Fix links

This commit is contained in:
Andrew David Wong 2021-06-17 07:01:53 -07:00
parent d4c577e31b
commit 76150ac9d3
No known key found for this signature in database
GPG key ID: 8CE137352A019A17
26 changed files with 46 additions and 46 deletions

View file

@ -14,8 +14,8 @@ title: How to Copy and Move Files
*This page is about copying and moving files.
If you wish to simply copy and paste text, that can be done more easily using the inter-qube clipboard.
See [copying and pasting text between qubes](/doc/copy-paste/).
For dom0, see [copying from (and to) dom0](/doc/copy-from-dom0/).*
See [copying and pasting text between qubes](/doc/how-to-copy-and-paste-text/).
For dom0, see [copying from (and to) dom0](/doc/how-to-copy-from-dom0/).*
Qubes OS supports the secure copying and moving of files and directories (folders) between qubes.

View file

@ -13,8 +13,8 @@ title: How to Copy and Paste Text
*This page is about copying and pasting plain text.
If you wish to copy more complex data, such as rich text or images, see [copying and moving files between qubes](/doc/copying-files/).
For dom0, see [copying from (and to) dom0](/doc/copy-from-dom0/).*
If you wish to copy more complex data, such as rich text or images, see [copying and moving files between qubes](/doc/how-to-copy-and-move-files/).
For dom0, see [copying from (and to) dom0](/doc/how-to-copy-from-dom0/).*
Qubes OS features a secure inter-qube clipboard that allows you to copy and paste text between qubes.

View file

@ -14,7 +14,7 @@ title: How to Copy from Dom0
This page covers copying files and clipboard text between [dom0](/doc/glossary/#dom0) and [domUs](/doc/glossary/#domu).
Since dom0 is special, the processes are different from [copying and pasting text between qubes](/doc/copy-paste/) and [copying and moving files between qubes](/doc/copying-files/).
Since dom0 is special, the processes are different from [copying and pasting text between qubes](/doc/how-to-copy-and-paste-text/) and [copying and moving files between qubes](/doc/how-to-copy-and-move-files/).
## Copying **from** dom0

View file

@ -134,7 +134,7 @@ If you plan on using your system for work, then it also depends on what kind of
It's a good idea to start out with the three qubes created automatically by the installer: work, personal, and untrusted.
If and when you start to feel that some activity just doesn't fit into any of your existing qubes, or you want to partition some part of your life, you can easily create a new qube for it.
You'll also be able to easily [copy](/doc/copying-files/) any files you need to the newly created qube.
You'll also be able to easily [copy](/doc/how-to-copy-and-move-files/) any files you need to the newly created qube.
Still not sure?
You might find it helpful to read [this article](https://blog.invisiblethings.org/2011/03/13/partitioning-my-digital-life-into.html), which describes how one of the Qubes OS architects partitions her digital life into security domains.
@ -151,12 +151,12 @@ The [Qubes backup system](/doc/backup-restore/) allows you to do this securely a
Here are some other tasks you're likely to want to perform.
(A full list is available in the [How-to Guides](/doc/#how-to-guides) section of the documentation.)
- [Copying and Pasting Text Between Domains](/doc/copy-paste/)
- [Copying and Moving Files Between Domains](/doc/copying-files/)
- [Copying from (and to) dom0](/doc/copy-from-dom0/)
- [Copying and Pasting Text Between Domains](/doc/how-to-copy-and-paste-text/)
- [Copying and Moving Files Between Domains](/doc/how-to-copy-and-move-files/)
- [Copying from (and to) dom0](/doc/how-to-copy-from-dom0/)
- [Fullscreen Mode](/doc/full-screen-mode/)
- [DisposableVMs](/doc/disposablevm/)
- [Device Handling](/doc/device-handling/) (block, USB, and PCI devices)
- [Device Handling](/doc/how-to-use-devices/) (block, USB, and PCI devices)
If you encounter any problems, please visit the [Help, Support, and Mailing Lists](/support/) page.

View file

@ -32,9 +32,9 @@ It is important to keep your Qubes OS system up-to-date to ensure you have the l
Fully updating your Qubes OS system means updating:
- [Dom0](/doc/software-update-dom0/)
- [TemplateVMs](/doc/software-update-domu/#updating-software-in-templatevms)
- [StandaloneVMs](/doc/software-update-domu/#standalonevms) (if you have any)
- [Dom0](/doc/how-to-install-software-in-dom0/)
- [TemplateVMs](/doc/how-to-install-software/#updating-software-in-templatevms)
- [StandaloneVMs](/doc/how-to-install-software/#standalonevms) (if you have any)
You can accomplish this using the **Qubes Update** tool.

View file

@ -13,7 +13,7 @@ title: How to Use Block Storage Devices
---
*This page is part of [device handling in qubes](/doc/device-handling/).*
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
If you don't know what a "block device" is, just think of it as a fancy way to say "something that stores data".
@ -27,7 +27,7 @@ Qubes OS supports the ability to attach a USB drive (or just its partitions) to
Attaching USB drives is integrated into the Devices Widget: ![device manager icon](/attachment/wiki/Devices/media-removable.png)
Simply insert your USB drive and click on the widget.
You will see multiple entries for your USB drive; typically, `sys-usb:sda`, `sys-usb:sda1`, and `sys-usb:2-1` for example.
Entries starting with a number (e.g. here `2-1`) are the [whole usb-device](/doc/usb-devices/).
Entries starting with a number (e.g. here `2-1`) are the [whole usb-device](/doc/how-to-use-usb-devices/).
Entries without a number (e.g. here `sda`) are the whole block-device.
Other entries are partitions of that block-device (e.r. here `sda1`).

View file

@ -14,7 +14,7 @@ title: How to Use Devices
This is an overview of device handling in Qubes OS.
For specific devices ([block](/doc/block-devices/), [USB](/doc/usb-devices/) and [PCI](/doc/how-to-use-pci-devices/) devices), please visit their respective pages.
For specific devices ([block](/doc/how-to-use-block-storage-devices/), [USB](/doc/how-to-use-usb-devices/) and [PCI](/doc/how-to-use-pci-devices/) devices), please visit their respective pages.
**Important security warning:** Device handling comes with many security implications.
Please make sure you carefully read and understand the **[security considerations](/doc/device-handling-security/)**.

View file

@ -19,7 +19,7 @@ Currently, the only options for reading and recording optical discs (e.g., CDs,
3. Use a SATA optical drive attached to dom0.
(**Caution:** This option is [potentially dangerous](https://github.com/Qubes-Community/Contents/blob/master/docs/security/security-guidelines.md#dom0-precautions).)
To access an optical disc via USB follow the [typical procedure for attaching a USB device](/doc/usb-devices/#with-the-command-line-tool), then check with the **Qubes Devices** widget to see what device in the target qube the USB optical drive was attached to.
To access an optical disc via USB follow the [typical procedure for attaching a USB device](/doc/how-to-use-usb-devices/#with-the-command-line-tool), then check with the **Qubes Devices** widget to see what device in the target qube the USB optical drive was attached to.
Typically this would be `sr0`.
For example, if `sys-usb` has device `3-2` attached to the `work` qube's `sr0`, you would mount it with `mount /dev/sr0 /mnt/removable`.
You could also write to a disc with `wodim -v dev=/dev/sr0 -eject /home/user/Qubes.iso`.

View file

@ -13,7 +13,7 @@ title: How to Use PCI Devices
---
*This page is part of [device handling in qubes](/doc/device-handling/).*
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
**Warning:** Only dom0 exposes PCI devices.
Some of them are strictly required in dom0 (e.g., the host bridge).
@ -23,7 +23,7 @@ Please make sure you carefully read and understand the **[security consideration
## Introduction
Unlike other devices ([USB](/doc/usb-devices/), [block](/doc/block-devices/), mic), PCI devices need to be attached on VM-bootup.
Unlike other devices ([USB](/doc/how-to-use-usb-devices/), [block](/doc/how-to-use-block-storage-devices/), mic), PCI devices need to be attached on VM-bootup.
Similar to how you can't attach a new sound-card after your computer booted (and expect it to work properly), attaching PCI devices to already booted VMs isn't supported.
The Qubes installer attaches all network class controllers to `sys-net` and all USB controllers to `sys-usb` by default, if you chose to create the network and USB qube during install.
@ -59,7 +59,7 @@ There you can attach PCI-devices to a qube.
## `qvm-pci` Usage
The `qvm-pci` tool allows PCI attachment and detachment.
It's a shortcut for [`qvm-device pci`](/doc/device-handling/#general-qubes-device-widget-behavior-and-handling).
It's a shortcut for [`qvm-device pci`](/doc/how-to-use-devices/#general-qubes-device-widget-behavior-and-handling).
To figure out what device to attach, first list the available PCI devices by running (as user) in dom0:

View file

@ -10,15 +10,15 @@ title: How to Use USB Devices
---
*This page is part of [device handling in qubes](/doc/device-handling/).*
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
If you are looking to handle USB *storage* devices (thumbdrives or USB-drives), please have a look at the [block device](/doc/block-devices/) page.
If you are looking to handle USB *storage* devices (thumbdrives or USB-drives), please have a look at the [block device](/doc/how-to-use-block-storage-devices/) page.
**Note:** Attaching USB devices to VMs requires a [USB qube](/doc/usb-qubes/).
**Important security warning:** USB passthrough comes with many security implications.
Please make sure you carefully read and understand the **[security considerations](/doc/device-handling-security/#usb-security)**.
Whenever possible, attach a [block device](/doc/block-devices/) instead.
Whenever possible, attach a [block device](/doc/how-to-use-block-storage-devices/) instead.
Examples of valid cases for USB-passthrough: