Hi people, My workstation is running RH9, and I would like to start a software on my SuSE box, but would like the display on my workstation. How could I do that? P.S : I really can't install that software on my workstation, it has to be run 'server-side'. I could explain if that is surprizing for you :-) Thanks! Steve Hemond Programmeur Analyste / Analyst Programmer Smurfit-Stone, Ressources Forestières La Tuque, P.Q. Tel.: (819) 676-8100 X2833 mailto:shemond@smurfit.com
Hi, On Friday, November 21, 2003 at 16:32:59, Hemond, Steve wrote:
My workstation is running RH9, and I would like to start a software on my SuSE box, but would like the display on my workstation.
How could I do that?
ssh -X workstation application Henne p.s. please break your lines at 72 characters. thanks -- Hendrik Vogelsang aka Henne mailto: hvogel<at>hennevogel.de I want you to hit me as hard as you can. # random sigs made with fortune
-----Original Message-----
From: "Hemond, Steve"
Hi people,
My workstation is running RH9, and I would like to start a software on my SuSE box, but would like the display on my workstation.
How could I do that?
P.S : I really can't install that software on my workstation, it has to be run 'server-side'. I could explain if that is surprizing for you :-)
Thanks!
Steve Hemond
First you will need to allow other computers to display there programs on your screen. Either use xhost + or xhost +(name-of-other-computer) without the paren's Next connect to the remote computer using either telnet (bad) or ssh (good). Set the DISPLAY= to (your_computer-name):0 without the paren's Finally run the program. Ken Schneider
On Saturday 22 November 2003 6:59 am, Ken Schneider wrote:
Either use xhost + or xhost +(name-of-other-computer) without the paren's
Next connect to the remote computer using either telnet (bad) or ssh (good).
Set the DISPLAY= to (your_computer-name):0 without the paren's
Finally run the program.
Ken Schneider
Why do it insecurely via xhost? Are you assuming that this is a trusted LAN environment with no bad people around? Wouldn't it be better to use a VNC or equivalent to maintain security all the time? My understanding is that xhost opens up X to hacking. But then again if I could make a living out of being wrong I would have been a meteorologist... Stan
Stan Glasoe
On Saturday 22 November 2003 6:59 am, Ken Schneider wrote:
Either use xhost + or xhost +(name-of-other-computer) without the paren's
Next connect to the remote computer using either telnet (bad) or ssh (good).
Set the DISPLAY= to (your_computer-name):0 without the paren's
Finally run the program.
Ken Schneider
Why do it insecurely via xhost?
Some people will never accept that some methods are insecure and shouldn't be used. You can repeat the sentence "Don't use xhost, use ssh -X instead" forever but it has no effect on them ;-). -- A.M.
-----Original Message-----
From: Alexandr Malusek
Stan Glasoe
writes: On Saturday 22 November 2003 6:59 am, Ken Schneider wrote:
Either use xhost + or xhost +(name-of-other-computer) without the paren's
Next connect to the remote computer using either telnet (bad) or ssh (good).
Set the DISPLAY= to (your_computer-name):0 without the paren's
Finally run the program.
Ken Schneider
Why do it insecurely via xhost?
Some people will never accept that some methods are insecure and shouldn't be used. You can repeat the sentence "Don't use xhost, use ssh -X instead" forever but it has no effect on them ;-).
-- A.M.
Depends on how paranoid you are and where you use it. If you are on your home network who is it that you don't trust? It all depends on your environment. YES you DO NOT use this method in an untrusted network. Ken Schneider
Ken Schneider
Depends on how paranoid you are and where you use it. If you are on your home network who is it that you don't trust?
Children are the most dangerous computer users that have ever existed. Adults have been warned not to run software they don't trust but children don't care, it's part of their game. In other words, if you want to make a career as a computer hacker then start with web pages for young children. You may create special accounts but if children unknowingly download and activate a Trojan horse which monitors keyboard activity of other users then your credit card numbers, passwords, ... may soon travel over the Internet to an unknown location if you use host based access control. -- A.M.
-----Original Message-----
From: Alexandr Malusek
Ken Schneider
writes: Depends on how paranoid you are and where you use it. If you are on your home network who is it that you don't trust?
Children are the most dangerous computer users that have ever existed. Adults have been warned not to run software they don't trust but children don't care, it's part of their game. In other words, if you want to make a career as a computer hacker then start with web pages for young children.
Then those children were not brought up very well and the fault lies with the parent. Ken Schneider
participants (5)
-
Alexandr Malusek
-
Hemond, Steve
-
Henne Vogelsang
-
Ken Schneider
-
Stan Glasoe