Removing whitespace at the end of some lines

This commit is contained in:
parulin 2025-07-26 02:49:26 -04:00
parent 332d76af24
commit 7dd4180626
No known key found for this signature in database
GPG key ID: BC3830B42F4BF1F5
2 changed files with 9 additions and 9 deletions

View file

@ -9,7 +9,7 @@ Qubes OS is a free and open-source, security-oriented operating system for
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`. single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
These qubes, which are implemented as :ref:`virtual machines (VMs)<user/reference/glossary:vm>`, have specific: These qubes, which are implemented as :ref:`virtual machines (VMs)<user/reference/glossary:vm>`, have specific:
- **Purposes:** with a predefined set of one or many isolated - **Purposes:** with a predefined set of one or many isolated
applications, for personal or professional projects, to manage the applications, for personal or professional projects, to manage the
:doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other :doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other
@ -19,7 +19,7 @@ These qubes, which are implemented as :ref:`virtual machines (VMs)<user/referenc
:doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems, :doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems,
such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__. `Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__.
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with - **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with
:doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable. :doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
@ -43,7 +43,7 @@ Features
- **Multiple operating systems** Use multiple operating systems at the same time, including - **Multiple operating systems** Use multiple operating systems at the same time, including
:doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__ `Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__
- **Disposables** Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down. - **Disposables** Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down.
- **Whonix integration** Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__. - **Whonix integration** Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__.
@ -127,7 +127,7 @@ plug in devices, and install software free from worry. It's a place where
**you** have control over your software, not the other way around. **you** have control over your software, not the other way around.
(See some :doc:`examples of how different types of users organize their qubes </user/how-to-guides/how-to-organize-your-qubes>`.) (See some :doc:`examples of how different types of users organize their qubes </user/how-to-guides/how-to-organize-your-qubes>`.)
Qubes is also powerful. Organizations like the `Freedom of the Press Foundation <https://securedrop.org/news/piloting-securedrop-workstation-qubes-os>`__, Qubes is also powerful. Organizations like the `Freedom of the Press Foundation <https://securedrop.org/news/piloting-securedrop-workstation-qubes-os>`__,
`Mullvad <https://twitter.com/mullvadnet/status/631010362083643392>`__, `Mullvad <https://twitter.com/mullvadnet/status/631010362083643392>`__,
and `Let's Encrypt <https://twitter.com/letsencrypt/status/1239934557710737410>`__ and `Let's Encrypt <https://twitter.com/letsencrypt/status/1239934557710737410>`__
rely on Qubes as they build and maintain critical privacy and rely on Qubes as they build and maintain critical privacy and
@ -150,7 +150,7 @@ Qubes OS at a glance
- :doc:`Video tours</introduction/video-tours/>`: want to see Qubes OS in action? Sit back and watch one of the guided tour! - :doc:`Video tours</introduction/video-tours/>`: want to see Qubes OS in action? Sit back and watch one of the guided tour!
- :doc:`Screenshots </introduction/screenshots/>`: see what using Qubes actually looks like with various applications running in Qubes. - :doc:`Screenshots </introduction/screenshots/>`: see what using Qubes actually looks like with various applications running in Qubes.
- :doc:`Getting started </introduction/getting-started>`: ready to get started with Qubes? Find all you need to know after installing. - :doc:`Getting started </introduction/getting-started>`: ready to get started with Qubes? Find all you need to know after installing.
More information More information
---------------- ----------------

View file

@ -27,7 +27,7 @@ General Qubes Device Widget Behavior And Handling
:alt: :alt:
:align: center :align: center
Qubes Devices Widget tray icon Qubes Devices Widget tray icon
When clicking on the tray icon, several device-classes separated by lines are displayed as tooltip. Block devices are displayed on top, microphones one below and USB-devices at the bottom. When clicking on the tray icon, several device-classes separated by lines are displayed as tooltip. Block devices are displayed on top, microphones one below and USB-devices at the bottom.
@ -58,7 +58,7 @@ Device Classes
.. program:: qvm-device .. program:: qvm-device
``qvm-device`` expects :option:`DEVICE_CLASS` as first argument. ``qvm-device`` expects :option:`DEVICE_CLASS` as first argument.
.. option:: DEVICE_CLASS .. option:: DEVICE_CLASS
@ -130,7 +130,7 @@ The :option:`list` action lists known devices in the system. :option:`list` acce
equivalent to specifying every VM name after :option:`qvm-device list`. No VM-name implies :option:`--all`. equivalent to specifying every VM name after :option:`qvm-device list`. No VM-name implies :option:`--all`.
.. option:: --exclude .. option:: --exclude
exclude VMs from :option:`--all`. Requires :option:`--all`. exclude VMs from :option:`--all`. Requires :option:`--all`.
**SYNOPSIS**:: **SYNOPSIS**::
@ -152,7 +152,7 @@ The :option:`qvm-device attach` action assigns an exposed device to a VM. This m
:option:`qvm-device attach` accepts two options: :option:`qvm-device attach` accepts two options:
.. option:: --persistent .. option:: --persistent
attach device on :option:`targetVM`-boot. If the device is unavailable (physically missing or ``sourceVM`` not started), booting the :option:`targetVM` fails. attach device on :option:`targetVM`-boot. If the device is unavailable (physically missing or ``sourceVM`` not started), booting the :option:`targetVM` fails.