Merge pull request #15 from gunkaaa/patch-1

Fix broken link and image embeds
This commit is contained in:
Rudd-O 2022-10-13 23:15:08 +00:00 committed by GitHub
commit f0c6387fbf
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 3 additions and 3 deletions

View File

@ -34,7 +34,7 @@ which give the user control over outbound connections taking place from
user VMs. ProxyVMs in turn attach to NetVMs, which provide outbound
connectivity for ProxyVMs and other user VMs alike.
![Standard Qubes OS network model](./doc/Standard Qubes OS network model.png)
![Standard Qubes OS network model](./doc/Standard%20Qubes%20OS%20network%20model.png)
No provision is made for running a server in a virtualized environment,
such that the server's ports are accessible by (a) other VMs (b) machines
@ -48,7 +48,7 @@ attack vectors. The Qubes OS user interface provides no help either.
Qubes network server builds on that.
![Qubes network server model](./doc/Qubes network server model.png)
![Qubes network server model](./doc/Qubes%20network%20server%20model.png)
With the Qubes network server software, it becomes possible to make
network servers in user VMs available to other machines, be them

View File

@ -100,4 +100,4 @@ to your Qubes OS server. You are also able to run commands on the
`exp-ssh` VM, directly from your manager machine.
Should you want to run commands on *other* VMs of your Qubes OS server,
then learn how to [enable remote management of your Qubes network server](https://github.com/Rudd-O/ansible-qubes/tree/master/doc/Remote management of Qubes OS servers.md).
then learn how to [enable remote management of your Qubes network server](https://github.com/Rudd-O/ansible-qubes/tree/master/doc/Remote%20management%20of%20Qubes%20OS%20servers.md).