mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-02 19:46:40 -04:00
parent
863f0ee9bd
commit
60bd80ad25
30 changed files with 107 additions and 107 deletions
|
@ -30,7 +30,7 @@ There are risks attached to reducing the size of an image, and in general you sh
|
|||
There are several disk images which can be easily extended, but pay attention to the overall consumed space of your sparse/thin disk images.
|
||||
In most cases, the GUI tool Qube Settings (available for every qube from the Start menu, and also in the Qube Manager) will allow you to easily increase maximum disk image size.
|
||||
|
||||

|
||||

|
||||
|
||||
In case of standalone qubes and templates, just change the Disk Storage settings above.
|
||||
In case of template-based qubes, the private storage (the /home directory and user files) can be changed in the qube's own settings, but the system root image is [inherited from the template](/doc/how-to-get-started/), and so it must be changed in the template settings.
|
||||
|
|
|
@ -120,7 +120,7 @@ In this instance our DHCP server is not useful.
|
|||
In order to manually configure networking in a VM, one should first find out the IP/netmask/gateway assigned to the particular VM by Qubes.
|
||||
This can be seen e.g. in the Qube Manager in the qube's properties:
|
||||
|
||||

|
||||

|
||||
|
||||
Alternatively, one can use the `qvm-ls -n` command to obtain the same information, (IP/netmask/gateway).
|
||||
|
||||
|
@ -255,7 +255,7 @@ One problem at the moment however, is that after the whole system gets suspended
|
|||
This can be achieved under a Windows HVM by opening the Device Manager, selecting the actual device (such as a USB controller), 'Disabling' the device, and then 'Enabling' the device again.
|
||||
This is illustrated on the screenshot below:
|
||||
|
||||

|
||||

|
||||
|
||||
## Converting VirtualBox VMs to Qubes HVMs
|
||||
|
||||
|
|
|
@ -97,9 +97,9 @@ Be sure to select "DD image" mode (*after* selecting the Qubes ISO):
|
|||
<b>Note:</b> If you do this on Windows 10, you can only install Qubes without MediaTest, which is not recommended.
|
||||
</div>
|
||||
|
||||

|
||||

|
||||
|
||||

|
||||

|
||||
|
||||
If you are an advanced user, and you would like to customize your installation, please see [custom installation](/doc/custom-install/).
|
||||
Otherwise, follow the instructions below.
|
||||
|
@ -113,7 +113,7 @@ This section will demonstrate a simple installation using mostly default setting
|
|||
Just after you power on your machine, make the Qubes OS medium available to the computer by inserting your DVD or USB drive.
|
||||
Shortly after the Power-on self-test (POST) is completed, you should be greeted with the Qubes OS boot screen.
|
||||
|
||||

|
||||

|
||||
|
||||
<div class="alert alert-info" role="alert">
|
||||
<i class="fa fa-info-circle"></i>
|
||||
|
@ -142,19 +142,19 @@ This may require an [advanced reboot](https://support.microsoft.com/en-us/help/4
|
|||
After the POST, you may have a chance to choose a boot device.
|
||||
You may wish to select the USB drive or DVD drive as a temporary boot option so that the next time you boot, your internal storage device will be selected first.
|
||||
|
||||

|
||||

|
||||
|
||||
### The installer home screen
|
||||
|
||||
On the first screen, you are asked to select the language that will be used during the installation process.
|
||||
When you are done, select **Continue**.
|
||||
|
||||

|
||||

|
||||
|
||||
Prior to the next screen, a compatibility test runs to check whether IOMMU-virtualization is active or not.
|
||||
If the test fails, a window will pop up.
|
||||
|
||||

|
||||

|
||||
|
||||
Do not panic.
|
||||
It may simply indicate that IOMMU-virtualization hasn't been activated in the BIOS.
|
||||
|
@ -179,7 +179,7 @@ Those that are familiar with RPM-based distributions should feel at home.
|
|||
The Installation summary screen allows you to change how the system will be installed and configured, including localization settings.
|
||||
At minimum, you are required to select the storage device on which Qubes OS will be installed.
|
||||
|
||||

|
||||

|
||||
|
||||
### Localization
|
||||
|
||||
|
@ -188,23 +188,23 @@ Go to Keyboard Layout, press the "Plus" symbol, search for "German" as indicated
|
|||
If you want it be your default language, select the "German" entry in the list and press the arrow button.
|
||||
Click on "Done" in the upper left corner, and you're ready to go!
|
||||
|
||||

|
||||

|
||||
|
||||
The process to select a new language is similar to the process to select a new keyboard layout.
|
||||
Follow the same process in the "Language Support" entry.
|
||||
|
||||

|
||||

|
||||
|
||||
You can have as many keyboard layout and languages as you want.
|
||||
Post-install, you will be able to switch between them and install others.
|
||||
|
||||
Don't forget to select your time and date by clicking on the Time & Date entry.
|
||||
|
||||

|
||||

|
||||
|
||||
### Software
|
||||
|
||||

|
||||

|
||||
|
||||
On the software selection tab, you can choose which software to install in Qubes OS.
|
||||
Two options are available:
|
||||
|
@ -250,7 +250,7 @@ Please note that a minimum storage of 32 GiB is required.
|
|||
If you want to install Qubes OS onto a USB drive, just select the USB device as the target installation device.
|
||||
Bear in mind that the installation process is likely to take longer than it would on an internal storage device.
|
||||
|
||||

|
||||

|
||||
|
||||
<div class="alert alert-success" role="alert">
|
||||
<i class="fa fa-check-circle"></i>
|
||||
|
@ -267,11 +267,11 @@ When you're finished, press **Done**.
|
|||
<b>Warning:</b> If you forget your encryption passphrase, there is no way to recover it.
|
||||
</div>
|
||||
|
||||

|
||||

|
||||
|
||||
When you're ready, press **Begin Installation**.
|
||||
|
||||

|
||||

|
||||
|
||||
### Create your user account
|
||||
|
||||
|
@ -284,7 +284,7 @@ Select **User Creation** to define a new user with administrator privileges and
|
|||
Just as for the disk encryption, this password should be complex.
|
||||
The root account is deactivated and should remain as such.
|
||||
|
||||

|
||||

|
||||
|
||||
When the installation is complete, press **Reboot**.
|
||||
Don't forget to remove the installation medium, or else you may end up seeing the installer boot screen again.
|
||||
|
@ -295,23 +295,23 @@ Don't forget to remove the installation medium, or else you may end up seeing th
|
|||
|
||||
If the installation was successful, you should now see the GRUB menu during the boot process.
|
||||
|
||||

|
||||

|
||||
|
||||
Just after this screen, you will be asked to enter your encryption passphrase.
|
||||
|
||||

|
||||

|
||||
|
||||
### Initial Setup
|
||||
|
||||
You're almost done.
|
||||
Before you can start using Qubes OS, some configuration is needed.
|
||||
|
||||

|
||||

|
||||
|
||||
By default, the installer will create a number of qubes (depending on the options you selected during the installation process).
|
||||
These are designed to give you a more ready-to-use environment from the get-go.
|
||||
|
||||

|
||||

|
||||
|
||||
Let's briefly go over the options:
|
||||
|
||||
|
@ -340,11 +340,11 @@ This configuration process may take a while, depending on the speed and compatib
|
|||
After the configuration is done, you will be greeted by the login screen.
|
||||
Enter your password and log in.
|
||||
|
||||

|
||||

|
||||
|
||||
Congratulations, you are now ready to use Qubes OS!
|
||||
|
||||

|
||||

|
||||
|
||||
## Next steps
|
||||
|
||||
|
|
|
@ -84,7 +84,7 @@ should be another RC. If, based on remaining issues, the Committee decides to
|
|||
release final, then the Committee agrees upon the release date, which should be
|
||||
no later than a week after.
|
||||
|
||||

|
||||

|
||||
|
||||
Bug priorities
|
||||
--------------
|
||||
|
|
|
@ -31,7 +31,7 @@ Due to its overarching importance, dom0 has no network connectivity and is used
|
|||
|
||||
You'll choose a **color** for each of your qubes out of a predefined set of colors. Each window on your desktop will have its frame colored according to the color of that qube. These colored frames help you keep track of which qube each window belongs to and how trustworthy it is. This is especially helpful when you have the same app running in multiple qubes at the same time. For example, if you're logged in to your bank account in one qube while doing some random web surfing in a different qube, you wouldn't want to accidentally enter your banking password in the latter! The colored frames help to avoid such mistakes.
|
||||
|
||||
[
|
||||
[](/attachment/wiki/GettingStarted/r4.0-snapshot_40.png)
|
||||
|
||||
Most Qubes users associate red with what's untrusted and dangerous (like a red light: stop! danger!), green with what's safe and trusted, and yellow and orange with things in the middle. This color scheme also extends to include blue and black, which are usually interpreted as indicating progressively more trusted domains than green, with black being ultimately trusted.
|
||||
Color and associated meanings are ultimately up to you, however. The system itself does not treat the colors differently. If you create two identical qubes --- black and red, say --- they'll be the same until you start using them differently. Feel free to use the colors in whatever way is most useful to you. For example, you might decide to use three or four qubes for work activities and give them all the same color --- or all different colors. It's entirely up to you.
|
||||
|
@ -40,7 +40,7 @@ Color and associated meanings are ultimately up to you, however. The system itse
|
|||
|
||||
On operating systems like Windows and macOS, the desktop environment is unchangeable and part of that operating system. With Linux, any of a number of desktop environments are an option. Qubes OS is installed with XFCE as its default desktop environment, but it also supports KDE, as well as the i3 and awesome window managers.
|
||||
|
||||
[
|
||||
[](/attachment/wiki/GettingStarted/r4.0-taskbar.png)
|
||||
|
||||
The bar at the top of your screen in Qubes 4.0 includes the following XFCE component areas:
|
||||
|
||||
|
@ -58,11 +58,11 @@ There are several Tray widgets that are custom to Qubes OS:
|
|||
- The **Qubes Disk Space Monitor** will notify you if you're ever running out of disk space.
|
||||
- The **Qubes Update** tool will inform you when updates are available.
|
||||
|
||||
[
|
||||
[](/attachment/wiki/GettingStarted/r4.0-q40_widgets.png)
|
||||
|
||||
To see all of your qubes at the same time, you can use the **Qube Manager** (go to the App Menu → System Tools → Qube Manager), which displays the states of all the qubes in your system, even the ones that aren't running.
|
||||
|
||||
[
|
||||
[](/attachment/wiki/GettingStarted/r4.0-qubes-manager.png)
|
||||
|
||||
#### Command-line interface
|
||||
|
||||
|
|
|
@ -33,7 +33,7 @@ To permanently install new software in a template:
|
|||
These new shortcuts will appear in the Applications Menu.
|
||||
(If you encounter problems, see [here](/doc/app-menu-shortcut-troubleshooting/) for troubleshooting.)
|
||||
|
||||

|
||||
](/attachment/wiki/ManagingAppVmShortcuts/r4.1-dom0-appmenu-select.png)
|
||||
|
||||
## How to update software
|
||||
|
||||
|
|
|
@ -38,11 +38,11 @@ Fully updating your Qubes OS system means updating:
|
|||
|
||||
You can accomplish this using the **Qubes Update** tool.
|
||||
|
||||
[
|
||||
[](/attachment/wiki/QubesScreenshots/r4.0-software-update.png)
|
||||
|
||||
By default, the Qubes Update tool will appear as an icon in the Notification Area when updates are available.
|
||||
|
||||
[
|
||||
[](/attachment/wiki/QubesScreenshots/r4.0-qube-updates-available.png)
|
||||
|
||||
However, you can also start the tool manually by selecting it in the Applications Menu under "System Tools."
|
||||
Even if no updates have been detected, you can use this tool to check for updates manually at any time by selecting "Enable updates for qubes without known available updates," then selecting all desired items from the list and clicking "Next."
|
||||
|
|
|
@ -24,7 +24,7 @@ In addition to smaller flash memory sticks, this includes things like USB extern
|
|||
|
||||
Qubes OS supports the ability to attach a USB drive (or just its partitions) to any qube easily, no matter which qube handles the USB controller.
|
||||
|
||||
Attaching USB drives is integrated into the Devices Widget: 
|
||||
Attaching USB drives is integrated into the Devices Widget: 
|
||||
Simply insert your USB drive and click on the widget.
|
||||
You will see multiple entries for your USB drive; typically, `sys-usb:sda`, `sys-usb:sda1`, and `sys-usb:2-1` for example.
|
||||
Entries starting with a number (e.g. here `2-1`) are the [whole usb-device](/doc/how-to-use-usb-devices/).
|
||||
|
@ -178,7 +178,7 @@ To attach a file as block device to another qube, first turn it into a loopback
|
|||
Afterwards it prints the device-node-name it found.
|
||||
|
||||
2. If you want to use the GUI, you're done.
|
||||
Click the Device Manager  and select the `loop0`-device to attach it to another qube.
|
||||
Click the Device Manager  and select the `loop0`-device to attach it to another qube.
|
||||
|
||||
If you rather use the command line, continue:
|
||||
|
||||
|
|
|
@ -38,7 +38,7 @@ PCI devices can be attached using the Qube Settings, but require a VM reboot.
|
|||
|
||||
## General Qubes Device Widget Behavior And Handling ##
|
||||
|
||||
When clicking on the tray icon (which looks similar to this):  several device-classes separated by lines are displayed as tooltip.
|
||||
When clicking on the tray icon (which looks similar to this):  several device-classes separated by lines are displayed as tooltip.
|
||||
Block devices are displayed on top, microphones one below and USB-devices at the bottom.
|
||||
|
||||
On most laptops, integrated hardware such as cameras and fingerprint-readers are implemented as USB-devices and can be found here.
|
||||
|
@ -57,7 +57,7 @@ Click on one and your device will be attached!
|
|||
To detach a device, click the Qubes Devices Widget icon again.
|
||||
Attached devices are displayed in bold.
|
||||
Hover the one you want to detach.
|
||||
A list of VMs appears, one showing the eject symbol: 
|
||||
A list of VMs appears, one showing the eject symbol: 
|
||||
|
||||
|
||||
### Attaching a Device to Several VMs ###
|
||||
|
|
|
@ -22,7 +22,7 @@ This means that you can safely work with untrusted files without risk of comprom
|
|||
disposables can be launched either directly from dom0's Start Menu or terminal window, or from within app qubes.
|
||||
While running, disposables will appear in Qubes VM Manager with the name `disp####`.
|
||||
|
||||
[
|
||||
[](/attachment/wiki/DisposableVms/disposablevm-example.png)
|
||||
|
||||
This diagram provides a general example of how disposables can be used to safely open untrusted links and attachments in disposables. See [this article](https://blog.invisiblethings.org/2010/06/01/disposable-vms.html) for more on why one would want to use a disposable.
|
||||
|
||||
|
@ -102,7 +102,7 @@ This app is running in its own dedicated VM -- a disposable created for the purp
|
|||
Once you close the viewing application the whole disposable will be destroyed.
|
||||
If you have edited the file and saved the changes, the changed file will be saved back to the original app qube, overwriting the original.
|
||||
|
||||

|
||||
 
|
||||
|
||||
|
||||
## Opening a fresh web browser instance in a new disposable
|
||||
|
@ -112,7 +112,7 @@ This can be done easily using the Start Menu: just go to **Application Menu -\>
|
|||
Wait a few seconds until a web browser starts.
|
||||
Once you close the viewing application the whole disposable will be destroyed.
|
||||
|
||||

|
||||

|
||||
|
||||
|
||||
## Opening a file in a disposable via command line (from app qube)
|
||||
|
|
|
@ -45,7 +45,7 @@ There you can attach PCI-devices to a qube.
|
|||
|
||||
1. To reach the settings of any qube either
|
||||
|
||||
- Press Alt+F3 to open the application finder, type in the VM name, select the "\[VM-name\]: Qube Settings" menu entry and press enter or click "Launch"!
|
||||
- Press Alt+F3 to open the application finder, type in the VM name, select the "\[VM-name\]: Qube Settings" menu entry and press enter or click "Launch"!
|
||||
- Select the VM in Qube Manager and click the settings-button or right-click the VM and select `Qube settings`.
|
||||
- Click the Domain Manager, hover the VM you want to attach a device to and select "settings" in the additional menu. (only running VMs!)
|
||||
|
||||
|
|
|
@ -33,9 +33,9 @@ But it has some [issues](https://github.com/QubesOS/qubes-issues/issues/4661).)
|
|||
|
||||
### With Qubes Device Manager
|
||||
|
||||
Click the device-manager-icon: 
|
||||
Click the device-manager-icon: 
|
||||
A list of available devices appears.
|
||||
USB-devices have a USB-icon to their right: 
|
||||
USB-devices have a USB-icon to their right: 
|
||||
|
||||
Hover on one device to display a list of VMs you may attach it to.
|
||||
|
||||
|
@ -46,7 +46,7 @@ You're done.
|
|||
After you finished using the USB-device, you can detach it the same way by clicking on the Devices Widget.
|
||||
You will see an entry in bold for your device such as **`sys-usb:2-5 - 058f_USB_2.0_Camera`**.
|
||||
Hover on the attached device to display a list of running VMs.
|
||||
The one to which your device is connected will have an eject button  next to it.
|
||||
The one to which your device is connected will have an eject button  next to it.
|
||||
Click that and your device will be detached.
|
||||
|
||||
### With The Command Line Tool
|
||||
|
|
|
@ -27,7 +27,7 @@ How to edit rules
|
|||
|
||||
In order to edit rules for a given qube, select it in the Qube Manager and press the "firewall" button.
|
||||
|
||||

|
||||

|
||||
|
||||
If the qube is running, you can open Settings from the Qube Popup Menu.
|
||||
|
||||
|
|
|
@ -21,7 +21,7 @@ This way one not-so-trusted domain, e.g. the one where Thunderbird is running, c
|
|||
This way the compromise of your domain where Thunderbird or another client app is running -- arguably a not-so-unthinkable scenario -- does not allow the attacker to automatically also steal all your keys.
|
||||
(We should make a rather obvious comment here that the so-often-used passphrases on private keys are pretty meaningless because the attacker can easily set up a simple backdoor which would wait until the user enters the passphrase and steal the key then.)
|
||||
|
||||
[
|
||||
[](/attachment/wiki/SplitGpg/split-gpg-diagram.png)
|
||||
|
||||
This diagram presents an overview of the Split GPG architecture.
|
||||
|
||||
|
@ -37,8 +37,8 @@ Unfortunately this problem of signing reliability is not solvable by Split GPG)
|
|||
With Qubes Split GPG this problem is drastically minimized, because each time the key is to be used the user is asked for consent (with a definable time out, 5 minutes by default), plus is always notified each time the key is used via a tray notification from the domain where GPG backend is running.
|
||||
This way it would be easy to spot unexpected requests to decrypt documents.
|
||||
|
||||
[
|
||||
[
|
||||
[](/attachment/wiki/SplitGpg/r2-split-gpg-1.png)
|
||||
[](/attachment/wiki/SplitGpg/r2-split-gpg-3.png)
|
||||
|
||||
## Configuring Split GPG
|
||||
|
||||
|
@ -156,9 +156,9 @@ Starting with version 78, Thunderbird has a built-in PGP feature and no longer r
|
|||
|
||||
In `work-email`, use the Thunderbird config editor (found at the bottom of preferences/options), and search for `mail.openpgp.allow_external_gnupg`. Switch the value to true. Still in config editor, search for `mail.openpgp.alternative_gpg_path`. Set its value to `/usr/bin/qubes-gpg-client-wrapper`. Restart Thunderbird after this change.
|
||||
|
||||
[
|
||||
[
|
||||
[
|
||||
[](/attachment/wiki/SplitGpg/tb78-1.png)
|
||||
[](/attachment/wiki/SplitGpg/tb78-2.png)
|
||||
[](/attachment/wiki/SplitGpg/tb78-3.png)
|
||||
|
||||
You need to obtain your key ID which should be **exactly 16 characters**. Enter the command `qubes-gpg-client-wrapper -K --keyid-format long`:
|
||||
|
||||
|
@ -178,24 +178,24 @@ ssb rsa2048/370CE932085BA13B 2020-09-05 [E] [expires: 2022-09-05]
|
|||
|
||||
Open the Account Settings and open the *End-to-End Encryption* tab of the respective email account. Click the *Add Key* button. You'll be offered the choice *Use your external key through GnuPG*. Select it and click Continue.
|
||||
|
||||
[
|
||||
[
|
||||
[](/attachment/wiki/SplitGpg/tb78-4.png)
|
||||
[](/attachment/wiki/SplitGpg/tb78-5.png)
|
||||
|
||||
The key ID reference you would need here is `777402E6D301615C`. Now paste or type the ID of the secret key that you would like to use. Be careful to enter it correctly, because your input isn't verified. Confirm to save this key ID. Now you can select the key ID to use.
|
||||
|
||||
[
|
||||
[
|
||||
[](/attachment/wiki/SplitGpg/tb78-6.png)
|
||||
[](/attachment/wiki/SplitGpg/tb78-7.png)
|
||||
|
||||
This key ID will be used to digitally sign or send an encrypted message with your account. For this to work, Thunderbird needs a copy of your public key. At this time, Thunderbird doesn't fetch the public key from `/usr/bin/qubes-gpg-client-wrapper`, you must manually import it. Export the key as follow (assuming the key ID would be `777402E6D301615C`):
|
||||
|
||||
[
|
||||
[
|
||||
[](/attachment/wiki/SplitGpg/tb78-8.png)
|
||||
[](/attachment/wiki/SplitGpg/tb78-9.png)
|
||||
|
||||
Use Thunderbird's Tools menu to open *OpenPGP Key Management*. In that window, use the File menu to access the *Import Public Key(s) From File* command. Open the file with your public key. After the import was successful, right click on the imported key in the list and select *Key Properties*. You must mark your own key as *Yes, I've verified in person this key has the correct fingerprint*.
|
||||
|
||||
Once this is done, you should be able to send an encrypted and signed email by selecting *Require Encryption* or *Digitally Sign This Message* in the compose menu *Options* or *Security* toolbar button. You can try it by sending an email to yourself.
|
||||
|
||||
[
|
||||
[](/attachment/wiki/SplitGpg/tb78-10.png)
|
||||
|
||||
For more details about using smart cards/Split GPG with Thunderbird PGP feature, please see [Thunderbird:OpenPGP:Smartcards](https://wiki.mozilla.org/Thunderbird:OpenPGP:Smartcards) from which the above documentation is inspired.
|
||||
|
||||
|
@ -208,7 +208,7 @@ It is recommended to set up and use `/usr/bin/qubes-gpg-client-wrapper`, as disc
|
|||
|
||||
On a fresh Enigmail install, your need to change the default `Enigmail Junior Mode`. Go to Thunderbird preferences and then privacy tab. Select `Force using S/MIME and Enigmail`. Then, in the preferences of Enigmail, make it point to `/usr/bin/qubes-gpg-client-wrapper` instead of the standard GnuPG binary:
|
||||
|
||||
[
|
||||
[](/attachment/wiki/SplitGpg/tb-enigmail-split-gpg-settings-2.png)
|
||||
|
||||
## Using Keybase with Split GPG
|
||||
|
||||
|
@ -280,7 +280,7 @@ Use `qubes-gpg-import-key` in the client app qube to import the key into the GPG
|
|||
|
||||
A safe, unspoofable user consent dialog box is displayed.
|
||||
|
||||
[
|
||||
[](/attachment/wiki/SplitGpg/r2-split-gpg-5.png)
|
||||
|
||||
Selecting "Yes to All" will add a line in the corresponding [RPC Policy](/doc/rpc-policy/) file.
|
||||
|
||||
|
|
|
@ -42,7 +42,7 @@ Therefore, the token is never in the same qube as the browser.
|
|||
Our proxy forwards only the data necessary to actually perform the authentication, leaving all unnecessary data out, so it won't become a vector of attack.
|
||||
This is depicted in the diagram below (click for full size).
|
||||
|
||||
[](/attachment/posts/u2f.svg)
|
||||
[](/attachment/wiki/posts/u2f.svg)
|
||||
|
||||
The Qubes U2F Proxy has two parts: the frontend and the backend.
|
||||
The frontend runs in the same qube as the browser and presents a fake USB-like HID device using `uhid`.
|
||||
|
|
|
@ -14,7 +14,7 @@ title: App Menu Shortcut Troubleshooting
|
|||
For ease of use Qubes aggregates shortcuts to applications that are installed in app qubes and shows them in one application menu (aka "app menu" or "start menu") in dom0.
|
||||
Clicking on such shortcut runs the assigned application in its app qube.
|
||||
|
||||

|
||||

|
||||
|
||||
To make applications newly installed via the OS's package manager show up in the menu, use the `qvm-sync-appmenus` command (Linux VMs do this automatically):
|
||||
|
||||
|
@ -22,7 +22,7 @@ To make applications newly installed via the OS's package manager show up in the
|
|||
|
||||
After that, select the *Add more shortcuts* entry in the VM's submenu to customize which applications are shown:
|
||||
|
||||

|
||||

|
||||
|
||||
The above image shows that Windows HVMs are also supported (provided that Qubes Tools are installed).
|
||||
|
||||
|
|
|
@ -130,4 +130,4 @@ After the whole system gets suspended into S3 sleep and subsequently resumed, so
|
|||
This can be achieved under a Windows HVM by opening the Device Manager, selecting the actual device (such as a USB controller), 'Disabling' the device, and then 'Enabling' the device again.
|
||||
This is illustrated on the screenshot below:
|
||||
|
||||

|
||||

|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue