diff --git a/README.md b/README.md index 4dc67b2..64ed066 100644 --- a/README.md +++ b/README.md @@ -34,7 +34,7 @@ which give the user control over outbound connections taking place from user VMs. ProxyVMs in turn attach to NetVMs, which provide outbound connectivity for ProxyVMs and other user VMs alike. -![Standard Qubes OS network model](./doc/Standard Qubes OS network model.png) +![Standard Qubes OS network model](./doc/Standard%20Qubes%20OS%20network%20model.png) No provision is made for running a server in a virtualized environment, such that the server's ports are accessible by (a) other VMs (b) machines @@ -48,7 +48,7 @@ attack vectors. The Qubes OS user interface provides no help either. Qubes network server builds on that. -![Qubes network server model](./doc/Qubes network server model.png) +![Qubes network server model](./doc/Qubes%20network%20server%20model.png) With the Qubes network server software, it becomes possible to make network servers in user VMs available to other machines, be them diff --git a/doc/Setting up an SSH server.md b/doc/Setting up an SSH server.md index 69ac1f8..1a2d7cb 100644 --- a/doc/Setting up an SSH server.md +++ b/doc/Setting up an SSH server.md @@ -100,4 +100,4 @@ to your Qubes OS server. You are also able to run commands on the `exp-ssh` VM, directly from your manager machine. Should you want to run commands on *other* VMs of your Qubes OS server, -then learn how to [enable remote management of your Qubes network server](https://github.com/Rudd-O/ansible-qubes/tree/master/doc/Remote management of Qubes OS servers.md). +then learn how to [enable remote management of your Qubes network server](https://github.com/Rudd-O/ansible-qubes/tree/master/doc/Remote%20management%20of%20Qubes%20OS%20servers.md).