From 9bafa3d27dd391e51002d8939f25c36218f8fd03 Mon Sep 17 00:00:00 2001
From: hackerncoder
Date: Mon, 26 Oct 2020 21:27:53 +0100
Subject: [PATCH] Remove -2 from qubes-manager. Add -1 to convertPDF. Change
sysnet-network-prompt to r4.1-..-sysnet..
---
introduction/intro.html | 4 ++--
introduction/screenshots.md | 7 +++----
2 files changed, 5 insertions(+), 6 deletions(-)
diff --git a/introduction/intro.html b/introduction/intro.html
index 25af3bcb..9aa959eb 100644
--- a/introduction/intro.html
+++ b/introduction/intro.html
@@ -186,8 +186,8 @@ redirect_from:
diff --git a/introduction/screenshots.md b/introduction/screenshots.md
index 9a20b249..811ad773 100644
--- a/introduction/screenshots.md
+++ b/introduction/screenshots.md
@@ -59,10 +59,9 @@ Qubes is all about seamless integration from the user’s point of view. Here yo
* * * * *
-[](/attachment/wiki/QubesScreenshots/r4.1-manager-and-sysnet-network-prompt.png)
-
-All the networking runs in a special, unprivileged NetVM. (Notice the red frame around the Network Manager dialog box on the screen above.) This means that in the event that your network card driver, Wi-Fi stack, or DHCP client is compromised, the integrity of the rest of the system will not be affected! This feature requires Intel VT-d or AMD IOMMU hardware (e.g., Core i5/i7 systems).
+[](/attachment/wiki/QubesScreenshots/r4.1-manager-and-sysnet-network-prompt.png)
+All the networking runs in a special, unprivileged NetVM. (Notice the red frame around the Network Manager dialog box on the screen above.) This means that in the event that your network card driver, Wi-Fi stack, or DHCP client is compromised, the integrity of the rest of the system will not be affected! This feature requires Intel VT-d or AMD IOMMU hardware (e.g., Core i5/i7 systems4.1
* * * * *
[](/attachment/wiki/QubesScreenshots/r4.1-software-update.png)
@@ -89,7 +88,7 @@ Qubes' unique DisposableVMs (DispVMs) allow the user to open any file in a dispo
* * * * *
-[](/attachment/wiki/QubesScreenshots/r4.1-convert-to-trusted-pdf.png) [](/attachment/wiki/QubesScreenshots/r4.1-converting-pdf.png)
+[](/attachment/wiki/QubesScreenshots/r4.1-convert-to-trusted-pdf-1.png) [](/attachment/wiki/QubesScreenshots/r4.1-converting-pdf.png)
Qubes provides an advanced infrastructure for programming inter-VM services, such as a PDF converter for untrusted files (which is described in [this article](https://blog.invisiblethings.org/2013/02/21/converting-untrusted-pdfs-into-trusted.html)).