Qubes OS Linux: security with virtual domains

As I mentioned in previous publication, I have been watching her for quite some time of Qubes OS a completely different operating system from what we know. This operating system is developed with the main goal of security.

Qubes OS is one operating system which allows you to create different virtual domains to do different tasks.Qubes OS

So you can go from one domain to another, depending on the task you want to do, and you can install a completely different operating system.

Qubes OS is based on Fedora and a main idea that is summarized in the following words: "security in isolation."

Using the domains mentioned above as light Xen virtual machines attempts to combine two contradictory goals:

How to make isolation between domains as strong as possible, and how to make this isolation as simple and easy as possible.

Although you could certainly use any of the running virtual machine applications to run as many VMs as you like in your favorite Linux distribution, the result won't be the same, especially if you don't want multiple desktop environments running in their own windows . You will be presented with many errors and problems that you will need to solve.

For example, how do you share files or copy and paste them safely between VMs? How do you keep all of these VMs up to date with the latest security updates?

On a traditional Linux distribution you would have to do this manually, on each of the VMs you have installed. Qubes provides a number of additional tools that make it easier to manage a desktop that is full of different virtual machines running with different layers s (trusted – untrusted).

The distribution uses Xen to provide more security. Instead of each VM having its own full interface, Qubes uses the most privileged dom0 Xen VM as a host for a desktop environment (currently Qubes has KDE or XFCE, although the community offers other DEs) .

Thus, VM displays the windows of each individual application within the dom0 desktop environment.

So running Firefox on Qubes is just like you would expect on any other distribution. The main difference though, is that Qubes allows you to give each of your VMs the trust level you want, from red (untrusted) to black (trusted) with various those of the rainbow.

If you are interested below you will find link της διανομής στην τελευταία .
Not recommended for beginners.

Qubes OS Release 4.0.1-rc1 (Release Candidate)

Qubes-R4.0.1-rc1-x86_64.iso 04-Nov-2018 13:24 4671406080
Qubes-R4.0.1-rc1-x86_64.iso.DIGESTS 04-Nov-2018 13:24 1266
Qubes-R4.0.1-rc1-x86_64.iso.asc 04-Nov-2018 13:24 833
Qubes-R4.0.1-rc1-x86_64.torrent 04-Nov-2018 13:24 89683

Qubes OS Release 3.2.1 (fixed version)

Qubes-R3.2.1-x86_64.iso 10-Nov-2018 03:23 5203034112
Qubes-R3.2.1-x86_64.iso.DIGESTS 10-Nov-2018 03:23 1250
Qubes-R3.2.1-x86_64.iso.asc 10-Nov-2018 03:23 833
Qubes-R3.2.1-x86_64.torrent 10-Nov-2018 03:23 99807

_____________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).