|
||||
Aren't antivirus programs and firewalls enough?
|
||||
|
@ -67,7 +67,7 @@ these bugs from being exploited.
|
|||
How does Qubes provide security?
|
||||
--------------------------------
|
||||
|
||||
Qubes takes an appraoch called **security by compartmentalization**, which
|
||||
Qubes takes an approach called **security by compartmentalization**, which
|
||||
allows you to compartmentalize the various parts of your digital life into
|
||||
securely isolated virtual machines (VMs). A VM is basically a simulated
|
||||
computer with its own OS which runs as software on your physical computer. You
|
||||
|
@ -185,4 +185,3 @@ technical details have been omitted here for the sake of presentation.
|
|||
[devel-faq]: /doc/devel-faq/
|
||||
[downloads]: /downloads/
|
||||
[getting started]: /doc/getting-started/
|
||||
|
||||
|
|
|
@ -188,7 +188,7 @@ Run `systemctl enable NetworkManager-dispatcher.service` in the TemplateVM upon
|
|||
|
||||
### My keyboard layout settings are not behaving correctly. What should I do?
|
||||
|
||||
Please read [this disccusion](https://groups.google.com/d/topic/qubes-devel/d8ZQ_62asKI/discussion).
|
||||
Please read [this discussion](https://groups.google.com/d/topic/qubes-devel/d8ZQ_62asKI/discussion).
|
||||
|
||||
### My dom0 and/or TemplateVM update stalls when attempting to update via the GUI tool. What should I do?
|
||||
|
||||
|
@ -200,7 +200,7 @@ In your TemplateVMs, open a terminal and run `sudo yum upgrade`.
|
|||
|
||||
### How do I run a Windows HVM in non-seamless mode (i.e., as a single window)?
|
||||
|
||||
Enable "debug mode" in the AppVM's settings, either by checking the box labelled "Run in debug mode" in the Qubes VM Manager AppVM settings menu or by running the [qvm-prefs command](/doc/dom0-tools/qvm-prefs/).)
|
||||
Enable "debug mode" in the AppVM's settings, either by checking the box labeled "Run in debug mode" in the Qubes VM Manager AppVM settings menu or by running the [qvm-prefs command](/doc/dom0-tools/qvm-prefs/).)
|
||||
|
||||
|
||||
### I created a usbVM and assigned usb controllers to it. Now the usbVM wont boot.
|
||||
|
@ -232,8 +232,8 @@ This is an intended feature. A device which was previously assigned to a less tr
|
|||
or
|
||||
|
||||
1. Go to the sysfs (`/sys/bus/pci`), find the right device, detach it from the pciback driver and attach back to the original driver. Replace `<BDF>` with your device, for example `00:1c.2`:
|
||||
|
||||
|
||||
echo 0000:<BDF> > /sys/bus/pci/drivers/pciback/unbind
|
||||
MODALIAS=`cat /sys/bus/pci/devices/0000:<BDF>/modalias`
|
||||
MOD=`modprobe -R $MODALIAS | head -n 1`
|
||||
echo <BDF> > /sys/bus/pci/drivers/$MOD/bind
|
||||
echo <BDF> > /sys/bus/pci/drivers/$MOD/bind
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue