Fix capitalization; update terms (QubesOS/qubes-issues#6769)

Thank you to @unman for the initial sentence case pass.
This commit is contained in:
Andrew David Wong 2021-07-09 05:10:44 -07:00
parent ad2c60d91d
commit a18174dc5e
No known key found for this signature in database
GPG Key ID: 8CE137352A019A17
93 changed files with 93 additions and 93 deletions

View File

@ -9,7 +9,7 @@ redirect_from:
- /doc/QubesR3Building/
- /wiki/QubesR3Building/
ref: 63
title: Qubes iso building
title: Qubes ISO building
---
Build Environment

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/mount-lvm-image/
ref: 46
title: How to mount lvm images
title: How to mount LVM images
---
You want to read your LVM image (e.g., there is a problem where you can't start any VMs except dom0).

View File

@ -8,7 +8,7 @@ redirect_from:
- /doc/SystemDoc/VMInterface/
- /wiki/SystemDoc/VMInterface/
ref: 47
title: Vm configuration interface
title: Qube configuration interface
---
Qubes VM have some settings set by dom0 based on VM settings. There are multiple configuration channels, which includes:

View File

@ -2,7 +2,7 @@
lang: en
layout: doc
permalink: /doc/continuous-integration/
title: Continuous integration (ci)
title: Continuous integration (CI)
---
This page explains the [continuous integration

View File

@ -5,7 +5,7 @@ permalink: /gsoc/
redirect_from:
- /GSoC/
ref: 33
title: Google summer of code
title: Google Summer of Code (GSoC)
---
## Information for Students

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /gsod/
ref: 242
title: Google season of docs
title: Google Season of Docs (GSoD)
---
Thank you for your interest in participating in the [2021 Google Season of Docs](https://developers.google.com/season-of-docs/) program with the [Qubes OS team](/team/). You can read more about the Google Season of Docs in the official [guides](https://developers.google.com/season-of-docs/docs/) and [FAQ](https://developers.google.com/season-of-docs/docs/faq).

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/usability-ux/
ref: 31
title: Usability & ux
title: Usability & UX
---
Software that is too complicated to use, is often unused. Because we want as many people as possible to benefit from its unique security properties, the usability and user experience of Qubes OS is an utmost priority!

View File

@ -5,7 +5,7 @@ permalink: /doc/releases/1.0/release-notes/
redirect_from:
- /en/doc/releases/1.0/release-notes/
ref: 18
title: Qubes r1.0 release notes
title: Qubes R1.0 release notes
---
Detailed release notes in [this blog post](https://blog.invisiblethings.org/2012/09/03/introducing-qubes-10.html).

View File

@ -5,7 +5,7 @@ permalink: /doc/releases/2.0/release-notes/
redirect_from:
- /en/doc/releases/2.0/release-notes/
ref: 25
title: Qubes r2.0 release notes
title: Qubes R2.0 release notes
---
Detailed release notes in [this blog post](https://blog.invisiblethings.org/2014/09/26/announcing-qubes-os-release-2.html)

View File

@ -5,7 +5,7 @@ permalink: /doc/releases/3.0/release-notes/
redirect_from:
- /en/doc/releases/3.0/release-notes/
ref: 19
title: Qubes r3.0 release notes
title: Qubes R3.0 release notes
---
### Qubes R3.0 Release Notes

View File

@ -5,7 +5,7 @@ permalink: /doc/releases/3.0/schedule/
redirect_from:
- /en/doc/releases/3.0/schedule/
ref: 20
title: Qubes r3.0 release schedule
title: Qubes R3.0 release schedule
---
| Date | Stage |

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/releases/3.1/release-notes/
ref: 16
title: Qubes r3.1 release notes
title: Qubes R3.1 release notes
---
## New features since 3.0

View File

@ -5,7 +5,7 @@ permalink: /doc/releases/3.1/schedule/
redirect_from:
- /en/doc/releases/3.1/schedule/
ref: 17
title: Qubes r3.1 release schedule
title: Qubes R3.1 release schedule
---
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/releases/3.2/release-notes/
ref: 21
title: Qubes r3.2 release notes
title: Qubes R3.2 release notes
---
## New features since 3.1

View File

@ -5,7 +5,7 @@ permalink: /doc/releases/3.2/schedule/
redirect_from:
- /en/doc/releases/3.2/schedule/
ref: 22
title: Qubes r3.2 release schedule
title: Qubes R3.2 release schedule
---
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/releases/4.0/release-notes/
ref: 23
title: Qubes r4.0 release notes
title: Qubes R4.0 release notes
---
New features since 3.2

View File

@ -5,7 +5,7 @@ permalink: /doc/releases/4.0/schedule/
redirect_from:
- /en/doc/releases/4.0/schedule/
ref: 24
title: Qubes r4.0 release schedule
title: Qubes R4.0 release schedule
---
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View File

@ -3,7 +3,7 @@ lang: en
layout: fullscreen
permalink: /doc/admin-api/table/
ref: 249
title: Admin api table
title: Admin API table
---
This page displays the fullscreen table from [Admin API](/doc/admin-api/).

View File

@ -9,7 +9,7 @@ redirect_from:
- /doc/mgmt-architecture/
- /doc/admin-api-architecture/
ref: 36
title: Admin api
title: Admin API
---
_You may also be interested in the article

View File

@ -8,7 +8,7 @@ redirect_from:
- /doc/DVMimpl/
- /wiki/DVMimpl/
ref: 34
title: Disposablevm implementation
title: Disposable implementation
---
**Note: The content below applies to Qubes R3.2.**

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/Qfilecopy/
- /wiki/Qfilecopy/
ref: 35
title: Inter-vm file copying (qfilecopy)
title: Inter-qube file copying (qfilecopy)
---
There are two cases when we need a mechanism to copy files between VMs:

View File

@ -8,7 +8,7 @@ redirect_from:
- /doc/Qrexec3Implementation/
- /wiki/Qrexec3Implementation/
ref: 39
title: 'qrexec: qubes rpc internals'
title: 'Qrexec: Qubes RPC internals'
---
(*This page details the current implementation of qrexec (qrexec3).

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/qrexec-socket-services/
ref: 42
title: 'qrexec: socket-based services'
title: 'Qrexec: socket-based services'
---
*This page describes how to implement and use new socket-backed services for qrexec. See [qrexec](/doc/qrexec/) for general overview of the qrexec framework.*

View File

@ -11,7 +11,7 @@ redirect_from:
- /doc/Qrexec/
- /wiki/Qrexec/
ref: 37
title: 'qrexec: secure communication across domains'
title: 'Qrexec: secure communication across domains'
---
(*This page is about qrexec v3. For qrexec v2, see [here](/doc/qrexec2/).*)

View File

@ -8,7 +8,7 @@ redirect_from:
- /doc/GUIdocs/
- /wiki/GUIdocs/
ref: 61
title: Gui virtualization
title: GUI virtualization
---
qubes_gui and qubes_guid processes

View File

@ -8,5 +8,5 @@ redirect_from:
- /wiki/BuildingArchlinuxTemplate/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/building/building-archlinux-template.md
ref: 116
title: Building archlinux template
title: Building Arch Linux template
---

View File

@ -8,5 +8,5 @@ redirect_from:
- /wiki/BuildingNonFedoraTemplate/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/building/building-non-fedora-template.md
ref: 117
title: Building non-fedora template
title: Building non-Fedora template
---

View File

@ -6,5 +6,5 @@ redirect_from:
- /en/doc/building-whonix-template/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/building/building-whonix-template.md
ref: 115
title: Building whonix templates
title: Building Whonix templates
---

View File

@ -8,5 +8,5 @@ redirect_from:
- /wiki/DiskTRIM/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/disk-trim.md
ref: 104
title: Disk trim
title: Disk TRIM
---

View File

@ -8,5 +8,5 @@ redirect_from:
- /wiki/InstallNvidiaDriver/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md
ref: 96
title: How to install an nvidia driver
title: How to install an Nvidia driver
---

View File

@ -8,5 +8,5 @@ redirect_from:
- /wiki/Multimedia/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/multimedia.md
ref: 105
title: How to make a multimedia templatevm
title: How to make a multimedia template
---

View File

@ -9,5 +9,5 @@ redirect_from:
- /wiki/VPN/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md
ref: 102
title: Vpn
title: VPN
---

View File

@ -8,5 +8,5 @@ redirect_from:
- /wiki/ZFS/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/zfs.md
ref: 111
title: Zfs
title: ZFS
---

View File

@ -5,5 +5,5 @@ redirect_from:
- /doc/dark-theme/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/customization/dark-theme.md
ref: 74
title: Dark theme in dom0 and domu
title: Dark theme
---

View File

@ -5,5 +5,5 @@ redirect_from:
- /doc/removing-templatevm-packages/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/customization/removing-templatevm-packages.md
ref: 75
title: Removing templatevm packages
title: Removing template packages
---

View File

@ -5,5 +5,5 @@ redirect_from:
- /doc/templates/centos/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/centos.md
ref: 81
title: Centos template
title: CentOS template
---

View File

@ -8,5 +8,5 @@ redirect_from:
- /wiki/LinuxHVMTips/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md
ref: 82
title: Linux hvm tips
title: Linux HVM tips
---

View File

@ -5,5 +5,5 @@ redirect_from:
- /doc/netbsd/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/netbsd.md
ref: 84
title: How to create a netbsd vm
title: How to create a NetBSD qube
---

View File

@ -6,5 +6,5 @@ redirect_from:
- /doc/blackarch/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/blackarch.md
ref: 88
title: How to create a blackarch vm
title: How to create a BlackArch qube
---

View File

@ -6,5 +6,5 @@ redirect_from:
- /doc/kali/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/kali.md
ref: 87
title: How to create a kali linux vm
title: How to create a Kali Linux qube
---

View File

@ -6,5 +6,5 @@ redirect_from:
- /doc/ptf/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/ptf.md
ref: 89
title: How to create penetration testers framework (ptf) vm
title: How to create penetration testers framework (PTF) qube
---

View File

@ -14,5 +14,5 @@ redirect_from:
- /wiki/WindowsTools/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-tools.md
ref: 86
title: Qubes windows tools
title: Qubes Windows tools
---

View File

@ -5,5 +5,5 @@ redirect_from:
- /doc/windows-vm/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-vm.md
ref: 85
title: Installing a windows vm
title: Installing a Windows qube
---

View File

@ -6,5 +6,5 @@ redirect_from:
- /doc/randomizing-your-mac-address/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md
ref: 67
title: Anonymizing your mac address
title: Anonymizing your MAC address
---

View File

@ -6,5 +6,5 @@ redirect_from:
- /doc/running-tails/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md
ref: 71
title: Running tails in qubes
title: Running Tails in qubes
---

View File

@ -10,5 +10,5 @@ redirect_from:
- /wiki/UserDoc/TorVM/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/torvm.md
ref: 68
title: Torvm
title: TorVM
---

View File

@ -5,5 +5,5 @@ redirect_from:
- /doc/split-bitcoin/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/security/split-bitcoin.md
ref: 77
title: Split bitcoin
title: Split Bitcoin
---

View File

@ -3,5 +3,5 @@ lang: en
layout: doc
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/macbook-troubleshooting.md
ref: 238
title: Apple macbook troubleshooting
title: Apple MacBook troubleshooting
---

View File

@ -8,5 +8,5 @@ redirect_from:
- /wiki/SonyVaioTinkering/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/sony-vaio-tinkering.md
ref: 93
title: Sony vaio tinkering
title: Sony Vaio tinkering
---

View File

@ -13,5 +13,5 @@ redirect_from:
- /wiki/Lenovo450Tinkering/
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/thinkpad-troubleshooting.md
ref: 95
title: Lenovo thinkpad troubleshooting
title: Lenovo ThinkPad troubleshooting
---

View File

@ -12,7 +12,7 @@ redirect_from:
- /doc/DevelFaq/
- /wiki/DevelFaq/
ref: 124
title: Frequently asked questions (faq)
title: Frequently asked questions (FAQ)
---
## General & Security

View File

@ -4,5 +4,5 @@ layout: doc
permalink: /security/pgp-keys/
redirect_to: https://keys.qubes-os.org/keys/
ref: 250
title: Pgp keys
title: PGP keys
---

View File

@ -6,7 +6,7 @@ redirect_from:
- /security/bulletins/checklist/
- /doc/security-bulletins/checklist/
ref: 215
title: Qubes security bulletin (qsb) checklist
title: Qubes security bulletin (QSB) checklist
---
## Preparation

View File

@ -8,5 +8,5 @@ redirect_from:
redirect_to:
- https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-template.txt
ref: 209
title: Qubes security bulletin (qsb) template
title: Qubes security bulletin (QSB) template
---

View File

@ -10,7 +10,7 @@ redirect_from:
- /wiki/SecurityBulletins/
- /trac/wiki/SecurityBulletins/
ref: 218
title: Qubes security bulletins (qsbs)
title: Qubes security bulletins (QSBs)
---
A **Qubes Security Bulletin (QSB)** is a security announcement issued by the

View File

@ -13,7 +13,7 @@ redirect_from:
- /wiki/SecurityPage/
- /trac/wiki/SecurityPage/
ref: 217
title: Qubes os project security center
title: Qubes OS project security center
---
This page provides a central hub for topics pertaining to the security of the

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /security/xsa/
ref: 214
title: Xen security advisory (xsa) tracker
title: Xen security advisory (XSA) tracker
---
This tracker shows whether Qubes OS is affected by any given [Xen Security

View File

@ -6,7 +6,7 @@ redirect_from:
- /doc/awesome/
- /en/doc/awesome/
ref: 179
title: Awesomewm (window manager)
title: AwesomeWM (window manager)
---
## Qubes-specific features

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/gui-configuration/
ref: 184
title: Gui configuration
title: GUI configuration
---
## Video RAM adjustment for high-resolution displays

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/UserDoc/i3/
- /wiki/UserDoc/i3/
ref: 183
title: I3 (window manager)
title: i3 (window manager)
---
i3 is part of the stable repository (as of Qubes R3.1) and can be installed by

View File

@ -5,7 +5,7 @@ permalink: /doc/kde/
redirect_from:
- /en/doc/kde/
ref: 176
title: Kde (desktop environment)
title: KDE (desktop environment)
---
Installation

View File

@ -6,7 +6,7 @@ redirect_from:
- /doc/managing-vm-kernel/
- /en/doc/managing-vm-kernel/
ref: 173
title: Managing vm kernels
title: Managing qube kernels
---
By default, VMs kernels are provided by dom0.

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/MountFromOtherOs/
- /wiki/MountFromOtherOs/
ref: 175
title: How to mount a qubes partition from another os
title: How to mount a Qubes partition from another OS
---
When a Qubes OS install is unbootable or booting it is otherwise undesirable, this process allows for the recovery of files stored within the system.

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/rpc-policy/
ref: 178
title: Rpc policies
title: RPC policies
---
This document explains the basics of RPC policies in Qubes.

View File

@ -11,7 +11,7 @@ redirect_from:
- /doc/HvmCreate/
- /wiki/HvmCreate/
ref: 130
title: Standalones and hvms
title: Standalones and HVMs
---
A [standalone](/doc/glossary/#standalone) is a type of qube that is created by

View File

@ -9,7 +9,7 @@ redirect_from:
- /wiki/USBVM/
- /doc/sys-usb/
ref: 181
title: Usb qubes
title: USB qubes
---
If during installation you enabled the creation of a USB-qube, your system should be setup already and none of the mentioned steps here should be necessary. (Unless you want to [remove your USB-qube](#removing-a-usb-qube).) If for any reason no USB-qube was created during installation, this guide will show you how to do so.

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/windows/
ref: 129
title: Windows vms
title: Windows qubes
---
Like any other unmodified OSes, Windows can be installed in Qubes as an [HVM](/doc/standalone-and-hvm/) domain.

View File

@ -8,7 +8,7 @@ redirect_from:
- /doc/UpgradeToR2rc1/
- /wiki/UpgradeToR2rc1/
ref: 156
title: Upgrading to r2
title: Upgrading to R2
---
Current Qubes R2 Beta 3 (R2B3) systems can be upgraded in-place to the latest R2 (R2) release by following the procedure below.

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/UpgradeToR2B1/
- /wiki/UpgradeToR2B1/
ref: 163
title: Upgrading to r2b1
title: Upgrading to R2B1
---
**Note: Qubes R2 Beta 1 is no longer supported! Please install or upgrade to a newer Qubes R2.**

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/UpgradeToR2B2/
- /wiki/UpgradeToR2B2/
ref: 160
title: Upgrading to r2b2
title: Upgrading to R2B2
---
Existing users of Qubes R1 (but not R1 betas!) can upgrade their systems to the latest R2 beta release by following the procedure below. As usual, it is advisable to backup the system before proceeding with the upgrade. While it is possible to upgrade the system **it is strongly recommended to reinstall it**. You will preserve all your data and settings thanks to [backup and restore tools](/doc/backup-restore/).

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/UpgradeToR2B3/
- /wiki/UpgradeToR2B3/
ref: 157
title: Upgrading to r2b3
title: Upgrading to R2B3
---
Current Qubes R2 Beta 2 (R2B2) systems can be upgraded in-place to the latest R2 Beta 3 (R2B3) release by following the procedure below. However, upgrading in-place is riskier than performing a clean installation, since there are more things which can go wrong. For this reason, **we strongly recommended that users perform a [clean installation](/doc/installation-guide/) of Qubes R2 Beta 3**.

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/UpgradeToR3.0/
- /doc/UpgradeToR3.0rc1/
ref: 159
title: Upgrading to r3.0
title: Upgrading to R3.0
---
**This instruction is highly experimental, the official way to upgrade from R2 is to backup the data and reinstall the system. Use at your own risk!**

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/UpgradeToR3.1/
- /doc/UpgradeToR3.1rc1/
ref: 155
title: Upgrading to r3.1
title: Upgrading to R3.1
---
**Before attempting either an in-place upgrade or a clean installation, we

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/UpgradeToR3.2/
- /doc/UpgradeToR3.2rc1/
ref: 161
title: Upgrading to r3.2
title: Upgrading to R3.2
---
**Before attempting either an in-place upgrade or a clean installation, we

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/UpgradeToR4.0/
- /doc/UpgradeToR4.0rc1/
ref: 162
title: Upgrading to r4.0
title: Upgrading to R4.0
---
**Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).**

View File

@ -9,7 +9,7 @@ redirect_from:
- /wiki/HCLR1/
- /wiki/HCL-R2B2/
ref: 146
title: Hardware compatibility list (hcl)
title: Hardware compatibility list (HCL)
---
The [HCL](/hcl) is a compilation of reports generated and submitted by users across various Qubes versions about their hardware's compatibility with Qubes.

View File

@ -9,7 +9,7 @@ redirect_from:
- /doc/AssigningDevices/
- /wiki/AssigningDevices/
ref: 197
title: How to use pci devices
title: How to use PCI devices
---
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*

View File

@ -6,7 +6,7 @@ redirect_from:
- /doc/usb-devices/
- /doc/usb/
ref: 195
title: How to use usb devices
title: How to use USB devices
---
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/AntiEvilMaid/
- /wiki/AntiEvilMaid/
ref: 164
title: Anti evil maid (aem)
title: Anti evil maid (AEM)
---
Background

View File

@ -13,7 +13,7 @@ redirect_from:
- /doc/UserDoc/OpenPGP/
- /wiki/UserDoc/OpenPGP/
ref: 168
title: Split gpg
title: Split GPG
---
Split GPG implements a concept similar to having a smart card with your private GPG keys, except that the role of the "smart card" is played by another Qubes app qube.

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/u2f-proxy/
ref: 167
title: U2f proxy
title: U2F proxy
---
The [Qubes U2F Proxy](https://github.com/QubesOS/qubes-app-u2f) is a secure proxy intended to make use of U2F two-factor authentication devices with web browsers without exposing the browser to the full USB stack, not unlike the [USB keyboard and mouse proxies](/doc/usb/) implemented in Qubes.

View File

@ -7,7 +7,7 @@ redirect_from:
- /doc/VMSudo/
- /wiki/VMSudo/
ref: 165
title: Passwordless root access in vms
title: Passwordless root access in qubes
---
Background (`/etc/sudoers.d/qubes` in VM):

View File

@ -7,7 +7,7 @@ redirect_from:
- /en/doc/yubi-key/
- /doc/YubiKey/
ref: 169
title: Yubikey
title: YubiKey
---
You can use a YubiKey to enhance Qubes user authentication, for example to mitigate risk of someone snooping the password.

View File

@ -10,7 +10,7 @@ redirect_from:
- /doc/DebianTemplateUpgrade8/
- /wiki/DebianTemplateUpgrade8/
ref: 133
title: How to upgrade a debian template in-place
title: How to upgrade a Debian template in-place
---
<div class="alert alert-danger" role="alert">

View File

@ -21,7 +21,7 @@ redirect_from:
- /wiki/FedoraTemplateUpgrade28/
- /doc/template/fedora/upgrade-29-to-30/
ref: 137
title: How to upgrade a fedora template in-place
title: How to upgrade a Fedora template in-place
---
<div class="alert alert-danger" role="alert">

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/gui-troubleshooting/
ref: 233
title: Gui troubleshooting
title: GUI troubleshooting
---
## Can't click on anything after connecting 4k external display

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/hvm-troubleshooting/
ref: 232
title: Hvm troubleshooting
title: HVM troubleshooting
---
## HVM pauses on boot, followed by kernel error

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/pci-troubleshooting/
ref: 230
title: Pci troubleshooting
title: PCI troubleshooting
---
## DMA errors

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/uefi-troubleshooting/
ref: 177
title: Uefi troubleshooting
title: UEFI troubleshooting
---
## Successfully installed in legacy mode, but had to change some kernel parameters

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/troubleshooting/updating-debian-and-whonix/
ref: 98
title: Updating debian and whonix
title: Updating Debian and Whonix
---
Despite Qubes shipping with [Debian Templates](/doc/templates/debian/), most of Qubes core components run on Fedora and thus our documentation has better coverage for Fedora. However, Qubes has been working closely with the [Whonix](https://whonix.org) project which is based on Debian.

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/usb-troubleshooting/
ref: 234
title: Usb troubleshooting
title: USB troubleshooting
---
## disp-sys-usb does not start

View File

@ -5,7 +5,7 @@ permalink: /doc/vm-troubleshooting/
redirect_from:
- /doc/remove-vm-manually/
ref: 223
title: Vm troubleshooting
title: Qube troubleshooting
---
## VM Kernel troubleshooting

View File

@ -3,7 +3,7 @@ lang: en
layout: doc
permalink: /doc/vpn-troubleshooting/
ref: 240
title: Vpn troubleshooting
title: VPN troubleshooting
---
## Tips