Remove redundant titles

First pass for all titles still using the old '=====' syntax

https://github.com/QubesOS/qubes-issues/issues/6701#issuecomment-862060759
This commit is contained in:
Andrew David Wong 2021-06-15 23:48:48 -07:00
parent 0c95b3ae4d
commit f822b70435
No known key found for this signature in database
GPG Key ID: 8CE137352A019A17
65 changed files with 0 additions and 66 deletions

View File

@ -10,7 +10,6 @@ ref: 65
title: Qubes Builder Details
---
[QubesBuilder](/doc/qubes-builder/) "API"
========================================
Components Makefile.builder file

View File

@ -12,7 +12,6 @@ ref: 63
title: Qubes ISO Building
---
Building Qubes OS ISO
=========================
Build Environment

View File

@ -11,7 +11,6 @@ ref: 53
title: Coding Style
---
Coding Guidelines for Qubes Developers
======================================
Rationale

View File

@ -10,7 +10,6 @@ ref: 52
title: License
---
Qubes OS License
================
Qubes is a compilation of software packages, each under its own license. The compilation is made available under the GNU General Public License version 2.

View File

@ -10,7 +10,6 @@ ref: 54
title: Source Code
---
Qubes Source Code Repositories
==============================
All the Qubes code is kept in Git repositories. We have divided the project into

View File

@ -8,7 +8,6 @@ ref: 49
title: Safe Remote Dom0 Terminals
---
Safe Remote Dom0 Terminals
==========================
If you do not have working graphics in Dom0, then using a terminal can be quite annoying!

View File

@ -8,7 +8,6 @@ ref: 33
title: Google Summer of Code
---
2021 Google Summer of Code
================
## Information for Students

View File

@ -7,7 +7,6 @@ ref: 26
title: Join
---
Joining the Qubes OS Team
=========================
The Qubes OS Project does not currently have any open positions.

View File

@ -7,7 +7,6 @@ ref: 29
title: Package Contributions
---
Package Contributions
=====================
_This page is for developers who wish to contribute packages.

View File

@ -8,7 +8,6 @@ ref: 20
title: Qubes R3.0 Release Schedule
---
Qubes R3.0 Release Schedule
===========================
| Date | Stage |

View File

@ -8,7 +8,6 @@ ref: 17
title: Qubes R3.1 Release Schedule
---
Qubes R3.1 Release Schedule
===========================
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View File

@ -8,7 +8,6 @@ ref: 22
title: Qubes R3.2 Release Schedule
---
Qubes R3.2 Release Schedule
===========================
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View File

@ -7,7 +7,6 @@ ref: 23
title: Qubes R4.0 release notes
---
Qubes R4.0 release notes
========================
New features since 3.2

View File

@ -8,7 +8,6 @@ ref: 24
title: Qubes R4.0 Release Schedule
---
Qubes R4.0 Release Schedule
===========================
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View File

@ -7,7 +7,6 @@ ref: 13
title: Release Notes
---
Release Notes
=============
* [Qubes R1.0 release notes](/doc/releases/1.0/release-notes/)

View File

@ -7,7 +7,6 @@ ref: 15
title: Release Schedules
---
Release Schedules
=================
* [Qubes R3.0 release schedule](/doc/releases/3.0/schedule/)

View File

@ -8,7 +8,6 @@ ref: 14
title: Release Checklist
---
Release Checklist
=================
*the checklist is probably unfinished*

View File

@ -10,7 +10,6 @@ ref: 43
title: Dom0 Secure Updates
---
Qubes Dom0 secure update procedure
==================================
Reasons for Dom0 updates

View File

@ -10,7 +10,6 @@ ref: 34
title: DVMimpl
---
DisposableVM implementation in Qubes
====================================
**Note: The content below applies to Qubes R3.2.**

View File

@ -10,7 +10,6 @@ ref: 35
title: Qfilecopy
---
InterVM file copy design
========================
There are two cases when we need a mechanism to copy files between VMs:

View File

@ -11,11 +11,9 @@ title: Qfileexchgd
---
**This mechanism is obsolete as of Qubes Beta 1!**
==================================================
Please see this [page](/doc/qfilecopy/) instead.
qfilexchgd, the Qubes file exchange daemon
==========================================
Overview

View File

@ -10,7 +10,6 @@ ref: 41
title: Qmemman
---
qmemman, Qubes memory manager
=============================
Rationale

View File

@ -11,7 +11,6 @@ ref: 56
title: Architecture
---
Qubes Architecture Overview
===========================
Qubes implements a Security by Isolation approach. To do this, Qubes utilizes virtualization technology in order to isolate various programs from each other and even to sandbox many system-level components, such as networking and storage subsystems, so that the compromise of any of these programs or components does not affect the integrity of the rest of the system.

View File

@ -7,7 +7,6 @@ ref: 60
title: Audio Virtualization
---
Audio Virtualization
====================
VMs on Qubes OS have access to virtualized audio through the PulseAudio module.

View File

@ -11,7 +11,6 @@ ref: 61
title: GUI
---
Qubes GUI protocol
==================
qubes_gui and qubes_guid processes

View File

@ -11,7 +11,6 @@ ref: 55
title: Security-critical Code
---
Security-critical Code in Qubes OS
==================================
Below is a list of security-critical (i.e., trusted) code components in Qubes OS.

View File

@ -7,7 +7,6 @@ ref: 57
title: Storage Pools
---
Storage Pools in Qubes
======================
Qubes OS R3.2 introduced the concept of storage drivers and pools. This feature

View File

@ -10,7 +10,6 @@ ref: 125
title: Contributing to the Qubes OS Project
---
How to Contribute to the Qubes OS Project
=========================================
Thank you for your interest in contributing to Qubes! Here are some of the many

View File

@ -10,7 +10,6 @@ ref: 123
title: Screenshots
---
Select Qubes OS Screenshots
===========================
[![r4.0-xfce-desktop.png](/attachment/wiki/QubesScreenshots/r4.0-xfce-desktop.png)](/attachment/wiki/QubesScreenshots/r4.0-xfce-desktop.png)

View File

@ -8,7 +8,6 @@ ref: 212
title: Canary Template
---
Canary Template
===============
~~~

View File

@ -8,7 +8,6 @@ ref: 209
title: Security Bulletin Template
---
Security Bulletin Template
==========================
~~~

View File

@ -18,7 +18,6 @@ ref: 213
title: Security Pack
---
Qubes Security Pack
===================
The **Qubes Security Pack** (`qubes-secpack`) is a Git repository that contains:

View File

@ -7,7 +7,6 @@ ref: 214
title: Xen Security Advisory (XSA) Tracker
---
Xen Security Advisory (XSA) Tracker
===================================
This tracker shows whether Qubes OS is affected by any given [Xen Security Advisory (XSA)](https://xenbits.xen.org/xsa/).

View File

@ -11,7 +11,6 @@ ref: 180
title: Config Files
---
Configuration Files
===================
Qubes-specific VM config files

View File

@ -8,7 +8,6 @@ ref: 176
title: KDE
---
Using KDE in dom0
=================
Installation

View File

@ -10,7 +10,6 @@ ref: 175
title: Mounting and Decrypting Qubes Partitions from Outside Qubes
---
Mount and Decrypt Qubes Partition from Outside Qubes
====================================================
When a Qubes OS install is unbootable or booting it is otherwise undesirable, this process allows for the recovery of files stored within the system.

View File

@ -7,7 +7,6 @@ ref: 178
title: RPC Policies
---
RPC Policies
============
This document explains the basics of RPC policies in Qubes.

View File

@ -9,7 +9,6 @@ ref: 207
title: Emergency Backup Recovery (v2)
---
Emergency Backup Recovery without Qubes (v2)
============================================
This page describes how to perform emergency restore of backup created on Qubes

View File

@ -9,7 +9,6 @@ ref: 201
title: Emergency Backup Recovery (v3)
---
Emergency Backup Recovery without Qubes (v3)
============================================
This page describes how to perform an emergency restore of a backup created on

View File

@ -9,7 +9,6 @@ ref: 192
title: Emergency Backup Recovery (v4)
---
Emergency Backup Recovery without Qubes (v4)
============================================
This page describes how to perform an emergency restore of a backup created on

View File

@ -10,7 +10,6 @@ ref: 199
title: Backup, restoration, and migration
---
Backup, restoration, and migration
==================================
With Qubes, it's easy and secure to back up and restore your whole system, as well as to migrate between two physical machines.

View File

@ -10,7 +10,6 @@ ref: 196
title: Copying and pasting text between qubes
---
Copying and pasting text between qubes
======================================
*This page is about copying and pasting plain text.

View File

@ -10,7 +10,6 @@ ref: 191
title: Copying and moving files between qubes
---
Copying and moving files between qubes
======================================
*This page is about copying and moving files.

View File

@ -10,7 +10,6 @@ ref: 205
title: Full Screen Mode
---
Enabling Full Screen Mode for select VMs
========================================
What is full screen mode?

View File

@ -9,7 +9,6 @@ ref: 204
title: Optical Discs
---
Optical Discs
=============
Passthrough reading and recording (a.k.a., "burning") are not supported by Xen.

View File

@ -10,7 +10,6 @@ ref: 206
title: Volume Backup and Revert
---
Qubes Volume Backup and Revert
==============================
With Qubes, it is possible to revert one of a VM's storage volumes to a previous

View File

@ -7,7 +7,6 @@ ref: 148
title: Download Mirrors
---
Qubes Download Mirrors
======================
List of Download Mirrors

View File

@ -7,7 +7,6 @@ ref: 147
title: Testing new releases and updates
---
Testing new releases and updates
================================
Testing new Qubes OS releases and updates is one of the most helpful ways in which you can [contribute](/doc/contributing/) to the Qubes OS Project.

View File

@ -11,7 +11,6 @@ ref: 156
title: Upgrading to R2
---
Upgrading Qubes R2 Beta 3 to R2
===================================
Current Qubes R2 Beta 3 (R2B3) systems can be upgraded in-place to the latest R2 (R2) release by following the procedure below.

View File

@ -10,7 +10,6 @@ ref: 163
title: Upgrading to R2B1
---
Upgrading Qubes R1 to R2 Beta 1
===============================
**Note: Qubes R2 Beta 1 is no longer supported! Please install or upgrade to a newer Qubes R2.**

View File

@ -10,7 +10,6 @@ ref: 160
title: Upgrading to R2B2
---
Upgrading Qubes R1 to R2 (beta2)
================================
Existing users of Qubes R1 (but not R1 betas!) can upgrade their systems to the latest R2 beta release by following the procedure below. As usual, it is advisable to backup the system before proceeding with the upgrade. While it is possible to upgrade the system **it is strongly recommended to reinstall it**. You will preserve all your data and settings thanks to [backup and restore tools](/doc/backup-restore/).

View File

@ -10,7 +10,6 @@ ref: 157
title: Upgrading to R2B3
---
Upgrading Qubes R2 Beta 2 to R2 Beta 3
======================================
Current Qubes R2 Beta 2 (R2B2) systems can be upgraded in-place to the latest R2 Beta 3 (R2B3) release by following the procedure below. However, upgrading in-place is riskier than performing a clean installation, since there are more things which can go wrong. For this reason, **we strongly recommended that users perform a [clean installation](/doc/installation-guide/) of Qubes R2 Beta 3**.

View File

@ -10,7 +10,6 @@ ref: 162
title: Upgrading to R4.0
---
Upgrading Qubes R3.2 to R4.0
============================
**Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).**

View File

@ -7,7 +7,6 @@ ref: 158
title: Upgrade Guides
---
Qubes OS Upgrade Guides
=======================
These guides are for upgrading from one version of Qubes to another.

View File

@ -10,7 +10,6 @@ ref: 151
title: Version Scheme
---
Version Scheme
==============
Beginning with R3 release, we change (and formalise) the versioning scheme.

View File

@ -12,7 +12,6 @@ ref: 146
title: Hardware Compatibility List (HCL)
---
Hardware Compatibility List (HCL) for All Qubes OS Releases
===========================================================
The [HCL](/hcl) is a compilation of reports generated and submitted by users across various Qubes versions about their hardware's compatibility with Qubes.

View File

@ -8,7 +8,6 @@ ref: 128
title: How to Reinstall a TemplateVM
---
How to Reinstall a TemplateVM
=============================
If you suspect your [TemplateVM](/doc/templates/) is broken, misconfigured, or compromised, you can reinstall any TemplateVM that was installed from the Qubes repository.

View File

@ -7,7 +7,6 @@ ref: 129
title: Windows VMs
---
Windows VMs in Qubes OS
=======================
Like any other unmodified OSes, Windows can be installed in Qubes as an [HVM](/doc/standalone-and-hvm/) domain.

View File

@ -10,7 +10,6 @@ ref: 140
title: Glossary
---
Glossary of Qubes Terminology
=============================
Qubes OS

View File

@ -13,7 +13,6 @@ ref: 141
title: Command-Line Tools
---
Command-Line Tools
==================
Dom0

View File

@ -10,7 +10,6 @@ ref: 164
title: Anti Evil Maid (AEM)
---
Installing and Using Anti Evil Maid (AEM) with Qubes OS
=======================================================
Background

View File

@ -10,7 +10,6 @@ ref: 171
title: Data Leaks
---
Understanding and Preventing Data Leaks
=======================================
The Role of the Firewall

View File

@ -11,7 +11,6 @@ ref: 166
title: The Qubes Firewall
---
The Qubes Firewall
==================
Understanding firewalling in Qubes

View File

@ -10,7 +10,6 @@ ref: 165
title: Passwordless Root Access in VMs
---
Passwordless Root Access in VMs
===============================
Background (`/etc/sudoers.d/qubes` in VM):

View File

@ -10,7 +10,6 @@ ref: 202
title: Managing AppVm Shortcuts
---
Managing shortcuts to applications in AppVMs
============================================
For ease of use Qubes aggregates shortcuts to applications that are installed in AppVMs and shows them in one "start menu" in dom0.