mirror of
				https://github.com/privacyguides/i18n.git
				synced 2025-11-03 23:17:57 +00:00 
			
		
		
		
	New Crowdin translations by GitHub Action
This commit is contained in:
		@@ -160,7 +160,7 @@ Par conception, Tails est censé se réinitialiser complètement après chaque r
 | 
				
			|||||||
    [:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Code source" }
 | 
					    [:octicons-code-16:](https://github.com/QubesOS/){ .card-link title="Code source" }
 | 
				
			||||||
    [:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribuer }
 | 
					    [:octicons-heart-16:](https://www.qubes-os.org/donate/){ .card-link title=Contribuer }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Qubes OS secures the computer by isolating subsystems (e.g., networking, USB, etc.) and applications in separate *qubes*. Should one part of the system be compromised, the extra isolation is likely to protect the rest of the *qubes* and the core system.
 | 
					Qubes OS sécurise l'ordinateur en isolant les sous-systèmes (par exemple, le réseau, l'USB, etc.) et les applications dans des *qubes* distincts. Si une partie du système est compromise, l'isolation supplémentaire est susceptible de protéger le reste des *qubes* et le système central.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Pour plus d'informations sur le fonctionnement de Qubes, lisez notre page [Introduction à Qubes](os/qubes-overview.md) .
 | 
					Pour plus d'informations sur le fonctionnement de Qubes, lisez notre page [Introduction à Qubes](os/qubes-overview.md) .
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,7 +1,7 @@
 | 
				
			|||||||
---
 | 
					---
 | 
				
			||||||
title: "Introduction à Qubes"
 | 
					title: "Introduction à Qubes"
 | 
				
			||||||
icon: simple/qubesos
 | 
					icon: simple/qubesos
 | 
				
			||||||
description: Qubes is an operating system built around isolating apps within *qubes* (formerly "VMs") for heightened security.
 | 
					description: Qubes est un système d'exploitation conçu pour isoler les applications au sein de *qubes* (anciennement "VMs") afin d'améliorer la sécurité.
 | 
				
			||||||
---
 | 
					---
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/).
 | 
					[**Qubes OS**](../desktop.md#qubes-os) is an open-source operating system which uses the [Xen](https://en.wikipedia.org/wiki/Xen) hypervisor to provide strong security for desktop computing through isolated *qubes*, (which are Virtual Machines). You can assign each *qube* a level of trust based on its purpose. Qubes OS provides security by using isolation. It only permits actions on a per-case basis and therefore is the opposite of [badness enumeration](https://www.ranum.com/security/computer_security/editorials/dumb/).
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user