mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-05-31 12:34:20 -04:00
Various formatting fixes
This commit is contained in:
parent
bf13e5866c
commit
7598bbe156
7 changed files with 11 additions and 11 deletions
|
@ -313,7 +313,7 @@ Go to dom0 -> Qubes VM Manger -> right click on the VM -> Qube settings -> Advan
|
|||
Depends on `Virtualization` mode setting:
|
||||
|
||||
* `Virtualization` mode `PV`: Possible, however use of `Virtualization` mode `PV` mode is discouraged for security purposes.
|
||||
* If you require `Virtualization` mode `PV` mode, install `grub2-xen-pvh` in dom0. This can be done by running command `sudo qubes-dom0-update pvgrub2-pvh in dom0.
|
||||
* If you require `Virtualization` mode `PV` mode, install `grub2-xen-pvh` in dom0. This can be done by running command `sudo qubes-dom0-update pvgrub2-pvh` in dom0.
|
||||
* `Virtualization` mode `PVH`: Possible.
|
||||
* `Virtualization` mode `HVM`: Possible.
|
||||
|
||||
|
|
|
@ -34,7 +34,7 @@ virtualization extensions of the host CPU. These are typically contrasted with
|
|||
Paravirtualized (PV) VMs.
|
||||
|
||||
HVMs allow you to create qubes based on any OS for which you have an
|
||||
installation ISO, so you can easily have qubes running Windows, \*BSD, or any
|
||||
installation ISO, so you can easily have qubes running Windows, `*BSD`, or any
|
||||
Linux distribution. You can also use HVMs to run "live" distros.
|
||||
|
||||
By default, every qube runs in PVH mode (which has security advantages over
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue