Qubes OS 4.0.1 freeware
... users with strong security for desktop computing. In order to sandbox several core components and isolate certain applications from each other, Qubes OS uses virtualization technology. ...
Author | Invisible Things Lab |
Released | 2016-10-03 |
Filesize | 4100.00 MB |
Downloads | 289 |
OS | Linux |
Installation | Instal And Uninstall |
Keywords | Xen distribution, Linux distribution, operating system, Xen, Linux, distribution, distro |
Users' rating (23 rating) |
Qubes OS Free Download - we do not host any Qubes OS torrent files or links of Qubes OS on rapidshare.com, depositfiles.com, megaupload.com etc. All Qubes OS download links are direct Qubes OS download from publisher site or their selected mirrors.
4.0.1 | Oct 3, 2016 | New Release | Core management scripts rewrite with better structure and extensibility, API documentation Admin API allowing strictly controlled managing from non-dom0 All qvm-* command-line tools rewritten, some options have changed Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM Use PVH and HVM by default to mitigate Meltdown & Spectre and lower the attack surface on Xen Create USB VM by default Multiple DisposableVMs templates support New backup format using scrypt key-derivation function Non-encrypted backups no longer supported split VM packages, for better support minimal, specialized templates Qubes Manager decomposition - domains and devices widgets instead of full Qubes Manager; devices widget support also USB More flexible firewall interface for ease unikernel integration Template VMs do not have network interface by default, qrexec-based updates proxy is used instead More flexible IP addressing for VMs - custom IP, hidden from the IP More flexible |
3.2 | Oct 3, 2016 | New Release | One major feature that we’ve improved upon in this release is our integrated management infrastructure, which was introduced in Qubes 3.1. Whereas before it was only possible to manage whole VMs, it is now possible to manage the insides of VMs as well. The principal challenge we faced was how to allow such a tight integration of the management engine software (for which we use Salt) with potentially untrusted VMs without opening a large attack surface on the (complex) management code. We believe we found an elegant solution to this problem, which we’ve implemented in Qubes 3.2. We now use this management functionality for basic system setup during installation, for preparing our automatic tests, and for applying various custom configurations. |
3.1 | Mar 10, 2016 | New Release | Management Stack based of Salt Stack in dom0 - documentation Out of the box Whonix setup UEFI support LIVE edition (still alpha, not part of R3.1-rc1) |