Qubes OS Linux: security with virtual domains


As I mentioned in previous publication, for quite some time now I have been following the evolution of Qubes OS a completely different operating system from what we know. This operating system is developed with the main goal of security.

Qubes OS is one operating system which allows you to create different virtual domains to do different tasks.Qubes OS

So you can go from one domain to another, depending on the task you want to do, and you can install a completely different operating system.

Qubes OS is based on Fedora and a main idea that is summarized in the following words: "security in isolation."

Using the domains mentioned above as light Xen virtual machines attempts to combine two contradictory goals:

How to make isolation between domains as strong as possible, and how to make this isolation as simple and easy as possible.

Although you could certainly use any of the running virtual machine applications to run as many VMs as you like in your favorite Linux distribution, the result won't be the same, especially if you don't want multiple desktop environments running in their own windows . You will be presented with many errors and problems that you will need to solve.

For example, how do you share files or copy and paste them safely between VMs? How do you keep all of these VMs up to date with the latest security updates?

In a traditional Linux distribution you have to do this manually in each of the VMs you have installed. Qubes provides a number of additional tools that make it easy to manage a desktop full of different virtual machines and running with different levels of trust (untrusted).

The distribution uses Xen to provide more security. Instead of each VM having its own full interface, Qubes uses the most privileged dom0 Xen VM as a host for a desktop environment (currently Qubes has KDE or XFCE, although the community offers other DEs) .

Thus, VM displays the windows of each individual application within the dom0 desktop environment.

So running Firefox on Qubes is just like you would expect in any other distribution. The main difference, however, is that Qubes allows you to give your VM the confidence level you want, from red (unreliable) to black (reliable) with different rainbow colors.

If you are interested below you will find the download link of the distribution in the latest version.
Not recommended for beginners.

Qubes OS Release 4.0.1-rc1 (Release Candidate)

Qubes-R4.0.1-rc1-x86_64.iso 04-Nov-2018 13:24 4671406080
Qubes-R4.0.1-rc1-x86_64.iso.DIGESTS 04-Nov-2018 13:24 1266
Qubes-R4.0.1-rc1-x86_64.iso.asc 04-Nov-2018 13:24 833
Qubes-R4.0.1-rc1-x86_64.torrent 04-Nov-2018 13:24 89683

Qubes OS Release 3.2.1 (fixed version)

Qubes-R3.2.1-x86_64.iso 10-Nov-2018 03:23 5203034112
Qubes-R3.2.1-x86_64.iso.DIGESTS 10-Nov-2018 03:23 1250
Qubes-R3.2.1-x86_64.iso.asc 10-Nov-2018 03:23 833
Qubes-R3.2.1-x86_64.torrent 10-Nov-2018 03:23 99807

_____________________


Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News iGuRu.gr at Google news