mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-24 23:09:29 -05:00
Remove content from pages dynamically filled in by a relevant layout
In fact, right now those pages content is duplicated - once included here and once inserted by the doc-content (or hcl) layout.
This commit is contained in:
parent
9d4ade3d58
commit
1a92224f8b
@ -3,94 +3,3 @@ layout: doc
|
||||
permalink: /doc/style-guide/
|
||||
title: Style-guide
|
||||
---
|
||||
|
||||
Style Guide
|
||||
===========
|
||||
|
||||
## Fonts
|
||||
|
||||
Currently Qubes OS is using the following fonts for our website, branding, and other public facing (non-OS) materials. The OS itself uses what is normal for a user's desktop environment of choice.
|
||||
|
||||
<div class="styleguide">
|
||||
{% for font in site.data.styleguide.fonts %}
|
||||
<div class="row">
|
||||
<div class="col-lg-6 col-md-6 focus">
|
||||
<div class="font {{font.class}}">Custom Qubes Font</div>
|
||||
</div>
|
||||
<div class="col-lg-6 col-md-6">
|
||||
<strong>Family:</strong> {{font.family}}<br>
|
||||
</div>
|
||||
</div>
|
||||
{% endfor %}
|
||||
</div>
|
||||
|
||||
---
|
||||
|
||||
## Colors
|
||||
|
||||
The following **grayscale** colors are currently used on the Qubes website and documentation, and they will eventually match colors within the OS itself.
|
||||
|
||||
<div class="styleguide">
|
||||
{% for color in site.data.styleguide.colors %}
|
||||
{% if color.type == "grayscale" %}
|
||||
<div class="swatch more-bottom more-right">
|
||||
<div class="color add-bottom bg-{{color.class}}"></div>
|
||||
<strong class="add-bottom">{{color.name}}</strong>
|
||||
<code>#{{color.hex | downcase}}</code>
|
||||
</div>
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
</div>
|
||||
|
||||
The following **colors** are currently being used on the Qubes website and documentation, and they will eventually match the colors within the OS itself!
|
||||
|
||||
<div class="styleguide">
|
||||
{% for color in site.data.styleguide.colors %}
|
||||
{% if color.type == "colors" %}
|
||||
<div class="swatch more-bottom more-right">
|
||||
<div class="color add-bottom bg-{{color.class}}"></div>
|
||||
<strong class="add-bottom">{{color.name}}</strong>
|
||||
<code>#{{color.hex | downcase}}</code>
|
||||
</div>
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
</div>
|
||||
|
||||
---
|
||||
|
||||
## Icons
|
||||
|
||||
Currently, all the icons on the Qubes-OS.org website are generated using [FontAwesome](https://fontawesome.com/).
|
||||
|
||||
*As more custom work is done to generate icons for the operating system itself, they will be added here!*
|
||||
|
||||
---
|
||||
|
||||
## Logos
|
||||
|
||||
The following is a collection of various sizes and versions of the Qubes logo used both in the OS itself and on our website.
|
||||
The artwork is licensed under Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0).
|
||||
The code is licensed under GNU GPLv2.
|
||||
GPLv2 and the source code can be [downloaded here](https://github.com/QubesOS/qubes-artwork).
|
||||
|
||||
<div class="styleguide">
|
||||
{% for logo in site.data.styleguide.logos %}
|
||||
{% for version in logo.versions %}
|
||||
<div class="row more-bottom">
|
||||
<div class="col-lg-4 col-md-4">
|
||||
<div class="focus">
|
||||
<img class="logo" src="{{version.path}}{{logo.image}}">
|
||||
</div>
|
||||
</div>
|
||||
<div class="col-lg-8 col-md-8">
|
||||
<p>
|
||||
<strong>Image:</strong> {{logo.image}}<br>
|
||||
<strong>Size:</strong> {{version.size}}<br>
|
||||
<strong>Format:</strong> {{version.format}}<br>
|
||||
<strong>Download:</strong> <a href="{{version.path}}{{logo.image}}" target="_blank">this image</a>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
{% endfor %}
|
||||
{% endfor %}
|
||||
</div>
|
||||
|
284
doc.md
284
doc.md
@ -1,5 +1,5 @@
|
||||
---
|
||||
layout: doc
|
||||
layout: doc-index
|
||||
permalink: /doc/
|
||||
redirect_from:
|
||||
- /en/doc/
|
||||
@ -13,285 +13,3 @@ redirect_from:
|
||||
- /community/
|
||||
title: Documentation
|
||||
---
|
||||
|
||||
# Qubes OS Documentation
|
||||
|
||||
Welcome to the Qubes OS documentation!
|
||||
|
||||
## Introduction
|
||||
|
||||
* [What is Qubes OS?](/intro/)
|
||||
* [Video Tours](/video-tours/)
|
||||
* [Screenshots](/screenshots/)
|
||||
* [User FAQ](/faq/#users)
|
||||
* [Reporting Bugs and Other Issues](/doc/reporting-bugs/)
|
||||
* [Help, Support, Mailing Lists, and Forum](/support/)
|
||||
* [How to Contribute](/doc/contributing/)
|
||||
|
||||
## Project Security
|
||||
|
||||
* [Security Center](/security/)
|
||||
* [Security FAQ](/faq/#general--security)
|
||||
* [Security Pack](/security/pack/)
|
||||
* [Security Bulletins](/security/bulletins/)
|
||||
* [Canaries](/security/canaries/)
|
||||
* [Xen Security Advisory (XSA) Tracker](/security/xsa/)
|
||||
* [Verifying Signatures](/security/verifying-signatures/)
|
||||
* [Qubes PGP Keys](https://keys.qubes-os.org/keys/)
|
||||
|
||||
|
||||
## User Documentation
|
||||
|
||||
Core documentation for Qubes users.
|
||||
|
||||
### Choosing Your Hardware
|
||||
|
||||
* [System Requirements](/doc/system-requirements/)
|
||||
* [Certified Hardware](/doc/certified-hardware/)
|
||||
* [Hardware Compatibility List (HCL)](/hcl/)
|
||||
* [Hardware Testing](/doc/hardware-testing/)
|
||||
|
||||
### Downloading, Installing, and Upgrading Qubes
|
||||
|
||||
* [Downloads](/downloads/)
|
||||
* [Installation Guide](/doc/installation-guide/)
|
||||
* [Upgrade Guides](/doc/upgrade/)
|
||||
* [Supported Versions](/doc/supported-versions/)
|
||||
* [Version Scheme](/doc/version-scheme/)
|
||||
* [Testing New Releases and Updates](/doc/testing/)
|
||||
|
||||
### Common Tasks
|
||||
|
||||
* [Getting Started](/getting-started/)
|
||||
* [Copying and Pasting Text Between Domains](/doc/copy-paste/)
|
||||
* [Copying and Moving Files Between Domains](/doc/copying-files/)
|
||||
* [Copying from (and to) Dom0](/doc/copy-from-dom0/)
|
||||
* [Updating Qubes OS](/doc/updating-qubes-os/)
|
||||
* [Installing and Updating Software in Dom0](/doc/software-update-dom0/)
|
||||
* [Installing and Updating Software in DomUs](/doc/software-update-domu/)
|
||||
* [Backup, Restoration, and Migration](/doc/backup-restore/)
|
||||
* [Volume Backup and Revert](/doc/volume-backup-revert/)
|
||||
* [DisposableVMs](/doc/disposablevm/)
|
||||
* [Block (or Storage) Devices](/doc/block-devices/)
|
||||
* [USB Devices](/doc/usb-devices)
|
||||
* [PCI Devices](/doc/pci-devices/)
|
||||
* [Device Handling](/doc/device-handling/)
|
||||
* [Optical Discs](/doc/optical-discs/)
|
||||
* [Fullscreen Mode](/doc/full-screen-mode/)
|
||||
|
||||
### Managing Operating Systems within Qubes
|
||||
|
||||
* [TemplateVMs](/doc/templates/)
|
||||
* [Fedora](/doc/templates/fedora/)
|
||||
* [Debian](/doc/templates/debian/)
|
||||
* [Minimal TemplateVMs](/doc/templates/minimal/)
|
||||
* [Windows](/doc/windows/)
|
||||
* [StandaloneVMs and HVMs](/doc/standalone-and-hvm/)
|
||||
|
||||
### Security in Qubes
|
||||
|
||||
* [Qubes Firewall](/doc/firewall/)
|
||||
* [Understanding and Preventing Data Leaks](/doc/data-leaks/)
|
||||
* [Passwordless Root Access in VMs](/doc/vm-sudo/)
|
||||
* [Device Handling Security](/doc/device-handling-security/)
|
||||
* [Anti Evil Maid](/doc/anti-evil-maid/)
|
||||
* [Split GPG](/doc/split-gpg/)
|
||||
* [U2F Proxy](/doc/u2f-proxy/)
|
||||
* [YubiKey](/doc/yubi-key/)
|
||||
|
||||
### Advanced Configuration
|
||||
|
||||
* [Configuration Files](/doc/config-files/)
|
||||
* [Storing AppVMs on Secondary Drives](/doc/secondary-storage/)
|
||||
* [RPC Policies](/doc/rpc-policy/)
|
||||
* [USB Qubes](/doc/usb-qubes/)
|
||||
* [Managing VM Kernels](/doc/managing-vm-kernel/)
|
||||
* [Salt Management Stack](/doc/salt/)
|
||||
* [DisposableVM Customization](/doc/disposablevm-customization/)
|
||||
* [Making Any File Persistent Using `bind-dirs`](/doc/bind-dirs/)
|
||||
* [GUI Configuration](/doc/gui-configuration/)
|
||||
* [Resizing Disk Images](/doc/resize-disk-image/)
|
||||
* [Mounting and Decrypting Qubes Partitions from Outside Qubes](/doc/mount-from-other-os/)
|
||||
* [KDE](/doc/kde/)
|
||||
* [i3 Window Manager](/doc/i3/)
|
||||
* [awesome Window Manager](/doc/awesome/)
|
||||
|
||||
### Troubleshooting
|
||||
|
||||
* [Installation Troubleshooting](/doc/installation-troubleshooting)
|
||||
* [UEFI Troubleshooting](/doc/uefi-troubleshooting/)
|
||||
* [Suspend/Resume Troubleshooting](/doc/suspend-resume-troubleshooting/)
|
||||
* [Application Shortcut Troubleshooting](/doc/managing-appvm-shortcuts/)
|
||||
* [VM Troubleshooting](/doc/vm-troubleshooting/)
|
||||
* [HVM Troubleshooting](/doc/hvm-troubleshooting/)
|
||||
* [Disk Troubleshooting](/doc/disk-troubleshooting/)
|
||||
* [PCI Troubleshooting](/doc/pci-troubleshooting/)
|
||||
* [USB Troubleshooting](/doc/usb-troubleshooting/)
|
||||
* [GUI Troubleshooting](/doc/gui-troubleshooting/)
|
||||
* [Media Troubleshooting](/doc/media-troubleshooting/)
|
||||
* [Firewall Troubleshooting](/doc/firewall/#firewall-troubleshooting)
|
||||
* [Hardware Troubleshooting](/doc/hardware-troubleshooting/)
|
||||
* [VPN Troubleshooting](/doc/vpn-troubleshooting/)
|
||||
* [Update Troubleshooting](/doc/update-troubleshooting/)
|
||||
|
||||
### Reference Pages
|
||||
|
||||
* [Command-line Tools](/doc/tools/)
|
||||
* [Glossary](/doc/glossary/)
|
||||
* [Qubes Service Framework](/doc/qubes-service/)
|
||||
* [Command Execution in VMs (and Qubes RPC)](/doc/qrexec/)
|
||||
* [Deprecated Documentation](https://github.com/QubesOS/qubesos.github.io#deprecated-documentation)
|
||||
|
||||
|
||||
## Developer Documentation
|
||||
|
||||
Core documentation for Qubes developers and advanced users.
|
||||
|
||||
### General
|
||||
|
||||
* [Developer FAQ](/faq/#developers)
|
||||
* [Package Contributions](/doc/package-contributions/)
|
||||
* [Documentation Guidelines](/doc/doc-guidelines/)
|
||||
* [Community-Developed Feature Tracker](/qubes-issues/)
|
||||
* [Google Summer of Code](/gsoc/)
|
||||
* [Google Season of Docs](/gsod/)
|
||||
* [Books for Developers](/doc/devel-books/)
|
||||
* [Style Guide](/doc/style-guide/)
|
||||
* [Usability & UX](/doc/usability-ux/)
|
||||
|
||||
### Code
|
||||
|
||||
* [Source Code](/doc/source-code/)
|
||||
* [Software License](/doc/license/)
|
||||
* [Coding Guidelines](/doc/coding-style/)
|
||||
* [Code Signing](/doc/code-signing/)
|
||||
|
||||
### System
|
||||
|
||||
* [Qubes OS Architecture Overview](/doc/architecture/)
|
||||
* [Security-critical Code in Qubes OS](/doc/security-critical-code/)
|
||||
* [Qubes Core Admin](https://dev.qubes-os.org/projects/core-admin/en/latest/)
|
||||
* [Qubes Core Admin Client](https://dev.qubes-os.org/projects/core-admin-client/en/latest/)
|
||||
* [Qubes Admin API](/news/2017/06/27/qubes-admin-api/)
|
||||
* [Qubes Core Stack](/news/2017/10/03/core3/)
|
||||
* [Qubes GUI virtualization protocol](/doc/gui/)
|
||||
* [Networking in Qubes](/doc/networking/)
|
||||
* [Implementation of template sharing and updating](/doc/template-implementation/)
|
||||
* [Storage Pools](/doc/storage-pools/)
|
||||
* [Audio virtualization](/doc/audio-virtualization/)
|
||||
|
||||
### Services
|
||||
|
||||
* [Inter-domain file copying](/doc/qfilecopy/) (deprecates [`qfileexchgd`](/doc/qfileexchgd/))
|
||||
* [Dynamic memory management in Qubes](/doc/qmemman/)
|
||||
* [Implementation of DisposableVMs](/doc/dvm-impl/)
|
||||
* [Dom0 secure update mechanism](/doc/dom0-secure-updates/)
|
||||
* [Qrexec: secure communication across domains](/doc/qrexec/)
|
||||
* [Qrexec: Qubes RPC internals](/doc/qrexec-internals/)
|
||||
* [Qrexec: Socket-based services](/doc/qrexec-socket-services/)
|
||||
|
||||
### Debugging
|
||||
|
||||
* [Profiling python code](/doc/profiling/)
|
||||
* [Test environment in separate machine for automatic tests](/doc/test-bench/)
|
||||
* [Automated tests](/doc/automated-tests/)
|
||||
* [VM-dom0 internal configuration interface](/doc/vm-interface/)
|
||||
* [Debugging Windows VMs](/doc/windows-debugging/)
|
||||
* [Safe Remote Dom0 Terminals](/doc/safe-remote-ttys/)
|
||||
* [Mount LVM Image](/doc/mount-lvm-image/)
|
||||
|
||||
### Building
|
||||
|
||||
* [Building Qubes](/doc/qubes-builder/) (["API" Details](/doc/qubes-builder-details/))
|
||||
* [Development Workflow](/doc/development-workflow/)
|
||||
* [Building Qubes OS ISO](/doc/qubes-iso-building/)
|
||||
* [Qubes Template Configuration Files](https://github.com/QubesOS/qubes-template-configs)
|
||||
|
||||
### Releases
|
||||
|
||||
* [Release notes](/doc/releases/notes/)
|
||||
* [Release schedules](/doc/releases/schedules/)
|
||||
* [Release checklist](/doc/releases/todo/)
|
||||
|
||||
|
||||
## External Documentation
|
||||
|
||||
Unofficial, third-party documentation from the Qubes community and others.
|
||||
For more, please see [Qubes Community Documentation](https://github.com/Qubes-Community/Contents/tree/master/docs).
|
||||
|
||||
### Operating System Guides
|
||||
|
||||
* [Template: Ubuntu](https://github.com/Qubes-Community/Contents/blob/master/docs/os/ubuntu.md)
|
||||
* [Template: Whonix](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md)
|
||||
* [Template: CentOS](https://github.com/Qubes-Community/Contents/blob/master/docs/os/centos.md)
|
||||
* [Template: Gentoo](https://github.com/Qubes-Community/Contents/blob/master/docs/os/gentoo.md)
|
||||
* [Pentesting](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting.md)
|
||||
* [Pentesting: BlackArch](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/blackarch.md)
|
||||
* [Pentesting: Kali](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/kali.md)
|
||||
* [Pentesting: PTF](https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/ptf.md)
|
||||
* [Tips for Using Linux in an HVM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md)
|
||||
* [Creating a NetBSD VM](https://github.com/Qubes-Community/Contents/blob/master/docs/os/netbsd.md)
|
||||
|
||||
### Security Guides
|
||||
|
||||
* [Security Guidelines](https://github.com/Qubes-Community/Contents/blob/master/docs/security/security-guidelines.md)
|
||||
* [Using Multi-factor Authentication with Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/security/multifactor-authentication.md)
|
||||
* [How to Set Up a Split Bitcoin Wallet in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/security/split-bitcoin.md)
|
||||
* [Split dm-crypt](https://github.com/rustybird/qubes-split-dm-crypt)
|
||||
* [Split SSH](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/split-ssh.md)
|
||||
* [Using OnlyKey with Qubes OS](https://docs.crp.to/qubes.html)
|
||||
|
||||
### Privacy Guides
|
||||
|
||||
* [Whonix for Privacy & Anonymity](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/whonix.md)
|
||||
* [Running Tails in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md)
|
||||
* [Anonymizing your MAC Address](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md)
|
||||
* [Signal](https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/signal.md)
|
||||
* [Reducing the fingerprint of the text-based web browser w3m](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/w3m.md)
|
||||
|
||||
### Configuration Guides
|
||||
|
||||
* [Qubes Tips and Tricks](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/tips-and-tricks.md)
|
||||
* [How to set up a ProxyVM as a VPN Gateway](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md)
|
||||
* [Multibooting](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/multiboot.md)
|
||||
* [Changing your Time Zone](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/change-time-zone.md)
|
||||
* [Installing ZFS in Qubes](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/zfs.md)
|
||||
* [Mutt Guide](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/mutt.md)
|
||||
* [Postfix Guide](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/postfix.md)
|
||||
* [Fetchmail Guide](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/fetchmail.md)
|
||||
* [Creating Custom NetVMs and ProxyVMs](https://theinvisiblethings.blogspot.com/2011/09/playing-with-qubes-networking-for-fun.html)
|
||||
* [How to make proxy for individual tcp connection from networkless VM](https://groups.google.com/group/qubes-devel/msg/4ca950ab6d7cd11a)
|
||||
* [Adding Bridge Support to the NetVM (EXPERIMENTAL)](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/network-bridge-support.md)
|
||||
* [Enabling TRIM for SSD disks](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/disk-trim.md)
|
||||
* [Configuring a Network Printer](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/network-printer.md)
|
||||
* [Using External Audio Devices](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/external-audio.md)
|
||||
* [Rxvt Guide](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/rxvt.md)
|
||||
* [Adding SSD storage cache](https://groups.google.com/d/msgid/qubes-users/a08359c9-9eb0-4d1a-ad92-a8a9bc676ea6%40googlegroups.com)
|
||||
* [How to Make a Multimedia TemplateVM](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/multimedia.md)
|
||||
* [How to install an Nvidia driver in dom0](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md)
|
||||
|
||||
### Customization Guides
|
||||
|
||||
* [Customizing Fedora minimal templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/fedora-minimal-template-customization.md)
|
||||
* [Customizing Windows 7 templates](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/windows-template-customization.md)
|
||||
* [Language Localization](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/language-localization.md)
|
||||
* [Dark Theme in Dom0 and DomU](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/dark-theme.md)
|
||||
* [Safely Removing TemplateVM Packages (Example: Thunderbird)](https://github.com/Qubes-Community/Contents/blob/master/docs/customization/removing-templatevm-packages.md)
|
||||
|
||||
### Troubleshooting
|
||||
|
||||
* [Nvidia Troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/nvidia-troubleshooting.md)
|
||||
* [Lenovo ThinkPad Troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/thinkpad-troubleshooting.md)
|
||||
* [Apple MacBook Troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/macbook-troubleshooting.md)
|
||||
* [Sony Vaio Troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/sony-vaio-tinkering.md)
|
||||
* [Intel Integrated Graphics Troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/intel-igfx-troubleshooting.md)
|
||||
* [Multiboot Troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/multiboot.md#troubleshooting)
|
||||
* [Application Troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/application-troubleshooting.md)
|
||||
* [Tails Troubleshooting](https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/tails-troubleshooting.md)
|
||||
|
||||
### Building Guides
|
||||
|
||||
* [Building a TemplateVM based on a new OS (ArchLinux example)](https://github.com/Qubes-Community/Contents/blob/master/docs/building/building-non-fedora-template.md)
|
||||
* [Building the Archlinux Template](https://github.com/Qubes-Community/Contents/blob/master/docs/building/building-archlinux-template.md)
|
||||
* [Building the Whonix Templates](https://github.com/Qubes-Community/Contents/blob/master/docs/building/building-whonix-template.md)
|
||||
* [How to compile kernels for dom0](https://groups.google.com/d/topic/qubes-users/yBeUJPwKwHM/discussion)
|
||||
|
@ -1,151 +1,5 @@
|
||||
---
|
||||
layout: home
|
||||
layout: experts
|
||||
permalink: /experts/
|
||||
title: Experts
|
||||
---
|
||||
|
||||
<div class="home-content container">
|
||||
<div class="row more-top">
|
||||
<div class="col-lg-12 col-md-12">
|
||||
<h2 class="text-center"><i class="fa fa-quote-left"></i> What the experts are saying about Qubes</h2>
|
||||
</div>
|
||||
</div>
|
||||
<div class="white-box more-bottom">
|
||||
<div class="row featured-quotes">
|
||||
<div class="col-lg-3 col-md-3 text-center">
|
||||
<a class="avatar-large" href="https://twitter.com/Snowden/status/781493632293605376" target="_blank">
|
||||
<img src="/attachment/site/expert-edward-snowden.jpg">
|
||||
</a>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9 more-top">
|
||||
<a href="https://twitter.com/Snowden/status/781493632293605376" target="_blank">
|
||||
<blockquote>"If you're serious about security, QubesOS is the best OS available today. It's what I use, and free. Nobody does VM isolation better."
|
||||
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
|
||||
<footer>Edward Snowden<cite>, whistleblower and privacy advocate</cite></footer>
|
||||
</blockquote>
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="row featured-quotes">
|
||||
<div class="col-lg-3 col-md-3 text-center">
|
||||
<a class="avatar-large" href="https://twitter.com/hashbreaker/status/577206817475850240" target="_blank">
|
||||
<img src="/attachment/site/expert-daniel-j-bernstein.jpg">
|
||||
</a>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9 more-top">
|
||||
<a href="https://twitter.com/hashbreaker/status/577206817475850240" target="_blank">
|
||||
<blockquote>"Happy thought of the day: An attacker who merely finds a browser bug can't listen to my microphone except when I've told Qubes to enable it."
|
||||
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
|
||||
<footer>Daniel J. Bernstein<cite title="Source Title">, mathematician, cryptologist, and computer scientist</cite></footer>
|
||||
</blockquote>
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="row featured-quotes">
|
||||
<div class="col-lg-3 col-md-3 text-center">
|
||||
<a class="avatar-large" href="https://twitter.com/micahflee/status/577998730340622337" target="_blank">
|
||||
<img src="/attachment/site/expert-micah-lee.jpg">
|
||||
</a>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9 more-top">
|
||||
<a href="https://twitter.com/micahflee/status/577998730340622337" target="_blank">
|
||||
<blockquote>"When I use Qubes I feel like a god. Software thinks that it's in control, that it can do what it wants? It can't. I'm in control."
|
||||
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
|
||||
<footer>Micah Lee<cite title="Source Title">, Freedom of the Press Foundation, The Intercept</cite></footer>
|
||||
</blockquote>
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="row featured-quotes">
|
||||
<div class="col-lg-3 col-md-3 text-center">
|
||||
<a class="avatar-large" href="https://twitter.com/csoghoian" target="_blank">
|
||||
<img src="/attachment/site/expert-christopher-soghoian.jpg">
|
||||
</a>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9 more-top">
|
||||
<a href="https://twitter.com/csoghoian" target="_blank">
|
||||
<blockquote>"I am so much happier and less stressed out after switching to QubesOS. Can wholeheartedly recommend."
|
||||
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
|
||||
<footer>Christopher Soghoian<cite title="Source Title">, privacy researcher, activist, and principal technologist at the ACLU</cite></footer>
|
||||
</blockquote>
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="row featured-quotes">
|
||||
<div class="col-lg-3 col-md-3 text-center">
|
||||
<a class="avatar-large" href="https://twitter.com/isislovecruft" target="_blank">
|
||||
<img src="/attachment/site/expert-isis-agora-lovecruft.jpg">
|
||||
</a>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9 more-top">
|
||||
<a href="https://twitter.com/isislovecruft" target="_blank">
|
||||
<blockquote>"With QubesOS, I feel more comfortable accessing Tor Project infrastructure from the same laptop I use to execute random GameBoy ROMs I downloaded from the internet."
|
||||
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
|
||||
<footer>Isis Agora Lovecruft<cite title="Source Title">, cypherpunk and Tor Project core developer</cite></footer>
|
||||
</blockquote>
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="row featured-quotes">
|
||||
<div class="col-lg-3 col-md-3 text-center">
|
||||
<a class="avatar-large" href="https://twitter.com/petertoddbtc/status/924981145871060996" target="_blank">
|
||||
<img src="/attachment/site/expert-peter-todd.jpg">
|
||||
</a>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9 more-top">
|
||||
<a href="https://twitter.com/petertoddbtc/status/924981145871060996" target="_blank">
|
||||
<blockquote>"Donated a % of my consulting company's last year revenue to Qubes OS. I rely on it for all my work, and recommend it to clients too."
|
||||
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
|
||||
<footer>Peter Todd<cite title="Source Title">, Applied Cryptography Consultant</cite></footer>
|
||||
</blockquote>
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="row featured-quotes">
|
||||
<div class="col-lg-3 col-md-3 text-center">
|
||||
<a class="avatar-large" href="https://twitter.com/legind/status/742504400854257664" target="_blank">
|
||||
<img src="/attachment/site/expert-bill-budington.jpg">
|
||||
</a>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9 more-top">
|
||||
<a href="https://twitter.com/legind/status/742504400854257664" target="_blank">
|
||||
<blockquote>"I really like it [Qubes OS]. If your hardware supports it, I recommend it. Everything is super well thought-out."
|
||||
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
|
||||
<footer>Bill Budington<cite title="Source Title">, security engineer and technologist, Electronic Frontier Foundation</cite></footer>
|
||||
</blockquote>
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="row featured-quotes">
|
||||
<div class="col-lg-3 col-md-3 text-center">
|
||||
<a class="avatar-large" href="https://twitter.com/kennwhite/status/914924731400425475" target="_blank">
|
||||
<img src="/attachment/site/expert-kenn-white.jpg">
|
||||
</a>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9 more-top">
|
||||
<a href="https://twitter.com/kennwhite/status/914924731400425475" target="_blank">
|
||||
<blockquote>"Periodic shout out to [Rutkowska] and the QubesOS team for *years* of hard work to improve desktop security. Qubes is the real deal."
|
||||
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
|
||||
<footer>Kenn White<cite title="Source Title">, security researcher, Open Crypto Audit Project</cite></footer>
|
||||
</blockquote>
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="row featured-quotes">
|
||||
<div class="col-lg-3 col-md-3 text-center">
|
||||
<a class="avatar-large" href="https://twitter.com/vitalikbuterin/status/1086465679904038912" target="_blank">
|
||||
<img src="/attachment/site/expert-vitalik-buterin.jpg">
|
||||
</a>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9 more-top">
|
||||
<a href="https://twitter.com/vitalikbuterin/status/1086465679904038912" target="_blank">
|
||||
<blockquote>"Trying out Qubes OS (qubes-os.org) recently; linux distro designed around increased security by virtualizing everything and making it really convenient to hop between VMs. Surprisingly good user-friendliness!"
|
||||
<i class="fa fa-twitter fa-fw" aria-hidden="true"></i>
|
||||
<footer>Vitalik Buterin<cite title="Source Title">, creator of Ethereum</cite></footer>
|
||||
</blockquote>
|
||||
</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
{% include footer.html %}
|
||||
</div>
|
||||
|
@ -9,18 +9,3 @@ Qubes Canaries
|
||||
==============
|
||||
|
||||
Qubes Canaries are published through the [Qubes Security Pack](/security/pack/).
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
<th title="Anchor Link"><span class="fa fa-link"></span></th>
|
||||
<th>Date</th>
|
||||
<th>Qubes Canary</th>
|
||||
</tr>
|
||||
{% for canary in site.data.canary reversed %}
|
||||
<tr id="{{ canary.canary }}">
|
||||
<td><a href="#{{ canary.canary }}" class="fa fa-link black-icon" title="Anchor link to Qubes Canary row: Qubes Canary #{{ canary.canary }}"></a></td>
|
||||
<td>{{ canary.date }}</td>
|
||||
<td><a href="https://github.com/QubesOS/qubes-secpack/blob/master/canaries/canary-{{ canary.canary }}-{{ canary.date | date: '%Y' }}.txt">Qubes Canary #{{ canary.canary }}</a></td>
|
||||
</tr>
|
||||
{% endfor %}
|
||||
</table>
|
||||
|
@ -13,20 +13,4 @@ title: Qubes Security Bulletins (QSBs)
|
||||
Qubes Security Bulletins (QSBs)
|
||||
===============================
|
||||
|
||||
A Qubes Security Bulletin (QSB) is a security announcement issued by the Qubes OS Project, typically providing a summary and impact analysis of one or more recently discovered software vulnerabilities, including details about patching to address them.
|
||||
QSBs are published through the [Qubes Security Pack (qubes-secpack)](/security/pack/).
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
<th title="Anchor Link"><span class="fa fa-link"></span></th>
|
||||
<th>Date</th>
|
||||
<th>Qubes Security Bulletin</th>
|
||||
</tr>
|
||||
{% for qsb in site.data.qsb reversed %}
|
||||
<tr id="{{ qsb.qsb }}">
|
||||
<td><a href="#{{ qsb.qsb }}" class="fa fa-link black-icon" title="Anchor link to QSB row: QSB #{{ qsb.qsb }}"></a></td>
|
||||
<td>{{ qsb.date }}</td>
|
||||
<td><a href="https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-{{ qsb.qsb }}-{{ qsb.date | date: '%Y' }}.txt">QSB #{{ qsb.qsb }}: {{ qsb.title | truncate: 68 }}</a></td>
|
||||
</tr>
|
||||
{% endfor %}
|
||||
</table>
|
||||
Qubes Security Bulletins (QSBs) are published through the [Qubes Security Pack](/security/pack/).
|
||||
|
@ -28,84 +28,6 @@ Important Notes
|
||||
* Unused and withdrawn XSA numbers are included in the tracker for the sake of completeness, but they are excluded from the [Statistics] section for the sake of accuracy.
|
||||
* All dates are in UTC.
|
||||
|
||||
|
||||
Statistics
|
||||
----------
|
||||
{% assign date_first = site.data.xsa.first.date %}
|
||||
{% assign date_first_epoch = date_first | date: "%s" %}
|
||||
{% assign date_last = site.data.xsa.last.date %}
|
||||
{% assign date_last_epoch = date_last | date: "%s" %}
|
||||
{% assign timespan_epoch = date_last_epoch | minus: date_first_epoch %}
|
||||
{% assign timespan_human = timespan_epoch | divided_by: 31536000.0 | round: 1 %}
|
||||
{% assign xsa_total = site.data.xsa | size | plus: 1.0 %}
|
||||
{% assign xsa_unused = 0.0 %}
|
||||
{% assign xsa_affected = 0.0 %}
|
||||
{% for xsa in site.data.xsa %}
|
||||
{% if xsa.affected == true %}
|
||||
{% assign xsa_affected = xsa_affected | plus: 1.0 %}
|
||||
{% endif %}
|
||||
{% if xsa.unused == true %}
|
||||
{% assign xsa_unused = xsa_unused | plus: 1.0 %}
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
{% assign xsa_used = xsa_total | minus: xsa_unused %}
|
||||
{% assign affected_percentage = xsa_affected | divided_by: xsa_used | times: 100.0 | round: 2 %}
|
||||
|
||||
* Total time span: **{{ timespan_human }} years** ({{ date_first }} to {{ date_last }})
|
||||
* Total XSAs published: **{{ xsa_used | round }}**
|
||||
* Total XSAs affecting Qubes OS: **{{ xsa_affected | round }}**
|
||||
* Percentage of XSAs affecting Qubes OS: **{{ affected_percentage }}%**
|
||||
|
||||
Tracker
|
||||
-------
|
||||
<table>
|
||||
<tr class="center">
|
||||
<th title="Anchor Link"><span class="fa fa-link"></span></th>
|
||||
<th>Date</th>
|
||||
<th title="Xen Security Advisory">XSA</th>
|
||||
<th>Is Qubes Affected?</th>
|
||||
</tr>
|
||||
{% for xsa in site.data.xsa reversed %}
|
||||
<tr id="{{ xsa.xsa }}">
|
||||
<td><a href="#{{ xsa.xsa }}" class="fa fa-link black-icon" title="Anchor link to tracker row: XSA-{{ xsa.xsa }}"></a></td>
|
||||
<td>{{ xsa.date }}</td>
|
||||
<td>
|
||||
<a title="Xen Security Advisory {{ xsa.xsa }}"
|
||||
{% if xsa.xsa <= 25 %}
|
||||
href="https://wiki.xenproject.org/wiki/Security_Announcements_(Historical)"
|
||||
{% else %}
|
||||
href="https://xenbits.xen.org/xsa/advisory-{{ xsa.xsa }}.html"
|
||||
{% endif %}>
|
||||
XSA-{{ xsa.xsa }} <span class="fa fa-external-link"></span></a>
|
||||
</td>
|
||||
<td>
|
||||
{% if xsa.affected == false %}
|
||||
{% if xsa.unused %}
|
||||
No (unused or withdrawn XSA number)
|
||||
{% elsif xsa.mitigation %}
|
||||
No (<a href="#{{ xsa.mitigation }}" title="No, the security of Qubes OS is not affected by XSA-{{ xsa.xsa }}. Click to read the explanation.">{{ xsa.mitigation }}</a>)
|
||||
{% else %}
|
||||
<span title="No, the security of Qubes OS is not affected by XSA-{{ xsa.xsa }}.">No</span>
|
||||
{% endif %}
|
||||
{% elsif xsa.affected == true %}
|
||||
<span title="Yes, the security of Qubes OS is affected by XSA-{{ xsa.xsa }}.">Yes</span>
|
||||
{% if xsa.qsb %}
|
||||
| <a href="https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-{{ xsa.qsb }}.txt" title="Qubes Security Bulletin {{ xsa.qsb }}">QSB-{{ xsa.qsb }} <span class="fa fa-external-link"></span></a>
|
||||
{% endif %}
|
||||
{% elsif xsa.affected == "tba" %}
|
||||
{% if xsa.tba %}
|
||||
<a href="{{ xsa.tba }}" title="To be announced. Click for more information.">TBA <span class="fa fa-external-link"></span></a>
|
||||
{% else %}
|
||||
<span title="To be announced">TBA</span>
|
||||
{% endif %}
|
||||
{% else %}
|
||||
{% endif %}
|
||||
</td>
|
||||
</tr>
|
||||
{% endfor %}
|
||||
</table>
|
||||
|
||||
|
||||
[XSA]: https://xenbits.xen.org/xsa/
|
||||
[QSB]: /security/bulletins/
|
||||
[DoS]: https://en.wikipedia.org/wiki/Denial-of-service_attack
|
||||
|
@ -1,173 +0,0 @@
|
||||
---
|
||||
layout: full
|
||||
model: all
|
||||
permalink: /hcl/
|
||||
redirect_from: /compatible-hardware/
|
||||
title: Hardware Compatibility List (HCL)
|
||||
---
|
||||
|
||||
<div id="hcl">
|
||||
<div class="row">
|
||||
<div class="col-lg-3 col-md-3">
|
||||
<h4>Hardware Type</h4>
|
||||
<p>
|
||||
<a href="#hardware-laptops" class="btn btn-primary btn-block" href=""><i class="fa fa-laptop"></i> Laptop Devices</a>
|
||||
</p>
|
||||
<p>
|
||||
<a href="#hardware-desktops" class="btn btn-primary btn-block" href=""><i class="fa fa-desktop"></i> Desktop, Workstation & Servers</a>
|
||||
</p>
|
||||
<p>
|
||||
<a href="#hardware-motherboards" class="btn btn-primary btn-block" href=""><i class="fa fa-server"></i> Motherboards</a>
|
||||
</p>
|
||||
<hr>
|
||||
<p>
|
||||
<a href="/doc/hcl/#generating-and-submitting-new-reports" class="btn btn-default btn-block" href=""><i class="fa fa-plus"></i> Add Your Device</a>
|
||||
</p>
|
||||
<h4>Information</h4>
|
||||
<ul>
|
||||
<li><a href="/doc/hcl/">What is the Hardware Compatibility List (HCL)?</a></li>
|
||||
<li><a href="/doc/hcl/#generating-and-submitting-new-reports">How do I Submit a Report?</a></li>
|
||||
<li><a href="/doc/system-requirements/">Qubes OS System Requirements</a></li>
|
||||
<li><a href="/doc/certified-hardware/">Certified Hardware</a></li>
|
||||
<li><a href="/doc/hardware-testing/">Hardware Testing</a></li>
|
||||
</ul>
|
||||
</div>
|
||||
<div class="col-lg-9 col-md-9">
|
||||
<h4>Marks & Colours</h4>
|
||||
<table class="table table-bordered">
|
||||
<tr>
|
||||
<td width="25%" class="success text-center"><strong>yes</strong><br> feature is working correctly</td>
|
||||
<td wdith="25%" class="info text-center"><strong>unknown</strong><br>a blank cell indicates we lack information</td>
|
||||
<td width="25%" class="warning text-center"><strong>partial</strong><br>some tweaking is needed, see remarks for more information</td>
|
||||
<td width="25%" class="danger text-center"><strong>no</strong><br>does not work or is not present</td>
|
||||
</tr>
|
||||
</table>
|
||||
<h4>List Columns</h4>
|
||||
<table class="table table-bordered table-responsive">
|
||||
<tr>
|
||||
<td><strong>Model</strong></td>
|
||||
<td>Manufacturer and Devicename (Socket/CPU, Chipset/Southbridge, Graphics)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><strong>BIOS</strong></td>
|
||||
<td>Reported BIOS version</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a class='ext-link' href='https://en.wikipedia.org/wiki/Hardware_virtual_machine'>HVM</a></td>
|
||||
<td>
|
||||
<a class='ext-link' href='https://en.wikipedia.org/wiki/Intel_VT-x#Intel-VT-x'>Intel VT-x</a> or <a class='ext-link' href='https://en.wikipedia.org/wiki/AMD-V#AMD_virtualization_.28AMD-V.29'>AMD-v</a> technology (required for running HVM domains, such as <a class='ext-link' href='/doc/WindowsAppVms/'>Windows-based AppVMs</a>)
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a class='ext-link' href='https://en.wikipedia.org/wiki/IOMMU'>IOMMU</a>
|
||||
</td>
|
||||
<td>
|
||||
Intel VT-d or AMD IOMMU technology (required for effective isolation of network VMs and <a class='ext-link' href='https://wiki.xen.org/wiki/Xen_PCI_Passthrough'>PCI passthrough</a>)
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a class='ext-link' href='https://en.wikipedia.org/wiki/Second_Level_Address_Translation'>SLAT</a>
|
||||
</td>
|
||||
<td>
|
||||
Second Level Address Translation (SLAT): Intel VT-x support for Extended Page Tables (EPT) or AMD-V support for Rapid Virtualization Indexing (RVI).
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a class='ext-link' href='https://en.wikipedia.org/wiki/Trusted_Platform_Module'>TPM</a></td>
|
||||
<td>
|
||||
TPM with proper BIOS support (required for <a class='ext-link' href='/doc/AntiEvilMaid/'>Anti Evil Maid</a>)
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><strong>Qubes</strong></td>
|
||||
<td>Reported Qubes version (R=Release, rc=release candidate, B=Beta, i.e.: R1, R2B1, R2rc1)</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a class='ext-link' href='https://en.wikipedia.org/wiki/Linux_kernel#Maintenance'>Kernel</a>
|
||||
</td>
|
||||
<td>
|
||||
Reported <a class='ext-link' href='https://en.wikipedia.org/wiki/Dom0'>dom0</a> kernel version (numbers in uname -r), can be selected during installation and boot in Troubleshooting menu
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><strong>Remark</strong></td>
|
||||
<td>Further information field. Qubes, Kernel and this field is coloured in conjunction to reflect general machine compatibility
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><strong>Credit</strong></td>
|
||||
<td>Name linked to report in <a class='ext-link' href='https://groups.google.com/forum/#!forum/qubes-users'>qubes-users</a></td>
|
||||
</tr>
|
||||
</table>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<h2 id="hardware-laptops" class="add-left"><i class="fa fa-laptop"></i> Laptop Devices</h2>
|
||||
<table class="table table-hover table-bordered table-responsive more-bottom" align="center">
|
||||
<tr>
|
||||
<th style="width=23%">Model</th>
|
||||
<th style="width=42px">BIOS</th>
|
||||
<th style="width=32px">HVM</th>
|
||||
<th style="width=32px">IOMMU</th>
|
||||
<th style="width=32px">SLAT</th>
|
||||
<th style="width=32px">TPM</th>
|
||||
<th style="width=42px">Qubes</th>
|
||||
<th style="width=42px">Xen</th>
|
||||
<th style="width=42px">Kernel</th>
|
||||
<th>Remark</th>
|
||||
<th style="width=20%">Credit</th>
|
||||
</tr>
|
||||
{% for device in site.hcl %}
|
||||
{% if device.type == 'laptop' or device.type == 'notebook' %}
|
||||
{% include hcl-device.html %}
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
</table>
|
||||
|
||||
<h2 id="hardware-desktops" class="add-left"><i class="fa fa-desktop"></i> Desktop, Workstation & Server</h2>
|
||||
<table class="table table-hover table-bordered table-responsive more-bottom" align="center">
|
||||
<tr>
|
||||
<th style="width=23%">Model</th>
|
||||
<th style="width=42px">BIOS</th>
|
||||
<th style="width=32px">HVM</th>
|
||||
<th style="width=32px">IOMMU</th>
|
||||
<th style="width=32px">SLAT</th>
|
||||
<th style="width=32px">TPM</th>
|
||||
<th style="width=42px">Qubes</th>
|
||||
<th style="width=42px">Xen</th>
|
||||
<th style="width=42px">Kernel</th>
|
||||
<th>Remark</th>
|
||||
<th style="width=20%">Credit</th>
|
||||
</tr>
|
||||
{% for device in site.hcl %}
|
||||
{% if device.type == 'desktop' or device.type == 'workstation' or device.type == 'server' %}
|
||||
{% include hcl-device.html %}
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
</table>
|
||||
|
||||
<h2 id="hardware-motherboards" class="add-left"><i class="fa fa-server"></i> Motherboards</h2>
|
||||
<table class="table table-hover table-bordered table-responsive " align="center">
|
||||
<tr>
|
||||
<th style="width=23%">Model</th>
|
||||
<th style="width=42px">BIOS</th>
|
||||
<th style="width=32px">HVM</th>
|
||||
<th style="width=32px">IOMMU</th>
|
||||
<th style="width=32px">SLAT</th>
|
||||
<th style="width=32px">TPM</th>
|
||||
<th style="width=42px">Qubes</th>
|
||||
<th style="width=42px">Xen</th>
|
||||
<th style="width=42px">Kernel</th>
|
||||
<th>Remark</th>
|
||||
<th style="width=20%">Credit</th>
|
||||
</tr>
|
||||
{% for device in site.hcl %}
|
||||
{% if device.type == 'motherboard' %}
|
||||
{% include hcl-device.html %}
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
</table>
|
||||
</div>
|
7
user/hardware/hcl_listing.md
Normal file
7
user/hardware/hcl_listing.md
Normal file
@ -0,0 +1,7 @@
|
||||
---
|
||||
layout: hcl
|
||||
model: all
|
||||
permalink: /hcl/
|
||||
redirect_from: /compatible-hardware/
|
||||
title: Hardware Compatibility List (HCL)
|
||||
---
|
@ -11,16 +11,3 @@ title: Research
|
||||
|
||||
Here are links to various research papers, projects, and blog posts that relate
|
||||
to Qubes OS.
|
||||
|
||||
{% for category in site.data.research.categories %}
|
||||
<h3>{{category.name}}</h3>
|
||||
<ul class="add-top more-bottom">
|
||||
{% for paper in site.data.research.papers %}
|
||||
{% if paper.category == category.slug %}
|
||||
<li>
|
||||
<a href="{{paper.url}}">{{paper.title}}</a> by {{paper.author}}{% if paper.date %}, {{paper.date}}{% endif %}
|
||||
</li>
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
</ul>
|
||||
{% endfor %}
|
||||
|
Loading…
Reference in New Issue
Block a user