Commit Graph

250 Commits

Author SHA1 Message Date
Andrew David Wong
78b185edc5
Explain how to decrypt qubes.xml.000.enc
Closes QubesOS/qubes-issues#4728
2019-03-02 01:37:08 -06:00
jamke
ec997acbb4
Fix typo: "enviroment" 2019-02-08 21:13:43 +07:00
Andrew David Wong
eb1ea05c6b
Fix typos 2019-02-03 15:45:23 -06:00
Andrew David Wong
62858dedf5
Generalize optical disc documentation
- Rename file
- Rename title
- Update premalink
- Add redirect to old permalink
- Generalize content
- Unwrap lines
- Add link to /doc/security-guidelines/#dom0-precautions
- Update doc index link

Fixes QubesOS/qubes-issues#4783
2019-02-03 14:09:52 -06:00
Andrew David Wong
9c9ac43e56
Remove 4.0 example from 3.2 section; update context 2019-01-26 17:17:55 -06:00
Andrew David Wong
3f9f87ec63
Document opening in DipsVM based on non-default DVM Template
Closes QubesOS/qubes-issues#4753
2019-01-26 17:14:47 -06:00
Andrew David Wong
b7b29f0143
Revise in accordance with documentation guidelines 2019-01-26 17:13:20 -06:00
Andrew David Wong
c36933c018
Fix typo 2019-01-19 00:14:57 -06:00
Andrew David Wong
6e66cddcc9
Fix link 2018-12-08 21:40:22 -06:00
Andrew David Wong
1549a41700
Change "DispVM" to "DisposableVM" (QubesOS/qubes-issues#2671)
This patch changes all non-code, non-command instances of "DispVM" to
"DisposableVM". It also fixes a variety of orthographic errors
pertaining to this term, e.g., by correcting "Disposable VM" to
"DisposableVM".
2018-12-08 21:20:41 -06:00
Andrew David Wong
9586996f15
Add security information pertaining to DisposableVMs
This patch was prepared in collaboration with Simon Gaiser.
2018-12-03 20:11:10 -06:00
AJ Jordan
e45c756e56
Clarify in-VM yum testing instructions too 2018-11-27 00:59:03 -05:00
AJ Jordan
f458b77f82
Further clarify how to enable testing repositories 2018-11-27 00:26:31 -05:00
unman
98df46c7fc
Clarify note on fullscreen mode in HVMs
Add note on achieving full screen mode in HVMs, and reordered sections for clarity
2018-11-10 15:11:16 +00:00
straussmaus
2af81d9e7d
Specified that /etc/qubes-rpc/policy/qubes.UpdatesProxy is on dom0
Modified "Technical Details (R4.0) to specify that /etc/qubes-rpc/policy/qubes.UpdatesProxy is on dom0 not the TemplateVM
2018-10-31 03:51:06 +00:00
Andrew David Wong
c48c81d67b
Update links 2018-10-08 19:51:58 -05:00
Andrew David Wong
0b7b661d49
Fix code blocks 2018-10-08 19:37:21 -05:00
Andrew David Wong
f3eba453a0
Update and clarify dom0 software installation/update instructions 2018-10-08 19:28:48 -05:00
e6lk7dqzm83p
97d635fc07
Update dispvm.md
Adding documentation, per the suggestion in https://github.com/QubesOS/qubes-issues/issues/4160
2018-09-20 02:12:57 +00:00
Andrew David Wong
929b396eba
Add Marek's note regarding virt_mode=hvm (#693) 2018-09-03 14:50:51 -05:00
Andrew David Wong
b963d4bbc0
Merge branch 'patch-1' of https://github.com/p-suedo/qubes-doc into p-suedo-patch-1 2018-09-03 14:47:40 -05:00
unman
97e5235e38
Update usb.md
QubesOS/qubes-issues#3866 refers
2018-08-29 14:11:49 +00:00
p-suedo
4e30201dee
correcting with docs
This is not exactly like docs, but I followed https://www.qubes-os.org/doc/dispvm/ (and is also like other 3-4 specific on this page) - hope this is good. If not, tell me and I will fix better!
2018-08-24 09:10:27 +00:00
p-suedo
441c96ad8c
Small add in installing and updating
Hello Qubes! I am pretty new to this, but was reading about StandaloneVM, and think the command is only for 3.x, not 4.x. I tried copying from other material, hope I did it right! Figure is better to try myself since its little thing. Thanks!
2018-08-09 14:17:14 +00:00
Lunar
e88cfbf009
Change "true" to "True"
Without it being "True" it throws an error. I had to look at this page to figure out why it wasn't working https://www.qubes-os.org/doc/dispvm-customization/
2018-08-07 22:21:56 -05:00
awokd
096c1c2faa
change uname -r to version numbers 2018-07-25 06:31:19 +00:00
Andrew David Wong
1cf8e83cab
Update emergency backup restore documentation
- Add instructions for obtaining scrypt binary
- Use shorter notation for backup format versions
- Use reference-style links
- Fix numbering
- Clarify backup_id step
- Make language more consistent

Closes QubesOS/qubes-issues#4047
2018-07-01 18:53:47 -05:00
Andrew David Wong
bb26173089
Update Emergency Backup Recovery - format version 4
- Clarify language and fix typos
- Improve formatting
- Include example for bzip2 compression
- Wrap lines
  (This file is an exception to the normal line wrapping rule,
  since it is specifically intended to be read as plain text.)
2018-06-30 21:01:18 -05:00
Andrew David Wong
5f609b94ca
Wrap lines and use actual numbering
This file is an exception to the normal line wrapping rule, since it is
specifically intended to be read as plain text.
2018-06-30 19:56:40 -05:00
Andrew David Wong
9a2c4eadf3
Add bzip2 example and wrap lines
This file is an exception to the normal line wrapping rule, since it is
specifically intended to be read as plain text.
2018-06-30 19:52:34 -05:00
Andrew David Wong
2a4fda42c4
Merge branch 'patch-2' of https://github.com/yilmi/qubes-doc into yilmi-patch-2 2018-05-24 19:57:24 -05:00
Yassine Ilmi
bd7750cee3
Extract single vm from backup
Rephrashed
2018-05-06 18:52:06 +01:00
Yassine Ilmi
4d41fe1eab
Multiple VM's backup note
Added note to help find the id for a VM in a multiple VM backup file and extract only required files
2018-05-06 13:00:31 +01:00
Yassine Ilmi
9317cd5459
Fix bash history expansion and scrypt args order
On a freshly installed and update 4.0 GA, I tried to follow this procedure and ran into 2 issues:
- bash history expansion breaking the `echo "backup-header!$backup_pass"` because `!` and the following `$` is interpreted
- scrypt command was complaining about the first parameter being restricted to `dec` or `enc`, moved `-P` switch to 2nd position

References:
- https://www.gnu.org/software/bash/manual/html_node/History-Interaction.html
- https://www.gnu.org/software/bash/manual/html_node/Event-Designators.html#Event-Designators
- https://sanctum.geek.nz/arabesque/bash-history-expansion/
2018-05-06 12:20:14 +01:00
Andrew David Wong
aaeb0be207
Merge branch 'patch-6' of https://github.com/awokd/qubes-doc into awokd-patch-6 2018-04-01 17:41:07 -05:00
awokd
c2e150a0c1
remove shutdown appVM step from 4.0, copy intro 2018-04-01 21:42:52 +00:00
Andrew David Wong
bb3f1b7f5f
Merge branch 'patch-2' of https://github.com/awokd/qubes-doc into awokd-patch-2 2018-04-01 15:12:17 -05:00
Andrew David Wong
91992925d5
Add security warning about downgrading packages (#625) 2018-04-01 15:09:21 -05:00
awokd
9a83ea262d
remove -H 2018-04-01 19:19:04 +00:00
awokd
dbcee1689d
add qvm-volume revert example 2018-04-01 10:22:17 +00:00
awokd
4fcf776dca
add downgrade Xen example 2018-04-01 10:01:34 +00:00
Sravan Kumar
c1b12e30f6
Added shit-Insert copy for terminals cos Crtl+c kills 2018-03-30 06:13:12 -04:00
Andrew David Wong
39ac64e4a5
Revert "Add more information about updating over Tor"
This reverts commit 03668786c4.

QubesOS/qubes-issues#1948
2018-03-22 19:49:17 -05:00
unman
03668786c4
Add more information about updating over Tor 2018-03-22 14:24:26 +00:00
awokd
bba6d1e6c3
/usr/share/applications 2018-03-19 01:35:58 +00:00
awokd
122743a3c8
add .desktop example 2018-03-07 08:41:47 +00:00
awokd
6808814597
add via OS package manager 2018-03-03 19:12:37 +00:00
awokd
b81495171f
add custom shortcut creation; consistency 2018-03-03 14:53:40 +00:00
awokd
d6fcf6fd51
make dracut generic and add -H 2018-02-23 10:04:56 +00:00
Andrew David Wong
4053df96dc
Merge branch 'patch-5' of https://github.com/awokd/qubes-doc into awokd-patch-5 2018-02-23 02:58:23 -06:00