Remove redundant titles

First pass for all titles still using the old '=====' syntax

https://github.com/QubesOS/qubes-issues/issues/6701#issuecomment-862060759
This commit is contained in:
Andrew David Wong 2021-06-15 23:48:48 -07:00
parent 0c95b3ae4d
commit f822b70435
No known key found for this signature in database
GPG key ID: 8CE137352A019A17
65 changed files with 0 additions and 66 deletions

View file

@ -10,7 +10,6 @@ ref: 65
title: Qubes Builder Details
---
[QubesBuilder](/doc/qubes-builder/) "API"
========================================
Components Makefile.builder file

View file

@ -12,7 +12,6 @@ ref: 63
title: Qubes ISO Building
---
Building Qubes OS ISO
=========================
Build Environment

View file

@ -11,7 +11,6 @@ ref: 53
title: Coding Style
---
Coding Guidelines for Qubes Developers
======================================
Rationale

View file

@ -10,7 +10,6 @@ ref: 52
title: License
---
Qubes OS License
================
Qubes is a compilation of software packages, each under its own license. The compilation is made available under the GNU General Public License version 2.

View file

@ -10,7 +10,6 @@ ref: 54
title: Source Code
---
Qubes Source Code Repositories
==============================
All the Qubes code is kept in Git repositories. We have divided the project into

View file

@ -8,7 +8,6 @@ ref: 49
title: Safe Remote Dom0 Terminals
---
Safe Remote Dom0 Terminals
==========================
If you do not have working graphics in Dom0, then using a terminal can be quite annoying!

View file

@ -8,7 +8,6 @@ ref: 33
title: Google Summer of Code
---
2021 Google Summer of Code
================
## Information for Students

View file

@ -7,7 +7,6 @@ ref: 26
title: Join
---
Joining the Qubes OS Team
=========================
The Qubes OS Project does not currently have any open positions.

View file

@ -7,7 +7,6 @@ ref: 29
title: Package Contributions
---
Package Contributions
=====================
_This page is for developers who wish to contribute packages.

View file

@ -8,7 +8,6 @@ ref: 20
title: Qubes R3.0 Release Schedule
---
Qubes R3.0 Release Schedule
===========================
| Date | Stage |

View file

@ -8,7 +8,6 @@ ref: 17
title: Qubes R3.1 Release Schedule
---
Qubes R3.1 Release Schedule
===========================
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View file

@ -8,7 +8,6 @@ ref: 22
title: Qubes R3.2 Release Schedule
---
Qubes R3.2 Release Schedule
===========================
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View file

@ -7,7 +7,6 @@ ref: 23
title: Qubes R4.0 release notes
---
Qubes R4.0 release notes
========================
New features since 3.2

View file

@ -8,7 +8,6 @@ ref: 24
title: Qubes R4.0 Release Schedule
---
Qubes R4.0 Release Schedule
===========================
This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).

View file

@ -7,7 +7,6 @@ ref: 13
title: Release Notes
---
Release Notes
=============
* [Qubes R1.0 release notes](/doc/releases/1.0/release-notes/)

View file

@ -7,7 +7,6 @@ ref: 15
title: Release Schedules
---
Release Schedules
=================
* [Qubes R3.0 release schedule](/doc/releases/3.0/schedule/)

View file

@ -8,7 +8,6 @@ ref: 14
title: Release Checklist
---
Release Checklist
=================
*the checklist is probably unfinished*

View file

@ -10,7 +10,6 @@ ref: 43
title: Dom0 Secure Updates
---
Qubes Dom0 secure update procedure
==================================
Reasons for Dom0 updates

View file

@ -10,7 +10,6 @@ ref: 34
title: DVMimpl
---
DisposableVM implementation in Qubes
====================================
**Note: The content below applies to Qubes R3.2.**

View file

@ -10,7 +10,6 @@ ref: 35
title: Qfilecopy
---
InterVM file copy design
========================
There are two cases when we need a mechanism to copy files between VMs:

View file

@ -11,11 +11,9 @@ title: Qfileexchgd
---
**This mechanism is obsolete as of Qubes Beta 1!**
==================================================
Please see this [page](/doc/qfilecopy/) instead.
qfilexchgd, the Qubes file exchange daemon
==========================================
Overview

View file

@ -10,7 +10,6 @@ ref: 41
title: Qmemman
---
qmemman, Qubes memory manager
=============================
Rationale

View file

@ -11,7 +11,6 @@ ref: 56
title: Architecture
---
Qubes Architecture Overview
===========================
Qubes implements a Security by Isolation approach. To do this, Qubes utilizes virtualization technology in order to isolate various programs from each other and even to sandbox many system-level components, such as networking and storage subsystems, so that the compromise of any of these programs or components does not affect the integrity of the rest of the system.

View file

@ -7,7 +7,6 @@ ref: 60
title: Audio Virtualization
---
Audio Virtualization
====================
VMs on Qubes OS have access to virtualized audio through the PulseAudio module.

View file

@ -11,7 +11,6 @@ ref: 61
title: GUI
---
Qubes GUI protocol
==================
qubes_gui and qubes_guid processes

View file

@ -11,7 +11,6 @@ ref: 55
title: Security-critical Code
---
Security-critical Code in Qubes OS
==================================
Below is a list of security-critical (i.e., trusted) code components in Qubes OS.

View file

@ -7,7 +7,6 @@ ref: 57
title: Storage Pools
---
Storage Pools in Qubes
======================
Qubes OS R3.2 introduced the concept of storage drivers and pools. This feature