core-admin/dom0
Marek Marczykowski 2ca4b11183 dom0/core-firewall: firewall setting for qubes-yum-proxy (#568)
New setting for access to qubes-yum-proxy. The difference from other firewall
setting (and reason for new top-level setting): 'deny' is enforced even if
policy is set to 'allow'. This proxy service is mainly used to filter network
traffic, so do not expose it to VMs which can connect to any host directly (eg
'untrusted' VM).
2012-05-31 03:11:44 +02:00
..
aux-tools dom0/update-notify: ensure correct permissions for update stat file 2012-05-16 07:56:40 +02:00
clipboard_notifier Initial public commit. 2010-04-05 20:58:57 +02:00
dracut dom0/modules: support for pvops modules in dom0 2012-02-25 14:04:06 +01:00
icons dom0/dispvm: icons for DispVM 2012-03-07 17:04:25 +01:00
init.d dom0/qvm-block: hide devices mounted in dom0 (#579) 2012-05-31 03:09:22 +02:00
misc dom0/qmemman: add support for config file 2012-03-28 00:47:26 +02:00
pm-utils dom0/pm-utils: do not fail suspend 2012-02-16 16:24:41 +01:00
qmemman dom0/qmemman: add support for config file 2012-03-28 00:47:26 +02:00
qvm-core dom0/core-firewall: firewall setting for qubes-yum-proxy (#568) 2012-05-31 03:11:44 +02:00
qvm-tools dom0/qvm-tools: introduce qvm-service tool 2012-05-31 03:09:22 +02:00
restore dom0/dispvm: new progress window for DispVM generation (#422) 2012-03-23 19:19:58 +01:00
vaio_fixes sony-vaio-fixes v1.6.1 2011-07-17 14:15:14 +02:00
qubes-cached.repo Dom0: set metadata_expiry=0 for qubes-dom0-cached repo 2011-07-30 14:07:35 +02:00
qubes-guid.desktop Automaticaly start qubes_guid for all VMs when user logon 2011-04-07 19:23:23 +02:00
qubes.sudoers dom0: do not require tty in sudo (for /etc/init.d/qubes_netvm start) 2011-06-29 21:22:56 +02:00
qubes.SyncAppMenus qrexec: adjust appmenu syncing to the new qrexec api 2011-07-06 14:09:36 +02:00
qubes.SyncAppMenus.policy Add comments to policy files. 2011-07-22 16:11:03 +02:00