09-17-2012
[SOLVED] How to be the ROOT through GUI mode in fedora 15
Whenevr i am trying to access ROOT file in Fedora 15 by double clicking, its showing I dont have enough permission to access it and its not showing the inside access... How to solve it??
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Dear All,
Someone please help me.. I can't afford to lose the luster from my precious RedHat Linux 7.3 install (which I was able to accomplish painstaking efforts!)..
Here is my problem...
I don't know why this is happening... but whenever I'm booting into my RHL 7.3 partition on my... (2 Replies)
Discussion started by: Vishnu
2 Replies
2. AIX
Can I know is there anyone know how to statup AIX in GUI and text mode?
Thank You..... (2 Replies)
Discussion started by: dwarf007
2 Replies
3. Solaris
hi, i'm a newbie in UNIX. i have a disk crash and re-install the unix. But the new installation does not boot the server automatically. Then i set the auto-boot to true, and it's ok. But now the system is booting in text mode.
Before this, when i type boot, the system is booting in GUI mode.... (2 Replies)
Discussion started by: lwll
2 Replies
4. Solaris
Hi all
I have installed solaris 5.10 and it is loading in GUI mode by default.
I want to load in text mode by default. How to do this? How to switch from GUI to text mode and vise versa.?
Please help.. (2 Replies)
Discussion started by: johnl
2 Replies
5. Solaris
Hi we work on solaris machines and access them in Command line mode using telnet services. Can they be accessed in GUI mode. If yes please advice as I have came to know that Solaris 9.0 supports GUI mode also. (1 Reply)
Discussion started by: sukhvinder_Tm
1 Replies
6. Hardware
Dear All,
i am trying to install the redhat linux using graphical mode...but it stucks while probing video card...i have installed linux using text mode it works fine and whole the installation goes fine. after installation if i give startx command it again stucks....looks like a vga card... (9 Replies)
Discussion started by: zaheer.gr8
9 Replies
7. Solaris
I just installed Solaris 10 in my pc with dafault installtion.
When I tried login to it first time , it took me directly to console mode
When issuing the command svcs it didn't returned any fmri related to gui.
find the attached snapshot for the list of fmri.
Installing the fmri ... (1 Reply)
Discussion started by: hiten.r.chauhan
1 Replies
8. Linux
Hi!
I installed fedora 15 on my laptop. Everything went fine during installtion then it comes to nice login screen http://forums.fedoraforum.org//forum/images/smilies/smile.gif when i logged on i couldn't see anything on da desktop rather than a blue wallpaper from fedora 15. means i didnt get... (3 Replies)
Discussion started by: sukhdip
3 Replies
9. Shell Programming and Scripting
hii all,
I am unable to login into GUI mode in solaris 10. It is only prompting me to command mode credentials not going further to GUI mode.. Please help..
Thanks & regards,
Bhagi (3 Replies)
Discussion started by: bhargav90
3 Replies
10. Red Hat
Hi Guys
Required help in Redhat 6.1.
After installation of Redhat 6.1 in VMware system is not going in GUI mode.
please to solve the issue...
Thanks... (5 Replies)
Discussion started by: deviltech
5 Replies
LEARN ABOUT NETBSD
access
ACCESS(2) BSD System Calls Manual ACCESS(2)
NAME
access -- check access permissions of a file or pathname
LIBRARY
Standard C Library (libc, -lc)
SYNOPSIS
#include <unistd.h>
int
access(const char *path, int mode);
DESCRIPTION
The access() function checks the accessibility of the file named by path for the access permissions indicated by mode. The value of mode is
the bitwise inclusive OR of the access permissions to be checked (R_OK for read permission, W_OK for write permission and X_OK for exe-
cute/search permission) or the existence test, F_OK. All components of the pathname path are checked for access permissions (including
F_OK).
The real user ID is used in place of the effective user ID and the real group access list (including the real group ID) are used in place of
the effective ID for verifying permission.
If a process has super-user privileges and indicates success for R_OK or W_OK, the file may not actually have read or write permission bits
set. If a process has super-user privileges and indicates success for X_OK, at least one of the user, group, or other execute bits is set.
(However, the file may still not be executable. See execve(2).)
RETURN VALUES
If path cannot be found or if any of the desired access modes would not be granted, then a -1 value is returned; otherwise a 0 value is
returned.
ERRORS
Access to the file is denied if:
[EACCES] Permission bits of the file mode do not permit the requested access, or search permission is denied on a component of the
path prefix. The owner of a file has permission checked with respect to the ``owner'' read, write, and execute mode bits,
members of the file's group other than the owner have permission checked with respect to the ``group'' mode bits, and all
others have permissions checked with respect to the ``other'' mode bits.
[EFAULT] path points outside the process's allocated address space.
[EIO] An I/O error occurred while reading from or writing to the file system.
[ELOOP] Too many symbolic links were encountered in translating the pathname.
[ENAMETOOLONG] A component of a pathname exceeded {NAME_MAX} characters, or an entire path name exceeded {PATH_MAX} characters.
[ENOENT] The named file does not exist.
[ENOTDIR] A component of the path prefix is not a directory.
[EROFS] Write access is requested for a file on a read-only file system.
[ETXTBSY] Write access is requested for a pure procedure (shared text) file presently being executed.
SEE ALSO
chmod(2), execve(2), stat(2), secure_path(3)
STANDARDS
The access() function conforms to ISO/IEC 9945-1:1990 (``POSIX.1'').
SECURITY CONSIDERATIONS
The access() system call is a potential security hole due to race conditions. It should never be used. Set-user-ID and set-group-ID appli-
cations should restore the effective user or group ID, and perform actions directly rather than use access() to simulate access checks for
the real user or group ID.
The access() system call may however have some value in providing clues to users as to whether certain operations make sense for a particular
filesystem object. Arguably it also allows a cheaper file existence test than stat(2).
BSD
May 3, 2010 BSD