mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
10 KiB
10 KiB
layout | title | permalink | redirect_from | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
default | Documentation | /doc/ |
|
User Documentation
The Basics
- What is Qubes OS?
- Video Tours
- Screenshots
- Getting Started
- User FAQ
- Mailing Lists
- Report a Security Issue
- Report a Bug
Choosing Your Hardware
- System Requirements
- Hardware Compatibility List (HCL)
- Qubes-Certified Laptops
- Hardware Certification
Installing & Upgrading Qubes
- Qubes Downloads
- Installation Guide
- Upgrade Guides
- Why and How to Verify Signatures
- Security Considerations when Installing
- Try Qubes without installing: Qubes Live USB (alpha)
- Supported Versions
- Version Scheme
- Manual Encryption Configuration
Common Tasks
- Copying and Pasting Text Between Domains
- Copying and Moving Files Between Domains
- Copying Files to and from dom0
- Updating Software in dom0
- Updating and Installing Software in VMs
- Backup, Restoration, and Migration
- Using Disposable VMs
- Using and Managing USB Devices
- Recording Optical Discs
- Managing Application Shortcuts
- Enabling Fullscreen Mode
Managing Operating Systems within Qubes
- TemplateVMs
- Templates: Fedora - minimal
- Templates: Debian
- Templates: Archlinux
- Templates: Ubuntu
- Templates: Whonix
- How to Reinstall a TemplateVM
- Pentesting
- Pentesting: BlackArch
- Pentesting: Kali
- Pentesting: PTF
- Installing and Using Windows-based AppVMs (Qubes R2 Beta 3 and later)
- Creating and Using HVM and Windows Domains (Qubes R2+)
- Advanced options and troubleshooting of Qubes Tools for Windows (R3)
- Advanced options and troubleshooting of Qubes Tools for Windows (R2)
- Uninstalling Qubes Tools for Windows 2.x
- Upgrading the Fedora 23 Template
- Upgrading the Fedora 21 Template
- Upgrading the Fedora 20 Template
- Upgrading the Fedora 18 Template
- Upgrading the Debian 8 Template
- Tips for Using Linux in an HVM
- Creating a NetBSD VM
Security Guides
- Qubes OS Project Security Information
- Security Guidelines
- Understanding Qubes Firewall
- Understanding and Preventing Data Leaks
- Installing Anti Evil Maid
- Using Multi-factor Authentication with Qubes
- Using GPG more securely in Qubes: Split GPG
- How to Set Up a Split Bitcoin Wallet in Qubes
- [Unofficial] Split dm-crypt
- Configuring YubiKey for user authentication
- Note regarding password-less root access in VM
Privacy Guides
- Whonix for Privacy & Anonymity
- Running Tails in Qubes
- Anonymizing your MAC Address
- TorVM
- Martus
- Signal
Configuration Guides
- Configuration Files
- How to set up a ProxyVM as a VPN Gateway
- Storing AppVMs on Secondary Drives
- Where are my external storage devices mounted?
- Multibooting
- Resizing AppVM and HVM Disk Images
- Extending
root.img
Size - Installing ZFS in Qubes
- Mutt Guide
- Postfix Guide
- Fetchmail Guide
- Creating Custom NetVMs and ProxyVMs
- How to make proxy for individual tcp connection from networkless VM
- Make an HTTP Filtering Proxy in a FirewallVM
- Adding Bridge Support to the NetVM (EXPERIMENTAL)
- Assigning PCI Devices to AppVMs
- Enabling TRIM for SSD disks
- Configuring a Network Printer
- Using External Audio Devices
- Booting with GRUB2 and GPT
- Rxvt Guide
- Managing VM kernel
- Salt management stack
- Adding SSD storage cache
Customization Guides
- DispVM Customization
- Customizing Fedora minimal templates
- Customizing Windows 7 templates
- Using KDE in dom0
- Installing XFCE in dom0
- Installing i3 in dom0
- Language Localization
- Dark Theme in Dom0 and DomU
- How to make any file in a TemplateBasedVM persistent using bind-dirs
Troubleshooting
- Home directory is out of disk space error
- Installing on system with new AMD GPU (missing firmware problem)
- How to install an Nvidia driver in dom0
- Nvidia troubleshooting guide
- Lenovo ThinkPad Troubleshooting
- Apple MacBook Troubleshooting
- Getting Sony Vaio Z laptop to work with Qubes
- Troubleshooting UEFI related problems
Reference Pages
- Dom0 Command-Line Tools
- DomU Command-Line Tools
- Glossary of Qubes Terminology
- Qubes Service Framework
- Command Execution in VMs (and Qubes RPC)
Presentation Slides
- [PDF] LinuxCon 2014 -- Qubes OS R2 Tutorial
- [PDF] LinuxCon 2014 -- Qubes OS Keynote
- [PDF] RMLL 2016 -- Improving client systems security with Qubes OS
Developer Documentation
The Basics
- Developer FAQ
- Report a Security Issue
- Report a Bug
- Source Code
- Feature Development Tracker
- How to Contribute
- Coding Guidelines
- Documentation Guidelines
- Code Signing
- Qubes OS License
- Books for Developers
- Style Guide
- Usability & UX
System
- Qubes OS Architecture Overview
- Qubes OS Architecture Spec v0.3 [PDF]
(The original 2009 document that started this all...) - Security-critical elements of Qubes OS
- Qrexec: command execution in VMs
- Qubes GUI virtualization protocol
- Networking in Qubes
- Implementation of template sharing and updating
Services
- Inter-domain file copying (deprecates
qfileexchgd
) - Dynamic memory management in Qubes
- Implementation of DisposableVMs
- Article about disposable VMs
- Dom0 secure update mechanism
- VM secure update mechanism (forthcoming)
Debugging
- Profiling python code
- Test environment in separate machine for automatic tests
- Automated tests
- VM-dom0 internal configuration interface
- Debugging Windows VMs