Ncdware System Administrator's Guide for UNIX Systems

Total Page:16

File Type:pdf, Size:1020Kb

Ncdware System Administrator's Guide for UNIX Systems NCDware System Administrator’s Guide for UNIX Systems Part Number 9300672, Revision A November, 1998 Network Computing Devices, Inc. 350 North Bernardo Avenue Mountain View, California 94043 Telephone (650) 694-0650 FAX (650) 961-7711 Copyright Copyright © 1998 by Network Computing Devices, Inc. The information contained in this document is subject to change without notice. Network Computing Devices, Inc. shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains information which is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Network Computing Devices, Inc. Trademarks Network Computing Devices, PC-Xware, and XRemote are registered trademarks of Network Computing Devices, Inc. Explora, HMX, Marathon, NCDware, ThinSTAR, and WinCenter are trademarks of Network Computing Devices, Inc. PostScript, Display PostScript, FrameMaker, and Adobe are trademarks of Adobe Systems Incorporated. MetaFrame and WinFrame are trademarks of Citrix Systems, Inc. UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Limited. X Window System is a trademark of X Consortium, Inc. Windows 95, Windows NT, and Windows Terminal Server are trademarks of Microsoft Corporation. Windows and Microsoft are registered trademarks of Microsoft Corporation. Other trademarks and service marks are the trademarks and service marks of their respective companies. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. NCD cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Revisions Revision history of this document: Part No. Revision Date Description 9300672 Rev A November 1998 Revised for NCDware 5.1 9300569 Rev B October 1997 Revised for NCDware 5.0 9300461 Rev A August 1996 Revised for NCDware 4.1 9300353 Rev A July 1995 NCDware 4.0 (first release of this guide) Contents Chapter 1 About this Manual Intended Audience 1-1 How to Use This Manual 1-1 About NCD Manuals 1-3 Conventions Used in this Manual 1-5 Comments on the Manual 1-6 Chapter 2 Introduction to Thin Client Devices and NCDware NCD Terminals and the Network Environment 2-1 The X Window System 2-2 NCDware Software 2-3 Boot Monitor 2-3 X Servers 2-4 Host-Resident Utilities 2-4 Chapter 3 Preparing Terminals for Booting Terminal Boot Actions 3-2 Booting Preparations Performed by ncdinstall 3-3 Setting the Token-Ring Network Speed—HMX Terminals 3-3 iii Contents Optional Preparations Before Booting 3-5 Improving Reliability 3-5 Booting 3-5 Login Services 3-6 Font Service 3-6 Name Service 3-6 License Service 3-7 Address Discovery—Using DHCP and BOOTP 3-7 Supported Option Tags 3-7 Dynamic IP Address Allocation using BOOTP 3-8 The bootptab.cfg File 3-8 The bootptab.ip File 3-10 Setting Up Domain Name Service for the Terminal 3-11 Verify that DNS Is Enabled on the Host 3-11 Configure the Terminal to Use DNS 3-11 Placing Required Files in Non-Standard Locations 3-12 Changing X Server Module Load Policy 3-14 About Module Load Policies 3-14 Changing Module Load Policies 3-15 Putting Modules in a Non-Standard Location 3-15 Licensed Features and Types of Licenses 3-16 Managing Node Licenses 3-17 Managing Floating and Site Licenses 3-17 License Management Binaries and Files 3-18 Installing License Management Software 3-19 Specifying License Server Hosts 3-20 Setting Up the license.dat File 3-20 Using an Options File 3-22 iv Contents Starting the License Management Daemons 3-22 Setting Up License Management on WinCenter Hosts 3-23 Configuring Terminals for the Network 3-25 Adding Terminals to the Network 3-25 Modifying Information about Terminals in System Files 3-27 Deleting Terminals from System Files 3-28 Booting Terminals 3-29 Booting from a PC Card 3-29 Rebooting 3-29 Booting Terminals Manually 3-29 Manual Boot from a Local File System 3-30 Manual Boot Using TFTP or NFS 3-30 Setup Menu Equivalents for Remote Configuration Parameters 3-31 Chapter 4 Terminal Configuration Methods Terminal Configuration Overview 4-1 Deciding How to Configure Terminals 4-2 Remote Configuration Files 4-2 Console Setup Menus—Interactive Configuration 4-2 TELNET—Interactive Configuration 4-3 Boot Monitor Setup Menus—Interactive Configuration 4-3 Interaction of Configuration Methods 4-3 About Configuration Parameters 4-4 Read/Write Parameters 4-4 Read-Only Parameters 4-5 When Parameters Take Effect 4-5 v Contents Configuring Terminals Using Remote Configuration Files 4-5 Host-Resident Configuration Files Created by ncdinstall 4-6 The Terminal-Specific Configuration Files 4-7 The Generic Remote Configuration File 4-8 Example Configuration File from the NCDware Distribution 4-10 Editing Remote Configuration Files 4-11 Configuration Commands Used in Remote Configuration Files 4-12 User Preferences File 4-12 Configuring Terminals Using Setup Menus 4-14 Displaying the Setup Menus 4-14 Changing Parameters in Setup Menus 4-16 Cancelling Changes 4-17 Applying Changes to the Current Configuration 4-17 Saving Changes 4-17 Loading Default Values 4-18 Configuring a Remote Terminal through Setup Menus 4-19 Configuring Terminals Using TELNET 4-20 Setting Passwords 4-20 Connecting to a Terminal’s Configuration Daemon 4-21 Using Interactive Configuration Commands 4-22 About Configuration Parameters 4-25 Read-Only and Write-Only Parameters 4-25 Parameter Values 4-25 Setting Parameters in Tables 4-26 Working with Tables in TELNET Sessions 4-26 Working with Tables in Remote Configuration Files 4-27 vi Contents Controlling Access to Terminal Configuration Data 4-28 Disabling the Setup Menus 4-28 Controlling Access to the Console and Setup Menus 4-28 Controlling Access to the Console 4-28 Controlling Access to Setup Menus 4-29 Setup Menu Equivalents for the Auto-Save Parameters 4-30 Chapter 5 Login and X Session Management XDM’s Purpose and Functions 5-1 Specifying the Hosts Offered for Login 5-2 Displaying a Login Banner Only 5-3 Login from a List of Specified Hosts 5-3 Login from One Specific Host 5-3 Login from the First Host to Respond 5-3 Displaying a Login Chooser 5-4 Listing Specific Hosts in the Login Chooser 5-4 Listing All Available Hosts in the Login Chooser 5-5 Windows NT Hosts in the Login Chooser 5-5 Using XDM to Customize the User Environment 5-6 Configuring a System-Wide Environment 5-6 Configuring Individual Environments 5-6 Controlling User and Host Connections to Terminals 5-7 Configuring the Host for XDM Access Control 5-8 Configuring the Terminal for XDM Access Control 5-9 Controlling Access When Clients Are Running on Multiple Hosts 5-10 Using xauth Interactively 5-11 Automating xauth 5-11 vii Contents Using the NCD Display Manager 5-11 About the NCD Display Manager 5-11 Setting Up the NCD Display Manager 5-13 Configuring NCD Terminal Emulator Login 5-14 Automating Login through the NCD Terminal Emulator 5-15 Configuring Terminal Emulator Sessions without Login 5-16 Configuring Login to Microsoft Windows NT Hosts 5-17 Setup Menu Equivalents for Configuration Parameters 5-18 Chapter 6 Configuring Font Service Using Bitmap Fonts 6-1 Bitmap Font Formats 6-2 Putting Fonts on a Non-Standard Host 6-2 Adding Bitmap Fonts to Font Directories 6-3 Using Alternate Fonts 6-4 Deleting Bitmap Fonts and Font Directories 6-5 Changing the Terminal’s Font Path 6-5 Changing the Font Path Permanently 6-5 Setting the Font Path for the Current X Session 6-6 Configuring the Font Path for CDE Bitmap Fonts 6-7 Using the NCD Font Server 6-8 Configuring Font Server Operation 6-9 Enabling the Font Server 6-11 Adding Font Servers to the Font Path 6-11 Adding Font Servers to the Font Path for CDE 6-12 Adding Outline Fonts 6-13 Setup Menu Equivalents for the Font Parameters 6-14 viii Contents Chapter 7 Starting and Configuring Local Clients Summary of Local Clients 7-1 Starting Local Clients 7-10 Starting Clients Automatically at Boot Time 7-10 Adding Clients to a Window Manager’s Root Menu 7-11 Configuring a Window Manager’s Menus 7-11 Launcher Configuration Files 7-12 Adding Local Clients to a Root Menu 7-13 Adding Host-Based Clients to a Root Menu 7-13 Adding Local Clients to the Default Root Menu 7-14 Starting Local Clients from the Console 7-15 Restricting Access to Clients 7-15 Disabling Access to Specific Local Clients from the Terminal 7-15 Restricting Access to Local Clients from Other Hosts 7-16 Restricting User Access to Local Clients 7-17 Configuring Local Clients 7-17 Setting Resources for Local Clients 7-17 Setting Resource Values through Remote Configuration 7-17 Setting Resources in Resource Files 7-18 Using Command-Line Options 7-18 Setup Menu Equivalents for Local Client Parameters 7-19 ix Contents Chapter 8 Getting Information About Terminal Operations Displaying the Console 8-1 Console Messages 8-2 Format of Console Messages 8-4 Viewing Messages in the Console Window 8-4 Viewing Messages through TELNET 8-5 Logging Messages to a File 8-5 Configuring Message Logging 8-6 Configuring Message Time Stamps 8-6 Changing the Message Buffer Size 8-6 Enabling Extended Diagnostics 8-6 X Server Messages Displayed in Dialog Boxes 8-7 Logout Confirmation Dialog Box 8-7 Kill X Clients Dialog Box 8-8 The Console Statistics Menus 8-8 Displaying General Information—Show Version 8-8 Displaying Memory
Recommended publications
  • Desktop Migration and Administration Guide
    Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Last Updated: 2021-05-05 Red Hat Enterprise Linux 7 Desktop Migration and Administration Guide GNOME 3 desktop migration planning, deployment, configuration, and administration in RHEL 7 Marie Doleželová Red Hat Customer Content Services [email protected] Petr Kovář Red Hat Customer Content Services [email protected] Jana Heves Red Hat Customer Content Services Legal Notice Copyright © 2018 Red Hat, Inc. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Using a PC Card in Your NCD Thin Client Device
    Using a PC Card in Your NCD Thin Client Device Part Number 9300674, Revision A November, 1998 Network Computing Devices, Inc. 350 North Bernardo Avenue Mountain View, California 94043 Telephone (650) 694-0650 FAX (650) 961-7711 E-mail: [email protected] Copyright Copyright © 1998 by Network Computing Devices, Inc. The information contained in this document is subject to change without notice. Network Computing Devices, Inc. shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains information which is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Network Computing Devices, Inc. Trademarks Network Computing Devices, PC-Xware, and XRemote are registered trademarks of Network Computing Devices, Inc. Explora, HMX, Marathon, NCDware, ThinSTAR, and WinCenter are trademarks of Network Computing Devices, Inc. PostScript, Display PostScript, FrameMaker, and Adobe are trademarks of Adobe Systems Incorporated. MetaFrame and WinFrame are trademarks of Citrix Systems, Inc. UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Limited. X Window System is a trademark of X Consortium, Inc. Windows 95, Windows NT, and Windows Terminal Server are trademarks of Microsoft Corporation. Windows and Microsoft are registered trademarks of Microsoft Corporation. Other trademarks and service marks are the trademarks and service marks of their respective companies. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized.
    [Show full text]
  • Porting a Window Manager from Xlib to XCB
    Porting a Window Manager from Xlib to XCB Arnaud Fontaine (08090091) 16 May 2008 Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version pub- lished by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". Contents List of figures i List of listings ii Introduction 1 1 Backgrounds and Motivations 2 2 X Window System (X11) 6 2.1 Introduction . .6 2.2 History . .6 2.3 X Window Protocol . .7 2.3.1 Introduction . .7 2.3.2 Protocol overview . .8 2.3.3 Identifiers of resources . 10 2.3.4 Atoms . 10 2.3.5 Windows . 12 2.3.6 Pixmaps . 14 2.3.7 Events . 14 2.3.8 Keyboard and pointer . 15 2.3.9 Extensions . 17 2.4 X protocol client libraries . 18 2.4.1 Xlib . 18 2.4.1.1 Introduction . 18 2.4.1.2 Data types and functions . 18 2.4.1.3 Pros . 19 2.4.1.4 Cons . 19 2.4.1.5 Example . 20 2.4.2 XCB . 20 2.4.2.1 Introduction . 20 2.4.2.2 Data types and functions . 21 2.4.2.3 xcb-util library . 22 2.4.2.4 Pros . 22 2.4.2.5 Cons . 23 2.4.2.6 Example . 23 2.4.3 Xlib/XCB round-trip performance comparison .
    [Show full text]
  • NCD Thin Client Xware User's Guide
    NCD NCD Thin Client Xware User’s Guide Part Number 5401612 June 1998 Network Computing Devices, Inc. 350 North Bernardo Avenue Mountain View, CA 94043-5207 Technical support: 503/641-2200 Technical support FAX: 503/641-2959 Email: [email protected] World Wide Web: http://www.ncd.com Copyright Copyright © 1998 by Network Computing Devices, Inc. The information contained in this document is subject to change without notice. NCD SHALL NOT BE LIABLE FOR ERRORS CONTAINED HEREIN OR FOR ANY DAMAGES WHATSOEVER, INCLUDING, WITHOUT LIMITATION, ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS MATERIAL. This document contains information which is protected by copyright. All rights are reserved. Made in the U.S.A. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of NCD. Title to and ownership of the Software, and all copies thereof, shall at all times reside with NCD and its licensors, and is protected by United States copyright laws and international treaty provisions. Trademarks Network Computing Devices is a registered trademark of Network Computing Devices, Inc. NCDnet, NCDware, and Thin Client Xware FTP are trademarks of Network Computing Devices, Inc. Apple and LaserWriter are registered trademarks of Apple Computer, Inc. Citrix, WinFrame, and ICA are registered trademarks of Citrix Systems, Inc. DECnet, DECwindows, VMS, VT, and ULTRIX are trademarks of Digital Equipment Corporation. Ethernet is a trademark of Xerox Corporation. Hewlett-Packard and LaserJet are registered trademarks of Hewlett-Packard Corporation. HP-UX is a trademark of Hewlett-Packard Corporation.
    [Show full text]
  • Gnome Display Manager Reference Manual Martin K
    Gnome Display Manager Reference Manual Martin K. Petersen [email protected] George Lebl [email protected] Brian Cameron [email protected] Bill Haneman [email protected] Table of Contents Terms and Conventions Used in This Manual ...............................................................3 Overview ................................................................................................................................3 Configuration.........................................................................................................................8 Controlling GDM ...............................................................................................................32 GDM Commands................................................................................................................38 Graphical Greeter Themes................................................................................................42 Accessibility.........................................................................................................................49 Example Configurations ....................................................................................................50 License...................................................................................................................................52 Terms and Conventions Used in This Manual This manual describes version 2.6.0.4 of the GNOME Display Manager. It was last updated on 7/14/2004. GDM - Gnome Display Manager. Used to describe the software package as
    [Show full text]
  • International Language Environments Guide
    International Language Environments Guide Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 806–6642–10 May, 2002 Copyright 2002 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, Java, XView, ToolTalk, Solstice AdminTools, SunVideo and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. SunOS, Solaris, X11, SPARC, UNIX, PostScript, OpenWindows, AnswerBook, SunExpress, SPARCprinter, JumpStart, Xlib The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry.
    [Show full text]
  • I. ELECTRONIC DISCOVERY: DEFINITIONS and USES A. What
    I. ELECTRONIC DISCOVERY: DEFINITIONS AND USES A. What Is Electronic Discovery? Electronic discovery includes requests for and production of information that is stored in digital form.1 In short, electronic discovery is the discovery of electronic documents and data.2 Electronic documents include virtually anything that is stored on a computer such as e-mail, web pages, word processing files, and computer databases.3 Electronic records can be found on a wide variety of devices such as desktop and laptop computers, network servers, personal digital assistants and digital phones.4 Documents and data are "electronic" if they exist in a medium that can only be read by using computers such as cache memory, magnetic disks (for example computer hard drives or floppy disks), optical disks (for example DVDs or CDs), and magnetic tapes.5 Electronic discovery is frequently distinguished from traditional "paper discovery," which is the discovery of writings on paper that can be read without the assistance of computers.6 B. Why E-Discovery Can Be Valuable in Litigation With the advancement of technology, electronic discovery is not only valuable in litigation, it is essential. Electronic evidence is affecting virtually every investigation today whether it is criminal or civil.7 Usually, there are no longer "paper- trails" that establish who did what and when.8 Instead, electronic evidence is providing the clues to understanding what actually happened.9 Consider these statistics regarding the electronic evidence explosion: · "In 2002, the International Data Corporation estimated that 31 billion e-mails were sent daily. This number is expected to grow to 60 billion a day by 2006.
    [Show full text]
  • Remote X Apps Mini-HOWTO
    Remote X Apps mini−HOWTO Remote X Apps mini−HOWTO Table of Contents Remote X Apps mini−HOWTO.........................................................................................................................1 Vincent Zweije, zweije@xs4all.nl.........................................................................................................1 1. Introduction..........................................................................................................................................1 2. Related Reading...................................................................................................................................1 3. The Scene.............................................................................................................................................1 4. A Little Theory....................................................................................................................................1 5. Telling the Client.................................................................................................................................1 6. Telling the Server.................................................................................................................................1 7. X Applications from Another User−id................................................................................................1 8. Running a Remote Window Manager..................................................................................................1 9. Setting Up an X Terminal....................................................................................................................1
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations.
    [Show full text]
  • Archive and Compressed [Edit]
    Archive and compressed [edit] Main article: List of archive formats • .?Q? – files compressed by the SQ program • 7z – 7-Zip compressed file • AAC – Advanced Audio Coding • ace – ACE compressed file • ALZ – ALZip compressed file • APK – Applications installable on Android • AT3 – Sony's UMD Data compression • .bke – BackupEarth.com Data compression • ARC • ARJ – ARJ compressed file • BA – Scifer Archive (.ba), Scifer External Archive Type • big – Special file compression format used by Electronic Arts for compressing the data for many of EA's games • BIK (.bik) – Bink Video file. A video compression system developed by RAD Game Tools • BKF (.bkf) – Microsoft backup created by NTBACKUP.EXE • bzip2 – (.bz2) • bld - Skyscraper Simulator Building • c4 – JEDMICS image files, a DOD system • cab – Microsoft Cabinet • cals – JEDMICS image files, a DOD system • cpt/sea – Compact Pro (Macintosh) • DAA – Closed-format, Windows-only compressed disk image • deb – Debian Linux install package • DMG – an Apple compressed/encrypted format • DDZ – a file which can only be used by the "daydreamer engine" created by "fever-dreamer", a program similar to RAGS, it's mainly used to make somewhat short games. • DPE – Package of AVE documents made with Aquafadas digital publishing tools. • EEA – An encrypted CAB, ostensibly for protecting email attachments • .egg – Alzip Egg Edition compressed file • EGT (.egt) – EGT Universal Document also used to create compressed cabinet files replaces .ecab • ECAB (.ECAB, .ezip) – EGT Compressed Folder used in advanced systems to compress entire system folders, replaced by EGT Universal Document • ESS (.ess) – EGT SmartSense File, detects files compressed using the EGT compression system. • GHO (.gho, .ghs) – Norton Ghost • gzip (.gz) – Compressed file • IPG (.ipg) – Format in which Apple Inc.
    [Show full text]
  • Linux XDMCP HOWTO
    Linux XDMCP HOWTO Thomas Chao [email protected] Revision History Revision v1.2 15 March 2002 Revised by: tc Adding more info for Red Hat 7.2, Mandrake 8.1 and Slackware 8.0 Linux configuration and SSH X11 Forwarding. Revision v1.1 20 March 2001 Revised by: tc Revision and adding RH 7.0. Revision v1.0 01 November 2000 Revised by: tc Initial revision and release. This HOWTO describes how you can use the combination of X Display Manager (xdm, kdm and gdm) and XDMCP (X Display Manager Control Protocol) to provide the mechanism for an X−Terminal and a platform of cheap Remote X Apps solution. This document will be focusing on how to setup connection using XDMCP. Linux XDMCP HOWTO Table of Contents 1. Introduction.....................................................................................................................................................1 1.1. Disclaimer.........................................................................................................................................1 1.2. Feedback...........................................................................................................................................1 2. The Procedure.................................................................................................................................................2 2.1. Before you begin, some backgrounds...............................................................................................2 2.2. Security Reminder............................................................................................................................2
    [Show full text]
  • Licensing Information User Manual Release 8.5 F11004-03 August 2020
    Oracle® Outside In Licensing Information User Manual Release 8.5 F11004-03 August 2020 Introduction This Licensing Information document is a part of the product or program documentation under the terms of your Oracle license agreement and is intended to help you understand the program editions, entitlements, restrictions, prerequisites, special license rights, and/or separately licensed third party technology terms associated with the Oracle software program(s) covered by this document (the "Program(s)"). Entitled or restricted use products or components identified in this document that are not provided with the particular Program may be obtained from the Oracle Software Delivery Cloud website (https://edelivery.oracle.com) or from media Oracle may provide. If you have a question about your license rights and obligations, please contact your Oracle sales representative, review the information provided in Oracle’s Software Investment Guide (http://www.oracle.com/us/corporate/pricing/ software-investment-guide/index.html), and/or contact the applicable Oracle License Management Services representative listed on http://www.oracle.com/us/corporate/ license-management-services/index.html. Licensing Information Product Subproduct Licensing Information Outside In Outside In Product Editions and Permitted Features Software ActiveX Viewer Oracle Outside In Viewer is an embeddable SDK that Developer Kits and Outside In renders high-fidelity views of files and allows printing, Viewer copy/paste and annotations. Prerequisite Products None Entitled Products and Restricted Use Licenses None 1 Product Subproduct Licensing Information Outside In Outside In Web Product Editions and Permitted Features Software View Export Oracle Outside In Web View Export is an embeddable Developer Kits SDK that converts files into high-fidelity HTML5 renditions.
    [Show full text]