Solved

X Question..its seemed to be normal.

Posted on 2000-03-22
3
230 Views
Last Modified: 2010-04-20
fresh install of RH 6.1, no changes from past installs.

selected to run in 5 w/X and use KDE.

all other servers under this setup seem to run gdm, but this one is running kdm and using ReflectionX to make a remote X log on tells me the station is not willing to be managed!

Any advice... I am not really sure where to look.

Thanks,
Frank
0
Comment
Question by:GrungyApe
  • 2
3 Comments
 
LVL 2

Accepted Solution

by:
Reinier earned 50 total points
ID: 2645900
KDM uses some of the xdm config files. Look in /etc/X11/xdm/Xaccess and try to figure out how this config file works.

Do you have a line

RefXhostname   # empty right hand side

or even

*              # empty right hand side

If not, put the first example there.
0
 

Author Comment

by:GrungyApe
ID: 2645937
Perfect!

Both options worked without issue, thank you!
0
 
LVL 2

Expert Comment

by:Reinier
ID: 2645963
Your welcome.

If the windows box has a static IP-number then use the upper, more specific one. I don't know your network situation, but you probabely don't want to have the whole LAN being able to "see" your linux box like that.
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question