mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-25 22:16:10 -05:00
Fix broken link (#1114)
This commit is contained in:
parent
d9de60a551
commit
5310611d88
@ -88,7 +88,7 @@ Qubes' unique DisposableVMs (DispVMs) allow the user to open any file in a dispo
|
||||
|
||||
* * * * *
|
||||
|
||||
[![r4.0-convert-to-trusted-pdf-1.png](/attachment/wiki/QubesScreenshots/r4.0-convert-to-trusted-pdf-1.png)](/attachment/wiki/QubesScreenshots/r4.0-convert-to-trusted-pdf-1.png) [![r4.0-converting-pdf.png](/attachment/wiki/QubesScreenshots/r4.0-converting-pdf.png)](/attachment/wiki/QubesScreenshots/r4.0-converting-pdf.png)
|
||||
[![r4.0-convert-to-trusted-pdf-1.png](/attachment/wiki/QubesScreenshots/r4.0-convert-to-trusted-pdf-1.png)](/attachment/wiki/QubesScreenshots/r4.0-convert-to-trusted-pdf-1.png) [![r4.1-converting-pdf.png](/attachment/wiki/QubesScreenshots/r4.1-converting-pdf.png)](/attachment/wiki/QubesScreenshots/r4.1-converting-pdf.png)
|
||||
|
||||
Qubes provides an advanced infrastructure for programming inter-VM services, such as a PDF converter for untrusted files (which is described in [this article](https://blog.invisiblethings.org/2013/02/21/converting-untrusted-pdfs-into-trusted.html)).
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user