From be4bbda177b69d1187891087594eed59f4ae37eb Mon Sep 17 00:00:00 2001 From: m <3440586+maiska@users.noreply.github.com> Date: Sat, 1 Jun 2024 13:08:36 +0200 Subject: [PATCH] add newline for better rst conversion --- introduction/screenshots.md | 1 + 1 file changed, 1 insertion(+) diff --git a/introduction/screenshots.md b/introduction/screenshots.md index 1f4b04d0..36aea7f3 100644 --- a/introduction/screenshots.md +++ b/introduction/screenshots.md @@ -61,6 +61,7 @@ Qubes is all about seamless integration from the user’s point of view. Here yo [![r4.0-manager-and-sysnet-network-prompt.png](/attachment/doc/r4.0-manager-and-sysnet-network-prompt.png)](/attachment/doc/r4.0-manager-and-sysnet-network-prompt.png) All the networking runs in a special, unprivileged NetVM. (Notice the red frame around the Network Manager dialog box on the screen above.) This means that in the event that your network card driver, Wi-Fi stack, or DHCP client is compromised, the integrity of the rest of the system will not be affected! This feature requires Intel VT-d or AMD IOMMU hardware (e.g., Core i5/i7 systems) + * * * * * [![r4.0-software-update.png](/attachment/doc/r4.0-software-update.png)](/attachment/doc/r4.0-software-update.png)