From b8bac3316909c01646c472262ce2efcd5cc42eef Mon Sep 17 00:00:00 2001 From: ddcrjlalumiere Date: Tue, 21 Mar 2017 15:54:32 -0400 Subject: [PATCH] Directly link to HCL --- security/security-guidelines.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/security-guidelines.md b/security/security-guidelines.md index e28f16df..eed8a2ca 100644 --- a/security/security-guidelines.md +++ b/security/security-guidelines.md @@ -63,7 +63,7 @@ qubes-hcl-report where \ is the name of the VM within which the report will be written (but the report will also be displayed in the Dom0 terminal). If it displays that VT-d is active, you should be able to assign **PCIe devices to a HVM** and **enjoy DMA protection** for your driver domains, so you successfully passed this step. -If VT-d is not active, attempt to activate it by selecting the **VT-d flag** within the BIOS settings. If your processor/BIOS does not allow VT-d activation you still enjoy much better security than alternative systems, but you may be vulnerable to **DMA attacks**. Next time you buy a computer consult our **HCL (Hardware Compatibility List)** and possibly contribute to it. +If VT-d is not active, attempt to activate it by selecting the **VT-d flag** within the BIOS settings. If your processor/BIOS does not allow VT-d activation you still enjoy much better security than alternative systems, but you may be vulnerable to **DMA attacks**. Next time you buy a computer consult our **[HCL (Hardware Compatibility List)](https://www.qubes-os.org/hcl/)** and possibly contribute to it. Updating Software -----------------