mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-02 03:26:38 -04:00
Fix links
This commit is contained in:
parent
d4c577e31b
commit
76150ac9d3
26 changed files with 46 additions and 46 deletions
|
@ -14,8 +14,8 @@ title: How to Copy and Move Files
|
|||
|
||||
*This page is about copying and moving files.
|
||||
If you wish to simply copy and paste text, that can be done more easily using the inter-qube clipboard.
|
||||
See [copying and pasting text between qubes](/doc/copy-paste/).
|
||||
For dom0, see [copying from (and to) dom0](/doc/copy-from-dom0/).*
|
||||
See [copying and pasting text between qubes](/doc/how-to-copy-and-paste-text/).
|
||||
For dom0, see [copying from (and to) dom0](/doc/how-to-copy-from-dom0/).*
|
||||
|
||||
Qubes OS supports the secure copying and moving of files and directories (folders) between qubes.
|
||||
|
||||
|
|
|
@ -13,8 +13,8 @@ title: How to Copy and Paste Text
|
|||
|
||||
|
||||
*This page is about copying and pasting plain text.
|
||||
If you wish to copy more complex data, such as rich text or images, see [copying and moving files between qubes](/doc/copying-files/).
|
||||
For dom0, see [copying from (and to) dom0](/doc/copy-from-dom0/).*
|
||||
If you wish to copy more complex data, such as rich text or images, see [copying and moving files between qubes](/doc/how-to-copy-and-move-files/).
|
||||
For dom0, see [copying from (and to) dom0](/doc/how-to-copy-from-dom0/).*
|
||||
|
||||
Qubes OS features a secure inter-qube clipboard that allows you to copy and paste text between qubes.
|
||||
|
||||
|
|
|
@ -14,7 +14,7 @@ title: How to Copy from Dom0
|
|||
|
||||
|
||||
This page covers copying files and clipboard text between [dom0](/doc/glossary/#dom0) and [domUs](/doc/glossary/#domu).
|
||||
Since dom0 is special, the processes are different from [copying and pasting text between qubes](/doc/copy-paste/) and [copying and moving files between qubes](/doc/copying-files/).
|
||||
Since dom0 is special, the processes are different from [copying and pasting text between qubes](/doc/how-to-copy-and-paste-text/) and [copying and moving files between qubes](/doc/how-to-copy-and-move-files/).
|
||||
|
||||
## Copying **from** dom0
|
||||
|
||||
|
|
|
@ -134,7 +134,7 @@ If you plan on using your system for work, then it also depends on what kind of
|
|||
|
||||
It's a good idea to start out with the three qubes created automatically by the installer: work, personal, and untrusted.
|
||||
If and when you start to feel that some activity just doesn't fit into any of your existing qubes, or you want to partition some part of your life, you can easily create a new qube for it.
|
||||
You'll also be able to easily [copy](/doc/copying-files/) any files you need to the newly created qube.
|
||||
You'll also be able to easily [copy](/doc/how-to-copy-and-move-files/) any files you need to the newly created qube.
|
||||
|
||||
Still not sure?
|
||||
You might find it helpful to read [this article](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html), which describes how one of the Qubes OS architects partitions her digital life into security domains.
|
||||
|
@ -151,12 +151,12 @@ The [Qubes backup system](/doc/backup-restore/) allows you to do this securely a
|
|||
Here are some other tasks you're likely to want to perform.
|
||||
(A full list is available in the [How-to Guides](/doc/#how-to-guides) section of the documentation.)
|
||||
|
||||
- [Copying and Pasting Text Between Domains](/doc/copy-paste/)
|
||||
- [Copying and Moving Files Between Domains](/doc/copying-files/)
|
||||
- [Copying from (and to) dom0](/doc/copy-from-dom0/)
|
||||
- [Copying and Pasting Text Between Domains](/doc/how-to-copy-and-paste-text/)
|
||||
- [Copying and Moving Files Between Domains](/doc/how-to-copy-and-move-files/)
|
||||
- [Copying from (and to) dom0](/doc/how-to-copy-from-dom0/)
|
||||
- [Fullscreen Mode](/doc/full-screen-mode/)
|
||||
- [DisposableVMs](/doc/disposablevm/)
|
||||
- [Device Handling](/doc/device-handling/) (block, USB, and PCI devices)
|
||||
- [Device Handling](/doc/how-to-use-devices/) (block, USB, and PCI devices)
|
||||
|
||||
If you encounter any problems, please visit the [Help, Support, and Mailing Lists](/support/) page.
|
||||
|
||||
|
|
|
@ -32,9 +32,9 @@ It is important to keep your Qubes OS system up-to-date to ensure you have the l
|
|||
|
||||
Fully updating your Qubes OS system means updating:
|
||||
|
||||
- [Dom0](/doc/software-update-dom0/)
|
||||
- [TemplateVMs](/doc/software-update-domu/#updating-software-in-templatevms)
|
||||
- [StandaloneVMs](/doc/software-update-domu/#standalonevms) (if you have any)
|
||||
- [Dom0](/doc/how-to-install-software-in-dom0/)
|
||||
- [TemplateVMs](/doc/how-to-install-software/#updating-software-in-templatevms)
|
||||
- [StandaloneVMs](/doc/how-to-install-software/#standalonevms) (if you have any)
|
||||
|
||||
You can accomplish this using the **Qubes Update** tool.
|
||||
|
||||
|
|
|
@ -13,7 +13,7 @@ title: How to Use Block Storage Devices
|
|||
---
|
||||
|
||||
|
||||
*This page is part of [device handling in qubes](/doc/device-handling/).*
|
||||
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
|
||||
|
||||
If you don't know what a "block device" is, just think of it as a fancy way to say "something that stores data".
|
||||
|
||||
|
@ -27,7 +27,7 @@ Qubes OS supports the ability to attach a USB drive (or just its partitions) to
|
|||
Attaching USB drives is integrated into the Devices Widget: 
|
||||
Simply insert your USB drive and click on the widget.
|
||||
You will see multiple entries for your USB drive; typically, `sys-usb:sda`, `sys-usb:sda1`, and `sys-usb:2-1` for example.
|
||||
Entries starting with a number (e.g. here `2-1`) are the [whole usb-device](/doc/usb-devices/).
|
||||
Entries starting with a number (e.g. here `2-1`) are the [whole usb-device](/doc/how-to-use-usb-devices/).
|
||||
Entries without a number (e.g. here `sda`) are the whole block-device.
|
||||
Other entries are partitions of that block-device (e.r. here `sda1`).
|
||||
|
||||
|
|
|
@ -14,7 +14,7 @@ title: How to Use Devices
|
|||
|
||||
|
||||
This is an overview of device handling in Qubes OS.
|
||||
For specific devices ([block](/doc/block-devices/), [USB](/doc/usb-devices/) and [PCI](/doc/how-to-use-pci-devices/) devices), please visit their respective pages.
|
||||
For specific devices ([block](/doc/how-to-use-block-storage-devices/), [USB](/doc/how-to-use-usb-devices/) and [PCI](/doc/how-to-use-pci-devices/) devices), please visit their respective pages.
|
||||
|
||||
**Important security warning:** Device handling comes with many security implications.
|
||||
Please make sure you carefully read and understand the **[security considerations](/doc/device-handling-security/)**.
|
||||
|
|
|
@ -19,7 +19,7 @@ Currently, the only options for reading and recording optical discs (e.g., CDs,
|
|||
3. Use a SATA optical drive attached to dom0.
|
||||
(**Caution:** This option is [potentially dangerous](https://github.com/Qubes-Community/Contents/blob/master/docs/security/security-guidelines.md#dom0-precautions).)
|
||||
|
||||
To access an optical disc via USB follow the [typical procedure for attaching a USB device](/doc/usb-devices/#with-the-command-line-tool), then check with the **Qubes Devices** widget to see what device in the target qube the USB optical drive was attached to.
|
||||
To access an optical disc via USB follow the [typical procedure for attaching a USB device](/doc/how-to-use-usb-devices/#with-the-command-line-tool), then check with the **Qubes Devices** widget to see what device in the target qube the USB optical drive was attached to.
|
||||
Typically this would be `sr0`.
|
||||
For example, if `sys-usb` has device `3-2` attached to the `work` qube's `sr0`, you would mount it with `mount /dev/sr0 /mnt/removable`.
|
||||
You could also write to a disc with `wodim -v dev=/dev/sr0 -eject /home/user/Qubes.iso`.
|
||||
|
|
|
@ -13,7 +13,7 @@ title: How to Use PCI Devices
|
|||
---
|
||||
|
||||
|
||||
*This page is part of [device handling in qubes](/doc/device-handling/).*
|
||||
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
|
||||
|
||||
**Warning:** Only dom0 exposes PCI devices.
|
||||
Some of them are strictly required in dom0 (e.g., the host bridge).
|
||||
|
@ -23,7 +23,7 @@ Please make sure you carefully read and understand the **[security consideration
|
|||
|
||||
## Introduction
|
||||
|
||||
Unlike other devices ([USB](/doc/usb-devices/), [block](/doc/block-devices/), mic), PCI devices need to be attached on VM-bootup.
|
||||
Unlike other devices ([USB](/doc/how-to-use-usb-devices/), [block](/doc/how-to-use-block-storage-devices/), mic), PCI devices need to be attached on VM-bootup.
|
||||
Similar to how you can't attach a new sound-card after your computer booted (and expect it to work properly), attaching PCI devices to already booted VMs isn't supported.
|
||||
|
||||
The Qubes installer attaches all network class controllers to `sys-net` and all USB controllers to `sys-usb` by default, if you chose to create the network and USB qube during install.
|
||||
|
@ -59,7 +59,7 @@ There you can attach PCI-devices to a qube.
|
|||
## `qvm-pci` Usage
|
||||
|
||||
The `qvm-pci` tool allows PCI attachment and detachment.
|
||||
It's a shortcut for [`qvm-device pci`](/doc/device-handling/#general-qubes-device-widget-behavior-and-handling).
|
||||
It's a shortcut for [`qvm-device pci`](/doc/how-to-use-devices/#general-qubes-device-widget-behavior-and-handling).
|
||||
|
||||
To figure out what device to attach, first list the available PCI devices by running (as user) in dom0:
|
||||
|
||||
|
|
|
@ -10,15 +10,15 @@ title: How to Use USB Devices
|
|||
---
|
||||
|
||||
|
||||
*This page is part of [device handling in qubes](/doc/device-handling/).*
|
||||
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
|
||||
|
||||
If you are looking to handle USB *storage* devices (thumbdrives or USB-drives), please have a look at the [block device](/doc/block-devices/) page.
|
||||
If you are looking to handle USB *storage* devices (thumbdrives or USB-drives), please have a look at the [block device](/doc/how-to-use-block-storage-devices/) page.
|
||||
|
||||
**Note:** Attaching USB devices to VMs requires a [USB qube](/doc/usb-qubes/).
|
||||
|
||||
**Important security warning:** USB passthrough comes with many security implications.
|
||||
Please make sure you carefully read and understand the **[security considerations](/doc/device-handling-security/#usb-security)**.
|
||||
Whenever possible, attach a [block device](/doc/block-devices/) instead.
|
||||
Whenever possible, attach a [block device](/doc/how-to-use-block-storage-devices/) instead.
|
||||
|
||||
Examples of valid cases for USB-passthrough:
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue