The first stable version of Qubes OS, an open source desktop operating system designed to provide a greater level of security by isolating programs inside virtual machines with different permissions, ...
Learn a few tips for getting the most out of your Qubes desktop. I've been using the high-security Qubes operating system for quite some time now, and I wrote a multipart series for Linux Journal in ...
This is the first in a multipart series on Qubes OS, a security-focused operating system that is fundamentally different from any other Linux desktop I've ever used and one I personally switched to ...
Qubes OS is a hybrid computing technology that raises the bar for security. It takes locking down computers to a new level.It has advanced far beyond the primitive proof of concept demonstrated more ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Most Linux distributions are fairly similar these days, but Qubes OS is different. Qubes OS is based on Linux, but it runs applications in lightweight virtual machines. Applications can be completely ...
If you want an effective and different approach to computer platform security, turn to theQubes OS. Be prepared to adjust your expectations and your computing comfort zone, however. The Qubes OS does ...
One expert sees sandboxing such as that in Qubes 1.0 operating system, released Tuesday, could be an important part of future security Invisible Things Lab has released an open-source desktop ...
Qubes OS, the security-focused operating system that Edward Snowden said in November he was “really excited” about, announced this week that laptop maker Purism will ship their privacy-focused Librem ...
Qubes OS is a free open-source operating system that’s fully security-oriented. It leverages Xen-based virtualization, which allows the user to create, use and delete easily isolated compartments ...
Qubes OS defends at-risk enterprise users from targeted attacks, as well as drive-by malware and the Meltdown exploit. When nation-state adversaries frolic and gambol across your corporate network, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results