mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-06 05:34:27 -04:00
Removing whitespace at the end of some lines
This commit is contained in:
parent
332d76af24
commit
7dd4180626
2 changed files with 9 additions and 9 deletions
|
@ -9,7 +9,7 @@ Qubes OS is a free and open-source, security-oriented operating system for
|
||||||
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
|
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
|
||||||
|
|
||||||
These qubes, which are implemented as :ref:`virtual machines (VMs)<user/reference/glossary:vm>`, have specific:
|
These qubes, which are implemented as :ref:`virtual machines (VMs)<user/reference/glossary:vm>`, have specific:
|
||||||
|
|
||||||
- **Purposes:** with a predefined set of one or many isolated
|
- **Purposes:** with a predefined set of one or many isolated
|
||||||
applications, for personal or professional projects, to manage the
|
applications, for personal or professional projects, to manage the
|
||||||
:doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other
|
:doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other
|
||||||
|
@ -19,7 +19,7 @@ These qubes, which are implemented as :ref:`virtual machines (VMs)<user/referenc
|
||||||
:doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems,
|
:doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems,
|
||||||
such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and
|
such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and
|
||||||
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__.
|
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__.
|
||||||
|
|
||||||
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with
|
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with
|
||||||
:doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
|
:doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ Features
|
||||||
- **Multiple operating systems** Use multiple operating systems at the same time, including
|
- **Multiple operating systems** Use multiple operating systems at the same time, including
|
||||||
:doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and
|
:doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and
|
||||||
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__
|
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__
|
||||||
|
|
||||||
- **Disposables** Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down.
|
- **Disposables** Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down.
|
||||||
|
|
||||||
- **Whonix integration** Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__.
|
- **Whonix integration** Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__.
|
||||||
|
@ -127,7 +127,7 @@ plug in devices, and install software free from worry. It's a place where
|
||||||
**you** have control over your software, not the other way around.
|
**you** have control over your software, not the other way around.
|
||||||
(See some :doc:`examples of how different types of users organize their qubes </user/how-to-guides/how-to-organize-your-qubes>`.)
|
(See some :doc:`examples of how different types of users organize their qubes </user/how-to-guides/how-to-organize-your-qubes>`.)
|
||||||
|
|
||||||
Qubes is also powerful. Organizations like the `Freedom of the Press Foundation <https://securedrop.org/news/piloting-securedrop-workstation-qubes-os>`__,
|
Qubes is also powerful. Organizations like the `Freedom of the Press Foundation <https://securedrop.org/news/piloting-securedrop-workstation-qubes-os>`__,
|
||||||
`Mullvad <https://twitter.com/mullvadnet/status/631010362083643392>`__,
|
`Mullvad <https://twitter.com/mullvadnet/status/631010362083643392>`__,
|
||||||
and `Let's Encrypt <https://twitter.com/letsencrypt/status/1239934557710737410>`__
|
and `Let's Encrypt <https://twitter.com/letsencrypt/status/1239934557710737410>`__
|
||||||
rely on Qubes as they build and maintain critical privacy and
|
rely on Qubes as they build and maintain critical privacy and
|
||||||
|
@ -150,7 +150,7 @@ Qubes OS at a glance
|
||||||
|
|
||||||
- :doc:`Video tours</introduction/video-tours/>`: want to see Qubes OS in action? Sit back and watch one of the guided tour!
|
- :doc:`Video tours</introduction/video-tours/>`: want to see Qubes OS in action? Sit back and watch one of the guided tour!
|
||||||
- :doc:`Screenshots </introduction/screenshots/>`: see what using Qubes actually looks like with various applications running in Qubes.
|
- :doc:`Screenshots </introduction/screenshots/>`: see what using Qubes actually looks like with various applications running in Qubes.
|
||||||
- :doc:`Getting started </introduction/getting-started>`: ready to get started with Qubes? Find all you need to know after installing.
|
- :doc:`Getting started </introduction/getting-started>`: ready to get started with Qubes? Find all you need to know after installing.
|
||||||
|
|
||||||
More information
|
More information
|
||||||
----------------
|
----------------
|
||||||
|
|
|
@ -27,7 +27,7 @@ General Qubes Device Widget Behavior And Handling
|
||||||
:alt:
|
:alt:
|
||||||
:align: center
|
:align: center
|
||||||
|
|
||||||
Qubes Devices Widget tray icon
|
Qubes Devices Widget tray icon
|
||||||
|
|
||||||
When clicking on the tray icon, several device-classes separated by lines are displayed as tooltip. Block devices are displayed on top, microphones one below and USB-devices at the bottom.
|
When clicking on the tray icon, several device-classes separated by lines are displayed as tooltip. Block devices are displayed on top, microphones one below and USB-devices at the bottom.
|
||||||
|
|
||||||
|
@ -58,7 +58,7 @@ Device Classes
|
||||||
|
|
||||||
.. program:: qvm-device
|
.. program:: qvm-device
|
||||||
|
|
||||||
``qvm-device`` expects :option:`DEVICE_CLASS` as first argument.
|
``qvm-device`` expects :option:`DEVICE_CLASS` as first argument.
|
||||||
|
|
||||||
.. option:: DEVICE_CLASS
|
.. option:: DEVICE_CLASS
|
||||||
|
|
||||||
|
@ -130,7 +130,7 @@ The :option:`list` action lists known devices in the system. :option:`list` acce
|
||||||
equivalent to specifying every VM name after :option:`qvm-device list`. No VM-name implies :option:`--all`.
|
equivalent to specifying every VM name after :option:`qvm-device list`. No VM-name implies :option:`--all`.
|
||||||
|
|
||||||
.. option:: --exclude
|
.. option:: --exclude
|
||||||
|
|
||||||
exclude VMs from :option:`--all`. Requires :option:`--all`.
|
exclude VMs from :option:`--all`. Requires :option:`--all`.
|
||||||
|
|
||||||
**SYNOPSIS**::
|
**SYNOPSIS**::
|
||||||
|
@ -152,7 +152,7 @@ The :option:`qvm-device attach` action assigns an exposed device to a VM. This m
|
||||||
|
|
||||||
:option:`qvm-device attach` accepts two options:
|
:option:`qvm-device attach` accepts two options:
|
||||||
|
|
||||||
.. option:: --persistent
|
.. option:: --persistent
|
||||||
|
|
||||||
attach device on :option:`targetVM`-boot. If the device is unavailable (physically missing or ``sourceVM`` not started), booting the :option:`targetVM` fails.
|
attach device on :option:`targetVM`-boot. If the device is unavailable (physically missing or ``sourceVM`` not started), booting the :option:`targetVM` fails.
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue