Qubes OS 4.0.1 freeware
It is based on Fedora Linux and designed from the ground up to provide users with strong security for desktop computing. In order to sandbox several core components and isolate certain applications from each other, Qubes OS uses virtualization technology.
|Author||Invisible Things Lab|
|Installation||Instal And Uninstall|
|Keywords||Xen distribution, Linux distribution, operating system, Xen, Linux, distribution, distro|
Qubes OS Free Download - we do not host any Qubes OS torrent files or links of Qubes OS on rapidshare.com, depositfiles.com, megaupload.com etc. All Qubes OS download links are direct Qubes OS download from publisher site or their selected mirrors.
|4.0.1||Oct 3, 2016||New Release||Core management scripts rewrite with better structure and extensibility, API documentation
Admin API allowing strictly controlled managing from non-dom0
All qvm-* command-line tools rewritten, some options have changed
Renaming VM directly is prohibited, there is GUI to clone under new name and remove old VM
Use PVH and HVM by default to mitigate Meltdown & Spectre and lower the attack surface on Xen
Create USB VM by default
Multiple DisposableVMs templates support
New backup format using scrypt key-derivation function
Non-encrypted backups no longer supported
split VM packages, for better support minimal, specialized templates
Qubes Manager decomposition - domains and devices widgets instead of full Qubes Manager; devices widget support also USB
More flexible firewall interface for ease unikernel integration
Template VMs do not have network interface by default, qrexec-based updates proxy is used instead
More flexible IP addressing for VMs - custom IP, hidden from the IP
|3.2||Oct 3, 2016||New Release||One major feature that we’ve improved upon in this release is our integrated management infrastructure, which was introduced in Qubes 3.1. Whereas before it was only possible to manage whole VMs, it is now possible to manage the insides of VMs as well.
The principal challenge we faced was how to allow such a tight integration of the management engine software (for which we use Salt) with potentially untrusted VMs without opening a large attack surface on the (complex) management code. We believe we found an elegant solution to this problem, which we’ve implemented in Qubes 3.2.
We now use this management functionality for basic system setup during installation, for preparing our automatic tests, and for applying various custom configurations.
|3.1||Mar 10, 2016||New Release||Management Stack based of Salt Stack in dom0 - documentation
Out of the box Whonix setup
LIVE edition (still alpha, not part of R3.1-rc1)