mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-05-02 06:46:11 -04:00
Remove redundant titles
First pass for all titles still using the old '=====' syntax https://github.com/QubesOS/qubes-issues/issues/6701#issuecomment-862060759
This commit is contained in:
parent
0c95b3ae4d
commit
f822b70435
65 changed files with 0 additions and 66 deletions
|
@ -11,7 +11,6 @@ ref: 56
|
|||
title: Architecture
|
||||
---
|
||||
|
||||
Qubes Architecture Overview
|
||||
===========================
|
||||
|
||||
Qubes implements a Security by Isolation approach. To do this, Qubes utilizes virtualization technology in order to isolate various programs from each other and even to sandbox many system-level components, such as networking and storage subsystems, so that the compromise of any of these programs or components does not affect the integrity of the rest of the system.
|
||||
|
|
|
@ -7,7 +7,6 @@ ref: 60
|
|||
title: Audio Virtualization
|
||||
---
|
||||
|
||||
Audio Virtualization
|
||||
====================
|
||||
|
||||
VMs on Qubes OS have access to virtualized audio through the PulseAudio module.
|
||||
|
|
|
@ -11,7 +11,6 @@ ref: 61
|
|||
title: GUI
|
||||
---
|
||||
|
||||
Qubes GUI protocol
|
||||
==================
|
||||
|
||||
qubes_gui and qubes_guid processes
|
||||
|
|
|
@ -11,7 +11,6 @@ ref: 55
|
|||
title: Security-critical Code
|
||||
---
|
||||
|
||||
Security-critical Code in Qubes OS
|
||||
==================================
|
||||
|
||||
Below is a list of security-critical (i.e., trusted) code components in Qubes OS.
|
||||
|
|
|
@ -7,7 +7,6 @@ ref: 57
|
|||
title: Storage Pools
|
||||
---
|
||||
|
||||
Storage Pools in Qubes
|
||||
======================
|
||||
|
||||
Qubes OS R3.2 introduced the concept of storage drivers and pools. This feature
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue