12-20-2016
Thx, I have that but TA, but it still will not stay changed. I may need to remove the old machine from my /etc/hosts list and add it back after making the change and relink? Thoughts?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hiya,
what is the exact command to add a Unix machine to the existing domain?
Is this command different for Linux/HP-Ux?
thanks (3 Replies)
Discussion started by: Wize
3 Replies
2. IP Networking
hi all.
am unable to ping a freebsd machine using fully qualified domain name from a windows machine.
i have already set the fqdn for the machine.
plz advise me.
thanks. (2 Replies)
Discussion started by: coolatt
2 Replies
3. Windows & DOS: Issues & Discussions
Dear Expert,
i have linux box that is running in the windows domain, BUT did not being a member of the domain. as I am not the System Administrator so I have no control on the server in the network, such as modify dns entry , add the linux box in AD and domain record and so on that relevant.
... (2 Replies)
Discussion started by: regmaster
2 Replies
4. Red Hat
Hi All,
URGENT - Please help me form a scipt for this:
I need the LATEST file from a dir on REMOTE machine to be SCP'd to a dir on local machine. (and I need to execute this from local server)
I know that the below cmd is used to find the LATEST file from a dir. But this command is not... (3 Replies)
Discussion started by: me_ub
3 Replies
5. Solaris
Hi All,
I am working on Solaris sparc 9 and my computer name is mgsun.
I want to bring this machine to a specific domain (e.g.-xx.xx.org).
So please help me to do the same..
thanks in Advance... (4 Replies)
Discussion started by: smartgupta
4 Replies
6. Shell Programming and Scripting
I need a shell script to copy files frm a linux machine to a windows machine using SCP. The files keeps changing day-to-day. I have to copy the latest file to the windows machine frm the linux machine.
for example :In Linux, On July 20, the file name will be 20.txt and it should be copied to... (3 Replies)
Discussion started by: nithin6034
3 Replies
7. Shell Programming and Scripting
Hi All..
Am new to Unix!!
Am creating a shell script in which a scenario is like i have transfer the output file from unix machine (Server) to local directory (Windows xp).
And also i have to transfer the input file from the local directory to Unix machine (Server)
Any help from you... (1 Reply)
Discussion started by: vidhyaS
1 Replies
8. UNIX for Advanced & Expert Users
Hi Am using unix Ksh
Am getting the problem while transferring zero size files through the script .
When i transfer zero size files from local machine to remote machine manually i can able to do it .
My question its beause of zero size files am not able to transfer through script ? or its... (2 Replies)
Discussion started by: Venkatesh1
2 Replies
9. Linux
Hi,
Could you please help me with the below issue..
I'm running RHEL6 OS on both server (192.168.0.10) and client machines (192.168.0.1).
I'm trying to connect to server from the client machine using ftp service.
I have installed vsftpd daemon on both the machines.
I'm getting... (4 Replies)
Discussion started by: raosr020
4 Replies
10. Red Hat
I want to SSH to 192.168.1.15 Server from my machine, my ip was 192.168.1.99
Source Destination was UP, with IP 192.168.1.15.
This is LAN Network there are 30 Machine's Connected to the network and working fine, I'm Playing around the local machine's because I need to apply the same rules in... (2 Replies)
Discussion started by: babinlonston
2 Replies
xhost(1X) xhost(1X)
NAME
xhost - server access control program for X
SYNOPSIS
xhost [[+-]name...]
OPTIONS
xhost accepts the following command line options described below. For security, the options that effect access control may only be run
from the "controlling host". For workstations, this is the same machine as the server. For X terminals, it is the login host. Prints a
usage message. The given name (the plus sign is optional) is added to the list allowed to connect to the X server. The name can be a host
name or a user name. The given name is removed from the list of allowed to connect to the server. The name can be a host name or a user
name. Existing connections are not broken, but new connection attempts will be denied. Note that the current machine is allowed to be
removed; however, further connections (including attempts to add it back) will not be permitted. Resetting the server (thereby breaking
all connections) is the only way to allow local connections again. Access is granted to everyone, even if they are not on the list (that
is, access control is turned off). Access is restricted to only those on the list (that is, access control is turned on). If no command
line arguments are given, a message indicating whether or not access control is currently enabled is printed, followed by the list of those
allowed to connect. This is the only option that may be used from machines other than the controlling host.
DESCRIPTION
The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case
of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environ-
ment, although it does limit the worst abuses. Environments which require more sophisticated measures should implement the user-based
mechanism, or use the hooks in the protocol for passing other authentication data to the server.
Hostnames that are followed by two colons (::) are used in checking DECnet connections; all other hostnames are used for TCP/IP connec-
tions.
NAMES
A complete name has the syntax "family:name" where the families are as follows: Internet host DECnet host Secure RPC network name Kerberos
V5 principal contains only one name, the empty string.
The family is case insensitive. The format of the name varies with the family. For backward compatibility with pre-R6 xhost, names that
contain an at-sign (@) are assumed to be in the nis family. Otherwise, the inet family is assumed.
DIAGNOSTICS
For each name added to the access control list, a line of the form "name being added to access control list" is printed. For each name
removed from the access control list, a line of the form "name being removed from access control list" is printed.
ENVIRONMENT
to get the default host and display to use.
FILES
/etc/X*.hosts
BUGS
You cannot specify a display on the command line because -display is a valid command line argument (indicating that you want to remove the
machine named "display" from the access list).
The X server stores network addresses, not host names. This is not really a bug. If somehow you change a host's network address while the
server is still running, xhost must be used to add the new address and/or remove the old address.
SEE ALSO
X(1X), Xsecurity(1X), Xdec(1X), xdm(1X)
AUTHORS
Bob Scheifler, MIT Laboratory for Computer Science,
Jim Gettys, MIT Project Athena (DEC).
xhost(1X)