10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello All,
My question is about VNC'ing to a Linux server on the network.
MY PC: OpenSuSE 11.4 (i586)
Remote Server: OpenSuSE 12.3 (x86_64)
### UNAME:
# uname -a
Linux localhost.foo.bar 3.7.10-1.1-desktop #1 SMP PREEMPT Thu Feb 28 15:06:29 UTC 2013 (82d3f21) x86_64 x86_64 x86_64... (1 Reply)
Discussion started by: mrm5102
1 Replies
2. Ubuntu
hi,
I have a netbook with duo boot (win7 starter + ubuntu 12.04).
I tested it only in ubuntu and I could not set illumination by pressing "function+right arrow" or "function+left arrow" buttons.
Has anybody ever faced similar problem?
Thanks in advance
Boris (6 Replies)
Discussion started by: baris35
6 Replies
3. UNIX for Dummies Questions & Answers
Hi all,
I use the shortcut keys CTRL-a and CTRL-e to move cursor to start and end of line in shell prompt alot. But recently what happened to my system i don't know only CTRL-a is working not CTRL-e . If i press CTRL-e any other window in that desktop pop's up. Can any1 tell me how to correct... (2 Replies)
Discussion started by: vio719
2 Replies
4. Red Hat
Hi,
I've generated and posted pub. keys in the source system and the target. However, it is still prompting me for the password.
Steps that I have taken.
1. Generated ssh keys : ssh-keygen. It created two files.
1. .ssh/id_rsa
2. .ssh/id_rsa.pub.
2.... (10 Replies)
Discussion started by: Afi_Linux
10 Replies
5. Solaris
Hello,
I hope I put this in the right forum...
I searched for similar threads, but I couldn't find any that seem to deal with the problem I am having.
My workplace is using (among other Solaris-machines) Dell Dimension T3500 as workstations (running Solaris 10 X86 10/09 u8,... (0 Replies)
Discussion started by: areichart
0 Replies
6. UNIX for Advanced & Expert Users
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
Discussion started by: srrao.ch
1 Replies
7. Shell Programming and Scripting
Hi,
We have two open SSh systems(Let us assume that A and B).These systems are having the non expiring passwords. We established a passwordless connection between two systems bu using the rsa key iles. I have created the key generated files by using the command ssh-keygen -t rsa in system A and... (1 Reply)
Discussion started by: srrao.ch
1 Replies
8. UNIX for Dummies Questions & Answers
Hi
I am working on SunOS 5.10 from remote terminal using putty.
Also
echo $TERM
xterm
In vi editor when in insert mode arrow keys are not working for cursor movement instead they print A B C and D.
Please help.
thanks
ravs (7 Replies)
Discussion started by: ravashingravi
7 Replies
9. Windows & DOS: Issues & Discussions
Hi, In my MSDOS version on windows'98, many keys are not working. I feel that my version is old and I wnt to update it. Can anyone tell me how can i do so.
Please tell me soon.
Thanks a lot.
-Kinnaree
:confused: (1 Reply)
Discussion started by: kinnaree
1 Replies
10. UNIX for Dummies Questions & Answers
Hello everyone, I want to host a mud and I found the cheapest way to do this was to install Linux on my computer and use it as the server. I downloaded both of the ISO images, it took 16 hours but i did it. But, I have no CD burner. I read that I could make a boot diskette, but how do i get... (3 Replies)
Discussion started by: Frax
3 Replies
AUTHCONFIG-GTK(8) System Manager's Manual AUTHCONFIG-GTK(8)
NAME
authconfig-gtk, system-config-authentication - GUI utility for configuring user identity and system authentication services
SYNOPSIS
authconfig-gtk [--nox] [--updateall] [--firstboot]
DESCRIPTION
authconfig-gtk provides a simple graphical user interface for configuring user identity and system authentication services. It provides
basic configuration options to handle NIS, LDAP, Kerberos 5, and Winbind client configuration.
OPTIONS
If the --nox option is specified, authconfig command line utility is run instead of the GUI.
The --updateall option forces overwriting of all configuration files not only the files affected by the changes made in the user interac-
tion with the GUI. This option can be useful in case the configuration files are broken by manual editing.
The --firstboot option is to be used only when firstboot utility runs the GUI during the first setup of the system after installation.
RETURN CODES
authconfig-gtk returns 0 on success, non zero on error.
SEE ALSO
authconfig(8), system-auth-ac(5)
AUTHORS
Nalin Dahyabhai <nalin@redhat.com>, Preston Brown <pbrown@redhat.com>,
Matt Wilson <msw@redhat.com>, Tomas Mraz <tmraz@redhat.com>
Red Hat, Inc. 31 March 2010 AUTHCONFIG-GTK(8)