Solved

After i install redhat 5.1 and after i key in startx my xwindows fickers a few times then fail to load up...

Posted on 1998-09-30
8
274 Views
Last Modified: 2013-12-15
How do I setup my modem like those done in the win95???
0
Comment
Question by:yueweng1
8 Comments
 
LVL 3

Expert Comment

by:marcelofr
ID: 1630938
try using xf86config instead of Xconfigurator...
also try "X --probeonly > /tmp/log 2>&1"  and post you think is relevant form /tmp/log...

Good luck
0
 

Author Comment

by:yueweng1
ID: 1630939
u mean just type in xf86config in the root directory???

I don't really understand "X --probeonly > /tmp/log 2>&1"  and /tmp/log
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1630940
login as root, then in the shell type:

   X --probeonly > /tmp/log 2>&1
   more /tmp/log
   xf86config
0
 

Author Comment

by:yueweng1
ID: 1630941
Edited text of question
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 

Author Comment

by:yueweng1
ID: 1630942
Do u know how to setup modem and dial up to certain server with a proxy???

Thanks for your help!!!

yueweng
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1630943
What's going on here?
The title did no longer match the question.
0
 
LVL 4

Accepted Solution

by:
jetx earned 230 total points
ID: 1630944
to setup a modem just make sure you have the modem connected right then issue
man minicom
read the manual first then try the command minicom

-Jeff
0
 

Author Comment

by:yueweng1
ID: 1630945
So what happened if I lost my manual???  I try using the seyon but the PC hanged when  I am about to enter the userid what do u think is the problem?

hope to hear from u soom...
yueweng
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now