10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello All,
My question is about VNC'ing to a Linux server on the network.
MY PC: OpenSuSE 11.4 (i586)
Remote Server: OpenSuSE 12.3 (x86_64)
### UNAME:
# uname -a
Linux localhost.foo.bar 3.7.10-1.1-desktop #1 SMP PREEMPT Thu Feb 28 15:06:29 UTC 2013 (82d3f21) x86_64 x86_64 x86_64... (1 Reply)
Discussion started by: mrm5102
1 Replies
2. Ubuntu
hi,
I have a netbook with duo boot (win7 starter + ubuntu 12.04).
I tested it only in ubuntu and I could not set illumination by pressing "function+right arrow" or "function+left arrow" buttons.
Has anybody ever faced similar problem?
Thanks in advance
Boris (6 Replies)
Discussion started by: baris35
6 Replies
3. UNIX for Dummies Questions & Answers
Hi all,
I use the shortcut keys CTRL-a and CTRL-e to move cursor to start and end of line in shell prompt alot. But recently what happened to my system i don't know only CTRL-a is working not CTRL-e . If i press CTRL-e any other window in that desktop pop's up. Can any1 tell me how to correct... (2 Replies)
Discussion started by: vio719
2 Replies
4. Red Hat
Hi,
I've generated and posted pub. keys in the source system and the target. However, it is still prompting me for the password.
Steps that I have taken.
1. Generated ssh keys : ssh-keygen. It created two files.
1. .ssh/id_rsa
2. .ssh/id_rsa.pub.
2.... (10 Replies)
Discussion started by: Afi_Linux
10 Replies
5. Solaris
Hello,
I hope I put this in the right forum...
I searched for similar threads, but I couldn't find any that seem to deal with the problem I am having.
My workplace is using (among other Solaris-machines) Dell Dimension T3500 as workstations (running Solaris 10 X86 10/09 u8,... (0 Replies)
Discussion started by: areichart
0 Replies
6. UNIX for Advanced & Expert Users
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
Discussion started by: srrao.ch
1 Replies
7. Shell Programming and Scripting
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
Discussion started by: srrao.ch
1 Replies
8. UNIX for Dummies Questions & Answers
Hi
I am working on SunOS 5.10 from remote terminal using putty.
Also
echo $TERM
xterm
In vi editor when in insert mode arrow keys are not working for cursor movement instead they print A B C and D.
Please help.
thanks
ravs (7 Replies)
Discussion started by: ravashingravi
7 Replies
9. Windows & DOS: Issues & Discussions
Hi, In my MSDOS version on windows'98, many keys are not working. I feel that my version is old and I wnt to update it. Can anyone tell me how can i do so.
Please tell me soon.
Thanks a lot.
-Kinnaree
:confused: (1 Reply)
Discussion started by: kinnaree
1 Replies
10. UNIX for Dummies Questions & Answers
Hello everyone, I want to host a mud and I found the cheapest way to do this was to install Linux on my computer and use it as the server. I downloaded both of the ISO images, it took 16 hours but i did it. But, I have no CD burner. I read that I could make a boot diskette, but how do i get... (3 Replies)
Discussion started by: Frax
3 Replies
mkxauth(1x) Linux User's Manual mkxauth(1x)
NAME
mkxauth - create and merge .Xauthority files
SYNOPSIS(1) mkxauth [ -q ] [ -u login ] -c [ host [ host ... ] ]
(2) mkxauth [ -q ] [ -u login ] -m login(3) mkxauth [ -q ] [ -u login ] -f host(4) mkxauth [ -q ] [ -u login ] -r host [ -l login ]
(5) mkxauth [ -q ] [ -u login ] -z host [ -l login ]
DESCRIPTION
mkxauth aids in the creation and maintenance of X authentication databases (.Xauthority files). Use it to create a ~/.Xauthority file or
merge keys from another local or remote .Xauthority file. Remote .Xauthority files can be retrieved via FTP (using ncftp(1)) or via
rsh(1). For a slight measure of security, mkxauth does not create any temporary files containing authentication keys (although anyone spy-
ing on network packets can see the authentication key data as they pass through the network; for secure network communications, use
ssh(1)).
Creating and Adding to a .Xauthority File
To create a .Xauthority file, use mkxauth -c (see(1) above). mkxauth creates a .Xauthority file in the user's home directory (~/), con-
taining a `key' or `magic cookie' for the host it was run on (the one returned by hostname(1)). If a .Xauthority file already exists, the
keys are added to it. If keys for that host already exist, they are replaced.
To create or add to a .Xauthority file for another user, use mkxauth -u login -c. mkxauth adds keys to ~login/.Xauthority (only the root
user is allowed to do this).
To add a key for more than one host, specify all hosts on the command line: mkxauth -c daffy porky bugs. All hosts specified on the same
command line receive the same key. To create different keys for multiple hosts, run mkxauth for each host in succession:
mkxauth -c daffy
mkxauth -c porky
mkxauth -c bugs
Merging Keys from Local .Xauthority Files
To merge keys from another local user's .Xauthority file, use mkxauth -m login (see(2) above). mkxauth adds the keys in ~login/.Xauthor-
ity to ~/.Xauthority, replacing any keys which already exist. ~login/.Xauthority must be readable by the user running mkxauth (normally
only the root user can read other people's .Xauthority files).
Merging Keys via FTP
To merge keys from a remote .Xauthority file via FTP, use mkxauth -f host (see(3) above). mkxauth retrieves the remote .Xauthority from
host using ncftp(1) and adds those keys to ~/.Xauthority, replacing any keys which already exist. [NOTE: you must have a ~/.netrc file set
up to automatically log you into host, otherwise the FTP login attempt will fail.]
Merging Keys via rsh(1)
To merge keys from remote .Xauthority file via rsh(1), use mkxauth -r host (see(4) above). mkxauth retrieves the remote .Xauthority from
host using rsh(1) and adds those keys to ~/.Xauthority, replacing any keys which already exist. To login as a different user, use -l
login. [NOTE: you must have a .rhosts file set up properly for this to work, otherwise the remote login attempt will fail].
Merging Keys via rsh(1) and gzip(1)
If your remote .Xauthority file is large, or to make it slightly less obvious that you're transferring authentication keys over the net-
work, mkxauth can gzip(1) your .Xauthority file before retrieving it via rsh(1). To do this, use mkxauth -z host (see(5) above). mkxauth
retrieves the remote .Xauthority from host using rsh(1) and adds those keys to ~/.Xauthority, replacing any keys which already exist. To
login as a different user, use -l login. [NOTE: you must have a .rhosts file set up properly for this to work, otherwise the remote login
attempt will fail].
Options
To make mkxauth operate quietly, use the -q option.
To add to ~login/.Xauthority, use the -u login option.
To use login for the remote login in mkxauth -f, mkxauth -r, and mkxauth -z, use the -l login option.
Getting Help
To get quick help about mkxauth, use mkxauth --help.
FILES
~/.Xauthority
~/.netrc
~/.rhosts
COMMENTS
mkxauth is mostly useful for maintaining .Xauthority files in an environment which uses startx(1x). xdm(1x) uses its own method of gener-
ating .Xauthority files. However, mkxauth is still useful for transferring .Xauthority information to remote login sessions so that the
user can display remote X clients on the local host without too much trouble.
Note, however, that using rsh(1) is inherently insecure, and sites concerned about security should use ssh(1) instead (see
http://www.cs.hut.fi/ssh/ for more information).
SEE ALSO
X(1x), Xsecurity(1x), gzip(1), mcookie(1), md5sum(1), ncftp(1), rsh(1), startx(1x), xauth(1x), xdm(1x)
BUGS
Does not respect the XAUTHORITY environment variable.
AUTHOR
Conceived and written by Jim Knoble <jmknoble@redhat.com>. Copyright 1996 by Jim Knoble and Red Hat Software. Distributed under the GNU
GPL (General Public License); see ftp://prep.ai.mit.edu/pub/gnu/COPYING for more information.
Red Hat Software 12-Dec-1996 mkxauth(1x)