mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2025-08-03 03:56:38 -04:00
Remove redundant titles
First pass for all titles still using the old '=====' syntax https://github.com/QubesOS/qubes-issues/issues/6701#issuecomment-862060759
This commit is contained in:
parent
0c95b3ae4d
commit
f822b70435
65 changed files with 0 additions and 66 deletions
|
@ -11,7 +11,6 @@ ref: 180
|
|||
title: Config Files
|
||||
---
|
||||
|
||||
Configuration Files
|
||||
===================
|
||||
|
||||
Qubes-specific VM config files
|
||||
|
|
|
@ -8,7 +8,6 @@ ref: 176
|
|||
title: KDE
|
||||
---
|
||||
|
||||
Using KDE in dom0
|
||||
=================
|
||||
|
||||
Installation
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 175
|
|||
title: Mounting and Decrypting Qubes Partitions from Outside Qubes
|
||||
---
|
||||
|
||||
Mount and Decrypt Qubes Partition from Outside Qubes
|
||||
====================================================
|
||||
|
||||
When a Qubes OS install is unbootable or booting it is otherwise undesirable, this process allows for the recovery of files stored within the system.
|
||||
|
|
|
@ -7,7 +7,6 @@ ref: 178
|
|||
title: RPC Policies
|
||||
---
|
||||
|
||||
RPC Policies
|
||||
============
|
||||
|
||||
This document explains the basics of RPC policies in Qubes.
|
||||
|
|
|
@ -9,7 +9,6 @@ ref: 207
|
|||
title: Emergency Backup Recovery (v2)
|
||||
---
|
||||
|
||||
Emergency Backup Recovery without Qubes (v2)
|
||||
============================================
|
||||
|
||||
This page describes how to perform emergency restore of backup created on Qubes
|
||||
|
|
|
@ -9,7 +9,6 @@ ref: 201
|
|||
title: Emergency Backup Recovery (v3)
|
||||
---
|
||||
|
||||
Emergency Backup Recovery without Qubes (v3)
|
||||
============================================
|
||||
|
||||
This page describes how to perform an emergency restore of a backup created on
|
||||
|
|
|
@ -9,7 +9,6 @@ ref: 192
|
|||
title: Emergency Backup Recovery (v4)
|
||||
---
|
||||
|
||||
Emergency Backup Recovery without Qubes (v4)
|
||||
============================================
|
||||
|
||||
This page describes how to perform an emergency restore of a backup created on
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 199
|
|||
title: Backup, restoration, and migration
|
||||
---
|
||||
|
||||
Backup, restoration, and migration
|
||||
==================================
|
||||
|
||||
With Qubes, it's easy and secure to back up and restore your whole system, as well as to migrate between two physical machines.
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 196
|
|||
title: Copying and pasting text between qubes
|
||||
---
|
||||
|
||||
Copying and pasting text between qubes
|
||||
======================================
|
||||
|
||||
*This page is about copying and pasting plain text.
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 191
|
|||
title: Copying and moving files between qubes
|
||||
---
|
||||
|
||||
Copying and moving files between qubes
|
||||
======================================
|
||||
|
||||
*This page is about copying and moving files.
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 205
|
|||
title: Full Screen Mode
|
||||
---
|
||||
|
||||
Enabling Full Screen Mode for select VMs
|
||||
========================================
|
||||
|
||||
What is full screen mode?
|
||||
|
|
|
@ -9,7 +9,6 @@ ref: 204
|
|||
title: Optical Discs
|
||||
---
|
||||
|
||||
Optical Discs
|
||||
=============
|
||||
|
||||
Passthrough reading and recording (a.k.a., "burning") are not supported by Xen.
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 206
|
|||
title: Volume Backup and Revert
|
||||
---
|
||||
|
||||
Qubes Volume Backup and Revert
|
||||
==============================
|
||||
|
||||
With Qubes, it is possible to revert one of a VM's storage volumes to a previous
|
||||
|
|
|
@ -7,7 +7,6 @@ ref: 148
|
|||
title: Download Mirrors
|
||||
---
|
||||
|
||||
Qubes Download Mirrors
|
||||
======================
|
||||
|
||||
List of Download Mirrors
|
||||
|
|
|
@ -7,7 +7,6 @@ ref: 147
|
|||
title: Testing new releases and updates
|
||||
---
|
||||
|
||||
Testing new releases and updates
|
||||
================================
|
||||
|
||||
Testing new Qubes OS releases and updates is one of the most helpful ways in which you can [contribute](/doc/contributing/) to the Qubes OS Project.
|
||||
|
|
|
@ -11,7 +11,6 @@ ref: 156
|
|||
title: Upgrading to R2
|
||||
---
|
||||
|
||||
Upgrading Qubes R2 Beta 3 to R2
|
||||
===================================
|
||||
|
||||
Current Qubes R2 Beta 3 (R2B3) systems can be upgraded in-place to the latest R2 (R2) release by following the procedure below.
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 163
|
|||
title: Upgrading to R2B1
|
||||
---
|
||||
|
||||
Upgrading Qubes R1 to R2 Beta 1
|
||||
===============================
|
||||
|
||||
**Note: Qubes R2 Beta 1 is no longer supported! Please install or upgrade to a newer Qubes R2.**
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 160
|
|||
title: Upgrading to R2B2
|
||||
---
|
||||
|
||||
Upgrading Qubes R1 to R2 (beta2)
|
||||
================================
|
||||
|
||||
Existing users of Qubes R1 (but not R1 betas!) can upgrade their systems to the latest R2 beta release by following the procedure below. As usual, it is advisable to backup the system before proceeding with the upgrade. While it is possible to upgrade the system **it is strongly recommended to reinstall it**. You will preserve all your data and settings thanks to [backup and restore tools](/doc/backup-restore/).
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 157
|
|||
title: Upgrading to R2B3
|
||||
---
|
||||
|
||||
Upgrading Qubes R2 Beta 2 to R2 Beta 3
|
||||
======================================
|
||||
|
||||
Current Qubes R2 Beta 2 (R2B2) systems can be upgraded in-place to the latest R2 Beta 3 (R2B3) release by following the procedure below. However, upgrading in-place is riskier than performing a clean installation, since there are more things which can go wrong. For this reason, **we strongly recommended that users perform a [clean installation](/doc/installation-guide/) of Qubes R2 Beta 3**.
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 162
|
|||
title: Upgrading to R4.0
|
||||
---
|
||||
|
||||
Upgrading Qubes R3.2 to R4.0
|
||||
============================
|
||||
|
||||
**Before attempting either an in-place upgrade or a clean installation, we strongly recommend that users [back up their systems](/doc/backup-restore/).**
|
||||
|
|
|
@ -7,7 +7,6 @@ ref: 158
|
|||
title: Upgrade Guides
|
||||
---
|
||||
|
||||
Qubes OS Upgrade Guides
|
||||
=======================
|
||||
|
||||
These guides are for upgrading from one version of Qubes to another.
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 151
|
|||
title: Version Scheme
|
||||
---
|
||||
|
||||
Version Scheme
|
||||
==============
|
||||
|
||||
Beginning with R3 release, we change (and formalise) the versioning scheme.
|
||||
|
|
|
@ -12,7 +12,6 @@ ref: 146
|
|||
title: Hardware Compatibility List (HCL)
|
||||
---
|
||||
|
||||
Hardware Compatibility List (HCL) for All Qubes OS Releases
|
||||
===========================================================
|
||||
|
||||
The [HCL](/hcl) is a compilation of reports generated and submitted by users across various Qubes versions about their hardware's compatibility with Qubes.
|
||||
|
|
|
@ -8,7 +8,6 @@ ref: 128
|
|||
title: How to Reinstall a TemplateVM
|
||||
---
|
||||
|
||||
How to Reinstall a TemplateVM
|
||||
=============================
|
||||
|
||||
If you suspect your [TemplateVM](/doc/templates/) is broken, misconfigured, or compromised, you can reinstall any TemplateVM that was installed from the Qubes repository.
|
||||
|
|
|
@ -7,7 +7,6 @@ ref: 129
|
|||
title: Windows VMs
|
||||
---
|
||||
|
||||
Windows VMs in Qubes OS
|
||||
=======================
|
||||
|
||||
Like any other unmodified OSes, Windows can be installed in Qubes as an [HVM](/doc/standalone-and-hvm/) domain.
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 140
|
|||
title: Glossary
|
||||
---
|
||||
|
||||
Glossary of Qubes Terminology
|
||||
=============================
|
||||
|
||||
Qubes OS
|
||||
|
|
|
@ -13,7 +13,6 @@ ref: 141
|
|||
title: Command-Line Tools
|
||||
---
|
||||
|
||||
Command-Line Tools
|
||||
==================
|
||||
|
||||
Dom0
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 164
|
|||
title: Anti Evil Maid (AEM)
|
||||
---
|
||||
|
||||
Installing and Using Anti Evil Maid (AEM) with Qubes OS
|
||||
=======================================================
|
||||
|
||||
Background
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 171
|
|||
title: Data Leaks
|
||||
---
|
||||
|
||||
Understanding and Preventing Data Leaks
|
||||
=======================================
|
||||
|
||||
The Role of the Firewall
|
||||
|
|
|
@ -11,7 +11,6 @@ ref: 166
|
|||
title: The Qubes Firewall
|
||||
---
|
||||
|
||||
The Qubes Firewall
|
||||
==================
|
||||
|
||||
Understanding firewalling in Qubes
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 165
|
|||
title: Passwordless Root Access in VMs
|
||||
---
|
||||
|
||||
Passwordless Root Access in VMs
|
||||
===============================
|
||||
|
||||
Background (`/etc/sudoers.d/qubes` in VM):
|
||||
|
|
|
@ -10,7 +10,6 @@ ref: 202
|
|||
title: Managing AppVm Shortcuts
|
||||
---
|
||||
|
||||
Managing shortcuts to applications in AppVMs
|
||||
============================================
|
||||
|
||||
For ease of use Qubes aggregates shortcuts to applications that are installed in AppVMs and shows them in one "start menu" in dom0.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue