mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-06 05:34:27 -04:00
Removing whitespace at the end of some lines
This commit is contained in:
parent
332d76af24
commit
7dd4180626
2 changed files with 9 additions and 9 deletions
|
@ -9,7 +9,7 @@ Qubes OS is a free and open-source, security-oriented operating system for
|
|||
single-user desktop computing. Qubes OS `leverages Xen-based virtualization <https://wiki.xen.org/wiki/Xen_Project_Software_Overview>`__ to allow for the creation and management of isolated compartments called :ref:`qubes <user/reference/glossary:qube>`.
|
||||
|
||||
These qubes, which are implemented as :ref:`virtual machines (VMs)<user/reference/glossary:vm>`, have specific:
|
||||
|
||||
|
||||
- **Purposes:** with a predefined set of one or many isolated
|
||||
applications, for personal or professional projects, to manage the
|
||||
:doc:`network stack </developer/system/networking>`, :doc:`the firewall </user/security-in-qubes/firewall>`, or to fulfill other
|
||||
|
@ -19,7 +19,7 @@ These qubes, which are implemented as :ref:`virtual machines (VMs)<user/referenc
|
|||
:doc:`stripped-down </introduction/getting-started/>` virtual machines based on popular operating systems,
|
||||
such as :doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian>`, and
|
||||
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__.
|
||||
|
||||
|
||||
- **Levels of trust:** from complete to non-existent. All windows are displayed in a unified desktop environment with
|
||||
:doc:`unforgeable colored window borders </introduction/getting-started>` so that different security levels are easily identifiable.
|
||||
|
||||
|
@ -43,7 +43,7 @@ Features
|
|||
- **Multiple operating systems** Use multiple operating systems at the same time, including
|
||||
:doc:`Fedora </user/templates/fedora/fedora>`, :doc:`Debian </user/templates/debian/debian/>`, and
|
||||
`Windows <https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows.md>`__
|
||||
|
||||
|
||||
- **Disposables** Create :doc:`disposables </user/how-to-guides/how-to-use-disposables>` on the fly that self-destruct when shut down.
|
||||
|
||||
- **Whonix integration** Run `Tor <https://www.torproject.org/>`__ securely system-wide using `Whonix with Qubes <https://www.whonix.org/wiki/Qubes>`__.
|
||||
|
@ -127,7 +127,7 @@ plug in devices, and install software free from worry. It's a place where
|
|||
**you** have control over your software, not the other way around.
|
||||
(See some :doc:`examples of how different types of users organize their qubes </user/how-to-guides/how-to-organize-your-qubes>`.)
|
||||
|
||||
Qubes is also powerful. Organizations like the `Freedom of the Press Foundation <https://securedrop.org/news/piloting-securedrop-workstation-qubes-os>`__,
|
||||
Qubes is also powerful. Organizations like the `Freedom of the Press Foundation <https://securedrop.org/news/piloting-securedrop-workstation-qubes-os>`__,
|
||||
`Mullvad <https://twitter.com/mullvadnet/status/631010362083643392>`__,
|
||||
and `Let's Encrypt <https://twitter.com/letsencrypt/status/1239934557710737410>`__
|
||||
rely on Qubes as they build and maintain critical privacy and
|
||||
|
@ -150,7 +150,7 @@ Qubes OS at a glance
|
|||
|
||||
- :doc:`Video tours</introduction/video-tours/>`: want to see Qubes OS in action? Sit back and watch one of the guided tour!
|
||||
- :doc:`Screenshots </introduction/screenshots/>`: see what using Qubes actually looks like with various applications running in Qubes.
|
||||
- :doc:`Getting started </introduction/getting-started>`: ready to get started with Qubes? Find all you need to know after installing.
|
||||
- :doc:`Getting started </introduction/getting-started>`: ready to get started with Qubes? Find all you need to know after installing.
|
||||
|
||||
More information
|
||||
----------------
|
||||
|
|
|
@ -27,7 +27,7 @@ General Qubes Device Widget Behavior And Handling
|
|||
:alt:
|
||||
:align: center
|
||||
|
||||
Qubes Devices Widget tray icon
|
||||
Qubes Devices Widget tray icon
|
||||
|
||||
When clicking on the tray icon, several device-classes separated by lines are displayed as tooltip. Block devices are displayed on top, microphones one below and USB-devices at the bottom.
|
||||
|
||||
|
@ -58,7 +58,7 @@ Device Classes
|
|||
|
||||
.. program:: qvm-device
|
||||
|
||||
``qvm-device`` expects :option:`DEVICE_CLASS` as first argument.
|
||||
``qvm-device`` expects :option:`DEVICE_CLASS` as first argument.
|
||||
|
||||
.. option:: DEVICE_CLASS
|
||||
|
||||
|
@ -130,7 +130,7 @@ The :option:`list` action lists known devices in the system. :option:`list` acce
|
|||
equivalent to specifying every VM name after :option:`qvm-device list`. No VM-name implies :option:`--all`.
|
||||
|
||||
.. option:: --exclude
|
||||
|
||||
|
||||
exclude VMs from :option:`--all`. Requires :option:`--all`.
|
||||
|
||||
**SYNOPSIS**::
|
||||
|
@ -152,7 +152,7 @@ The :option:`qvm-device attach` action assigns an exposed device to a VM. This m
|
|||
|
||||
:option:`qvm-device attach` accepts two options:
|
||||
|
||||
.. option:: --persistent
|
||||
.. option:: --persistent
|
||||
|
||||
attach device on :option:`targetVM`-boot. If the device is unavailable (physically missing or ``sourceVM`` not started), booting the :option:`targetVM` fails.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue