Sponsored Content
Full Discussion: Filezilla Setup
Special Forums IP Networking Filezilla Setup Post 302074940 by yoi2hot4ya on Sunday 28th of May 2006 07:11:40 PM
Old 05-28-2006
Well. I have access to my router admin page now. I am trying to set up my filezilla file server so that my family can access my pc and login to my family member's file server to retrieve files. So I am trying to find out how my router should be set up to allow this to happen. I have set upan FTP service with a specific IP. Is this the IP that I should set my filezilla server to? Also is this the IP that my family should access to login? Thanks for your help.
 

9 More Discussions You Might Find Interesting

1. IP Networking

setup all right ?

Hi there im new to linux. I installed mandrake linux and set up all my networkcard ip address etc. when i do "route" or "ifconfig" all addresses etc. are allright but i cant ping other machines in my network also the machine with linux on it cant be pinged if i ping a machine from linux i always... (5 Replies)
Discussion started by: PhoenixHawk
5 Replies

2. UNIX for Dummies Questions & Answers

What is your setup ??

Am looking installing Red Hat 7.2 on an AMD-K6/2 PC and after realising that I can't use my space 80G HD due to BIOS restrictions (have resorted to using a 20G HD), was wondering what setup others use. If "Other" please indicate. (5 Replies)
Discussion started by: Cameron
5 Replies

3. UNIX for Advanced & Expert Users

setup X connection

I am running on a linux in my company's main site. Sometimes I need to access to a server in another site and run some x-applications. I tried to SSH to that server, but had difficulty setting up the correct DISPLAY variable. I used "who" to list the users and got something like:... (2 Replies)
Discussion started by: johnjohn
2 Replies

4. Solaris

Printer Setup

How do you add a HP network printer on a Sun Solaris Unix box? I have the IP address of the printer. I try using the admintool tool, but am confusing about setup the printer to connect to the IP address... (4 Replies)
Discussion started by: racquetbal
4 Replies

5. UNIX for Dummies Questions & Answers

What Setup?

Hopefully this post won't be too long :rolleyes: I've been in data processing for a number of years running on a windows system, and working with perl and MySQL to get the job done. I'm now part of a team who have bought a company and have been asked to investigate how we setup a new Data... (3 Replies)
Discussion started by: Kraythorne
3 Replies

6. AIX

NIM server setup on etherchannel setup environment

I know that IBM's official stance is that NIM does not work on etherchannel environment, but has anyone able to get around it? I'm working on a p5-590 LPAR system, and the NIM master and clients are all on the same frame. Any help is appreciated. (1 Reply)
Discussion started by: pdtak
1 Replies

7. Solaris

While copying files from windows to Solaris5.8 with filezilla length of the filename changed

Hello I am copying a tar from windows7 to Solaris with filezilla i could see, some characters in the name of the file get deleted. I could see only substring of the filename eg: original filename :abcdefghijklmnopqrstu.h i can see like abcdefghijklm solution to this problem is highly... (2 Replies)
Discussion started by: Revathi R
2 Replies

8. Hardware

Printer Setup

Hi, I have set up an HP printer, model 2300, on an Integrity server sunning on HP-Ux B.11.31 using the Jetdirect Printer Installer For Unix, version E.10.34. This particular printer is printing the same job multiple times and I cannot figur out why that is. Is ther perhaps a flag in the... (1 Reply)
Discussion started by: Koketso
1 Replies

9. Red Hat

Need help to setup Spacewalk

Hello, I am working onto setup a spacewalk as our centralized repository and kickstart server for our all centos servers. We have almost 60-70 servers running inhouse which all are on CentOS 5 or 6 x64. I am able to setup a spacewalk server on CentOS 6.5 x64 and able to access the console as... (5 Replies)
Discussion started by: sunnysthakur
5 Replies
xhost(1X)																 xhost(1X)

NAME
xhost - server access control program for X SYNOPSIS
xhost [[+-]name...] OPTIONS
xhost accepts the following command line options described below. For security, the options that effect access control may only be run from the "controlling host". For workstations, this is the same machine as the server. For X terminals, it is the login host. Prints a usage message. The given name (the plus sign is optional) is added to the list allowed to connect to the X server. The name can be a host name or a user name. The given name is removed from the list of allowed to connect to the server. The name can be a host name or a user name. Existing connections are not broken, but new connection attempts will be denied. Note that the current machine is allowed to be removed; however, further connections (including attempts to add it back) will not be permitted. Resetting the server (thereby breaking all connections) is the only way to allow local connections again. Access is granted to everyone, even if they are not on the list (that is, access control is turned off). Access is restricted to only those on the list (that is, access control is turned on). If no command line arguments are given, a message indicating whether or not access control is currently enabled is printed, followed by the list of those allowed to connect. This is the only option that may be used from machines other than the controlling host. DESCRIPTION
The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environ- ment, although it does limit the worst abuses. Environments which require more sophisticated measures should implement the user-based mechanism, or use the hooks in the protocol for passing other authentication data to the server. Hostnames that are followed by two colons (::) are used in checking DECnet connections; all other hostnames are used for TCP/IP connec- tions. NAMES
A complete name has the syntax "family:name" where the families are as follows: Internet host DECnet host Secure RPC network name Kerberos V5 principal contains only one name, the empty string. The family is case insensitive. The format of the name varies with the family. For backward compatibility with pre-R6 xhost, names that contain an at-sign (@) are assumed to be in the nis family. Otherwise, the inet family is assumed. DIAGNOSTICS
For each name added to the access control list, a line of the form "name being added to access control list" is printed. For each name removed from the access control list, a line of the form "name being removed from access control list" is printed. ENVIRONMENT
to get the default host and display to use. FILES
/etc/X*.hosts BUGS
You cannot specify a display on the command line because -display is a valid command line argument (indicating that you want to remove the machine named "display" from the access list). The X server stores network addresses, not host names. This is not really a bug. If somehow you change a host's network address while the server is still running, xhost must be used to add the new address and/or remove the old address. SEE ALSO
X(1X), Xsecurity(1X), Xdec(1X), xdm(1X) AUTHORS
Bob Scheifler, MIT Laboratory for Computer Science, Jim Gettys, MIT Project Athena (DEC). xhost(1X)
All times are GMT -4. The time now is 05:24 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy