Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
X Window System Network Performance
X Window System Network Performance Keith Packard Cambridge Research Laboratory, HP Labs, HP [email protected] James Gettys Cambridge Research Laboratory, HP Labs, HP [email protected] Abstract havior (or on a local machine, context switches between the application and the X server). Performance was an important issue in the develop- One of the authors used the network visualization tool ment of X from the initial protocol design and contin- when analyzing the design of HTTP/1.1 [NGBS 97]. ues to be important in modern application and extension The methodology and tools used in that analysis in- development. That X is network transparent allows us volved passive packet level monitoring of traffic which to analyze the behavior of X from a perspective seldom allowed precise real-world measurements and compar- possible in most systems. We passively monitor network isons. The work described in this paper combines this packet flow to measure X application and server perfor- passive packet capture methodology with additional X mance. The network simulation environment, the data protocol specific analysis and visualization. Our experi- capture tool and data analysis tools will be presented. ence with this combination of the general technique with Data from this analysis are used to show the performance X specific additions was very positive and we believe impact of the Render extension, the limitations of the provides a powerful tool that could be used in the analy- LBX extension and help identify specific application and sis of other widely used protocols. toolkit performance problems. We believe this analysis With measurement tools in hand, we set about char- technique can be usefully applied to other network pro- acterizing the performance of a significant selection of tocols. -
Setting up Horizon 7 for Linux Desktops
Setting Up Horizon 7 for Linux Desktops SEP 2019 VMware Horizon 7 7.10 Setting Up Horizon 7 for Linux Desktops You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to [email protected] VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2016-2019 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Setting Up Horizon 7 for Linux Desktops 6 1 Features and System Requirements 7 Features of Horizon Linux Desktops 7 Overview of Configuration Steps for Horizon 7 for Linux Desktops 13 System Requirements For Horizon 7 for Linux 14 Virtual Machine Settings for 2D Graphics 23 Configuring Session Collaboration on Linux Desktops 23 2 Preparing a Linux Virtual Machine for Desktop Deployment 26 Create a Virtual Machine and Install Linux 26 Prepare a Linux Machine for Remote Desktop Deployment 27 Install Dependency Packages for Horizon Agent 29 3 Setting Up Active Directory Integration for Linux Desktops 31 Integrating Linux with Active Directory 31 Use the OpenLDAP Server Pass-Through Authentication 32 Set Up SSSD LDAP Authentication Against the Microsoft Active Directory 32 Use the Winbind Domain Join Solution 32 Configure PowerBroker Identity Services Open (PBISO) Authentication 33 Configure the Samba Offline Domain Join 34 Use the Realmd Join Solution for RHEL 8 36 Setting Up Single Sign-On 37 Setting Up Smart Card Redirection 38 Integrate a RHEL 8 Desktop -
ULTRIX and UWS Version 4.3
ULTRIX and UWS Version 4.3 Release Notes Part Number: AA-ME85H-TE ULTRIX and UWS Version 4.3 Release Notes Order Number: AA-ME85H-TE August 1992 Product Version: ULTRIX and ULTRIX Worksystem Software (UWS) Version 4.3 This manual lists new features and changes to the ULTRIX and UWS products. It also discusses product software and documentation problems. digital equipment corporation Maynard, Massachusetts Restricted Rights: Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. © Digital Equipment Corporation 1992 All rights reserved. Portions of the information herein are derived from copyrighted material as permitted under license agreements with AT&T and the Regents of the University of California. © AT&T 1979, 1984. All Rights Reserved. Portions of the information herein are derived from copyrighted material as permitted under a license agreement with Sun MicroSystems, Inc. © Sun MicroSystems, Inc, 1985. All Rights Reserved. Portions of this document © Massachusetts Institute of Technology, Cambridge, Massachusetts, 1984, 1985, 1986, 1988. The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may be used or copied only in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by Digital or its affiliated companies. -
Solaris X Window System Reference Manual
Solaris X Window System Reference Manual Sun Microsystems, Inc. 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. 1995 Sun Microsystems, Inc., 2550 Garcia Avenue, Mountain View, California 94043-1100 USA. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX system, licensed from UNIX System Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. Third- party software, including font technology in this product, is protected by copyright and licensed from Sun's Suppliers. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS Sun, Sun Microsystems, the Sun logo, SunSoft, the SunSoft logo, Solaris, SunOS, OpenWindows, DeskSet, ONC, ONC+, and NFS are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. OPEN LOOK is a registered trademark of Novell, Inc. -
Securing the X Window System with Selinux Doug Kilpatrick NAI Labs [email protected]
Securing The X Window System With SELinux Doug Kilpatrick NAI Labs [email protected] Wayne Salamon NAI Labs [email protected] Chris Vance NAI Labs [email protected] This work supported by NSA contract MDA904-01-C-0926 (SELinux) Initial: January 2003, Last revised: March 2003 NAI Labs Report #03-006 Table of Contents 1. Introduction............................................................................................................................................2 2. Overview of the X Architecture............................................................................................................3 3. Threats and Security Concerns ............................................................................................................4 3.1. Confidentiality.............................................................................................................................4 3.2. Integrity.......................................................................................................................................5 3.3. Availability..................................................................................................................................5 3.4. Assurance ....................................................................................................................................5 3.5. Covert Channels ..........................................................................................................................5 4. Requirements .........................................................................................................................................6 -
Linux Virtual Delivery Agent 7.12
Linux Virtual Delivery Agent 7.12 Jan 25, 2017 This pdf file includes the Linux Virtual Delivery Agent 7.12 documentation. You can save a local copy of this file and use it offline. Use the built-in Search and Bookmark features to find what you need. You can create Linux virtual desktops and applicat ions based on a RedHat , CentOS, SUSE or Ubunt u distributions. Prepare your Linux virt ual machines, install the new sof tware on them, configure your Delivery Cont roller, and then use Studio to make the desktops and applicat ions available to users. https://docs.citrix.com © 1999-2017 Citrix Systems, Inc. All rights reserved. p.1 What's New Feb 06, 2017 The following new and enhanced features are part of this release of the Linux VDA. This release provides support for Xauthority. With this functionality, cookie-based access for X Window authorization is now supported by the Linux VDA. For more information, see Configure Xauthority. Tip The Xauthority file can be found in the logon user’s home directory, and is used to store credentials in cookies that are used by xauth for the authentication of X sessions. Once an X session is launched, the cookie is used to authenticate connections to that specific display. This release provides support for IPv6. With this support, the 128-bit addressing schema is now extended to the Linux VDA. For more information, see Configure IPv6. Support for secure LDAP (LDAPS) is implemented in this version of the Linux VDA. With this support, you can enable the Secure Lightweight Directory Access Protocol for your Active Directory managed domains to provide communication over SSL (Secure Socket Layer)/TLS (Transport Layer Security). -
Free and Open Source Software
Free and open source software Copyleft ·Events and Awards ·Free software ·Free Software Definition ·Gratis versus General Libre ·List of free and open source software packages ·Open-source software Operating system AROS ·BSD ·Darwin ·FreeDOS ·GNU ·Haiku ·Inferno ·Linux ·Mach ·MINIX ·OpenSolaris ·Sym families bian ·Plan 9 ·ReactOS Eclipse ·Free Development Pascal ·GCC ·Java ·LLVM ·Lua ·NetBeans ·Open64 ·Perl ·PHP ·Python ·ROSE ·Ruby ·Tcl History GNU ·Haiku ·Linux ·Mozilla (Application Suite ·Firefox ·Thunderbird ) Apache Software Foundation ·Blender Foundation ·Eclipse Foundation ·freedesktop.org ·Free Software Foundation (Europe ·India ·Latin America ) ·FSMI ·GNOME Foundation ·GNU Project ·Google Code ·KDE e.V. ·Linux Organizations Foundation ·Mozilla Foundation ·Open Source Geospatial Foundation ·Open Source Initiative ·SourceForge ·Symbian Foundation ·Xiph.Org Foundation ·XMPP Standards Foundation ·X.Org Foundation Apache ·Artistic ·BSD ·GNU GPL ·GNU LGPL ·ISC ·MIT ·MPL ·Ms-PL/RL ·zlib ·FSF approved Licences licenses License standards Open Source Definition ·The Free Software Definition ·Debian Free Software Guidelines Binary blob ·Digital rights management ·Graphics hardware compatibility ·License proliferation ·Mozilla software rebranding ·Proprietary software ·SCO-Linux Challenges controversies ·Security ·Software patents ·Hardware restrictions ·Trusted Computing ·Viral license Alternative terms ·Community ·Linux distribution ·Forking ·Movement ·Microsoft Open Other topics Specification Promise ·Revolution OS ·Comparison with closed -
The X Window System
The X Window System Version y z x James Gettys Philip L Karlton and Scott McGregor Digital Equipment Corp oration Silicon Graphics Computer Systems CRL Decemb er Abstract The X Window System has b ecome widely accepted by manymanufac turers X provides network transparent access to displayservers allowing lo cal and remote client programs to access a users display X is used on high p erformance workstation displays as well as terminals and client programs run on everything from micro to sup er computers This pap er describ es the tradeos and basic design decisions made during the design of X Version We presume familiarity with the pap er describing XVersion Keywords X Window System interactivehumancomputer interface sys tem distributed systems c Digital Equipment Corp oration and Silicon Graphics Computer Systems All rights reserved The X Window System is a Massachusetts Institute of Technology trademark This pap er will app ear in a sp ecial issue of SoftwarePractice and Experience y Digital Equipment Corp oration Cambridge ResearchLab One Kendall Square Bldg Cambridge MA USA jgcrldeccom z Silicon Graphics Computer Systems Systems Software Division N Shore line Boulevard Mountain View CA USA karltonsgicom x Formerly at Digital Equipment Corp oration now at The Santa Cruz Op eration Encinal Street PO Box Santa Cruz CA USA mcgregorscocom The X Window System Version 11 JAMES GETTYS Digital Equipment Corporation, Cambridge Research Laboratory One Kendall Square, Bld 700 Cambridge, MA 02139, U.S.A. [email protected] PHILIP L. KARLTON Silicon Graphics Computer Systems, Systems Software Division, 2011 N. Shoreline Boulevard Mountain View, CA 94039-7311, U.S.A. -
SWM -- Simple Window Manager
CZECH TECHNICAL UNIVERSITY IN PRAGUE Faculty of Information Technology F8 Department of Theoretical Computer Science Master’s Thesis SWM – Simple Window Manager Jan Bína May 2020 Supervisor: Ing. Filip Křikava, Ph.D. Acknowledgement / Declaration I would first like to thank my thesis I hereby declare that the presented the- supervisor, Ing. Filip Křikava, Ph.D., sis is my own work and that I have cited for the introduction to this topic and all sources of information in accordance thesis guidance. I would also like to with the Guideline for adhering to eth- thank the Czech Technical University in ical principles when elaborating an aca- Prague and the University of Helsinki demic final thesis. for providing me with a high-quality I acknowledge that my thesis is subject education. Finally, I would like to to the rights and obligations stipulat- express my very profound gratitude to ed by the Act No. 121/2000 Coll., the my parents, family, and friends for pro- Copyright Act, as amended. In accor- viding me with unfailing support and dance with Article 46 (6) of the Act, I continuous encouragement throughout hereby grant a nonexclusive authoriza- my years of study. tion (license) to utilize this thesis, in- cluding any and all computer programs incorporated therein or attached there- to and all corresponding documentation (hereinafter collectively referred to as the “Work”), to any and all persons that wish to utilize the Work. Such per- sons are entitled to use the Work in any way (including for-profit purposes) that does not detract from its value. This authorization is not limited in terms of time, location and quantity. -
PDF Designed for Human Modification
Cygwin/X Frequently Asked Questions 2018-06-29 18:20 Questions and Answers 1. General Information 1.1. What is Cygwin/X? Cygwin/X is a port of the X Window System to Cygwin. Cygwin provides a UNIX-like API on the Win32 platform. 1.2. What is Cygwin? Cygwin tools are, in the words of the Cygwin FAQ (http://cygwin.com/faq.html#faq.what), “ ports of the popular GNU development tools and utilities for Microsoft Windows. They run thanks to the Cygwin library which provides the POSIX system calls and environment these programs expect. ” Cygwin provides the compiler (gcc), libraries, headers, and other utilities which build and support the operation of Cygwin/X. 1.3. What is the X Window System? [ScheiflerGettys92] The X Window System, or X, is a network-transparent window system. With X, multiple applications can run simultaneously in windows, generating text and graphics in monochrome or color on a bitmap display. Network transparency means that application programs can run on machines scattered through the network. 1.4. What is an X Server? An X Server is a program that provides display and user input services to other programs. In comparison, a file server provides other programs with access to file storage devices. File servers are typically located in a remote location and you use the services of a file server from the machine that you are located at. In contrast, an X Server is typically running on the machine that you are located at; display and user input services may be requested by programs running on your machine, as well as by programs running on remote machines. -
Software Tools to Facilitate Research Programming A
SOFTWARE TOOLS TO FACILITATE RESEARCH PROGRAMMING A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Philip Jia Guo May 2012 © 2012 by Philip Jia Guo. All Rights Reserved. Re-distributed by Stanford University under license with the author. This work is licensed under a Creative Commons Attribution- Noncommercial 3.0 United States License. http://creativecommons.org/licenses/by-nc/3.0/us/ This dissertation is online at: http://purl.stanford.edu/mb510fs4943 ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Dawson Engler, Primary Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Jeffrey Heer I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Margo Seltzer Approved for the Stanford University Committee on Graduate Studies. Patricia J. Gumport, Vice Provost Graduate Education This signature page was generated electronically upon submission of this dissertation in electronic format. An original signed hard copy of the signature page is on file in University Archives. iii Abstract Research programming is a type of programming activity where the goal is to write computer programs to obtain insights from data. -
SNAP Computing and the X Window System
SNAP Computing and the X Window System James Gettys Hewlett-Packard Company [email protected] Abstract 1 Introduction Today’s computing mantra is “One keyboard, As much as three quarters of the cost of com- one mouse, one display, one computer, one puting in enterprise environments now goes to user, one role, one administration”; in short, system management and support; the hardware one of everything. However, if several people and software purchase cost is well under half try to use the same computer today, or cross of the total expense. In the some parts of the adminstrative boundaries, or change roles from developing world, expertise may be in shorter work to home life, chaos generally ensues. supply than computers. Personally, I now man- age three systems at home, in addition to three Several hardware technologies will soon push for work. Clearly something needs to be done. this limited model of computing beyond the breaking point. Projectors and physically large Project Athena[13], a joint project of Digital, flat panel displays have become affordable and MIT, and IBM in the mid 1980’s, had the vi- are about to take a leap in resolution[12]. Cell- sion of centrally administrated, personal com- phone-size devices can now store many giga- puting, in which mobile students and faculty bytes of information, take high resolution pho- could use whichever computer was most con- tographs, have significant computation capabil- venient or appropriate for their work. Out of ity, and are small enough to always be with you. this project was born a number of technolo- gies that we take for granted today, including Ask yourself “Why can’t we sit with friends, Kerberos[24], the X Window System[31], cen- family, or coworkers in front of a large display tral administration of configuration information with audio system, and all use it at once?” using Hesiod[18] (now mostly supplanted by LDAP), and Zephyr[17], the first instant mes- You should be able change roles or move lo- sage system.