Тег: qubes
Файл: |
qubes-r4.1.2-x86_64.torrent |
Описание: |
Qubes OS 4.1.2, the latest "patch" release of the project's
security-oriented operating system for single-user desktop
computing, is now available. This version brings the Fedora
template up to version 37 and adds an optional
"kernel-latest" Linux kernel, version 6.1.12: "We are
pleased to announce the stable release of Qubes 4.1.2. This
release aims to consolidate all the security patches, bug
fixes, and upstream template OS upgrades that have occurred
since the initial Qubes 4.1.0 release. Our goal is to
provide a secure and convenient way for users to install (or
reinstall) the latest stable Qubes release with an
up-to-date ISO. If you are already using any version of
Qubes 4.1 (including 4.1.0, 4.1.1, 4.1.2-rc1, and
4.1.2-rc2), then you should simply update normally (which
includes upgrading any EOL templates you might have) in
order to make your system effectively equivalent to this
stable Qubes 4.1.2 release. No reinstallation or other
special action is required. Qubes 4.1.2 includes numerous
updates over the initial 4.1.0 release, in particular: all
4.1 dom0 updates to date; Fedora 37 template; USB keyboard
support in the installer; kernel-latest available as a boot
option when starting the installer." |
Раздел: |
Софт |
Размер: |
115.42kb (0.11M) |
|
Файл: |
qubes-r4.1.0-x86_64.torrent |
Описание: |
Qubes OS 4.1.0
This version brings a variety of improvements, bug fixes and
component updates: "At long last, the Qubes 4.1.0 stable
release has arrived. The culmination of years of
development, this release brings a host of new features,
major improvements and numerous bug fixes. The GUI domain is
a qube separate from dom0 that handles all display-related
tasks and some system management. This separation allows us
to more securely isolate dom0 while granting the user more
flexibility with respect to graphical interfaces. Qrexec is
is an RPC (remote procedure call) mechanism that allows one
qube to do something inside another qube. The qrexec policy
system enforces 'who can do what and where.' Qubes 4.1
brings a new qrexec policy format, significant performance
improvements, support for socket services and policy
notifications that make it easier to detect problems." |
Раздел: |
Софт |
Размер: |
111.47kb (0.11M) |
|
Файл: |
qubes-r4.0.1-x86_64.torrent |
Описание: |
This new release is mostly a bug-fix and security update and
is recommended for all new Qubes installations: "We are
pleased to announce the release of Qubes 4.0.1. This is the
first stable point release of Qubes 4.0. It includes many
updates over the initial 4.0 release, in particular: all 4.0
dom0 updates to date, including a lot of bug fixes and
improvements for GUI tools; Fedora 29 TemplateVM; Debian 9
TemplateVM; Whonix 14 Gateway and Workstation TemplateVMs;
Linux kernel 4.14. If you're currently using an up-to-date
Qubes 4.0 installation (including updated Fedora 29, Debian
9, and Whonix 14 templates), then your system is already
equivalent to a Qubes 4.0.1 installation. No action is
needed. Similarly, if you're currently using a Qubes 4.0.1
release candidate and you've followed the standard procedure
for keeping it up-to-date, then your system is equivalent to
a 4.0.1 stable installation." |
Раздел: |
Софт |
Размер: |
87.98kb (0.09M) |
|
Файл: |
qubes-r3.2-x86_64.iso |
Описание: |
Joanna Rutkowska has announced the release of Qubes OS 3.2,
a new stable release of the Fedora-based desktop Linux
distribution whose main concept is "security by isolation"
by using domains implemented as lightweight Xen virtual
machines. From the release announcement: "I'm happy to
announce that today we're releasing Qubes OS 3.2. This is an
incremental improvement over the 3.1 version that we
released earlier this year. A lot of work went into making
this release more polished, more stable and easier to use
than our previous releases. One major feature that we've
improved upon in this release is our integrated management
infrastructure, which was introduced in Qubes 3.1. Whereas
before it was only possible to manage whole VMs, it is now
possible to manage the insides of VMs as well. The principal
challenge we faced was how to allow such a tight integration
of the management engine software (for which we use Salt)
with potentially untrusted VMs without opening a large
attack surface on the (complex) management code." |
Раздел: |
Софт |
Размер: |
4147200.00kb (4050.00M) |
|
|
|
|
|