Compare commits
No commits in common. "master" and "adw_65293ba4" have entirely different histories.
master
...
adw_65293b
|
@ -118,7 +118,7 @@ Please refer to [this page](/doc/vm-sudo/).
|
|||
### Why is dom0 so old?
|
||||
|
||||
Please see:
|
||||
- [Why would one want to update software in dom0?](/doc/software-update-dom0/#why-would-one-want-to-install-or-update-software-in-dom0)
|
||||
- [Why would one want to update software in dom0?](/doc/software-update-dom0/#why-would-one-want-to-update-software-in-dom0)
|
||||
- [Note on dom0 and EOL](/doc/supported-versions/#note-on-dom0-and-eol)
|
||||
|
||||
### Do you recommend coreboot as an alternative to vendor BIOS?
|
||||
|
|
|
@ -141,15 +141,6 @@ your Git commits.
|
|||
vtag = !git tag -v `git describe`
|
||||
~~~
|
||||
|
||||
GitHub Signature Verification (optional)
|
||||
----------------------------------------
|
||||
|
||||
GitHub shows a green `Verified` label indicating that the GPG signature could be
|
||||
verified using any of the contributor’s GPG keys uploaded to GitHub. You can
|
||||
upload your public key on GitHub by adding your public GPG key on the [New GPG
|
||||
key][GitHub New GPG key] under the [SSH GPG keys page][GitHub SSH GPG keys
|
||||
page].
|
||||
|
||||
Code Signature Checks
|
||||
---------------------
|
||||
|
||||
|
@ -212,6 +203,4 @@ Enigmail is a security addon for the Mozilla Thunderbird email client that allow
|
|||
[developer mailing list]: /support/#qubes-devel
|
||||
[Enigmail]: https://www.enigmail.net/
|
||||
[signature-checker]: https://github.com/marmarek/signature-checker
|
||||
[GitHub New GPG key]: https://github.com/settings/gpg/new
|
||||
[GitHub SSH GPG keys page]: https://github.com/settings/keys
|
||||
|
||||
|
|
|
@ -518,4 +518,4 @@ sys-usb dom0 ask,default_target=dom0
|
|||
[Security Warning about USB Input Devices]: #security-warning-about-usb-input-devices
|
||||
[How to hide all USB controllers from dom0]: #how-to-hide-all-usb-controllers-from-dom0
|
||||
[qubes-usb-proxy]: https://github.com/QubesOS/qubes-app-linux-usb-proxy
|
||||
[dom0-updates]: /doc/software-update-dom0/#how-to-update-dom0
|
||||
[dom0-updates]: /doc/software-update-dom0/#how-to-update-software-in-dom0
|
||||
|
|
|
@ -1,36 +0,0 @@
|
|||
---
|
||||
layout: doc
|
||||
title: Changing your Time Zone
|
||||
permalink: /doc/change-time-zone/
|
||||
---
|
||||
|
||||
# Changing your Time Zone #
|
||||
|
||||
## Qubes 4.0 ##
|
||||
|
||||
### Command line ###
|
||||
|
||||
If you use the i3 window manager or would prefer to change the system's time
|
||||
zone in terminal you can issue the `timedatectl` command with the option
|
||||
`set-timezone`.
|
||||
|
||||
For example, to set the system's time zone to Berlin, Germany type in a dom0
|
||||
terminal:
|
||||
|
||||
$ sudo timedatectl set-timezone 'Europe/Berlin'
|
||||
|
||||
You can list the available time zones with the option `list-timezones` and show
|
||||
the current settings of the system clock and time zone with option `status`.
|
||||
|
||||
Example output status of `timedatectl` on a system with time zone set to
|
||||
Europe/Berlin:
|
||||
|
||||
[user@dom0 ~]$ timedatectl status
|
||||
Local time: Sun 2018-10-14 06:20:00 CEST
|
||||
Universal time: Sun 2018-10-14 04:20:00 UTC
|
||||
RTC time: Sun 2018-10-14 04:20:00
|
||||
Time zone: Europe/Berlin (CEST, +0200)
|
||||
Network time on: no
|
||||
NTP synchronized: no
|
||||
RTC in local TZ: no
|
||||
|
1
doc.md
1
doc.md
|
@ -127,7 +127,6 @@ Configuration Guides
|
|||
* [Multibooting](/doc/multiboot/)
|
||||
* [Resize Disk Image](/doc/resize-disk-image/)
|
||||
* [RPC Policies](/doc/rpc-policy/)
|
||||
* [Changing your Time Zone](/doc/change-time-zone)
|
||||
* [Installing ZFS in Qubes](/doc/zfs/)
|
||||
* [Mutt Guide](/doc/mutt/)
|
||||
* [Postfix Guide](/doc/postfix/)
|
||||
|
|
|
@ -22,8 +22,7 @@ Interested readers might want to check [this article](https://blog.invisiblethin
|
|||
Creating an HVM domain
|
||||
----------------------
|
||||
|
||||
### R3.2 ###
|
||||
|
||||
R3.2:
|
||||
With a GUI: in Qubes Manager VM creation dialog box choose the "Standalone qube not based on a template" type.
|
||||
If "install system from device" is selected (which is by default), then `virt_mode` will be set to `hvm` automatically.
|
||||
Otherwise, open the newly created VM's Qube Settings GUI and in the "Advanced" tab select "HVM" in the virtualization mode drop-down list.
|
||||
|
@ -33,8 +32,7 @@ Command line (the VM's name and label color are for illustration purposes):
|
|||
qvm-create my-new-vm --hvm --label green
|
||||
~~~
|
||||
|
||||
### R4.0 ###
|
||||
|
||||
R4.0:
|
||||
With a GUI: in Qubes Manager VM creation dialog box choose the "Standalone qube not based on a template" type.
|
||||
If "install system from device" is selected (which is by default), then `virt_mode` will be set to `hvm` automatically.
|
||||
Otherwise, open the newly created VM's Qube Settings GUI and in the "Advanced" tab select `HVM` in the virtualization mode drop-down list.
|
||||
|
|
|
@ -41,5 +41,4 @@ Qubes Canaries are published through the [Qubes Security Pack](/security/pack/).
|
|||
|
||||
- [Qubes Canary \#15](https://github.com/QubesOS/qubes-secpack/blob/master/canaries/canary-015-2018.txt)
|
||||
- [Qubes Canary \#16](https://github.com/QubesOS/qubes-secpack/blob/master/canaries/canary-016-2018.txt)
|
||||
- [Qubes Canary \#17](https://github.com/QubesOS/qubes-secpack/blob/master/canaries/canary-017-2018.txt)
|
||||
|
||||
|
|
Loading…
Reference in New Issue
Block a user