Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file removed attachment/doc/r4.0-open-in-dispvm-1.png
Binary file not shown.
Binary file removed attachment/doc/r4.0-open-in-dispvm-2.png
Binary file not shown.
Binary file removed attachment/doc/r4.0-open-in-dispvm-3.png
Binary file not shown.
Binary file added attachment/doc/r4.3-disp-default-global.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added attachment/doc/r4.3-disp-default-local.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added attachment/doc/r4.3-disp-preload-global.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added attachment/doc/r4.3-disp-preload-local.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added attachment/doc/r4.3-dom0-menu-disp-firefox.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
4 changes: 4 additions & 0 deletions conf.py
Original file line number Diff line number Diff line change
Expand Up @@ -155,4 +155,8 @@
rst_epilog = """
.. |debian-codename| replace:: bookworm
.. |debian-version| replace:: 12
.. |qubes-logo-icon| image:: /attachment/icons/128x128/apps/qubes-logo-icon.png
:height: 1em
:class: no-scaled-link
:alt: Qubes logo icon
"""
178 changes: 146 additions & 32 deletions developer/services/disposablevm-implementation.rst

Large diffs are not rendered by default.

18 changes: 10 additions & 8 deletions introduction/getting-started.rst
Original file line number Diff line number Diff line change
Expand Up @@ -73,17 +73,17 @@ Qube Manager

To see all of your qubes at the same time, you can use the **Qube Manager**. It displays the states of all the qubes in your system, even the ones that aren’t running.

To access Qube Manager go to: Qubes Icon (App Menu) → Settings Icon → Qubes Tools → **Qube Manager**
To access Qube Manager go to |qubes-logo-icon|:menuselection:`App Menu (Q icon) --> Settings (icon) --> Qubes Tools --> Qube Manager`

|r4.1-qubes-manager.png|

Command-line interface
^^^^^^^^^^^^^^^^^^^^^^


All aspects of Qubes OS can be controlled using command-line tools such as the terminal emulator. The default terminal emulator in Qubes is Xfce Terminal. Opening a terminal emulator in dom0 can be done in several ways:
All aspects of Qubes OS can be controlled using command-line tools such as the terminal emulator. The default terminal emulator in Qubes is Xfce Terminal. Opening a terminal emulator in :term:`dom0` can be done in several ways:

- Go to the App Menu, click on the Settings icon, choose Other from the drop-down menu, and select **Xfce Terminal Emulator** at the bottom.
- Using the application menu: |qubes-logo-icon|:menuselection:`Qubes App Menu (Q icon) --> Settings (icon) --> Other --> Xfce Terminal`.

- Press ``Alt`` + ``F3`` and search for ``xfce terminal``.

Expand Down Expand Up @@ -117,17 +117,19 @@ Adding, removing, and listing qubes

To create a new qube or remove one, use **Create Qubes VM** option in the App Menu.

Creating a New Qube: Qubes Icon → Settings Qubes Tools → Qube Manager → Create Qubes VM → **New Qube**
Creating a new qube, |qubes-logo-icon|:menuselection:`App Menu (Q icon) --> Settings (icon) --> Qubes Tools --> Create New Qube`.

Removing a qube: To remove a qube, use the **Delete qube button** as the final step instead.
To remove a qube, |qubes-logo-icon|:menuselection:`App Menu (Q icon) --> <QUBE> --> Settings --> Delete qube`, where :samp:`{<QUBE>}` is the qube you desire to delete.

To list qubes, use the :ref:`Qube Manager <introduction/getting-started:qube manager>`.

You can also add, remove, and list qubes from the command line using the following tools:

- ``qvm-create``
- :program:`qvm-create`

- ``qvm-remove``
- :program:`qvm-remove`

- ``qvm-ls``
- :program:`qvm-ls`



Expand Down
15 changes: 7 additions & 8 deletions introduction/screenshots.rst
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ Here we see Xfce4.14 Window Manager running in Dom0 (instead of KDE as on previo

|r4.0-password-prompt.png|

It is always clearly visible to which domain a given window belongs. Here it’s immediately clear that the passphrase-prompting window belongs to some domain with the “blue” label. When we look at the titlebar, we see “[qubes]”, which is the name of the actual domain. Theoretically, the untrusted application (here, the red Tor Browser running in a DisposableVM) beneath the prompt window could draw a similar looking window within its contents. In practice, this would be very hard, because it doesn’t know, e.g., the exact decoration style that is in use. However, if this is a concern, the user can simply try to move the more trusted window onto some empty space on the desktop such that no other window is present beneath it. Or, better yet, use the Expose-like effect (available via a hot-key). A malicious application from an untrusted domain cannot spoof the whole desktop because the trusted Window Manager will never let any domain “own” the whole screen. Its titlebar will always be visible.
It is always clearly visible to which domain a given window belongs. Here it’s immediately clear that the passphrase-prompting window belongs to some domain with the “blue” label. When we look at the titlebar, we see “[qubes]”, which is the name of the actual domain. Theoretically, the untrusted application (here, the red Tor Browser running in a :term:`disposable`) beneath the prompt window could draw a similar looking window within its contents. In practice, this would be very hard, because it doesn’t know, e.g., the exact decoration style that is in use. However, if this is a concern, the user can simply try to move the more trusted window onto some empty space on the desktop such that no other window is present beneath it. Or, better yet, use the Expose-like effect (available via a hot-key). A malicious application from an untrusted domain cannot spoof the whole desktop because the trusted Window Manager will never let any domain “own” the whole screen. Its titlebar will always be visible.


----
Expand Down Expand Up @@ -91,18 +91,17 @@ Qubes supports secure copy-and-paste operations between AppVMs. Only the user ca
----


|r4.0-copy-to-other-appvm-1.png| |r4.0-copy-to-other-appvm-3.png|
|r4.0-copy-to-other-appvm-1.png| |r4.0-copy-to-other-appvm-3.png|

Qubes also supports secure file copying between AppVMs.


----


|r4.0-open-in-dispvm-1.png| |r4.0-open-in-dispvm-2.png|

Qubes’ unique DisposableVMs (DispVMs) allow the user to open any file in a disposable VM in a matter of seconds! A file can be edited in a disposable VM, and any changes are projected back onto the original file. Currently, there is no way to mark files to be automatically opened in a disposable VM (one needs to right-click on the file and choose the “View in DisposableVM” or “Edit in DisposableVM” option), but this is planned for the R2 Beta 3 release.
|r4.3-domU-filemanager-disp-pdfviewer.png| |r4.3-domU-filemanager-disp-pdfviewer-open.png|

Qubes' unique :term:`disposable` qubes allow the user to open any file in a disposable VM in a matter of seconds! A file can be edited in a disposable qube, and any changes are projected back onto the original file.

----

Expand Down Expand Up @@ -140,10 +139,10 @@ And some more screenshots:
.. |r4.0-manager-and-sysnet-network-prompt.png| image:: /attachment/doc/r4.0-manager-and-sysnet-network-prompt.png
.. |r4.0-software-update.png| image:: /attachment/doc/r4.0-software-update.png
.. |r4.0-copy-paste.png| image:: /attachment/doc/r4.0-copy-paste.png
.. |r4.0-copy-to-other-appvm-1.png| image:: /attachment/doc/r4.0-copy-to-other-appvm-1.png
.. |r4.0-copy-to-other-appvm-1.png| image:: /attachment/doc/r4.0-copy-to-other-appvm-1.png
.. |r4.0-copy-to-other-appvm-3.png| image:: /attachment/doc/r4.0-copy-to-other-appvm-2.png
.. |r4.0-open-in-dispvm-1.png| image:: /attachment/doc/r4.0-open-in-dispvm-1.png
.. |r4.0-open-in-dispvm-2.png| image:: /attachment/doc/r4.0-open-in-dispvm-2.png
.. |r4.3-domU-filemanager-disp-pdfviewer.png| image:: /attachment/doc/r4.3-domU-filemanager-disp-pdfviewer.png
.. |r4.3-domU-filemanager-disp-pdfviewer-open.png| image:: /attachment/doc/r4.3-domU-filemanager-disp-pdfviewer-open.png
.. |r4.0-convert-to-trusted-pdf-1.png| image:: /attachment/doc/r4.0-convert-to-trusted-pdf-1.png
.. |r4.1-converting-pdf.png| image:: /attachment/doc/r4.1-converting-pdf.png
.. |r4.0-manager-firewall.png| image:: /attachment/doc/r4.0-manager-firewall.png
Expand Down
Loading