mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
12 KiB
12 KiB
layout | title | permalink | redirect_from | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
doc-index | Documentation | /doc/ |
|
User Documentation
The Basics
Security Information
- Security Center
- Security FAQ
- Security Pack
- Security Bulletins
- Canaries
- Xen Security Advisory (XSA) Tracker
- Why and How to Verify Signatures
- Qubes PGP Keys
Choosing Your Hardware
Installing & Upgrading Qubes
- Qubes Downloads
- Qubes Download Mirrors
- Installation Guide
- Upgrade Guides
- Why and How to Verify Signatures
- Security Considerations when Installing
- Try Qubes without installing: Qubes Live USB (alpha)
- Supported Versions
- Version Scheme
- Custom Installation
- Testing new releases and updates
Common Tasks
- Copying and Pasting Text Between Domains
- Copying and Moving Files Between Domains
- Copying from (and to) dom0
- Updating Software in dom0
- Updating and Installing Software in VMs
- Backup, Restoration, and Migration
- Using Disposable VMs
- Using and Managing USB Devices
- Recording Optical Discs
- Managing Application Shortcuts
- Enabling Fullscreen Mode
- Tips and Tricks
Managing Operating Systems within Qubes
- TemplateVMs
- Templates: Fedora
- Templates: Fedora Minimal
- Templates: Debian
- Templates: Archlinux
- Templates: Ubuntu
- Templates: Whonix
- Pentesting
- Pentesting: BlackArch
- Pentesting: Kali
- Pentesting: PTF
- Windows
- Creating and Using HVM Domains
- Tips for Using Linux in an HVM
- Creating a NetBSD VM
- How to Reinstall a TemplateVM
Security Guides
- Qubes OS Project Security Information
- Security Guidelines
- Understanding Qubes Firewall
- Understanding and Preventing Data Leaks
- Installing Anti Evil Maid
- Using Multi-factor Authentication with Qubes
- Using GPG more securely in Qubes: Split GPG
- How to Set Up a Split Bitcoin Wallet in Qubes
- [Unofficial] Split dm-crypt
- Configuring YubiKey for user authentication
- Note regarding password-less root access in VM
Privacy Guides
- Whonix for Privacy & Anonymity
- Running Tails in Qubes
- Anonymizing your MAC Address
- Martus
- Signal
- Reducing the fingerprint of the text-based web browser w3m
Configuration Guides
- Configuration Files
- How to set up a ProxyVM as a VPN Gateway
- Storing AppVMs on Secondary Drives
- Multibooting
- Resize Disk Image
- RPC Policies
- Installing ZFS in Qubes
- Mutt Guide
- Postfix Guide
- Fetchmail Guide
- Creating Custom NetVMs and ProxyVMs
- How to make proxy for individual tcp connection from networkless VM
- Make an HTTP Filtering Proxy in a FirewallVM
- Adding Bridge Support to the NetVM (EXPERIMENTAL)
- Assigning PCI Devices to AppVMs
- Enabling TRIM for SSD disks
- Configuring a Network Printer
- Using External Audio Devices
- Rxvt Guide
- Managing VM kernel
- Salt management stack
- Adding SSD storage cache
- How to Make a Multimedia TemplateVM
Customization Guides
- DispVM Customization
- Customizing Fedora minimal templates
- Customizing Windows 7 templates
- Using KDE in dom0
- Installing XFCE in dom0
- Installing i3 in dom0
- Language Localization
- Dark Theme in Dom0 and DomU
- How to make any file in a TemplateBasedVM persistent using bind-dirs
Troubleshooting
- Home directory is out of disk space error
- Installing on system with new AMD GPU (missing firmware problem)
- How to install an Nvidia driver in dom0
- Nvidia troubleshooting guide
- Lenovo ThinkPad Troubleshooting
- Apple MacBook Troubleshooting
- Getting Sony Vaio Z laptop to work with Qubes
- Troubleshooting UEFI related problems
- Fixing wireless on suspend & resume
- How to remove VMs manually
- Intel Integrated Graphics Troubleshooting
Reference Pages
- Command-Line Tools: Qubes 3.2, dom0
- Command-Line Tools: Qubes 3.2, domU
- Command-Line Tools: Qubes 4.0, dom0
- Command-Line Tools: Qubes 4.0, domU
- Glossary of Qubes Terminology
- Qubes Service Framework
- Command Execution in VMs (and Qubes RPC)
Presentation Slides
- [PDF] LinuxCon 2014 -- Qubes OS R2 Tutorial
- [PDF] LinuxCon 2014 -- Qubes OS Keynote
- [PDF] RMLL 2016 -- Improving client systems security with Qubes OS
- [PDF] Golem and Friends 2017 -- Towards Reasonably Secure Computing in the Decentralized World
Developer Documentation
The Basics
- Developer FAQ
- Report a Security Issue
- Report a Bug
- How to Contribute
- Package Contributions
- Testing new releases and updates
- Source Code
- Qubes OS License
- Coding Guidelines
- Documentation Guidelines
- Code Signing
- Community-Developed Feature Tracker
- Books for Developers
- Style Guide
- Usability & UX
Security Information
- Security Center
- Security FAQ
- Security Pack
- Security Bulletins
- Security Bulletin Checklist
- Security Bulletin Template
- Canaries
- Canary Template
- Xen Security Advisory (XSA) Tracker
- Why and How to Verify Signatures
- Qubes PGP Keys
System
- Qubes OS Architecture Overview
- Qubes OS Architecture Spec v0.3 [PDF]
- Security-critical elements of Qubes OS
- Qubes Core Admin
- Qubes Core Admin Client
- Qubes Admin API
- Qubes Core Stack
- Qrexec: command execution in VMs
- Qubes GUI virtualization protocol
- Networking in Qubes
- Implementation of template sharing and updating
- Storage Pools
Services
- Inter-domain file copying (deprecates
qfileexchgd
) - Dynamic memory management in Qubes
- Implementation of DisposableVMs
- Article about disposable VMs
- Dom0 secure update mechanism
Debugging
- Profiling python code
- Test environment in separate machine for automatic tests
- Automated tests
- VM-dom0 internal configuration interface
- Debugging Windows VMs
- Safe Remote Dom0 Terminals
Building
- Building Qubes ("API" Details)
- Development Workflow
- Building Qubes OS ISO
- Building Qubes Templates
- Building a TemplateVM based on a new OS (ArchLinux example)
- Building the Archlinux Template
- How to compile kernels for dom0