Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- e/someuser/.Xauthority -display :0
- x11vnc -auth /tmp/.gdmzndVlR -display :0
- you must have read permission for the auth file.
- See also '-auth guess' and '-findauth' discussed below.
- ** If NO ONE is logged into an X session yet, but there is a greeter login
- program like "gdm", "kdm", "xdm", or "dtlogin" running, you will need
- to find and use the raw display manager MIT-MAGIC-COOKIE file.
- Some examples for various display managers:
- gdm: -auth /var/gdm/:0.Xauth
- -auth /var/lib/gdm/:0.Xauth
- kdm: -auth /var/lib/kdm/A:0-crWk72
- -auth /var/run/xauth/A:0-crWk72
- xdm: -auth /var/lib/xdm/authdir/authfiles/A:0-XQvaJk
- dtlogin: -auth /var/dt/A:0-UgaaXa
- Sometimes the command "ps wwwwaux | grep auth" can reveal the file location.
- Starting with x11vnc 0.9.9 you can have it try to guess by using:
- -auth guess
- (see also the x11vnc -findauth option.)
- Only root will have read permission for the file, and so x11vnc must be run
- as root (or copy it). The random characters in the filenames will of course
- change and the directory the cookie file resides in is system dependent.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement