diff --git a/common-tasks/block-devices.md b/common-tasks/block-devices.md index ef78ff0d..76af054a 100644 --- a/common-tasks/block-devices.md +++ b/common-tasks/block-devices.md @@ -8,6 +8,9 @@ redirect_from: Block or Storage Devices in Qubes R4.0 ====================================== +*This page is part of [device handling in qubes]* +(In case you were looking for the [R3.2 documentation](/doc/usb/).) + If you don't know what a "block device" is, just think of it as a fancy way to say "something that stores data". #Using The GUI to Attach a Drive @@ -159,6 +162,7 @@ This option accepts `cdrom` and `disk`, default is `disk`. +[device handling in qubes]: /doc/device-handling/ [mass-storage]: https://en.wikipedia.org/wiki/USB_mass_storage_device_class [device manager icon]:https://raw.githubusercontent.com/hrdwrrsk/adwaita-xfce-icon-theme/master/Adwaita-Xfce/22x22/devices/media-removable.png [USB]:/dock/usb-devices-in-qubes-R4.0/ \ No newline at end of file diff --git a/common-tasks/pci-devices.md b/common-tasks/pci-devices.md index 649f18ed..53ac0a83 100644 --- a/common-tasks/pci-devices.md +++ b/common-tasks/pci-devices.md @@ -7,7 +7,8 @@ redirect_from: --- PCI Devices in Qubes R4.0 -====================================== +========================= +*This page is part of [device handling in qubes]* (In case you were looking for the [R3.2 documentation](/doc/assigning-devices/).) **Warning:** Only dom0 exposes PCI devices. Some of them are strictly required in dom0! (e.g. host bridge) @@ -134,6 +135,7 @@ or +[device handling in qubes]: /doc/device-handling/ [security considerations]: /doc/device-considerations/#pci-security [block]:/doc/block-devices-in-qubes-R4.0/ [USB]:/dock/usb-devices-in-qubes-R4.0/ diff --git a/common-tasks/usb-devices.md b/common-tasks/usb-devices.md index 6b5566d6..a150d46a 100644 --- a/common-tasks/usb-devices.md +++ b/common-tasks/usb-devices.md @@ -8,6 +8,7 @@ redirect_from: USB Devices in Qubes R4.0 ========================== +*This page is part of [device handling in qubes]* (In case you were looking for the [R3.2 documentation](/doc/usb/).) **Important security warning:** USB passthrough comes with many security implications! Please make sure you carefully read and understood the **[security considerations]**! Especially, whenever possible, attach a [block device] instead! @@ -126,6 +127,7 @@ Strip the leading `0000:` and pass the rest to the [`qvm-pci` tool][qvm-pci] to +[device handling in qubes]: /doc/device-handling/ [block device]: /doc/block-devices-in-qubes-R4.0/ [security considerations]: /doc/device-considerations/#usb-security [usb-challenges]: https://blog.invisiblethings.org/2011/05/31/usb-security-challenges.html