mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-01-11 15:29:41 -05:00
Remove vestigial '====' heading syntax
https://github.com/QubesOS/qubes-issues/issues/6701#issuecomment-862060759
This commit is contained in:
parent
f822b70435
commit
a4cbb51092
@ -10,7 +10,6 @@ ref: 65
|
|||||||
title: Qubes Builder Details
|
title: Qubes Builder Details
|
||||||
---
|
---
|
||||||
|
|
||||||
========================================
|
|
||||||
|
|
||||||
Components Makefile.builder file
|
Components Makefile.builder file
|
||||||
--------------------------------
|
--------------------------------
|
||||||
|
@ -12,7 +12,6 @@ ref: 63
|
|||||||
title: Qubes ISO Building
|
title: Qubes ISO Building
|
||||||
---
|
---
|
||||||
|
|
||||||
=========================
|
|
||||||
|
|
||||||
Build Environment
|
Build Environment
|
||||||
-----------------
|
-----------------
|
||||||
|
@ -11,7 +11,6 @@ ref: 53
|
|||||||
title: Coding Style
|
title: Coding Style
|
||||||
---
|
---
|
||||||
|
|
||||||
======================================
|
|
||||||
|
|
||||||
Rationale
|
Rationale
|
||||||
---------
|
---------
|
||||||
|
@ -10,7 +10,6 @@ ref: 52
|
|||||||
title: License
|
title: License
|
||||||
---
|
---
|
||||||
|
|
||||||
================
|
|
||||||
|
|
||||||
Qubes is a compilation of software packages, each under its own license. The compilation is made available under the GNU General Public License version 2.
|
Qubes is a compilation of software packages, each under its own license. The compilation is made available under the GNU General Public License version 2.
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 54
|
|||||||
title: Source Code
|
title: Source Code
|
||||||
---
|
---
|
||||||
|
|
||||||
==============================
|
|
||||||
|
|
||||||
All the Qubes code is kept in Git repositories. We have divided the project into
|
All the Qubes code is kept in Git repositories. We have divided the project into
|
||||||
several components, each of which has its own separate repository, for example:
|
several components, each of which has its own separate repository, for example:
|
||||||
|
@ -8,7 +8,6 @@ ref: 49
|
|||||||
title: Safe Remote Dom0 Terminals
|
title: Safe Remote Dom0 Terminals
|
||||||
---
|
---
|
||||||
|
|
||||||
==========================
|
|
||||||
|
|
||||||
If you do not have working graphics in Dom0, then using a terminal can be quite annoying!
|
If you do not have working graphics in Dom0, then using a terminal can be quite annoying!
|
||||||
This was the case for the author while trying to debug PCI-passthrough of a machine's primary (only) GPU.
|
This was the case for the author while trying to debug PCI-passthrough of a machine's primary (only) GPU.
|
||||||
|
@ -8,7 +8,6 @@ ref: 33
|
|||||||
title: Google Summer of Code
|
title: Google Summer of Code
|
||||||
---
|
---
|
||||||
|
|
||||||
================
|
|
||||||
## Information for Students
|
## Information for Students
|
||||||
|
|
||||||
Thank you for your interest in participating in the [Google Summer of Code program](https://summerofcode.withgoogle.com/organizations/4675790572093440/) with the [Qubes OS team](/team/). You can read more about the Google Summer of Code program at the [official website](https://summerofcode.withgoogle.com/) and the [official FAQ](https://developers.google.com/open-source/gsoc/faq).
|
Thank you for your interest in participating in the [Google Summer of Code program](https://summerofcode.withgoogle.com/organizations/4675790572093440/) with the [Qubes OS team](/team/). You can read more about the Google Summer of Code program at the [official website](https://summerofcode.withgoogle.com/) and the [official FAQ](https://developers.google.com/open-source/gsoc/faq).
|
||||||
|
@ -7,7 +7,6 @@ ref: 26
|
|||||||
title: Join
|
title: Join
|
||||||
---
|
---
|
||||||
|
|
||||||
=========================
|
|
||||||
|
|
||||||
The Qubes OS Project does not currently have any open positions.
|
The Qubes OS Project does not currently have any open positions.
|
||||||
This page will be updated when open positions become available.
|
This page will be updated when open positions become available.
|
||||||
|
@ -7,7 +7,6 @@ ref: 29
|
|||||||
title: Package Contributions
|
title: Package Contributions
|
||||||
---
|
---
|
||||||
|
|
||||||
=====================
|
|
||||||
|
|
||||||
_This page is for developers who wish to contribute packages.
|
_This page is for developers who wish to contribute packages.
|
||||||
If you want to install contributed packages, please see [installing contributed packages](/doc/installing-contributed-packages/)._
|
If you want to install contributed packages, please see [installing contributed packages](/doc/installing-contributed-packages/)._
|
||||||
|
@ -8,7 +8,6 @@ ref: 20
|
|||||||
title: Qubes R3.0 Release Schedule
|
title: Qubes R3.0 Release Schedule
|
||||||
---
|
---
|
||||||
|
|
||||||
===========================
|
|
||||||
|
|
||||||
| Date | Stage |
|
| Date | Stage |
|
||||||
| -----------:| ------------------------------------- |
|
| -----------:| ------------------------------------- |
|
||||||
|
@ -8,7 +8,6 @@ ref: 17
|
|||||||
title: Qubes R3.1 Release Schedule
|
title: Qubes R3.1 Release Schedule
|
||||||
---
|
---
|
||||||
|
|
||||||
===========================
|
|
||||||
|
|
||||||
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
||||||
|
|
||||||
|
@ -8,7 +8,6 @@ ref: 22
|
|||||||
title: Qubes R3.2 Release Schedule
|
title: Qubes R3.2 Release Schedule
|
||||||
---
|
---
|
||||||
|
|
||||||
===========================
|
|
||||||
|
|
||||||
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ref: 23
|
|||||||
title: Qubes R4.0 release notes
|
title: Qubes R4.0 release notes
|
||||||
---
|
---
|
||||||
|
|
||||||
========================
|
|
||||||
|
|
||||||
New features since 3.2
|
New features since 3.2
|
||||||
----------------------
|
----------------------
|
||||||
|
@ -8,7 +8,6 @@ ref: 24
|
|||||||
title: Qubes R4.0 Release Schedule
|
title: Qubes R4.0 Release Schedule
|
||||||
---
|
---
|
||||||
|
|
||||||
===========================
|
|
||||||
|
|
||||||
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ref: 13
|
|||||||
title: Release Notes
|
title: Release Notes
|
||||||
---
|
---
|
||||||
|
|
||||||
=============
|
|
||||||
|
|
||||||
* [Qubes R1.0 release notes](/doc/releases/1.0/release-notes/)
|
* [Qubes R1.0 release notes](/doc/releases/1.0/release-notes/)
|
||||||
* [Qubes R2.0 release notes](/doc/releases/2.0/release-notes/)
|
* [Qubes R2.0 release notes](/doc/releases/2.0/release-notes/)
|
||||||
|
@ -7,7 +7,6 @@ ref: 15
|
|||||||
title: Release Schedules
|
title: Release Schedules
|
||||||
---
|
---
|
||||||
|
|
||||||
=================
|
|
||||||
|
|
||||||
* [Qubes R3.0 release schedule](/doc/releases/3.0/schedule/)
|
* [Qubes R3.0 release schedule](/doc/releases/3.0/schedule/)
|
||||||
* [Qubes R3.1 release schedule](/doc/releases/3.1/schedule/)
|
* [Qubes R3.1 release schedule](/doc/releases/3.1/schedule/)
|
||||||
|
@ -8,7 +8,6 @@ ref: 14
|
|||||||
title: Release Checklist
|
title: Release Checklist
|
||||||
---
|
---
|
||||||
|
|
||||||
=================
|
|
||||||
|
|
||||||
*the checklist is probably unfinished*
|
*the checklist is probably unfinished*
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 43
|
|||||||
title: Dom0 Secure Updates
|
title: Dom0 Secure Updates
|
||||||
---
|
---
|
||||||
|
|
||||||
==================================
|
|
||||||
|
|
||||||
Reasons for Dom0 updates
|
Reasons for Dom0 updates
|
||||||
------------------------
|
------------------------
|
||||||
|
@ -10,7 +10,6 @@ ref: 34
|
|||||||
title: DVMimpl
|
title: DVMimpl
|
||||||
---
|
---
|
||||||
|
|
||||||
====================================
|
|
||||||
|
|
||||||
**Note: The content below applies to Qubes R3.2.**
|
**Note: The content below applies to Qubes R3.2.**
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 35
|
|||||||
title: Qfilecopy
|
title: Qfilecopy
|
||||||
---
|
---
|
||||||
|
|
||||||
========================
|
|
||||||
|
|
||||||
There are two cases when we need a mechanism to copy files between VMs:
|
There are two cases when we need a mechanism to copy files between VMs:
|
||||||
|
|
||||||
|
@ -14,7 +14,6 @@ title: Qfileexchgd
|
|||||||
|
|
||||||
Please see this [page](/doc/qfilecopy/) instead.
|
Please see this [page](/doc/qfilecopy/) instead.
|
||||||
|
|
||||||
==========================================
|
|
||||||
|
|
||||||
Overview
|
Overview
|
||||||
--------
|
--------
|
||||||
|
@ -10,7 +10,6 @@ ref: 41
|
|||||||
title: Qmemman
|
title: Qmemman
|
||||||
---
|
---
|
||||||
|
|
||||||
=============================
|
|
||||||
|
|
||||||
Rationale
|
Rationale
|
||||||
---------
|
---------
|
||||||
|
@ -11,7 +11,6 @@ ref: 56
|
|||||||
title: Architecture
|
title: Architecture
|
||||||
---
|
---
|
||||||
|
|
||||||
===========================
|
|
||||||
|
|
||||||
Qubes implements a Security by Isolation approach. To do this, Qubes utilizes virtualization technology in order to isolate various programs from each other and even to sandbox many system-level components, such as networking and storage subsystems, so that the compromise of any of these programs or components does not affect the integrity of the rest of the system.
|
Qubes implements a Security by Isolation approach. To do this, Qubes utilizes virtualization technology in order to isolate various programs from each other and even to sandbox many system-level components, such as networking and storage subsystems, so that the compromise of any of these programs or components does not affect the integrity of the rest of the system.
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ref: 60
|
|||||||
title: Audio Virtualization
|
title: Audio Virtualization
|
||||||
---
|
---
|
||||||
|
|
||||||
====================
|
|
||||||
|
|
||||||
VMs on Qubes OS have access to virtualized audio through the PulseAudio module.
|
VMs on Qubes OS have access to virtualized audio through the PulseAudio module.
|
||||||
It consists of two parts:
|
It consists of two parts:
|
||||||
|
@ -11,7 +11,6 @@ ref: 61
|
|||||||
title: GUI
|
title: GUI
|
||||||
---
|
---
|
||||||
|
|
||||||
==================
|
|
||||||
|
|
||||||
qubes_gui and qubes_guid processes
|
qubes_gui and qubes_guid processes
|
||||||
------------------------------------
|
------------------------------------
|
||||||
|
@ -11,7 +11,6 @@ ref: 55
|
|||||||
title: Security-critical Code
|
title: Security-critical Code
|
||||||
---
|
---
|
||||||
|
|
||||||
==================================
|
|
||||||
|
|
||||||
Below is a list of security-critical (i.e., trusted) code components in Qubes OS.
|
Below is a list of security-critical (i.e., trusted) code components in Qubes OS.
|
||||||
A successful attack against any of these components could compromise the system's security.
|
A successful attack against any of these components could compromise the system's security.
|
||||||
|
@ -7,7 +7,6 @@ ref: 57
|
|||||||
title: Storage Pools
|
title: Storage Pools
|
||||||
---
|
---
|
||||||
|
|
||||||
======================
|
|
||||||
|
|
||||||
Qubes OS R3.2 introduced the concept of storage drivers and pools. This feature
|
Qubes OS R3.2 introduced the concept of storage drivers and pools. This feature
|
||||||
was a first step towards a saner storage API, which is heavily rewritten in R4.
|
was a first step towards a saner storage API, which is heavily rewritten in R4.
|
||||||
|
@ -10,7 +10,6 @@ ref: 125
|
|||||||
title: Contributing to the Qubes OS Project
|
title: Contributing to the Qubes OS Project
|
||||||
---
|
---
|
||||||
|
|
||||||
=========================================
|
|
||||||
|
|
||||||
Thank you for your interest in contributing to Qubes! Here are some of the many
|
Thank you for your interest in contributing to Qubes! Here are some of the many
|
||||||
ways in which you can help:
|
ways in which you can help:
|
||||||
|
@ -10,7 +10,6 @@ ref: 123
|
|||||||
title: Screenshots
|
title: Screenshots
|
||||||
---
|
---
|
||||||
|
|
||||||
===========================
|
|
||||||
|
|
||||||
[![r4.0-xfce-desktop.png](/attachment/wiki/QubesScreenshots/r4.0-xfce-desktop.png)](/attachment/wiki/QubesScreenshots/r4.0-xfce-desktop.png)
|
[![r4.0-xfce-desktop.png](/attachment/wiki/QubesScreenshots/r4.0-xfce-desktop.png)](/attachment/wiki/QubesScreenshots/r4.0-xfce-desktop.png)
|
||||||
|
|
||||||
|
@ -8,7 +8,6 @@ ref: 212
|
|||||||
title: Canary Template
|
title: Canary Template
|
||||||
---
|
---
|
||||||
|
|
||||||
===============
|
|
||||||
|
|
||||||
~~~
|
~~~
|
||||||
Dear Qubes community,
|
Dear Qubes community,
|
||||||
|
@ -8,8 +8,6 @@ ref: 209
|
|||||||
title: Security Bulletin Template
|
title: Security Bulletin Template
|
||||||
---
|
---
|
||||||
|
|
||||||
==========================
|
|
||||||
|
|
||||||
~~~
|
~~~
|
||||||
Dear Qubes Community,
|
Dear Qubes Community,
|
||||||
|
|
||||||
|
@ -18,7 +18,6 @@ ref: 213
|
|||||||
title: Security Pack
|
title: Security Pack
|
||||||
---
|
---
|
||||||
|
|
||||||
===================
|
|
||||||
|
|
||||||
The **Qubes Security Pack** (`qubes-secpack`) is a Git repository that contains:
|
The **Qubes Security Pack** (`qubes-secpack`) is a Git repository that contains:
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ref: 214
|
|||||||
title: Xen Security Advisory (XSA) Tracker
|
title: Xen Security Advisory (XSA) Tracker
|
||||||
---
|
---
|
||||||
|
|
||||||
===================================
|
|
||||||
|
|
||||||
This tracker shows whether Qubes OS is affected by any given [Xen Security Advisory (XSA)](https://xenbits.xen.org/xsa/).
|
This tracker shows whether Qubes OS is affected by any given [Xen Security Advisory (XSA)](https://xenbits.xen.org/xsa/).
|
||||||
Shortly after a new XSA is published, we will add a new row to this tracker.
|
Shortly after a new XSA is published, we will add a new row to this tracker.
|
||||||
|
@ -11,7 +11,6 @@ ref: 180
|
|||||||
title: Config Files
|
title: Config Files
|
||||||
---
|
---
|
||||||
|
|
||||||
===================
|
|
||||||
|
|
||||||
Qubes-specific VM config files
|
Qubes-specific VM config files
|
||||||
------------------------------
|
------------------------------
|
||||||
|
@ -8,7 +8,6 @@ ref: 176
|
|||||||
title: KDE
|
title: KDE
|
||||||
---
|
---
|
||||||
|
|
||||||
=================
|
|
||||||
|
|
||||||
Installation
|
Installation
|
||||||
------------
|
------------
|
||||||
|
@ -10,7 +10,6 @@ ref: 175
|
|||||||
title: Mounting and Decrypting Qubes Partitions from Outside Qubes
|
title: Mounting and Decrypting Qubes Partitions from Outside Qubes
|
||||||
---
|
---
|
||||||
|
|
||||||
====================================================
|
|
||||||
|
|
||||||
When a Qubes OS install is unbootable or booting it is otherwise undesirable, this process allows for the recovery of files stored within the system.
|
When a Qubes OS install is unbootable or booting it is otherwise undesirable, this process allows for the recovery of files stored within the system.
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ref: 178
|
|||||||
title: RPC Policies
|
title: RPC Policies
|
||||||
---
|
---
|
||||||
|
|
||||||
============
|
|
||||||
|
|
||||||
This document explains the basics of RPC policies in Qubes.
|
This document explains the basics of RPC policies in Qubes.
|
||||||
For more information, see [Qrexec: command execution in VMs](/doc/qrexec3/).
|
For more information, see [Qrexec: command execution in VMs](/doc/qrexec3/).
|
||||||
|
@ -9,7 +9,6 @@ ref: 207
|
|||||||
title: Emergency Backup Recovery (v2)
|
title: Emergency Backup Recovery (v2)
|
||||||
---
|
---
|
||||||
|
|
||||||
============================================
|
|
||||||
|
|
||||||
This page describes how to perform emergency restore of backup created on Qubes
|
This page describes how to perform emergency restore of backup created on Qubes
|
||||||
R2 Beta3 or earlier (which uses backup format 2).
|
R2 Beta3 or earlier (which uses backup format 2).
|
||||||
|
@ -9,7 +9,6 @@ ref: 201
|
|||||||
title: Emergency Backup Recovery (v3)
|
title: Emergency Backup Recovery (v3)
|
||||||
---
|
---
|
||||||
|
|
||||||
============================================
|
|
||||||
|
|
||||||
This page describes how to perform an emergency restore of a backup created on
|
This page describes how to perform an emergency restore of a backup created on
|
||||||
Qubes R2 or later (which uses backup format version 3).
|
Qubes R2 or later (which uses backup format version 3).
|
||||||
|
@ -9,7 +9,6 @@ ref: 192
|
|||||||
title: Emergency Backup Recovery (v4)
|
title: Emergency Backup Recovery (v4)
|
||||||
---
|
---
|
||||||
|
|
||||||
============================================
|
|
||||||
|
|
||||||
This page describes how to perform an emergency restore of a backup created on
|
This page describes how to perform an emergency restore of a backup created on
|
||||||
Qubes R4.X (which uses backup format version 4).
|
Qubes R4.X (which uses backup format version 4).
|
||||||
|
@ -10,7 +10,6 @@ ref: 199
|
|||||||
title: Backup, restoration, and migration
|
title: Backup, restoration, and migration
|
||||||
---
|
---
|
||||||
|
|
||||||
==================================
|
|
||||||
|
|
||||||
With Qubes, it's easy and secure to back up and restore your whole system, as well as to migrate between two physical machines.
|
With Qubes, it's easy and secure to back up and restore your whole system, as well as to migrate between two physical machines.
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 196
|
|||||||
title: Copying and pasting text between qubes
|
title: Copying and pasting text between qubes
|
||||||
---
|
---
|
||||||
|
|
||||||
======================================
|
|
||||||
|
|
||||||
*This page is about copying and pasting plain text.
|
*This page is about copying and pasting plain text.
|
||||||
If you wish to copy more complex data, such as rich text or images, see [copying and moving files between qubes](/doc/copying-files/).
|
If you wish to copy more complex data, such as rich text or images, see [copying and moving files between qubes](/doc/copying-files/).
|
||||||
|
@ -10,7 +10,6 @@ ref: 191
|
|||||||
title: Copying and moving files between qubes
|
title: Copying and moving files between qubes
|
||||||
---
|
---
|
||||||
|
|
||||||
======================================
|
|
||||||
|
|
||||||
*This page is about copying and moving files.
|
*This page is about copying and moving files.
|
||||||
If you wish to simply copy and paste text, that can be done more easily using the inter-qube clipboard.
|
If you wish to simply copy and paste text, that can be done more easily using the inter-qube clipboard.
|
||||||
|
@ -10,7 +10,6 @@ ref: 205
|
|||||||
title: Full Screen Mode
|
title: Full Screen Mode
|
||||||
---
|
---
|
||||||
|
|
||||||
========================================
|
|
||||||
|
|
||||||
What is full screen mode?
|
What is full screen mode?
|
||||||
-------------------------
|
-------------------------
|
||||||
|
@ -9,7 +9,6 @@ ref: 204
|
|||||||
title: Optical Discs
|
title: Optical Discs
|
||||||
---
|
---
|
||||||
|
|
||||||
=============
|
|
||||||
|
|
||||||
Passthrough reading and recording (a.k.a., "burning") are not supported by Xen.
|
Passthrough reading and recording (a.k.a., "burning") are not supported by Xen.
|
||||||
Currently, the only options for reading and recording optical discs (e.g., CDs, DVDs, BRDs) in Qubes are:
|
Currently, the only options for reading and recording optical discs (e.g., CDs, DVDs, BRDs) in Qubes are:
|
||||||
|
@ -10,7 +10,6 @@ ref: 206
|
|||||||
title: Volume Backup and Revert
|
title: Volume Backup and Revert
|
||||||
---
|
---
|
||||||
|
|
||||||
==============================
|
|
||||||
|
|
||||||
With Qubes, it is possible to revert one of a VM's storage volumes to a previous
|
With Qubes, it is possible to revert one of a VM's storage volumes to a previous
|
||||||
state using the automatic snapshot that is normally saved every time a VM is
|
state using the automatic snapshot that is normally saved every time a VM is
|
||||||
|
@ -7,7 +7,6 @@ ref: 148
|
|||||||
title: Download Mirrors
|
title: Download Mirrors
|
||||||
---
|
---
|
||||||
|
|
||||||
======================
|
|
||||||
|
|
||||||
List of Download Mirrors
|
List of Download Mirrors
|
||||||
------------------------
|
------------------------
|
||||||
|
@ -7,7 +7,6 @@ ref: 147
|
|||||||
title: Testing new releases and updates
|
title: Testing new releases and updates
|
||||||
---
|
---
|
||||||
|
|
||||||
================================
|
|
||||||
|
|
||||||
Testing new Qubes OS releases and updates is one of the most helpful ways in which you can [contribute](/doc/contributing/) to the Qubes OS Project.
|
Testing new Qubes OS releases and updates is one of the most helpful ways in which you can [contribute](/doc/contributing/) to the Qubes OS Project.
|
||||||
|
|
||||||
|
@ -11,7 +11,6 @@ ref: 156
|
|||||||
title: Upgrading to R2
|
title: Upgrading to R2
|
||||||
---
|
---
|
||||||
|
|
||||||
===================================
|
|
||||||
|
|
||||||
Current Qubes R2 Beta 3 (R2B3) systems can be upgraded in-place to the latest R2 (R2) release by following the procedure below.
|
Current Qubes R2 Beta 3 (R2B3) systems can be upgraded in-place to the latest R2 (R2) release by following the procedure below.
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 163
|
|||||||
title: Upgrading to R2B1
|
title: Upgrading to R2B1
|
||||||
---
|
---
|
||||||
|
|
||||||
===============================
|
|
||||||
|
|
||||||
**Note: Qubes R2 Beta 1 is no longer supported! Please install or upgrade to a newer Qubes R2.**
|
**Note: Qubes R2 Beta 1 is no longer supported! Please install or upgrade to a newer Qubes R2.**
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 160
|
|||||||
title: Upgrading to R2B2
|
title: Upgrading to R2B2
|
||||||
---
|
---
|
||||||
|
|
||||||
================================
|
|
||||||
|
|
||||||
Existing users of Qubes R1 (but not R1 betas!) can upgrade their systems to the latest R2 beta release by following the procedure below. As usual, it is advisable to backup the system before proceeding with the upgrade. While it is possible to upgrade the system **it is strongly recommended to reinstall it**. You will preserve all your data and settings thanks to [backup and restore tools](/doc/backup-restore/).
|
Existing users of Qubes R1 (but not R1 betas!) can upgrade their systems to the latest R2 beta release by following the procedure below. As usual, it is advisable to backup the system before proceeding with the upgrade. While it is possible to upgrade the system **it is strongly recommended to reinstall it**. You will preserve all your data and settings thanks to [backup and restore tools](/doc/backup-restore/).
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 157
|
|||||||
title: Upgrading to R2B3
|
title: Upgrading to R2B3
|
||||||
---
|
---
|
||||||
|
|
||||||
======================================
|
|
||||||
|
|
||||||
Current Qubes R2 Beta 2 (R2B2) systems can be upgraded in-place to the latest R2 Beta 3 (R2B3) release by following the procedure below. However, upgrading in-place is riskier than performing a clean installation, since there are more things which can go wrong. For this reason, **we strongly recommended that users perform a [clean installation](/doc/installation-guide/) of Qubes R2 Beta 3**.
|
Current Qubes R2 Beta 2 (R2B2) systems can be upgraded in-place to the latest R2 Beta 3 (R2B3) release by following the procedure below. However, upgrading in-place is riskier than performing a clean installation, since there are more things which can go wrong. For this reason, **we strongly recommended that users perform a [clean installation](/doc/installation-guide/) of Qubes R2 Beta 3**.
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 162
|
|||||||
title: Upgrading to R4.0
|
title: Upgrading to R4.0
|
||||||
---
|
---
|
||||||
|
|
||||||
============================
|
|
||||||
|
|
||||||
**Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).**
|
**Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).**
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ref: 158
|
|||||||
title: Upgrade Guides
|
title: Upgrade Guides
|
||||||
---
|
---
|
||||||
|
|
||||||
=======================
|
|
||||||
|
|
||||||
These guides are for upgrading from one version of Qubes to another.
|
These guides are for upgrading from one version of Qubes to another.
|
||||||
If you're just looking to update your system while staying on the same version, see [Updating Qubes OS](/doc/updating-qubes-os/).
|
If you're just looking to update your system while staying on the same version, see [Updating Qubes OS](/doc/updating-qubes-os/).
|
||||||
|
@ -10,7 +10,6 @@ ref: 151
|
|||||||
title: Version Scheme
|
title: Version Scheme
|
||||||
---
|
---
|
||||||
|
|
||||||
==============
|
|
||||||
|
|
||||||
Beginning with R3 release, we change (and formalise) the versioning scheme.
|
Beginning with R3 release, we change (and formalise) the versioning scheme.
|
||||||
From now on, it will be as follows.
|
From now on, it will be as follows.
|
||||||
|
@ -12,7 +12,6 @@ ref: 146
|
|||||||
title: Hardware Compatibility List (HCL)
|
title: Hardware Compatibility List (HCL)
|
||||||
---
|
---
|
||||||
|
|
||||||
===========================================================
|
|
||||||
|
|
||||||
The [HCL](/hcl) is a compilation of reports generated and submitted by users across various Qubes versions about their hardware's compatibility with Qubes.
|
The [HCL](/hcl) is a compilation of reports generated and submitted by users across various Qubes versions about their hardware's compatibility with Qubes.
|
||||||
|
|
||||||
|
@ -8,7 +8,6 @@ ref: 128
|
|||||||
title: How to Reinstall a TemplateVM
|
title: How to Reinstall a TemplateVM
|
||||||
---
|
---
|
||||||
|
|
||||||
=============================
|
|
||||||
|
|
||||||
If you suspect your [TemplateVM](/doc/templates/) is broken, misconfigured, or compromised, you can reinstall any TemplateVM that was installed from the Qubes repository.
|
If you suspect your [TemplateVM](/doc/templates/) is broken, misconfigured, or compromised, you can reinstall any TemplateVM that was installed from the Qubes repository.
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ref: 129
|
|||||||
title: Windows VMs
|
title: Windows VMs
|
||||||
---
|
---
|
||||||
|
|
||||||
=======================
|
|
||||||
|
|
||||||
Like any other unmodified OSes, Windows can be installed in Qubes as an [HVM](/doc/standalone-and-hvm/) domain.
|
Like any other unmodified OSes, Windows can be installed in Qubes as an [HVM](/doc/standalone-and-hvm/) domain.
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 140
|
|||||||
title: Glossary
|
title: Glossary
|
||||||
---
|
---
|
||||||
|
|
||||||
=============================
|
|
||||||
|
|
||||||
Qubes OS
|
Qubes OS
|
||||||
--------
|
--------
|
||||||
|
@ -13,7 +13,6 @@ ref: 141
|
|||||||
title: Command-Line Tools
|
title: Command-Line Tools
|
||||||
---
|
---
|
||||||
|
|
||||||
==================
|
|
||||||
|
|
||||||
Dom0
|
Dom0
|
||||||
----
|
----
|
||||||
|
@ -10,7 +10,6 @@ ref: 164
|
|||||||
title: Anti Evil Maid (AEM)
|
title: Anti Evil Maid (AEM)
|
||||||
---
|
---
|
||||||
|
|
||||||
=======================================================
|
|
||||||
|
|
||||||
Background
|
Background
|
||||||
----------
|
----------
|
||||||
|
@ -10,7 +10,6 @@ ref: 171
|
|||||||
title: Data Leaks
|
title: Data Leaks
|
||||||
---
|
---
|
||||||
|
|
||||||
=======================================
|
|
||||||
|
|
||||||
The Role of the Firewall
|
The Role of the Firewall
|
||||||
------------------------
|
------------------------
|
||||||
|
@ -11,7 +11,6 @@ ref: 166
|
|||||||
title: The Qubes Firewall
|
title: The Qubes Firewall
|
||||||
---
|
---
|
||||||
|
|
||||||
==================
|
|
||||||
|
|
||||||
Understanding firewalling in Qubes
|
Understanding firewalling in Qubes
|
||||||
----------------------------------
|
----------------------------------
|
||||||
|
@ -10,7 +10,6 @@ ref: 165
|
|||||||
title: Passwordless Root Access in VMs
|
title: Passwordless Root Access in VMs
|
||||||
---
|
---
|
||||||
|
|
||||||
===============================
|
|
||||||
|
|
||||||
Background (`/etc/sudoers.d/qubes` in VM):
|
Background (`/etc/sudoers.d/qubes` in VM):
|
||||||
|
|
||||||
|
@ -10,7 +10,6 @@ ref: 202
|
|||||||
title: Managing AppVm Shortcuts
|
title: Managing AppVm Shortcuts
|
||||||
---
|
---
|
||||||
|
|
||||||
============================================
|
|
||||||
|
|
||||||
For ease of use Qubes aggregates shortcuts to applications that are installed in AppVMs and shows them in one "start menu" in dom0.
|
For ease of use Qubes aggregates shortcuts to applications that are installed in AppVMs and shows them in one "start menu" in dom0.
|
||||||
Clicking on such shortcut runs the assigned application in its AppVM.
|
Clicking on such shortcut runs the assigned application in its AppVM.
|
||||||
|
Loading…
Reference in New Issue
Block a user