diff --git a/introduction/intro.rst b/introduction/intro.rst index 7f90865d..1e5d9260 100644 --- a/introduction/intro.rst +++ b/introduction/intro.rst @@ -9,7 +9,7 @@ Qubes OS is a free and open-source, security-oriented operating system for single-user desktop computing. Qubes OS `leverages Xen-based virtualization `__ to allow for the creation and management of isolated compartments called :ref:`qubes `. These qubes, which are implemented as :ref:`virtual machines (VMs)`, have specific: - + - **Purposes:** with a predefined set of one or many isolated applications, for personal or professional projects, to manage the :doc:`network stack `, :doc:`the firewall `, or to fulfill other @@ -19,7 +19,7 @@ These qubes, which are implemented as :ref:`virtual machines (VMs)` virtual machines based on popular operating systems, such as :doc:`Fedora `, :doc:`Debian `, and `Windows `__. - + - **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with :doc:`unforgeable colored window borders ` so that different security levels are easily identifiable. @@ -43,7 +43,7 @@ Features - **Multiple operating systems** Use multiple operating systems at the same time, including :doc:`Fedora `, :doc:`Debian `, and `Windows `__ - + - **Disposables** Create :doc:`disposables ` on the fly that self-destruct when shut down. - **Whonix integration** Run `Tor `__ securely system-wide using `Whonix with Qubes `__. @@ -127,7 +127,7 @@ plug in devices, and install software free from worry. It's a place where **you** have control over your software, not the other way around. (See some :doc:`examples of how different types of users organize their qubes `.) -Qubes is also powerful. Organizations like the `Freedom of the Press Foundation `__, +Qubes is also powerful. Organizations like the `Freedom of the Press Foundation `__, `Mullvad `__, and `Let's Encrypt `__ rely on Qubes as they build and maintain critical privacy and @@ -150,7 +150,7 @@ Qubes OS at a glance - :doc:`Video tours`: want to see Qubes OS in action? Sit back and watch one of the guided tour! - :doc:`Screenshots `: see what using Qubes actually looks like with various applications running in Qubes. -- :doc:`Getting started `: ready to get started with Qubes? Find all you need to know after installing. +- :doc:`Getting started `: ready to get started with Qubes? Find all you need to know after installing. More information ---------------- diff --git a/user/how-to-guides/how-to-use-devices.rst b/user/how-to-guides/how-to-use-devices.rst index e93225c6..f865b4cf 100644 --- a/user/how-to-guides/how-to-use-devices.rst +++ b/user/how-to-guides/how-to-use-devices.rst @@ -27,7 +27,7 @@ General Qubes Device Widget Behavior And Handling :alt: :align: center - Qubes Devices Widget tray icon + Qubes Devices Widget tray icon When clicking on the tray icon, several device-classes separated by lines are displayed as tooltip. Block devices are displayed on top, microphones one below and USB-devices at the bottom. @@ -58,7 +58,7 @@ Device Classes .. program:: qvm-device -``qvm-device`` expects :option:`DEVICE_CLASS` as first argument. +``qvm-device`` expects :option:`DEVICE_CLASS` as first argument. .. option:: DEVICE_CLASS @@ -130,7 +130,7 @@ The :option:`list` action lists known devices in the system. :option:`list` acce equivalent to specifying every VM name after :option:`qvm-device list`. No VM-name implies :option:`--all`. .. option:: --exclude - + exclude VMs from :option:`--all`. Requires :option:`--all`. **SYNOPSIS**:: @@ -152,7 +152,7 @@ The :option:`qvm-device attach` action assigns an exposed device to a VM. This m :option:`qvm-device attach` accepts two options: -.. option:: --persistent +.. option:: --persistent attach device on :option:`targetVM`-boot. If the device is unavailable (physically missing or ``sourceVM`` not started), booting the :option:`targetVM` fails.