mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-12-27 00:09:26 -05:00
UserFaq changed
This commit is contained in:
parent
37151260fe
commit
2cc20a2ddd
@ -7,6 +7,14 @@ permalink: /wiki/UserFaq/
|
|||||||
Qubes User's FAQ
|
Qubes User's FAQ
|
||||||
================
|
================
|
||||||
|
|
||||||
|
### Q: How much memory is recommended for Qubes?
|
||||||
|
|
||||||
|
4 GB at least. Sure, you can try it on a system with 2GB, but don't expect to be able to run more than 3 AppVMs at the same time.
|
||||||
|
|
||||||
|
### Q: Can I install Qubes on a system without VT-x?
|
||||||
|
|
||||||
|
Yes. Xen doesn't use VT-x (not AMD-v) for PV guests virtualization (it uses ring0/3 separation instead). But, of course, without VT-x, you will also not have VT-d -- see the next question.
|
||||||
|
|
||||||
### Q: Can I install Qubes on a system without VT-d?
|
### Q: Can I install Qubes on a system without VT-d?
|
||||||
|
|
||||||
Yes you can. You can even run a netvm but, of course, you will not benefit from DMA protection for driver domains. So, on a system without VT-d, everything should work the same, but there is no real security benefit of having a separate netvm, as the attacker can always use a simple DMA attack to go from netvm to Dom0.
|
Yes you can. You can even run a netvm but, of course, you will not benefit from DMA protection for driver domains. So, on a system without VT-d, everything should work the same, but there is no real security benefit of having a separate netvm, as the attacker can always use a simple DMA attack to go from netvm to Dom0.
|
||||||
|
Loading…
Reference in New Issue
Block a user