Remove vestigial '====' heading syntax

https://github.com/QubesOS/qubes-issues/issues/6701#issuecomment-862060759
This commit is contained in:
Andrew David Wong 2021-06-15 23:53:27 -07:00
parent f822b70435
commit a4cbb51092
No known key found for this signature in database
GPG key ID: 8CE137352A019A17
65 changed files with 0 additions and 66 deletions

View file

@ -10,7 +10,6 @@ ref: 65
title: Qubes Builder Details
---
========================================
Components Makefile.builder file
--------------------------------

View file

@ -12,7 +12,6 @@ ref: 63
title: Qubes ISO Building
---
=========================
Build Environment
-----------------

View file

@ -11,7 +11,6 @@ ref: 53
title: Coding Style
---
======================================
Rationale
---------

View file

@ -10,7 +10,6 @@ ref: 52
title: License
---
================
Qubes is a compilation of software packages, each under its own license. The compilation is made available under the GNU General Public License version 2.

View file

@ -10,7 +10,6 @@ ref: 54
title: Source Code
---
==============================
All the Qubes code is kept in Git repositories. We have divided the project into
several components, each of which has its own separate repository, for example:

View file

@ -8,7 +8,6 @@ ref: 49
title: Safe Remote Dom0 Terminals
---
==========================
If you do not have working graphics in Dom0, then using a terminal can be quite annoying!
This was the case for the author while trying to debug PCI-passthrough of a machine's primary (only) GPU.

View file

@ -8,7 +8,6 @@ ref: 33
title: Google Summer of Code
---
================
## Information for Students
Thank you for your interest in participating in the [Google Summer of Code program](https://summerofcode.withgoogle.com/organizations/4675790572093440/) with the [Qubes OS team](/team/). You can read more about the Google Summer of Code program at the [official website](https://summerofcode.withgoogle.com/) and the [official FAQ](https://developers.google.com/open-source/gsoc/faq).

View file

@ -7,7 +7,6 @@ ref: 26
title: Join
---
=========================
The Qubes OS Project does not currently have any open positions.
This page will be updated when open positions become available.

View file

@ -7,7 +7,6 @@ ref: 29
title: Package Contributions
---
=====================
_This page is for developers who wish to contribute packages.
If you want to install contributed packages, please see [installing contributed packages](/doc/installing-contributed-packages/)._

View file

@ -8,7 +8,6 @@ ref: 20
title: Qubes R3.0 Release Schedule
---
===========================
| Date | Stage |
| -----------:| ------------------------------------- |

View file

@ -8,7 +8,6 @@ ref: 17
title: Qubes R3.1 Release Schedule
---
===========================
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View file

@ -8,7 +8,6 @@ ref: 22
title: Qubes R3.2 Release Schedule
---
===========================
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View file

@ -7,7 +7,6 @@ ref: 23
title: Qubes R4.0 release notes
---
========================
New features since 3.2
----------------------

View file

@ -8,7 +8,6 @@ ref: 24
title: Qubes R4.0 Release Schedule
---
===========================
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View file

@ -7,7 +7,6 @@ ref: 13
title: Release Notes
---
=============
* [Qubes R1.0 release notes](/doc/releases/1.0/release-notes/)
* [Qubes R2.0 release notes](/doc/releases/2.0/release-notes/)

View file

@ -7,7 +7,6 @@ ref: 15
title: Release Schedules
---
=================
* [Qubes R3.0 release schedule](/doc/releases/3.0/schedule/)
* [Qubes R3.1 release schedule](/doc/releases/3.1/schedule/)

View file

@ -8,7 +8,6 @@ ref: 14
title: Release Checklist
---
=================
*the checklist is probably unfinished*

View file

@ -10,7 +10,6 @@ ref: 43
title: Dom0 Secure Updates
---
==================================
Reasons for Dom0 updates
------------------------

View file

@ -10,7 +10,6 @@ ref: 34
title: DVMimpl
---
====================================
**Note: The content below applies to Qubes R3.2.**

View file

@ -10,7 +10,6 @@ ref: 35
title: Qfilecopy
---
========================
There are two cases when we need a mechanism to copy files between VMs:

View file

@ -14,7 +14,6 @@ title: Qfileexchgd
Please see this [page](/doc/qfilecopy/) instead.
==========================================
Overview
--------

View file

@ -10,7 +10,6 @@ ref: 41
title: Qmemman
---
=============================
Rationale
---------

View file

@ -11,7 +11,6 @@ ref: 56
title: Architecture
---
===========================
Qubes implements a Security by Isolation approach. To do this, Qubes utilizes virtualization technology in order to isolate various programs from each other and even to sandbox many system-level components, such as networking and storage subsystems, so that the compromise of any of these programs or components does not affect the integrity of the rest of the system.

View file

@ -7,7 +7,6 @@ ref: 60
title: Audio Virtualization
---
====================
VMs on Qubes OS have access to virtualized audio through the PulseAudio module.
It consists of two parts:

View file

@ -11,7 +11,6 @@ ref: 61
title: GUI
---
==================
qubes_gui and qubes_guid processes
------------------------------------

View file

@ -11,7 +11,6 @@ ref: 55
title: Security-critical Code
---
==================================
Below is a list of security-critical (i.e., trusted) code components in Qubes OS.
A successful attack against any of these components could compromise the system's security.

View file

@ -7,7 +7,6 @@ ref: 57
title: Storage Pools
---
======================
Qubes OS R3.2 introduced the concept of storage drivers and pools. This feature
was a first step towards a saner storage API, which is heavily rewritten in R4.