Aaron W. Hsu wrote:
I have read ssh(1) and xhost(1), as well as this page:
http://piast.cbio.psu.edu/reference/NetworkingCD2.0/ssh/ch09_03.htm
where it says:
X forwarding with authentication spoofing solves all but one of
the X authentication problems we raised earlier:
I have read ssh(1) and xhost(1), as well as this page:
http://piast.cbio.psu.edu/reference/NetworkingCD2.0/ssh/ch09_03.htm
where it says:
X forwarding with authentication spoofing solves all but one of
the X authentication problems we raised earlier:
xhost
2 matches
Mail list logo