mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-26 06:26:18 -05:00
Fix capitalization; update terms (QubesOS/qubes-issues#6769)
Thank you to @unman for the initial sentence case pass.
This commit is contained in:
parent
ad2c60d91d
commit
a18174dc5e
@ -9,7 +9,7 @@ redirect_from:
|
||||
- /doc/QubesR3Building/
|
||||
- /wiki/QubesR3Building/
|
||||
ref: 63
|
||||
title: Qubes iso building
|
||||
title: Qubes ISO building
|
||||
---
|
||||
|
||||
Build Environment
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/mount-lvm-image/
|
||||
ref: 46
|
||||
title: How to mount lvm images
|
||||
title: How to mount LVM images
|
||||
---
|
||||
|
||||
You want to read your LVM image (e.g., there is a problem where you can't start any VMs except dom0).
|
||||
|
@ -8,7 +8,7 @@ redirect_from:
|
||||
- /doc/SystemDoc/VMInterface/
|
||||
- /wiki/SystemDoc/VMInterface/
|
||||
ref: 47
|
||||
title: Vm configuration interface
|
||||
title: Qube configuration interface
|
||||
---
|
||||
|
||||
Qubes VM have some settings set by dom0 based on VM settings. There are multiple configuration channels, which includes:
|
||||
|
@ -2,7 +2,7 @@
|
||||
lang: en
|
||||
layout: doc
|
||||
permalink: /doc/continuous-integration/
|
||||
title: Continuous integration (ci)
|
||||
title: Continuous integration (CI)
|
||||
---
|
||||
|
||||
This page explains the [continuous integration
|
||||
|
@ -5,7 +5,7 @@ permalink: /gsoc/
|
||||
redirect_from:
|
||||
- /GSoC/
|
||||
ref: 33
|
||||
title: Google summer of code
|
||||
title: Google Summer of Code (GSoC)
|
||||
---
|
||||
|
||||
## Information for Students
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /gsod/
|
||||
ref: 242
|
||||
title: Google season of docs
|
||||
title: Google Season of Docs (GSoD)
|
||||
---
|
||||
|
||||
Thank you for your interest in participating in the [2021 Google Season of Docs](https://developers.google.com/season-of-docs/) program with the [Qubes OS team](/team/). You can read more about the Google Season of Docs in the official [guides](https://developers.google.com/season-of-docs/docs/) and [FAQ](https://developers.google.com/season-of-docs/docs/faq).
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/usability-ux/
|
||||
ref: 31
|
||||
title: Usability & ux
|
||||
title: Usability & UX
|
||||
---
|
||||
|
||||
Software that is too complicated to use, is often unused. Because we want as many people as possible to benefit from its unique security properties, the usability and user experience of Qubes OS is an utmost priority!
|
||||
|
@ -5,7 +5,7 @@ permalink: /doc/releases/1.0/release-notes/
|
||||
redirect_from:
|
||||
- /en/doc/releases/1.0/release-notes/
|
||||
ref: 18
|
||||
title: Qubes r1.0 release notes
|
||||
title: Qubes R1.0 release notes
|
||||
---
|
||||
|
||||
Detailed release notes in [this blog post](https://blog.invisiblethings.org/2012/09/03/introducing-qubes-10.html).
|
||||
|
@ -5,7 +5,7 @@ permalink: /doc/releases/2.0/release-notes/
|
||||
redirect_from:
|
||||
- /en/doc/releases/2.0/release-notes/
|
||||
ref: 25
|
||||
title: Qubes r2.0 release notes
|
||||
title: Qubes R2.0 release notes
|
||||
---
|
||||
|
||||
Detailed release notes in [this blog post](https://blog.invisiblethings.org/2014/09/26/announcing-qubes-os-release-2.html)
|
||||
|
@ -5,7 +5,7 @@ permalink: /doc/releases/3.0/release-notes/
|
||||
redirect_from:
|
||||
- /en/doc/releases/3.0/release-notes/
|
||||
ref: 19
|
||||
title: Qubes r3.0 release notes
|
||||
title: Qubes R3.0 release notes
|
||||
---
|
||||
|
||||
### Qubes R3.0 Release Notes
|
||||
|
@ -5,7 +5,7 @@ permalink: /doc/releases/3.0/schedule/
|
||||
redirect_from:
|
||||
- /en/doc/releases/3.0/schedule/
|
||||
ref: 20
|
||||
title: Qubes r3.0 release schedule
|
||||
title: Qubes R3.0 release schedule
|
||||
---
|
||||
|
||||
| Date | Stage |
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/releases/3.1/release-notes/
|
||||
ref: 16
|
||||
title: Qubes r3.1 release notes
|
||||
title: Qubes R3.1 release notes
|
||||
---
|
||||
|
||||
## New features since 3.0
|
||||
|
@ -5,7 +5,7 @@ permalink: /doc/releases/3.1/schedule/
|
||||
redirect_from:
|
||||
- /en/doc/releases/3.1/schedule/
|
||||
ref: 17
|
||||
title: Qubes r3.1 release schedule
|
||||
title: Qubes R3.1 release schedule
|
||||
---
|
||||
|
||||
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/releases/3.2/release-notes/
|
||||
ref: 21
|
||||
title: Qubes r3.2 release notes
|
||||
title: Qubes R3.2 release notes
|
||||
---
|
||||
|
||||
## New features since 3.1
|
||||
|
@ -5,7 +5,7 @@ permalink: /doc/releases/3.2/schedule/
|
||||
redirect_from:
|
||||
- /en/doc/releases/3.2/schedule/
|
||||
ref: 22
|
||||
title: Qubes r3.2 release schedule
|
||||
title: Qubes R3.2 release schedule
|
||||
---
|
||||
|
||||
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/releases/4.0/release-notes/
|
||||
ref: 23
|
||||
title: Qubes r4.0 release notes
|
||||
title: Qubes R4.0 release notes
|
||||
---
|
||||
|
||||
New features since 3.2
|
||||
|
@ -5,7 +5,7 @@ permalink: /doc/releases/4.0/schedule/
|
||||
redirect_from:
|
||||
- /en/doc/releases/4.0/schedule/
|
||||
ref: 24
|
||||
title: Qubes r4.0 release schedule
|
||||
title: Qubes R4.0 release schedule
|
||||
---
|
||||
|
||||
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: fullscreen
|
||||
permalink: /doc/admin-api/table/
|
||||
ref: 249
|
||||
title: Admin api table
|
||||
title: Admin API table
|
||||
---
|
||||
|
||||
This page displays the fullscreen table from [Admin API](/doc/admin-api/).
|
||||
|
@ -9,7 +9,7 @@ redirect_from:
|
||||
- /doc/mgmt-architecture/
|
||||
- /doc/admin-api-architecture/
|
||||
ref: 36
|
||||
title: Admin api
|
||||
title: Admin API
|
||||
---
|
||||
|
||||
_You may also be interested in the article
|
||||
|
@ -8,7 +8,7 @@ redirect_from:
|
||||
- /doc/DVMimpl/
|
||||
- /wiki/DVMimpl/
|
||||
ref: 34
|
||||
title: Disposablevm implementation
|
||||
title: Disposable implementation
|
||||
---
|
||||
|
||||
**Note: The content below applies to Qubes R3.2.**
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/Qfilecopy/
|
||||
- /wiki/Qfilecopy/
|
||||
ref: 35
|
||||
title: Inter-vm file copying (qfilecopy)
|
||||
title: Inter-qube file copying (qfilecopy)
|
||||
---
|
||||
|
||||
There are two cases when we need a mechanism to copy files between VMs:
|
||||
|
@ -8,7 +8,7 @@ redirect_from:
|
||||
- /doc/Qrexec3Implementation/
|
||||
- /wiki/Qrexec3Implementation/
|
||||
ref: 39
|
||||
title: 'qrexec: qubes rpc internals'
|
||||
title: 'Qrexec: Qubes RPC internals'
|
||||
---
|
||||
|
||||
(*This page details the current implementation of qrexec (qrexec3).
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/qrexec-socket-services/
|
||||
ref: 42
|
||||
title: 'qrexec: socket-based services'
|
||||
title: 'Qrexec: socket-based services'
|
||||
---
|
||||
|
||||
*This page describes how to implement and use new socket-backed services for qrexec. See [qrexec](/doc/qrexec/) for general overview of the qrexec framework.*
|
||||
|
@ -11,7 +11,7 @@ redirect_from:
|
||||
- /doc/Qrexec/
|
||||
- /wiki/Qrexec/
|
||||
ref: 37
|
||||
title: 'qrexec: secure communication across domains'
|
||||
title: 'Qrexec: secure communication across domains'
|
||||
---
|
||||
|
||||
(*This page is about qrexec v3. For qrexec v2, see [here](/doc/qrexec2/).*)
|
||||
|
@ -8,7 +8,7 @@ redirect_from:
|
||||
- /doc/GUIdocs/
|
||||
- /wiki/GUIdocs/
|
||||
ref: 61
|
||||
title: Gui virtualization
|
||||
title: GUI virtualization
|
||||
---
|
||||
|
||||
qubes_gui and qubes_guid processes
|
||||
|
@ -8,5 +8,5 @@ redirect_from:
|
||||
- /wiki/BuildingArchlinuxTemplate/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/building/building-archlinux-template.md
|
||||
ref: 116
|
||||
title: Building archlinux template
|
||||
title: Building Arch Linux template
|
||||
---
|
||||
|
@ -8,5 +8,5 @@ redirect_from:
|
||||
- /wiki/BuildingNonFedoraTemplate/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/building/building-non-fedora-template.md
|
||||
ref: 117
|
||||
title: Building non-fedora template
|
||||
title: Building non-Fedora template
|
||||
---
|
||||
|
@ -6,5 +6,5 @@ redirect_from:
|
||||
- /en/doc/building-whonix-template/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/building/building-whonix-template.md
|
||||
ref: 115
|
||||
title: Building whonix templates
|
||||
title: Building Whonix templates
|
||||
---
|
||||
|
2
external/configuration-guides/disk-trim.md
vendored
2
external/configuration-guides/disk-trim.md
vendored
@ -8,5 +8,5 @@ redirect_from:
|
||||
- /wiki/DiskTRIM/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/disk-trim.md
|
||||
ref: 104
|
||||
title: Disk trim
|
||||
title: Disk TRIM
|
||||
---
|
||||
|
@ -8,5 +8,5 @@ redirect_from:
|
||||
- /wiki/InstallNvidiaDriver/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/install-nvidia-driver.md
|
||||
ref: 96
|
||||
title: How to install an nvidia driver
|
||||
title: How to install an Nvidia driver
|
||||
---
|
||||
|
2
external/configuration-guides/multimedia.md
vendored
2
external/configuration-guides/multimedia.md
vendored
@ -8,5 +8,5 @@ redirect_from:
|
||||
- /wiki/Multimedia/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/multimedia.md
|
||||
ref: 105
|
||||
title: How to make a multimedia templatevm
|
||||
title: How to make a multimedia template
|
||||
---
|
||||
|
2
external/configuration-guides/vpn.md
vendored
2
external/configuration-guides/vpn.md
vendored
@ -9,5 +9,5 @@ redirect_from:
|
||||
- /wiki/VPN/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md
|
||||
ref: 102
|
||||
title: Vpn
|
||||
title: VPN
|
||||
---
|
||||
|
2
external/configuration-guides/zfs.md
vendored
2
external/configuration-guides/zfs.md
vendored
@ -8,5 +8,5 @@ redirect_from:
|
||||
- /wiki/ZFS/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/zfs.md
|
||||
ref: 111
|
||||
title: Zfs
|
||||
title: ZFS
|
||||
---
|
||||
|
2
external/customization-guides/dark-theme.md
vendored
2
external/customization-guides/dark-theme.md
vendored
@ -5,5 +5,5 @@ redirect_from:
|
||||
- /doc/dark-theme/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/customization/dark-theme.md
|
||||
ref: 74
|
||||
title: Dark theme in dom0 and domu
|
||||
title: Dark theme
|
||||
---
|
||||
|
@ -5,5 +5,5 @@ redirect_from:
|
||||
- /doc/removing-templatevm-packages/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/customization/removing-templatevm-packages.md
|
||||
ref: 75
|
||||
title: Removing templatevm packages
|
||||
title: Removing template packages
|
||||
---
|
||||
|
2
external/os-guides/centos.md
vendored
2
external/os-guides/centos.md
vendored
@ -5,5 +5,5 @@ redirect_from:
|
||||
- /doc/templates/centos/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/centos.md
|
||||
ref: 81
|
||||
title: Centos template
|
||||
title: CentOS template
|
||||
---
|
||||
|
2
external/os-guides/linux-hvm-tips.md
vendored
2
external/os-guides/linux-hvm-tips.md
vendored
@ -8,5 +8,5 @@ redirect_from:
|
||||
- /wiki/LinuxHVMTips/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/linux-hvm-tips.md
|
||||
ref: 82
|
||||
title: Linux hvm tips
|
||||
title: Linux HVM tips
|
||||
---
|
||||
|
2
external/os-guides/netbsd.md
vendored
2
external/os-guides/netbsd.md
vendored
@ -5,5 +5,5 @@ redirect_from:
|
||||
- /doc/netbsd/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/netbsd.md
|
||||
ref: 84
|
||||
title: How to create a netbsd vm
|
||||
title: How to create a NetBSD qube
|
||||
---
|
||||
|
2
external/os-guides/pentesting/blackarch.md
vendored
2
external/os-guides/pentesting/blackarch.md
vendored
@ -6,5 +6,5 @@ redirect_from:
|
||||
- /doc/blackarch/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/blackarch.md
|
||||
ref: 88
|
||||
title: How to create a blackarch vm
|
||||
title: How to create a BlackArch qube
|
||||
---
|
||||
|
2
external/os-guides/pentesting/kali.md
vendored
2
external/os-guides/pentesting/kali.md
vendored
@ -6,5 +6,5 @@ redirect_from:
|
||||
- /doc/kali/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/kali.md
|
||||
ref: 87
|
||||
title: How to create a kali linux vm
|
||||
title: How to create a Kali Linux qube
|
||||
---
|
||||
|
2
external/os-guides/pentesting/ptf.md
vendored
2
external/os-guides/pentesting/ptf.md
vendored
@ -6,5 +6,5 @@ redirect_from:
|
||||
- /doc/ptf/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/pentesting/ptf.md
|
||||
ref: 89
|
||||
title: How to create penetration testers framework (ptf) vm
|
||||
title: How to create penetration testers framework (PTF) qube
|
||||
---
|
||||
|
2
external/os-guides/windows/windows-tools.md
vendored
2
external/os-guides/windows/windows-tools.md
vendored
@ -14,5 +14,5 @@ redirect_from:
|
||||
- /wiki/WindowsTools/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-tools.md
|
||||
ref: 86
|
||||
title: Qubes windows tools
|
||||
title: Qubes Windows tools
|
||||
---
|
||||
|
2
external/os-guides/windows/windows-vm.md
vendored
2
external/os-guides/windows/windows-vm.md
vendored
@ -5,5 +5,5 @@ redirect_from:
|
||||
- /doc/windows-vm/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/os/windows/windows-vm.md
|
||||
ref: 85
|
||||
title: Installing a windows vm
|
||||
title: Installing a Windows qube
|
||||
---
|
||||
|
@ -6,5 +6,5 @@ redirect_from:
|
||||
- /doc/randomizing-your-mac-address/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/anonymizing-your-mac-address.md
|
||||
ref: 67
|
||||
title: Anonymizing your mac address
|
||||
title: Anonymizing your MAC address
|
||||
---
|
||||
|
2
external/privacy-guides/tails.md
vendored
2
external/privacy-guides/tails.md
vendored
@ -6,5 +6,5 @@ redirect_from:
|
||||
- /doc/running-tails/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/tails.md
|
||||
ref: 71
|
||||
title: Running tails in qubes
|
||||
title: Running Tails in qubes
|
||||
---
|
||||
|
2
external/privacy-guides/torvm.md
vendored
2
external/privacy-guides/torvm.md
vendored
@ -10,5 +10,5 @@ redirect_from:
|
||||
- /wiki/UserDoc/TorVM/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/privacy/torvm.md
|
||||
ref: 68
|
||||
title: Torvm
|
||||
title: TorVM
|
||||
---
|
||||
|
2
external/security-guides/split-bitcoin.md
vendored
2
external/security-guides/split-bitcoin.md
vendored
@ -5,5 +5,5 @@ redirect_from:
|
||||
- /doc/split-bitcoin/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/security/split-bitcoin.md
|
||||
ref: 77
|
||||
title: Split bitcoin
|
||||
title: Split Bitcoin
|
||||
---
|
||||
|
@ -3,5 +3,5 @@ lang: en
|
||||
layout: doc
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/macbook-troubleshooting.md
|
||||
ref: 238
|
||||
title: Apple macbook troubleshooting
|
||||
title: Apple MacBook troubleshooting
|
||||
---
|
||||
|
@ -8,5 +8,5 @@ redirect_from:
|
||||
- /wiki/SonyVaioTinkering/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/sony-vaio-tinkering.md
|
||||
ref: 93
|
||||
title: Sony vaio tinkering
|
||||
title: Sony Vaio tinkering
|
||||
---
|
||||
|
@ -13,5 +13,5 @@ redirect_from:
|
||||
- /wiki/Lenovo450Tinkering/
|
||||
redirect_to: https://github.com/Qubes-Community/Contents/blob/master/docs/troubleshooting/thinkpad-troubleshooting.md
|
||||
ref: 95
|
||||
title: Lenovo thinkpad troubleshooting
|
||||
title: Lenovo ThinkPad troubleshooting
|
||||
---
|
||||
|
@ -12,7 +12,7 @@ redirect_from:
|
||||
- /doc/DevelFaq/
|
||||
- /wiki/DevelFaq/
|
||||
ref: 124
|
||||
title: Frequently asked questions (faq)
|
||||
title: Frequently asked questions (FAQ)
|
||||
---
|
||||
|
||||
## General & Security
|
||||
|
@ -4,5 +4,5 @@ layout: doc
|
||||
permalink: /security/pgp-keys/
|
||||
redirect_to: https://keys.qubes-os.org/keys/
|
||||
ref: 250
|
||||
title: Pgp keys
|
||||
title: PGP keys
|
||||
---
|
||||
|
@ -6,7 +6,7 @@ redirect_from:
|
||||
- /security/bulletins/checklist/
|
||||
- /doc/security-bulletins/checklist/
|
||||
ref: 215
|
||||
title: Qubes security bulletin (qsb) checklist
|
||||
title: Qubes security bulletin (QSB) checklist
|
||||
---
|
||||
|
||||
## Preparation
|
||||
|
@ -8,5 +8,5 @@ redirect_from:
|
||||
redirect_to:
|
||||
- https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-template.txt
|
||||
ref: 209
|
||||
title: Qubes security bulletin (qsb) template
|
||||
title: Qubes security bulletin (QSB) template
|
||||
---
|
||||
|
@ -10,7 +10,7 @@ redirect_from:
|
||||
- /wiki/SecurityBulletins/
|
||||
- /trac/wiki/SecurityBulletins/
|
||||
ref: 218
|
||||
title: Qubes security bulletins (qsbs)
|
||||
title: Qubes security bulletins (QSBs)
|
||||
---
|
||||
|
||||
A **Qubes Security Bulletin (QSB)** is a security announcement issued by the
|
||||
|
@ -13,7 +13,7 @@ redirect_from:
|
||||
- /wiki/SecurityPage/
|
||||
- /trac/wiki/SecurityPage/
|
||||
ref: 217
|
||||
title: Qubes os project security center
|
||||
title: Qubes OS project security center
|
||||
---
|
||||
|
||||
This page provides a central hub for topics pertaining to the security of the
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /security/xsa/
|
||||
ref: 214
|
||||
title: Xen security advisory (xsa) tracker
|
||||
title: Xen security advisory (XSA) tracker
|
||||
---
|
||||
|
||||
This tracker shows whether Qubes OS is affected by any given [Xen Security
|
||||
|
@ -6,7 +6,7 @@ redirect_from:
|
||||
- /doc/awesome/
|
||||
- /en/doc/awesome/
|
||||
ref: 179
|
||||
title: Awesomewm (window manager)
|
||||
title: AwesomeWM (window manager)
|
||||
---
|
||||
|
||||
## Qubes-specific features
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/gui-configuration/
|
||||
ref: 184
|
||||
title: Gui configuration
|
||||
title: GUI configuration
|
||||
---
|
||||
|
||||
## Video RAM adjustment for high-resolution displays
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/UserDoc/i3/
|
||||
- /wiki/UserDoc/i3/
|
||||
ref: 183
|
||||
title: I3 (window manager)
|
||||
title: i3 (window manager)
|
||||
---
|
||||
|
||||
i3 is part of the stable repository (as of Qubes R3.1) and can be installed by
|
||||
|
@ -5,7 +5,7 @@ permalink: /doc/kde/
|
||||
redirect_from:
|
||||
- /en/doc/kde/
|
||||
ref: 176
|
||||
title: Kde (desktop environment)
|
||||
title: KDE (desktop environment)
|
||||
---
|
||||
|
||||
Installation
|
||||
|
@ -6,7 +6,7 @@ redirect_from:
|
||||
- /doc/managing-vm-kernel/
|
||||
- /en/doc/managing-vm-kernel/
|
||||
ref: 173
|
||||
title: Managing vm kernels
|
||||
title: Managing qube kernels
|
||||
---
|
||||
|
||||
By default, VMs kernels are provided by dom0.
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/MountFromOtherOs/
|
||||
- /wiki/MountFromOtherOs/
|
||||
ref: 175
|
||||
title: How to mount a qubes partition from another os
|
||||
title: How to mount a Qubes partition from another OS
|
||||
---
|
||||
|
||||
When a Qubes OS install is unbootable or booting it is otherwise undesirable, this process allows for the recovery of files stored within the system.
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/rpc-policy/
|
||||
ref: 178
|
||||
title: Rpc policies
|
||||
title: RPC policies
|
||||
---
|
||||
|
||||
This document explains the basics of RPC policies in Qubes.
|
||||
|
@ -11,7 +11,7 @@ redirect_from:
|
||||
- /doc/HvmCreate/
|
||||
- /wiki/HvmCreate/
|
||||
ref: 130
|
||||
title: Standalones and hvms
|
||||
title: Standalones and HVMs
|
||||
---
|
||||
|
||||
A [standalone](/doc/glossary/#standalone) is a type of qube that is created by
|
||||
|
@ -9,7 +9,7 @@ redirect_from:
|
||||
- /wiki/USBVM/
|
||||
- /doc/sys-usb/
|
||||
ref: 181
|
||||
title: Usb qubes
|
||||
title: USB qubes
|
||||
---
|
||||
|
||||
If during installation you enabled the creation of a USB-qube, your system should be setup already and none of the mentioned steps here should be necessary. (Unless you want to [remove your USB-qube](#removing-a-usb-qube).) If for any reason no USB-qube was created during installation, this guide will show you how to do so.
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/windows/
|
||||
ref: 129
|
||||
title: Windows vms
|
||||
title: Windows qubes
|
||||
---
|
||||
|
||||
Like any other unmodified OSes, Windows can be installed in Qubes as an [HVM](/doc/standalone-and-hvm/) domain.
|
||||
|
@ -8,7 +8,7 @@ redirect_from:
|
||||
- /doc/UpgradeToR2rc1/
|
||||
- /wiki/UpgradeToR2rc1/
|
||||
ref: 156
|
||||
title: Upgrading to r2
|
||||
title: Upgrading to R2
|
||||
---
|
||||
|
||||
Current Qubes R2 Beta 3 (R2B3) systems can be upgraded in-place to the latest R2 (R2) release by following the procedure below.
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/UpgradeToR2B1/
|
||||
- /wiki/UpgradeToR2B1/
|
||||
ref: 163
|
||||
title: Upgrading to r2b1
|
||||
title: Upgrading to R2B1
|
||||
---
|
||||
|
||||
**Note: Qubes R2 Beta 1 is no longer supported! Please install or upgrade to a newer Qubes R2.**
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/UpgradeToR2B2/
|
||||
- /wiki/UpgradeToR2B2/
|
||||
ref: 160
|
||||
title: Upgrading to r2b2
|
||||
title: Upgrading to R2B2
|
||||
---
|
||||
|
||||
Existing users of Qubes R1 (but not R1 betas!) can upgrade their systems to the latest R2 beta release by following the procedure below. As usual, it is advisable to backup the system before proceeding with the upgrade. While it is possible to upgrade the system **it is strongly recommended to reinstall it**. You will preserve all your data and settings thanks to [backup and restore tools](/doc/backup-restore/).
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/UpgradeToR2B3/
|
||||
- /wiki/UpgradeToR2B3/
|
||||
ref: 157
|
||||
title: Upgrading to r2b3
|
||||
title: Upgrading to R2B3
|
||||
---
|
||||
|
||||
Current Qubes R2 Beta 2 (R2B2) systems can be upgraded in-place to the latest R2 Beta 3 (R2B3) release by following the procedure below. However, upgrading in-place is riskier than performing a clean installation, since there are more things which can go wrong. For this reason, **we strongly recommended that users perform a [clean installation](/doc/installation-guide/) of Qubes R2 Beta 3**.
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/UpgradeToR3.0/
|
||||
- /doc/UpgradeToR3.0rc1/
|
||||
ref: 159
|
||||
title: Upgrading to r3.0
|
||||
title: Upgrading to R3.0
|
||||
---
|
||||
|
||||
**This instruction is highly experimental, the official way to upgrade from R2 is to backup the data and reinstall the system. Use at your own risk!**
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/UpgradeToR3.1/
|
||||
- /doc/UpgradeToR3.1rc1/
|
||||
ref: 155
|
||||
title: Upgrading to r3.1
|
||||
title: Upgrading to R3.1
|
||||
---
|
||||
|
||||
**Before attempting either an in-place upgrade or a clean installation, we
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/UpgradeToR3.2/
|
||||
- /doc/UpgradeToR3.2rc1/
|
||||
ref: 161
|
||||
title: Upgrading to r3.2
|
||||
title: Upgrading to R3.2
|
||||
---
|
||||
|
||||
**Before attempting either an in-place upgrade or a clean installation, we
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/UpgradeToR4.0/
|
||||
- /doc/UpgradeToR4.0rc1/
|
||||
ref: 162
|
||||
title: Upgrading to r4.0
|
||||
title: Upgrading to R4.0
|
||||
---
|
||||
|
||||
**Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).**
|
||||
|
@ -9,7 +9,7 @@ redirect_from:
|
||||
- /wiki/HCLR1/
|
||||
- /wiki/HCL-R2B2/
|
||||
ref: 146
|
||||
title: Hardware compatibility list (hcl)
|
||||
title: Hardware compatibility list (HCL)
|
||||
---
|
||||
|
||||
The [HCL](/hcl) is a compilation of reports generated and submitted by users across various Qubes versions about their hardware's compatibility with Qubes.
|
||||
|
@ -9,7 +9,7 @@ redirect_from:
|
||||
- /doc/AssigningDevices/
|
||||
- /wiki/AssigningDevices/
|
||||
ref: 197
|
||||
title: How to use pci devices
|
||||
title: How to use PCI devices
|
||||
---
|
||||
|
||||
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
|
||||
|
@ -6,7 +6,7 @@ redirect_from:
|
||||
- /doc/usb-devices/
|
||||
- /doc/usb/
|
||||
ref: 195
|
||||
title: How to use usb devices
|
||||
title: How to use USB devices
|
||||
---
|
||||
|
||||
*This page is part of [device handling in qubes](/doc/how-to-use-devices/).*
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/AntiEvilMaid/
|
||||
- /wiki/AntiEvilMaid/
|
||||
ref: 164
|
||||
title: Anti evil maid (aem)
|
||||
title: Anti evil maid (AEM)
|
||||
---
|
||||
|
||||
Background
|
||||
|
@ -13,7 +13,7 @@ redirect_from:
|
||||
- /doc/UserDoc/OpenPGP/
|
||||
- /wiki/UserDoc/OpenPGP/
|
||||
ref: 168
|
||||
title: Split gpg
|
||||
title: Split GPG
|
||||
---
|
||||
|
||||
Split GPG implements a concept similar to having a smart card with your private GPG keys, except that the role of the "smart card" is played by another Qubes app qube.
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/u2f-proxy/
|
||||
ref: 167
|
||||
title: U2f proxy
|
||||
title: U2F proxy
|
||||
---
|
||||
|
||||
The [Qubes U2F Proxy](https://github.com/QubesOS/qubes-app-u2f) is a secure proxy intended to make use of U2F two-factor authentication devices with web browsers without exposing the browser to the full USB stack, not unlike the [USB keyboard and mouse proxies](/doc/usb/) implemented in Qubes.
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /doc/VMSudo/
|
||||
- /wiki/VMSudo/
|
||||
ref: 165
|
||||
title: Passwordless root access in vms
|
||||
title: Passwordless root access in qubes
|
||||
---
|
||||
|
||||
Background (`/etc/sudoers.d/qubes` in VM):
|
||||
|
@ -7,7 +7,7 @@ redirect_from:
|
||||
- /en/doc/yubi-key/
|
||||
- /doc/YubiKey/
|
||||
ref: 169
|
||||
title: Yubikey
|
||||
title: YubiKey
|
||||
---
|
||||
|
||||
You can use a YubiKey to enhance Qubes user authentication, for example to mitigate risk of someone snooping the password.
|
||||
|
@ -10,7 +10,7 @@ redirect_from:
|
||||
- /doc/DebianTemplateUpgrade8/
|
||||
- /wiki/DebianTemplateUpgrade8/
|
||||
ref: 133
|
||||
title: How to upgrade a debian template in-place
|
||||
title: How to upgrade a Debian template in-place
|
||||
---
|
||||
|
||||
<div class="alert alert-danger" role="alert">
|
||||
|
@ -21,7 +21,7 @@ redirect_from:
|
||||
- /wiki/FedoraTemplateUpgrade28/
|
||||
- /doc/template/fedora/upgrade-29-to-30/
|
||||
ref: 137
|
||||
title: How to upgrade a fedora template in-place
|
||||
title: How to upgrade a Fedora template in-place
|
||||
---
|
||||
|
||||
<div class="alert alert-danger" role="alert">
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/gui-troubleshooting/
|
||||
ref: 233
|
||||
title: Gui troubleshooting
|
||||
title: GUI troubleshooting
|
||||
---
|
||||
|
||||
## Can't click on anything after connecting 4k external display
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/hvm-troubleshooting/
|
||||
ref: 232
|
||||
title: Hvm troubleshooting
|
||||
title: HVM troubleshooting
|
||||
---
|
||||
|
||||
## HVM pauses on boot, followed by kernel error
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/pci-troubleshooting/
|
||||
ref: 230
|
||||
title: Pci troubleshooting
|
||||
title: PCI troubleshooting
|
||||
---
|
||||
|
||||
## DMA errors
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/uefi-troubleshooting/
|
||||
ref: 177
|
||||
title: Uefi troubleshooting
|
||||
title: UEFI troubleshooting
|
||||
---
|
||||
|
||||
## Successfully installed in legacy mode, but had to change some kernel parameters
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/troubleshooting/updating-debian-and-whonix/
|
||||
ref: 98
|
||||
title: Updating debian and whonix
|
||||
title: Updating Debian and Whonix
|
||||
---
|
||||
|
||||
Despite Qubes shipping with [Debian Templates](/doc/templates/debian/), most of Qubes core components run on Fedora and thus our documentation has better coverage for Fedora. However, Qubes has been working closely with the [Whonix](https://whonix.org) project which is based on Debian.
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/usb-troubleshooting/
|
||||
ref: 234
|
||||
title: Usb troubleshooting
|
||||
title: USB troubleshooting
|
||||
---
|
||||
|
||||
## disp-sys-usb does not start
|
||||
|
@ -5,7 +5,7 @@ permalink: /doc/vm-troubleshooting/
|
||||
redirect_from:
|
||||
- /doc/remove-vm-manually/
|
||||
ref: 223
|
||||
title: Vm troubleshooting
|
||||
title: Qube troubleshooting
|
||||
---
|
||||
|
||||
## VM Kernel troubleshooting
|
||||
|
@ -3,7 +3,7 @@ lang: en
|
||||
layout: doc
|
||||
permalink: /doc/vpn-troubleshooting/
|
||||
ref: 240
|
||||
title: Vpn troubleshooting
|
||||
title: VPN troubleshooting
|
||||
---
|
||||
|
||||
## Tips
|
||||
|
Loading…
x
Reference in New Issue
Block a user