@@ -16,7 +16,7 @@ <h1 class="title">Qubes OS Cheatsheet</h1>
16
16
</ header >
17
17
< h2 id ="qubes-cheatsheet "> Qubes Cheatsheet</ h2 >
18
18
< p > < em > a summary of useful qubes commands</ em > </ p >
19
- < p > version: 3.1 </ p >
19
+ < p > version: 3.2 </ p >
20
20
< h3 id ="mini-glossary "> Mini Glossary</ h3 >
21
21
< ul >
22
22
< li > Xen - < em > Hypervisor</ em > </ li >
@@ -31,12 +31,12 @@ <h3 id="mini-glossary">Mini Glossary</h3>
31
31
< li > GUI - < em > Graphical User Interface</ em > </ li >
32
32
</ ul >
33
33
< h3 id ="vm-management "> VM Management</ h3 >
34
- < p > :!: < em > All commands are executed in Dom0 terminal (Konsole, Terminal, Xterm etc.)</ em > </ p >
34
+ < p > < em > NOTE: All commands are executed in < code > @ Dom0</ code > terminal (Konsole, Terminal, Xterm etc.)</ em > </ p >
35
35
< h4 id ="qubes-manager "> qubes-manager</ h4 >
36
36
< p > - < em > Graphical VM Manager</ em > </ p >
37
37
< p > usage: < code > qubes-manager</ code > </ p >
38
38
< h4 id ="qvm-block "> qvm-block</ h4 >
39
- < p > - < em > list/set VM PCI devices</ em > </ p >
39
+ < p > - < em > Lists/attaches VM PCI devices</ em > </ p >
40
40
< p > usage:</ p >
41
41
< ul >
42
42
< li > < p > < code > qvm-block -l [options]</ code > </ p > </ li >
@@ -47,25 +47,25 @@ <h4 id="qvm-block">qvm-block</h4>
47
47
< p > ---</ p >
48
48
< p > < code > qvm-block -A personal dom0:/home/user/extradisks/data.img</ code > - < em > attaches an additional storage for the personal-vm</ em > </ p >
49
49
< h4 id ="qvm-clone "> qvm-clone</ h4 >
50
- < p > - < em > clones an existing VM by copying all its disk files</ em > </ p >
50
+ < p > - < em > Clones an existing VM by copying all its disk files</ em > </ p >
51
51
< p > usage: < code > qvm-clone [options] <existing-vm-name> <new-clone-vm-name></ code > </ p >
52
52
< p > ---</ p >
53
53
< p > < code > qvm-clone fedora-23 fedora-23-dev</ code > - < em > create a clone of fedora-23 called fedora-23-dev</ em > </ p >
54
54
< h4 id ="qvm-firewall "> qvm-firewall</ h4 >
55
- < p > - < em > manage VM’s firewall rules</ em > </ p >
55
+ < p > - < em > Manage VM firewall rules</ em > </ p >
56
56
< p > usage: < code > qvm-firewall -l [-n] <vm-name></ code > </ p >
57
57
< p > ---</ p >
58
58
< p > < code > qvm-firewall -l personal</ code > - < em > displays the firewall settings for the personal-vm</ em > </ p >
59
59
< p > < code > qvm-firewall -l -n fedora-23</ code > - < em > displays the firewall settings for the personal-vm with port numbers</ em > </ p >
60
60
< h4 id ="qvm-ls "> qvm-ls</ h4 >
61
- < p > - < em > list VMs and various information about their state</ em > </ p >
61
+ < p > - < em > Lists VMs and various information about their state</ em > </ p >
62
62
< p > usage: < code > qvm-ls [options] <vm-name></ code > </ p >
63
63
< p > ---</ p >
64
64
< p > < code > qvm-ls</ code > - < em > lists all vms</ em > </ p >
65
65
< p > < code > qvm-ls -n</ code > - < em > show network addresses assigned to VMs</ em > </ p >
66
66
< p > < code > qvm-ls -d</ code > - < em > show VM disk utilization statistics</ em > </ p >
67
67
< h4 id ="qvm-prefs "> qvm-prefs</ h4 >
68
- < p > - < em > list /set various per-VM properties</ em > </ p >
68
+ < p > - < em > List /set various per-VM properties</ em > </ p >
69
69
< p > usage:</ p >
70
70
< ul >
71
71
< li > < p > < code > qvm-prefs -l [options] <vm-name></ code > </ p > </ li >
@@ -76,51 +76,63 @@ <h4 id="qvm-prefs">qvm-prefs</h4>
76
76
< p > < code > qvm-prefs win7-copy -s mac 00:16:3E:5E:6C:05</ code > - < em > sets a new mac for the network card</ em > </ p >
77
77
< p > < code > qvm-prefs lab-win7 -s qrexec_installed true</ code > - < em > sets the qrexec to installed</ em > </ p >
78
78
< p > < code > qvm-prefs lab-win7 -s qrexec_timeout 120</ code > - < em > usefull for windows hvm based vms</ em > </ p >
79
- < p > < code > qvm-prefs lab-win7 -s default_user joanna</ code > - < em > sets the login user to joanna</ em > </ p >
79
+ < p > < code > qvm-prefs lab-win7 -s default_user joanna</ code > - < em > sets the login user to < code > joanna</ code > </ em > </ p >
80
80
< h4 id ="qvm-run "> qvm-run</ h4 >
81
- < p > - < em > runs a specific command on a vm</ em > </ p >
81
+ < p > - < em > Runs a specific command on a vm</ em > </ p >
82
82
< p > usage: < code > qvm-run [options] [<vm-name>] [<cmd>]</ code > </ p >
83
83
< p > ---</ p >
84
84
< p > < code > qvm-run personal xterm</ code > - < em > runs xterm on personal</ em > </ p >
85
85
< p > < code > qvm-run personal xterm --pass-io</ code > - < em > runs xterm and passes all sdtin/stdout/stderr to the terminal</ em > </ p >
86
86
< p > < code > qvm-run personal "sudo dnf update" --pass-io --nogui</ code > - < em > pass a < code > dnf update</ code > command directly to the VM</ em > </ p >
87
87
< h4 id ="qvm-start "> qvm-start</ h4 >
88
- < p > - < em > starts a vm</ em > </ p >
88
+ < p > - < em > Starts a vm</ em > </ p >
89
89
< p > usage: < code > qvm-start [options] <vm-name></ code > </ p >
90
90
< p > ---</ p >
91
91
< p > < code > qvm-start personal</ code > - < em > starts the personal-vm</ em > </ p >
92
92
< p > < code > qvm-start ubuntu --cdrom personal:/home/user/Downloads/ubuntu-14.04.iso</ code > - < em > starts the ubuntu-vm with the ubuntu installation CD</ em > </ p >
93
93
< h4 id ="qvm-shutdown "> qvm-shutdown</ h4 >
94
- < p > - < em > shutdowns a vm</ em > </ p >
94
+ < p > - < em > Stops a vm</ em > </ p >
95
95
< p > usage: < code > qvm-shutdown [options] <vm-name></ code > </ p >
96
96
< p > ---</ p >
97
97
< p > < code > qvm-shutdown personal</ code > - < em > shutdowns the personal-vm</ em > </ p >
98
98
< p > < code > qvm-shutdown --all</ code > - < em > shutdowns all VM’s</ em > </ p >
99
99
< h4 id ="qvm-kill "> qvm-kill</ h4 >
100
- < p > - < em > kills a VM - same as pulling out the power cord - immediate shutdown</ em > </ p >
100
+ < p > - < em > Kills a VM - same as pulling out the power cord - immediate shutdown</ em > </ p >
101
101
< p > usage: < code > qvm-kill [options] <vm-name></ code > </ p >
102
102
< p > ---</ p >
103
103
< p > < code > qvm-kill personal</ code > - < em > pull the power cord for the personal-vm - immediate shutdown</ em > </ p >
104
104
< h4 id ="qvm-trim-template "> qvm-trim-template</ h4 >
105
- < p > - < em > trims the disk space of a template</ em > </ p >
105
+ < p > - < em > Trims the disk space of a template</ em > </ p >
106
106
< p > usage: < code > qvm-trim-template <template-name></ code > </ p >
107
107
< p > ---</ p >
108
108
< p > < code > qvm-trim-template debian-8</ code > - < em > helpful after upgrading or removing many packages/files in the template</ em > </ p >
109
109
< h4 id ="qvm-sync-appmenus "> qvm-sync-appmenus</ h4 >
110
- < p > - < em > updates desktop file templates for given StandaloneVM or TemplateVM</ em > </ p >
110
+ < p > - < em > Updates desktop file templates for given StandaloneVM or TemplateVM</ em > </ p >
111
111
< p > usage: < code > qvm-sync-appmenus [options] <vm-name></ code > </ p >
112
112
< p > ---</ p >
113
113
< p > < code > qvm-sync-appmenus archlinux-template</ code > - < em > useful for custom .desktop files or distributions not using dnf</ em > </ p >
114
114
< h3 id ="dom0 "> Dom0</ h3 >
115
115
< h4 id ="qubes-dom0-update "> qubes-dom0-update</ h4 >
116
- < p > - < em > updates software in dom0</ em > </ p >
117
- < p > usage: < code > qubes-dom0-update [--clean][--check-only][--gui] [<yum opts>][<pkg list>]</ code > </ p >
116
+ < p > - < em > Updates or installes software in dom0</ em > </ p >
117
+ < p > usage: < code > qubes-dom0-update [--enablerepo][--disablerepo][--clean][--check-only][--gui][--action=*][<pkg list>]</ code > </ p >
118
+ < p > or</ p >
119
+ < p > usage: < code > qubes-dom0-update</ code > </ p >
118
120
< p > ---</ p >
121
+ < p > < code > qubes-dom0-update --check-only</ code > - < em > checks if new dom0 updates are available</ em > </ p >
119
122
< p > < code > sudo qubes-dom0-update</ code > - < em > updates dom0</ em > </ p >
123
+ < p > < code > sudo qubes-dom0-update --gui</ code > - < em > allows to update dom0 through a graphical window</ em > </ p >
120
124
< p > < code > sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing qubes-windows-tools</ code > - < em > install the windows tools (QWT)</ em > </ p >
121
- < p > < code > sudo qubes-dom0-update kernel-3.19*</ code > - < em > install the official Fedora kernel-3.19* with Xen support</ em > </ p >
125
+ < p > ---</ p >
126
+ < p > < code > sudo qubes-dom0-update --action=search <search-term></ code > - < em > searches for package in dom0 repositories</ em > </ p >
127
+ < p > example:</ p >
128
+ < p > < code > sudo qubes-dom0-update --action=search qubes</ code > - < em > searches for all < code > qubes</ code > package in dom0 repositories</ em > </ p >
129
+ < p > < em > NOTE: The tool excludes all templates (community and ITL) by default</ em > </ p >
130
+ < p > ---</ p >
131
+ < p > < code > sudo qubes-dom0-update --action=info <package-name></ code > - < em > displays infos about the package</ em > </ p >
132
+ < p > example:</ p >
133
+ < p > < code > sudo qubes-dom0-update --action=info qubes-core-dom0</ code > - < em > displays infos about the < code > qubes-core-dom0</ code > package</ em > </ p >
122
134
< h4 id ="qubes-hcl-report "> qubes-hcl-report</ h4 >
123
- < p > - < em > generates a report about the system hardware information</ em > </ p >
135
+ < p > - < em > Generates a report about the system hardware information</ em > </ p >
124
136
< p > usage: < code > qubes-hcl-report [-s] [<vm-name>]</ code > </ p >
125
137
< p > ---</ p >
126
138
< p > < code > qubes-hcl-report</ code > - < em > prints the hardware information on the console (terminal)</ em > </ p >
@@ -129,7 +141,7 @@ <h4 id="qubes-hcl-report">qubes-hcl-report</h4>
129
141
< p > < code > qubes-hcl-report -s personal</ code > - < em > sends the detailed hardware information report to the personal-vm</ em > </ p >
130
142
< p > < strong > Note:</ strong > < code > qubes-hcl-report -s [<vm-name>]</ code > generates a more detailed report. This report can contain sensitive information. Please do not upload the report if you do not want to share those information.</ p >
131
143
< h4 id ="virsh "> virsh</ h4 >
132
- < p > - < em > management user tool for libvirt (hypervisor abstraction)</ em > </ p >
144
+ < p > - < em > Management user tool for libvirt (hypervisor abstraction)</ em > </ p >
133
145
< p > usage: < code > virsh -c xen:/// <command> [<vm-name>]</ code > </ p >
134
146
< p > ---</ p >
135
147
< p > < code > virsh -c xen:/// list</ code > - < em > list running VM’s with additional information</ em > </ p >
@@ -142,7 +154,7 @@ <h4 id="xl">xl</h4>
142
154
< p > < code > xl top</ code > - < em > Monitor host and domains in realtime</ em > </ p >
143
155
< h3 id ="domu "> DomU</ h3 >
144
156
< h4 id ="qvm-copy-to-vm "> qvm-copy-to-vm</ h4 >
145
- < p > - Copy file from one VM to another VM</ p >
157
+ < p > - < em > Copy file from one VM to another VM</ em > </ p >
146
158
< p > usage: < code > qvm-copy-to-vm <vm-name> <file> [<file+>]</ code > - < em > file</ em > can be a single file or a folder</ p >
147
159
< p > ---</ p >
148
160
< p > < code > qvm-copy-to-vm work Documents</ code > - < em > copy the < code > Documents</ code > folder to the work VM</ em > </ p >
@@ -154,7 +166,7 @@ <h4 id="qvm-copy-to-vm">qvm-copy-to-vm</h4>
154
166
< li > The command would be: < code > qvm-copy-to-vm work Documents</ code > </ li >
155
167
</ ul >
156
168
< h4 id ="qvm-open-in-vm "> qvm-open-in-vm</ h4 >
157
- < p > - Opens file in another VM</ p >
169
+ < p > - < em > Opens file in another VM</ em > </ p >
158
170
< p > usage: < code > qvm-open-in-vm <vm-name> <file></ code > - < em > file</ em > can only be a single file</ p >
159
171
< p > ---</ p >
160
172
< p > < code > qvm-open-in-vm personal document.pdf</ code > - < em > opens < code > document.pdf</ code > in the personal VM</ em > </ p >
@@ -165,10 +177,11 @@ <h4 id="list-qubes-commands">List Qubes commands</h4>
165
177
< li > Enter in console:</ li >
166
178
< li > < code > qvm-*</ code > </ li >
167
179
< li > < code > qubes*</ code > </ li >
168
- < li > Press two times < code > TAB</ code > </ li >
180
+ < li > Press 2x times < code > TAB</ code > </ li >
169
181
</ ol >
170
182
< p > Output: List of < code > qvm-*</ code > or < code > qubes*</ code > commands.</ p >
171
- < h4 id ="list-installed-qubes-packages "> List installed qubes packages</ h4 >
183
+ < h4 id ="list-installed-qubes-os-packages "> List installed Qubes OS packages</ h4 >
184
+ < p > - < em > List all installed Qubes OS packages</ em > </ p >
172
185
< p > < strong > Fedora Dom0</ strong > </ p >
173
186
< p > In VM or Dom0: < code > rpm -qa \*qubes-\*</ code > - < em > list (qubes-) installed packages</ em > </ p >
174
187
< h3 id ="filesfolders-from-and-to-dom0 "> Files/Folders from and to Dom0</ h3 >
@@ -214,12 +227,14 @@ <h3 id="copy-text-between-vm-a-and-b">Copy text between VM A and B</h3>
214
227
</ ol >
215
228
< h3 id ="troubleshoot "> Troubleshoot</ h3 >
216
229
< h4 id ="application-in-vm-does-not-start "> Application in VM does not start</ h4 >
230
+ < p > - < em > How to get more information if applications in a VM refuse to start</ em > </ p >
217
231
< p > < code > qvm-run personal "command" --pass-io</ code > - < em > pass command directly to the VM. Returns an error message command fails.</ em > </ p >
218
232
< p > < code > qvm-run personal "xterm" --pass-io</ code > - < em > pass < code > xterm</ code > command directly to the VM. Returns an error message or starts xterm.</ em > </ p >
219
233
< p > ---</ p >
220
234
< p > < code > qvm-run <vmname> "command" --pass-io --nogui</ code > - < em > pass command to VM without using the GUI</ em > </ p >
221
235
< p > < code > qvm-run personal "ls" --pass-io --nogui</ code > - < em > pass < code > ls</ code > command directly to the VM. Returns error or output.</ em > </ p >
222
236
< h4 id ="console-in-vm "> Console in VM</ h4 >
237
+ < p > - < em > Attach a console to a VM</ em > </ p >
223
238
< p > < code > virsh -c xen:/// console <vmname></ code > - < em > opens console in < code > <vmname></ code > </ em > </ p >
224
239
< p > ---</ p >
225
240
< p > < em > Why? Connect if GUI/qrexec does not work for any reason. This way you can restart/investigate a failed service.</ em > </ p >
@@ -230,7 +245,8 @@ <h4 id="console-in-vm">Console in VM</h4>
230
245
< p > < em > (and when #1130 would be implmented the same for “user”)</ em > </ p >
231
246
< p > ---</ p >
232
247
< p > In console mode press < code > CTRL</ code > + < code > ^</ code > + < code > ]</ code > on keyboard to escape from console mode.</ p >
233
- < h4 id ="domu-log-files "> DomU Log files</ h4 >
248
+ < h4 id ="appvm-log-files "> AppVM Log files</ h4 >
249
+ < p > - < em > Log files in AppVMs</ em > </ p >
234
250
< p > < code > /var/log/qubes</ code > - < em > log file directory</ em > </ p >
235
251
< p > log files per DomU VM:</ p >
236
252
< ul >
@@ -240,28 +256,31 @@ <h4 id="domu-log-files">DomU Log files</h4>
240
256
< li > < code > qubesdb.<vmname>.log</ code > - < em > qubesdb information</ em > </ li >
241
257
</ ul >
242
258
< h4 id ="get-qubes-os-version "> Get Qubes OS Version</ h4 >
259
+ < p > - < em > Get the Qubes OS release version</ em > </ p >
243
260
< p > < code > cat /etc/qubes-release</ code > - < em > prints Qubes release in human readable form</ em > </ p >
244
261
< p > < code > rpm -qa \*qubes-release\*</ code > - < em > prints exact Qubes release number</ em > </ p >
245
262
< h4 id ="get-xen-version "> Get Xen Version</ h4 >
263
+ < p > - < em > Display the Xen version</ em > </ p >
246
264
< p > < code > xl info | grep xen_version</ code > - < em > prints the Xen version</ em > </ p >
247
- < h4 id ="qubes-xen-boot "> Qubes / Xen Boot</ h4 >
265
+ < h4 id ="qubes-os-xen-boot "> Qubes OS / Xen Boot</ h4 >
266
+ < p > - < em > Qubes OS and Xen system/kernel messages</ em > </ p >
248
267
< p > < code > dmesg</ code > - < em > prints error, warning and informational messages about device drivers and the kernel during the boot process as well as when we connect a hardware to the system on the fly.</ em > </ p >
249
268
< p > < code > xl dmesg</ code > - < em > prints error, warning and informational messages created during Xen’s boot process</ em > </ p >
250
- < p > :!: < em > use < code > dmesg</ code > and < code > xl dmesg</ code > in combination with < code > less</ code > , < code > cat</ code > , < code > tail</ code > or < code > head</ code > .</ em > </ p >
269
+ < p > < em > NOTE: use < code > dmesg</ code > and < code > xl dmesg</ code > in combination with < code > less</ code > , < code > cat</ code > , < code > tail</ code > or < code > head</ code > .</ em > </ p >
251
270
< h3 id ="grow-disk "> Grow disk</ h3 >
252
271
< h4 id ="qvm-grow-private "> qvm-grow-private</ h4 >
253
- < p > - < em > increase private storage capacity of a specified VM</ em > </ p >
272
+ < p > - < em > Increase private storage capacity of a specified VM</ em > </ p >
254
273
< p > usage: < code > qvm-grow-private <vm-name> <size></ code > </ p >
255
274
< p > < strong > Example</ strong > </ p >
256
275
< ul >
257
276
< li > In dom0 terminal: < code > qvm-grow-private personal 40GB</ code > </ li >
258
277
< li > In the personal VM: < code > sudo resize2fs /dev/xvdb</ code > </ li >
259
278
</ ul >
260
- < h3 id ="appvms-and- tmpfs "> AppVMs and TMPFS</ h3 >
261
- < p > Enlarge /tmp if you run out of space on the default ~200MB</ p >
279
+ < h3 id ="enlarge- appvms-tmpfs "> Enlarge AppVMs TMPFS</ h3 >
280
+ < p > Enlarge < code > /tmp</ code > if you run out of space on the default ~200MB</ p >
262
281
< p > < code > sudo mount -o remount,size=1024M /tmp</ code > - < em > enlarge the space to 1024MB</ em > </ p >
263
282
< h3 id ="inter-vm-networking "> Inter VM Networking</ h3 >
264
- < p > - < em > Does not expose services to the outside world!</ em > </ p >
283
+ < p > < em > NOTE: Does not expose services to the outside world!</ em > </ p >
265
284
< p > Make sure:</ p >
266
285
< ul >
267
286
< li > Both VMs are connected to the same firewall VM</ li >
@@ -290,7 +309,7 @@ <h3 id="inter-vm-networking">Inter VM Networking</h3>
290
309
< p > for bidirectional access:</ p >
291
310
< pre > < code > # echo "iptables -I FORWARD 2 -s 10.137.2.10 -d 10.137.2.11 -j ACCEPT" >> /rw/config/qubes_firewall_user_script</ code > </ pre >
292
311
< h4 id ="add-usb-wifi-card-to-sys-net-vm "> Add USB Wifi card to sys-net VM</ h4 >
293
- < p > * - < em > attach a USB Wifi card to sys-net VM</ em > </ p >
312
+ < p > - < em > Attach a USB Wifi card to sys-net VM</ em > </ p >
294
313
< p > The bus and device number can be different than shown in this example:</ p >
295
314
< ol type ="1 ">
296
315
< li > < code > qvm-pci -l sys-net</ code > - < em > list all attached pci devices of sys-net</ em > </ li >
@@ -303,6 +322,9 @@ <h4 id="add-usb-wifi-card-to-sys-net-vm">Add USB Wifi card to sys-net VM</h4>
303
322
< h3 id ="templates "> Templates</ h3 >
304
323
< h4 id ="fedora "> Fedora</ h4 >
305
324
< p > - < em > Fedora template specific</ em > </ p >
325
+ < p > < strong > Installing the Template</ strong > </ p >
326
+ < p > < code > sudo qubes-dom0-update qubes-template-fedora-24</ code > - < em > installs the fedora-24 template</ em > </ p >
327
+ < p > < code > sudo qubes-dom0-update qubes-template-fedora-23</ code > - < em > installs the fedora-23 template</ em > </ p >
306
328
< p > < strong > Updating, Searching & Installing Packages</ strong > </ p >
307
329
< p > Fedora > 21</ p >
308
330
< ul >
@@ -322,14 +344,20 @@ <h4 id="fedora">Fedora</h4>
322
344
< p > < code > Start Menu >> Template:Fedora 21 >> Package Sources >> Enable RPMFusion</ code > - ENABLE RPMFusion, (already covers RPMFusion signing keys)</ p >
323
345
< h4 id ="fedora-minimal "> Fedora Minimal</ h4 >
324
346
< p > - < em > Fedora minimal template</ em > </ p >
347
+ < p > Qubes OS:</ p >
348
+ < p > < code > sudo qubes-dom0-update qubes-template-fedora-24-minimal</ code > - < em > installs the fedora-24-minimal template</ em > </ p >
349
+ < p > < code > sudo qubes-dom0-update qubes-template-fedora-23-minimal</ code > - < em > installs the fedora-23-minimal template</ em > </ p >
325
350
< p > < code > sudo qubes-dom0-update qubes-template-fedora-21-minimal</ code > - < em > installs the fedora-21-minimal template</ em > </ p >
326
351
< h4 id ="debian "> Debian</ h4 >
327
- < p > - < em > Debian templates </ em > </ p >
352
+ < p > - < em > Debian template </ em > </ p >
328
353
< p > < strong > Installing the Template</ strong > </ p >
329
354
< ul >
330
- < li > < code > sudo qubes-dom0-update qubes-template-debian-7</ code > - < em > Debian 7 “Wheezy”</ em > </ li >
331
355
< li > < code > sudo qubes-dom0-update qubes-template-debian-8</ code > - < em > Debian 8 “Jessie”</ em > </ li >
332
356
</ ul >
357
+ < p > Only till Qubes OS 3.1:</ p >
358
+ < ul >
359
+ < li > < code > sudo qubes-dom0-update qubes-template-debian-7</ code > - < em > Debian 7 “Wheezy”</ em > </ li >
360
+ </ ul >
333
361
< p > < strong > Updating, Searching & Installing Packages</ strong > </ p >
334
362
< ul >
335
363
< li > installing packages: < code > apt-get install <package-name></ code > </ li >
@@ -341,16 +369,16 @@ <h4 id="debian">Debian</h4>
341
369
</ ol > </ li >
342
370
</ ul >
343
371
< h4 id ="qubes-os-whonix "> Qubes OS + Whonix</ h4 >
344
- < p > - < em > Whonix is an debian based OS focused on anonymity, privacy and security</ em > </ p >
345
- < p > Whonix has two parts :</ p >
372
+ < p > - < em > Whonix is an Debian based OS focused on anonymity, privacy and security</ em > </ p >
373
+ < p > Whonix consists of two components :</ p >
346
374
< ol type ="1 ">
347
375
< li > Whonix-Gateway (uses TOR for all connections to the outside world)</ li >
348
376
< li > Whonix-Workstation (for application)</ li >
349
377
</ ol >
350
378
< p > < strong > Install Whonix</ strong > </ p >
351
- < p > Whonix-Gateway TemplateVM Binary Install < span class =" citation " data-cites =" Dom0 " > @Dom0</ span > :</ p >
379
+ < p > Whonix-Gateway TemplateVM Binary Install < code > @Dom0</ code > :</ p >
352
380
< p > < code > sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-whonix-gw-experimental</ code > </ p >
353
- < p > Whonix-Workstation TemplateVM Binary Install < span class =" citation " data-cites =" Dom0 " > @Dom0</ span > :</ p >
381
+ < p > Whonix-Workstation TemplateVM Binary Install < code > @Dom0</ code > :</ p >
354
382
< ol type ="1 ">
355
383
< li > < code > export UPDATES_MAX_BYTES=$[ 4 * 1024 ** 3 ]</ code > </ li >
356
384
< li > < code > sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-whonix-ws</ code > </ li >
@@ -364,8 +392,11 @@ <h4 id="qubes-os-whonix">Qubes OS + Whonix</h4>
364
392
< li > Start Whonix-Workstation AppVM</ li >
365
393
</ ol >
366
394
< h4 id ="archlinux "> Archlinux</ h4 >
367
- < p > - < em > Archlinux</ em > </ p >
395
+ < p > - < em > Archlinux template </ em > </ p >
368
396
< p > < strong > Installing the Template</ strong > </ p >
397
+ < p > In Qubes OS 3.2:</ p >
398
+ < p > < code > sudo qubes-dom0-update --enablerepo=qubes-templates-community qubes-template-archlinux</ code > </ p >
399
+ < p > or manually</ p >
369
400
< p > Use the following instructions: < a href ="https://www.qubes-os.org/doc/templates/archlinux/ "> Archlinux Template</ a > </ p >
370
401
< p > < strong > Updating, Searching & Installing Packages</ strong > </ p >
371
402
< ul >
@@ -383,5 +414,16 @@ <h3 id="create-vm-from-vmware-or-virtualbox-images">Create VM from VMware or Vir
383
414
< li > VirtualBox: < code > qemu-img convert ReactOS.vdi -O raw reactos.img</ code > </ li >
384
415
</ ul > </ li >
385
416
</ ol >
417
+ < h3 id ="qubes-os-directories "> Qubes OS Directories</ h3 >
418
+ < h4 id ="dom0-qubes-os "> Dom0 (Qubes OS)</ h4 >
419
+ < p > - < em > Qubes OS specific directories</ em > </ p >
420
+ < ul >
421
+ < li > < code > /var/log/qubes</ code > - < em > Qubes OS VM log files</ em > </ li >
422
+ < li > < code > /var/lib/qubes</ code > - < em > Qubes OS VMs and other Qubes OS specific files</ em > </ li >
423
+ </ ul >
424
+ < h3 id ="qubes-os-repositories "> Qubes OS Repositories</ h3 >
425
+ < ul >
426
+ < li > < a href ="http://yum.qubes-os.org " class ="uri "> http://yum.qubes-os.org</ a > - < em > Browsable Fedora repositories</ em > </ li >
427
+ </ ul >
386
428
</ body >
387
429
</ html >
0 commit comments