mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
Update links and unwrap text
This commit is contained in:
parent
7db7519046
commit
50268647ce
@ -17,20 +17,16 @@ redirect_from:
|
||||
* 64-bit Intel or AMD processor (x86\_64 aka x64 aka AMD64)
|
||||
* 4 GB RAM
|
||||
* 32 GB disk space
|
||||
* Legacy boot mode (required for R3.0 and earlier; UEFI is supported beginning
|
||||
with R3.1)
|
||||
* Legacy boot mode (required for R3.0 and earlier; UEFI is supported beginning with R3.1)
|
||||
|
||||
### Recommended ###
|
||||
|
||||
* Fast SSD (strongly recommended)
|
||||
* Intel IGP (strongly preferred)
|
||||
* Nvidia GPUs may require significant [troubleshooting][nvidia].
|
||||
* ATI GPUs have not been formally tested (but see the [Hardware Compatibility
|
||||
List]).
|
||||
* [Intel VT-x] or [AMD-V] (required for running HVM domains, such as
|
||||
Windows-based AppVMs)
|
||||
* [Intel VT-d] or [AMD-Vi (aka AMD IOMMU)] (required for effective isolation of
|
||||
network VMs)
|
||||
* ATI GPUs have not been formally tested (but see the [Hardware Compatibility List]).
|
||||
* [Intel VT-x] or [AMD-V] (required for running HVM domains, such as Windows-based AppVMs)
|
||||
* [Intel VT-d] or [AMD-Vi (aka AMD IOMMU)] (required for effective isolation of network VMs)
|
||||
* TPM with proper BIOS support (required for [Anti Evil Maid])
|
||||
|
||||
## Qubes Release 4.x ##
|
||||
@ -48,45 +44,30 @@ redirect_from:
|
||||
* Fast SSD (strongly recommended)
|
||||
* Intel IGP (strongly preferred)
|
||||
* Nvidia GPUs may require significant [troubleshooting][nvidia].
|
||||
* ATI GPUs have not been formally tested (but see the [Hardware Compatibility
|
||||
List]).
|
||||
* ATI GPUs have not been formally tested (but see the [Hardware Compatibility List]).
|
||||
* TPM with proper BIOS support (required for [Anti Evil Maid])
|
||||
* A non-USB keyboard or multiple USB controllers
|
||||
* Also consider the [hardware certification requirements for Qubes 4.x].
|
||||
|
||||
## Choosing Hardware ##
|
||||
|
||||
* Please see the [Hardware Compatibility List] for a compilation of
|
||||
hardware reports generated and submitted by users across various Qubes
|
||||
versions. (For more information about the HCL itself, see [here][hcl-doc]).
|
||||
* For more certain hardware compatibility, you may wish to consider a
|
||||
[Qubes-certified laptop]. (For information about how a computer becomes
|
||||
Qubes-certified, see [Hardware Certification].)
|
||||
* Please see the [Hardware Compatibility List] for a compilation of hardware reports generated and submitted by users across various Qubes versions.
|
||||
(For more information about the HCL itself, see [here][hcl-doc].)
|
||||
* See the [Certified Hardware] page.
|
||||
|
||||
## Important Notes ##
|
||||
|
||||
* Qubes **can** be installed on systems which do not meet the recommended
|
||||
requirements. Such systems will still offer significant security
|
||||
improvements over traditional operating systems, since things like GUI
|
||||
isolation and kernel protection do not require special hardware.
|
||||
* Qubes **can** be installed on a USB flash drive or external disk, and testing
|
||||
has shown that this works very well. A fast USB 3.0 flash drive is
|
||||
recommended for this. (As a reminder, its capacity must be at least 32 GB.)
|
||||
Simply plug the flash drive into the computer before booting into the Qubes
|
||||
installer from a separate installation medium, choose the flash drive as the
|
||||
target installation disk, and proceed with the installation normally. After
|
||||
Qubes has been installed on the flash drive, it can then be plugged into
|
||||
other computers in order to boot into Qubes. In addition to the convenience
|
||||
of having a portable copy of Qubes, this allows users to test for hardware
|
||||
compatibility on multiple machines (e.g., at a brick-and-mortar computer
|
||||
store) before deciding on which computer to purchase. (See [hcl-report] for
|
||||
advice on hardware compatibility testing.) Keep in mind to also change
|
||||
assigned devices for your netvm and usbvm, if you move between different
|
||||
machines.
|
||||
* There is also a [live USB] option available, which may be even easier for
|
||||
testing.
|
||||
* Installing Qubes in a virtual machine is not recommended, as it uses its own
|
||||
bare-metal hypervisor (Xen).
|
||||
* Qubes **can** be installed on systems which do not meet the recommended requirements.
|
||||
Such systems will still offer significant security improvements over traditional operating systems, since things like GUI isolation and kernel protection do not require special hardware.
|
||||
* Qubes **can** be installed on a USB flash drive or external disk, and testing has shown that this works very well. A fast USB 3.0 flash drive is recommended for this.
|
||||
(As a reminder, its capacity must be at least 32 GB.)
|
||||
Simply plug the flash drive into the computer before booting into the Qubes installer from a separate installation medium, choose the flash drive as the target installation disk, and proceed with the installation normally.
|
||||
After Qubes has been installed on the flash drive, it can then be plugged into other computers in order to boot into Qubes.
|
||||
In addition to the convenience of having a portable copy of Qubes, this allows users to test for hardware compatibility on multiple machines (e.g., at a brick-and-mortar computer
|
||||
store) before deciding on which computer to purchase.
|
||||
(See [hcl-report] for advice on hardware compatibility testing.)
|
||||
Remember to change the devices assigned to your NetVM and USBVM if you move between different machines.
|
||||
* Installing Qubes in a virtual machine is not recommended, as it uses its own bare-metal hypervisor (Xen).
|
||||
* Macintosh PCs are not currently supported due to keyboard and mouse problems.
|
||||
(See [#230] for details. Patches welcome!)
|
||||
* [Advice on finding a VT-d capable notebook][vt-d-notebook].
|
||||
@ -94,12 +75,11 @@ redirect_from:
|
||||
|
||||
[nvidia]: /doc/install-nvidia-driver/
|
||||
[hardware certification requirements for Qubes 4.x]: /news/2016/07/21/new-hw-certification-for-q4/
|
||||
[Hardware Certification]: /doc/hardware/#hardware-certification
|
||||
[Certified Hardware]: /doc/certified-hardware/
|
||||
[Hardware Compatibility List]: /hcl/
|
||||
[hcl-doc]: /doc/hcl/
|
||||
[hcl-report]: /doc/hcl/#generating-and-submitting-new-reports
|
||||
[Anti Evil Maid]: /doc/anti-evil-maid/
|
||||
[Qubes-certified laptop]: /doc/hardware/#qubes-certified-laptops
|
||||
[live USB]: /doc/live-usb/
|
||||
[#230]: https://github.com/QubesOS/qubes-issues/issues/230
|
||||
[vt-d-notebook]: https://groups.google.com/d/msg/qubes-users/Sz0Nuhi4N0o/ZtpJdoc0OY8J
|
||||
|
Loading…
Reference in New Issue
Block a user