Remove redundant h1 titles using # syntax

https://github.com/QubesOS/qubes-issues/issues/6701#issuecomment-862060759
This commit is contained in:
Andrew David Wong 2021-06-16 00:29:28 -07:00
parent a4cbb51092
commit 4ff7430960
No known key found for this signature in database
GPG key ID: 8CE137352A019A17
80 changed files with 0 additions and 80 deletions

View file

@ -10,7 +10,6 @@ ref: 66
title: Development Workflow
---
# Development Workflow
A workflow for developing Qubes OS+

View file

@ -12,7 +12,6 @@ title: Qubes Builder
**Note: See [ISO building instructions](/doc/qubes-iso-building/) for a streamlined overview on how to use the build system.**
# Building Qubes from scratch
We have a fully automated build system for Qubes, that downloads, builds and
packages all the Qubes components, and finally should spit out a ready-to-use

View file

@ -7,7 +7,6 @@ ref: 51
title: Code Signing
---
# Code Signing
All contributions to the Qubes OS [source code](/doc/source-code/) must be cryptographically signed by the author's PGP key.

View file

@ -9,7 +9,6 @@ ref: 45
title: Automated Tests
---
# Automated Tests
## Unit and Integration Tests

View file

@ -7,7 +7,6 @@ ref: 46
title: Mount LVM image
---
# How to mount LVM image
You want to read your LVM image (e.g., there is a problem where you can't start any VMs except dom0).

View file

@ -10,7 +10,6 @@ ref: 48
title: Profiling
---
# Profiling
This is a python profiling primer.

View file

@ -10,7 +10,6 @@ ref: 44
title: Test Bench
---
# Test bench for Dom0
This guide shows how to set up simple test bench that automatically test your code you're about to push. It is written especially for `core3` branch of `core-admin.git` repo, but some ideas are universal.

View file

@ -11,7 +11,6 @@ ref: 47
title: VM Configuration Interface
---
# VM Configuration Interface
Qubes VM have some settings set by dom0 based on VM settings. There are multiple configuration channels, which includes:

View file

@ -10,7 +10,6 @@ ref: 50
title: Windows Debugging
---
# Debugging Windows HVMs
Debugging Windows code can be tricky in a virtualized environment. The guide below assumes Xen hypervisor and Windows 7 VMs.

View file

@ -10,7 +10,6 @@ ref: 30
title: Documentation Guidelines
---
# Documentation guidelines
All Qubes OS documentation pages are stored as plain text files in the dedicated [qubes-doc](https://github.com/QubesOS/qubes-doc) repository.
By cloning and regularly pulling from this repo, users can maintain their own up-to-date offline copy of all Qubes documentation rather than relying solely on the web.

View file

@ -7,7 +7,6 @@ ref: 242
title: Google Season of Docs
---
# 2021 Google Season of Docs
Thank you for your interest in participating in the [2021 Google Season of Docs](https://developers.google.com/season-of-docs/) program with the [Qubes OS team](/team/). You can read more about the Google Season of Docs in the official [guides](https://developers.google.com/season-of-docs/docs/) and [FAQ](https://developers.google.com/season-of-docs/docs/faq).

View file

@ -7,7 +7,6 @@ ref: 31
title: Usability & UX
---
# Usability & UX
Software that is too complicated to use, is often unused. Because we want as many people as possible to benefit from its unique security properties, the usability and user experience of Qubes OS is an utmost priority!

View file

@ -8,7 +8,6 @@ ref: 18
title: Qubes R1.0 Release Notes
---
# Qubes R1.0 Release Notes
Detailed release notes in [this blog post](https://blog.invisiblethings.org/2012/09/03/introducing-qubes-10.html).

View file

@ -8,7 +8,6 @@ ref: 25
title: Qubes R2.0 Release Notes
---
# Qubes R2.0 Release Notes
Detailed release notes in [this blog post](https://blog.invisiblethings.org/2014/09/26/announcing-qubes-os-release-2.html)

View file

@ -7,7 +7,6 @@ ref: 16
title: Qubes R3.1 release notes
---
# Qubes R3.1 release notes
## New features since 3.0

View file

@ -7,7 +7,6 @@ ref: 21
title: Qubes R3.2 release notes
---
# Qubes R3.2 release notes
## New features since 3.1

View file

@ -11,7 +11,6 @@ ref: 36
title: Admin API
---
# Qubes OS Admin API
## Goals

View file

@ -11,7 +11,6 @@ ref: 39
title: 'Qrexec: Qubes RPC internals'
---
# Qubes RPC internals
(*This page details the current implementation of qrexec (qrexec3).
A [general introduction](/doc/qrexec/) to qrexec is also available.

View file

@ -7,7 +7,6 @@ ref: 42
title: 'Qrexec: Socket-based services'
---
# Qrexec: Socket-based services
*This page describes how to implement and use new socket-backed services for qrexec. See [qrexec](/doc/qrexec/) for general overview of the qrexec framework.*

View file

@ -11,7 +11,6 @@ ref: 38
title: Qrexec2
---
# Command execution in VMs #
(*This page is about qrexec v2. For qrexec v3, see [here](/doc/qrexec3/).*)

View file

@ -11,7 +11,6 @@ ref: 59
title: Networking
---
# VM network in Qubes
## Overall description

View file

@ -10,7 +10,6 @@ ref: 58
title: Template Implementation
---
# Overview of VM block devices
Every VM has 4 block devices connected:

View file

@ -8,7 +8,6 @@ ref: 208
title: Canaries
---
# Qubes Canaries
A **Qubes Canary** is a security announcement periodically issued by the [Qubes Security Team](/security/#the-qubes-security-team) through the [Qubes Security Pack](/security/pack/) consisting of several statements to the effect that the signers of the canary have not been compromised.
The idea is that, as long as signed canaries including such statements continue to be published, all is well.

View file

@ -7,7 +7,6 @@ ref: 216
title: Canary Checklist
---
# Canary Checklist
## Preparation

View file

@ -8,7 +8,6 @@ ref: 215
title: Security Bulletin Checklist
---
# Security Bulletin Checklist
## Preparation

View file

@ -12,7 +12,6 @@ ref: 218
title: Qubes Security Bulletins (QSBs)
---
# Qubes Security Bulletins (QSBs)
A **Qubes Security Bulletin (QSB)** is a security announcement issued by the [Qubes Security Team](/security/#the-qubes-security-team) through the [Qubes Security Pack](/security/pack/).
A QSB typically provides a summary and impact analysis of one or more recently-discovered software vulnerabilities, including details about patching to address them.

View file

@ -12,7 +12,6 @@ ref: 210
title: Security Goals
---
# Security design goals
Qubes OS implements a security-by-isolation (or security-by-compartmentalization) approach by providing the ability to easily create many security domains. These domains are implemented as lightweight Virtual Machines (VMs) running under the Xen hypervisor. Qubes' main objective is to provide strong isolation between these domains, so that even if an attacker compromises one of the domains, the others are still safe. Qubes, however, does not attempt to provide any security isolation for applications running within the same domain. For example, a buggy web browser running in a Qubes domain could still be compromised just as easily as on a regular Linux distribution. The difference that Qubes makes is that now the attacker doesn't have access to all the software running in the other domains.

View file

@ -11,7 +11,6 @@ ref: 211
title: Verifying Signatures
---
# On Digital Signatures and Key Verification
## What Digital Signatures Can and Cannot Prove

View file

@ -8,7 +8,6 @@ ref: 179
title: awesome
---
# Using awesome in dom0
## Qubes-specific features

View file

@ -8,7 +8,6 @@ ref: 186
title: How to make any file in a TemplateBasedVM persistent using bind-dirs
---
# How to make any file in a TemplateBasedVM persistent using bind-dirs #
## What are bind-dirs? ##

View file

@ -12,7 +12,6 @@ ref: 174
title: DisposableVM Customization
---
# DisposableVM Customization
## Introduction

View file

@ -7,7 +7,6 @@ ref: 184
title: GUI Configuration
---
# GUI Configuration
## Video RAM adjustment for high-resolution displays

View file

@ -10,7 +10,6 @@ ref: 183
title: i3
---
# i3 installation in dom0
i3 is part of the stable repository (as of Qubes R3.1) and can be installed by
using the [dom0 update mechanism](/doc/software-update-dom0/). To install the i3

View file

@ -7,7 +7,6 @@ ref: 225
title: Installing contributed packages
---
# Installing contributed packages
_This page is for users who wish to install contributed packages.
If you want to contribute a package, please see [package contributions](/doc/package-contributions/)._

View file

@ -8,7 +8,6 @@ ref: 173
title: Managing VM kernel
---
# VM kernel managed by dom0
By default, VMs kernels are provided by dom0.
(See [here](/doc/software-update-dom0/#kernel-upgrade) for information about upgrading kernels in dom0.)

View file

@ -7,7 +7,6 @@ ref: 185
title: Management stack
---
# Management Infrastructure
Since the Qubes R3.1 release we have included the Salt (also called SaltStack)
management engine in dom0 as default (with some states already configured).

View file

@ -10,7 +10,6 @@ ref: 187
title: Secondary Storage
---
# Storing AppVMs on Secondary Drives
Suppose you have a fast but small primary SSD and a large but slow secondary HDD.
You want to store a subset of your AppVMs on the HDD.

View file

@ -12,7 +12,6 @@ ref: 181
title: USB Qubes
---
# USB Qubes #
If during installation you enabled the creation of a USB-qube, your system should be setup already and none of the mentioned steps here should be necessary. (Unless you want to [remove your USB-qube](#removing-a-usb-qube).) If for any reason no USB-qube was created during installation, this guide will show you how to do so.

View file

@ -11,7 +11,6 @@ ref: 193
title: Block (Storage) Devices
---
# Block (Storage) Devices
*This page is part of [device handling in qubes](/doc/device-handling/).*

View file

@ -11,7 +11,6 @@ ref: 198
title: Copying from (and to) dom0
---
# Copying from (and to) dom0
This page covers copying files and clipboard text between [dom0](/doc/glossary/#dom0) and [domUs](/doc/glossary/#domu).
Since dom0 is special, the processes are different from [copying and pasting text between qubes](/doc/copy-paste/) and [copying and moving files between qubes](/doc/copying-files/).

View file

@ -11,7 +11,6 @@ ref: 188
title: Device Handling
---
# Device Handling
This is an overview of device handling in Qubes OS.
For specific devices ([block](/doc/block-devices/), [USB](/doc/usb-devices/) and [PCI](/doc/pci-devices/) devices), please visit their respective pages.

View file

@ -11,7 +11,6 @@ ref: 203
title: DisposableVMs
---
# DisposableVMs
A DisposableVM (previously known as a "DispVM") is a lightweight VM that can be created quickly and will disappear when closed.
DisposableVMs are usually created in order to host a single application, like a viewer, editor, or web browser.

View file

@ -10,7 +10,6 @@ redirect_from:
ref: 190
---
# Get started
After [downloading](/downloads/) and [installing](/doc/installation-guide/) Qubes OS, let's cover some basic concepts.

View file

@ -11,7 +11,6 @@ ref: 197
title: PCI Devices
---
# PCI Devices
*This page is part of [device handling in qubes](/doc/device-handling/).*

View file

@ -10,7 +10,6 @@ ref: 194
title: Installing and updating software in dom0
---
# Installing and updating software in dom0
Updating [dom0](/doc/glossary/#dom0) is one of the main steps in [Updating Qubes OS](/doc/updating-qubes-os/).
It is very important to keep dom0 up-to-date with the latest [security](/security/) updates.

View file

@ -11,7 +11,6 @@ ref: 189
title: Installing and updating software in domUs
---
# Installing and updating software in domUs
Updating [domUs](/doc/glossary/#domu), especially [TemplateVMs](/doc/templates/) and [StandaloneVMs](/doc/standalone-and-hvm/) are important steps in [Updating Qubes OS](/doc/updating-qubes-os/).
It is very import to keep domUs up-to-date with the latest [security](/security/) updates.

View file

@ -7,7 +7,6 @@ ref: 200
title: Updating Qubes OS
---
# Updating Qubes OS
*This page is about updating your system while staying on the same [supported version of Qubes OS](/doc/supported-versions/#qubes-os).
If you're instead looking to upgrade from your current version of Qubes OS to a newer version, see the [Upgrade Guides](/doc/upgrade/).*

View file

@ -8,7 +8,6 @@ ref: 195
title: USB Devices
---
# USB Devices
*This page is part of [device handling in qubes](/doc/device-handling/).*

View file

@ -8,7 +8,6 @@ ref: 152
title: Custom Installation
---
# Custom Installation
In the present context, "custom installation" refers to things like manual partitioning, setting up LVM and RAID, and manual LUKS encryption configuration.

View file

@ -10,7 +10,6 @@ ref: 149
title: Installation security
---
# Installation security
There are several security matters to consider before and during the Qubes installation process.

View file

@ -7,7 +7,6 @@ ref: 154
title: Supported Versions
---
# Supported Versions
This page details the level and period of support for versions of operating systems in the Qubes ecosystem.

View file

@ -10,7 +10,6 @@ ref: 159
title: Upgrading to R3.0
---
# Upgrading Qubes R2 to R3.0
**This instruction is highly experimental, the official way to upgrade from R2 is to backup the data and reinstall the system. Use at your own risk!**

View file

@ -10,7 +10,6 @@ ref: 155
title: Upgrading to R3.1
---
# Upgrading Qubes R3.0 to R3.1
**Before attempting either an in-place upgrade or a clean installation, we
strongly recommend that users [back up their systems](/doc/backup-restore/).**

View file

@ -10,7 +10,6 @@ ref: 161
title: Upgrading to R3.2
---
# Upgrading Qubes R3.1 to R3.2
**Before attempting either an in-place upgrade or a clean installation, we
strongly recommend that users [back up their systems](/doc/backup-restore/).**

View file

@ -10,7 +10,6 @@ ref: 144
title: Certified Hardware
---
# Certified Hardware
The Qubes OS Project aims to partner with a select few computer vendors to ensure that Qubes users have reliable hardware purchasing options.
We aim for these vendors to be as diverse as possible in terms of geography, cost, and availability.

View file

@ -7,7 +7,6 @@ ref: 145
title: Hardware Testing
---
# Hardware Testing
The Qubes developers test Qubes OS on certain hardware models.
The tested hardware described on this page differs from [Qubes Certified Hardware](/doc/certified-hardware/) in a few key ways:

View file

@ -11,7 +11,6 @@ ref: 142
title: System Requirements
---
# System Requirements
<div class="alert alert-warning" role="alert">
<i class="fa fa-exclamation-triangle"></i>

View file

@ -12,7 +12,6 @@ ref: 133
title: In-place upgrade of Debian TemplateVMs
---
# Upgrading Debian TemplateVMs
<div class="alert alert-danger" role="alert">
<i class="fa fa-exclamation-triangle"></i>

View file

@ -11,7 +11,6 @@ ref: 134
title: The Debian TemplateVM
---
# The Debian TemplateVM
The Debian [TemplateVM](/doc/templates/) is an officially [supported](/doc/supported-versions/#templatevms) TemplateVM in Qubes OS.
This page is about the standard (or "full") Debian TemplateVM.

View file

@ -7,7 +7,6 @@ ref: 136
title: The Fedora TemplateVM
---
# The Fedora TemplateVM
The Fedora [TemplateVM](/doc/templates/) is the default TemplateVM in Qubes OS. This page is about the standard (or "full") Fedora TemplateVM. For the minimal and Xfce versions, please see the [Minimal TemplateVMs](/doc/templates/minimal/) and [Xfce TemplateVMs](/doc/templates/xfce/) pages.

View file

@ -12,7 +12,6 @@ ref: 130
title: StandaloneVMs and HVMs
---
# StandaloneVMs and HVMs
A [StandaloneVM](/doc/glossary/#standalonevm) is a type of VM in Qubes that is created by cloning a [TemplateVM](/doc/templates/).
Unlike TemplateVMs, however, StandaloneVMs do not supply their root filesystems to other VMs.

View file

@ -11,7 +11,6 @@ ref: 131
title: TemplateVMs
---
# TemplateVMs
In [Getting Started](/getting-started/), we covered the distinction in Qubes OS between where you *install* your software and where you *run* your software.
Your software is installed in [TemplateVMs](/doc/glossary/#templatevm) (or "templates" for short).

View file

@ -11,7 +11,6 @@ ref: 222
title: Xfce TemplateVMs
---
# Xfce TemplateVMs
If you would like to use Xfce (more lightweight compared to GNOME desktop environment) Linux distribution in your qubes,
you can install one of the available Xfce templates for [Fedora](/doc/templates/fedora/), [CentOS](/doc/templates/centos/) or [Gentoo](/doc/templates/gentoo/).

View file

@ -7,7 +7,6 @@ ref: 170
title: Device Handling Security
---
# Device Handling Security
Any additional ability a VM gains is additional attack surface.
It's a good idea to always attach the minimum entity required in a VM.

View file

@ -7,7 +7,6 @@ ref: 167
title: The Qubes U2F Proxy
---
# The Qubes U2F Proxy
The [Qubes U2F Proxy](https://github.com/QubesOS/qubes-app-u2f) is a secure proxy intended to make use of U2F two-factor authentication devices with web browsers without exposing the browser to the full USB stack, not unlike the [USB keyboard and mouse proxies](/doc/usb/) implemented in Qubes.

View file

@ -9,7 +9,6 @@ ref: 169
title: YubiKey in Qubes
---
# Using YubiKey to Qubes authentication
You can use a YubiKey to enhance Qubes user authentication, for example to mitigate risk of someone snooping the password.
This can also slightly improve security when you have a [USB keyboard](/doc/device-handling-security/#security-warning-on-usb-input-devices).

View file

@ -11,7 +11,6 @@ ref: 231
title: Disk Troubleshooting
---
# Disk Troubleshooting Guide #
## "Out of disk space" error ##

View file

@ -7,7 +7,6 @@ ref: 233
title: GUI Troubleshooting
---
# GUI Troubleshooting
## Can't click on anything after connecting 4k external display

View file

@ -8,7 +8,6 @@ ref: 97
title: Hardware Troubleshooting
---
# Troubleshooting hardware-related issues
## Audio doesn't work / Troubleshooting newer hardware

View file

@ -7,7 +7,6 @@ ref: 232
title: HVM Troubleshooting
---
# HVM Troubleshooting
## HVM pauses on boot, followed by kernel error

View file

@ -7,7 +7,6 @@ ref: 224
title: Installation Troubleshooting
---
# Installation Troubleshooting
## "An unknown error has occurred" error during installation

View file

@ -7,7 +7,6 @@ ref: 235
title: Media Troubleshooting
---
# Video and Audio Troubleshooting
## Can't play media videos in a VM due to missing codecs

View file

@ -7,7 +7,6 @@ ref: 230
title: PCI Troubleshooting
---
# PCI troubleshooting
## DMA errors

View file

@ -9,7 +9,6 @@ ref: 94
title: Suspend/Resume Troubleshooting
---
# Troubleshooting problems relating to suspend/resume
## Network-Manager says “Device not ready” on suspend/resume

View file

@ -7,7 +7,6 @@ ref: 177
title: UEFI Troubleshooting
---
# Troubleshooting UEFI related problems
## Successfully installed in legacy mode, but had to change some kernel parameters

View file

@ -7,7 +7,6 @@ ref: 239
title: Update Troubleshooting
---
# Fixing issues that arise during updating
## “Failed to synchronize cache for repo” errors when updating Fedora templates

View file

@ -7,7 +7,6 @@ ref: 98
title: Updating Debian and Whonix
---
# Updating Debian and Whonix
Despite Qubes shipping with [Debian Templates](/doc/templates/debian/), most of Qubes core components run on Fedora and thus our documentation has better coverage for Fedora. However, Qubes has been working closely with the [Whonix](https://whonix.org) project which is based on Debian.

View file

@ -7,7 +7,6 @@ ref: 234
title: USB Troubleshooting
---
# USB troubleshooting
## disp-sys-usb does not start

View file

@ -8,7 +8,6 @@ ref: 223
title: VM Troubleshooting
---
# VM troubleshooting
## VM Kernel troubleshooting

View file

@ -7,7 +7,6 @@ ref: 240
title: VPN Troubleshooting
---
# VPN Troubleshooting Guide
## Tips