diff --git a/README.md b/README.md index 4dc67b2..64ed066 100644 --- a/README.md +++ b/README.md @@ -34,7 +34,7 @@ which give the user control over outbound connections taking place from user VMs. ProxyVMs in turn attach to NetVMs, which provide outbound connectivity for ProxyVMs and other user VMs alike. -![Standard Qubes OS network model](./doc/Standard Qubes OS network model.png) +![Standard Qubes OS network model](./doc/Standard%20Qubes%20OS%20network%20model.png) No provision is made for running a server in a virtualized environment, such that the server's ports are accessible by (a) other VMs (b) machines @@ -48,7 +48,7 @@ attack vectors. The Qubes OS user interface provides no help either. Qubes network server builds on that. -![Qubes network server model](./doc/Qubes network server model.png) +![Qubes network server model](./doc/Qubes%20network%20server%20model.png) With the Qubes network server software, it becomes possible to make network servers in user VMs available to other machines, be them