diff --git a/developer/building/development-workflow.md b/developer/building/development-workflow.md index 8d35e760..d52bdeca 100644 --- a/developer/building/development-workflow.md +++ b/developer/building/development-workflow.md @@ -10,7 +10,6 @@ ref: 66 title: Development Workflow --- -# Development Workflow A workflow for developing Qubes OS+ diff --git a/developer/building/qubes-builder.md b/developer/building/qubes-builder.md index dffeab09..9e55a455 100644 --- a/developer/building/qubes-builder.md +++ b/developer/building/qubes-builder.md @@ -12,7 +12,6 @@ title: Qubes Builder **Note: See [ISO building instructions](/doc/qubes-iso-building/) for a streamlined overview on how to use the build system.** -# Building Qubes from scratch We have a fully automated build system for Qubes, that downloads, builds and packages all the Qubes components, and finally should spit out a ready-to-use diff --git a/developer/code/code-signing.md b/developer/code/code-signing.md index 38d330f7..56086a32 100644 --- a/developer/code/code-signing.md +++ b/developer/code/code-signing.md @@ -7,7 +7,6 @@ ref: 51 title: Code Signing --- -# Code Signing All contributions to the Qubes OS [source code](/doc/source-code/) must be cryptographically signed by the author's PGP key. diff --git a/developer/debugging/automated-tests.md b/developer/debugging/automated-tests.md index 6efd3d66..efa15598 100644 --- a/developer/debugging/automated-tests.md +++ b/developer/debugging/automated-tests.md @@ -9,7 +9,6 @@ ref: 45 title: Automated Tests --- -# Automated Tests ## Unit and Integration Tests diff --git a/developer/debugging/mount-lvm-image.md b/developer/debugging/mount-lvm-image.md index bf29ca08..151a37a0 100644 --- a/developer/debugging/mount-lvm-image.md +++ b/developer/debugging/mount-lvm-image.md @@ -7,7 +7,6 @@ ref: 46 title: Mount LVM image --- -# How to mount LVM image You want to read your LVM image (e.g., there is a problem where you can't start any VMs except dom0). diff --git a/developer/debugging/profiling.md b/developer/debugging/profiling.md index 60d82a1b..4bf0c74a 100644 --- a/developer/debugging/profiling.md +++ b/developer/debugging/profiling.md @@ -10,7 +10,6 @@ ref: 48 title: Profiling --- -# Profiling This is a python profiling primer. diff --git a/developer/debugging/test-bench.md b/developer/debugging/test-bench.md index 0cb110e4..bf1a09ad 100644 --- a/developer/debugging/test-bench.md +++ b/developer/debugging/test-bench.md @@ -10,7 +10,6 @@ ref: 44 title: Test Bench --- -# Test bench for Dom0 This guide shows how to set up simple test bench that automatically test your code you're about to push. It is written especially for `core3` branch of `core-admin.git` repo, but some ideas are universal. diff --git a/developer/debugging/vm-interface.md b/developer/debugging/vm-interface.md index 3a757602..cc3715e7 100644 --- a/developer/debugging/vm-interface.md +++ b/developer/debugging/vm-interface.md @@ -11,7 +11,6 @@ ref: 47 title: VM Configuration Interface --- -# VM Configuration Interface Qubes VM have some settings set by dom0 based on VM settings. There are multiple configuration channels, which includes: diff --git a/developer/debugging/windows-debugging.md b/developer/debugging/windows-debugging.md index c5d468fd..809a5dbb 100644 --- a/developer/debugging/windows-debugging.md +++ b/developer/debugging/windows-debugging.md @@ -10,7 +10,6 @@ ref: 50 title: Windows Debugging --- -# Debugging Windows HVMs Debugging Windows code can be tricky in a virtualized environment. The guide below assumes Xen hypervisor and Windows 7 VMs. diff --git a/developer/general/doc-guidelines.md b/developer/general/doc-guidelines.md index 70ed44aa..8b2939b5 100644 --- a/developer/general/doc-guidelines.md +++ b/developer/general/doc-guidelines.md @@ -10,7 +10,6 @@ ref: 30 title: Documentation Guidelines --- -# Documentation guidelines All Qubes OS documentation pages are stored as plain text files in the dedicated [qubes-doc](https://github.com/QubesOS/qubes-doc) repository. By cloning and regularly pulling from this repo, users can maintain their own up-to-date offline copy of all Qubes documentation rather than relying solely on the web. diff --git a/developer/general/gsod.md b/developer/general/gsod.md index 9e2ebd28..1bf78c67 100644 --- a/developer/general/gsod.md +++ b/developer/general/gsod.md @@ -7,7 +7,6 @@ ref: 242 title: Google Season of Docs --- -# 2021 Google Season of Docs Thank you for your interest in participating in the [2021 Google Season of Docs](https://developers.google.com/season-of-docs/) program with the [Qubes OS team](/team/). You can read more about the Google Season of Docs in the official [guides](https://developers.google.com/season-of-docs/docs/) and [FAQ](https://developers.google.com/season-of-docs/docs/faq). diff --git a/developer/general/usability-ux.md b/developer/general/usability-ux.md index 435f530f..373c23d5 100644 --- a/developer/general/usability-ux.md +++ b/developer/general/usability-ux.md @@ -7,7 +7,6 @@ ref: 31 title: Usability & UX --- -# Usability & UX Software that is too complicated to use, is often unused. Because we want as many people as possible to benefit from its unique security properties, the usability and user experience of Qubes OS is an utmost priority! diff --git a/developer/releases/1_0/release-notes.md b/developer/releases/1_0/release-notes.md index bf36c342..425ba882 100644 --- a/developer/releases/1_0/release-notes.md +++ b/developer/releases/1_0/release-notes.md @@ -8,7 +8,6 @@ ref: 18 title: Qubes R1.0 Release Notes --- -# Qubes R1.0 Release Notes Detailed release notes in [this blog post](https://blog.invisiblethings.org/2012/09/03/introducing-qubes-10.html). diff --git a/developer/releases/2_0/release-notes.md b/developer/releases/2_0/release-notes.md index 7ecd2df3..462872df 100644 --- a/developer/releases/2_0/release-notes.md +++ b/developer/releases/2_0/release-notes.md @@ -8,7 +8,6 @@ ref: 25 title: Qubes R2.0 Release Notes --- -# Qubes R2.0 Release Notes Detailed release notes in [this blog post](https://blog.invisiblethings.org/2014/09/26/announcing-qubes-os-release-2.html) diff --git a/developer/releases/3_1/release-notes.md b/developer/releases/3_1/release-notes.md index 66350755..027f2e3f 100644 --- a/developer/releases/3_1/release-notes.md +++ b/developer/releases/3_1/release-notes.md @@ -7,7 +7,6 @@ ref: 16 title: Qubes R3.1 release notes --- -# Qubes R3.1 release notes ## New features since 3.0 diff --git a/developer/releases/3_2/release-notes.md b/developer/releases/3_2/release-notes.md index 32fb4616..0419d6ed 100644 --- a/developer/releases/3_2/release-notes.md +++ b/developer/releases/3_2/release-notes.md @@ -7,7 +7,6 @@ ref: 21 title: Qubes R3.2 release notes --- -# Qubes R3.2 release notes ## New features since 3.1 diff --git a/developer/services/admin-api.md b/developer/services/admin-api.md index dfa9a2e8..f9c1c20a 100644 --- a/developer/services/admin-api.md +++ b/developer/services/admin-api.md @@ -11,7 +11,6 @@ ref: 36 title: Admin API --- -# Qubes OS Admin API ## Goals diff --git a/developer/services/qrexec-internals.md b/developer/services/qrexec-internals.md index deeaed77..1178bd41 100644 --- a/developer/services/qrexec-internals.md +++ b/developer/services/qrexec-internals.md @@ -11,7 +11,6 @@ ref: 39 title: 'Qrexec: Qubes RPC internals' --- -# Qubes RPC internals (*This page details the current implementation of qrexec (qrexec3). A [general introduction](/doc/qrexec/) to qrexec is also available. diff --git a/developer/services/qrexec-socket-services.md b/developer/services/qrexec-socket-services.md index a26dfa3c..838405c7 100644 --- a/developer/services/qrexec-socket-services.md +++ b/developer/services/qrexec-socket-services.md @@ -7,7 +7,6 @@ ref: 42 title: 'Qrexec: Socket-based services' --- -# Qrexec: Socket-based services *This page describes how to implement and use new socket-backed services for qrexec. See [qrexec](/doc/qrexec/) for general overview of the qrexec framework.* diff --git a/developer/services/qrexec2.md b/developer/services/qrexec2.md index a753ee79..cf684979 100644 --- a/developer/services/qrexec2.md +++ b/developer/services/qrexec2.md @@ -11,7 +11,6 @@ ref: 38 title: Qrexec2 --- -# Command execution in VMs # (*This page is about qrexec v2. For qrexec v3, see [here](/doc/qrexec3/).*) diff --git a/developer/system/networking.md b/developer/system/networking.md index 609c229a..9eef422d 100644 --- a/developer/system/networking.md +++ b/developer/system/networking.md @@ -11,7 +11,6 @@ ref: 59 title: Networking --- -# VM network in Qubes ## Overall description diff --git a/developer/system/template-implementation.md b/developer/system/template-implementation.md index 99842453..fa800695 100644 --- a/developer/system/template-implementation.md +++ b/developer/system/template-implementation.md @@ -10,7 +10,6 @@ ref: 58 title: Template Implementation --- -# Overview of VM block devices Every VM has 4 block devices connected: diff --git a/project-security/canaries.md b/project-security/canaries.md index 925c1f4b..b7298cd0 100644 --- a/project-security/canaries.md +++ b/project-security/canaries.md @@ -8,7 +8,6 @@ ref: 208 title: Canaries --- -# Qubes Canaries A **Qubes Canary** is a security announcement periodically issued by the [Qubes Security Team](/security/#the-qubes-security-team) through the [Qubes Security Pack](/security/pack/) consisting of several statements to the effect that the signers of the canary have not been compromised. The idea is that, as long as signed canaries including such statements continue to be published, all is well. diff --git a/project-security/canary-checklist.md b/project-security/canary-checklist.md index 8cdc193a..0b4e31b4 100644 --- a/project-security/canary-checklist.md +++ b/project-security/canary-checklist.md @@ -7,7 +7,6 @@ ref: 216 title: Canary Checklist --- -# Canary Checklist ## Preparation diff --git a/project-security/security-bulletins-checklist.md b/project-security/security-bulletins-checklist.md index 328930d3..68a5500e 100644 --- a/project-security/security-bulletins-checklist.md +++ b/project-security/security-bulletins-checklist.md @@ -8,7 +8,6 @@ ref: 215 title: Security Bulletin Checklist --- -# Security Bulletin Checklist ## Preparation diff --git a/project-security/security-bulletins.md b/project-security/security-bulletins.md index 4f7d2b2a..be49c921 100644 --- a/project-security/security-bulletins.md +++ b/project-security/security-bulletins.md @@ -12,7 +12,6 @@ ref: 218 title: Qubes Security Bulletins (QSBs) --- -# Qubes Security Bulletins (QSBs) A **Qubes Security Bulletin (QSB)** is a security announcement issued by the [Qubes Security Team](/security/#the-qubes-security-team) through the [Qubes Security Pack](/security/pack/). A QSB typically provides a summary and impact analysis of one or more recently-discovered software vulnerabilities, including details about patching to address them. diff --git a/project-security/security-goals.md b/project-security/security-goals.md index 676f404e..77f32632 100644 --- a/project-security/security-goals.md +++ b/project-security/security-goals.md @@ -12,7 +12,6 @@ ref: 210 title: Security Goals --- -# Security design goals Qubes OS implements a security-by-isolation (or security-by-compartmentalization) approach by providing the ability to easily create many security domains. These domains are implemented as lightweight Virtual Machines (VMs) running under the Xen hypervisor. Qubes' main objective is to provide strong isolation between these domains, so that even if an attacker compromises one of the domains, the others are still safe. Qubes, however, does not attempt to provide any security isolation for applications running within the same domain. For example, a buggy web browser running in a Qubes domain could still be compromised just as easily as on a regular Linux distribution. The difference that Qubes makes is that now the attacker doesn't have access to all the software running in the other domains. diff --git a/project-security/verifying-signatures.md b/project-security/verifying-signatures.md index 8d030a4f..b25c670f 100644 --- a/project-security/verifying-signatures.md +++ b/project-security/verifying-signatures.md @@ -11,7 +11,6 @@ ref: 211 title: Verifying Signatures --- -# On Digital Signatures and Key Verification ## What Digital Signatures Can and Cannot Prove diff --git a/user/advanced-configuration/awesome.md b/user/advanced-configuration/awesome.md index e7863491..827829d7 100644 --- a/user/advanced-configuration/awesome.md +++ b/user/advanced-configuration/awesome.md @@ -8,7 +8,6 @@ ref: 179 title: awesome --- -# Using awesome in dom0 ## Qubes-specific features diff --git a/user/advanced-configuration/bind-dirs.md b/user/advanced-configuration/bind-dirs.md index 6e47e384..274e76fa 100644 --- a/user/advanced-configuration/bind-dirs.md +++ b/user/advanced-configuration/bind-dirs.md @@ -8,7 +8,6 @@ ref: 186 title: How to make any file in a TemplateBasedVM persistent using bind-dirs --- -# How to make any file in a TemplateBasedVM persistent using bind-dirs # ## What are bind-dirs? ## diff --git a/user/advanced-configuration/disposablevm-customization.md b/user/advanced-configuration/disposablevm-customization.md index a9702466..29326a86 100644 --- a/user/advanced-configuration/disposablevm-customization.md +++ b/user/advanced-configuration/disposablevm-customization.md @@ -12,7 +12,6 @@ ref: 174 title: DisposableVM Customization --- -# DisposableVM Customization ## Introduction diff --git a/user/advanced-configuration/gui-configuration.md b/user/advanced-configuration/gui-configuration.md index 3c429751..b36f0969 100644 --- a/user/advanced-configuration/gui-configuration.md +++ b/user/advanced-configuration/gui-configuration.md @@ -7,7 +7,6 @@ ref: 184 title: GUI Configuration --- -# GUI Configuration ## Video RAM adjustment for high-resolution displays diff --git a/user/advanced-configuration/i3.md b/user/advanced-configuration/i3.md index c38e06f0..f123fa21 100644 --- a/user/advanced-configuration/i3.md +++ b/user/advanced-configuration/i3.md @@ -10,7 +10,6 @@ ref: 183 title: i3 --- -# i3 installation in dom0 i3 is part of the stable repository (as of Qubes R3.1) and can be installed by using the [dom0 update mechanism](/doc/software-update-dom0/). To install the i3 diff --git a/user/advanced-configuration/installing-contributed-packages.md b/user/advanced-configuration/installing-contributed-packages.md index 113af2df..c150d2c3 100644 --- a/user/advanced-configuration/installing-contributed-packages.md +++ b/user/advanced-configuration/installing-contributed-packages.md @@ -7,7 +7,6 @@ ref: 225 title: Installing contributed packages --- -# Installing contributed packages _This page is for users who wish to install contributed packages. If you want to contribute a package, please see [package contributions](/doc/package-contributions/)._ diff --git a/user/advanced-configuration/managing-vm-kernel.md b/user/advanced-configuration/managing-vm-kernel.md index bb0391b3..08b05de8 100644 --- a/user/advanced-configuration/managing-vm-kernel.md +++ b/user/advanced-configuration/managing-vm-kernel.md @@ -8,7 +8,6 @@ ref: 173 title: Managing VM kernel --- -# VM kernel managed by dom0 By default, VMs kernels are provided by dom0. (See [here](/doc/software-update-dom0/#kernel-upgrade) for information about upgrading kernels in dom0.) diff --git a/user/advanced-configuration/salt.md b/user/advanced-configuration/salt.md index 1df9902e..2ca8fae7 100644 --- a/user/advanced-configuration/salt.md +++ b/user/advanced-configuration/salt.md @@ -7,7 +7,6 @@ ref: 185 title: Management stack --- -# Management Infrastructure Since the Qubes R3.1 release we have included the Salt (also called SaltStack) management engine in dom0 as default (with some states already configured). diff --git a/user/advanced-configuration/secondary-storage.md b/user/advanced-configuration/secondary-storage.md index 38af99aa..e0a0c1c6 100644 --- a/user/advanced-configuration/secondary-storage.md +++ b/user/advanced-configuration/secondary-storage.md @@ -10,7 +10,6 @@ ref: 187 title: Secondary Storage --- -# Storing AppVMs on Secondary Drives Suppose you have a fast but small primary SSD and a large but slow secondary HDD. You want to store a subset of your AppVMs on the HDD. diff --git a/user/advanced-configuration/usb-qubes.md b/user/advanced-configuration/usb-qubes.md index b69dfef6..4bc84b73 100644 --- a/user/advanced-configuration/usb-qubes.md +++ b/user/advanced-configuration/usb-qubes.md @@ -12,7 +12,6 @@ ref: 181 title: USB Qubes --- -# USB Qubes # If during installation you enabled the creation of a USB-qube, your system should be setup already and none of the mentioned steps here should be necessary. (Unless you want to [remove your USB-qube](#removing-a-usb-qube).) If for any reason no USB-qube was created during installation, this guide will show you how to do so. diff --git a/user/common-tasks/block-devices.md b/user/common-tasks/block-devices.md index 01dcb474..fe074a2e 100644 --- a/user/common-tasks/block-devices.md +++ b/user/common-tasks/block-devices.md @@ -11,7 +11,6 @@ ref: 193 title: Block (Storage) Devices --- -# Block (Storage) Devices *This page is part of [device handling in qubes](/doc/device-handling/).* diff --git a/user/common-tasks/copy-from-dom0.md b/user/common-tasks/copy-from-dom0.md index 8e9f02ec..87c8c939 100644 --- a/user/common-tasks/copy-from-dom0.md +++ b/user/common-tasks/copy-from-dom0.md @@ -11,7 +11,6 @@ ref: 198 title: Copying from (and to) dom0 --- -# Copying from (and to) dom0 This page covers copying files and clipboard text between [dom0](/doc/glossary/#dom0) and [domUs](/doc/glossary/#domu). Since dom0 is special, the processes are different from [copying and pasting text between qubes](/doc/copy-paste/) and [copying and moving files between qubes](/doc/copying-files/). diff --git a/user/common-tasks/device-handling.md b/user/common-tasks/device-handling.md index 27096b5d..9ea1d2ea 100644 --- a/user/common-tasks/device-handling.md +++ b/user/common-tasks/device-handling.md @@ -11,7 +11,6 @@ ref: 188 title: Device Handling --- -# Device Handling This is an overview of device handling in Qubes OS. For specific devices ([block](/doc/block-devices/), [USB](/doc/usb-devices/) and [PCI](/doc/pci-devices/) devices), please visit their respective pages. diff --git a/user/common-tasks/disposablevm.md b/user/common-tasks/disposablevm.md index 2ae727f9..4f916eca 100644 --- a/user/common-tasks/disposablevm.md +++ b/user/common-tasks/disposablevm.md @@ -11,7 +11,6 @@ ref: 203 title: DisposableVMs --- -# DisposableVMs A DisposableVM (previously known as a "DispVM") is a lightweight VM that can be created quickly and will disappear when closed. DisposableVMs are usually created in order to host a single application, like a viewer, editor, or web browser. diff --git a/user/common-tasks/getting-started.md b/user/common-tasks/getting-started.md index 842ddbf3..10677500 100644 --- a/user/common-tasks/getting-started.md +++ b/user/common-tasks/getting-started.md @@ -10,7 +10,6 @@ redirect_from: ref: 190 --- -# Get started After [downloading](/downloads/) and [installing](/doc/installation-guide/) Qubes OS, let's cover some basic concepts. diff --git a/user/common-tasks/pci-devices.md b/user/common-tasks/pci-devices.md index 51be8cdf..69071fc9 100644 --- a/user/common-tasks/pci-devices.md +++ b/user/common-tasks/pci-devices.md @@ -11,7 +11,6 @@ ref: 197 title: PCI Devices --- -# PCI Devices *This page is part of [device handling in qubes](/doc/device-handling/).* diff --git a/user/common-tasks/software-update-dom0.md b/user/common-tasks/software-update-dom0.md index 8f5245b6..b5be70ab 100644 --- a/user/common-tasks/software-update-dom0.md +++ b/user/common-tasks/software-update-dom0.md @@ -10,7 +10,6 @@ ref: 194 title: Installing and updating software in dom0 --- -# Installing and updating software in dom0 Updating [dom0](/doc/glossary/#dom0) is one of the main steps in [Updating Qubes OS](/doc/updating-qubes-os/). It is very important to keep dom0 up-to-date with the latest [security](/security/) updates. diff --git a/user/common-tasks/software-update-domu.md b/user/common-tasks/software-update-domu.md index e3e88327..7797e13e 100644 --- a/user/common-tasks/software-update-domu.md +++ b/user/common-tasks/software-update-domu.md @@ -11,7 +11,6 @@ ref: 189 title: Installing and updating software in domUs --- -# Installing and updating software in domUs Updating [domUs](/doc/glossary/#domu), especially [TemplateVMs](/doc/templates/) and [StandaloneVMs](/doc/standalone-and-hvm/) are important steps in [Updating Qubes OS](/doc/updating-qubes-os/). It is very import to keep domUs up-to-date with the latest [security](/security/) updates. diff --git a/user/common-tasks/updating-qubes-os.md b/user/common-tasks/updating-qubes-os.md index a59bf2ff..94505332 100644 --- a/user/common-tasks/updating-qubes-os.md +++ b/user/common-tasks/updating-qubes-os.md @@ -7,7 +7,6 @@ ref: 200 title: Updating Qubes OS --- -# Updating Qubes OS *This page is about updating your system while staying on the same [supported version of Qubes OS](/doc/supported-versions/#qubes-os). If you're instead looking to upgrade from your current version of Qubes OS to a newer version, see the [Upgrade Guides](/doc/upgrade/).* diff --git a/user/common-tasks/usb-devices.md b/user/common-tasks/usb-devices.md index b30b2872..63660397 100644 --- a/user/common-tasks/usb-devices.md +++ b/user/common-tasks/usb-devices.md @@ -8,7 +8,6 @@ ref: 195 title: USB Devices --- -# USB Devices *This page is part of [device handling in qubes](/doc/device-handling/).* diff --git a/user/downloading-installing-upgrading/custom-install.md b/user/downloading-installing-upgrading/custom-install.md index dc0fb465..bd4b3677 100644 --- a/user/downloading-installing-upgrading/custom-install.md +++ b/user/downloading-installing-upgrading/custom-install.md @@ -8,7 +8,6 @@ ref: 152 title: Custom Installation --- -# Custom Installation In the present context, "custom installation" refers to things like manual partitioning, setting up LVM and RAID, and manual LUKS encryption configuration. diff --git a/user/downloading-installing-upgrading/install-security.md b/user/downloading-installing-upgrading/install-security.md index e7c516df..f76c2dde 100644 --- a/user/downloading-installing-upgrading/install-security.md +++ b/user/downloading-installing-upgrading/install-security.md @@ -10,7 +10,6 @@ ref: 149 title: Installation security --- -# Installation security There are several security matters to consider before and during the Qubes installation process. diff --git a/user/downloading-installing-upgrading/supported-versions.md b/user/downloading-installing-upgrading/supported-versions.md index a29a4f72..b119951c 100644 --- a/user/downloading-installing-upgrading/supported-versions.md +++ b/user/downloading-installing-upgrading/supported-versions.md @@ -7,7 +7,6 @@ ref: 154 title: Supported Versions --- -# Supported Versions This page details the level and period of support for versions of operating systems in the Qubes ecosystem. diff --git a/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_0.md b/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_0.md index 0fde3e15..aec92136 100644 --- a/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_0.md +++ b/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_0.md @@ -10,7 +10,6 @@ ref: 159 title: Upgrading to R3.0 --- -# Upgrading Qubes R2 to R3.0 **This instruction is highly experimental, the official way to upgrade from R2 is to backup the data and reinstall the system. Use at your own risk!** diff --git a/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_1.md b/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_1.md index 0f31a79c..e84ec55b 100644 --- a/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_1.md +++ b/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_1.md @@ -10,7 +10,6 @@ ref: 155 title: Upgrading to R3.1 --- -# Upgrading Qubes R3.0 to R3.1 **Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).** diff --git a/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_2.md b/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_2.md index 98465b90..c4bc2a87 100644 --- a/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_2.md +++ b/user/downloading-installing-upgrading/upgrade/upgrade-to-r3_2.md @@ -10,7 +10,6 @@ ref: 161 title: Upgrading to R3.2 --- -# Upgrading Qubes R3.1 to R3.2 **Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).** diff --git a/user/hardware/certified-hardware.md b/user/hardware/certified-hardware.md index 9a69585c..d5f8c37f 100644 --- a/user/hardware/certified-hardware.md +++ b/user/hardware/certified-hardware.md @@ -10,7 +10,6 @@ ref: 144 title: Certified Hardware --- -# Certified Hardware The Qubes OS Project aims to partner with a select few computer vendors to ensure that Qubes users have reliable hardware purchasing options. We aim for these vendors to be as diverse as possible in terms of geography, cost, and availability. diff --git a/user/hardware/hardware-testing.md b/user/hardware/hardware-testing.md index da0b4d7e..c2f10615 100644 --- a/user/hardware/hardware-testing.md +++ b/user/hardware/hardware-testing.md @@ -7,7 +7,6 @@ ref: 145 title: Hardware Testing --- -# Hardware Testing The Qubes developers test Qubes OS on certain hardware models. The tested hardware described on this page differs from [Qubes Certified Hardware](/doc/certified-hardware/) in a few key ways: diff --git a/user/hardware/system-requirements.md b/user/hardware/system-requirements.md index 840b1f45..b629733e 100644 --- a/user/hardware/system-requirements.md +++ b/user/hardware/system-requirements.md @@ -11,7 +11,6 @@ ref: 142 title: System Requirements --- -# System Requirements