mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-12-15 07:53:07 -05:00
Change again some languages
Thanks to @tokideveloper !!!
This commit is contained in:
parent
978efb3514
commit
3ba7a492f0
10 changed files with 12 additions and 12 deletions
|
|
@ -402,7 +402,7 @@ Virtual Machine Formulae
|
|||
|
||||
You can use these formulae to download, install, and configure qubes in Qubes. These formulae use pillar data to define default qube names and configuration details. The default settings can be overridden in the pillar data located in:
|
||||
|
||||
.. code:: yaml
|
||||
.. code:: text
|
||||
|
||||
/srv/pillar/base/qvm/init.sls
|
||||
|
||||
|
|
|
|||
|
|
@ -43,7 +43,7 @@ Clipboard automatic policy enforcement
|
|||
|
||||
The Qubes clipboard :doc:`RPC policy </user/advanced-topics/rpc-policy>` is configurable in:
|
||||
|
||||
.. code:: console
|
||||
.. code:: text
|
||||
|
||||
/etc/qubes-rpc/policy/qubes.ClipboardPaste
|
||||
|
||||
|
|
|
|||
|
|
@ -31,7 +31,7 @@ You can always put a window into fullscreen mode in Xfce4 using the trusted wind
|
|||
|
||||
As an alternative to the Xfce4 method, you can enable fullscreen mode for select VMs by creating the following entry in the ``/etc/qubes/guid.conf`` file in dom0:
|
||||
|
||||
.. code:: console
|
||||
.. code:: text
|
||||
|
||||
VM: {
|
||||
personal: {
|
||||
|
|
|
|||
|
|
@ -397,7 +397,7 @@ Verify the rules on the sys-net firewall correctly match the packets you want by
|
|||
|
||||
In this example, we can see 7 packets in the forward rule, and 3 packets in the dnat rule:
|
||||
|
||||
.. code:: console
|
||||
.. code:: output
|
||||
|
||||
chain custom-forward {
|
||||
iifname ens6 ip saddr 192.168.x.y/24 ip daddr 10.137.1.z tcp dport 443 ct state new,established,related counter packets 7 bytes 448 accept
|
||||
|
|
|
|||
|
|
@ -340,7 +340,7 @@ These parameters are set for the following reasons:
|
|||
- Given the higher than usual memory requirements of Windows, you may get a ``Not enough memory to start domain 'WindowsNew'`` error. In that case try to shutdown unneeded VMs to free memory before starting the Windows VM.
|
||||
At this point you may open a tab in dom0 for debugging, in case something goes amiss:
|
||||
|
||||
.. code:: doscon
|
||||
.. code:: console
|
||||
|
||||
tailf /var/log/qubes/vm-WindowsNew.log \
|
||||
/var/log/xen/console/hypervisor.log \
|
||||
|
|
|
|||
|
|
@ -52,7 +52,7 @@ In dom0, the ``qvm-appmenus`` tool allows the user to see the list of available
|
|||
|
||||
To change the whitelist shown in app menu, you need to provide a list of the desktop entries. Each line contains a desktop entry name, with its ``.desktop`` extension, like this:
|
||||
|
||||
.. code:: console
|
||||
.. code:: text
|
||||
|
||||
qubes-open-file-manager.desktop
|
||||
qubes-run-terminal.desktop
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue