02-03-2019
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi!
I have installed wine but when I wan't to run it it says
Can't open configuration file /root/.wine/config
..
I'm root when i run it.. (2 Replies)
Discussion started by: CreamHarry
2 Replies
2. UNIX Desktop Questions & Answers
Please, for god's sake, if your going to refer me to a web site, please dont bother replying. I have visited all web sites concerning wine and I haven't seen one that quite solves the problem am having.
heres the situation:
I have a Linux Red Hat 7.2 and Windows 98 operating system. Now, I... (7 Replies)
Discussion started by: TRUEST
7 Replies
3. UNIX for Dummies Questions & Answers
how the hell do you put wine in because i don't know i have mandrake please tell how to put in (1 Reply)
Discussion started by: amicrawler
1 Replies
4. Linux
Hey,
I've switched my main PC over to Mandrake 10.1. Everything is set up except for Wine. I'm having problems installing WoW(world of warcraft). It says that it can not install it because i may be out of hard drive room. I've checked and i'm not. Wine is installed on the correct... (1 Reply)
Discussion started by: byblyk
1 Replies
5. Linux
i was under the impression that the Gens Emulator would work fine using Wine, and I have had it function once before (although im not sure how i got it to work)... it loads up fine but when i go to load a ROM it just closes... this is a fresh FC3 installation and ive set everything up the same...... (3 Replies)
Discussion started by: HMSS013
3 Replies
6. Linux
# wine Endless.exe
fixme:mmtime:timeBeginPeriod Stub; we set our timer resolution at minimum
fixme:ddraw:Main_DirectDraw_SetCooperativeLevel (0x3ffaa6a0)->(0001002a,00000008)
fixme:dmime:IDirectMusicPerformance8Impl_Init (iface = 0x3ffabd98, dmusic = (nil), dsound = (nil), hwnd = (nil))... (0 Replies)
Discussion started by: Archduke Qualin
0 Replies
7. Solaris
Hi All,
I have wine error on solaris 10 , like's below :
bash-3.00$ wine
wine: creating configuration directory '/usr/user/zonk/.wine'...
fixme:file:get_default_drive_device auto detection of DOS devices not supported on this platform
fixme:ntdll:NtQueryVolumeInformationFile device info... (0 Replies)
Discussion started by: zonk
0 Replies
8. Linux
What are the differences, advantages, and disadvantages? (1 Reply)
Discussion started by: Advice Pro
1 Replies
9. Fedora
Hello probably not the best website to talk about gaming on your unix box :)
but lets say I have wanted to see how well DIABLO 2 Runs on my
Fedora 9 box
What all would I have to DOWNLOAD and or install and what order :)
any direction would be great I just want to try out wine , and... (2 Replies)
Discussion started by: Producer
2 Replies
LEARN ABOUT OSF1
secconfig
secconfig(8) System Manager's Manual secconfig(8)
NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES
RELATED INFORMATION
acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)