You are on page 1of 328

Exceed

Users Guide

8370-6M

Exceed Users Guide


Version 11 Part Number 8370-6M Published in Canada June 30, 2005

Hummingbird Ltd. Corporate Headquarters


1 Sparks Avenue Toronto, Ontario M2H 2W1 Canada Toll Free Canada/U.S.A. 1 877 FLY HUMM (359 4866) Tel +1 416 496 2200 Fax +1 416 496 2207 E-mail getinfo@hummingbird.com For more information, visit connectivity.hummingbird.com RESTRICTED RIGHTS LEGEND Unpublished rights reserved under the copyright laws of the United States. The SOFTWARE is provided with restricted rights. Use, duplications, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of The Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, subparagraph (c) (1) and (2) (a) (15) of the Commercial Computer Software-Restricted Rights clause at 48 CFR 52.227-19, as applicable, similar clauses in the FAR and NASA FAR Supplement, any successor or similar regulation. Information in this document is subject to change without notice and does not represent a commitment on the part of Hummingbird Ltd. Not all copyrights pertain to all products. Copyright 2005, Hummingbird Ltd. All rights reserved. Trademarks and logos are the intellectual property of Hummingbird Ltd. Connectivity Kerberos, Connectivity Secure Shell, Connectivity SecureTerm, Connectivity SSL, Exceed, Exceed 3D, Exceed Connectivity Suite, Exceed onDemand, Exceed onDemand Client, Exceed onDemand Deployment Wizard, Exceed onDemand Server, Exceed onDemand Server Manager, Exceed PowerSuite, Exceed XDK, HostExplorer, HostExplorer Connectivity Suite, Host Access Services, HostExplorer Print Services, HostExplorer Web, Hummingbird Basic, Hummingbird Certificate Manager, Hummingbird Connectivity, Hummingbird Connectivity Suite, Hummingbird Core Services, Hummingbird Deployment Packager, Hummingbird Deployment Wizard, Hummingbird e-Gateway, Hummingbird FTP, Hummingbird InetD, Hummingbird Enterprise 2004, Hummingbird Proxy Server, Hummingbird SOCKS Client, NFS Maestro, NFS Maestro Client, NFS Maestro Gateway, NFS Maestro Server, NFS Maestro Solo, NFS Maestro Tuner, TXP, TXPM, and Xweb are trademarks of Hummingbird Ltd. and/or its subsidiaries. All other copyrights, trademarks, and tradenames are the property of their respective owners. ACKNOWLEDGEMENTS Portions of the code have been contributed by MIT. OpenGL is a registered trademark of Silicon Graphics Inc. This product includes software developed by the Apache Software Foundation (http://www.apache.org/). This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.OpenSSL.org/). The technology used by Smart Card Manager is derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface (Cryptoki). FONTS The fonts distributed are included free of charge. Some of the fonts were donated towards Exceed development by Adobe Systems Inc., Bitstream Inc., MIT, and Sun Microsystems Inc. Each font contains a copyright message describing the owner of the font. DISCLAIMER Hummingbird Ltd. software and documentation has been tested and reviewed. Nevertheless, Hummingbird Ltd. makes no warranty or representation, either express or implied, with respect to the software and documentation included. In no event will Hummingbird Ltd. be liable for direct, indirect, special, incidental, or consequential damages resulting from any defect in the software or documentation included with these products. In particular, Hummingbird Ltd. shall have no liability for any programs or data used with these products, including the cost of recovering such programs or data.

ii

Related Documentation and Services


Manuals
All manuals are available in print and PDF. The PDF versions require Adobe Acrobat Reader and are installed only if you perform a Complete installation, or if you select them during a Custom installation. Your Hummingbird product comes with the following manuals:
Exceed Users Guide HostExplorer Host Access Users Guide Provides information on how to install and configure Exceed, connect to hosts, manage and explore services, and run X clients. Provides information on how to access corporate mainframe data through HostExplorer terminal emulation components, as well as how to automate and configure host sessions. Provides programmers with information on how to customize HostExplorer, FTP and WyseTerm through Visual Basic and Visual , C++ scripts using HostExplorer APIs. Provides procedural and reference information, tips, and suggestions for working with Hummingbird Basic Language using Hummingbird Basic Workbench and Dialog Editor.

HostExplorer Programmers Guide (PDF format only) Hummingbird Basic Language Programmers Guide

Help
The online Help is a comprehensive, context-sensitive collection of information regarding your Hummingbird product. It contains conceptual and reference information, and detailed, step-by-step procedures to assist you in completing your tasks.

Release Notes
The release notes for each product contain descriptions of the new features and details on release-time issues. They are available in both print and HTML. The HTML version can be installed with the software. Read the release notes before installing your product.

iii

Hummingbird Expos Online


Hummingbird Expos Online is an electronic mailing list and online newsletter. It was created to facilitate the delivery of Hummingbird product-related information. It also provides tips, help, and interaction with Hummingbird users. To subscribe/unsubscribe, browse to the following web address:
http://www.hummingbird.com/expose/about.html

User Groups and Mailing Lists


The user group is an unmoderated, electronic mailing list that facilitates discussion of product-related issues to help users resolve common problems and to provide tips, help, and contact with other users. To join a user group: Send an e-mail to listserv@hummingbird.com. Leave the Subject line blank. In the body of the e-mail message, type the following:
subscribe exceedusers Your Name

To unsubscribe: Send an e-mail to listserv@hummingbird.com. Leave the Subject line blank. In the body of the e-mail message, type the following:
unsubscribe exceedusers Your Name

To post a messages to the user group: Send your e-mail to:


exceedusers@hummingbird.com

To search the mailing list archives: Go to the following web site:


http://www.hummingbird.com/support/usergroups.html

iv

Contents

Chapter 1: Introducing Exceed 1 What Is Exceed? ......................................................................................................... 3 X Window System ...................................................................................... 3 Exceed Applications ................................................................................................... 4 Exceed Tools .............................................................................................. 5 Security Tools ............................................................................................. 6 Other Exceed Products .............................................................................................. 7 Developing Local X Clients ........................................................................ 7 Working with Exceed 3D ........................................................................... 8 Chapter 2: Installing Exceed 9 Hummingbird Setup Wizard .................................................................................. 11 Advanced Installation .............................................................................. 11 Preparing to Install .................................................................................................. 12 Installation Requirements ........................................................................ 12 Installation Directories ............................................................................ 13 User Directories ....................................................................................... 13 Multilingual User Interface (MUI) .......................................................... 14 Installation and Maintenance ................................................................................. 15 Personal Installation ................................................................................ 15 Program Maintenance for Personal Installations .................................... 18 Administrative Installation ...................................................................... 19 Typical Installation Scenarios ................................................................................. 20 Personal Installations ............................................................................... 20 Advertised Installation ............................................................................. 22 Microsoft Systems Management Server (SMS) ........................................ 23 Sconfig ...................................................................................................... 24

Exceed Users Guide

Preserving User Profiles .......................................................................................... 24 Product Registration ................................................................................................ 25 Chapter 3: Advanced Installation 27 Product Access Control on a Terminal Server ....................................................... 29 Stage 1: Creating an Administrative Image .............................................. 29 Stage 2: Personal Installation ................................................................... 31 Removing Product Access Control from a Terminal Server ................................. 33 Customizing Installations with Sconfig .................................................................. 34 How Does Sconfig Work? ......................................................................... 35 Overview of Creating Transform Files ................................................................... 36 Opening the MSI and MST Files .......................................................................... 38 Customizing Product Installations ......................................................................... 39 Product Installation Directories ............................................................... 39 Product Feature Availability ..................................................................... 42 File Installation ......................................................................................... 44 Product Properties ................................................................................... 46 Registry Keys ............................................................................................ 49 Shortcuts for Hummingbird Product Features ........................................ 51 Hummingbird Metering Settings ............................................................. 53 Environment Variables ............................................................................. 55 User Settings ............................................................................................. 57 Product Profile Spaces .............................................................................. 58 Directory Services Settings ....................................................................... 60 Exceed Properties ..................................................................................... 62 Saving the MST File ................................................................................................ 71 Applying the MST File to an Installation .............................................................. 72 Creating Multiple Custom Installations ................................................................. 73 Running Sconfig from a Command Line ............................................................... 73 Controlling Per-user Settings .................................................................................. 75 Customizing Files and Folders ................................................................. 76 Adding Registry Entries ............................................................................ 77 Updating the Personal User Directory for All Users ................................ 77 Passing Arguments to Per-user Settings ................................................... 78 User Settings Migration ............................................................................ 79 Manual User Settings Migration .............................................................. 80 Controlling Uninstallation ....................................................................... 81 vi

Contents

Chapter 4: Connecting to Hosts and Running X Clients 83 Getting Connected ................................................................................................... 85 Using the X Client Startup Wizard .......................................................... 85 Starting X Clients Using a Remote Process .............................................. 88 Desktop Sharing ....................................................................................... 88 About Window Managers ...................................................................................... 91 Starting Local Window Managers ............................................................ 91 Starting Remote X Window Managers ..................................................... 92 Displaying X Clients ................................................................................. 93 Location of Menu Commands ................................................................. 93 Multiple X Display Support ..................................................................... 94 Entering Data Using the Mouse and Keyboard ....................................... 95 Copying and Pasting ................................................................................................ 96 Copying and Pasting Data ........................................................................ 96 Copying and Pasting Graphics ................................................................ 98 Copying and Pasting Between X Selection and File ................................. 99 Copying and Pasting Between X Clients ................................................ 100 Setting Print Specifications .................................................................... 100 Accessing Hosts and Starting Applications .......................................................... 101 About Xstart ........................................................................................... 101 Xstart in Detail ....................................................................................... 101 Startup Methods ..................................................................................... 103 Xstart Events .......................................................................................... 103 Creating a Startup File ........................................................................... 104 Creating Shortcuts ................................................................................. 106 Running an Xstart File ........................................................................... 106 Launching Windows Applications ......................................................... 107 Typical Xstart Commands ..................................................................... 108 Responding to an Xstart Timeout .......................................................... 109 Displaying Xstart Login Information ..................................................... 110 Displaying the Xstart Host Reply Window ............................................ 111 Browsing for Hosts and Applications .................................................... 111 Xstart Host and Application Files .......................................................... 115 Listing NIS Maps on the System ............................................................ 116 Load Optimization ................................................................................. 117 Using Xstart on VMS Systems .............................................................................. 120 TCP/IP Transports ................................................................................. 120 DECnet Transports ................................................................................ 120 vii

Exceed Users Guide

Startup Modes ........................................................................................................ 121 Selecting an X Client Startup Mode ....................................................... 121 Passive Startup Mode ............................................................................. 122 XDMCP Query Startup Mode ................................................................ 123 XDMCP Indirect Startup Mode ............................................................. 125 XDMCP Broadcast Startup Mode .......................................................... 126 XDMCP Timeouts .................................................................................. 128 Chapter 5: Advanced Connection Methods 129 Advanced Xstart Features ...................................................................................... 131 Using Login Macros ............................................................................... 131 Creating a Global Login ......................................................................... 132 Remembering Host Passwords ............................................................... 134 Managing the Password List in Xstart .................................................... 134 Defining User ID and Password Macros ................................................ 135 Password Expiry Prompts ...................................................................... 135 Changing IDs, Hosts, and Passwords Across Multiple Files .................. 135 Running Multiple Exceed Sessions ......................................................... 136 Starting Multiple X Clients or Windows Programs ............................... 136 Running Xstart from a Command Line ................................................. 137 Environment Variables ......................................................................................... 139 Setting the DISPLAY Environment Variable ......................................... 140 Command Line Syntax for Starting X Clients ........................................ 141 Using Exceed on a Remote PC ............................................................................. 142 Setting Up Xweb ..................................................................................... 143 Xweb Wizard .......................................................................................... 143 About Xsession ...................................................................................................... 144 Running Multiple Xstart Profiles ........................................................... 145 Working with Xsession ........................................................................... 148 Xsession File Sequence ........................................................................... 149 Starting Multiple Exceed X Servers ........................................................ 150 Multiple X Display Support ................................................................... 150 Common Desktop Environment (CDE) .............................................................. 152 Using Desktop Environments for Linux ................................................ 153 Running Multiple CDE Sessions ............................................................ 153 Securing Connections ............................................................................................ 155 Secure Shell ............................................................................................. 155 Using Kerberos ....................................................................................... 155 viii

Contents

Smart Card ............................................................................................. 156 VPN and NAT Support .......................................................................... 156 X11 Authentication ................................................................................ 157 Trusted and Untrusted Clients .............................................................. 157 Password Aging ...................................................................................... 157 Chapter 6: XconfigPart I 159 About Xconfig ........................................................................................................ 161 Xconfig Window .................................................................................... 162 Xconfig Password .................................................................................. 164 Configuration Files ................................................................................ 165 Changing Xconfig Settings ..................................................................... 165 Updating and Reloading a Database ...................................................... 166 Command Line Override ....................................................................... 166 Xconfig Console ..................................................................................................... 167 Remote Configuration ........................................................................... 167 Mouse and Keyboard Input .................................................................................. 170 Keyboard Input Settings ........................................................................ 170 Selecting a Keyboard File ....................................................................... 170 About XKeys .......................................................................................... 173 PrintScrn Key Support ........................................................................... 175 Modifying a Keyboard File ..................................................................... 175 Mapping a New Keysym to an Existing Key .......................................... 176 Deleting a Keysym Mapped to a Key ..................................................... 178 Mapping a Macro to an Existing Key ..................................................... 179 Macro Events .......................................................................................... 180 Creating Compose-Key Sequences ......................................................... 180 Managing Keysyms and Keysym Sets ..................................................... 182 Adding a Physical Key ............................................................................ 184 Deleting a Physical Key .......................................................................... 185 Mouse Input Settings ............................................................................. 185 Customizing Mouse Settings .................................................................. 186 Mapping a Macro to the Mouse Wheel ................................................. 187 Middle Button Capabilities for a Two-Button Mouse ........................... 189 Input Methods for Chinese, Japanese, and Korean ............................... 190 Special Considerations for Traditional Chinese .................................... 192 Network and Communication .............................................................................. 195 Setting the Sequence of Events ............................................................... 195 Communication Settings ....................................................................... 195 ix

Exceed Users Guide

About IP Discovery ................................................................................ 197 Creating or Editing the Host List ........................................................... 200 Host List File Syntax ............................................................................... 201 Transports Settings ................................................................................. 201 Chapter 7: XconfigPart 2 203 Security, Access Control, and System Administration ........................................ 205 Security and Access Control Settings ..................................................... 205 Host Access Control List Syntax ............................................................ 209 Creating and Editing the Host Access Control List ............................... 209 Creating the User Access Control List ................................................... 210 Authorizing X Clients ............................................................................. 211 Editing the rxplugin/xrx Configuration Files ......................................... 211 Invalid Configuration Files .................................................................... 212 System Administration ........................................................................... 213 Restricting Access to Xconfig and Extend .............................................. 214 Password Protect Settings ...................................................................... 214 Mandatory Settings ................................................................................ 215 X Server Protocol ................................................................................................... 215 X Server Options and Extensions ........................................................... 216 Extensions Settings ................................................................................. 217 Display and Video ................................................................................................. 218 Screen Definition .................................................................................... 218 Window Mode Options .......................................................................... 218 Configuring X Screens ............................................................................ 219 Creating or Editing a Local XRDB Database .......................................... 220 Common Settings ................................................................................... 223 Monitor Information ............................................................................. 223 Tiling Multiple Monitors ....................................................................... 223 Video Settings ......................................................................................... 225 RGB Database Syntax ............................................................................. 225 Advanced Settings .................................................................................. 226 Copy and Paste, and X Selection .......................................................................... 226 Specifying X Selection Type ................................................................... 226 Automatic Copy and Paste ..................................................................... 227 Using a Temporary Storage Buffer ........................................................ 227 Font Management ................................................................................................. 228 Font Database ......................................................................................... 229 x

Contents

Editing the Font Database ...................................................................... 230 Adding and Changing Font Directories ................................................. 233 Changing Paths in the Font Database .................................................... 233 Changing the Font Directory Search Order ........................................... 234 Accessing the Font Server ...................................................................... 235 Adding and Changing Font Servers ....................................................... 235 Make Font Scalable ................................................................................ 236 Creating Font Aliases ............................................................................. 237 Creating Several Aliases ......................................................................... 238 Alias File Format .................................................................................... 240 Other Server Settings ............................................................................................. 241 Maximizing System Performance .......................................................... 241 Setting Image Save Boxes ....................................................................... 242 Preventing Standby Mode ...................................................................... 243 Using Xperf ............................................................................................ 243 Troubleshooting ..................................................................................... 245 Viewing the Log File ............................................................................... 245 Handling Denied Requests for Colors ................................................... 246 Handling Denied Requests for Fonts ..................................................... 247 Power Management Settings .................................................................. 247 Accessibility ............................................................................................ 248 Exceed 3D and GLX ............................................................................................... 248 OpenGL .................................................................................................. 248 Appendix A: Troubleshooting 249 Installation Troubleshooting ................................................................................ 251 Exceed Diagnostics ................................................................................................ 254 Troubleshooting Xstart .......................................................................... 254 Logs and Trace Operations .................................................................... 255 Required Port Numbers ......................................................................... 257 Resolving Connection Problems ............................................................ 258 Tracing Server Operation ....................................................................... 259 Viewing Server Error Messages .............................................................. 260 Using Transport Monitor ...................................................................................... 261 Confirming Transport Operation .......................................................... 261 Detecting and Terminating Blocked Connections ................................. 262 Using Xdis .............................................................................................................. 263 Disassembling a Trace File ..................................................................... 263 xi

Exceed Users Guide

Appendix B: Connectivity Applications 265 Hummingbird Connectivity ................................................................................. 267 Accessories .............................................................................................. 267 Administrative Tools .............................................................................. 268 Connectivity Tools ................................................................................. 269 HostExplorer .......................................................................................... 270 HostExplorer Tools ................................................................................ 271 HostExplorer Print Services Console ..................................................... 271 WyseTerm .............................................................................................. 271 Hummingbird FTP ................................................................................. 272 Hummingbird Deployment Wizard ..................................................................... 272 Appendix C: HWM 273 A Quick Tour of HWM ......................................................................................... 275 HWM Configuration File ...................................................................................... 277 Formatting Rules .................................................................................... 277 Enabling Virtual Desktop ....................................................................... 279 Functions ................................................................................................................ 280 Statements .............................................................................................................. 281 Virtual Desktop ...................................................................................... 282 Font Statements ...................................................................................... 285 Window Statements ............................................................................... 285 Color Statements .................................................................................... 286 Icon Manager Statements ....................................................................... 287 Menu Definitions ................................................................................... 289 Mouse Button Bindings .......................................................................... 291 Preprocessor Statements ........................................................................ 292 Appendix D: General Accessibility and Technical Support 295 General Accessibility .............................................................................................. 297 Microsoft Accessibility Options ............................................................. 298 Technical Support ................................................................................................. 299 Index 301

xii

Chapter 1 Introducing Exceed

What Is Exceed? X Window System Exceed Applications Exceed Tools Security Tools Other Exceed Products Developing Local X Clients Working with Exceed 3D

3 3 4 5 6 7 7 8

Chapter 1: Introducing Exceed

What Is Exceed?
Exceed transforms your computer into a fully functional X Window terminal. It lets you run and display UNIX applications (X clients) from the familiar Microsoft Windows environment. Exceed integrates your Windows desktop with environments such as UNIX, Linux, VMS, X Window System, IBM mainframes, and the Internet. Exceed includes innovative features that accelerate performance, simplify system administration, optimize personal computing, and delivers ease of use. Users are shielded from the complexities of network computing by working within the familiar Microsoft Windows environment. Exceed is an integrated part of the Hummingbird Host Access Solutions product family which provide organizations with a comprehensive Host Access and Network Connectivity solution.
For an overview of the applications available in Exceed, see Exceed Applications on page 4.

Use Exceed on your local computer to:


Access powerful applications and information running on networked hosts. Establish simultaneous connections to different computers running X clients. Use an appropriate window manager to preserve your familiarity with the computer or X environment.

For system administrators, Exceed provides tools to set up, configure and administer PCs remotely to ensure consistency among systems.

X Window System
In the X Window environment, the Exceed X server is also referred to as an X Window terminal or display server. Without Exceed X server software, X applications are accessible only via X terminals, UNIX, Linux, and VMS workstations. Exceed works with your network transport software (TCP/IP, DECnet, or IPX/SPX) or your modem, to access X Windows applications on host computers running the X Window System. The host can be any operating system that is running the X Window environment.

Exceed Users Guide

The figure below shows how Exceed lets your PC access the X Windows environment.

Exceed Applications
Exceed includes applications that serve distinct functions. Use the Exceed startup applications to connect to a host and display UNIX, Linux, VMS and X applications on your PC. Use the X Client Startup Wizard to guide you through this process, or set up the connection manually. Throughout this guide, Xterm (a UNIX VT100 terminal emulator) is used as a sample X client. It provides a terminal emulation window on the host, and a command line where you can start other X clients. The applications are listed and briefly described below. Exceed Exceed X server is a PC X server that displays graphical UNIX, Linux, and X applications on your computer. 4

Chapter 1: Introducing Exceed

Exceed Connection Manager Lets you view, create, rename, delete, and modify Xstart, Xsession, and Xconfig profiles from a single user interface.

Exceed Tools
The following are located in the Exceed Tools folder: Exceed XDMCP Broadcast Broadcast mode. Exceed XDMCP Query Query mode. Lets you start the Exceed X server in XDMCP

Lets you start the Exceed X server in XDMCP

HWM Hummingbird X window managerprovides a graphical interface to start and terminate clients, position and change the windows on your display, and perform other operations related to X window sessions. For more information, see Appendix C: HWM or the HWM topics in Exceed Help. Transport Monitor A diagnostic toolview which network connections are in use, and close connections. For more information, see the Exceed Help. X Client Startup Wizard Guides you through the process of creating a host connection. Create X clients startup files (profiles) and corresponding shortcuts (program items). Profiles can also be published to a web server. For details, see Chapter 4: Connecting to Hosts and Running X Clients. Xconfig Console Lets you modify Exceed X server properties through Microsoft Management Console. Xconfig Lets you customize the Exceed X server properties. For details, see Chapter 6: XconfigPart I and Chapter 7: XconfigPart 2. Xsession Console Lets you modify Xsession options, open and save Xsessions and create Xstart nodes through Microsoft Management Console. Xsession Lets you start the Exceed X server and multiple X clients/ Windows programs simultaneously. For details, see Chapter 5: Advanced Connection Methods.

Exceed Users Guide

Xstart Lets you automate access to hosts and starting applications. Use Xstart to create Xstart (.xs) startup files and create shortcut icons to your UNIX, Linux and X applications. When you click on these icons, they automatically establish a host connection, log on, and then start an X client, a character-based host application in a terminal emulator window, or run a host-based script. For details, see Chapter 4: Connecting to Hosts and Running X Clients on page 83. Xweb Wizard Lets you deploy and manage access to X applications by publishing Xstart profiles to a web server. MWM and Kinput2 tools are shipped with Exceed XDK. For more information, see the Exceed XDK Users Guide.

Security Tools
Smart Card Manager Lets you manage lists of hosts and user passwords stored on smart card devices. Xstart uses this information to authenticate users with remote hosts.
Note: Other Hummingbird security products (not included with Exceed) are available. To acquire them, contact a Hummingbird sales representative.

Chapter 1: Introducing Exceed

Other Exceed Products


Developing Local X Clients
Exceed provides two facilities for the development of local X clients: the Exceed XDK (X Development Kit) and Hummingbird Basic.
Exceed XDK is not included with Exceed. To acquire it, contact a Hummingbird sales representative.

Exceed XDK
Exceed XDK lets you:

create your own local X clients port programs originally developed for the X environment create OpenGL X applications for use with Exceed 3D

Exceed XDK is a set of .dlls, include files, and libraries that you can use to develop GUI or console local X clients that run on your computer instead of a UNIX or Linux host. You can develop a local client from scratch using Exceed XDK, or you can port the code of an existing UNIX or Linux X application and rebuild the project so that the application runs locally on a computer. The Microsoft Visual C/C++ 32-bit edition is required to use Exceed XDK. Developing clients requires an in-depth knowledge of programming for both Microsoft Windows and the X window system. For more information, see the Exceed XDK User's Guide.

Hummingbird Basic
Hummingbird Basic, available with Exceed, is a fully functional language that includes a Workbench for writing and compiling scripts, and a graphical drag-and drop Dialog Editor for creating and designing an interface. Hummingbird Basic can be used to create scripts for the tasks you frequently perform and want to automate. For example, you can create scripts to automate routine tasks.

Exceed Users Guide

Working with Exceed 3D


Exceed 3D is not included with Exceed. To acquire it, contact a Hummingbird sales representative.

This product lets you display OpenGL-based X applications. OpenGL is a 3D graphics software interface that lets you create interactive programs that produce still or animated 3D color objects, including shading, lighting, and other effects. Exceed 3D interprets OpenGL calls from an X application, and sends the information to the video card on your computer. For more details, refer to the Exceed 3D Users Guide.

Chapter 2 Installing Exceed

Hummingbird Setup Wizard Advanced Installation Preparing to Install Installation Requirements Installation Directories User Directories Multilingual User Interface (MUI) Installation and Maintenance Personal Installation Program Maintenance for Personal Installations Administrative Installation Typical Installation Scenarios Personal Installations Advertised Installation Microsoft Systems Management Server (SMS) Sconfig Preserving User Profiles Product Registration

11 11 12 12 13 13 14 15 15 18 19 20 20 22 23 24 24 25

Chapter 2: Installing Exceed

Hummingbird Setup Wizard


Hummingbird Setup Wizard is the interface displayed by Windows Installer. Setup Wizard is based on three standard, top-level user interfaces or modes: installation, administration, and advertisement. Each defines a different installation path and user interface flow.
Note: You cannot preserve user profiles for products before version 7.1.
For common issues and questions about Hummingbird Setup Wizard, see Appendix A: Troubleshooting.

Setup Wizard does the following:


uses the Windows Installer service to maintain the applications and resources installed on the computer determines the correct path to specific components ensures that applications do not point to missing files

The Windows Installer service views all applications as three logical building blocks: products, features, and components.

Advanced Installation
See Chapter 3: Advanced Installation for more information about:

installing onto a Terminal Server using product access control customizing installations with Sconfig Hummingbird Administrator Toolkit (Files and Settings Transfer Wizard, Metering Client Settings, and Media Location Manager)

11

Exceed Users Guide

Preparing to Install
System and shared files currently in use cannot be updated. Close all applications before proceeding with the installation. Hummingbird Connectivity products use Windows Installer 3.1. This version is included with Windows Server 2003, and is available for Windows 2000 (SP4) and Windows XP. Setup Wizard updates Windows Installer, if necessary.

Installation Requirements
The following table outlines installation requirements for Hummingbird Connectivity products:
Product Exceed Exceed XDK Operating System Windows 2000/XP/Server 2003 Disk Space (MB)
Typical Complete Cache

Other Requirements Winsock compliant TCP/IP (Winsock 2 recommended) Exceed or Exceed PowerSuite Microsoft Visual C/C++ (MSVC) 5.0 or later, for X client development

100 17

265 77

283 85

Exceed 3D

10

Exceed Microsoft Visual C/C++ (MSVC) 5.0 or later, for X client development

Exceed PowerSuite

112

290

313

Winsock compliant TCP/IP (Winsock 2 recommended)

Administrator privileges are required to install some portions of the product.

12

Chapter 2: Installing Exceed

Installation Directories
Hummingbird Setup Wizard installs program-specific and user-specific files to the directories described below.
Installation Destination folder Description Program files install into the destination folder (also known as the root home directory). It is recommended that you use the default directory: C:\Program Files\Hummingbird\ Connectivity\Version\ However, you can specify a different directory. User directory User files install into the user directory. These files are configuration files or related files that your Hummingbird product can change. There are several kinds of user directories and user files. For more information, see User Directories below. Location/Type Location: a remote network drive or a local hard drive. Can be a read-only directory.

User Directories
For more information about customizing individualized installations, see Chapter 3: Advanced Installation.

User files for Hummingbird Connectivity products are created in one of two directories: per-machine or per-user. If the product is installed for all users of the machine, you can choose whether user files are individualized (per-user) or are shared (per-machine). Some files are always placed in a shared (per-machine) location known as the global user directory. This location is not the same as the shared user directory.
Directory Per-user Default Location C:\Documents and Settings\%USERNAME%\ Application Data\Hummingbird\Connectivity\version\ Note: This location is usually hidden (by default). Shared user Global user C:\Documents and Settings\All Users\Application Data \Hummingbird\Connectivity\version C:\Documents and Settings\All Users\Application Data \Hummingbird\Connectivity\version\Global

13

Exceed Users Guide

Per-user
Per-user files are all application files that, when changed, affect only the user who is making the change (that is, the currently logged in user). An example of a user-specific file is HostEx.ini. If you configure HostEx.ini with HostExplorer to Not Prompt on Window Close for a particular user, then other users of the machine are not affected. Another example of a userspecific file is Exceed.xcfg. If you configure Exceed.xcfg with Xconfig to use a certain display, then other users of the machine are not affected.
Note: Each user of the product on the machine receives a personal user directory.

Per-machine
Per-machine files are those application or service files that, when changed, affect all users of the computer. An example is the inetd.ini file. If you change inetd.ini to stop the Telnet daemon from running, then regardless of which user is logged onto the computer, the InetD service rejects Telnet connections.

Global User
Similar to per-machine directories and files, the global user folder is available to all users of the machine. Generally, the global user folder is intended as writable by administrators and readable by all users. In certain cases, folder permissions might be changed to allow everyone write access. Shared files such as user profiles and mandatory settings are accessible from the global folder on the local machine (regardless of the current user).

Multilingual User Interface (MUI)


Setup Wizard provides a language option that supports machines running Windows XP/Server 2003 with one or more Language Interface Packs installed.

14

Chapter 2: Installing Exceed

Installation and Maintenance


This section describes basic installation procedures and setup types:

personal installationone user installs the product on one computer administrative installationsystems administrators create an image of the product at a network location

For examples of how to implement these procedures, see Typical Installation Scenarios on page 20.

Personal Installation
Autorun launches the Hummingbird Master Setup application when you insert the CD into your drive. If Master Setup does not launch automatically, run Msetup.exe from the root directory of the CD. To configure Windows Installer and prepare Setup Wizard: 1 In the Hummingbird Master Setup application window, you can install additional Hummingbird products (such as Hummingbird SOCKS Client), third party add-ons, register online, or view release notes. Otherwise, click Install Product, and then Personal Installation. Select a setup language or select Multilingual User Interface. Click OK. Your Hummingbird product prepares Setup Wizard, checks the operating system the current Windows Installer version. If necessary, the version is updated and the Setup Wizard continues. Setup Wizard initializes and prepares Windows Installer. The Welcome dialog box opens. Click Next.
Note: To quit installation, click Cancel in any Setup Wizard dialog box. Your computer is not affected if you do this before the Setup Wizard copies files. To review or change settings in a previous dialog box, click Back.

2 3

4 5

15

Exceed Users Guide

If a previous version of this product or another compatible Connectivity product is installed, the Product Migration dialog box opens. You can select whether to migrate settings (and remove that product). Click Next. If applicable, the License dialog box for evaluation versions of the product opens. Provide a license key and click Next. The License Agreement dialog box opens. Read the licensing agreement. If you select the option that indicates the terms are acceptable, then click Next.
Note: Failure to read or understand the License Agreement does not affect the terms and conditions of the agreement.

7
The Next button is dimmed if the terms of the license agreement are not accepted.

The Customer Information dialog box opens.


Note: This dialog box is visible but certain options are disabled if another Connectivity product is already installed.

a) Type the appropriate information. b) Select whether the user directory location is individualized for each user, or whether users share the same directory. c) Click Next.
For 64-bit products, Destination Folder (or home directory) only affects 64-bit folder locations.

10 The Destination Folder dialog box opens (except if youre installing Exceed 3D or Exceed XDK). Accept the default installation folder for the product, or click Change to open a dialog box for browsing to an alternate location. Click Next.
Note: Some product features are not affected by changes to the destination folder.

11 The User Directory Location dialog box opens. Select whether or not application settings are stored in a per-user or a (common) shared directory. Click Next.

16

Chapter 2: Installing Exceed

12 The Setup Type dialog box opens. Select a setup type and click Next. 13 Depending on the setup type (and features selected), the following occur:

If Custom setup type is selected, the Custom Setup dialog box opens. Select whether or not specific features and sub-features are installed. Click Next. If the Metering Client is selected (in Administrative Tools) for installation as a feature in Custom setup, or if Complete is the setup type, then the Hummingbird Metering Client Settings dialog box opens. Type the required information and click Next.

14 The Additional Install Options dialog box opens. Select install options and click Next:

Local CacheCopies setup files locally so that future repairs or

patches do not prompt for a source.


UpdatesLaunches the default browser (after installation) and

goes to the Hummingbird Web Update Centre.


Note: A Hummingbird Update shortcut to the Web Update Centre is available in the Administrative Tools folder within the Hummingbird Connectivity program group.

TuningRuns Exceed X Server Tuning which lets you override the

current drawing methods used by the server and determine the optimal graphics configuration for Exceed. 15 If Exceed onDemand Client Installer is selected, the Introducing Exceed onDemand dialog box opens. Select whether or not to launch the Exceed onDemand Client installer after Exceed installation. Click Next. 16 A dialog box indicates Setup Wizard is ready to begin installation. Click Install. 17 A dialog box opens indicating that installation is complete. Click Finish and you are prompted to restart your computer.

17

Exceed Users Guide

For information about product modification, repairs, or removal, see below.

Program Maintenance for Personal Installations


Program maintenance lets you modify, repair, or uninstall existing Hummingbird products and features. To launch Hummingbird Setup Wizard in maintenance mode: 1 You can open Program Maintenance by running Msetup.exe from the product CD. Alternatively, double-click Add/Remove Programs in Control Panel, select the Hummingbird program, and click Add/Remove. The Welcome dialog box opens. 2 In the Welcome dialog box, click Next. The Program Maintenance dialog box opens where you can select a maintenance option.

For more information about maintenance options, see the following procedures. To modify the install state of program features: 1 2 3 In the Program Maintenance dialog box, select Modify and click Next. The Custom Setup dialog box opens. Expand the feature tree and change the install state, as necessary. Click Next. Setup Wizard prompts when it is ready to modify the program. Click
Install and the install state of program features changes according to

your specifications. 4 Installation (modification) proceeds to completion. Click Finish to exit.

To repair a program: 1 2 In the Program Maintenance dialog box, select Repair and click Next. The Ready to Repair the Program dialog box indicates Setup Wizard is ready. Click Install to repair errors such as missing or corrupt files, shortcuts, and registry entries. Program repair proceeds to completion. Click Finish to exit.

3 18

Chapter 2: Installing Exceed

To remove a program:
Note: With Windows Installer, you can uninstall (remove) only one program (product) at a time. Ensure that all programs associated with the product you are uninstalling are closed.

1 2

In the Program Maintenance dialog box, select Remove and click Next. The Remove the Program dialog box indicates Setup Wizard is ready. Click Remove to uninstall the program.
Note: If the current version 11 product is the last product (or only product) being removed, then the local cache folder is removed as well.

Program removal proceeds to completion. Click Finish to exit.

Administrative Installation
Autorun launches the Hummingbird Master Setup application when you insert the CD into your drive. If Master Setup does not launch automatically, run Msetup.exe from the root directory of the CD. Administrative installations let you create a centralized image of the product. This means that many users can install the product without the original CD media. To run Setup Wizard in Administrative mode: 1 Run Msetup from the product CD. In the Hummingbird Master Setup application window, you can select options to install third party add-ons, register online, or view release notes. Otherwise, to run Setup Wizard, click Install Product, then click Administrative Installation. Alternatively, from the product directory on the CD, run:
setup /a

Select a setup language and click OK. This language will apply to all installations from the copied image or shared image.

19

Exceed Users Guide

Your Hummingbird product prepares Setup Wizard, checks the operating system, and checks the current Windows Installer version. If necessary, the version is updated and the Setup Wizard continues. If Windows Installer is not present on your operating system, Setup Wizard installs the service.

After configuring Windows Installer and preparing to install, Setup Wizard proceeds to the Welcome dialog box. Click Next.
Note: To quit the installation, click Cancel in any Setup Wizard dialog box. Your computer is not affected if you do this before the Setup Wizard copies files. To review or change settings in a previous dialog box, click Back.

The Network Location dialog box opens. Accept the default installation folder for the product, or click Change to open a dialog box for browsing to an alternate network location. Click Next. The Ready to Install Network Image dialog box opens. Click Install. Installation of the network image proceeds to completion.

Typical Installation Scenarios


This section describes installation scenarios. The conditions and parameters affecting implementation in your environment may vary from these examples.

Personal Installations
Administrators (and non-Administrators granted elevated privileges by an Administrator) are able to perform personal installation of Connectivity products. For more information, see Personal Installation on page 15.

20

Chapter 2: Installing Exceed

Installing onto a Terminal Server


You can perform personal installations on a Terminal Server. However, there is no control over who can access shortcuts, user files, or use the product. An alternative option is to enable product access controlonly users granted permission to use the product get access to shortcuts and user files. For more information about product access control on a Terminal Server, see Chapter 3: Advanced Installation.

Silent Installation
A silent installation runs in the background.
Note: This scenario describes a local installation.

This scenario assumes:


you are logged in to the computer as the (local) Administrator the product CD is available locally or on the network

To run a silent installation: 1 Launch Setup Wizard from the command line using the following syntax:
E:\setup /S /V/qn [/lnnnn]

where E:\ is the CD-ROM drive. The following describes possible command line options:
Option /S Description Specifies a silent installation. Note: S is upper-case. /V/qn /V passes parameters to Msiexec.exe. Note: There are no spaces between the /V and /qn options and that V is upper-case. If a character string contains a space, put quotes around it. For example: /Vparameter space

21

Exceed Users Guide

Option /lnnnn

Description Overrides the default English language installation where nnnn is the transform file name. Note: For nnnn, type only the number but not the .mst extension.

/RS|RE command

Run the command either at the startup (/RS) or at the end (/RE) of setup. For example, to launch a file in Notepad at startup: /RS notepad readme.txt

Installation proceeds to completion.

Advertised Installation
Advertisement (install on demand or deferred installation) means all features of a product are available even if they are not installed on the computer. This scenario assumes:

you are logged in to the computer as the (local) Administrator the product CD is available locally or on the network
Note: Not all product features can be advertised.

To advertise a product and all its features: 1 Launch Setup Wizard in advertisement mode by one of the following methods:

on the command line, type E:\setup /jmwhere E:\ is the CDROM drive run Msetup.exe from the product CD
Note: For a deferred installation, the product CD must be in the drive and the drive must be accessible.

22

Chapter 2: Installing Exceed

Shortcuts and registry entries exist on the computer, but files are not installed.

A Hummingbird product icon is installed on the computer desktop, and in the Windows program group (on the Start menu), for each feature.
Note: Shortcuts for features requiring Administrator privilege will not launch correctly if the user does not have the required privileges to install the feature.

Microsoft Systems Management Server (SMS)


An Administrator can use SMS to manage network computers, distribute software from a central location, and perform a variety of other system management tasks. The Administrator can install a package of products simultaneously on multiple computers. Requirements:
You can get the latest Service Pack for SMS from the Microsoft web site.

SMS version 2.0 with Service Pack 2 (or greater) SMS Client (installed on each client computer) supplied with SMS Server Windows Installer on the client computer

A package contains source files for the program and various details for directing the software distribution process.

To distribute a product using SMS, the Administrator must create a package definition file according to SMS instructions. For convenience, Hummingbird provides default .sms files for all products. These are the default scenarios in each package definition file:

Typical Typical Language Silent Typical Silent Complete Uninstallation

23

Exceed Users Guide

When a package is run through SMS, it prompts you to select one of these options (scenarios). Use the following command line parameters to apply modifications or create new package definition files:
Command Line Parameter /i /q INSTALLLEVEL=150 TRANSFORMS=nnnn.mst Description Installs or configures a product. Sets user interface level (silent). Does a complete install. Specifies the product language where nnnn is the transform file name.

For more information about Msiexec command line options, see the Windows Installer documentation available in the MSDN online library at msdn.microsoft.com.

Refer to Microsoft documentation for command line parameters, switches, and other information required for Windows Installer and Systems Management Server.

Sconfig
Sconfig (Setup configuration) lets you customize the installation of software on local and network machines. Use it to customize the folders installed by Setup Wizard, determine what is installed (as well as limit functionality or optimize disk space), and simplify user input. For more details, see Chapter 3: Advanced Installation.

Preserving User Profiles


See Hummingbird Administrative Tools Help for more information on Files and Settings Transfer Wizard options.

If you choose to preserve user settings on the Product Migration page, Hummingbird Setup Wizard generates a .Humfst file (Files and Settings Transfer Wizard-compatible). After default settings from version 11 are installed, settings from this file are imported to the machine.

24

Chapter 2: Installing Exceed

This allows for the replaying of the migration process at another time by using the Files and Settings Transfer Wizard. In addition, there are properties available in Sconfig that let you import a.Humfst file although an older product is not installed. This also allows for the migration of product settings across the usual product boundaries. For example, you can export settings from an HostExplorer installation into an Exceed installation during setup.

Product Registration
Online registration is available by:

running Msetup.exe from the product CD, then clicking Register Online completing and registering the form at the following URL:
http://www.hummingbird.com/register/

Alternatively, complete the registration card provided in the product package and mail it to Hummingbird Ltd. Registration means that you and your organization are recognized as a licensed product owner with all rights and privileges. This makes you eligible to receive a wide range of customer services, such as a free subscription to our quarterly newsletter, Expos Online, as well as notification of software updates and new products. If you and your organization move to a new location, complete and mail the change of address card included in the product package to ensure that you continue receiving update notices and other important information.

25

Chapter 3 Advanced Installation

Product Access Control on a Terminal Server Stage 1: Creating an Administrative Image Stage 2: Personal Installation Removing Product Access Control from a Terminal Server Customizing Installations with Sconfig How Does Sconfig Work? Overview of Creating Transform Files Opening the MSI and MST Files Customizing Product Installations Product Installation Directories Product Feature Availability File Installation Product Properties Registry Keys Shortcuts for Hummingbird Product Features Hummingbird Metering Settings Environment Variables User Settings Product Profile Spaces Directory Services Settings Exceed Properties Saving the MST File Applying the MST File to an Installation

29 29 31 33 34 35 36 38 39 39 42 44 46 49 51 53 55 57 58 60 62 71 72

Creating Multiple Custom Installations Running Sconfig from a Command Line Controlling Per-user Settings Customizing Files and Folders Adding Registry Entries Updating the Personal User Directory for All Users Passing Arguments to Per-user Settings User Settings Migration Manual User Settings Migration Controlling Uninstallation

73 73 75 76 77 77 78 79 80 81

Chapter 3: Advanced Installation

Product Access Control on a Terminal Server


As of version 10, a personal installation on a Terminal Server means that all users of the machine can use the product. Providing the same level of access control that existed in previous versions requires a two-stage process. This process consists of creating an administrative image on the Terminal Server, and installing the Hummingbird product onto the Terminal Server from the newly-created copy. You can run a terminal server installation on:

Windows 2000 Server Windows 2000 Server Advanced Server (with Terminal Services enabled) Windows Server 2003 (with Terminal Services enabled)

The following procedure assumes:


you are logged onto the Terminal Server as the Administrator the product CD is available locally or on the network

Stage 1: Creating an Administrative Image


You must apply the appropriate product-specific transform to your Hummingbird product before the product can be installed on a machine with Terminal Server capabilities. To create an Administrative Image on the Terminal Server: 1 From the product directory on the CD, run the following commands from a command prompt. Exceed: setup /a /vTRANSFORMS=ExceedTSE.mst Exceed 3D: setup /a /vTRANSFORMS=Exceed3DTSE.mst Exceed XDK: setup /a /vTRANSFORMS=ExceedXDKTSE.mst Exceed PowerSuite: setup /a /vTRANSFORMS=ExceedPSTSE.mst Exceed x64: setup /a /vTRANSFORMS=Exceedx64TSE.mst Exceed 3D x64: setup /a /vTRANSFORMS=Exceed3Dx64TSE.mst Exceed XDK x64: setup /a /vTRANSFORMS=ExceedXDKx64TSE.mst Exceed PowerSuite x64: setup /a /vTRANSFORMS=ExceedPSx64TSE.mst

29

Exceed Users Guide

Select a setup language and click OK.


Note: The language you select during this setup process will be the language of the administrative image.

Your Hummingbird product prepares Setup Wizard, checks the operating system, and checks the current Windows Installer version. If necessary, the version is updated and the Setup Wizard continues. If Windows Installer is not present on your operating system, Setup Wizard installs the service.

After configuring Windows Installer and preparing to install, Setup Wizard opens the Welcome dialog box. Click Next.
Note: To quit the installation, click Cancel in any Setup Wizard dialog box. Your computer is not affected if you do this before the Setup Wizard begins copying files. To review or change settings in a previous dialog, click Back.

The Network Location dialog box opens. Accept the default installation folder for the product or click Change to browse to an alternate network location. A folder with the default name Admin is created on the terminal server. The Administrative Image will be placed in the Admin folder.
Note: Each user has private shortcuts, registry entries, and user files. User files are copied from the Admin folder. Each user must have at least read access to the Admin folder installation point.

Click Next. The Ready to Install Network Image dialog box opens.

30

Chapter 3: Advanced Installation

Click Install. Installation of the Administrative Image proceeds to completion.


Note: The Administrative Image must be readable by all users who are granted permission to use Exceed, Exceed 3D, Exceed XDK, and Exceed PowerSuite.

Stage 2: Personal Installation


After creating an Administrative Image, you can install personal installations of your Hummingbird product onto the Terminal Server from this image. To install Exceed, Exceed 3D, Exceed XDK, and Exceed PowerSuite onto the Terminal Server: 1 From the command line, change the directory to C:\Admin and run
setup.exe

where C:\Admin is the name of the drive and folder where the Administrative Image is located.
Note: The Admin folder and its contents must remain available during the lifetime of on the terminal server. Multiple terminal servers can share the same Admin folder.

2 3

Click OK. If a previous version of this product or another compatible Connectivity product is installed, the Product Migration dialog box opens. You can select whether to migrate settings (and remove that product). Click Next. If there is no previous product, the Welcome dialog box opens. Click Next.

31

Exceed Users Guide

Read the Licensing Agreement. If you select the option that indicates the terms are acceptable, then click Next.
Note: Failure to read or understand the License Agreement does not affect the terms and conditions of the agreement.

5
Destination Folder is synonymous with home directory (the directory in which the product is installed).

The Customer Information dialog box opens. Type the appropriate information and click Next. The Destination Folder dialog box opens. Accept the default installation folder for the product or click Change to browse to an alternate location. Click Next.
Note: Some product features are not affected by changes to the destination folder.

The Setup Type dialog box opens. Select a setup type.


Note: For Custom setup type, a Custom Setup dialog box opens. Customize the installed program features. For more information, see the previous chapter.

Click Next. 8 A dialog box indicates Setup Wizard is ready to begin installation. Click Install.
Note: The administrator determines the setup type used for Hummingbird product installation in user profiles.
You can perform this procedure later by using the Performance application in Xconfig.

A dialog box opens and indicates installation is complete. Click Finish.

Upon completion of Stage 2, the per-user installation of the Hummingbird product is enabled and your Hummingbird product will be automatically installed into the appropriate user profile the next time each user logs on.

32

Chapter 3: Advanced Installation

For more information about setting up access permissions, see Hummingbird User Manager Help.

If users are granted product access permission through a Hummingbird Product User Group, your Hummingbird product automatically installs into the appropriate user profile the next time user group members log on. Alternatively, your product will automatically uninstall from profiles of users who are not user group members. Exceed11_Users is the default group name for Exceed, Exceed 3D, Exceed XDK, or Exceed PowerSuite users.

Removing Product Access Control from a Terminal Server


You must have administrative access to remove your Hummingbird product from the Terminal Server using the Add/Remove Programs option. The Add/Remove Programs procedure removes the binary files from the Program files folder and prevents existing users from using the product. Existing personalized user settings and shortcuts will be removed automatically for each user when each user next logs on. For information about product modification, repairs, or uninstalling using the Add/Remove Programs option, see Program Maintenance for Personal Installations in Chapter 2.
Note: To uninstall a product from the Terminal Server for one or more users, but not for all users, remove the user(s) from the user group. Do not delete the user(s). For information on creating and managing user groups, see the Windows Help. If the Exceed parent product is not available to the usereither because it is uninstalled or access permission has not been grantedExceed 3D and Exceed XDK are removed as well.

The following conditions must be met before disabling UsrSetup and removing the UsrSetup file from the machine:

You are not planning to install your Hummingbird product again.

33

Exceed Users Guide

For more information about uninstalling using the Add/Remove Programs option, see the previous chapter.

The Terminal Server personal installation has been uninstalled using the Add/Remove Programs options. After this uninstallation, when a user logs on, customized settings and user files are automatically uninstalled from his/her user profile. You can disable UsrSetup and remove the UsrSetup file only after this process is complete.
Note: Disabling UsrSetup is an optional procedure.

If the above conditions have been met, you can disable UsrSetup. To disable UsrSetup: 1 From the Terminal Server command line, run the following command:
%WINDIR%\System32\Hummingbird\Connectivity\UsrSetup /unregserver

Remove the UsrSetup file from the Terminal Server machine.

Customizing Installations with Sconfig


Users in an enterprise have different software needs. Even in the case of a single application used by many users, differences in user requirements and granted privileges often necessitate tailored installations. For example, some users may require product features such as HostExplorer and FTP settings files to connect to frequently used hosts, while other users may require specific font settings and features to be installed with their Hummingbird products.
For more information on Windows Installer, see the installation chapter.

Sconfig works with Microsoft Windows Installer database files (.msi and .mst) to let you create tailored installations of Hummingbird software for users with different needs. Sconfig lets you do the following:

Customize the directories in which the product is installed, and add custom folders.

34

Chapter 3: Advanced Installation

Tailor the list of applications or components to be installed. You can alter the list to limit the functionality available to users, or to optimize the use of disk space. Simplify user input during installation by preselecting information, such as the properties of the software being installed. Manage registration keys and environment variables. Provide a uniform user experience, and maintain a uniform system configuration across the network.
Note: Sconfig is not installed if you select the Typical installation type. When installing the Hummingbird software on the administrator machine, you must choose the Custom or Complete installation.

How Does Sconfig Work?


Sconfig works with Microsoft Windows Installer database files (.msi and .mst) to let you create tailored installations of Hummingbird software for users with different needs. Knowing how these files function together to configure an installation will help you understand the process of creating a custom installation with Sconfig. Microsoft Software Installation Files (.msi) Microsoft Windows Installer uses Microsoft Software Installation files (.msi) to install the Hummingbird product. An installation file is a database file that contains default installation information specifying which product components are installed and in which directories. Microsoft Transform Files (.mst) When a user alters an installation in Microsoft Windows Installer, the changes are not applied directly to the installation files, but stored in a secondary file called a Microsoft Transform file (.mst). Like the installation file (.msi), the Microsoft Transform file is a relational database with information about product components and installation directories, but the transform file contains only the amendments a user wants to apply to the default settings contained in the installation file. The result is a customized installation.

35

Exceed Users Guide

Sconfig and Windows Installer Database Files


Sconfig makes use of the relationship between installation (.msi) files and transform (.mst) files. Instead of changing the products preconfigured installation file, Sconfig saves all amendments in a transform file. You can then package the transform file with an installation and distribute the customized installation to a target user group. If changes are required in the future, you can also use Sconfig to open and update previously generated transform files. When preparing for multiple custom installations, you need to create a separate transform file for each group of users. You can then apply each transform file to the Hummingbird products installation file.

Overview of Creating Transform Files


When you start Sconfig, the Sconfig Wizard opens with a welcome page. The next two wizard screens let you specify the Hummingbird product installation file (.msi) you want to work with and the transform file (.mst) you want to create or modify. The wizard then displays the Customize page. The option tree located in the left pane of the screen provides access to all of the options and settings that you can use to customize the installation. The availability of some options is dependent on the Hummingbird application associated with the installation file you selected and whether you indicate that you are creating a transform file for a Terminal Services (TSE) client. The options are grouped into the following categories on the Customize page: Product Directories The Directories options let you customize product directories for the installation of the Hummingbird product. Expand this option group to access the Custom Folders options to add custom folders to the installation. Product Features The Features options let you specify which optional product features you want to install. Files These options let you add external files to the Hummingbird product installation.

36

Chapter 3: Advanced Installation

Product Properties The Properties options let you customize properties to change the behavior of the installation package and set properties for Hummingbird product features. Registry These options let you preset the registry editor for any Windows operating system registry. The advantage of editing the registry before the installation is that it saves time, especially when installing for multiple target machines. Custom Shortcuts The Shortcut options let you create custom shortcuts on user machines for any Hummingbird product feature you add to the installation database. Metering Properties The Metering options let you modify or remove properties for the Hummingbird Metering Server. Environment Variables These options let you configure and manage PATH and other environment variables. User Settings Transfer These options let you install or migrate Hummingbird Connectivity product settings. Profile Spaces These options let you import Profile Spaces created with Profile Space Editor. Directory Services Properties Available only in NFS Maestro and Exceed installations, the Directory Services options let you specify property settings for Hummingbird Directory Services as well as service-specific property settings for LDAP, NFSD, NIS and NIS+. Exceed Properties Available only in Exceed installations, the Exceed Settings options let you modify or remove Exceed-specific properties. Custom Font Directories and Servers Available in Exceed and Exceed PowerSuite installations, the Custom Fonts options let you install customized font directories and servers to the Exceed Xconfig utility. For more information on Xconfig, see Exceed Help. Custom Font Paths Available only in Exceed and Exceed PowerSuite installations, the Font Path options let you change the order in which font directories/servers are loaded by the X server. After you make the necessary modifications in each of the option categories, the wizard lets you generate and save the transform file (.mst), which you can then apply to an installation. 37

Exceed Users Guide

Opening the MSI and MST Files


Before you can customize the installation options and settings, you must use the wizard to specify the installation file (.msi) you want to work with, as well as the transform file (.mst) you want to create or modify. You can also indicate if the transform file you want to create is intended for installation on a terminal server. To open an MSI and MST file: 1 2 After you open Sconfig from the Windows Star t menu, a welcome page opens. Click Next to continue. On the Database Selection page, specify the installation file (.msi) that you want to customize and click Next. You can choose an installation file in one of the following ways:

Specify an installation file that you previously configured. Browse for a new installation file.

On the Transform Selection page, specify the transform file (.mst) that you want to create. You can specify a transform file in one of the following ways:

Specify a transform file that you previously configured. Browse for a new transform file by clicking the Browse button. Create a new one yourself. You can do this by clicking the Browse button and specifying a name and location for the file.
Note: If you selected a transform file that was generated with a previous version of Sconfig, the user interface may differ from what is documented.

If the transform file you want to create is intended for installation on terminal servers, select Create Terminal Services (TSE) Client Transform.
Note: If you selected a TSE-specific .msi file on the Database Selection page, this option is not available.

38

Chapter 3: Advanced Installation

Click Next to continue.

The Customize page opens. This page lets you configure the product installation options and settings.

Customizing Product Installations


Product Installation Directories
The Directories options let you specify where you want the Hummingbird product to be installed. Depending on the type of installation you are configuring, local or Terminal Server (TSE), you can set one or both of the following directories: Destination or Current User. To customize product installation directories: 1 2 Click Directories in the option tree. The Directories pane opens. If you are creating a terminal server transform, proceed to step 3. Otherwise, in the Destination Folder box, type the directory where you want all non-volatile files to be stored.

39

Exceed Users Guide

Select one of the two user directory options. (In TSE mode, only the first of the following options appears.)

Individual user directoryType the directory where all volatile files will be stored for the current user. This path is used to generate the personal user directory for every user of the machine. Use a property that changes from user to user so that the path us unique for each. For example, you can use [%USERNAME] or [AppDataFolder]. Single user directoryType the directory where you want user files to be shared among all users of the destination machine. This could be any folder on the machine.

If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

Adding Custom Folders to an Installation


This functionality is not available in TSE mode.

These options let you add your own folders to the directory structure. For example, if you want add your own fonts to the installation and want them to be installed in a dedicated folder, you can add a custom fonts folder. Once you have created custom folders, you can then add subfolders.

Note: To add files to a newly created folder, see "File Installation" on page 44.

40

Chapter 3: Advanced Installation

To add a folder: 1 2 3 In the option tree click Custom Folders under Directories. The Directories: Custom Folders pane opens. Click Add New. The Add Custom Directory dialog box opens. From the Choose Parent Directory Macro list, select the directory macro you want to use to create the new folder. The name of the macro appears in the New Directory Macro box with an incremented number. The Default Destination Path lists the directory in which the new folder will be created. The macro you select from the Choose Parent Directory Macro list determines the location of the new folder. In the New Directory Name box, assign the new custom folder a name. If the custom folder name exceeds 8 characters or contains a space, you must use the following format:
shortname|longname
8.3 file names have a maximum of 8 characters optionally followed by a dot (.) and then a maximum of three characters. For example, you could use myfold~1 for My Folder.

where shortname is an 8.3 MS DOS name for the folder name and longname is the full folder name. 5 6 7 If you want the installation to create the folder even if the folder does not contain any files, select the Always Create This Folder check box. Click OK to create the custom folder and return to the Directories: Custom Folders pane. The folder appears in the list of custom directories. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

41

Exceed Users Guide

To add a subfolder: 1 2 In the option tree, click Custom Folders under Directories. The Directories: Custom Folders pane opens. On the Directories: Custom Folders pane, select the folder where you want to add a subfolder and click Add Sub Folder. The Add Custom Directory dialog box opens with the parent directory macro set by the custom folder you selected. The name of the macro appears in the New Directory Macro box with an new increment number. The Default Destination Path lists the directory in which the new folder will be created. The macro you select from the Choose Parent Directory Macro list determines the location of the new folder. 3 In the New Directory Name box, type the name you want to assign the new subfolder. If the subfolder name exceeds 8 characters or contains a space, you must use the following format:
shortname|longname
8.3 file names have a maximum of 8 characters optionally followed by a dot (.) and then a maximum of three characters. For example, you could use myfold~1 for My Folder.

where shortname is an 8.3 MS DOS name for the subfolder name and longname is the full subfolder name. 4 5 6 If you want the installation to create the subfolder even if it does not contain any files, select the Always Create This Folder check box. Click OK to create the custom subfolder and return to the Directories: Custom Folders pane. The folder appears in the list of custom directories. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

Product Feature Availability


The Features options let you specify the Hummingbird product features you want to install. Recognizing features commonly used by specific users is useful when customizing feature installations. Some may use the Hummingbird product at an administrative level (system administrators) and will find monitoring, tracing and troubleshooting features very useful components of their installation. Others who use the product at an end-user level may have no use for administrative features. 42

Chapter 3: Advanced Installation

The process of selecting features in Sconfig is similar to customizing a product installation using Windows Installer. Sconfig also lets you specify sub-features for each feature you enable, and you can install shortcuts to help users access commonly used features quickly.

To configure the availability of product features: 1 2 In the Features pane, expand the product feature tree to view the features available for the product. Select or clear the features you want to add to or remove from the installation. The Feature Description area provides information on the selected feature. Check marks indicate that the feature will be installed.
Note: Removing a feature or sub-feature in Sconfig deletes it from the transform file (.mst). These changes must then be reapplied to the installation file (.msi) to reflect the update.

If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

43

Exceed Users Guide

File Installation
This functionality is not available in TSE mode.

Sconfig lets you add to the installation external program files such as e-mail, drawing and graphics files, or other executable files that users need to carry out routine tasks. You can also specify the destination path for the file and specify the circumstances under which the file is installed.

To access the Files options: Click Files in the option tree. The Files pane appears in the wizard window. To add an external file to an installation database: 1 2 3 In the Files pane, click Add. A standard Windows Open dialog box appears. Select a file and click OK. The Add/Modify File dialog box opens. From the drop-down list, select a destination path folder. This folder can be a Windows systems folder, a Hummingbird folder, or a custom folder. If you want to add the file to a subfolder within the destination folder, do the following: a) Click Add Sub Folder. The Add Custom Directory dialog box opens.

44

Chapter 3: Advanced Installation

b) In the New Directory Name box, type the name you want to assign the new subfolder and click OK. If the subfolder name exceeds 8 characters or has a space, you must use the following format:
shortname|longname
8.3 file names have a maximum of 8 characters optionally followed by a dot (.) and then a maximum of three characters. For example, you could use myfold~1 for My Folder.

where shortname is an 8.3 MS DOS file name for the subfolder name and longname is the full subfolder name. 5 With the Install With Feature drop-down list, you can do one of the following:

If you select a feature, the file is installed only when the feature is installed. If you select Always the file is installed with every installation, regardless of features.

6 7

Click OK. The Files pane lists the added file. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To modify external file installation settings: In the Files pane, select the file and click Modify. The Add/Modify File dialog box opens. You can change the following settings:

To change the file destination folder, select a new destination path folder from the drop-down list. To change the feature with which the file gets installed, from the Install With Feature drop-down list, select a different feature or select Always and click OK.

The Files pane lists the external files currently in the installation database. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

45

Exceed Users Guide

To remove an external file from an installation database: In the Files pane, select a file from the list and click Remove. Removing a file in Sconfig deletes it from the transform file. These changes must then be reapplied to the installation file to reflect the update when the application is installed. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.
Note: Removing a file in Sconfig deletes it from the transform file. These changes must then be reapplied to the installation file to reflect the update when the application is installed.

Product Properties
Sconfig lets you specify the Hummingbird product properties you want installed, properties that make the best use of the Hummingbird software features and that facilitate each users installation session. The Proper ties pane lists both the properties that are required for product functionality and the optional properties. You can add optional properties that customize Hummingbird product features, such as the COMPANYNAME property which includes the name of your organization in the product installation. You can also include properties that control user input during installation, such as the TransformSecure property, which protects your transform files from user modification. Other optional properties define the installation behavior of the product, such as the ALLOWBROWSE property, which lets the product browse to the home directory during an installation. You can also set properties specifically for Exceed. However, these properties are available only when installing the appropriate installation files. For more information on Exceed properties, see Exceed Properties on page 62.

46

Chapter 3: Advanced Installation

Modifying and Removing Properties

You can clean the installation database of properties that are no longer in use. Some scenarios that may require the removal of a property include changes made to:

feature requirements user privileges during an installation session user permissions for the software

To access the Properties options: Click Properties in the option tree. The Proper ties pane appears in the wizard window. To add a property to an installation database: 1 2 3 In the Properties pane click Add. The Add Property dialog box opens. From the first drop-down list, select a property. The bottom panel of the dialog box provides the validation information for the property. In the second drop-down list box, type or select a value for the new property and click OK.

47

Exceed Users Guide

The Proper ties pane appears listing the new property you added to the installation database. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To modify a property in an installation database: 1 2 3 4 In the Properties pane, select a property. Click Modify. The Modify Property dialog box opens. The bottom panel of the dialog box provides the validation information for the property. In the drop-down list box, type or select a new value for the property and click OK. The Proper ties pane lists the properties currently added to the installation database. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To remove a property from an installation database: In the Properties pane, select a property from the list and click Remove. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

48

Chapter 3: Advanced Installation

Registry Keys
Sconfig lets you customize the general software settings of your Hummingbird product. After your Hummingbird product installation file installs the custom components and files on the target machine, it can write the custom registry keys and values set in Sconfig to the system registry. You establish the keys and values the installation file writes to the system registry by setting them up in the transform file in generated in Sconfig.

To access the Properties options: Click Properties in the option tree. The Proper ties pane appears in the wizard window. To add a registry key to an installation database: 1 2 3 4 5 In the Registry pane, click Add. The Add/Modify Registry Entry dialog box opens. In the Root drop-down list, select a hive name. In the Data Type drop-down list, select a data value type. In the Key box, type the registry key name. In the Value Name box, type the registry value name.

49

Exceed Users Guide

In the Value Data box, type the registry data value and click OK. The Registry pane appears listing your new keys. When they are available, you can use the Hexadecimal and Decimal radio buttons to convert the value data from base-16 number system to base-10 or vice versa. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To modify a registry key in an installation database: In the Registry pane, select the registry entry you want to modify and click Modify. The Add/Modify Registry Entry dialog box opens. When you have made the necessary changes, click OK. The Registry pane lists the registry keys currently in the installation database. If you have made all the necessary modifications to the installation options, click Next. Otherwise, select the next option group. To remove a registry key from an installation database: In the Registry pane, select a registry key from the list and click Remove. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

50

Chapter 3: Advanced Installation

Shortcuts for Hummingbird Product Features


This option lets you provide users with quick access to commonly used Hummingbird components. You can create and store shortcuts in existing Hummingbird folders, or create custom folders for your shortcuts.

To access the Shortcut options: Click Shor tcut in the option tree. The Shortcut pane appears in the wizard window. To set a custom shortcut:
You can drag and drop items in the Shortcut tree.

In the shortcut tree displayed in the Shor tcut pane, right-click the folder to which you want to add a new shortcut. In the pop-up menu, click Add Shortcut Here. The settings appear on the right side of the wizard window. In the Name text box, type the name of the shortcut that you want add. To rename a shortcut, select the name of the shortcut in the Name box and enter the new name. The name must appear in the format:
short name|long name

51

Exceed Users Guide

8.3 file names have a maximum of 8 characters optionally followed by a dot (.) and then a maximum of three characters. For example, you could use myfold~1 for My Folder.

where the short name is an 8.3 MS DOS name and the long name is the name of the shortcut as it appears on the Windows desktop. For example,
ExceedF|Exceed Finger

If you want to include a description for the shortcut, into the Description text box, type a description for the shortcut. The description you type will appear when users move the mouse pointer over the shortcut icon. From the Install With drop-down list, select the component for which you want to provide a shortcut. The installer uses the installation state of this component to determine whether to create or delete the shortcut. From the Target drop-down list, select the destination folder of the component for which you want to provide a shortcut.
Note: For advertised shortcuts, the file launched by the shortcut is the file associated with this feature. When you activate this shortcut, Windows Installer verifies that all components in the feature are installed before launching the file. For non-advertised shortcuts, the field should contain a property identifier enclosed in square brackets.

6 7 8

The Default Path text box displays the destination path of the component for which you want to create a shortcut. If you want to provide any arguments for this shortcut, type them into the Arguments text box. In the Icon area, click Select to launch the Change Icon dialog box. In this box, select an icon to associate with the shortcut and click OK. The icon you selected is displayed in the wizard. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

52

Chapter 3: Advanced Installation

To create custom folders for shortcuts: In the Shortcut tree displayed in the Shortcut pane, right-click the folder to which you want to add a new folder for your shortcut. In the menu, click Add Folder. If you want to remove a custom folder, click Remove Folder. If you have made all the necessary modifications, click Next. Otherwise, select the next option group. To modify a shortcut: In the Shortcut tree displayed in the Shortcut pane, click the shortcut you want to modify. The settings you can edit are displayed on the right side of the wizard. To remove a shortcut: In the Shortcut tree displayed in the Shortcut pane, right-click the shortcut you want to remove. In the menu, click Delete Shortcut. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

Hummingbird Metering Settings


The Sconfig interface provides you with the information you need to manage Metering settings. You can modify property settings or delete unwanted properties.
Note: Some properties cannot be deleted.

The Metering pane lists the available Metering properties. It also displays the setting or value currently associated with the property and defines the property so that you can make the necessary changes. To access the Metering options: Click Metering in the option tree. The Metering pane appears in the wizard window.

53

Exceed Users Guide

To modify a property setting: 1 In the Metering pane, select the property you want to modify. Its current setting (if any) and a description are provided in this pane.

2 3

Click Modify. The Modify Property dialog box opens and identifies the property you are modifying and its current setting. Specify the new value. Tips are provided at the bottom of the dialog box.
Note: The METERINGRETRYINTERVAL and METERINGRETRYCOUNT values must be numbers that are prefixed by the number (#) character.

4 5

Click OK. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To remove a Metering property: In the Metering pane, select the property you want to remove, and click Remove. If you have made all the necessary modifications, click Next. Otherwise, select the next option group. 54

Chapter 3: Advanced Installation

Environment Variables
You can use the Environment Variables options to customize PATH and other environment variables for the installation.

When customizing variable values, keep the following rules in mind:


If you specify no value for a variable, the variable is removed. To append a value to an existing variable, prefix the value string with the Null [~] symbol and the separator character. For example, if the semicolon is the chosen separator, you type the following: [~];value. To prefix a value to an existing variable, append the value string with the separator character and the Null [~] symbol. For example, if the semicolon is the chosen separator, you type the following: value;[~]. If no Null[~] symbol is present, the string represents the entire value you want to set or delete. To avoid unpredictable results, specify only one value per variable. For example, you should avoid the following: value;value;[~].

To access these options: Click Environment Variables in the option tree. The Environment Variables pane opens.

55

Exceed Users Guide

To add a custom environment variable to an installation database: 1 2 Click Add. The Add dialog box opens. Type or select a variable from the Variable Name drop-down list. The Variable Value for Current User box displays the value of the specified variable if it exists. 3 4 In the Variable Value box, specify the value for the variable. Use the Apply To All Users setting to indicate whether you want the variable to apply only to the current user, or to all users of the target machine. Click OK. The environment variable appears in the wizard window. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

5 6

To modify an existing environment variable: 1 In the Name column, select the variable you want to modify and click Modify. The Modify dialog box opens displaying the current settings for the selected variable. 2 You can make the following modifications:

In the Variable Value box, specify a new value for the variable. Use the Apply To All Users setting to indicate whether you want the variable to apply only to the current user, or to all users of the target machine.

3 4

Click OK. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To remove an environment variable from an installation database: In the Name column, select the variable you want to delete and click Remove. The variable is removed from the Environment Variable list in the wizard window. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

56

Chapter 3: Advanced Installation

User Settings
These options let you migrate Hummingbird Connectivity product settings by allowing you to include, in the installation, settings transfer files (.humfst) generated with Files And Settings Transfer Wizard. These files contain registry entries and user settings for any Hummingbird Connectivity product. For information on creating settings transfer files, see Files And Settings Transfer Wizard Help.

To add a settings file to an installation database: 1 2 3 4 In the User Settings Transfer pane, click Add. The Add dialog box opens. Use the Sequence box to specify the order in which you want Sconfig to add the file to the installation. Use the browse button to select the settings transfer file you want to add to the installation. If you what the file to be added to the installation only under specific circumstances, you can use the Condition box to include Microsoft Windows Installer conditions or other supported properties. In the Description box, you can provide a useful description of the settings transfer file if necessary.

57

Exceed Users Guide

Click OK. The file appears in the User Settings Transfer pane with the information you specified.

To modify the settings of a previously added settings transfer file: In the User Settings Transfer pane, select the settings transfer file for which you want to modify the inclusion settings and click Modify. In the Modify dialog box, make the necessary change, and click OK. To remove a previously added settings transfer file from an installation database: In the User Settings Transfer pane, select the settings transfer file you want to remove and click Remove.

Product Profile Spaces


Profile Spaces provide administrators with the ability to distribute profiles to multiple end users by creating a variety of profiles and placing them in specific locations (Profile Spaces). Each Profile Space can be assigned different access privileges. By default, Connectivity applications are installed with one Profile Space (My Profile Space), but administrators can create additional spaces and designate any of them as the default Profile Space.

58

Chapter 3: Advanced Installation

Profile Space Editor is the tool for creating and registering new File System or LDAP Profile Spaces. Sconfig lets you import, into the installation database, the Profile Spaces you create with the wizard. For more information on creating Profile Spaces, see Profile Space Editor Help.

To import Profile Spaces: 1 2 3 On the machine running Sconfig, launch the Profile Space Editor from the Start menu and create the necessary Profile Spaces. On the Sconfig Customize page, open the Profile Spaces pane. Click Import. Sconfig imports all Profile Spaces found on the local machine.
Warning! Before importing, Sconfig deletes all Profile Spaces that already exist in the transform file (.mst). Any of these deleted spaces that is not represented locally is lost.

The imported Profile Spaces appear in the Profile Spaces pane. A check mark indicates which is the default.

59

Exceed Users Guide

To remove a Profile Space: In the Profile Spaces pane, select the Profile Space you want to remove and click Remove.
Note: The Profile Space is removed from the transform file (.mst) only. It is not removed from the local machine.

Directory Services Settings


Before you configure Hummingbird Directory Services settings in Sconfig, it is recommended you configure a local installation of Hummingbird Directory Services. You can then import the settings into Sconfig to add them to the installation database. The Sconfig interface provides you with the information you need to then modify or remove the settings for LDAP, NFSD, NIS and NIS+ directory services if necessary. The Directory Services pane lists the available properties. It also displays the setting or value currently associated with the property, if any, and defines the property so that you can make any necessary changes. To access the Directory Services options:

To view common properties, click Directory Services in the option tree. The Directory Services pane appears in the wizard window listing common properties. To view service-specific properties, expand the Directory Services option tree item, and click the directory service (LDAP, NFSD, NIS, or NIS+) you want to manage.

60

Chapter 3: Advanced Installation

To import Directory Services property settings: 1 2 Ensure that the local installation of Hummingbird Directory Services is configured as required. In the option tree, select the directory service type for which you want to import a property.

Click Impor t. Sconfig reads and imports the values from all the registries for Directory Services, and lists the imported values in the Value column. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To modify Directory Services property settings: 1 2 In the option tree, select the directory service type. In the pane that appears, select the property you want to modify. Its current setting (if any) and a description are provided in this pane.
Note: If you have not imported property settings from a local installation of Hummingbird Directory Services, no values will be displayed.

61

Exceed Users Guide

3 4 5 6

Click Modify. The Modify Property dialog box opens and identifies the property you are modifying and its current setting if any. Specify the new value. Tips are provided at the bottom of the dialog box. Click OK. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To remove a Directory Services property: Select the property you want to remove, and click Remove. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

Exceed Properties
The Exceed Settings options are available only when you are creating an Exceed, Exceed XDK, or Exceed PowerSuite installation. When you click Exceed Settings in the option tree, the Exceed Settings pane opens. This pane lets you modify or remove Exceed properties, such as the Exceed.XServer.Tune property, which executes the Xperf application for optimal graphics performance.

62

Chapter 3: Advanced Installation

When you modify or remove a property, the property information is added or deleted from the property table in the Exceed Settings pane.

To access the Exceed property options: Click Exceed Settings in the option tree. The Exceed Settings pane appears in the wizard window. To modify an Exceed property in an installation database: 1 2 3 In the Exceed Settings pane, select a property. Click Modify. The Modify Property dialog box opens. The bottom panel of the dialog box provides the validation information for the property. In the drop-down list box, type or select a new value for the property and click OK. The Exceed Settings pane lists the properties currently added to the installation database. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

63

Exceed Users Guide

To remove an Exceed property from an installation database: In the Exceed Settings pane, select a property from the list and click Remove. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

Font Directories and Servers


This functionality is not available in TSE mode.

When you execute custom installations for Hummingbird Exceed, Sconfig lets you control the directories and servers added to the font database. The font database is stored in the lfp.xdb file. The Xconfig utility for Exceed uses this file when locating font directories and servers. As a result of the customization users will see a new, customized font directory or server listed in Xconfig.

Note: Plan your font directories and servers according to the demands of each user.

64

Chapter 3: Advanced Installation

Setting Up Custom Font Directories


This option is useful when accommodating Exceed users who require custom font files in the Xconfig utility. During a mass installation, you need to provide font directories that are tailored to meet the demands of each user. This means including in each directory only those font files (.fon) that are useful to users. Adding Font Directories Adding font directories with Sconfig creates new font directories in the Exceed Xconfig font database. The font database in Xconfig is stored in the lfp.xdb file in the User directory. Specific fonts in the font database are stored in font directories and on font servers.
Note: Before using Sconfig to add the font directory to a custom installation database, you must do the following in the Exceed Xconfig utility: Create a custom font directory. Add custom font files (.fon) to this directory. For more information, refer to the Exceed Users Guide.

Modifying Font Directories Modifying a custom font directory lets you change the specifications for the selected font directory in the Xconfig font database. You can change the font type from directory to server, change the name of the font directory, and add a new font database file (.fdb) to this directory.
Warning! When changing the name of a font directory, you must add the font files (.fon) to that directory.

If you are changing a font directory in the database, you need to know the name of the directory and the name of the font database file corresponding to the new font directory. To access the Exceed Settings (Custom Fonts options): Expand Exceed Settings in the option tree and click Custom Fonts. The Exceed Settings: Custom Fonts pane appears in the wizard window.

65

Exceed Users Guide

To add a custom font directory: 1 2 3 4


For more information on Per User installations and the Default directory, see the Advanced Installation chapter in your manual.

In the Exceed Settings: Custom Fonts pane, click Add. The Add/Modify Custom Font Settings dialog box opens. From the Font Type drop-down list, select Directory. In the Font Directory box, type the name of the custom directory. In the File Name box, click Browse and navigate to the font database file (.fdb). This file is created by Xconfig and stored in
Program Files\Hummingbird\Connectivity\version\Default User\Exceed\

where version is the version number of your Hummingbird product. 5 6 Select the status of the font directory. You can select Load, Keep, or
Inactive.

To make matches to this directory using its physical font name as well as its logical font name, select the Physical Font Name Match Allowed box and click OK. The Custom Fonts pane appears listing the new directory added to the installation database.
Note: The name of the custom font directory appears in the Custom Fonts pane. You can now add your custom font files (.fon) to the custom font directory you created.

If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To modify a custom font directory: 1 2 3 In the Exceed Settings: Custom Fonts pane, click Modify. The Add/Modify Custom Font Settings dialog box opens. From the Font Type drop-down list, select Directory to display directory settings. You can make the following modifications:

To rename the directory, in the Font Directory box, type the new directory name.

66

Chapter 3: Advanced Installation

To change the existing font database file, in the File Name box, click Browse and point to the new file (.fdb). This custom file is created by Xconfig and stored in
Program Files\Hummingbird\Connectivity\version\Default User\Exceed\

where version is the version number of the Hummingbird product.

To change the status of the font directory, in the Status area, select the new status of the font directory. You can select Load, Keep, or Inactive. To make matches to this directory using its physical font name as well as its logical font name, select the Physical Font Name Match Allowed box.

4 5

Click OK. The Custom Fonts pane lists the directories and servers currently in the installation database. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To remove a custom font directory: In the Custom Fonts pane, select a directory from the list and click Remove. Removing a font directory in Sconfig deletes it from the transform file. These changes must then be reapplied to the package to reflect the update. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

Managing Custom Font Files


When you add a font file (.fon) to an installation, the file appears in the Xconfig font database for Exceed users to access using Xconfig. You can remove a font file from the font directory when users no longer require it. To access the Exceed Settings: Custom Fonts options: Expand Exceed Settings in the option tree and click Custom Fonts. The Exceed Settings: Custom Fonts pane appears in the wizard window.

67

Exceed Users Guide

To add a custom font file to an installation database: 1 2 3 In the Custom Fonts pane, select the font directory to which you want to add a custom font file(s). In the Custom Fonts pane, click the Add Font Files button. A standard Windows Open dialog box appears. In the box, browse to the custom font files (.fon) located in your custom font directory and stored on your local machine. Select and copy the custom font files you need into your custom font directory and click OK. The Custom Fonts pane appears listing new font files added to the directory. A new custom font directory along with files is added to the installation database. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To remove a custom font file from an installation database: Removing the font file in Sconfig deletes it from the transform file. These changes must then be reapplied to the installation file to reflect the update. In the Custom Fonts pane, select the font file(s) you want to remove and click Remove File. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

Setting Custom Font Servers


This functionality is not available in TSE mode.

This option is available for Exceed users who require a connection to custom font servers in the font database. During a mass installation, you can connect users to a customized font server tailored for their task requirements. Adding a Custom Font Server Adding a font server to the installation database connects users to a customized font database in Xconfig. You need to know the network node specification of the host where the font server is located and the port or object name (DECnet transports). You can also specify additional font catalogues. Modifying a Custom Font Server If you are modifying a font server in the database, you need to know the network node specification of the host where the font server is located and the port or object name (DECnet transports). You can also specify additional font catalogues.

68

Chapter 3: Advanced Installation

To access the Exceed Settings: Custom Fonts options: Expand Exceed Settings in the option tree and click Custom Fonts. The Exceed Settings: Custom Fonts pane appears in the wizard window. To add a custom font server: 1 2 3 4 5 6 7 In the Custom Fonts pane, click Add. The Add/Modify Custom Font Settings dialog box opens. From the Font Type drop-down list, select a server type. In the Host Name box, type the server name. In the Port box, type or select the port number. If you want to specify a catalogue, type the catalogue name in the
Catalogue box.

Select the status of the server directory. You can select Load, Keep, or Inactive. To make matches to this directory using its physical font name as well as its logical font name, select the Physical Font Name Match Allowed box and click OK. The Custom Fonts pane appears listing the new font server added to the installation database. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To modify a custom font server: 1 2 3 4 5 In the Custom Fonts pane, click Modify. The Add/Modify Custom Font Settings dialog box opens. From the Font Type drop-down list box, select a new server. If you want to rename the server, in the Host Name box, type the new server name. If you want to connect to a new port, in the Por t box, type the new port number. If you want to specify a catalogue, type the catalogue name in the
Catalogue box.

69

Exceed Users Guide

If you want to change the status of the server, from the Status area, select the new state of the server directory. You can select Load, Keep, or Inactive. If you want to make matches to this directory using its physical font name as well as its logical font name, select the Match Physical Font Name box and click OK. The Custom Fonts pane appears, listing any directories or servers in the installation database. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

To remove a custom font server: Removing a font server in Sconfig deletes it from the transform file. These changes must then be reapplied to the installation file to reflect the update. To remove a custom font directory, in the Custom Fonts pane, select a server from the list and click Remove and then click OK. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

Setting Paths for Font Directories/Servers


To view the Font Path options, expand Exceed Settings in the left panel of the Setup Customization Wizard and click Font Path. This option lets you place font directories/servers in the most efficient search order for Xserver requests.

70

Chapter 3: Advanced Installation

Click Move Up and Move Down to change the display (search) order. Place font directories/servers containing the most commonly requested fonts at the top of the list to reduce the amount of time it takes to find a match. If you have made all the necessary modifications, click Next. Otherwise, select the next option group.

Saving the MST File


After you customize the Hummingbird product installation options, the Sconfig wizard lets you save the transform file (.mst). To save the .mst file: 1 In Sconfig Wizard, click Next. The Ready to Commit page opens confirming that you are about to save your configurations to a transform file. Click Next to create the transform file (.mst). This process is automatic and does not display on screen. The Complete page opens, confirming that you have created your transform file. If you want to create a command (.cmd) or batch (.bat) file that will launch Setup with the new transform file, select the option at the bottom of the wizard and use the browse button to specify the file name and location. If you do not select this option, you can follow the instructions provided by the wizard for adding the transform file to the CmdLine entry of the setup.ini file. For more information, see Applying the MST File to an Installation on page 72. Click Finish to exit Sconfig.

Sconfig saves the transform file (.mst) in the same folder as the installation file (.msi). This makes it easier for users to find when they want to access the file from the administrative installation point.

71

Exceed Users Guide

Applying the MST File to an Installation


After you have created a transform file (.mst), you can use it to customize Hummingbird product installations. If, on the last page of the wizard, you did not opt to generate a command file that launches Setup with the new transform file, you can apply the transform file to the installation file manually. To do this, you must tell the setup.exe where to find your transform file. To change the setup.exe:
For more information on installing with an .mst file, see the Sconfig online help.

1 2 3

In Windows Explorer, browse to the folder that contains the setup.ini file of your Hummingbird product. Open the setup.ini file. On the line beginning with CmdLine, add the following text:
TRANSFORMS=full path to the .mst file

For example, the CmdLine for Hummingbird YourProduct would look like this:
CmdLine=TRANSFORMS=c:\Hummingbird YourProduct.mst

where YourProduct is the Hummingbird Connectivity product you are customizing. 4 5 On the File menu, click Save. On the File menu, click Close.

The new CmdLine in the setup.ini file tells the setup program to incorporate the new transform file in the program installation. When you run setup.exe, it uses both the original installation file, and the transform file that you created using Sconfig.

72

Chapter 3: Advanced Installation

Creating Multiple Custom Installations


Multiple custom installations are necessary for disparate users with different development needs. Rather than having users sift through a large Hummingbird product installation, use Sconfig to package custom installations for each user. To create another .mst file: 1 2 3 4 Open Sconfig and browse to a new transform file (.mst). Create and save the transform file (.mst) to the administration installation point. If you want to create more transform files for custom installations, repeat steps 1-2. To use your new transform file (.mst), launch the Setup Wizard by using the following command:
setup /v"TRANSFORMS=c:\YourTransform.mst"

This way, multiple transform files can exist in one source location, without the need for repeated modifications to the setup.ini file.

Running Sconfig from a Command Line


You can use a command-line prompt to generate transform files and to apply them to an installation file (.msi).

Generating a Transform
Use the following command to generate a transform file:
-g basedb newdb transform [error/validation conditions]

where:
basedb is the installation file you want to use to create the

transform file

73

Exceed Users Guide

newdb is the name of the new installation file that contains changes

that you want to add to the transform


tranform is the file name of the transform file you want to create error is the code for any errors you want to suppress validation conditions is the code for any conditions under which a transform can be applied to a package

Applying a Transform File


Use the following command to apply a transform file to an installation file (.msi):
-a transform database [error conditions]

where:
transform is the transform file you want to apply database is the installation file to which you want to apply the

transform
error conditions is the code for any errors you want to suppress

Error Conditions
The following table lists the error that you can suppress when applying a transform:
Code a b c d e f Definition Add existing row. Delete non-existing row. Add existing table. Delete non-existing table. Modify existing row. Change codepage.

74

Chapter 3: Advanced Installation

Validation Conditions
The following table lists the validation conditions you can apply to the transform file:
Code g l p r s t u v w x y z Definition Check upgrade code. Check language. Check platform. Check product. Check major version only. Check major and minor versions only. Check major, minor, and update versions. Applied database version < base database version. Applied database version <= base database version. Applied database version = base database version. Applied database version >= base database version. Applied database version > base database version.

Controlling Per-user Settings


During the installation of Hummingbird Connectivity products, default profiles and settings are installed in a common location for all users. This location, including all files and folders, acts as a template collectively known as the default user directory. When a user launches a component for the first time (or if Humsettings.exe is launched during login), this template is copied to a user-specific (per-user) location or personal user directory. The product CD is not required.

75

Exceed Users Guide

The following are the default (root) directories:


Directory Personal (Per-User) Default Location (Root)

AppDataFolder\Hummingbird\Connectivity\version\ Program Files\Hummingbird\Connectivity\version\ Default User

Administrators can refresh default files, profiles, and settings in the default user directory. Administrators control the global defaults contained in the default user directory; users control the contents of their personal user directory. Each application determines what personal data and what global data exists, but it only reads user-specific settings from the personal user directory or from the current user's Windows Registry.
Note: Administrators and users should change files and folders only below the root level.

Customizing Files and Folders


Any user who has write access can modify the default user directory; typically, only Administrators have write access. Both files and registry entries can be added and removed. Such changes are reflected respectively in the personal user directory and the current user's Windows Registry. Administrators can add files or folders below the level of existing root sub-folders. These files or folders are automatically copied to the personal user directory. New root level sub-folders are handled by PerUser Settings.ini located at the root of the default user directory. This file determines whether or not an installation is required. Hummingbird Connectivity User Settings are automatically created when a user of the machine first launches a Hummingbird Connectivity application.

76

Chapter 3: Advanced Installation

Administrators can change the location of the personal user directory where the template files and folders are installed. Default locations are based on registry values. An administrator can change these values (even remotely) after the initial install. Sconfig has the ability to modify the initial values through its Directory dialog box.
Note: Sconfig is not applicable to Exceed 3D and Exceed XDK add-ons.

Adding Registry Entries


Each root-level folder in the default user directory has an associated registry file. These are stored in the Registry folder. The [Registry Files] section in PerUser Settings.ini provides a method of associating a .humreg file (which is actually .reg file format) with an internal folder name. This is only for installing registry keys and values to the HKEY_CURRENT_USER registry hive. Entries in [Registry Files] use the following syntax:
FolderName=Short_humreg|Long_humreg

where Long_humreg represents the path of the file (for example, Registry\Accessories.humreg) relative to the default user directory root. Short_humreg is the proper MS DOS 8.3 path name. If the Long_humreg file is described as a MS DOS 8.3 path, then Short_humreg and the pipe (|) character can be omitted. Multiple .humreg files can be specified for a single folder by separating the paths with semi-colons.

Updating the Personal User Directory for All Users


When the default user directory is updated, any new personal user directories automatically get the latest files. For users that already have a personal user directory, Administrators can use one of the following methods to update the user files.

Automatic Update
To update the personal user directory for each user automatically (the next time they use a Hummingbird Connectivity application), update the [Last Modified] section of PerUser Settings.ini. 77

Exceed Users Guide

Do this by running the following command:


HumSettings.exe UPDATELASTMODIFIED=FolderName
Available folder names are ExceedMP HostExMP , , ProfileMP FtpMP , , CommonMP SecurityMP , , HumNeighborhoodMP , DeploymentMP and , NFSClientMP .

where FolderName is the internal name for one of the top level, default user directory. Specify multiple directory names by separating the names with semi-colons. HumSettings.exe is located here:
Program Files\Hummingbird\Connectivity\version\Accessories. Note: The time stamp is stored in binary format. If you change the time stamp values manually, you risk having the per-user installation run multiple times.

Manual Update
To manually update the personal user folder for a specific user, at the command prompt type:
HumSettings.exe REFRESH=ALL USER=user_profile_path

where REFRESH=ALL re-installs, repairs, or refreshes all installed product folders. USER=user_profile_path specifies the profile path for the personal user directory. For example:
HumSettings.exe REFRESH=ALL USER="C:\Documents and Settings\user" Note: Do not include a backslash character (\) at the end of the USER command. Otherwise, the command line may be misinterpreted and lead to unexpected results.

Passing Arguments to Per-user Settings


When using HumSettings.exe to invoke the per-user installation process, you can pass parameters that affect the current installation. However, in the case of a per-user installation triggered by an application, there is not a command line to pass arguments to the process.

78

Chapter 3: Advanced Installation

Instead, there is a section in the PerUser Settings.ini file called [PerUser Installation Parameters] which accepts arbitrary Property names and values:
[PerUser Installation Parameters] REINSTALLMODE = ud "Property" = "Value"

Each key and value pair is treated as an argument to the current per-user installation.
Note: There are limitations on parameter usage. For instance, the INSTALL and USER parameters have no affect because the installation is being triggered for only the current user.

User Settings Migration


Controlling Migration in Per-user Installations
Migration of user settings takes place at any time after the initial installation. Starting with version 11, this migration makes use of the Files and Settings Transfer Wizard engine to automatically upgrade older user settings to the current version. The per-user installation uses the settings found in the [Migration Control Options] section of the PerUser Migration.ini to control the migration process. A sample section is as follows:
[Migration Control Options] Migration Method=Automatic Migration First Time Only=2 HUMFST Path=C:\Program files\Hummingbird\Connectivity\11.00\ Default User\MigBackupEx.humfst

The Migration Method value controls whether or not the migration takes place. The value is either Automatic or No Migration.

79

Exceed Users Guide

The Migration First Time Only value determines what to do if the peruser migration takes place a second time. This can have a value of 0, 1, or 2. If the value is set to:
0the per-user installation ignores any existing migration cache and

attempts to migrate each time it is activated


1the per-user installation stops migration if any migration cache

exists
2the per-user installation, before stopping, further examines the

migration cache to determine if any new folders require migration Whenever a Connectivity 11 product upgrades another Connectivity product, a choice of whether or not to preserve previous settings is presented by the Hummingbird Setup Wizard (Product Migration dialog box). At the end of the installation process, if settings were preserved, the .humfst file generated during the process is put in the Default User template folder, and the HUMFST Path is updated to reflect this value. The HUMFST Path value represents the base .humfst file location. The peruser installation combines the information found within this file for older products with the .humfst generated for each individual user. If the HUMFST Path value is empty, the per-user installation uses the appropriate [Directory Mappings.x.yz] section, where .x.yz is the version number of the older product. Each section is populated with old Home directory values from previous versions.

Manual User Settings Migration


An alternative to the per-user installation migration, you can use the Files and Settings Transfer Wizard command line to migrate user settings (including from one machine to another). This requires a base .humfst file and the current user .humfst file. The base .humfst file represents a .humfst exported by the Files and Settings Transfer Wizard at the time the older product was installed. This is a two-part process: 1 Export the current user .humfst using a command similar to the following:
Fstwizard.com ACTION=ExportUser USERHUMFST=UserSettings.humfst

80

Chapter 3: Advanced Installation

Import the current user .humfst using a command similar to the following:
Fstwizard.com HUMFST=Base.humfst ACTION=ImportUser USERHUMFST=UserSettings.humfst

The export and import commands can take place on different machines.

Controlling Uninstallation
When a Connectivity product is uninstalled, Hummingbird Connectivity User Settings removes the personal user directory from the current user profile. To prevent the user directory from being removed, you can set the PERUSERPRESERVEPROFILES property in Sconfig, or manually on the command line of an uninstall operation. For complete control, set the property PERUSERUNINSTALLTYPE in Sconfig, or manually on the command line of an uninstall operation. It can be set to a string representing the exact command line parameters passed to HumSettings.exe.

81

Chapter 4 Connecting to Hosts and Running X Clients

Getting Connected Using the X Client Startup Wizard Starting X Clients Using a Remote Process Desktop Sharing About Window Managers Starting Local Window Managers Starting Remote X Window Managers Displaying X Clients Location of Menu Commands Multiple X Display Support Entering Data Using the Mouse and Keyboard Copying and Pasting Copying and Pasting Data Copying and Pasting Graphics Copying and Pasting Between X Selection and File Copying and Pasting Between X Clients Setting Print Specifications Accessing Hosts and Starting Applications About Xstart Xstart in Detail Startup Methods Xstart Events Creating a Startup File Creating Shortcuts Running an Xstart File Launching Windows Applications

85 85 88 88 91 91 92 93 93 94 95 96 96 98 99 100 100 101 101 101 103 103 104 106 106 107

Typical Xstart Commands Responding to an Xstart Timeout Displaying Xstart Login Information Displaying the Xstart Host Reply Window Browsing for Hosts and Applications Xstart Host and Application Files Listing NIS Maps on the System Load Optimization Using Xstart on VMS Systems TCP/IP Transports DECnet Transports Startup Modes Selecting an X Client Startup Mode Passive Startup Mode XDMCP Query Startup Mode XDMCP Indirect Startup Mode XDMCP Broadcast Startup Mode XDMCP Timeouts

108 109 110 111 111 115 116 117 120 120 120 121 121 122 123 125 126 128

Chapter 4: Connecting to Hosts and Running X Clients

Getting Connected
To connect to remote clients, you must specify the following:

Subsequent sections and topics in this Chapter contain more information about these procedures.

A startup method (usually through TCP/IP). A valid (user ID and password) account on a UNIX host.

If you are connecting for the first time, consider the following procedures:

Connecting to a host using the X Client Startup Wizard. Connecting to a host using Xstart. Starting X Clients using XDMCP Broadcast startup mode. Connecting by means of Xstart shortcuts.

Command Syntax
After connecting to a host, ensure that you know the syntax to:
For more information, see Setting the DISPLAY Environment Variable on page 140.

Set display environment variables on different host systems. Start a specific window manager (if applicable).
Note: Consider starting clients in background mode. To do this in UNIX, type an ampersand (&) at the end of the command.

Using the X Client Startup Wizard


X Client Startup Wizard guides you through the steps necessary for connecting to a host application from your computer. Create startup files and corresponding shortcuts (program items), which you can double-click to start X clients on hosts. By default, X applications launch in screen 0 but you can create startup files that use another screen by selecting a number from a drop-down list box.
The last step in the Wizard gives you the option of publishing the startup file. Selecting Yes opens the Xweb Wizard.

Using the X Client Startup Wizard is the easiest way to connect to a UNIX host. To use the wizard, double-click X Client Wizard in the Exceed Tools folder and follow the wizard instructions.
Note: You can specify certain wizard settings in Xstart Settings (for example, Browse Methods on the Other page).

85

Exceed Users Guide

To create a connection using the X Client Startup Wizard: 1 2 3 In the Exceed Tools folder, double-click X Client Wizard. On the welcome page, click Next. On the host page: a) Type the host name or IP address in the Host box, or select from the drop-down list.
Note: If you have configured the File or FTP method on your machine, you can click Browse to find the host.

b) Select a Host Type from the drop-down list.


Note: You can change the Host Type default settings by editing the stdappdb file, located in the User directory.

c) Optionally, to connect to the most available host, select Load Optimization. d) Click Next. 4 On the host connection page: a) Select a method from the drop-down list. b) If available, and if TELNET is the selected method, optionally select Kerberos Support as the authentication method. c) Click Next. 5 On the application page: a) Select an X application from the drop-down list. After you have selected an application, the dialog box immediately displays the

86

Chapter 4: Connecting to Hosts and Running X Clients

command and default parameters for the application. You can modify the parameters, but not the command. b) Optionally, to specify multiple display and screen settings, click Advanced to open the Display Parameters Advanced Settings dialog box. Click OK. c) Click Next. 6 On the login page: a) Enter the login information to display each time this connection is made. You can leave the Password box blank, but not the User ID box. b) Optionally, you can test the connection. To do this, select Display Host Replies and click Run. When you are satisfied with the connection, clear Display Host Replies. c) Click Next. 7 In the shortcut page, you can create a shortcut to the application. To do this, provide the following information:

Type a shortcut description in the upper box and select the option immediately below the box. In the lower box, select a shortcut location from the drop-down list. Alternatively, click the adjacent button to browse for, or create, a folder location. To create a menu item on the Exceed X server Tools menu, select the check box immediately below this box.

Click Next. 8 This page confirms creation of the startup profile. Do one of the following:

Optionally, select Yes to open the Xweb Wizard which lets you publish the profile to a web server. Follow the wizard instructions. Accept the default No option by clicking Next.

87

Exceed Users Guide

If you decided to not publish the profile, you can create another one by selecting Yes and return to the host page (see step 3). If you select No and click Finish, the wizard creates the specified connection file and shortcut.

Starting X Clients Using a Remote Process


This technique connects to clients using a remote process (for example, an XDM script) when Exceed starts. Ideally, you would use an Xterm or some other terminal emulator such as TELNET which gives you a command prompt on the host to let you start other clients.
Note: Unless you are using a local window manager (that is, either HWM, MWM, or Native window manager), the first X client you start must be a remote X window manager.

Before starting, do the following:



For more information about DISPLAY, see Setting the DISPLAY Environment Variable on page 140.

Set the startup mode (Xconfig Communication page) to passive. Start Exceed. If you are using HWM or MWM, start the window manager. Determine whether the DISPLAY variable is already defined on the host. If not, enter it on the command line. Otherwise, your X client will not run.

Regardless of whether the DISPLAY environment variable is defined, you can start X clients using the appropriate command line syntax for your transport. Enter the command line at the terminal emulator prompt.

Desktop Sharing
Exceed Desktop Sharing is a collaborative tool for group projects and presentations. Session owners can share their current X desktop to virtually unlimited audiences (remote users). The owner of an Exceed session can start the desktop sharing service, create an access password, and share it with the intended participants.

88

Chapter 4: Connecting to Hosts and Running X Clients

There are two levels of participation, or modes, that the owner of a session can set when initiating desktop sharing. Each level gives participants a different degree of control of the shared session:

View OnlyRemote users can view the presentation, but cannot access or affect any X applications on the owners X desktop. CollaborationRemote users can take limited and temporary control of the owners X desktop. The owner can withdraw such control at any time, even without the acknowledgement of the remote users.

To use desktop sharing in a firewall environment, ensure ports 522 (TCP) and 1503 (TCP) are open. X desktop sharing process: 1 On the Exceed menu, click Tools, click Desktop Sharing , and then click Star t. The Exceed Desktop Sharing dialog box opens.

The first time desktop sharing is used, the User Information dialog box opens on the owners desktop. It prompts for a name and e-mail address. This information is displayed on the desktop of remote users. When a remote user wants to connect to the X desktop, the Incoming Call dialog box opens on the owners desktop and prompts for a decision to accept or deny access. The X desktop owner can optionally select a setting that automatically accepts future incoming calls. Current desktop sharing can be disabled or enabled by clicking Pause or Resume (respectively) on the Desktop Sharing submenu (on the Exceed Tools menu). To stop desktop sharing, click End.

89

Exceed Users Guide

To connect to a shared X desktop: 1 On the remote users Exceed menu, click Tools, click Desktop Sharing, and then click Connect. The Connect To Remote Exceed Desktop dialog box opens. Type a host name or an IP address, and type the password provided by the X desktop owner. Click OK. The X desktop displays in a window.

2 3

Shared X Desktop
The following is a sample of a shared X desktop:

Note: The shaded area is a non-X windows application covering that part of the owners X desktop.

When a remote user clicks Connect on their Exceed Desktop Sharing submenu, and provides the required connection information, the remote X desktop displays in a window. If the X desktop is shared in collaboration mode, the Control menu is enabled, and users can click the Request Control menu command. Remote users can potentially take control (using keyboard or button input) of any X windows application. The connection is terminated either by:

the remote user clicking Disconnect (on the Desktop Sharing submenu) the X desktop owner ending the sharing or quitting the Exceed session

90

Chapter 4: Connecting to Hosts and Running X Clients

About Window Managers


A window manager interprets requests or commands entered on the computer and sends them to the Exceed X server. The X server sends the request to the X application, and the application sends instructions to the Exceed X server to display.
Note: If you run an X window session without a window manager, you cannot perform window operations such as resizing, moving, and iconizing. Overlapping windows can make hidden parts of underlying windows inaccessible.

You can select the window manager you want to use in either single or multiple window mode. Only one window manager can run on a particular X display at a time. Although window managers are Exceed clients, they may not display their own windows at startup. However, most X window managers have configurable menu systems. Exceed uses two types of window managers: local and remote. Local window managers run on the local machine, while remote window managers run on a remote host. Running Exceed with a remote X window manager generally increases network traffic and may decrease overall system performance.

Starting Local Window Managers


With Exceed, you do not need to start a remote window manager application. You can use one of the following local window managers: Native Uses the Microsoft window manager on your computer. Windows automatically becomes the window manager when you select either the Native orDefault To Native option in the Window Manager area of the Xconfig Screen page. You cannot use Windows as your window manager in single window mode.

91

Exceed Users Guide

HWM Hummingbird (Motif-like) window manager. If you are running Exceed in either single window mode or multiple window mode (with one of the X or Default To Native options selected), you can run HWM by double-clicking its icon. MWM Motif window manager (Exceed XDK only). A remote MWM window manager may also reside on your host. If you are running Exceed in either single window mode or multiple window mode (with one of the X or Default To Native options selected), you can run MWM by double-clicking its icon. HWM and MWM are located in the Exceed Tools folder. To open one of these window managers, double-click the appropriate icon.

Starting Remote X Window Managers


If a remote window manager resides on one of your hosts, you can use it in single window mode or in multiple window mode (with either X or Default To Native option selected). Start X window managers in the same way that you start any X client in passive startup mode. If you are running an XDMCP startup mode, the remote window manager is likely specified in the hosts startup file. To start a remote X window manager: 1 2 3 Connect to the remote host using any startup method such as Xstart, Xsession, or TELNET. Provide a user ID, password, and any other login information required. Type and execute the command to start the window manager.

Some typical window manager startup commands are listed below.


Window Manager Motif (UNIX) DEC (UNIX) OpenLook AIX Startup Command Syntax [path/]mwm& [path/]dxwm& [path/]olwm& [path/]aixwm&

92

Chapter 4: Connecting to Hosts and Running X Clients

Window Manager DEC (VMS) Motif (VMS) KDE (Linux) GNOME (Linux) For more information about DISPLAY, see Setting the DISPLAY Environment Variable on page 140. To configure the PC screen to reflect the window mode, see Configuring X Screens on page 219. For more information, see Window Mode Options on page 218.

Startup Command Syntax [path/]SPAWN/NOWAIT/INPUT=NL RUN SYS$SYSTEM:DECW$WINMGR [path/]SPAWN/NOWAIT/INPUT=NL RUN SYS$SYSTEM:DECW$MWM [path/]startkde& [path/]gnome-session&

You must specify the DISPLAY environment variable or command line parameter so that the remote window manager knows which display it should use to connect.

Displaying X Clients
Window mode determines how X clients are displayed. The window mode in which you operate depends upon your preferences. Use the Xconfig Screen page to select a window mode for the Exceed X server: Single Window Mode Presents all clients in a single Exceed window. You can use any X window manager (local or remote) as your window manager.
Note: If you minimize the Exceed X server to an icon in this mode, active client windows are no longer visible.

Multiple Window Mode Each client you start creates a new window on your display. You can use either the native (Microsoft Windows) or any X window manager (local or remote) as your window manager. By default, the Exceed X server operates in multiple window mode and the window manager is configured to default to native.

Location of Menu Commands


Multiple Window Mode To access menus, right-click the Exceed icon in the Windows taskbar. If the taskbar icon is hidden, right-click the taskbar tray icon (in the status area on the right side of the taskbar).

93

Exceed Users Guide

The location of the Edit menu commands vary depending on whether you are running the native window manager or an X window manager in multiple window mode: Native Window ManagerThe Copy Rectangle and Copy All commands (To File, Printer, or Clipboard) appear on the Control menu (click the Control menu box at the top left of the X client window), on the Edit submenu. X Window ManagerThe Copy Rectangle and Copy All commands (To File, Printer, or Clipboard) appear on the Control menu of Exceed and on the toolbar. Single Window Mode To access menus, right-click either the title bar of the Exceed window or the Exceed icon in the Windows taskbar. To move menus to a menu bar in the Exceed window, click Move Menu on the Tools menu. Clicking Move Menu again returns the menus to being right-click accessible.

Multiple X Display Support


For information about restrictions with X display support, see Exceed Help.

Exceed supports multiple X displays. Users can run multiple simultaneous copies of the Exceed X server (limited only by available memory and resources) as long as each copy has a unique display number. This feature is useful for users who want to establish multiple XDM (X Display Manager) sessions with different hosts. The following command line parameters are supported by the Exceed X server (Exceed.exe):
-d display# -f filename.xcfg

where display# represents the desired display number from 0 to 9999 inclusive and filename.xcfg is the configuration file name. The following command line parameters are optional:
-m [passive|query|indirect|broadcast] -h hostname -w [multiple|single]

94

Chapter 4: Connecting to Hosts and Running X Clients

where hostname represents the connect host for the XDMCP Query or XDMCP Indirect startup modes. For example, to start the Exceed X server in single window mode on display 1 with a startup mode of XDMCP Query to host xdmhost specify:
exceed.exe -d 1 -m query -h xdmhost -w single

For a particular command line parameter, if you want the setting to default to its current Xconfig value in the Exceed.xcfg configuration file, then do not specify the parameter on the command line.
For more information, see About Xsession on page 144.

The easiest way to startup multiple simultaneous copies of the Exceed X server is to use Xsession.

Entering Data Using the Mouse and Keyboard


You can use a two- or three-button Windows-compatible mouse with Exceed. To help you input data using your X Window terminal, Exceed also supports international keyboards. You can perform the following changes which are transparent to the X protocol:

Type an X Window-supported character or string of characters using user-defined keystrokes by modifying the basic keyboard layout. Simplify accented key entry by defining compose-key sequences. Customize keyboard and mouse options and preferences. Customize or create new keyboard layouts with XKeys, a graphical keyboard utility.

95

Exceed Users Guide

Copying and Pasting


Exceed provides copy and paste commands that let you copy and paste between X and Windows, and X applications. These commands are listed on the Exceed X server Edit menu. For example, you may want to copy and paste data such as long path specifications, command lines, and sections of script files. To determine the copy or paste command you need, you may find it useful to think of the task in terms of the source and destination of the data. The copying and pasting procedure varies depending upon the source and destination.
If you are having difficulties with cutting and pasting data, ensure Clipboard contents appear in Clipboard (ClipBook) Viewer (on the Start menu, under the Accessories group).

The following sections describe copying and pasting procedures for the following scenarios:

Between Windows-based applications (for example, Microsoft Word, Notepad, Paintbrush, Telnet, Hummingbird Basic, Xstart, and so on). Between Windows-based applications and X clients displayed on your PC (that is, displaying to your Exceed X server). Between X clients displayed on your PC.

Copying and Pasting Data


For information on copying and pasting between X clients, see page 100. For more information, see Exceed Help.

You can copy data to Clipboard, a file, or to the printer by using the methods listed below. If you copy and paste using Clipboard, you can use csv and biff formats. You can paste data from Clipboard or from a file using the From Clipboard or From File commands on the Paste To X Selection submenu (located on the Exceed Edit menu). To clear the X selection buffer, click Clear X Selection on the Exceed Edit menu.

96

Chapter 4: Connecting to Hosts and Running X Clients

Copying
Copy Rectangle >To Clipboard | To Printer | To FileCopies a selected rectangle of the active X client window (multiple window mode) or the Exceed X server root window (single window mode) to a destination (Clipboard, a printer, or a file). After clicking a Copy Rectangle command, the cursor changes to a camera icon. To define an area to copy, click anywhere within the window and drag the mouse to define a rectangle. Releasing the mouse button copies the selected rectangle to the destination. Copy All >To Clipboard | To Printer | To FileCopies all visible portions of the active X client window (multiple window mode) or the server root window (single window mode) to a destination (Clipboard, a printer, or a file). Copy X Selection >To Clipboard | To Printer | To FileCopies the X selection to a destination (Clipboard, a printer, or a file).

Pasting
Paste To X Selection > From Clipboard | From FilePaste To X Selection commands paste the contents of Clipboard, or a file, to the X selection. Any X client requesting the selection can paste the associated data as long as it supports the data type reported in the selection.
For information on automatic copying and pasting, see Automatic Copy and Paste on page 227.

You can paste data from Clipboard to another Windows application as long as the destination application supports the data or format type. To paste text: 1 2 3 Copy data to Clipboard using an appropriate Windows application like Paintbrush. Point to Paste To X Selection on the Exceed Edit menu, and then click From Clipboard. Click the right mouse button in the X client window.

97

Exceed Users Guide

Copying and Pasting Graphics


Exceed lets you copy images from X to Clipboard. You can copy an entire window or a partial window by dragging a rectangle over the window.
For more information, see Installation Directories on page 13.

You can also paste images from Clipboard into an X client. The method of pasting an image to X is based on ICCCM (Inter-Client Communication Conventions Manual). For a technical description of the process, refer to seltest.doc, located in the Exceed installation directory.
Note: Many X clients support the copying and pasting of graphics to other X clients, but only through ICCCM X selections.

An example of copying and pasting images is supplied in a file named seltest.c in


..Program Files\Hummmingbird\Connectivity\version\Exceed\Info

To build Seltest, you must upload it to a host where an Xlib development environment is available. On a UNIX host, compile Seltest as follows:
cc -o seltest seltest.c -lX11

where the library file libX11.a is on your path. To paste images from Clipboard to Seltest: 1 2 3 Copy an image to Clipboard using an appropriate Windows application, such as Paintbrush. Run Exceed and ensure that the X selection setting in Xconfig is set to
PRIMARY.

Run Seltest from an Xterm or TELNET window. This ensures that information is output to the standard output stream. Seltest initially displays an empty window. If you are running in single window mode, point to Paste To X Selection on the server Edit menu and then click From Clipboard on the submenu. If you are running in multiple window mode, select Paste To X Selection from the Edit menu (the Seltest system menu).

98

Chapter 4: Connecting to Hosts and Running X Clients

Click the right mouse button in the Seltest window. Seltest requests the current PRIMARY selection information and displays the selection target types that are available in the Xterm or TELNET window. If an image is available, it is displayed in the Seltest window. The amount of time it takes to display the image in the Seltest window varies depending on network load, image size, and color resolution. In most cases, it should not take longer than 30 seconds.

To copy images from Seltest to Clipboard:


You can find Clipboard (ClipBook) Viewer on the Windows Start menu, in the Accessories program group.

1 2 3

Follow the above procedure for pasting a Clipboard image to the Seltest client. Clear the contents of Clipboard by selecting Delete from the Clipboard Viewer Edit menu. Select Clear X Selection on the server Edit menu if you are running in single window mode, or from the Edit menu on the Seltest system menu if you are running in multiple window mode. This causes the server to give up ownership of the PRIMARY selection. Click the left mouse button in the Seltest window. Seltest requests ownership of the PRIMARY selection and associates the image it is displaying in its window with the PRIMARY selection. If you are running in single window mode, point to Copy X Selection on the server Edit menu and then click To Clipboard on the submenu. If you are running in multiple window mode, select Copy X Selection on the Edit menu (the Seltest system menu). This causes the server to ask the PRIMARY selection owner (Seltest) for the PRIMARY selection image data. The server copies the image to Clipboard. Display the Clipboard Viewer to verify the image was transferred from the Seltest client to Clipboard.

Copying and Pasting Between X Selection and File


The Copy X Selection To File dialog box lets you copy the current X selection to a destination file. Use the Paste File To X Selection dialog box to paste the current X selection from a source file. By default, the X selection is copied/ pasted from a file located in the Exceed User directory.

99

Exceed Users Guide

Copying and Pasting Between X Clients


If two X clients running on your computer support the same X selection, you can copy and paste between these X clients.
Note: Copying and pasting between locales is supported if you set up the input properly on your computer. To do this, open Control Panel and adjust the settings in the Regional Settings application.

To copy and paste between X clients: 1 2 Place the data that you want to copy in the X selection buffer. On the Exceed X server Edit menu, point to Copy X Selection and then click To Clipboard on the submenu. This places a copy of the X selection in Clipboard.
Note: You can specify the X selection type used by the destination client on the (Xconfig) X Selection page.

3 4

On the Edit menu, point to Paste To X Selection and then click From Clipboard on the submenu. Use the X client-specific method to paste the X selection data.

Setting Print Specifications


The Copy To Printer dialog box lets you specify sizing and scaling options for printing the current selection. To set Exceed to automatically size the selection, click the Best Fit or Stretch To Page option. To specify the printer you want to print to, click Print Setup. After you have specifying the correct settings, click Print to send the job to the printer.

100

Chapter 4: Connecting to Hosts and Running X Clients

Accessing Hosts and Starting Applications


About Xstart
Xstart automates access to hosts and starting applications. Use it to create Xstart (.xs) startup files and create shortcut icons to UNIX, Linux, and X applications. Clicking one of these icons automatically establishes a host connection, logs on, and then starts an X client. An X client can be a character-based host application in a terminal emulator window. The startup method, host, user ID, password, and command specified in Xstart is stored in the .xs file. The X client is started using this information, along with various other Xstart settings.

Xstart in Detail
The following provides functional details about the Xstar t window.

Startup Method Area


For more information, see Startup Methods on page 103.

Select a method from the Method drop-down list. This depends on the transport that you are using and the host to which you want to connect. The following table summarizes the startup methods supported by each type of transport:
Startup Methods REXEC RSH RLOGIN PCX$SERVER hRPS Secure Shell TELNET Local Application X X X X TCP/IP X X X X X DECnet

101

Exceed Users Guide

If you are on a VMS system, see Using Xstart on VMS Systems on page 120.

Connection
For more information, see Using Login Macros on page 131 and User ID and Password Macros on page 131. To see a list of hosts on the network and the X applications available for each one, click Browse.

You must specify the information required to connect to a host, log on, and execute a command to start an application. Options that do not apply to the selected startup method are dimmed. HostThe host to which you want to connect. By default, the most recent host to which you connected appears at the top of the list in the Host drop-down list. User IDThe user ID on the host to which you want to connect. PasswordThe password on the host to which you want to connect. If you are unsure whether you typed your password correctly, delete the entire password and type it again. CommandThe command that is sent to the host. The command that you type depends upon the program type (X Window or Windows application), your host system, and how it is set up. Type the host system command that you require.

For more information, see Using Login Macros on page 131 and Command Macros on page 131.

You can type the @d, @a, @:, and @# command macros as shortcuts in the Command box. The @d macro selects the proper IP address if the machine has more than one address.

Command Example
Use the following command to start the Xterm client on a UNIX host with either a DECnet, IPX/SPX, or TCP/IP transport:
[path/]xterm -display mypcname:displaynumber &

where:
path is the location of Xterm on the host mypcname corresponds to your network node or address displaynumber is the display number you entered on the Xconfig Communication page. The display number is usually zero (0)

102

Chapter 4: Connecting to Hosts and Running X Clients

Startup Methods
Use a startup method to establish the host connection. Xstart includes the following startup method options: Secure ShellEncrypts remote X windows communications. This option is available only if you have Connectivity Secure Shell installed. REXECRequires a password to connect to the host. You can also use REXEC to run local X clients on other PCs on your network if they are running the Xstartd service. RSH (Remote Shell)Similar to REXEC except that no password is required. Before using RSH, your computer must be authorized for RSH access on your host. RLOGIN (Remote Login)Requires a password. TELNETRequires a password. This startup method includes Kerberos V5 authentication and encryption for added security. PCX$SERVER (DECnet)Requires a password. hRPS (Hummingbird remote application starter)Requires that a client be included with Hummingbird Extend to establish the connection. To use this method, the client must be installed and running on the host. No password is required. hRPS is the only startup method supported by all transports. Local ApplicationLaunches Windows applications (such as Hummingbird FTP, Exceed, MWM, or HWM) on the local host.

Xstart Events
When you run an Xstart file, the following events take place: 1 The Xstart Information dialog box opens after clicking Run if one or more options in the Local Prompts area of Xstart SettingsStartup are set to Ask User. In this case, specify your login/account information. Exceed starts and retries the connection for the length of time specified in the Timeouts area on the Xstart SettingsNetwork page.

103

Exceed Users Guide

After you have connected, the command specified in the Xstart


Command box is sent to the host specified in the Host box. If the

command starts a client, the client session begins. The initial socket closes after the length of time specified in the Close box (Timeouts area, Xstart SettingsNetwork page). 3 If the Show Host Reply option on the Xstart SettingsNetwork page is selected, host or client messages are displayed in a window. You can copy text from this window to Clipboard.

Creating a Startup File


By installing an Xstart shortcut to an .xs file, you can double-click it to start Exceed and run the startup X client. You can also create script files for web-based applications that require a user name and password. To create a startup file and connect to the host: 1 Open Xstart by running it from the program group, or by clicking Xstart on the Exceed toolbar.

Select a startup method. Boxes that do not apply to the selected startup method are dimmed on your screen.

104

Chapter 4: Connecting to Hosts and Running X Clients

Type the host, or click Browse to select one from the host table.
Note: To configure a host table, or edit the default hostdb.txt, click Settings in Xstart, click the Other tab, and click the Configure button adjacent to Hosts in the Browse Methods area.

Type a valid user ID and password.


Note: If you have defined a user ID and password macro, you can use it to fill in your user ID or password.

Type a command to run on the host. You can specify parts of the command using command box macros. Click Browse to select an application from a database.
Note: To configure an application database table, or edit the default appdb.txt, click Settings in Xstart, click the Other tab, and click the Configure button adjacent to Applications in the Browse Methods area.

To specify local or remote login prompts when Xstart runs, click


Settings. The Xstar t Settings dialog box opens. Select options on the Star tup page.

To provide an optional description for the Xstart file, click the Other tab and type it (maximum 40 characters) in the Description box (in the General area). To create a command on the Exceed client startup menu, select Show On Exceed Startup Menu . The description is displayed. The description also appears in Xsession if the Xstart file is added to the session. In the Xstar t Settings dialog box, click OK.

10 In Xstart, click Save. By default, startup files are saved in the Exceed directory for the currently logged in user. 11 To create a shortcut locally or on the network, click Create Shortcut on the Xstart File menu. 12 To connect to the host, select Run on the Action menu (or click the Run toolbar button). 105

Exceed Users Guide

Creating Shortcuts
You can create an Xstart or Xsession shortcut on the desktop, or in a local or network folder. Double-clicking the Xstart shortcut starts Exceed and runs the startup X client. Double-clicking the Xsession shortcut starts Exceed and runs the Xsession. To create an Xstart or Xsession shortcut: 1 2 3 Open the .xs file in Xstart or the .ses file in Xsession. Click Create Shortcut on the File menu. The Browse For Folder dialog box opens. Select a location to install the shortcut. If you do not specify a location and click OK in Browse For Folder, the shortcut is installed on the Windows program menu. To change the default icon, use the Windows Properties dialog box (right-click the shortcut, click Proper ties, and then click Change Icon). To change the caption or description, right-click the shortcut and click Rename. For more information, consult your Windows documentation.

Running an Xstart File


When you use Xstart to start the X server, it is recommended that you set the startup mode to passive in Xconfig Communication. There are many ways to run an Xstart file:

Click Run on the Xstart Action menu to start the X client using the startup information currently displayed in the Xstart window. Click Run on the Xsession Action menu to start Xstart files listed in Session Contents. Click Run on the Xsession Console Action menu to start the selected Xstart file in either the left or right pane. Use the X Client Startup Wizard to create and run a startup file. Double-click an icon located on the desktop, or in a local or network folder. Click a shortcut command on the Exceed Client Startup submenu. To access this submenu, right-click the Exceed taskbar icon, click Tools, and then click Client Startup.

106

Chapter 4: Connecting to Hosts and Running X Clients

Click a shortcut command on the Exceed Session Startup submenu (assuming the Xsession includes the proper Xstart file). To access this submenu, right-click the Exceed taskbar icon, click Tools, and then click Session Startup. Use any Windows Run dialog box to run an Xstart file using the Xstart command line syntax.

Launching Windows Applications


To launch Windows applications on hosts, select Local Application as the Star tup Method in Xstart and use the Command box to specify the application and related options. See Exceed Help for an example that uses command line switches. You could start Exceed using command line switches that effectively override Xconfig settings. For example, you could type in the Xstart Command box:
"C:\Program Files\Hummingbird\Connectivity\11.00\Exceed\ Exceed.exe" -w single -m query -h Host1 -n Host1 -d 2

The following are possible command line switches:


-w <multiple|single> -m <passive|query|indirect|broadcast> -h <hostname> -n Specifies the window mode. Specifies connection method. Specifies the remote host. Name for the window title bar. Note: Adding @h adds the host name to the title bar. -d -f <filename.xcfg> Display setting. An xconfig file (other than the default).

Using the previous example, you could run several different X servers (Exceed.exe) on various hosts using different configuration parameters.

107

Exceed Users Guide

Typical Xstart Commands


The following are some typical host commands that you might type in the Xstart Command box.

UNIX C Shell Users


If you have defined the necessary environment variables in the C shell resource file (.cshrc), you can simply type the command to invoke an X client. For example, type the following command to start Xterm:
xterm -ls &

UNIX Bourne Shell Users


Since the Bourne shell startup file (.profile) is not called when Xstart logs onto the host, we recommend that you include the PATH and DISPLAY variables on the command line. The syntax depends on the type of transport:
Transport DECnet IPX/SPX TCP/IP DISPLAY Parameter Syntax -display mypcname::0 & -display mypcname:0 & -display mypcname:0 &

where mypcname is the IP address of the Exceed X server, and & indicates that the application should start in the background. For Sun Sparc hosts, since you cannot specify the OPENWINHOME and LD_LIBRARY_PATH variables on a single command line, consider creating a UNIX shell script on the host to perform these functions.

108

Chapter 4: Connecting to Hosts and Running X Clients

For example, the following is a script called start_xterm that starts an Xterm:
#!/bin/sh OPENWINHOME=/usr/openwin export OPENWINHOME LD_LIBRARY_PATH=path export LD_LIBRARY_PATH path /xterm -ls -display mypcname:0 &

where usr is the appropriate directory on the host, path is the directory where the Xterm is located, and mypcname is the network node specification of your computer. Once you have created the start_xterm script, type the following in the Xstart file Command box:
sh start_xterm &

Responding to an Xstart Timeout


The Enter Reply For Prompt dialog box displays when Xstart times out waiting for a prompt (an answer from the host) and needs your input to proceed. You can use the Reply box to respond to the prompt. You can reply again or send revised login information or commands.

109

Exceed Users Guide

Displaying Xstart Login Information


The Xstart Information dialog box might open when you a run an .xs file. Whether the dialog box opens or not, and what is displayed in it, depends on local prompt options specified on the Xstar t SettingsStar tup page. If options Show Only or Ask User are specified, the dialog box opens and respectively displays, or prompts for, the login information. If all options are set to Hide, Xstar t Information does not open when you a run a file.

If Ask User is the local prompt option, you can change the following items before making a connection:

the host you want to connect to the user ID the command sent to the host the display ID number the password

When you click OK in the Xstar t Information dialog box, Exceed attempts to connect.

110

Chapter 4: Connecting to Hosts and Running X Clients

Displaying the Xstart Host Reply Window


Select Show Host Reply on the Xstar t SettingsNetwork page to display a host reply window when you run Xstart. This window is useful for troubleshooting connections and displaying errors. You can copy information from the Host Reply window to Clipboard. You can hide the Host Reply window when the connection opens. It re-displays when the X client terminates. When the connection closes, click OK to close this window. Click Close to terminate the remote execution command socket monitoring the host replies. Click Copy to copy text from the Host Reply window to Windows clipboard.

Browsing for Hosts and Applications


For more information about advanced features, see Advanced Xstart Features on page 131.

To browse for hosts and applications in Xstart, you must specify which methods and options to use in the Browse Hosts and Browse Applications dialog boxes. To do so, click Configure buttons adjacent to Hosts and Applications on the Xstart SettingsOther page to respectively open Browse Hosts and Browse Applications dialog boxes.

MethodsBrowse Hosts/Applications
The following file retrieval methods are available on the Methods pages of Browse Hosts and Browse Applications dialog boxes:
For more information about hostsdb.txt, see Host Address File on page 115. For more information about appdb.txt, see Application Database File on page 116.

FileUses the hostdb.txt file as a source for the host browse and

appdb.txt as a source for the application browse. You can create and maintain these files. The hostdb.txt file lists IP addresses and their associated hosts. For example: xxx.xxx.xxx.xxx xxx.xxx.xx.xx xxx.xxx.x.xxx sparc hp jack jackster spratt

111

Exceed Users Guide

The appdb.txt file lists hosts or aliases and application locations or names, similar to the following syntax:
#HP HPUX HOST HP/XTERM: HP/Text Editor: HP/CDE Calculator: (a comment) /usr/bin/X11/xterm /usr/vue/bin/vuepad /usr/dt/bin/dtcalc

Note: The stdappdb.txt file, which contains applications and their typical locations on various servers, is located in the Exceed User directory. For more information, see Installation Directories on page 13. An application may be listed here, and consequently appears when you browse for applications, but there is no automatic confirmation that the application itself is in the specified directory.

To change these file, click Edit. Click Browse to select different files.

FTPUses files on an FTP server as a sources for host and application browse. You can only access these files, not edit them. Source files are similar to those described above (File method). To properly configure the Browse Hosts or Browse Applications tabs using FTP, you must provide a server name, user name, password, account (if applicable) and path. In the File box, enter the name and location of the source file on the FTP server. NISUses NIS (Network Information Service) maps hosts.byaddr as a source for the host browse and appdb as a source for the application browse. The system administrator on the UNIX side must create these maps. NIS+ Uses NIS+ maps hosts (as a source for the host browse) and

NIS, NIS+, and LDAP file retrieval methods are available only after configuring them in Directory Services Explorer.

appdb (as a source for the application browse). The system

administrator on the UNIX side must create these maps.

LDAPUses the Lightweight Directory Access Protocol (LDAP). Like NIS+, LDAP secures its objects by requiring client authentication.

112

Chapter 4: Connecting to Hosts and Running X Clients

OptionsBrowse Hosts
The Browse Hosts, Options page contains the following options:

Browse Type options specify which host types are shown in a host browse.

You can show hosts from a host browse, an application browse, or both. The default is to show only hosts from a host browse.
To refresh the Host browse, click Refresh in the Browse For Hosts dialog box which opens when you click Browse beside the Host box in Xstart or in the X Client Startup Wizard.

Remember Browse Information controls whether Exceed remembers (caches)

browse information. If the check box is cleared, information is not cached and each browse retrieves the applications file. If the check box is selected, information is cached and you can use the cached or locally saved list of applications and only refresh the browse from the source Once A Day (the default) or Only On Manual Refresh. Even if you select Once A Day, you can still use Refresh to update the information. Click Default to restore original settings.

113

Exceed Users Guide

OptionsBrowse Applications
The Options page contains the following options:

Browse Sor t Order options affect how applications (regardless of source) are

listed. You can sort the list by application and its hosts (the default), or by host and its applications.
Remember Browse InformationFor details, see the option description in

OptionsBrowse Hosts above.


Use Application Star tup Macro And Expand When Running Command

determines whether the selected browse item is inserted in the Xstart Command box as an application macro, or as the full path and application name. If inserted as a macro, it expands when the startup session runs. The string (variables, macros, flags, etc.) specified in Append To Browse Dialog Selection is appended to the end of the item selected in the Browse dialog box (click Browse on the Methods page). Click Default to restore original settings.

114

Chapter 4: Connecting to Hosts and Running X Clients

Xstart Host and Application Files


Host Address File
The hostdb.txt file lists IP addresses and corresponding host names. For example:
123.45.67.89 boethius

This information affects which hosts Xstart browses.

Host List File


The rupdb.txt file lists hosts that are running an rpcd daemon that supports the rstatd service. This service is capable of running the rup command, which returns status information about the host, including the service load. The rup command is a Remote Procedure Call (RPC) and the rpcd daemon handles all incoming RPCs. Xstart consults rupdb.txt when running Load Optimization by sending a rup RPC to each host in rupdb.txt to find the least busy one. You can use section names in rupdb.txt to associate applications with host names. The following syntax rules apply:

Lines beginning with # are comments and are ignored by the system. Section names are enclosed in square brackets [ ]. If you do not specify a name in the Section Name(s) box, the system inserts the name [Default Section]. If you do not provide a name in the Section Name(s) box on the Options sub-tab (Load Optimization tab), then the system inserts the name [Default Section] in the rupdb.txt file. You can use any combination of alphabetic characters, spaces, capitalization, and numbers in section names. If you want to list more than one application in section names, then separate them with commas. When you add the hosts, type only one host on each line. Host names may be in short or full form, for example, irix or irix.domain.com.

115

Exceed Users Guide

For example:
[xclock] onefish twofish [xterm] redfish bluefish

In this example, the hosts onefish and twofish support the xclock application; the hosts redfish and bluefish support the Xterm application. When you specify an application in the section, Xstart queries only those hosts following each section. This prevents Xstart from contacting a host that does not run the desired application.
Note: appdb.txt lists hosts that must be running rstatd. Therefore, the list of hosts in appdb.txt is a subset of the hosts listed in rupdb.txt, which is itself a subset of the hosts in hostdb.txt.

Application Database File


The appdb.txt file lists host names, application nicknames, and full path names for applications on remote hosts. Xstart uses appdb.txt to determine which hosts run a particular application. For example:
solaris/mailtool: /usr/bin/mailtool solaris is the host, mailtool is the application, and /usr/bin/mailtool is the application path.

Listing NIS Maps on the System


The Xstart Browse NIS Maps dialog box lists the configured NIS maps available to your system. These can be standard maps, such as hosts.byaddr which lists available hosts by their IP addresses, or custom maps set up by your system administrator, such as appdb, which references all the applications available to your system. For the NIS maps available for host or application browsing, check with your system administrator. 116

Chapter 4: Connecting to Hosts and Running X Clients

Load Optimization
This feature makes Xstart connections more efficient. The connection is redirected to another host if the original host is already accommodating many connections. When you run the Xstart file, the system locates the specified host. If that host is busy, the system finds the host best able to accommodate the connection, based on the search format you specified.

Methods
To configure Xstart for load optimization, select a Method:

For more information about rupdb.txt, see Host List File on page 115.

FileXstart scans the rupdb.txt file for available hosts and tries to run

For more information about appdb.txt, see Application Database File on page 116.

the application on the least busy host. You can create and maintain this file, and save it in the User directory. This method is the easiest to run and is convenient if the desired application resides on every host in rupdb.txt (such as Xterm). If the application runs on certain hosts only (not necessarily the least busy ones), then this method could fail. Alternatively, you can use rupdb.txt in conjunction with appdb.txt (provided you have previously created appdb.txt). In this case, select Use Apps File in the Options sub-tab. By comparing the two files, Xstart figures out what subset of hosts in rupdb.txt have the desired application and selects from those only.

117

Exceed Users Guide

NIS and NIS+ file retrieval methods are available only after configuring them in Directory Services Explorer.

FTPUses a file on an FTP server as the source for available hosts. You can only access a file this way, not edit it. To properly configure load optimization by FTP, enter the server name, user name, password, and account (if applicable) in the fields provided. In the File box, enter the name and location of the source file on the FTP server. NISUses an NIS (Network Information Service) map rupdb as a source for available hosts. Before browsing, you must configure Hummingbird Directory Services. The system administrator on the UNIX side has to create the map. NIS+ Uses an NIS+ map rupdb as the source for available hosts. Before browsing, you must configure Hummingbird Directory Services. The system administrator on the UNIX side has to create the map. LDAPUses the Lightweight Directory Access Protocol (LDAP). Like NIS+, LDAP secures its objects by requiring client authentication. Before browsing, you must configure Hummingbird Directory Services. Broadcast Sends out a broadcast on the network. This option is

limited to queries within your subnet, unless you type an address for another subnet. If you selected Use Apps File in the Options sub-tab, then Xstart broadcasts the rup RPC to the subset of hosts in appdb.txt that run the desired application. If Use Apps File is not selected, then Xstart broadcasts to all hosts on the subnet. Using this method, you do not need a rupdb.txt file.

Browse ApplicationsUses an application database file (appdb.txt) to

get a list of hosts to check.

118

Chapter 4: Connecting to Hosts and Running X Clients

Options
The following load optimization options are available:

Use Applications File specifies that Xstart uses rupdb.txt in conjunction with appdb.txt. In the Section Name(s) box, type one or more section names

(separated by commas). These are defined in rupdb.txt. Each section name field can include just one or several section names (separated by commas). In the Timeout box, set a timeout value from 0 to 9999 milliseconds. If Broadcast was selected on the Method page, this time is the total time that Xstart waits for answers from remote hosts. If other methods were selected, this time is the maximum time to wait for an answer from each host.
Remember Browse Information For details, see the option description in

OptionsBrowse Hosts on page 113. Click Default to restore original settings.

119

Exceed Users Guide

Using Xstart on VMS Systems


You can use Xstart on VMS systems by selecting the correct startup method for your transport software and entering all of the required information in the Xstart window.

TCP/IP Transports
You can use Xstart on a VMS system running TCP/IP if your VMS system supports REXEC or RSH.
Note: Alternatively, you can use TELNET to connect and start remote applications.

You must create a script on the host containing the DISPLAY environment variable specification and the command to start the X client. You can then use REXEC or RSH to connect to the host and execute the script. If your VMS system supports REXEC or RSH, and it is running Version 4.0 of the PCX$SERVER command processor, start an application by choosing the REXEC or RSH startup method and type the following in the command box:
@sys$system:pcx$server 4,display-number, screen-number, tcpip,node-address, command

For example:
@sys$system:pcx$server 4,0,0,tcpip,2.10 DECW$TERMINAL

DECnet Transports
To use Xstart on a VMS system running DECnet, use the PCX$SERVER (DECnet) startup method. Depending upon which version of the PCX$SERVER command processor you are using, type one of the following in the Command box:

For Version 2, type:


DECW$TERMINAL

120

Chapter 4: Connecting to Hosts and Running X Clients

For Version 3, type:


3,transport,node-address,command

For example, to send the command DECW$TERMINAL to your node address 2.10 on DECnet, type the following:
3,DECNET,2.10,DECW$TERMINAL

For Version 4, type:


4,display-number,screen-number,transport, node-address,command

For example, to specify display number 0 and screen number 0, and send the command DECW$TERMINAL to your node address 2.10 via DECnet, you would type the following:
4,0,0,DECNET,2.10,DECW$TERMINAL

You can also use command field macros when specifying information. For example:
4,@#,0,DECNET,@a,DECW$TERMINAL

Startup Modes
Selecting an X Client Startup Mode
For more information, see Communication Settings on page 195.

You can select the startup mode on the Xconfig Communication page. The startup mode determines the sequence of events when you start Exceed, including automatic host connection. The startup mode you use depends on your transport, your host, and your preferences. You can select one of the following startup modes: Passive ModeBefore using HostExplorer, Xstart, Xsession, or a remote process to manually connect to a host and start an X client, select Passive from the Mode drop-down list box. This startup mode does not connect to a specific host when it starts Exceed. You must know the UNIX commands required to run X clients.

121

Exceed Users Guide

XDMCP QueryConnects to, and queries, the host specified in the


Connect Host box of the XDMCP Startup Modes dialog box.

XDMCP IndirectConnects to, and queries, the host specified in the Connect Host box of the XDMCP Startup Modes dialog box. After connecting, a general request is made for X display management (XDM) to start clients on the host and broadcast the request to one or more other hosts. XDMCP BroadcastBroadcasts an XDM request to hosts included in the Host List file (xdmcp.txt) or to the address in the Broadcast Address box of the Transpor t Settings dialog box.

Passive Startup Mode


Passive startup mode lets you start Exceed without connecting to a specific host. If you plan to use Xstart or Xsession to manually connect to a host and start an X clients, or if you are using a remote process such as TELNET or an Xterm to start clients, you must use this startup mode.
Note: If you are not using a local window manager (that is, either HWM, MWM, or native window manager), you must start a remote X window manager.

Before starting Exceed:

For more information about DISPLAY, see Setting the DISPLAY Environment Variable on page 140.

Double-click the appropriate icon to start the HWM or MWM window manager. You must know how to run X clients. Enter commands in the Command box. Depending on whether your host is UNIX or VMS, the command line varies. Determine whether the DISPLAY environment variable is already defined on the host. If not, enter it on the command line. Otherwise, your X client will not run.

122

Chapter 4: Connecting to Hosts and Running X Clients

Command Parameters
Parameter path Explanation The directory containing the application you want to run on the host to which you are connected. If you have pre-configured the PATH environment variable on your host, you may not need to enter it on the command line. The executable name of the application. Any application parameters that you want to specify. The command line option that introduces the display specification of Exceed. This specification contains the mypcname, transportindicator, and displaynumber parameters. If you have pre-configured the DISPLAY environment variable on your host, you do not need to enter your display specification on the command line. mypcname The name or network address of the computer running Exceed. An indicator that corresponds to the type of transport you are using. If you are using IPX/SPX or TCP/IP use , one colon (:); for DECnet, use two colons (::). The Exceed display number. You can specify this value in the Xconfig Communication page. Typically, the display number is zero (0). Indicates that this UNIX application should run in the background.

application parameters -display

transportindicator

displaynumber

&

XDMCP Query Startup Mode


When you start Exceed, XDMCP Query startup mode automatically connects to the host specified in the Connect Host text box of the Xconfig XDMCP Startup Modes dialog box. After you log in, Exceed queries the host that starts the clients specified in the host XDM session (script) file.

123

Exceed Users Guide

Before starting Exceed:


Ensure that the host is running the X Display Manager (XDM). Verify the name or network node specification is correct for the host you are connecting to (as specified in the Connect Host box in the XDMCP Startup Modes dialog box). Click Configure on the Xconfig Communication page to display this dialog box. Ensure an XDM session file existsXstart verifies that an XDM session file (client starter script) exists on the host.

To configure Exceed to use XDMCP Query startup mode: 1 2 3 Open Xconfig and select XDMCP Query in the Startup Mode text box on the Communication page. Leave the Display Number set to the default value of 0 unless your system administrator tells you otherwise. Click Configure and type the name of the host to which you want to connect at server startup in the Connect Host text box in the XDMCP Star tup Modes dialog box. If you leave the box blank, Exceed prompts for a host name at runtime. Make the additional XDM settings displayed in the XDMCP Star tup Modes dialog box.

4
XDMCP Query startup mode assumes that the host supports the X Display Manager Control Protocol and contains a session file (script) to start clients.

To start X clients: 1 If you have configured Exceed to start in XDMCP Query startup mode using Xconfig, start Exceed. Alternatively, click Exceed XDMCP Query in the Exceed Tools folder. Type a host name or IP address in the Exceed XDMCP Query dialog box and click OK. Log into the host. Exceed queries the host, starting clients listed in its XDM session (script) file. To start additional X clients, you can use another startup application (that is, Xstart, Xsession, or TELNET).

2 3 4

124

Chapter 4: Connecting to Hosts and Running X Clients

XDMCP Indirect Startup Mode


When you start Exceed, XDMCP Indirect startup mode sends a query to the host specified in the Connect Host text box of the Xconfig XDMCP Startup Modes dialog box. Either the host starts, or it broadcasts a request for one or more other hosts to start clients. Before starting Exceed:

Ensure that the host is running the X Display Manager (XDM). Verify the name or network node specification for the host you are connecting to, as specified in the Connect Host box (XDMCP Startup Modes dialog box accessible by clicking Configure in Xconfig Communication). Ensure an XDM session file existsXstart verifies that an XDM session file (client starter script) exists on the host.

To configure Exceed to use XDMCP Indirect mode: 1 2 3 4 Open Xconfig and select XDMCP Indirect in the Star tup Mode text box on the Communication page. Leave the Display Number set to the default value of 0 unless your system administrator tells you otherwise. Click Configure. In the XDMCP Star tup Modes dialog box, specify the hosts that you want to receive the broadcast. Specify additional XDM settings as necessary, and click OK.

If Select First Display Manager is selected in the XDMCP Star tup Modes dialog box, Exceed connects to the first display manager that responds to the broadcast and the login information dialog box prompts you to log onto the host. If Select First Display Manager is cleared, Exceed opens the Display Manager Chooser dialog box, prompting you to select a host to manage the display. After you make a selection, the login information dialog box prompts you to log in. Once successfully logged in to the host, clients specified in the XDM session file (script) are run.

125

Exceed Users Guide

This startup mode assumes that the host supports the X Display Manager Control Protocol and contains a session file (script) to start clients.

To start X clients: 1 2 Start Exceed. Log into the host specified in the Connect Host box. After a connection is established, the host either starts clients or broadcasts a request for one or more other hosts to start clients, depending on information in the XDM session file (script). The host that becomes the display manager depends on the Select First Display Manager setting in the Xconfig XDMCP Startup Modes dialog box. If this setting is checked, the first responding host becomes the display manager, and the Login Information dialog box appears for you to log into that host. If this setting is not checked, the Display Manager Chooser dialog box opens. You must select a host to be the display manager. After you choose, the login information dialog box opens for you to log into the host. 4 To start additional X clients, you can use another startup application (that is, Xstart, Xsession, or Xsession Console).

XDMCP Broadcast Startup Mode


When you start Exceed, XDMCP Broadcast startup mode broadcasts an X connection request to the network hosts. You can broadcast to hosts in the host list file (xdmcp.txt) and/or those referenced by the broadcast address. Multicast addressing limits the sending of packets to a specific group of hosts. This avoids a broadcast to every host on the network. You can specify an address in the XDMCP area of the XDMCP Startup Modes dialog box. Before starting Exceed:

Ensure that the host is running the X Display Manager (XDM). Verify the name or network node specification is correct for the host you are connecting to (as specified in the Connect Host box in the XDMCP Startup Modes dialog box). To display this dialog box, click Configure on the Xconfig Communication page. Ensure an XDM session file existsXstart verifies that an XDM session file (client starter script) exists on the host.

126

Chapter 4: Connecting to Hosts and Running X Clients

To configure Exceed to use XDMCP Broadcast mode: 1 Open Xconfig and click Network Communication (Category View) or Communication (Classic View). On the Communication page, select XDMCP Broadcast from the Mode drop down list in the Startup area. Leave the Display Number set to the default value of 0 unless your system administrator tells you otherwise. Click Configure. In the XDMCP Star tup Modes dialog box, specify the hosts that you want to receive the broadcast. You can add the broadcast host names to the Host Access Control file (by default, xdmcp.txt). If you select Broadcast Address, Exceed broadcasts to the address specified in the Broadcast/Multicast box. 4 Specify additional XDM settings as necessary.

2 3

If Select First Display Manager is selected in the XDMCP Star tup Modes dialog box, Exceed connects to the first display manager that responds to the broadcast and the login information dialog box prompts you to log onto the host. If Select First Display Manager is cleared, Exceed opens the XDMCP Display Manager Chooser dialog box which prompts you to select a host to manage the display. After making a selection, the login information dialog box prompts you to log in. Once successfully logged in to the host, clients specified in the XDM session file (script) are run. To start an X client:
This startup mode assumes that the host supports the X Display Manager Control Protocol and contains a session file (script) to start clients.

If you have configured Exceed to start in XDMCP Query startup mode using Xconfig, start Exceed. Alternatively, click Exceed XDMCP Broadcast in the Exceed Tools folder. Exceed starts and broadcasts a request to hosts listed in the Host Access Control file to start clients specified in their scripts. The host that becomes the display manager depends on whether Select First Display Manager is selected in the XDMCP Star tup Modes dialog box. If selected, the host connects to the first display manager.

127

Exceed Users Guide

If you want to run additional X clients, you can use a separate startup application (that is, Xstart, Xsession, or TELNET) to start them.

XDMCP Timeouts
The XDMCP Idle dialog box indicates that the host has not responded to your XDMCP request and Exceed has timed out. The timeout is set to 126 seconds.

To force the server to reset after timing out, click Retry. To force Exceed into Passive mode until the server resets, click Passive. To exit Exceed, click Exit.

128

Chapter 5 Advanced Connection Methods

Advanced Xstart Features Using Login Macros Creating a Global Login Remembering Host Passwords Managing the Password List in Xstart Defining User ID and Password Macros Password Expiry Prompts Changing IDs, Hosts, and Passwords Across Multiple Files Running Multiple Exceed Sessions Starting Multiple X Clients or Windows Programs Running Xstart from a Command Line Environment Variables Setting the DISPLAY Environment Variable Command Line Syntax for Starting X Clients Using Exceed on a Remote PC Setting Up Xweb Xweb Wizard About Xsession Running Multiple Xstart Profiles Working with Xsession Xsession File Sequence Starting Multiple Exceed X Servers Multiple X Display Support Common Desktop Environment (CDE) Using Desktop Environments for Linux Running Multiple CDE Sessions

131 131 132 134 134 135 135 135 136 136 137 139 140 141 142 143 143 144 145 148 149 150 150 152 153 153

Securing Connections Secure Shell Using Kerberos Smart Card VPN and NAT Support X11 Authentication Trusted and Untrusted Clients Password Aging

155 155 155 156 156 157 157 157

Chapter 5: Advanced Connection Methods

Advanced Xstart Features


Using Login Macros
You can use macros as shortcuts in the User ID, Password, and Command boxes of Xstart.

User ID and Password Macros


You can use the following macros to specify your user ID and password in Xstart.
Macro @u or @U @p or @P @h or @H @w or @W Description Inserts the user ID, depending on the startup mode. Inserts the password, depending on the startup mode. Inserts the host name, depending on the startup mode. Inserts the Windows user name. Inserts your Windows user ID.

%w

Note: You can also use @u or @U and @p or @P to specify default login information in the Login Macros area of the Xstart Global Options dialog box, or the X Client Startup Wizard.

Command Macros
The Xstart Command box lets you send a UNIX command to the host. The command you type depends on your host system and how it is configured.
Note: These macros are automatically defined by Xstart; you do not need to perform additional steps to define them.

131

Exceed Users Guide

Macro @d or @D @a or @A @:

Description Inserts the display environment specification. Do not use with VMS systems. Inserts the network address. This macro is not supported by the hRPS start method. Inserts the correct display transport identifier (that is, : for TCP/IP and IPX/SPX, and :: for DECnet). This macro is not supported by the hRPS start method. Inserts the Display Number as configured on the Xconfig Communication page. This macro is not supported by the hRPS start method. Inserts the @ character. (Local Application method only) Inserts the Display Number. (Local Application method only) Starts Exceed if it is not already running.

@#

@@ @# @!

Creating a Global Login


This feature lets you cache your password, so that during an Xstart session, you login just once. The system caches the password until you either exit Exceed or manually empty the cache. For example, you may need to manually empty the cache if you are leaving your computer unattended for a long period of time.

132

Chapter 5: Advanced Connection Methods

To create a universal login:


For more information, see Creating a Startup File on page 104.

1 2

Create the Xstart file. In Xstart, click Options on the Tools menu. The Xstart Global Options dialog box opens.

In the Login Macros area, do the following: User ID (@u)Type a global user name or type a login macro. For example, @u or @U automatically inserts your default user ID in the Xstar t Information dialog box. Password (@p)Type a global password or type a login macro. An asterisk displays for each character. For example, @p or @P automatically inserts your default password in the Xstar t Information dialog box.

4 5 6 7

In the Password List area, create a password list by providing a user ID and password for each host. Select an option from the Remember Password drop-down list. Click OK. Click Save on the File menu.

133

Exceed Users Guide

To manually empty the password cache: 1 2 3 Open an Xstart file. In Xstart, click Options on the Tools menu. The Xstart Global Options dialog box opens. In the Password List area, click Delete All. This empties the cache, so that the next time you run or create an Xstart connection, the system prompts for a password.

Remembering Host Passwords


Use the Xstart Global Options dialog box to specify the Remember Password state for a specific host, as well as user ID and password. To access this dialog box, click Options on the Xstart Tools menu.
Note: You may need to configure Host browsing in the Browse Hosts dialog box, if you cannot browse.

After Xstart recognizes the login combination, it uses the appropriate Remember Password rule.

Managing the Password List in Xstart


Adding and Updating Entries
To add an entry to the password list, enter values for the Host, User ID, and Password boxes (Xstar t Global Options dialog box), select a rule from the Remember Password drop-down list box, and then click Add. If the entry already exists, you can choose to update the entry or not.

Deleting Entries
To Do This Delete all password list entries. Delete all password list entries for a specific user ID. Do This Leave all boxes blank and click Delete All. Enter the value in the User ID box and click Delete All.

134

Chapter 5: Advanced Connection Methods

To Do This Delete all password list entries for a specific host. Delete all password list entries for a specific user ID on a specific host.

Do This Enter the value in the Host box and click Delete All. Enter the host in the Host box and the user ID in the User ID box and click Delete.

Defining User ID and Password Macros


You can use a user ID and password macro to automatically provide your user ID or password. To define user ID and password macros: 1 2 On the Xstart Tools menu, click Options. The Xstart Global Options dialog box opens. Type macros in the Login Macros area:
@u or @U inserts your user ID @p or @P inserts your password

Password Expiry Prompts


Xstart detects UNIX password expiry prompts that require the user to change the password. This applies to Rlogin, TELNET, and Secure Shell start methods.

Changing IDs, Hosts, and Passwords Across Multiple Files


You can change your user ID, host, and password across multiple Xstart files at the same time. By default, the Xstart Change dialog box lets you change any or all of the .xs files in the User directory. To change information across multiple files: 1 On the Xstart Tools menu, click Find And Replace. The Find And Replace dialog box opens.

135

Exceed Users Guide

To change files in a directory other than the User directory, click Browse and select a different folder. Click OK (in the Browse For Folder dialog box) to display the path in the Folder box of the Find And Replace dialog box. In the Find section, type the item or items (User ID, Host, and Password) that you want to change. In the Replace section, type the new information. If you are changing the password, you must type the new password in the Password box and re-type it in the Confirm Password box. Click Replace All to make the specified changes in all Xstart files that meet the defined criteria. If you want to confirm changes to individual files, click Replace.

3 4

Running Multiple Exceed Sessions


You can run multiple instances of the Exceed X server. If you open Exceed while another instance of Exceed is running, the Exceed Multiple Sessions dialog box opens. It prompts you to decide whether to run multiple sessions or to run just one session.
For detailed user interface information, see Exceed Help.

If Do Not Prompt For Multiple Sessions is selected on the Xconfig Common Settings page (Display And Video category), or if the option was selected in a previous Exceed Multiple Sessions dialog box, then the Exceed Multiple Sessions dialog box does not open when subsequent Exceed sessions are run. To re-enable the appearance of this dialog box, clear the Do Not Prompt For Multiple Sessions check box on the Xconfig Common Settings page. To run another instance of Exceed, select Run Multiple Sessions (on the Common Settings page). If this option is not selected (and Do Not Prompt For Multiple Sessions is selected), then neither the prompt dialog box nor another Exceed session opens.

Starting Multiple X Clients or Windows Programs


Xstart is designed specifically for starting X clients. Local Application startup method lets you start any Windows application, including an FTP or TELNET session. If you use additional command line parameters supported by FTP and TELNET, you can create an Xstart file (and shortcut) that automatically connects to the host. 136

Chapter 5: Advanced Connection Methods

Using Xstart Commands


When creating an Xstart file, you can put multiple commands in the Xstart Command box. This feature is useful for simultaneously starting X applications that you commonly use, such as expense reports, calendar, and e-mail applications. To use this feature, all of the X applications must reside on the same host.
Note: You may need to edit the command line to accommodate a particular host. For example, each command is separated by a semi-colon. However, some UNIX hosts do not accept semi-colons.

Using Xsession
Xsession sequentially executes a series of program/client startup files. It lets you create icons to run:

Exceed using different initial window and startup modes multiple X clients or Windows applications

Running Xstart from a Command Line


You can run Xstart from a command line to start an X client, or a character-based application in a VT terminal emulator window, directly from a Windows shell. Use the following command line syntax in the Windows Run dialog box:
home/xstart [-m Method] [-h Host] [-u UserID] [-p Password] [-c Command] [-l|-l-] [-t CloseTimeout] [-a Type]

or
home/xstart Settings.xs [-m Method] [-h Host] [-u UserID] [-p Password] [-c Command] [-l|-l-] [-t CloseTimeout] [-a Type]

137

Exceed Users Guide

where home is your User directory, Settings.xs is the name of an Xstart settings file, and items enclosed in [ ] are available options. If the Xstart file name is preceded by a path, Xstart searches that directory. Otherwise, it searches the User directory.
Note: Options specified after the Settings.xs parameter override settings in the .xs file provided that the options are placed to the right of the file specification. If an .xs file is specified without command line options, Xstart uses information in the file to start the X client.

Command Line Options


The following table describes command line parameters:
Parameter -m Method Description Method can be REXEC, RSH, PCX, TELNET, RLOGIN, or hRPS, each representing the supported startup methods. Host is the host to which you want to connect. Type either the host name or its network address. UserID is the login name used to log on to the host. Password is the host password for the startup method. Command is the action executed by the host. If the command contains spaces, it must be enclosed in double quotes (for example, my command). Login Information prompt. Type either: (Minus sign, lowercase L) The Xstart Login Information dialog box opens at run time and prompts for a host, user ID, password, and command. (Minus sign, lowercase L, minus sign) Xstart does not prompt for login information. -t CloseTimeout CloseTimeout is the number of seconds the remote execution facility socket remains open after the host has acknowledged receipt of the command.

-h Host

-u UserID -p Password -c Command

-l|-l-

138

Chapter 5: Advanced Connection Methods

Parameter -a Type

Description Specifies the program Type and can be one of the following: xwin (for an X Window client) term (for an application that does not require X and can be run using a VT terminal emulator)

Note: Spaces within a command must be enclosed in double quotation marks:

Environment Variables
DISPLAY and PATH variables are often defined for the host session. For example, X clients use DISPLAY to determine which X server to use. You can specify these variables:
For more information, see the next topic Setting the DISPLAY Environment Variable.

on the command line for the current X window session

You can save the DISPLAY variable in the startup file (UNIX hosts: .cshrc for the C shell, or .profile for the Bourne shell). The startup file automatically sets any variables needed when a user logs in. To include your DISPLAY variable in the startup file, add the commands described in the next topic.
Note: You may want to verify that the DISPLAY environment variable does not already exist in the host startup file. If DISPLAY has been set, it appears in the list of environment variables for your computer on the host. To view this list, enter the command corresponding to your host: UNIX: "env" or "printenv" ("echo $DISPLAY" gives the current value VMS: "SHOW DISPLAY"

139

Exceed Users Guide

Setting the DISPLAY Environment Variable


You can specify the DISPLAY on the Xstart command line that starts the X client. The syntax depends on the type of transport:
Transport DECnet IPX/SPX TCP/IP Display Parameter Syntax

-display mypcname::0 & -display mypcname:0 & -display mypcname:0 &

where mypcname is the IP address of the Exceed X server, and & indicates that the application should start in the background.

For the Current X Window Session


If you set the DISPLAY variable on the host, you have to specify it when you start a client. The command to set your DISPLAY variable depends on your transport and the shell. C shells normally display a % prompt.
Transport DECnet IPX/SPX TCP/IP Command setenv DISPLAY mypcname::0 setenv DISPLAY mypcname:0 setenv DISPLAY mypcname:0

Bourne shells normally display a $ prompt.


Transport DECnet IPX/SPX Command DISPLAY mypcname::0 export DISPLAY DISPLAY mypcname:0 export DISPLAY

140

Chapter 5: Advanced Connection Methods

Transport TCP/IP

Command DISPLAY mypcname:0 export DISPLAY

Note: If you are running Open Windows on a Sun Sparcstation, set the following environment variables after setting the display:
OPENWINHOME=/usr/openwin LD_LIBRARY_PATH=/usr/openwin/lib

For both variables, replace usr with the directory on the host where the X Window system files are located.

Command Line Syntax for Starting X Clients


UNIX Hosts
If DISPLAY is not defined, you can start X clients using the following command line syntax for your transport:
Transport DECnet IPX/SPX TCP/IP Command Line [path/]application [parameters] -display mypcname::displaynumber & [path/]application [parameters] -display mypcname:displaynumber & [path/]application [parameters] -display mypcname:displaynumber &

If DISPLAY is defined, you can start X clients using this command line syntax:
[path/]application [parameters] &

VMS Hosts
You can specify DISPLAY on the client startup command only if you are using Xstart with certain command line syntax shown missing. Otherwise, you must define DISPLAY on the host.

141

Exceed Users Guide

If DISPLAY is defined, you can start X clients using this command line syntax for your transport:
Transport DECnet TCP/IP Command Line RUN SYS$SYSTEM:DECW$application RUN SYS$SYSTEM:DECW$application Example RUN SYS$SYSTEM:DECW$CLOCK RUN SYS$SYSTEM:DECW$CLOCK

Note: There is no space after the colon (:) in the specified command lines.

Using Exceed on a Remote PC


Xweb is also known as Broadway or X11R6.x

Xweb lets system administrators provide user access to X applications from a remote computer. The application is designed to extend X to the Internet, intranet, and extranet without making any modifications to the existing base of UNIX or X applications. The system administrator embeds X application links on a web page for users to access from a remote computer. By using Xweb, users can access X applications from a central location without having to know the UNIX host name, or be familiar with UNIX or X Windows system protocol. The system administrator does not need to re-code the applications to make them available, and can control user access. Xweb (Broadway) includes the Low Bandwidth X (LBX) application, a transparent extension to the X server that compresses X protocol and uses server-side caching to cut down X server requests. Overall, LBX improves the performance of X on WANs and slow dial-up connections. To use LBX, you must install lbxproxy on the host to which you are connecting.

142

Chapter 5: Advanced Connection Methods

To run Xweb, only the browser and the X server need be Broadway-compliant. However, each application on the UNIX server must have three files associated with it:
Application-name.htmlThe page on which the URL resides. Application-name.rxAn RX document describing the X server resources the application needs. For example, a data modeling application might specify the OpenGL extensions of Exceed for 3D rendering. If the X server does not support these extensions, an error dialog pops up. Application-name.plThe CGI (Common Gateway Interface) script that

launches the application.

Setting Up Xweb
Complete the following general procedure to install and set up Xweb. To set up Xweb: 1 2 3 If you have not already done so, install Exceed. Exceed fully supports X11R6.6 (Xweb). Ensure the UNIX host can compile X11R6.3 or higher and you have installed a web server. For each application on the UNIX server, install Applicationname.html, Application-name.rx, and Application-name.pl on the web server. These files are outlined in the previous topic.

Xweb Wizard
Xweb Wizard lets you deploy and manage access to X applications by publishing Xstart profiles to a web server either locally, on the network, or on a remote host. To create a Web page: 1 Open Xweb Wizard by doing one of the following:

Creating a single client startup file using X Client Startup Wizard and selecting the option to publish it.

143

Exceed Users Guide

Selecting multiple Xstart files using Exceed Connection Manager and selecting the option to create an Xweb package. Clicking Xweb Wizard in the Exceed program group.

2 3 4

On the Welcome page, click Next. Select web page options. Specify an Xstart file and a web page file name. Click Next. Specify Web page components. If the X client is embedded in the Web page, specify the pixel dimensions of the Xweb object and select whether or not to maintain the connection when users navigate between Web pages. Type the text or HTML that appears at the bottom of the Web page or below the Xweb object. Click Next.

Do one of the following:


Specify a folder or click Browse to locate one. Select Transfer Using Hummingbird FTP. Specify a host name, valid user login credentials, and a directory on the remote host.

Click Save.

About Xsession
See page 146 for a sample Xsession Window.

Xsession lets you start multiple X clients or Windows programs (including TELNET, TN3270, and FTP settings files) simultaneously. Before starting Xsession, you must create an Xstart file for each X client and Windows application that you want to start. The information required by individual programs resides in the corresponding Xstart file. When you run an Xsession file, the .xs files run in the order specified. You can indicate whether you want to start the Exceed X server when you run the Xsession file. If so, you can also specify the initial window and startup modes. You can install a shortcut that lets you run the files included in the X session.

144

Chapter 5: Advanced Connection Methods

Running Multiple Xstart Profiles


Xsession

To run multiple connections, create an Xsession file. Xsession lets you combine .xs files into a single .ses file that starts multiple X clients or Windows programs (including HostExplorer, TN3270, and FTP settings files) simultaneously. You can specify the following in the Xsession Options dialog box:

Whether the Exceed X server lists the file in its Session Startup submenu (accessible by right-clicking the Exceed taskbar icon, and then pointing to Tools) and via the Exceed toolbar Session Startup button. Whether Exceed automatically starts before running the clients or programs. If you want Xsession to start the Exceed X server automatically, you can also specify the initial window and startup modes.

You can create different Xsessions to run different window managers simultaneously.

Xsession provides other useful options such as specifying a configuration file with custom settings, window modes, and startup modes. If you select these settings within Xsession, they override Xconfig settings. For more information about Xconfig settings, see Chapter 6: XconfigPart I on page 159 and Chapter 7: XconfigPart 2 on page 203.
Note: By default, all Xsession files are saved in the User directory where Exceed is installed, but you can specify another location. The .ses file extension is appended automatically.

The following sub-sections describe how to create and run Xsession files.

Entering Startup Information


You may find it useful to create Xsession files that just start the X server with a specific startup mode and window mode. This lets you install custom icons to start the X server in different ways and to selectively override the default settings in Xconfig.

145

Exceed Users Guide

The Xsession displays information about Xstart files in the current session.

For information on creating an Xstart file, see Creating a Startup File on page 104. For more details about Xsession menus, see Exceed Help.

Use Move Up, Move Down, Add, Remove to manage the Xstart files. Modify opens the selected file in Xstart where you can edit the profile. Reload updates and redraws the list of available Xstart files. This is useful if you are adding or deleting Xstart files while running Xsession.
File menu commands let you create new Xsessions, open existing Xsessions, save Xsessions, and create shortcuts. View menu commands let you toggle

the toolbar (on or off), set button size, or reload (update and redraw) the list of available Xstart files. This is useful if you are adding or deleting Xstart files while running Xsession.
Action menu commands let you run the current Xsession file, manage Xstart files listed in Session Contents, and open the selected file in Xstart for modification.

146

Chapter 5: Advanced Connection Methods

On the Tools menu, Repair lets you find and select a file which the application cannot locate (for example, if it was moved, deleted, or renamed since it was first added to the Xsession). The missing file is replaced by the selected file. Options opens the Xsession Options dialog box.

Use the General area to specify the interval between the startup of each Xstart file.
Note: Xstart Launch Interval applies to Xstart programs only. Local applications are started immediately.

You can type a Session Description (up to 40 characters) which becomes the caption for the Session Startup menu command (and the menu that displays when you click Client Startup on the Exceed toolbar). To create this command, select Show On Exceed Startup Menu . If you did not specify a Session Description, Xsession uses the file name (without the extension) for the (menu command) caption. 147

Exceed Users Guide

The Run X Server option starts Exceed automatically when the Xsession file is run. To restart the server with the server options specified in the Xsession file before running any programs, select Prompt For Server Restart. You can specify an Exceed X server configuration file.
Note: Xsession settings override the defaults in Xconfig.

You can specify further overrides under Startup Option Overrides. Select Single, Multiple, or Default (whatever is specified on the Xconfig Screen page) window mode. If the window mode is Multiple, select a window manager. Select a startup mode (Default is the mode specified on the Xconfig Communication page). If XDMCP Query or XDMCP Indirect is selected, specify the network address of the connect host.
Warning! To apply the new Xsession settings, you must restart the server.

Working with Xsession


To create an Xsession file: 1 2 3 Click Add in the Session Contents area of Xsession to locate and select a .xs file. Repeat as necessary. Use the buttons under Add to manage, modify (using Xstart), or rearrange .xs files. Click Save. Xsession files are automatically saved with an .ses extension in the User directory.

To modify an Xsession file: 1 2 3 On the Xsession File menu, click Open to locate and select a .ses file. Use buttons in Session Contents to add, manage, modify, or rearrange
.xs files.

Click Save. Xsession files are automatically saved with an .ses extension in the User directory.

148

Chapter 5: Advanced Connection Methods

To specify options for the current Xsession file: 1 2 3 4 5 6 7 8 9 On the Tools menu, click Options. The Xsession Options dialog box opens. If required, change the Xstart Launch Interval (the time between startup of .xs files). Otherwise, the default value of 2 seconds is used. Type a description of the Xsession file in the Session Description box. To display the Xsession file in the Exceed X server Session Startup submenu or toolbar button lists, select Show On Exceed Star tup Menu. To start the server with the Xsession file, select Run X Server. Specify an Xconfig file or click Browse to locate and select the configuration file. Select override options. If you want Xsession to prompt for confirmation before restarting the server (each time the file is run), then select Prompt For X Server Restart. Click OK. In Xsession, click Save. Xsession files are automatically saved with an .ses extension in the User directory.

Xsession File Sequence


To troubleshoot a connection, see Exceed Diagnostics on page 254 and Chapter 4: Connecting to Hosts and Running X Clients on page 83.

The following describes the sequence of events when you run an Xsession session. Learning this sequence may help troubleshoot connections later on. 1 If Run Exceed X Server is selected in the Xsession Options dialog box, and the X server was not previously started, the X server starts. If the X server is already running and you have selected Prompt For X Server Restart, Xsession prompts you to restart the server. After the time interval specified in the Xsession file has elapsed, the first profile listed in the Session Contents box starts. The pause between the start of profiles corresponds to the Xstart Launch Interval specified. Profiles start according to the order listed in Session Contents.

2 3

149

Exceed Users Guide

Starting Multiple Exceed X Servers


The easiest way to startup multiple, simultaneous instances of the Exceed X server is to use Xsession. To do this: 1 2 3 In Xsession, click Options on the Tools menu. In the Xsession Options dialog box, clear the Run X Server option. Type an explanation or label in the Session Description box and save the session. Click OK. Use Xstart to create and save a profile (specifying Local Application as the startup method) for each instance of the Exceed X server. For each profile, ensure that:

the command line is fully specified or that settings in Exceed.xcfg are suitable a unique display number is used for each instance
Note: Multiple X display support has certain restrictions. For more information, see Multiple X Display Support.

4 5

Add the Xstart profiles and save the X session. Create a shortcut to enable a double-click startup of the session.

The next section contains more detailed information about multiple X displays.

Multiple X Display Support


Support for multiple X displays is available. It lets users run multiple simultaneous copies of the Exceed X server (limited only by available memory and resources) as long as each copy has a unique display number. This feature is useful for users who want to establish multiple XDM (X Display Manager) sessions with different hosts.

150

Chapter 5: Advanced Connection Methods

The following command line parameters are supported by the Exceed X server (Exceed.exe):
-d display# -f filename.xcfg

where display# represents the desired display number ranging from 0 to 9999 inclusive and filename.xcfg is the configuration file name. The following command line parameters are optional:
-m [passive|query|indirect|broadcast] -h hostname -w [multiple|single]

where hostname represents the connect host for the XDMCP Query or XDMCP Indirect startup modes. For example, to start the Exceed X server in single window mode on display 1 with a startup mode of XDMCP Query to host xdmhost specify:
exceed.exe -d 1 -m query -h xdmhost -w single

For a particular command line parameter, if you want the setting to default to its current Xconfig value in the Exceed.xcfg configuration file, then omit its specification on the command line.

Restrictions
The current implementation of multiple X display support has several restrictions or caveats:

Since certain X displays might share the same configuration file, do not make changes to your configuration while the Exceed X server is running. Since only one X display can own the desktop/root window and the configuration file is shared, do not enable the following multiple window mode Xconfig settings if you are using the multiple X display feature Root Mouse Actions To X and multiple screens. The Root Drawing option should be None. You can still use the Root Mouse Actions To X toolbar button, but ensure the setting is selected for only one X display at a time. 151

Exceed Users Guide

Colormaps are not shared between X displays which may result in color flashing in 256 color video mode when you change the focus between windows which are on different X displays. Multiple copies of the Exceed X server cannot share a single log file. To solve this problem, the name of the log file in your configuration file is used to construct the log file name for each copy of the Exceed X server. This is done in the following manner: if the log file name in your configuration file is Exceed.log, then each copy of the Exceed X server uses a log file whose name is exceeddisplay#.log where display# is the display number of the Exceed X server.

To disable support for multiple X displays, create an XServer key under the following key in Registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Connectivity\ version\Exceed\

Create a (DWORD) value named DisableMultipleXDisplays and set the value to 1.

Common Desktop Environment (CDE)


A handshake is an activity that keeps two computers or programs synchronized (such as the CDE display manager and the X protocol). It usually involves the exchange of messages or packets of data between two systems.

When you log into the UNIX host via the CDE display manager using XDMCP, a handshake implemented by the X protocol is employed. CDE does not begin unless it detects a supported X server (that is, Exceed). To start CDE: 1 2 Ensure CDE is configured properly on a UNIX host. Select a window mode on the Xconfig Screen page (in Classic View, click Screen Definition; in Category View, click Display And Video).
Note: If you select multiple window mode and you are using the Windows (native) window manager, verify that the Cascade Windows option is not selected.

Select XDMCP Broadcast from the Mode drop-down list on the Xconfig Communication page. Validate and apply changes in Xconfig.

152

Chapter 5: Advanced Connection Methods

4 5 6 7

Start Exceed. From the XDMCP Display Manager Chooser, select a UNIX host. Click OK. The greeter opens. Log into the UNIX host. The CDE session manager starts and the interface displays on your computer.

Using Desktop Environments for Linux


There are two types of X Graphical Desktop Environments in Linux. Depending on which one you chose when you installed Linux, either KDE or GNOME was set as the default desktop.

KDEK Desktop Environment uses KWM as its window manager. GNOMEGNU Network Object Model Environment works with window managers such as Enlightenment, Sawmill, and Window Maker.

KDE and GNOME run on a Linux host and are displayed on the remote computer using standard X protocol.

Running Multiple CDE Sessions


Running multiple CDE sessions requires passing command line parameters to Exceed.exe. To create multiple Xstart sessions (each with specific command line parameters): 1 2 Open Xstart and select Local Application as the startup method. In the Command box, type parameters. For example:
exceed.exe -d l -m query -h host -w single -n session

In this example, the following parameters apply:


-d 1 specifies the display number -m query specifies the startup mode

153

Exceed Users Guide

-h host specifies the connect host -w single specifies the window mode -n session specifies the session name that appears in the title bar (single window mode)

Click Settings and then click Other in the Xstart Settings dialog box. In the General area, type an explanation or label (such as CDEHostA) in the Description box and click OK. In Xstart, click Run to test the startup file. If the session runs successfully: a) Close the Exceed window. b) On the File menu, click Save or Save As and name the file.

On the File menu, click New. Repeat steps 2 to 4 for each startup file. Be sure to type a unique description (such as CDEHostB, CDEHostC, and so on) for each session.

To run Common Desktop Environment (CDE) sessions with Xsession: 1 Open Xsession and click Add. The .xs files created above appear in the Open dialog box if they were saved to the default location. Otherwise, locate and select the files. Click Open. Repeat for other file locations.
Note: You can also drag and drop .xs files into Session Contents.

2 3

Xsession lists the files in Session Contents. To test the CDE sessions, click Run.
Note: To increase the time between the startup of sessions, on the Tools menu, click Options. In the Xsession Options dialog box, increase the Xstart Launch Interval to a higher value. To modify Xstart sessions within Xsession, select the Xstart file in Session Contents, and click Modify. The sessions start in the order that they appear. To change the order, select the file and click Move Up or Move Down.

154

Chapter 5: Advanced Connection Methods

If the Xstart sessions run successfully and you are satisfied with how the overall Xsession runs, on the Xsession File menu, click Save. Optionally, on the File menu, click Create Shortcut.

Securing Connections
Secure Shell
Connectivity Secure Shell is a client implementation of the Secure Shell protocol (SSH-2).
Note: This option requires purchasing Hummingbird Connectivity Secure Shell.

To make an Exceed X Window session secure, specify Secure Shell as the startup method in Xstart. The connection parameters specified in Xstart are used to establish a Secure Shell tunnel to the target host:

Host User ID Authentication Method

For more information, consult the Hummingbird Connectivity Secure Shell documentation.

Using Kerberos
This option is available only for TELNET startup method. Select this option to enable use of Kerberos V5, and to select and configure options. Kerberos is an authentication service developed at MIT for open network computing environments. Kerberos works by assigning a key, called a ticket, to each user that logs on to the network. The ticket is then embedded in messages to identify the sender of the message. For more information, consult the Connectivity Kerberos Help.

155

Exceed Users Guide

Smart Card
Hosts and passwords can be securely stored on a smart card. Using this security mechanism means that what is displayed in the Xstart Password box is the PIN of the smart card, not the host password. Xstart uses the PIN to log onto the smart card and retrieve the host/password list. Use Smart Card Manager to maintain this list. (This feature is not available with 64-bit versions of the product.)
Note: The technology used by Smart Card Manager is derived from the RSA Security Inc. PKCS #11 Cryptographic Token Interface (Cryptoki).

VPN and NAT Support


Virtual private network (VPN) is used widely by organizations to extend network access in a secure manner. VPN creates a virtual network on the public telecommunication infrastructure by creating a secure tunnel. The VPN server issues a virtual IP address to the VPN client. This virtual IP address can cause problems when the user is attempting to establish an X connection since an X server, such as Exceed, may not be aware of the existence of the virtual IP address. Use Exceed IP Discovery to dynamically discover the IP addresses adopted by the VPN client or masked by a network address translation (NAT) configuration. This feature is especially useful if the last remote translated IP address for the client computer is not the same as the unique IP address assigned to that computer. IPDisCov is a platform-independent TCP/IP service, installed on a (UNIX) machine close to the host. Communicating on a user-defined port, it returns the true IP addresses of the incoming requests from Exceed, so that Exceed can successfully establish an X connection using that information.

156

Chapter 5: Advanced Connection Methods

X11 Authentication
For certain environments, user-level security is controlled by a binary file, .Xauthority. It contains cookies that associate an IP address with a binary value. When an X11 application runs, the file is accessed and then the appropriate cookie is extracted and sent to the X server (typically located on another computer). If the X server accepts the cookie, then the connection succeeds. For a higher level of security, consider using Connectivity Secure Shell (a client implementation of the SSH-2 Secure Shell protocol) for X11 tunnelling and port forwarding. This product is a TCP-based client/server protocol that provides authentication, encryption, and data integrity. For more information, obtain Connectivity Secure Shell and consult the documentation. X11 authentication options in Secure Shell interact with Exceed. When an unknown X client tries to connect, Exceed prompts for a decision to allow or refuse the connection. Allowing the connection depends on whether the X client is trusted or untrusted.

Trusted and Untrusted Clients


Trusted and untrusted clients were introduced in the X11R6.3 X Window System (code named Broadway) pertaining to clients and applications and their permissions. By default, all Xweb clients are untrusted. Xweb clients can become trusted only in the xrx or rxplugin configuration files. Using the xrxTrustedWebServers specification, you can determine whether you want to trust clients started from an individual Web server, several Web servers, an entire domain, or everyone (although we do not recommend this).

Password Aging
For more information about password aging and specifing password expiry prompts, see Exceed Help.

Password aging is a common tool used to ensure a modest level of security. Changing the password periodically reduces the potential damage caused by intruders who gain access to the network by using stolen user credentials. However, frequent password change also inconveniences end-users and reduces productivity because, in some cases, the passwords are stored in many application profiles. Users must manually replace the aged password with the new password. 157

Exceed Users Guide

For more information, see Password Expiry Prompts on page 135.

Exceed can handle password aging events and automatically propagate the changes to Xstart profiles. Users do not have to manually update Xstart profiles with the new password. Xstart detects UNIX password expiry prompts that require the user to change password. This applies to Rlogin, TELNET, and Secure Shell start methods.

158

Chapter 6 XconfigPart I

About Xconfig Xconfig Window Xconfig Password Configuration Files Changing Xconfig Settings Updating and Reloading a Database Command Line Override Xconfig Console Remote Configuration Mouse and Keyboard Input Keyboard Input Settings Selecting a Keyboard File About XKeys PrintScrn Key Support Modifying a Keyboard File Mapping a New Keysym to an Existing Key Deleting a Keysym Mapped to a Key Mapping a Macro to an Existing Key Macro Events Creating Compose-Key Sequences Managing Keysyms and Keysym Sets Adding a Physical Key Deleting a Physical Key Mouse Input Settings Customizing Mouse Settings Mapping a Macro to the Mouse Wheel Middle Button Capabilities for a Two-Button Mouse

161 162 164 165 165 166 166 167 167 170 170 170 173 175 175 176 178 179 180 180 182 184 185 185 186 187 189

Input Methods for Chinese, Japanese, and Korean Special Considerations for Traditional Chinese Network and Communication Setting the Sequence of Events Communication Settings About IP Discovery Creating or Editing the Host List Host List File Syntax Transports Settings

190 192 195 195 195 197 200 201 201

Chapter 6: XconfigPart I

About Xconfig
Xconfig includes applications for configuring the Exceed X server input, communication, video, protocol, security, window mode, performance, X selection, font, troubleshooting, and transport settings. In most cases, the default settings are sufficient. If the Exceed X server is running while you make changes to the configuration, the changes may take effect immediately or may require a server reset, depending on the settings changed. If the change requires a server reset, a confirmation message appears. A server reset terminates all X clients.
For more information about user files and their location, see User Directories on page 13.

The default configuration file used by the Exceed X server is Exceed.xcfg. Per-user files, such as this one, affect only the user who is making the change (that is, the currently logged in user). For example, if you configure Exceed.xcfg to use a certain display, then other users of the machine are not affected.
Note: Each user of the product on the machine receives a personal User directory.

For supported Microsoft Windows platforms (for the current user), the default location is:
C:\Documents and Settings\%USERNAME%\Application Data\ Hummingbird\Connectivity\version\Exceed Note: This location is usually hidden (by default).

You can use Xconfig to make changes to Exceed.xcfg and create other configuration files (using Save As on the File menu). To have the Exceed X server use a configuration file other than Exceed.xcfg, you can either:

Use the Xsession X server options to specify the configuration file in a session startup file and enable the Prompt For Server Restart option. Specify /f and the full path to the configuration file on the Exceed X server command line.

161

Exceed Users Guide

Consult Exceed Help to determine whether a particular configuration setting is global.

Certain settings, such as all security settings, are global to all configuration files. If you make a change to a global setting, it affects all configuration files.

Xconfig Window
For more information about Xconfig menus, see Exceed Help.

This window contains applications for configuring Exceed settings. To change settings, click the appropriate icon in Xconfig, or click a command from the Settings menu. The status bar at the bottom of the window indicates the various settings that you can configure with each application. The Xconfig window consists of left and right panes. The left pane has the following menu boxes that contain links for right pane views and for performing various actions. The window can be resized. If you exit Xconfig and open it again, the size of your previous window is restored.
Note: You can resize (by minimizing) the Xconfig Window to the extent that only the right pane is visible.

For more information about Xconfig menu boxes, see below.

Menu Boxes
Xconfig This menu box is available for Classic View and Category View. Click links that:

toggle the right pane view of icons for configuration pages or configuration categories launch a new instance of Exceed using the current settings create a shortcut on the desktop and on the Windows Star t menu

launch Exceed Help and display the Xconfig topic

162

Chapter 6: XconfigPart I

Quick Links This menu box is available for Classic View or Category View. Click hypertext links that:

let you change the Xconfig password display the Troubleshooting page

Common Actions This menu box is available when viewing settings pages for categories and tasks. Click hypertext links that:

validate and apply changes to settings for the displayed category or configuration page discard configuration changes and exit the application restore default settings (the settings in Exceed.xcfg) launch Exceed Help and display the configuration topic

Switch Screens This menu box is available for the Display And Video category, as well as Screen Definition and Video pages. Click hypertext links to display a settings page for each screen. To select and configure multiple screens, press and hold Ctrl while clicking each screen link. The right pane tab displays a combination screen page according to your selection. Add or Remove Screens This menu box is available for the Display And Video category, as well as Screen Definition and Video pages. Click hypertext links that:

add screens (up to 8, the initial screen being screen 0) remove the highest numbered screen (except for screen 0)

Applying or Discarding Changes and Restoring Defaults


In Xconfig, click Validate And Apply Changes to apply your selections. Click Restore To Default Settings to restore the original settings for the Xconfig configuration file (Exceed.xcfg by default). Click Discard Changes to discard configuration changes and return to Classic View or Category View.

Saving Changes and Creating Configuration Files


All validated and applied changes are saved to the current configuration file. To save the configuration under a new file name, click Save As. To open another configuration file, on the File menu click Open. 163

Exceed Users Guide

Xconfig Password
The Xconfig password protects access to the entire Xconfig application. Depending on how Exceed was installed on your computer, an Xconfig password may have been specified during setup:

You installed Exceed, but there is an Xconfig passwordYou can open the Xconfig window only after you type the correct password. The Xconfig password protects access to the entire Xconfig application.
Note: The password cannot be edited on the Xconfig Security tab. To edit the Xconfig password, open Xconfig in either Classic View or Category View, and click Change My Password in the Quick Links menu of the left pane or on the Action menu. The Xconfig Password dialog box opens.

A system administrator installed Exceed, or modified the setup of Exceed with SconfigA system administrator may have pre-configured Xconfig for optimal performance and password-protected specific Xconfig settings against accidental changes. If so, you cannot access the System Administration page. Only the system administrator can access settings protected by the System Administration password.

To change the Extend password, see Modifying Extend Settings on page 208.

To change your Xconfig password: 1 In the Quick Links menu box, click Change My Password. The Xconfig Password dialog box opens.

2 3

Type the current (old) password, type a new password, and then confirm the new password by retyping it. Click OK.

164

Chapter 6: XconfigPart I

Configuration Files
The default configuration file is Exceed.xcfg, and this configuration is loaded each time you start Xconfig. However, you can create multiple configuration files so that you do not have to continually change specific settings when they are regularly used. The Xconfig File menu options let you save and open configuration files.

External Access
There are many ways to propagate configuration changes, either through the distribution of the configuration file, or by programmatically changing the configuration by using a script. A disadvantage of distributing the configuration file is that it is effective only if recipients require the same configuration. However, if the configuration file is created or changed dynamically based on special requirements or characteristics of the receiver, then the programmatic approach is the better solution. Since the Xconfig file (*.xcfg) is stored in XML format, administrators and users can externally access it to modify settings by using any XML editor. Administrators can programmatically propagate changes to multiple .xcfg files by means of scripts or programs, instead of accessing each configuration with Xconfig.

Changing Xconfig Settings


You can change Xconfig settings to customize the Exceed X server in a number of ways. You can customize settings to:

optimize the X application on your video display match its color specifications to your computer settings set a preferred X client starting method display frequently used fonts use a computer key to transmit any X Window keystroke or string of characters

165

Exceed Users Guide

To change Xconfig settings: 1 2 3 Click Configuration on the Exceed Tools menu or on the Exceed toolbar, or double-click the Xconfig icon in the Exceed program group. Modify settings in the Xconfig window. Click Validate And Apply Changes .

Updating and Reloading a Database


To reload a database used by Exceed: 1 2 3 Update the database file (RGB, font, keyboard, access control lists) in Xconfig. Start Exceed. On the File menu, click Reload Database, and then choose the database you want to reload.

Depending on how you have configured the toolbar, you may also be able to use the following buttons to reload the databases:

Reload RGB Database Reload Font Database Reload Keyboard File Reload Access Control Lists

These actions reload the specified database file and implement any changes immediately. If for any reason Exceed cannot reload the database, the system beeps, and the old copy of the database is preserved.

Command Line Override


Using the command line flag -c, you can override Xconfig options. Flags are Boolean, strings, or integers. To determine the value for an option, specify the settings you want in Xconfig and then read Exceed.xcfg using a text editor.

166

Chapter 6: XconfigPart I

To disable the warning that is displayed when Exceed closes, use the following:
exceed -c Screens.CommonSettings.CloseWarn=0

To force TrueColor and use custom.txt for your color lookup table, use the following:
exceed -c Video.szRgbFile=custom.txt -c Screens.Screen0.ServerVisual=4

Xconfig Console
Xconfig Console is a Microsoft Management Console snap-in for Windows 2000/XP. It has the same functionality as Xconfig, but with more administrative options.

Remote Configuration
Xconfig Console lets you remotely configure computers that have the Xconfig Console component installed. To connect to the remote computer: 1 Double-click Xconfig Console in the Exceed Tools subfolder (doubleclick the Hummingbird Connectivity desktop shortcut, and then doubleclick Exceed). In the left pane, right-click Xconfig, and select Connect To Another Computer.

167

Exceed Users Guide

Use the Select Computer dialog box to specify connection information.

Log in to the remote computer using your current account and password, or select Connect Using A Different User Name and specify a user name, password, and domain. Remote configuration uses the Xconfig System Administration password to open the remote configuration file. If a System Administration password was not set for the remote file, then leave the Password box blank.
Note: In Windows XP if the network access policy Sharing and , security model for local accounts" is set to "Guest only" (the default), then the local account login is authenticated to the guest account on the remote computer and the Xconfig Console remote setting is denied in most cases. Xconfig Console remote settings should function properly if Windows XP was upgraded from Windows NT, or if you set the network access policy to "Classic". There is no restriction for remote Windows XP systems on a domain.

168

Chapter 6: XconfigPart I

Remote Xfonts Configuration


For more information about Xfonts, see Font Management on page 228.

Using remote configuration, users can configure Xfonts on another computer that is running Xconfig Console. With Xconfig Console in remote mode on the remote computer, launch Xfonts in the same way as you would locally, and then configure the remote font database file.
Note: Remote configuration of Xfonts is limited. Some functions, such as adding and viewing fonts, are not available.

Comparing Configuration Settings


Users can compare current configuration settings with a local configuration file. The Compare command on the Xconfig Console Action menu lets you locate and select another configuration file to compare with the current file. For example, the current file might contain the original default settings. This is useful for tracing modifications made in the current session and for troubleshooting the settings in local or remote configuration files.

Gnome Compliance of Native Window Manager


The native window manager is integrated with the Gnome desktop. The four workspaces on the Exceed menu and toolbar are associated with the icons on the Desk Guide and Gnome pager.
Note: Using native window manager with Gnome desktops over a slow network shortens the response times.

To use the native window manager, open Xconfig or Xconfig Console, set the window mode to Multiple, and then select Native as the Window manager.

169

Exceed Users Guide

Mouse and Keyboard Input


Use this Xconfig category to configure mouse and keyboard settings. If you are running a Chinese, Japanese, and Korean (CJK) Windows operating system or Windows 2000/XP (provided Microsoft IME is installed and enabled), then this category includes a settings page for CJK input.

Keyboard Input Settings


Keyboard Input

The Keyboard Input page lets you control Exceed X server settings for your keyboard. Keyboard files are provided; they contain keyboard layout and symbol mappings. You can create an entire custom keyboard manually, but usually it is better to start with one of the existing keyboard files, then customize it to suit your needs. You can also configure the keyboard file for the primary and alternate Exceed X server keyboards. You can use the Keyboard Input page to:

For detailed information about the user interface and how to access it, see Exceed Help.

customize the current keyboard file select an alternate keyboard file map Shift and Alt keys for Exceed

Selecting a Keyboard File


To select a primary keyboard file: 1 2 Click Keyboard Input (or Mouse, Keyboard And Other Input Devices) in Xconfig. Select a keyboard file from the Primary box drop-down list of keyboard files supplied with Exceed or use Browse to select a file from another directory. Click OK to return to Xconfig.

170

Chapter 6: XconfigPart I

Xconfig also lets you choose an alternate keyboard to your primary keyboard. Select and set it (as above). To switch to the alternate keyboard, right-click the Exceed item in the taskbar, and then click Switch To Alternate Keyboard from the Tools menu. You can also add a keyboard-switching icon to the Exceed toolbar by clicking Customize. To customize the keyboard: 1 Save a copy of the original keyboard file. This is a precaution in case you change a setting and it does not work, or you do not want the new settings.
Note: By default, keyboard files are stored in the User directory and have a .kbf extension.

2 3

In the Exceed folder, double-click Xconfig. In Xconfig, do one of the following:


Select Classic View and click Keyboard Input. Select Category View, click Mouse, Keyboard And Other Input Devices, and then click the Keyboard Input tab.

171

Exceed Users Guide

Select the keyboard file you want to use. For both types of keyboards (Primary and Alternate), you can select a file from the corresponding drop-down list.

Primary displays the name of the current primary keyboard file. The

keyboard file contains the appropriate keyboard layout and alphabet for the language selected.

Alternate displays the name of the current alternate keyboard file.

To change the individual settings of either the Primary or Alternate keyboards, click Edit. By customizing your keyboard file, you can associate keys with X keysyms and compose key sequences, and you can redefine keys.
Note: If you are not using one of the supported keyboards or if you are using a keyboard without a separate cursor keypad and 12 function keys, you can create a custom keyboard file to interact with Exceed.

6 7 8

To locate a keyboard file not listed in the drop-down lists, click Browse. To allow users to modify keyboard files from their computers, select
Allow Clients To Modify Keyboard Mapping .

For keyboards containing two Alt keys, you can select options to assign the left and right keys. For keyboards containing two Windows keys, you can select options to assign the left and right keys. To direct Alt key sequences toward Microsoft Windows or X Windows clients, select an option from the Alt Key drop-down list. To direct Windows key sequences to X Windows clients, select an option from the Windows Key drop-down list. You can have each Windows key control a different function.
Note: The Windows key does not exist in the default keyboard file. To map a Windows key, you must add it manually. See the Exceed Help for details.

172

Chapter 6: XconfigPart I

To define how the Shift keys on the keyboard are interpreted by Exceed, select an option from the Shift Key drop-down list.
Map Both Left And Right causes the left and right Shift keys to be treated and interpreted separately. When you select Map Left As Right, any time

you press a Shift key on your keyboard, it is treated as a right Shift. If you select Map Right As Left, any time you press a Shift key on your keyboard, it is treated as a left Shift.

About XKeys
XKeys simplifies the process of mapping keyboard files. It is similar to other key-mapping utilities found in Exceed, but it is specifically designed to communicate with an X protocol host. Exceed supplies a number of customizable keyboard files. To open XKeys, click Keyboard Input (Xconfig Classic View) or Mouse, Keyboard And Other Input Devices (Xconfig Category View), select a .kbf file in the Keyboard Mapping area the Keyboard Input page, and then click Edit (adjacent to either the Primary or Alternate box).

173

Exceed Users Guide

To load a different keyboard file, click Open on the File menu to locate and select the file. Before modifying a file in XKeys, consider what it is that you want to modify.
Note: Make a backup of the original keyboard file before customizing it. After loading the file into XKeys, click Save As from the File menu and specify another file name. This ensures that the original file is intact if you need to revert to it.

The View menu lets you toggle between the following: Mapping ModeLets you customize a keyboard file and associate X Keysyms to keys. You can also create compose sequences and build macros. The image on the previous page shows XKeys in Mapping Mode. Layout ModeLets you customize a keyboard file by adding or repositioning physical keys. You can create a new layout from scratch, or you can modify an existing one. After selecting the appropriate display mode, you can begin to modify the keyboard file to suit your requirements. You can accommodate non-standard keyboards by manually editing the keyboard text file or by using XKeys. The following changes are transparent to the X protocol:

Modify any basic keyboard layouts to send an X Window-supported character or string of characters using user-defined keystrokes. Define Compose Key sequences to simplify entering accented keys. Customize keyboard and mouse options and preferences in the Xconfig Input Settings dialog box. Customize or create new keyboard layouts using XKeys by clicking Edit in the Input Settings dialog box.

174

Chapter 6: XconfigPart I

PrintScrn Key Support


To map the PrintScrn key, edit the keyboard with Xconfig to add this key to the layout. After the key has been added, you can switch into Mapping Mode and map the key to an X Keysym.
Note: Before customizing a keyboard file, backup the original. To do this, load the keyboard file into XKeys and click Save As from the File menu and type a new name. This preserves the original file in case you need to revert to it later.

Note: Every key you want to use must be defined in your keyboard file. To define a key, describe the symbol(s) it can generate in the No Shift, Shift, Mode Switch, and Shift Mode Switch states. The key definition is represented by a keysym (key symbol) hexadecimal value corresponding to the symbol generated in a specific state. An undefined key symbol does not function in any X application.

Modifying a Keyboard File


In most cases, you can customize your keyboard by modifying an existing file. Although you can create a totally new keyboard file, it is recommended that you modify an existing keyboard file whenever possible.
Note: Make a backup of the original keyboard file before you customize it. After you load the file into XKeys, click Save As from the File menu and specify another file name. This ensures that the original file is intact if you need to revert to it.

The following lists various scenarios for modifying a keyboard file:


See Mapping a New Keysym to an Existing Key on page 176. See Mapping a Macro to an Existing Key on page 179.

You want to make a key on your keyboard generate a particular X Keysym. To generate an X Keysym, map the Keysym to a key on your keyboard. You want a single key on your computer to send multiple Keysyms to the remote host. To forward multiple Keysyms, create a macro or a string of symbols, and map it to a key.

175

Exceed Users Guide

See Creating ComposeKey Sequences on page 180.

See Managing Keysyms and Keysym Sets on page 182.

You need to generate a special Keysym that consists of an unknown accented character. To generate a special Keysym, you need to define a compose-key sequence to forward that special Keysym to the remote host.Your keyboard does not have a separate cursor keypad. To resolve this, map existing keys to generate the symbols on a cursor keypad. You want to create a keyboard file for mathematical symbols or for other Keysyms that are not available. The Keysym File Editor is a powerful tool for managing Keysyms and Keysym Sets. This editor will guide you as you add custom Keysyms and create new Keysym Sets. You want to create a keyboard file for mathematical symbols or for an alphabet such as Arabic, Cyrillic, Greek, and Hebrew. Create a new keyboard file using the New command on the XKeys File menu and map the symbol to each key. You want to make use of extra keys on your non-standard physical keyboard to send Keysyms to a remote host. To add a physical key to a keyboard file, you must change the layout of the keys.

See Adding a Physical Key on page 184.

Mapping a New Keysym to an Existing Key


You can change the mapping key on your keyboard to generate a different Keysym. Click Mapping on the XKeys Edit menu (in Mapping Mode only) to display a mapping dialog box.

Note: You cannot map a Keysym to a non-standard key unless you have included it by changing the layout of the keyboard file. For more information, see Adding a Physical Key on page 184.

176

Chapter 6: XconfigPart I

For example, you can change the current Keysym mapping of the Backspace key to any of the following:

the delete Keysym a special character (such as or ) defined in a compose-key sequence


Note: You can map a compose-key sequence in the X Compose Mapping dialog box. It follows the Build Compose Sequence dialog box when you click Next. The X Compose Mapping dialog box has the same functionality as the XKeys mapping dialog box.

To map a new Keysym: 1 Select the key that you want to map by clicking the key in the XKeys window (Mapping Mode) or by pressing the corresponding key on your keyboard. You can view the current mappings in the Mapping For Key Labelled: Keysym group box. Select Mapping on the Edit menu. An XKeys mapping dialog box opens. You can view the current mappings for the key you specified in the Mapping For Key Labelled: Keysym group box. Click any of the following states: Unshifted, Shifted, Mode Switch, Shift Mode Switch. To delete the current mapping for this state, click Clear Mapping . Select a Keysym Set from the Symbol Set drop-down list box. Each Keysym Set contains a different list of Keysyms in the Keysyms list box.
Note: If you do not know which Keysym Set a Keysym belongs to, you can search for it by entering the Keysym in the Search box and clicking Find. XKeys selects the appropriate Keysym Set in the Symbol Set drop-down list box, and then highlights the closest match in the Keysym list box. If the first Keysym matched is not correct, click Find until you find the symbol.

177

Exceed Users Guide

Select the Keysym that you want to map to this key in the Keysyms list box and click Select Keysym. The mapping is changed for the state you selected in step 3.
Note: You can also drag and drop a key from the Keysyms list to the corresponding state boxes.

Select a modifier state in the X Key States group box. You can assign any combination of modifiers. If you would like the key to auto-repeat when held down, enable the Repeat check box.
Note: Select only one Mod key.

7 8

To map different Keysyms to any of the remaining states, repeat steps 3 to 5. Click OK. The Current X Mapping panel in the XKeys window now displays the new mappings.
Note: To change the keycap text on a key, select Layout Mode from the View menu. Once in Layout mode, press the key on your physical keyboard to select it and type the keycap text in the abbreviation box.

Deleting a Keysym Mapped to a Key


To delete a Keysym mapped to a key: 1 Select the key that you want to map by clicking the key in the XKeys window (Mapping Mode) or pressing the corresponding key on your keyboard. You can view the current mappings in the Mapping For Key Labelled: Keysym group box. Click Mapping on the Edit menu to open a mapping dialog box. You can view the current mappings for the key you specified in the Mapping For Key Labelled: Keysym group box.

178

Chapter 6: XconfigPart I

Click any of the following states: Unshifted, Shifted, Mode Switch, Shift Mode Switch. To delete the current mapping for this state, click Clear Mapping . To delete the mapping for another state, repeat the previous step.

Mapping a Macro to an Existing Key


The Macros dialog box lets you add, edit, and delete a macro. You can display the Macros dialog box by selecting Macro on the XKeys Edit menu, or clicking the corresponding icon on the toolbar.
Note: You cannot map a Keysym to a non-standard key unless you have included it by changing the layout of the keyboard file. For more information, see Adding a Physical Key on page 184.

To map a macro: 1 In the Macros dialog box, click Add. The Macro Binding dialog box opens.

2 3 4

Click Browse. The Macro Selector dialog box opens. Click Add. The New Macro Properties dialog box opens. Specify a name and description.

179

Exceed Users Guide

5 6 7 8

Click Start Record and type the keys and key combinations that you want to be a part of this macro. Click Stop Record to end recording. Click OK. In the Macro Selector dialog box, click OK. In the Macro Binding dialog box, select a key from the Bind Key list box to attach the macro to, including any modifiers from the Modifier group of options. Click OK. The macro is added to the list in the Macros dialog box.

Macro Events
A macro recorded in the New Macro Properties dialog box displays an event list representing actual keystrokes: the name of the key pressed and the physical action of either pressing or releasing the key.

Creating Compose-Key Sequences


Compose-key sequences let you access additional symbols by typing two keystrokes. For example, Keystroke 1 + Keystroke 2 or Composing Key + Keystroke 2. To define the compose-key sequence: 1 Select Compose Sequences on the XKeys Edit menu. You can also click the corresponding toolbar icon. The Compose Sequence dialog box opens.

180

Chapter 6: XconfigPart I

Click Add to define a new compose-key sequence. The Build Compose Sequence dialog box opens.

3 4 5 6

Click Keystroke 1 and press a key on your keyboard to use as the composing key. Choose a modifier from the Modifiers For Keystroke 1 group box. Click Keystroke 2 and then press a key on your keyboard. If you want to map this compose sequence, click Next. The X Compose Mapping dialog box opens. It is a similar to the mapping dialog box that appears when you click Mapping on the Edit menu. Click Finish.

181

Exceed Users Guide

Managing Keysyms and Keysym Sets


The Keysym File Editor is a powerful tool for managing custom Keysyms and Keysym Sets. To open the Keysym File Editor dialog box, click Keysym on the XKeys Edit menu.

To add custom Keysyms to an existing Keysym Set: 1 2 3 4 Select the Keysym Set into which you want to place the custom symbol on the Key Symbols page. Click Add Keysym. The Add Keysym dialog box opens. Type a KeySym name and a hexadecimal value. Click OK.

182

Chapter 6: XconfigPart I

To add or create a new Keysym set: 1 2 Click the Symbol Sets tab. On the Symbol Sets page, click Add Set. The Add Set Name dialog box opens.

3 4

Type a name in the New Set Name box. Click OK. The name appears in the list on the Key Symbols page; the remaining boxes appear empty, indicating that this is a new Keysym Set. Add a custom Keysym by following the previous procedure (about adding custom Keysyms to an existing Keysym Set).

183

Exceed Users Guide

Adding a Physical Key


Standard 101-key and 102-key layouts are found in the Exceed User directory. If you are using a non-standard keyboard, you need to add keys. You can perform this task in two ways:

Start with a default keyboard and add the extra keys. Start from scratch and build a completely new layout.

To add a new physical key to an existing keyboard file: 1 Click Layout Mode on the XKeys View menu.

Press a key on your keyboard that is currently not defined in your keyboard file. Once the key is placed in the XKeys window, move and reshape it to match your physical keyboard layout. In the Abbreviation box, type the Key Cap you wish XKeys to display on the key. The key is added to the keyboard layout. You can map X symbols to the new key.

184

Chapter 6: XconfigPart I

To create a new keyboard layout:


Note: Create a completely new keyboard layout only if your keyboard is substantially different than the supplied layouts.

In Mapping Mode, click New on the File menu. Do not use an existing keyboard layout when prompted. When the blank XKeys screen is displayed, select Layout Mode on the View menu. One at a time, press each key on your keyboard. XKeys places each key on the supplied grid below the mouse cursor. As keys are added, move and reshape the key to match the physical layout of your keyboard. Keys may be moved using standard drag and drop methods. To modify the text displayed on a keycap, replace the text in the
Abbreviation box. This is useful when Windows supplies a long key

description. 4 You can now map X Keysym values onto each physical key.

Deleting a Physical Key


You can delete keys in Layout mode. Highlight a key and select Delete from the XKeys Edit menu. A message box appears to confirm the deletion.
Note: You can also delete keys in Layout mode by moving the mouse pointer over the key, and then clicking the right mouse button.

Mouse Input Settings


For detailed information about the user interface and how to access it, see Exceed Help.

The Mouse Input page lets you define mouse settings. You can:

configure a middle button configure mouse wheel movement manage macros and map them to the mouse wheel

185

Exceed Users Guide

Customizing Mouse Settings


Mouse Input

To customize mouse settings: 1 In Xconfig, do one of the following:


select Classic View and click Mouse Input select Category View, click Mouse, Keyboard And Other Input Devices, and then click the Mouse Input tab

Select an option for mouse wheel action:



Wheel Movement Is IgnoredSelect this option to invalidate all

mouse wheel input.


Wheel Movement Scrolls Root Windows (In Single Window Mode Only)Select this option to enable scrolling in the main root

window only.

Wheel Movement Invokes MacroSelect this option to map the wheel movement to a macro. This is the only option that lets you scroll in multiple window mode. For instructions on how to map to a macro, see Mapping a Macro to the Mouse Wheel on page 187.

186

Chapter 6: XconfigPart I

Wheel Movement Sends Mouse Button Event (Button 4/5/6/7)Use

button 4/5/6/7 events to scroll the windows of existing X applications. ButtonPress and ButtonRelease events are sent according to the mouse wheel motion (up/down). 3
You can paste data (for PRIMARY X selection) into an X client window by clicking the middle mouse button. For more information, see Pasting on page 97.

Make your two-button mouse into a three-button mouse for X client windows using the following options:

Middle Button Emulation enables the feature. Click Interval indicates the time lapse between clicking the left and

right mouse buttons for middle-button emulation to occur.


Movement Threshold indicates how much movement is allowed

when you click the left and right mouse buttons. If you stay within the specified number of pixels, the system understands you are indicating middle button emulation.

Mapping a Macro to the Mouse Wheel


X windows does not recognize the mouse wheel. The Mouse Input application lets you map the mouse wheel for specific X applications. To map a macro to the mouse wheel: 1 On the Mouse Input page, select Wheel Movement Invokes Macro, and then click Macro Mappings. The Mouse Wheel Macro Bindings dialog box opens.

187

Exceed Users Guide

On the Assigned Wheel Macros panel, select a mouse action combination, and then click the adjacent browse button. The Macro Selector dialog box opens.

Click Add. The New Macro Properties dialog box opens.

4 5 6

In the Name and Description boxes, type the function and brief description. For example, type vi_scroll_up and Scroll Up. After you have decided on the keys you want to map to the mouse wheel, in the Event List panel, click Star t Record. Type the key sequence on the keyboard. When you are finished, the application stops recording automatically.

188

Chapter 6: XconfigPart I

7 8 9

Click OK to return to the Macro Selector. Select your new macro from the list, and then click OK. The new macro is associated with the wheel action you selected. Click
OK to return to the Mouse Input page.

Middle Button Capabilities for a Two-Button Mouse


To create a virtual middle button for a two-button mouse: 1 2 3 In Xconfig, click Mouse Input (Classic View) or Mouse, Keyboard And Other Input Devices (Category View). Select Middle Button Emulation. Type a click interval. The larger the click interval, the longer the system waits before executing a command because it is trying to determine if there is a second button click. Type a movement threshold. This is the number of pixels the mouse is allowed to move during the clicks, and still be considered a middle-button emulation. Click Validate And Apply Changes .

Click both left and right mouse buttons simultaneously to emulate a middle mouse button.

189

Exceed Users Guide

Input Methods for Chinese, Japanese, and Korean


The CJK Input icon appears in Xconfig only if you are running a CJK Windows operating system or Windows 2000/XP (provided Microsoft IME is installed and enabled).

The CJK Input page lets you configure how to enter and pass Chinese, Japanese, or Korean (CJK) text to an X client.

The Exceed X server supports both Simplified and Traditional Chinese. To enter CJK text in an X client, you need to run an Input Method (IM) server. You can configure the Exceed X server to use either an external X client as the IM server or an IM server built into the X server. To use the Microsoft Windows Input Method Editor (IME) to enter text in an X client, you must configure Exceed to use an IM server built into the X server. You can select one of the following input methods to enter CJK text:

Select Use Input Server On The Host to use an input method server X client. Select Protocol to use an Input Method Server built into the Exceed X server. Select Copy And Paste to use copy and paste commands to input CJK text.

190

Chapter 6: XconfigPart I

Using an Input Method Server X Client


For information on the remote Input Method Server, refer to your host documentation.

The Use Input Method Server On The Host option lets you enter CJK text using whatever mechanism the input method (IM) server X client supports. Select this option if you are using an external IM server X client. This means the Exceed X server will not support internal CJK input methods. This option does not permit the use of the Microsoft Windows IME to enter CJK text. The available IM Server X clients vary by host type. The following table shows the IM Servers typically available on specific host types:
Host Type HP Solaris Digital IM Server xkim/xjim/xsim/stim htt dxhangulim/dxhanyuim/dxhaziim/dxjim

Using an Input Method Server Built into the Exceed X Server


Select the Protocol option. The Exceed X server internally manages an Input Method Server and uses the Microsoft Windows IME to enter CJK text. When you enter text, the Exceed X server uses one of the selected protocols to pass text to the X client. The Exceed X server registers and manages an Input Method Server for each protocol selected in the Protocol Selection area. This means that you can enable multiple protocols, and each X client can use the protocol of its choice. We recommend that you enable all available protocols. Specifying Locale (Ximp/XIM)The Exceed X server supports most of the standard encoding names. In most cases, you do not have to specify the encoding name. However, if your X clients are running in a non-standard encoding environment, enter the appropriate locale name.

191

Exceed Users Guide

Using Copy and Paste to Input CJK Text


Select the Copy And Paste option. The Exceed X server does not register an Input Method (IM) Server when this option is selected. Instead, it uses the Microsoft Windows IME to enter CJK text, and rather than using an IM Server to pass text to the X client, it copies the text into the X selection and tries to paste the X selection CJK text into the X client. Exceed supports two copy and paste input methods. One is designed for Kterm and the other for OpenLook. Select the copy and paste method you want to use in the Use Environment area. If the CJK text is not automatically pasted into your X client, you need to use the X client Paste operation to paste the CJK text.

Special Considerations for Traditional Chinese


Because there is no standard encoding in Traditional Chinese environments, Exceed can support only one encoding name at a time. By default, the Exceed X server supports the HP-BIG5 (HP Traditional Chinese Environment) encoding. If you want to use the BIG5-0 (Digital Traditional Chinese Environment) encoding instead, you need to make changes to the Exceed initialization file and the xlc_locale file. To input Traditional Chinese using the BIG5-0 (Digital Traditional Chinese Environment) encoding: 1 Open Exceed.xcfg in a text editor. Near the end of the file, locate the following XML tag just after the <Undocumented> tag:
<CJK_BIG5EncodingName>HP-BIG5</CJK_BIG5EncodingName>

This tag lets you input Traditional Chinese in an HP environment. Modify the tag to the following and save the file:
<CJK_BIG5EncodingName>BIG5-0</CJK_BIG5EncodingName>

Open the xlc_locale file on your computer and make the following changes: a) under the heading fs1, modify as follows:

# used for HP-UX # charset HP-BIG5:GLGR

192

Chapter 6: XconfigPart I

# used for Digital UNIX charset


BIG5-0:GLGR

b) under the heading cs1, modify as follows:


# used for HP-UX # ct_encoding


HP-BIG5:GLGR:\x1b\x25\x2f\x30\x80\x8aHP-BIG5\x02

# used for Digital UNIX ct_encoding


BIG5-0:GLGR:\x1b\x25\x2f\x32\x80\89BIG5-0\x02

Restart the Exceed X server if it is running.

To view the Traditional Chinese HP Common Desktop environment: 1 Download the following Chinese Big5 fonts from http://
www.lib.rpi.edu/dept/acm/packages/chinese-fonts/1.0/ (a valid

URL as of January 2005) or search for the fonts on the Internet (for example, by using an FTP search engine):
uwb5-16m.bdf.gz eb5-24f.bdf.gz

2 3 4 5

Decompress the GZIP compressed fonts. In Xconfig Font Settings, select Compile Fonts in the Font Settings dialog box and compile the downloaded .bdf fonts to the .fon format. Copy uwb5-16m.fon and eb5-24f.fon to the Home\font\chinese directory. Import the font aliases: a) Select Import Alias in the Font Settings dialog box. b) Select chinese.ali in the Exceed User directory. c) For the Limit Import To Selected Font Directory option, select Home\font\chinese. d) Click Import.

193

Exceed Users Guide

If the Exceed X server is running, point to Reload Database, and then on the Exceed X server File menu, click Font.

To view the Traditional Chinese Digital Common Desktop environment: 1 2 3 Follow the steps in the above procedure. Create a new font subdirectory in the Home\font directory. Download the following fonts from a Digital UNIX host that supports Traditional Chinese into the new font directory created in step 2:
adecw_hei_cns11643_16_16_75.pcf adecw_screen_cns11643_16_18_75.pcf adecw_screen_cns11643_24_24_75.pcf jdecw_screen_decsuppl_8_18.pcf jdecw_screen_decsuppl_12_24.pcf

4 5 6

In Xconfig Font Settings, select Compile Fonts in the Font Settings dialog box and compile the downloaded .pcf fonts to the .fon format. Add the new font directory to the font database and move it to the top of the font database list using the Move Up button. Import the font aliases. To import the font aliases: a) Select Import Alias in the Font Settings dialog box. b) Select the dec_tw.ali file in the Exceed User directory . c) For the Limit Impor t To Selected Font Directory option, select the new subdirectory created in step 2 from the Home\font directory. d) Click Import.

If the Exceed X server is running, point to Reload Database, and then click Font on the Exceed X server File menu.

194

Chapter 6: XconfigPart I

Network and Communication


Use this Xconfig category to configure communication and transport settings.

Setting the Sequence of Events


The startup mode determines the sequence of events that occur when you start the Exceed X server, including whether a host connection occurs automatically. There are two basic types of startup modes: Passive and XDMCP. The mode you use depends on your transport, host, and preferences. Passive Mode If you intend to use TELNET, Xstart, Xsession, or a remote process to connect to a host and start an X client, you should select Passive from the Modes drop-down list. This startup mode lets you start the Exceed X server without making any initial attempt to connect to a specific host. XDMCP Modes The XDMCP (X Display Manager Control Protocol) modes let you automatically activate the XDM connection process. After you start the Exceed X server, and successfully login to XDM, the clients listed in the XDM session script file are started. XDM lets you manage X displays. It allows for centralized control over the X environment and provides an added measure of security. XDM provides an X-based login function and generates authorization information that can be used by the Exceed X server to control which users on which hosts may be given access to an Exceed X server display. If you use an XDMCP startup mode, you do not need a separate startup application to start X clients (that is, Xstart, Xsession, or TELNET). However, you may use these applications to start additional X clients.

Communication Settings
Communication

The Communication page in Xconfig lets you:

select the startup mode used by the Exceed X server and define all related settings 195

Exceed Users Guide

configure XDM display, key, class, and other startup options specify external addresses for connecting through a virtual private network (VPN) automatically close the connection under certain conditions

For detailed information about the user interface and how to access it, see Exceed Help.

Startup
ModeThis drop-down list contains two basic categories of server startup modes: Passive and XDMCP (X Display Manager Control Protocol). Passive mode starts the server without making an initial attempt to connect to a specific host. Passive mode lets you establish connections using the TELNET, Xstart, and Xsession applications.
For more information about XDMCP modes, see pages 123 to 126.

XDMCP lets you automatically activate the particular XDMCP connection process whenever you start Exceed.
Note: XDMCP modes are supported only under TCP/IP .

ConfigureOpens the XDMCP Startup Modes dialog box where you can configure additional XDMCP settings.

196

Chapter 6: XconfigPart I

Display NumberSpecifies which port the server for new clients is monitoring. The default display number is 0.
Note: If you are using an IPX/SPX transport, ignore the Display Number box.

IP Discovery
For more information, see About IP Discovery further below.

Use this area to specify addresses of remote servers running an IP address discovery service. Exceed queries these servers for an IP address so that the client can communicate with a remote host. Exceed translates the unique network IP address of the client computer (running Exceed) with the remote IP address. Optionally, type one or two IP addresses (separated by a semi-colon) in the Server Address box. Specify a port number and timeout interval (applicable to both addresses).

For more details about IP Discovery functionality, see Exceed Help.

Auto Close Connection


For more details about Auto Close functionality, see Exceed Help.

This area contains options and settings that determine conditions under which Exceed terminates a connection.

About IP Discovery
This feature supports multiple connections involving a network address translation (NAT) device or virtual private network (VPN) software. Exceed ensures that X applications from remote hosts reach the client computer.

IPDisCov Daemon
IPDisCov is a daemon that runs on the remote UNIX or Windows host running X applications. By default, it listens on port 80 using HTTP. You can start IPDisCov on the UNIX host using the following command:
./IPDisCov -p listen_port_number

197

Exceed Users Guide

where listen_port_number is a port other than default 80. Use a browser to connect to the host and if the browser displays the host Internet Protocol (IP) address correctly, then it means that the IPDisCov was started and is working.
Note: Only the root user has the authority to run the daemon on the UNIX host.

Using IP Discovery
The environment variable DISPLAY tells the computer on which machine to display the X application.

To use Exceed in XDMCP mode or to use Xstart to start an X application on a UNIX host, Exceed and Xstart must construct the DISPLAY environment variable for the X application to display on the client computer. However, there may be VPN software that does not register the host Internet Protocol (IP) address with the Windows system (to find out if this is so, use the DOS utility ipconfig to display the network settings). In this case, the only way for Exceed and Xstart to communicate with the remote host is by means of IP Discovery. To use Exceed/Xstart where VPN software is present: 1 2 On the UNIX host, run ./IPDisCov -p listen_port_number. If necessary, specify another port number other than default port 80. Use a browser to connect to IPDisCov and verify that the browser displays the correct IP address. Open Xconfig. On the Communication page, select IP Discovery. Type the Server Address (the IP address where IPDisCov is running) and type the Por t Number which IPDisCov is monitoring (if it is not the default 80).
Note: You do not have to provide Server Address(es) at this stage. The Network Interfaces dialog box opens when Exceed or Xstart attempts to connect to the remote host. This gives you another opportunity to provide the IP discovery address(es).

To access the Communication page, in Xconfig Classic View, click the Communication icon/ text in the right pane. For Xconfig Category View, click the Network and Communication icon/text.

Click Validate And Apply Changes .

198

Chapter 6: XconfigPart I

To use IP discovery with Exceed XDMCP startup modes: 1 On the Xconfig Communication page, select any XDMCP mode. Click Configure. The XDMCP Startup Modes dialog box opens.

2 3

In the Network Adapter(s) area, select Network Interface and click Settings. The Network Interfaces dialog box opens. Look for an entry in the list with the interface name From IP Discovery Server. The entry indicates the IP address (provided by the IPDisCov daemon) that Exceed uses to determine the DISPLAY environment variable. Select the entry and click OK. Click Validate And Apply Changes .
Note: If IP Discovery is enabled in Xconfig, you can select an interface name and IP address in the Network Interfaces dialog box that opens when Exceed connects to the remote host.

199

Exceed Users Guide

To use IP discovery with Xstart: 1 2 3 Open Xstart and click Settings. The Xstar t Settings dialog box opens. Click the Network tab, select Interfaces, and then click Settings. The Network Interfaces dialog box opens. There should be an entry in the list with the interface name From IP Discovery Server. The entry indicates the IP address (provided by the IPDisCov daemon) that Xstart uses to determine the DISPLAY environment variable. Select the entry and click OK.
Note: If IP Discovery is enabled in Xconfig, you can select a interface name and IP address in the Network Interfaces dialog box that opens when Exceed connects to the remote host.

Creating or Editing the Host List


The Host List file is a text file containing the names and Internet Protocol (IP) addresses of all hosts that receive the broadcast request when you start the server using the XDMCP Broadcast startup mode. This file lets you restrict access to your Exceed X server to specific hosts. By default, the host list is the Xdmcp.txt file in your Exceed User directory. To create a new host list: 1 2 3 Open a text editor such as Notepad. List the host names. Specify only one symbolic host name or constant address per line. Save the file.

After you create a new file, you can use it in the XDMCP startup modes. To add a host to the xdmcp.txt file: 1 2 3 200 Click Communication (Classic View) or Network And Communication (Category View) in Xconfig. Select XDMCP Broadcast from the Mode drop-down list box. Click Configure. The XDMCP Startup Modes dialog box opens.

Chapter 6: XconfigPart I

4 5 6 7

Select the Host List File check box. Click Edit to open Xdmcp.txt in a text editor. To add to the list on a separate line in this file, specify the name or Internet Protocol (IP) address of the host you want to add. Save the file and exit Notepad.

Host List File Syntax


The Host List file is a text file containing the names and addresses of all hosts that receive broadcast requests. You can use the Host List File option (in the XDMCP Broadcast area of the XDMCP Startup Modes dialog box) to edit the file or enable/disable its use. The default file Xdmcp.txt is located in the Exceed User directory. Text on any line following a number sign (#) is ignored. Completely blank lines and all carriage-control characters are also ignored. The format of information lines is as follows:

Host names are not case-sensitive. The address is specified in Internet Protocol (IP) address notation.

Transports Settings
Transports

The Xconfig Transpor ts page lets you access transport-related settings used by the Exceed X server and local X clients. If you installed multiple transport interfaces during setup, to switch transport interfaces, select an interface from the Transport drop-down list. Network ProviderOpens the Provider List dialog box where you can set the order of transport service providers and protocols. You can also view details of each provider or protocol.

201

Chapter 7 XconfigPart 2

Security, Access Control, and System Administration Security and Access Control Settings Host Access Control List Syntax Creating and Editing the Host Access Control List Creating the User Access Control List Authorizing X Clients Editing the rxplugin/xrx Configuration Files Invalid Configuration Files System Administration Restricting Access to Xconfig and Extend Password Protect Settings Mandatory Settings X Server Protocol X Server Options and Extensions Extensions Settings Display and Video Screen Definition Window Mode Options Configuring X Screens Creating or Editing a Local XRDB Database Common Settings Monitor Information Tiling Multiple Monitors Video Settings RGB Database Syntax Advanced Settings

205 205 209 209 210 211 211 212 213 214 214 215 215 216 217 218 218 218 219 220 223 223 223 225 225 226

Copy and Paste, and X Selection Specifying X Selection Type Automatic Copy and Paste Using a Temporary Storage Buffer Font Management Font Database Editing the Font Database Adding and Changing Font Directories Changing Paths in the Font Database Changing the Font Directory Search Order Accessing the Font Server Adding and Changing Font Servers Make Font Scalable Creating Font Aliases Creating Several Aliases Alias File Format Other Server Settings Maximizing System Performance Setting Image Save Boxes Preventing Standby Mode Using Xperf Troubleshooting Viewing the Log File Handling Denied Requests for Colors Handling Denied Requests for Fonts Power Management Settings Accessibility Exceed 3D and GLX OpenGL

226 226 227 227 228 229 230 233 233 234 235 235 236 237 238 240 241 241 242 243 243 245 245 246 247 247 248 248 248

Chapter 7: XconfigPart 2

Security, Access Control, and System Administration


You can set security options to either restrict or allow access to specific features of the Exceed X server, and specify passwords to protect Xconfig and the Extend extension. You can also use the Security, Access Control, and System Administration category to:

control the hosts that can run X clients using the Exceed X server edit the Host Access Control List (xhost.txt) edit the User Access Control List (xauth) specify or edit the Security Policy File enable or disable the Extend extension set or change the Extend or Xconfig password

Security and Access Control Settings


Security

Use the Xconfig Security page to restrict access to specific Exceed components.

205

Exceed Users Guide

Host Access Control List


This area contains options that let you restrict access to your Exceed server by specific hosts. By default, the Host Access Control List is the xhost.txt file in the User directory.
Note: If you select the xhost.txt file, you can use only Passive startup mode on the Communication page.

Specify another file through one of the following methods:


Type its full path (if other than the directory where the Exceed User directory is installed) and file name in the File box. Locate it by clicking Browse adjacent to the File box. Modify the Host Access Control List file in a text editor by clicking Edit.

You can also enable the following settings: No Host AccessInstructs Exceed to use an empty Host Access Control List to regulate access (that is, no hosts are allowed access). Any Host AccessTerminates use of the Host Access Control List and allows unrestricted access to all hosts on the network. Allow Clients To Modify Host Access Control ListRegulates client modification of the Host Access Control List (xhost.txt).

Enable User Access Control List


This option lets you enable security at the user level (rather than at the host level) without using XDMCP. By default, this setting is not selected. For optimal security when enabling this setting, clear the Allow Clients To Modify Host Access Control List option and select the Host Access Control List option. User-level security is controlled by an .Xauthority file (by default, xauth), which is read each time the server is started or reset. You can create an .Xauthority file using the host-based Xauth utility. To make this binary file available to Exceed, download it from the host and copy it to the User directory. To select an .Xauthority file other than the default xauth file, click Browse.

206

Chapter 7: XconfigPart 2

X Client Connections
Warn On Unauthorized ConnectionsOpens a warning dialog box whenever an unauthorized X client tries to connect. By default, Exceed refuses unauthorized connections. The warning gives you the opportunity to accept or refuse X applications from displaying. Warn On Authorized ConnectionsOpens a warning dialog box whenever an authorized X client tries to connect.

Modifying Xweb Settings


You can use Xweb security settings to control X clients running from Web sites, either independently or embedded within the browser. Select from the options described below. Security Policy FileThis file lets you specify certain restrictions on clients. You can specify a file in the box, or browse for another file. Click Edit to open the file in a text editor. Each line in the Security Policy text file starts with a keyword:
#Lines starting with this symbol are treated as comments. sitepolicyLines starting with this keyword are used to specify or

name the policies that Exceed X server supports. These lines are characterized by a specific syntax: a collection of alphanumeric characters designed to match a similar collection in the configuration file of a firewall proxy.
propertyLines starting with this keyword are used to assign

permissions to untrusted clients regarding access to window properties. For more details about property access rules and keyword syntax:

see the Security Page topic in Exceed Help see the various comment lines in the security.txt file (click Edit adjacent to Security Policy File)

Plug-in Configuration File / Helper App Configuration FileClicking Edit opens Windows Notepad with the respective configuration file loaded. This is the only way to edit these files. Doing so outside of Xconfig produces warning or error messages, and the new configuration files are ignored.

207

Exceed Users Guide

Modifying Extend Settings


Enable ExtensionProvides server support for the Extend suite of Hummingbird client applications (X Window clients that reside on UNIX hosts). When you select this box, the Extend extension is enabled. By default, this setting is not selected. PasswordOpens the Extend Password dialog box, which lets you restrict access to the Extend extension by specifying a password. When the Extend clients are available on the host, authorized users with the password can:

launch applications on the server access and transfer files between the host and the users computer print files
Warning! If you do not specify an Extend password, then anyone can access files on your computer.

To change the extension password: 1 In the Extend area of the Security dialog box, ensure Enable Extension is selected, then click Password. The Extend Password dialog box opens.

2 3

Type the current (old) password, type a new password, then confirm the new password by retyping it. Click OK.
Note: Remember the password. It is required to change the password again.

208

Chapter 7: XconfigPart 2

Host Access Control List Syntax


The Host Access Control List is a text file containing the names and addresses of all hosts with access to the Exceed server. Use the Host Access Control List File area on the Xconfig Security page to specify options. The default file xhost.txt is located in the Exceed User directory. A number sign (#) at the beginning of a line means the line is treated as a comment and is ignored. An information line has the following format:

Host names are not case-sensitive. The address is specified in Internet Protocol (IP) address notation.

Creating and Editing the Host Access Control List


The Host Access Control List is a text file that lets you restrict access to your Exceed X server to specific hosts. The default Host Access Control List file (xhost.txt) is located in the User directory. To add a host to the xhost.txt file: 1 2 3 4 Click Security (Xconfig Classic View) or Security, Access Control And System Administration (Xconfig Category View). Select the Host Access Control List File box. Click Edit to open the Host Access Control List in a text editor. To add to the list on a separate line in this file, specify the name or Internet Protocol (IP) address of the host that you want to add.
Note: Host names are not case-sensitive. Lines beginning with a number sign (#) are treated as comments.

5 6

Save the file and exit Notepad. To reload the list, right-click the Exceed X server icon on the taskbar. On the popup menu, click File, click Reload Database, and then click Access Control Lists.

209

Exceed Users Guide

To create a different host access control list: 1 2 3 4 Open a text editor such as Notepad. List the host names. You can specify only one symbolic host name or constant address per line. Save the file. Specify this file as the host access control list on the Xconfig Security page.

Creating the User Access Control List


The User Access Control List is a text file that lets you restrict access to your Exceed X server at a user level (rather than at the host level). By default, the User Access Control List is the .Xauthority file.
Note: You cannot edit this file on your computer. You must edit it on the host.

To create the user access control file: 1 Create an .Xauthority file on your host using the host-based xauth utility. For more information, refer to the man pages on the xauth utility available in UNIX. Enable xstartd using InetD (in Control Panel, double-click Hummingbird
InetD).

2 3

Propagate your DISPLAY (where DISPLAY is the Exceed X server


IP Address:DisplayNumber) to the Exceed X server by using the

following command on the host:


"xauth nextract - Exceed_Xserver_IP_Address:DisplayNumber rexec -l your_pc_username -p your_pc_password Exceed_Xserver_IP_Address xauth nmerge -"

4 5

Click Security (Xconfig Classic View) or Security, Access Control And System Administration (Xconfig Category View). Select Enable User Access Control List.

210

Chapter 7: XconfigPart 2

6 7

If the file you created is not named, click Browse to locate and select the correct file. To reload the list, right-click the Exceed X server icon on the taskbar. On the popup menu, click File, click Reload Database, and then click Access Control Lists.

Authorizing X Clients
The Security page authorizes X clients in stages. To access the page, click Security (Xconfig Classic View) or Security, Access Control And System Administration (Xconfig Category View). If a client tries to connect to the Exceed X server in a non-XDMCP startup mode, authorization is as follows: 1 2 If user access control is enabled and the client passes the authorization screening, the client is allowed to run. If the client originates on a host specified in the Host Access Control List, or if host access control is disabled, the client is allowed to run.
Note: To disable host access control, click No Host Access. If you dont clear the Allow Clients To Modify Host Access Control List option, the client may be refused.

If you enable user access control and want full security, use a Host Access Control List with no entries. This is equivalent to selecting the No Host Access option.

Editing the rxplugin/xrx Configuration Files


Access to these files is provided within Xconfig Security. The rxplugin configuration file controls access to Web servers when using the X web plug-in. The xrx configuration file controls access when using the X web helper application. In most cases, the contents of these two files are identical, although you can have different configurations for the plug-in and the helper applications. However, if you do not want different configurations, be sure that whatever changes you implement in one, you also make to the other.

211

Exceed Users Guide

For more information, about these specifications, see Exceed Help.

You can control access to these files by configuring five different specifications. Each is prefaced with rxplugin or xrx, depending on which configuration file you are currently editing.

Invalid Configuration Files


For security reasons, certain text-based configuration files in Exceed are valid only when edited using the editing feature provided in the Xconfig SECURITY extension. The security policy file, as well as the xrx and rxplugin configuration files, are such files. If you have edited these files outside Xconfig and an X client (such as an Xweb client) uses the SECURITY extension, the following warning message appears:
Invalid file. This file can only be edited from the Xconfig Security dialog.

Click OK to dismiss this message box. This lets you continue with no configurations in place (no policies, if the security policy file is in question; or all clients are treated as untrusted, if the xrx or rxplugin configuration file is in question). Once dismissed, the warning message does not appear again during the current session (until there is a server reset). However, the problem continues to exist, and configurations are not in place. After a server reset, or if you end the session, the message reappears the next time an X client uses the SECURITY extension. This can occur if you use a text editor, such as Notepad, to edit these files instead of accessing them from the Xconfig SECURITY extension, or if someone has tried to copy an altered file over a valid one edited with Xconfig. To ensure that the message box does not open and valid configurations are used: 1 2 3 Click Security (Xconfig Classic View) or Security, Access Control And System Administration (Xconfig Category View). In the Xweb area, click Edit (adjacent to the Security Policy File). Review any alterations and either remove or accept them.

212

Chapter 7: XconfigPart 2

Save the file and click Validate And Apply Changes in the Common Actions menu box. If Exceed is running, you are prompted to perform a server reset.

This validates the file contents. Your configurations are used whenever an X client uses the SECURITY extension.

System Administration
This Xconfig page lets you disable some of the extensions and advanced functionality supported by Exceed.

Note: The System Administration page can be locked by the system administrator. If this is the case, you cannot disable settings.

213

Exceed Users Guide

Disable FeaturesSelect this check box to access the list of features. By default, LPR Root Access is disabled. Click the adjacent box to toggle between the feature being disabled (as indicated by a check mark) or enabled. Click Validate And Apply Changes. Selections made on the System Administration page are enforced the next time you start Xconfig. .

Restricting Access to Xconfig and Extend


Using passwords, you can restrict access to Xconfig, specific Xconfig settings, the System Administration page, and the Extend extension. Each of these requires a unique password. How to set these passwords is described below. Xconfig PasswordSet the Xconfig password by clicking Change My Password under Quick Links (left pane menu) or on the Actions menu. Depending on how Exceed is set up in your organization, you may also be asked to specify an Xconfig password during setup. If there is an Xconfig password, you can open the Xconfig window only after you enter the correct password. The Xconfig password specified on the Security page protects access to the entire Xconfig application. Extend PasswordSpecify the Extend password in the Extend section of the Security page. This password lets you allow only password holders to use Extend.

Password Protect Settings


The Xconfig password specified by clicking Change My Password (in the Quick Links menu box) password-protects access to the entire Xconfig application. If you select the Password Protect Settings check box and both passwords are enabled (System Administration and Xconfig), the following security screening procedure takes place: 1 2 You are prompted to enter your Xconfig password when you double-click the Xconfig icon in the Exceed program group. Settings pages that are password-protected will be inaccessible. To access these pages, click Unlock, type the System Administration password, and then click OK.

214

Chapter 7: XconfigPart 2

Mandatory Settings
Xconfig mandatory settings lets administrators lock certain individual settings so that users cannot change them. By default, all settings are initially available for configuration. To lock certain settings and options from within Xconfig, click Mandatory Settings on the Xconfig File menu. This displays icons that you can click to toggle between:

unlocked (green lock) and locked or mandatory (red lock)


Note: This option is available only for Administrators or users with elevated (administrative) privileges.

Locked (mandatory) settings are saved to Mandatory.xcfg (located in the Global directory).

X Server Protocol
For detailed information about the user interface and how to access it, see Exceed Help.

The Xconfig Protocol and Extensions pages let you define settings that affect the interpretation of the X protocol:

Enable a specific extension. Configure GLX and RENDER extensions. Make specific extensions available to untrusted clients. Use a custom vendor string. Enable compatibility with DECwindows. Allow old X11 bugs. Control the format of Pixmaps.

215

Exceed Users Guide

X Server Options and Extensions


Protocol

This Xconfig page lets you control the options that regulate how the Exceed X server operates. This page also lets you enable, disable, and configure Exceed X server extensions.

DECwindows CompatibilityProvides DECwindows compatibility. X Conformance Test CompatibilityConfigures the Exceed X server so it passes certain tests in the X Conformance Test Suite (X Test Suite), which it would normally fail. These failures occur because some X clients have problems for which the Exceed X server has benign workarounds. You should also select Allow Clients To Modify Host Access Control List on the Security page, to pass certain X Test Suite tests.
To access the Delay Window Mapping option, in the Xconfig window (Classic View) click Screen Definition, click the Screen tab, and then click Advanced.

Additionally, selecting this option overrides the Delay Window Mapping option (in the Multiple Window Mode Advanced dialog box). If Allow Clients To Modify Host Access Control List is selected, there is no delay on window mapping. Use 32 Bits Per Pixel For TruecolorForces the Exceed X server to use 32 bits per pixel instead of 24 bits when using the TrueColor visual. Some X clients require this setting in order to draw properly. If your X client draws images incorrectly resulting in a scrambled image, enable this setting. By default, this setting is enabled.
Note: Disabling this option may improve the performance of your Exceed X server. However, if images draw incorrectly as a result, re-enable this option.

216

Chapter 7: XconfigPart 2

Enable Custom Vendor StringLets you specify the vendor string that is passed to clients at connection time (in the connection block). If your client requires a specific vendor string, select Enable Custom Vendor String, type the Vendor String in the box, and click OK.

Extensions Settings
For information about default protocol extensions for Exceed.xcfg and individual protocol extensions, see Exceed Help.

Use this Xconfig page to enable and disable protocol extensions, and make certain ones available to untrusted clients. To select or clear extensions, click the box adjacent to each entry in the list boxes. You can allow access to extensions by untrusted clients (rendering the extension unsecured). Disabling the following extensions displays a warning dialog box in which you are prompted to confirm the action: XC-APPGROUP and SECURITY. Otherwise, selecting extensions in the left list box enables them. Enabled extensions become available in the right list box. To make enabled extensions accessible by untrusted clients, select them in the right list box of the Extensions page.
Warning! If the All Extensions entry is cleared in the right list box after being selected, then extensions remain selected. You must clear each one to disallow access by untrusted clients.

For information about configuring GLX or RENDER, see Exceed Help.

ConfigureOpens the Configure GLX or Configure RENDER dialog boxes if, respectively, the GLX or the RENDER extension is selected in the left list box.

Note: You can configure the GLX extension by selecting it and clicking Configure. In the Configure GLX dialog box, select options and click OK.

217

Exceed Users Guide

For more information about protocol extensions enabled by default (and other extensions), see Exceed Help.

Click OK to save your selections. Click Default to restore the original protocol extension selections for the Xconfig configuration file (initially Exceed.xcfg).

Display and Video


Screen Definition
For detailed information about the user interface and how to access it, see Exceed Help.

The Xconfig Screen page lets you specify window mode, create and edit logical and physical screens, and configure the display to use multiple monitors. Click Screen Definition (Xconfig Classic View) or Display And Video (Xconfig Category View) to:

add and configure logical screens change the Server Visual setting switch window modes change the size of the root window change the number of display screens enable scroll bars (for single window mode) or window panning edit or automatically load the XRDB database

Window Mode Options


Select the window mode on the Screen page for each screen. Access these pages by clicking Screen Definition (Xconfig Classic View) or Display And Video (Xconfig Category View): Multiple Window ModeEach client you start creates its own new window. The native (Microsoft Windows) or the X window manager (local or remote) handles all window functions. The default window manager in multiple window mode is Default To Native. With this option selected, Exceed looks for another window manager; if none exist, Exceed uses Microsoft Windows to manage the window.

218

Chapter 7: XconfigPart 2

Single Window ModePresents all clients in a single Exceed window. A local or a remote X window manager controls all window functions.

Configuring X Screens
Screen Definition

This Xconfig page lets you select the window mode (and related options), server visual, and monitors to use for each X screen. For more information, see the previous Help topic. In addition, you can add, enable or disable, and delete X screens. You can also provide information about your monitor configuration.

By default, one X screen (screen 0) is available. To add more X screens, click Add. To select and configure multiple screens, in the Switch Screens menu box, press and hold Ctrl while clicking each screen link. Up to eight X screens, and two hundred fifty six monitors, are supported. This feature is useful for users who need their data split across multiple monitors or divided into many screens.
Note: To use multiple monitors, you need to install multiple video cards on your computer.

219

Exceed Users Guide

To delete a screen, click the tab for the screen and click Remove Screen. You cannot delete screen 0. Screens must be deleted in reverse numerical order. That is, if you have six screens (0,1, 2, 3, 4 and 5), you cannot delete screen 3 before deleting screen 4. As an alternative to deleting a screen, you can disable it by clearing the Enable Screen option on the Screen page. If you disable a screen, all higher-numbered screens are disabled as well. You cannot disable screen 0.
For more information about Screen page options, see Exceed Help.

Screen page options vary according to whether the selected window mode is multiple or single. These options affect not only the appearance of your computer, but in certain instances, how it functions. For more information, see Exceed Help.

Other common tasks:



For more information about the Common Settings page options, see Exceed Help.

To add screens, click Add. To add monitors, select the Monitor(s) To Use For Screen option and type the number of monitors in the adjacent box. To customize screen focus changes, click the Common Settings tab and complete the information there. To indicate a custom monitor size, click the Monitor Info tab and type the monitor size in the boxes provided.

Creating or Editing a Local XRDB Database


The local XRDB database is a resource database that resides on your computer instead of on the host. It defines properties that clients can use. The local resource database defaults to the xrdb.txt file in the User directory. If you have created more screens than the default (Screen 0), you can set XRDB database settings independently in each screens page. Click Screen Definition (Xconfig Classic View) or Display And Video (Xconfig Category View), and then click Edit (in the Auto Load XRDB area) on the Screen page to modify the database. Load and remove the XRDB database using commands on the Exceed X server File menu. To automatically reload the XRDB database with the server, select the Auto Load XRDB setting on the Screen page. You can also create an entirely new file or download a database from the host. The file format for the XRDB database is described below. 220

Chapter 7: XconfigPart 2

XRDB File Format


In the resource file:

Empty lines are ignored. Tab characters are always converted to a single space. Lines starting with an exclamation mark (!) are ignored. Lines starting with a number sign (#) are preprocessor statements (see below). Every line must provide a resource specification as follows:
resourceName : text

Spaces located before resourceName, the colon, and the start of the text as well as at the end of the line are ignored.
resourceName may contain only the following characters: . a-z A-Z 0-9 _ -

Preprocessor Statements
Preprocessor statements let you set ifelse conditions that define the xrdb.txt statements to process. You can use preprocessor statements to perform functions such as testing the resolution and color display of the video adapter and monitor before deciding which resource database statements to use. A preprocessor statement is any statement that starts with a number sign (#).

Expressions in Preprocessor Statements


#if Specifies an expression in a format described in the #endif example below. If the expression is true, successive statements are processed. Otherwise, they are not processed. Note: #if and #endif statements can be nested. #endif An #endif statement marks the range of each #if statement. For example: #if Planes == 8 ! test for 256 colors color ... ! specify color statements #endif

221

Exceed Users Guide

#else

You can use one #else statement within an #if...#endif range. The #else statement has the effect of swapping the result of the #if for all the statements until the next #endif.

Expressions in preprocessor statements take the following form, with the boxes separated by at least one space:
id operator constant

where id can be:


xpixelsThe width of the screen in pixels. ypixelsThe height of the screen in pixels. planesThe number of video planes. The number of colors is 2 (that is, 4 planes specifies 16 colors; 8 planes, 256). colorIndicates if Exceed visual supports color. If the default server-visual supports color, then Color is set to 1; otherwise, it is set to 0. Use this setting to test whether the default server-visual supports color (for example, PseudoColor, StaticColor, TrueColor visuals). staticIndicates the type of colormaps supported. If the server only supports static, read-only colormaps, static is set to 1. Otherwise, it is set to 0. Use this setting to test if the server mode supports static read-only colormaps or dynamic read/write colormaps. If the server supports only static read-only colormaps, static is set to 1. Otherwise, it is set to 0.

operator can be:

== TRUE if <id> is equal to constant <> TRUE if <id> is not equal to constant < TRUE if <id> is less than constant <= TRUE if <id> is less than or equal to constant > TRUE if <id> is greater than constant >= TRUE if <id> is greater than or equal to constant

constant is a decimal numeric value. For example: Xpixels == 80

222

Chapter 7: XconfigPart 2

To see if a video resolution is available that is greater than or equal to 1024 pixels wide, use the following:
#if xpixels >= 1024

Test for 256-color capability:


#if planes == 8

Common Settings
For detailed information about the user interface and how to access it, see Exceed Help.

The Xconfig Common Settings page contains options that determine window focus policy, server reset, and other server settings. Also, you can select multiple session options that are reflected in the Exceed Multiple Sessions dialog box.

Monitor Information
Xconfig automatically determines the total resolution of all monitors attached to the system and displays width/height values on the Monitor Info page.

Tiling Multiple Monitors


You can tile multiple monitors over the Windows desktop if:

they are all set to the same resolution (width, height, and color format) collectively they form a complete rectangle
Total resolution (pixels) of all (physical) monitors as determined by Exceed.

For example, consider the following scenario:


Single (virtual) monitor resolution (pixels).
256

1024

Assuming the shaded selection is assigned to another screen, then any combination of 1, 2, 5, 6, 9, 10 that form a rectangle can be specified for the current screen.

2 6 10

3 7 11

4 8 12
The shaded selection appears in Monitor(s) to Use for Screen as 3,4,7,8,11,12. 768

256

5
9

223

Exceed Users Guide

Use the Monitor Configuration dialog box to select and assign monitors to a particular screen. This dialog box displays the graphical representation of physical monitors attached to the system (similar to the Display Proper ties dialog boxSettings page, for Windows desktop). It also displays tiled virtual monitors spanning the physical monitors. This arrangement is based on the width and height of the single monitor specified on the Monitor Info page. Select which virtual monitors apply to the current screen by using the rubber band feature: click, drag, and release the cursor to form a rectangle over contiguous virtual monitors. Alternatively, press and hold the Shift key while using arrow keys. The selection must form a rectangle. Virtual monitors already assigned to another screen cannot be selected. If no virtual monitors are specified, then you can click only the one rectangle (physical monitor). In this case, only that virtual monitor applies to the current screen.

Current selection Click, drag, and release the cursor

Rubber band Assigned to another screen

224

Chapter 7: XconfigPart 2

Video Settings
Video

The Video page lets you customize the video mode and colors displayed by the Exceed X server. You can set monitor width and height, associate names with Red, Green, and Blue values in an RGB database, and specify the icon defaults for native window manager mode.

For detailed information about the user interface and how to access it, see Exceed Help.

RGB Database Syntax


The RGB database associates symbolic color names with specific Red, Green, and Blue values. X clients request these values and/or color names when displaying information on your screen.

File Syntax
Each valid line in the rgb.txt file has the following format:
R Example: 70 G 130 B 180 SteelBlue

InterpretationThe color named SteelBlue has a Red value of 70, a Green value of 130 and a Blue value of 180.

225

Exceed Users Guide

RGB values must be in the range 0 through 255. The colorname field in the text file is not case-sensitive and spaces are ignored.
Note: The Exceed log file keeps track of any client requests for colors not defined in the RGB database. You can then add these colors to the database for future use.

Advanced Settings
For detailed information about the user interface and how to access it, see Exceed Help.

The Xconfig Advanced Settings page contains native window manager options and various other options affecting display and video.

Copy and Paste, and X Selection


Specifying X Selection Type
X Selection

You can select the type of X selection commands on the Exceed X server Edit menu by means of the X Selection page. You can also set X selection copy and paste options. X selection settings and options are saved when you terminate the server.

226

Chapter 7: XconfigPart 2

For detailed information about the user interface and how to access it, see Exceed Help.

Automatic Copy and Paste


You can set your system to automatically copy and paste X selections. This saves time and is especially useful for high volume copying and pasting. To set copying and pasting of X selections as automatic: 1 In Xconfig, do one of the following:

select Classic View and click X Selection select Category View and click Copy And Paste, And X Selection

On the X Selection page, select the following options, according to the automatic settings you want.
Select Auto Copy X Selection Copy On Focus Loss To do this Copy the contents of the X selection to the Clipboard. Copy the contents of the X selection to the Clipboard when the window containing the X selection is not in focus. Paste the contents of the Clipboard when the Clipboard contents change.

Auto Paste To X Selection

In Xconfig, click Validate And Apply Changes .

Using a Temporary Storage Buffer


Copying and pasting processes use a temporary buffer to hold data until it is cleared or replaced. This is similar to Windows Clipboard. The buffer being used depends upon whether you are running Windows applications or X applications.

227

Exceed Users Guide

If you are unsure about which X selection the X client uses, see the relevant X client documentation.

The X selection an X client uses, and how it is used, depends upon the client. Most systems use the PRIMARY X selection, but other selections such as SECONDARY, CLIPBOARD, and CUT_BUFFER0 to CUT_BUFFER7 are also defined. Some clients can make use of more than one X selection. To specify the X selection buffer: 1 In Xconfig, do one of the following:

select Classic View and click X Selection select Category View and click Copy And Paste, And X Selection

For information on automatic copy and paste, see page 227.

2 3

On the X Selection page, select the correct buffer type. In Xconfig, click Validate And Apply Changes .

Font Management
Font

The Font page lets you view and edit the font database available to Exceed, import and export font aliases, compile BDF and PCF font files to the an Exceed format, and select default text and cursor fonts.

228

Chapter 7: XconfigPart 2

When you install Exceed, you automatically install font databases that support the International CDE.
Note: You do not have to modify the font database created during installation unless you want to use these new features.

The font database includes support for scalable fonts and font servers. You can also create multiple font sets and load the one(s) you want to use at run-time. Exceed can automatically connect to a font server running on the XDMCP host server. The font database is stored in the lfp.xdb file in the directory where Exceed is installed. Specific fonts in the font database are stored in font directories and font servers. Exceed also supports pseudo fonts for Unicode.

Font Database
The font database is stored in the lfp.xdb file located in the Exceed User directory. Specific fonts in the font database are stored in font directories and on font servers. To access functionality for viewing and editing the contents of the font database, click Font (Xconfig Classic View) or Font Management (Xconfig Category View).

Font Directories and Font Servers


When you click Edit on the Font page, a window opens listing all font directories and servers in the font database. Use the buttons in the Font Database dialog box to:

add, change, and delete font directories in the database add, change, and delete font servers in the database change the paths of the font directories and servers determine (resolve) the physical font names of logical fonts

229

Exceed Users Guide

When an X client requests a font, the Exceed X server searches each font directory or server in the font database in the order they are listed in the Font Database dialog box. The search continues until the requested font is found. Ideally, place the font directories and servers containing the most commonly requested fonts at the top of the list to reduce the amount of time it takes to find a match. Use the Move Up and Move Down buttons to change the display (search) order.

Fonts
To add, change, or delete individual fonts within the selected font directory or server in the Font Database dialog box, click Font List. This displays the fonts contained in the selection. Use the buttons in the Font List For Directory dialog box to:

add, change, and delete fonts create aliases scale fonts

The Font Database dialog box also provides buttons that enable you to view the font, font properties, font information, and character information.

Editing the Font Database


To view and edit the font database: 1 In Xconfig, do one of the following:

select Classic View and click Font select Category View and click Font Management

230

Chapter 7: XconfigPart 2

On the Font page, click Edit. The Font Database: file - Xfonts dialog box opens listing all font directories and servers in the font database.

Use the buttons and options in the Font Database: file - Xfonts dialog box to make the following changes:

add, change, or delete font directories in the database add, change, or delete font servers in the database change the paths of the font directories/servers determine (resolve) the physical font names of logical fonts rebuild the database

Place the font directories/servers containing the most commonly requested fonts at the top of the list to reduce the amount of time it takes to find a match. Click Move Up and Move Down to change the display (search) order.

231

Exceed Users Guide

To add, change, or delete fonts: 1 In the Font Database: file - Xfonts dialog box, select a font directory or server, and then click Font List. The Font List dialog box opens displaying the fonts contained in the selection.

Use the buttons in the Font List dialog box to make the following changes:

add, change, and delete fonts load another font database file view font lists for each database, create aliases, and scale fonts rebuild font databases

After you have made changes, click OK in the Font List dialog box, and again in the Font Database dialog box. The modified file (.xdb extension) is saved in the directory where Exceed is installed.
Note: When you install fonts, you should install both 75 dpi and 100 dpi fonts for best font matching. Additionally, if the monitor size is greater than 1024 x 768, in the Font Database dialog box, place the 100 dpi font in a higher priority than the 75 dpi font.

232

Chapter 7: XconfigPart 2

Adding and Changing Font Directories


The Add Font Directory button in the Font Database dialog box lets you add a font directory to the font database. The Change button lets you edit the selected font directory. These buttons open a similar dialog box: Add Font Directory or Change Font Directory, respectively. To access the Font Database dialog box, click Font (Xconfig Classic View) or Font Management (Xconfig Category View), and then click Edit on the Font page. To add a font directory: 1 2 3 4 In the Font Database dialog box, click Add Font Directory. The Add Font Directory dialog box opens. Specify a path and file name (*.fdb), or browse to a location. Select Status options. Click OK. The directory is added to the bottom of the font database list.

To change a font directory: 1 2 3 In the Font Database dialog box, click Change. The Change Font Directory dialog box opens. Make changes to the path, file name, and directory status as necessary. Click OK.
Note: Reloading the font database implements any changes you make. Click Font on the Reload Database sub-menu of the Exceed X server File menu to reload the font database while the server is running.

Changing Paths in the Font Database


To change the path in the font database: 1 In Xconfig, do one of the following:

select Classic View and click Font select Category View and click Font Management

233

Exceed Users Guide

2 3 4

On the Font page, click Edit. The Font Database dialog box opens. Click Change All. The Change All Font Paths dialog box opens. Type the prefix pattern you want to search for in the Find text box and the pattern you want to replace it with in the Replace text box. For example, to move font directories from F:\EXCEEDW to C:\EXCEED, type F:\EXCEEDW in the Find box and C:\EXCEED in the Replace box. To change the status of font directories that match the Find pattern, click the Status list box at the bottom of the dialog box and indicate the new status you want to assign (Load, Keep, Inactive). To change the Match Physical Font Name setting for font directories that match the Find pattern, click the Match list box at the bottom of the dialog box and enable or disable the setting in the Match Physical Font Name list box.
Note: If you want to change only the status or Match Physical Font Name setting of font directories or servers, leave the Find text box blank to indicate that the changes should be made to all font directories and servers.

Click Next to find the first font directory or server that matches the Find pattern. Xconfig displays the name of the first matching font directory or font server. To replace the Find pattern with the Replace pattern in this font directory or server, click Change. To skip this font directory or server and go to the next match, click Next. To make changes to all matching font directories or servers, click Change All.

Changing the Font Directory Search Order


Exceed sequentially searches each individual directory and font server in the font database for X client font requests based on their listed order in the Font Database dialog box. Click the Font icon and then the Font Database button to open this dialog box.

234

Chapter 7: XconfigPart 2

You may want to move font directories or servers containing frequently requested fonts to the top of the Font Database list to minimize the time needed to find them. In this case, select the font directory or server in the list, and then click Move Up or Move Down to change the order.
Note: If a font server closes down, the Exceed X server automatically reconnects when the server is running again.

Accessing the Font Server


For detailed information about the user interface and how to access it, see Exceed Help.

After you have added a font server to your list of font databases, you can control how it is accessed on the Advanced Settings page.

Adding and Changing Font Servers


You can add or change font servers for a particular database by means of the Font Database dialog box. To access this dialog box, click Font (Xconfig Classic View) or Font Management (Xconfig Category View), and then click Edit on the Font page.

235

Exceed Users Guide

To add a font server: 1 2 3 4 In the Font Database dialog box, click Add Font Server. The Add Font Server dialog box opens. In the Font Server area, specify a host name or IP address, a transport protocol, and a server port. Select Status options. Click OK. The server is added to the bottom of the font database list.

To change a font server: 1 2 3 In the Font Database dialog box, select a font server and click Change. The Change Font Directory dialog box opens. Make changes in the font server and status areas as necessary. Click OK.
Note: Reloading the font database implements any changes you make. Click Font on the Reload Database sub-menu of the Exceed X server File menu to reload the font database while the server is running.

Make Font Scalable


The Make Scalable button in the Font List dialog box lets you transform the selected font (that is, size, rotate, slant, and so on). Scalable fonts let you open and use font sizes that do not correspond to physical font files. Font scaling does not occur automatically; if you want to make a font scalable, you must create a scalable font entry. To scale fonts: 1 In Xconfig, do one of the following:

select Classic View and click Font select Category View and click Font Management

Select the font path and directory containing the font you want to scale.

236

Chapter 7: XconfigPart 2

3 4 5

Click Font List. The Font List dialog box opens. Select the real font that you want to make scalable. Click Make Scalable. A scalable entry is created. It has a physical name of (scalable) and appears at the end of the font list. All the real fonts in this font directory that you can derive from the scalable entry are now scalable. To determine which fonts are scalable, click View Font while this scalable entry is selected. Note that they all have a similar XLFD logical name. At run time, Exceed chooses a closest real font from the list of fonts to be scaled.

Creating Font Aliases


In some cases, X clients may request a font not included in the database. The server responds by issuing a Font not available error message and logging the logical name or search pattern of that font in the log file. You can use a font alias to link the requested font to an existing font with similar characteristics. After you create the font alias, clients can request the previously denied font so that the server can deliver the font alias.
Note: Check the log file regularly for denied font requests.

To create a font alias: 1 In Xconfig, do one of the following:


select Classic View and click Font select Category View and click Font Management

2 3 4

On the Font page, click Edit. The Font Database dialog box opens. Click Font List. The Font List dialog box opens. Click Search to find an existing font resembling the requested font pattern. If you do not find one in this directory, try another directory until you find one that you consider a reasonable match. Click Make Alias.

237

Exceed Users Guide

6 7

Type the font name in the box. If the font name was copied to the Windows Clipboard, click Paste. Click OK.

The font alias appears immediately below the logical font name in the second column of the Font List dialog box.

Creating Several Aliases


To create several aliases at the same time, create an alias file containing all of the desired aliases. An alias file is a text file that you can create or edit in any text editor, such as Windows Notepad. You can then import the contents of the alias file into the font database.

Importing Alias Files


You can import a file containing aliases into the font database. To import an alias file: 1 In Xconfig, do one of the following:

select Classic View and click Font select Category View and click Font Management

2 3

On the Font page, click Edit. The Font Database dialog box opens. Click Import Alias. The Import Alias dialog box opens.

Type the path of the alias file being imported in the From box or click
Browse.

238

Chapter 7: XconfigPart 2

In the To box, select a destination path from the drop-down list. By default, the entry selected in the Font Database dialog box is initially displayed. Click Import to start importing. Repeat steps 4 to 6 for each alias file you want to import. Click Close.

6 7 8

Exporting Alias Files


The Expor t Alias dialog box lets you export aliases from the font database. Using this feature, you can export a group of aliases to a file so that you can distribute them among other Exceed users in your company. To export an Alias file: 1 In Xconfig, do one of the following:

select Classic View and click Font select Category View and click Font Management

2 3

On the Font page, click Edit. The Font Database dialog box opens. Click Expor t Alias. The Export Alias dialog box opens.

In the From box, select a path from the drop-down list. By default, the entry selected in the Font Database dialog box is initially displayed. Select the desired Output Type. Type the destination path in the To box or click Browse. Click Expor t to start exporting.

5 6

239

Exceed Users Guide

7 8

Repeat the above steps for each alias file you want to export. Click Close.

Alias File Format


To create several aliases at the same time, create a file containing all the desired aliases. You can then import the contents of the alias file into the font database. You can create an alias file in any text editor such as Windows Notepad.

Guidelines

Each line in a standard X alias file contains two columns separated by spaces or tabs. Lines in the alias file have a certain format. If spaces or quotation marks are part of either an alias name or a line, enclose the name in quotation marks ("). Within the name, use the backslash character (\) before any quotation mark or space. For example, if you want to enter the line ABC"DEF fixed, and then type "ABC\"DEF" fixed Within names, you can use the standard wildcard characters * and ?. For example:
myfont-*-courier-bold-r-normal--*-*-*-*-m-*-iso8859-1 FILE_NAMES_ALIASES lines, typically used to automate physical font alias

matching, are ignored. However, you can enable physical name matching by using the Physical Font Name Match Allowed check box in the Font Database dialog box.

The following non-standard source file statements are supported: a) Enter comments by placing a # (number sign) as the first character on a source line. b) Alias names can be limited to a particular directory in the font database using the following source line:
+Y

where Y is the name of any directory listed in the database. For example:
+C:\EXCEED\FONT\75DPI

240

Chapter 7: XconfigPart 2

A + line remains in effect until the next + line is encountered. A + line not followed by a path resets the search to the entire database. This is the default state. c) Specifying a $ as the first character of a path in an alias file implies the Exceed Home\Font directory. For example:
$andrew

This specifies the Home\Font\Andrew directory. d) If the alias name ends in a period (.), the extension is removed. The server also removes trailing . tags from font name patterns.

Other Server Settings


Maximizing System Performance
Performance

The Xconfig Performance page lets you adjust the amount of Microsoft Windows system resources used by the Exceed X server to enable various performance-related drawing techniques. It also lets you tune the Exceed X server for optimal graphics performance for your current video configuration.

241

Exceed Users Guide

For detailed information about the user interface and how to access it, see Exceed Help.

Setting Image Save Boxes


You can set image save boxes (that is, Backing Store and Save Unders) on the Performance page. Click Performance (Xconfig Category View) or Other Server Settings (Xconfig Classic View) to access this page. The best compromise between screen saving and memory requirements is to save windows only on client demand. With the Save Unders option cleared, use these settings:
Maximum Backing Store: Default Backing Store: Minimum Backing Store: Always None None

With these settings, a window image is saved only when the client requests this feature. To preserve the window contents when temporary menus are popped up, use the above backing store settings with the Save Unders option selected.

242

Chapter 7: XconfigPart 2

Preventing Standby Mode


Power Managment

By using the Power Management application, you can prevent the computer from entering sleep mode due to inactivity. To access this application, click Power Management (Xconfig Classic View) or click Other Server Settings (Xconfig Classic View), and then click the Power Management tab.

Using Xperf
For detailed information about the Performance page and how to access it, see Exceed Help.

Clicking Tune on the Xconfig Performance page executes Xperf. Xperf lets you override the current drawing methods used by the server, and to determine the optimal graphics configuration for Exceed.
Note: If you change video cards, drivers, video configuration, or the Accelerated Drawing Mode setting on the Performance page, run Xperf to ensure optimal server performance.

Terminate all X clients before running Xperf. When you run Xperf, it automatically starts the X server. If the server is already running, Xperf prompts you to confirm restarting the server.

243

Exceed Users Guide

Overriding the Current Server Drawing Methods


When you select an item in the Xperf Graphics Operation drop-down list box, the current methods used by the server are displayed in the Window Method and Pixmap Method boxes. You can change the methods used by the server for a specific graphics operation by manually selecting a different method in the Window Method and Pixmap Method boxes. Click OK to finalize your changes. The next time the server is started, the specified drawing methods are used.

Determining the Optimal Graphics Configuration


Use Xperf to determine the optimal method for drawing a specific graphics operation. To run all possible tests: 1 2 In Xperf, click Run All. Select the type of test you want to run in the Graphic Operation dropdown list box. Method 0 is the default method. It produces the best results with most video cards. However, additional methods are provided that may produce better results with some video cards. Click Run Test. Xperf draws the selected test object(s) using all available methods on your display. When testing is complete, Xperf displays the test results in the Local X Console window. To automatically update your computer configuration to optimize performance based upon the test results, click OK.

3 4

244

Chapter 7: XconfigPart 2

Determining the Test Results


This window displays the test results for the window and pixmap draw method you selected in the Graphics Operation drop-down list box. Note that the shortest graph in the window has the fastest drawing method.

Troubleshooting
For detailed information about the user interface and how to access it, see Exceed Help.

The Xconfig Troubleshooting page lets you:


view the log file (Exceed.log) specify font and other information that is written to the log file trace Exceed X server activity from startup

Viewing the Log File


The log file receives messages generated by the Exceed X server. This file can contain useful troubleshooting information, such as:

names of fonts requested by clients but not found names of fonts substituted if the Automatic Font Substitution (Font Database dialog box) and Log Font Opens (Troubleshooting page) check boxes are selected names of colors requested but not found in the RGB database transport errors 245

Exceed Users Guide

GLX information name of the application being loaded Xweb information

Click View on the Troubleshooting page to open the log file.


Note: You can also view the log file by selecting Log File on the Exceed X server Tools menu or by clicking Log File on the toolbar.

To ensure that X font and color requests are met, examine the log file periodically, or after each session that terminates abnormally.

Handling Denied Requests for Colors


If a client requests a color that the server cannot supply, the requested color name appears in the log file. You can view the log file on the Troubleshooting page in Xconfig. Add these colors to the RGB database for future use. To add colors to the RGB database: 1 Do one of the following:

Click Video (Xconfig Classic View) Click Display And Video (Xconfig Category View), and then click the Video tab.

2 3

Click Edit to open the RGB text file in a text editor. Add a new entry to the database for the color name requested and assign Red, Green, and Blue values for that color name. The assigned Red, Green, and Blue values are arbitrary; they may or may not be related to the actual color name. An entry is made for the color to ensure that a color is returned to the client when requested instead of creating a "Color not found" error.

246

Chapter 7: XconfigPart 2

For example:
A failed request for the color was logged. 239 255 242 Melon

InterpretationThe next time a client requests the color, the RGB combination of 239, 255, 242 will generate the color. This may or may not be the color that the client visualized, but a color is returned and the operation proceeds. 4 5 Save the modified rgb.txt file. On the Exceed X server File menu, point to Reload Database, and then click RGB to reload the RGB database.
Note: Exiting and restarting the server also reloads the database.

This color is now available to X clients.

Handling Denied Requests for Fonts


If a client requests a font that the server cannot supply, the name of the requested font appears in the log file. To view the log file, click View in the Xconfig Troubleshooting page or click Log File on the server Tools menu. To resolve requests for missing fonts, you can:

Create font aliases. If you have the font source in .bdf or .pcf format, compile it using the Xconfig Font Compiler. Enable automatic font substitution.

Power Management Settings


For detailed information about the user interface and how to access it, see Exceed Help.

Power Management page provides options that prevent your computer from

entering standby or sleep mode. Refuse SleepSelect an option to indicate under what circumstances the system should not enter sleep mode. User InteractionSelect a time interval from the drop-down list to determine how long the system should standby before entering sleep mode. 247

Exceed Users Guide

PresentationMaintains the display even if the system enters sleep mode. Wake UpCauses the system to reset after sleeping for a long period of time.

Accessibility
Accessibility

The Accessibility page lets you select accessibility options and settings that improve the way accessibility aids or clients work with Exceed (for example: specialized programs, magnifiers, screen readers, and tactile mice) work with Exceed. For an overview of features developed according to Microsoft Windows interface standards, see Appendix D: General Accessibility and Technical Support. For detailed information about the user interface and how to access it, see Exceed Help.

Exceed 3D and GLX


OpenGL
For detailed information about the user interface and how to access it, see Exceed Help.

The OpenGL page is available only if you have Exceed 3D installed. For more information about Exceed 3D and OpenGL X applications, see the Exceed 3D Users Guide.

248

Appendix A Troubleshooting

Installation Troubleshooting Exceed Diagnostics Troubleshooting Xstart Logs and Trace Operations Required Port Numbers Resolving Connection Problems Tracing Server Operation Viewing Server Error Messages Using Transport Monitor Confirming Transport Operation Detecting and Terminating Blocked Connections Using Xdis Disassembling a Trace File

251 254 254 255 257 258 259 260 261 261 262 263 263

Appendix A: Troubleshooting

Installation Troubleshooting
The following are common installation issues and questions along with suggested solutions. For further assistance with troubleshooting issues, contact Hummingbird Technical Support.

Another instance of Hummingbird Setup Wizard is running.


Solutions:

An information dialog box informs you that an instance of Setup Wizard is already running. Confirm whether the new instance can continue. If a product is not currently being installed, you can ignore this error message and run:
Setup /v"HCL_OVERRIDE_INSTANCE=1"

The message also appears if a non-privileged user tries to uninstall a product installed for All Users of the computer. In this case, the setup parameter does not work since only an Administrator of the computer can uninstall the product.

This error message may display if installer is unable to remove a key created by the Setup Wizard. This may be because Setup Wizard encountered problems during a previous installation and the key was not removed. Delete the following key from the registry:
HKEY_CURRENT_USER/Software/Hummingbird/Connectivity /version/installer/UserIni/InstallActive=1

251

Exceed Users Guide

The feature you are trying to install is on a network resource that is unavailable.
Solutions:

Click OK in the warning dialog box and try again. Enter an alternate path to the folder containing the installation package Hummingbird Product .msi. Run the install again and select Repair. Use Media Location Manager (part of the Administrators Toolkit feature) to specify an additional location for the product installation package. This lets Windows Installer find the required resource.

Patch - Sourcedir not found (when trying to install patch).


This means the source files are unavailable. When installing a patch, you need to have the source from which you installed. Solution: The original product CD must be in the drive. If necessary, use Media Location Manager (part of the Administrators Toolkit feature) to specify a location for the source files.

After installation the software does not workservices are not starting and/or files are missing.
Solution: Ensure the Administrator account is used to perform the installation. For Windows NT/2000, installing HostExplorer and NFS Maestro Client requires Administrator privilege. Installing Exceed requires elevated privilege (that is, a user who is a member of the Administrator group).

When trying to install the product, a message says I must uninstall the product.
Solution: You have version 7.0 of the product installed. The upgrade process requires the original version 7.0 source files to install a later version of the product. If necessary, use Media Location Manager (part of the Administrators Toolkit feature) to specify a location for the source files.

252

Appendix A: Troubleshooting

Are there other command line options for Msiexec?


For more detailed information about Msiexec command line options, see the Windows Installer documentation in the MSDN online Library at msdn.microsoft.com or on CD-ROM via subscription.

The following are command line options for Msiexec:


Option /i Package|ProductCode /f Package|ProductCode Meaning Installs or configures a product. Repairs a product. For more information about various flags available for this option, see the MSDN Library. An administrative installation option that installs a product on the network. Uninstalls a product. Advertises a product. For more information about various flags available for this option, see the MSDN Library. Specifies path to log file and the flags indicate which information to log. For more information about various flags available for this option, see the MSDN Library. Generates an SMS status .mif file. Use this option in conjunction with the install (-i), remove (-x), administrative installation (-a), or reinstall (-f) options. For more information about this option, see the MSDN Library. Applies a patch. For more information about this option, see the MSDN Library. Sets user interface level. For more information about various flags available for this option, see the MSDN Library. Displays copyright information for the Windows Installer. Calls the system API DllRegisterServer to self-register modules. For more information about this option, see the MSDN Library. Calls the system API DllUnRegisterServer to unregister modules. For more information about this option, see the MSDN Library.

/a Package

/x Package|ProductCode /j

/L Logfile

/m filename

/p PatchPackage

/q

/? /h /y module

/z module

253

Exceed Users Guide

How do you create an installation log file?


To generate a log file, users should run the following command:
setup /v"/1*v C:\install_log.txt"

where C:\ is the path to plaintext file install_log.txt.

Exceed Diagnostics
To find out tips for using Exceed, or to find out how other users solve common problems, join the Exceed Users Group. See page iv for details.

This section describes possible solutions to problems that you might encounter while using Exceed. If you have problems, there are two main ways to determine the cause:

Diagnosing using progress messagessee details below. Diagnosing using logs and trace operationssee details beginning on page 255.

Troubleshooting Xstart
Progress Messages
To open the Other Settings dialog box, click Other in the Settings area of Xstart.

Usually, the first step in troubleshooting a connection is displaying system progress messages. On the Network page of the Xstar t Settings dialog box, select Show Progress and Show Host Reply in the Troubleshooting area.
Show Progress reveals what is happening while you try to connect and start an application. Show Host Reply displays a summary of the startup

information, the macros you used displayed in expanded form, and what reply was given by the host or application. These options should assist with troubleshooting. The following paragraphs detail common connection error messages: Correct user name and passwordSystem does not connect If the host does not return an invalid name or password message, there may be something wrong with the communications link. Maybe the host is not running or it does not support REXEC or RSH. There may also be a problem with your transport setup or configuration.

254

Appendix A: Troubleshooting

Host returns invalid name or password message If you receive an invalid name or password message but the system is connecting, the login information is incorrect. Host returns Command not found or No such file or directory message If you receive either message but the system is connecting, there may be something wrong with the path, or the parameters or syntax of the command typed in the Xstart Command box. You may need to type PATH or DISPLAY specifications on the command line. Xstart connects but the client does not start The client may not be getting enough time to start before the initial Xstart socket closes down. On the Network page of the Xstart Settings dialog box (in Xstart, click Settings), set the Close box in the Timeouts area to -1 (minus one), select the Show Host Reply option, and then click OK. This setting keeps the first socket open even after the client socket is established. It also shows all host-generated messages in a host reply window that may give you details about what is happening. If the client seems to start properly, try different values in the Close box until you find a value that gives the client enough time to start and then closes down the initial socket. The Client is Not Authorized to Run on the Server To verify authorization, on the Xconfig Troubleshooting page, click View. Examine the Exceed.log file for errors. To fix a problem with permissions, start Xconfig. In the Security dialog box, edit the Host Access Control List file (select File, browse if necessary, then click Edit). You may have to also edit the file (if it exists and if the option is enabled) indicated in the Enable User Access Control List area.

Logs and Trace Operations


Exceed comes with two main tools for troubleshooting using logs and trace operations: Xconfig Troubleshooting and Transport Monitor.

Troubleshooting the Exceed X server


Troubleshooting

Use the Troubleshooting application in Xconfig to view the log file, to set what information is recorded in the log file, and to enable tracing. There are two main areas of active troubleshooting available with this application.

255

Exceed Users Guide

The first area lets you log information into a file for later inspection. You can log Font Open requests, the initial settings of the WM_COMMAND and WM_NAME properties on InputOutput root level windows and all OpenGL requests. You can also generate a security audit in the log file using Xweb Info Logging.
Note: OpenGL support requires Exceed 3D. OpenGL is an industry-standard three-dimensional graphics software interface. It lets you create interactive programs that produce still or animated 3D color objects, with shading, lighting, and other effects. GLX is the X Window System extension which implements OpenGL.

The second area is known as tracing. Tracing records all protocol traffic, between the Exceed X server and the host to a binary file. Options in Xconfig Troubleshooting can help with the trace. For example, you can turn on tracing as soon as the Exceed X server starts, which means that the dialog with the first X client is recorded. You can also set Slow Trace in the Xconfig Troubleshooting dialog box which writes all information directly to the file without buffering any of the data. This is helpful if you are tracing a situation where the Exceed X server crashes because any buffered information would be lost. The trace stops when the Exceed X server terminates. If you turned tracing on by clicking Trace on the Exceed X server File menu, you can terminate tracing by selecting Trace again. If tracing was turned on in the Troubleshooting page, you should clear the Trace Initially On option as soon as possible. Otherwise, whenever the Exceed X server is restarted, tracing begins again.
Warning! Tracing creates large disk files on your system, and can impair Exceed X server performance. Therefore, use tracing only when you are troubleshooting a problem.
For more information on Xdis, see the Help.

After the system performs a trace, disassemble the trace file to read it as a text file in Notepad. Xdis (available on the Hummingbird website) performs the disassembly process for you and lets you filter the data content of the disassembly.

256

Appendix A: Troubleshooting

Transport Monitor
The Transport Monitor application (in the Exceed Tools folder) lets you monitor network connections by displaying all current connection activity. Use it to locate connections that are frozen. After you close a connection, Transport Monitor should reflect this change. If Transport Monitor continues to display a connection that you have closed, then the connection is frozen.

Required Port Numbers


The table below lists incoming ports that are required for various Hummingbird Connectivity components, or protocols. To avoid conflicts, ensure other applications are not using these ports. If your organization uses a firewall, you can block or allow network traffic where appropriate.
Component Bootstrap Finger FTP/SFTP Lpq/Lpr TELNET Tftp Network Time Xstart/REXEC Exceed Secure Shell XDMCP Exceed Desktop Sharing (in a firewall environment) Port(s) 67 79 21 515 23 69 37 512 6000-6999 22 177 522 (TCP) and 1503 (TCP)

257

Exceed Users Guide

Resolving Connection Problems


If you cannot connect to a host or cannot start X clients with Xstart, you can enable the Show Progress and Show Host Reply boxes on the Network page of the Xstart Settings dialog box.

Checking Your Setup


A quick way to verify that your setup is working properly is to type an invalid password for the REXEC startup method or an invalid ID name for the RSH startup method.

If the host does not return an invalid name or password message, there is a problem with the communications link. The host may not be running, or it may not support REXEC or RSH. There may also be a problem with your transport configuration. If you receive an invalid name or password message, the connection is working. However, there may be something wrong with either the syntax or the parameters of the command you typed in the Xstart Command box. You may need to type DISPLAY or PATH variables on the command line.

Checking That the Client Has Enough Time to Start


If the Xstart file seems to connect with the host properly but a client does not start, the client may not have enough time to start before the initial Xstart socket closes down. On the Network page of the Xstart Settings dialog box (in Xstart, click Settings), set the Close box in the Timeouts area to -1 (minus one), select Show Host Reply, and then click OK. This keeps the first socket open even after the client socket is established. It also shows all host-generated messages in a host reply window. These messages may provide information about what is happening. If after doing this, the client seems to start properly, you can try different values in the Close box until you find one that gives the client enough time to open, then closes down the initial socket.

Checking for hwmRPS


If you are using the hRPS startup method, make sure that the hwmRPS client included with the Hummingbird Extend product is installed and running on the host. 258

Appendix A: Troubleshooting

Tracing Server Operation


Exceed has a tracing facility that captures data transferred between the Exceed X server and X clients, font servers, and XDMCP servers. Tracing a Fatal ErrorIf the server hangs, select Slow Trace on the Xconfig Troubleshooting page. This outputs all data transferred to the trace file. Since buffers are not used, this procedure severely degrades server performance and should be specified only when necessary. Tracing Dialog with First X ClientTo examine Exceed interaction with the first X client, turn tracing on from Xconfig by opening Troubleshooting and selecting Trace Initially On. This starts the trace when Exceed starts. To turn tracing off, click this check box again. Tracing a SessionYou can turn on tracing temporarily while Exceed is running using the Trace command on the Exceed File menu. To assist with troubleshooting (and potential Technical Support diagnosis), consider turning tracing on (open Xconfig Troubleshooting and select Trace Initially On), and then click Inser t Trace Comment on the Exceed File menu. The Exceed Trace File dialog box opens. Type comments related to the problem and click OK to insert them in the trace file. All traces create a binary file with an extension of .trx in the Exceed User directory. To view trace information, you must disassemble the file with Xdis (available on the Hummingbird website). The trace stops when you close Exceed. If you selected Trace from the Exceed File menu, you can terminate tracing by selecting the Trace command again. If tracing was selected on the Xconfig Troubleshooting page, clear Trace Initially On as soon as possible. Otherwise, Exceed automatically turns tracing on when it restarts.
Warning! Tracing the X protocol writes all protocol traffic between Exceed and the host to a file. This quickly creates large disk files, which can severely impair server response time.

259

Exceed Users Guide

Viewing Server Error Messages


You can find server error messages in the log file, in trace files, and in special Xstart or TELNET windows. You can display the log by:

selecting the Log File command on the Exceed Tools submenu (rightclick the Exceed icon on the Windows taskbar) clicking Log File on the toolbar clicking View on the Xconfig Troubleshooting page

Examine the log file if an X session terminates abnormally, and do so periodically to ensure that X font and color requests are being met.

General Errors
You can explore Exceed operations using the trace facility. Once enabled, all X protocol traffic between Exceed and the host is written to a file. Xdis converts this trace file into a readable format and outputs it to a DOS file.
Warning! Tracing creates large disk files very quickly. These files can slow down server performance. Turn tracing on only for a specific event or for troubleshooting purposes.

Transport Errors
If an error is generated before you establish a DECnet, IPX/SPX, or TCP/IP connection, it usually means it was not possible to connect to the host. Although a transport error is generated, the actual cause may be that a host connection was not available. Transport errors are always fatal. They are reported in the log file as follows:
message (e)

where message is a text message indicating the nature of the error and e represents an error code associated with a particular network transport. For more information on transport errors, see your network transport documentation.

260

Appendix A: Troubleshooting

Host-Generated Error Messages


If you have established a TELNET host session, messages normally displayed in a terminal emulation window appear in the TELNET window. In Xstart, you can view host-generated messages. To display these messages, select Show Host Reply on the Network page of the Xstart Settings dialog box, and click OK. Host or client messages are saved in a log file while the initial socket remains open. You can log the entire session by setting the Close box in the Timeouts area to minus one (-1).

Denied Font Requests


If an X client requests a font that Exceed cannot provide, the font name or search pattern is noted in the log file.

Denied Color Requests


If an X client requests a color that Exceed cannot provide, the color is noted in the log file.

Using Transport Monitor


You can observe network traffic and detect and terminate blocked connections using Transport Monitor. Transport Monitor displays the status of current connections and the total number of open connections. It also indicates whether your transport is operating successfully. You can customize the Transport Monitor window to display all or some of this information.

Confirming Transport Operation


To confirm that transport is reading and writing data: 1 Start Transport Monitor. Depending on the most recent settings, Transport Monitor may appear minimized as an icon, or its window may open.

261

Exceed Users Guide

In the Transport Monitor window, the indicator lamps in the Transport Activity Indicator panel flash to indicate that your transport is actually working. Otherwise, if Transport Monitor is minimized to an icon, the headlights of the vehicle in the icon flash to indicate activity.

If the lamps either on the icon or in the Transport Monitor window are not flashing, then transport is not functioning properly.

Detecting and Terminating Blocked Connections


Your transport may not be functioning properly because an X client has blocked a connection, thus disrupting communication over the transport software. To determine whether an X client connection is blocked, check the Status column in the Connection Information panel: either CONNECTED or BLOCKED is displayed. If a connection is blocked (that is, the status is BLOCKED), you must close it so that all other transport activity can resume. To do this, perform the following steps: 1 Start Transport Monitor. If Transport Monitor appears as an icon on your desktop, click the icon or click Restore to open the Transport Monitor window. Double-click the blocked connection in the Connection Information panel. To prevent accidental terminations, click Yes to confirm termination of this connection. The connection is closed and removed from the Connection Information panel.

2 3

262

Appendix A: Troubleshooting

Using Xdis
Xdis (available on the Hummingbird website) provides a user interface for viewing the results and filtering the data content. To generate a trace file, open the Troubleshooting application in Xconfig and select trace options. The trace file (*.trx) must be disassembled to view it in a text editor such as Windows Notepad.
Note: Xdis is for advanced Exceed users and system administrators. It is also useful to Hummingbird Technical Support for troubleshooting user issues. Xdis is a Java component and requires the Java Virtual Machine.

Xdis Help
The related topics below, and the topics at this level in the Help contents pane, provide general Xdis information. For more information about the Xdis interface and related dialog boxes, position the mouse cursor over toolbar buttons and view the pop-up tip.

Disassembling a Trace File


For most traces, you can specify an input file and generate the required information using the default X Trace Disassembler options. However, to make it easier to read and detect problems, you can create an output filter, which limits the scope of the trace file. To disassemble a trace file: 1 Click Browse to browse for an input file. Xdis automatically generates a similarly named output file with the .dis extension in the same directory.
Note: You can specify or browse for a different output file than the one that is generated.

On the File menu, click Disassemble.

263

Appendix B Connectivity Applications

Hummingbird Connectivity Accessories Administrative Tools Connectivity Tools HostExplorer HostExplorer Tools HostExplorer Print Services Console WyseTerm Hummingbird FTP Hummingbird Deployment Wizard

267 267 268 269 270 271 271 271 272 272

Appendix B: Connectivity Applications

Hummingbird Connectivity
The following applications and components are available with your product. They are all installed during a Complete installation, or you can select them during a Custom installation. Help is available with each application.

Accessories
Classic FTP This application lets you connect to a remote FTP server and transfer files between computers. FTP is only supported under TCP/IP transports. You cannot use this application with DECnet or IPX/SPX. A server implementation of the FTP protocol must run on the remote computer to allow for FTP communication. The remote computer is the FTP server (host), and the PC running Classic FTP is the FTP client. File Converter This application translates line feed control characters (also known as carriage return characters) between DOS and UNIX formats. Hummingbird Basic This is a command language included with Hummingbird products. Hummingbird Basic can be used to create scripts for frequently performed tasks that you would like to automate. For more information, see the Hummingbird Basic Language Programmers Guide. LPQ (Line Printer Query) This application is used to return the status of the print queue on either a UNIX system or another PC running a line-printer daemon. LPR (Line Printer Requester) This application lets you print PC files to any host on a TCP/IP network running LPD. The LPR window displays a separate window for each printer queue to which you are connected. For more information, see the LPR help. Network Time This application lets you synchronize the time on your PC with the Network Time Server. NSLookup This application finds and displays information about hosts in a domain.

267

Exceed Users Guide

Ping This is a diagnostic tool that lets you quickly check the integrity of a network communications path and your TCP/IP configuration. Ping sends Internet Control Message Protocol (ICMP) echo requests to specified machines and displays the response in graphical form. Quick Script Editor This application is a graphical development environment in which you can create and modify HostExplorer and FTP Quick Scripts. These scripts are made up of commands that help to automate tedious and repetitive tasks. Remote Tools This application is an integrated version of several UNIX commandsRemote Shell, Remote Exec, Remote Copy (RSH), and Remote Copy (REXEC). You can execute commands and copy files to or from other machines on the network using the RSH and REXEC protocols. Traceroute This application shows the route that packets take to the host. It lets you test, troubleshoot, and manage network connections and find the route used to connect to a specific host.

Administrative Tools
Files and Settings Transfer Wizard This application lets you backup, restore, and migrate Hummingbird Connectivity product settings using .humsft files. Using this file, you can then export and import these settings to and from other host machines. Hummingbird Profile Publishing Wizard publish profiles to specific profile spaces. This application lets you

Hummingbird Update You can use Hummingbird Update to install the latest patch to your product. For more information, see the installation chapter. Language Chooser Hummingbird Connectivity Language Chooser lets you specify the user interface language for Hummingbird Connectivity applications. The language you select will be used in Connectivity menus and dialog boxes. Media Location Manager This application lets you manage your Windows Installer Media Source locations.

268

Appendix B: Connectivity Applications

Metering Client Settings This application is a component of Hummingbird Metering Server. You can use it to configure metering client settings, which are used to establish communication between a metering server and its metering clients for a particular host machine. Profile Space Editor spaces. This application lets you view and manage profile

Sconfig Sconfig is a wizard that lets you customize the installation of software on local and network machines. With Sconfig, you can configure installations in the following ways:

Customize the folders installed by Setup. Tailor the list of applications or components to be installed. You can alter the list to limit the functionality available to users or to optimize the use of disk space. Simplify user input during the installation by pre-selecting information, such as the names of the directories where the software is installed.

For more information on Sconfig, see the Advanced Installation chapter.

Connectivity Tools
Directory Services This application lets you configure the NIS, NIS+, and LDAP settings for Hummingbird Connectivity applications. All directory service queries made by Hummingbird Connectivity applications target the domains specified and selected by you. Hummingbird Directory Services also lets you synchronize your Windows and UNIX passwords and select a target service for host name resolution. Directory Services Explorer This application lets you browse NIS, NIS+, and LDAP directory services without leaving the familiar Windows environment. Using Directory Services Explorer, you can bind your machine to multiple domains simultaneously, browse object contents and properties, run selective or global queries, and change your password in a directory service domain. HTTP Proxy Server HostExplorer HTTP Proxy provides HostExplorer users access to hosts residing behind corporate firewalls with the benefit of and without breaching security features of the firewall. 269

Exceed Users Guide

Hummingbird InetD InetD is a super daemon that lets you enable and disable various daemon services through a single application. It determines the network services to which your PC responds when a client makes a network request. In a Windows 98/2000 environment, InetD runs automatically when placed in the Startup folder. The Startup folder is the usual location for InetD. Hummingbird Proxy Server Console Hummingbird Proxy Server is a general proxy engine that lets you proxy emulation sessions. Proxy Server is composed of two components: a) the proxy engine, which is installed as a service on your workstation, and b) the proxy console, which lets you configure and monitor the proxy service. A shortcut to the Proxy Console is installed when you install the Proxy Server. Proxy Server Console installs as part of Host Access Services. Metering Server Hummingbird Connectivity products are now equipped with license metering capabilities. Metering Server is a reporting tool that lets administrators track the number of Hummingbird licenses deployed in their organization.

HostExplorer
HostExplorer is a PC-to-host connectivity product that provides connections from a desktop to enterprise hosts, including IBM mainframes, AS/400s, UNIX and Linux systems. Depending on the type of host to which you are connecting, you can transfer files using Telnet, Hummingbird FTP, or 5250 Data Transfer. HostExplorer offers three types of terminal emulation:

3270Emulates an IBM mainframe (including 3179G, 3472G, 3278, and 3279 models), runs 3270 applications, and transfers files between a host machine and your PC using the IND$FILE file transfer application. 5250Emulates IBM AS/400 sessions and runs 5250 applications. VTEmulates the DEC VT420 video terminal and includes support for VT52, VT100, VT101, VT102, VT220, VT320, VT420, ANSI, SCO ANSI, IBM 3151, and Linux Console.

270

Appendix B: Connectivity Applications

HostExplorer Tools
5250 Data Transfer Wizard This is a new HostExplorer component that lets you transfer data between a PC and an AS/400 host. If you transfer a file from an AS/400 host to your PC, you can specify standard SQL statements to execute in the file. HostExplorer Management Console HostExplorer Management Console is an administrative, feature-lockdown tool. With it, you can specify which HostExplorer menu options you want to make available for end users. By default, all menu options are available. HostExplorer Migration Wizard HostExplorer Migration Wizard converts user settings files created for Attachmate Extra! v6/7.1, IBM Personal Communications v5.7, and Wall Data Rumba v7.2 into HostExplorer settings files. HostExplorer SDK These application programming interfaces (APIs) let you extend the functionality of your available programming languages, such as Visual C++ and Visual Basic, to write scripts. Use it to exploit the functionality and features of HostExplorer products from within your own programs and scripts. Macro and Profile Converter This utility lets you convert WallData Rumba or Attachmate Extra! macros into Hummingbird Basic macros and Attachmate Extra! profiles into HostExplorer session profiles.

HostExplorer Print Services Console


HostExplorer Print Services installs as part of Host Access Services. This application is a server-based, scalable printing solution that lets you distribute reports from host computers to any LAN (local area network) printer in your enterprise network.

WyseTerm
WyseTerm is a terminal emulator that emulates Wyse-50 and Wyse-60 terminals.

271

Exceed Users Guide

Hummingbird FTP
This application is a client implementation of the File Transfer Protocol (FTP). It lets you transfer both text (ASCII) and image (binary) files between your PC and a remote computer running a server implementation of FTP. You can also use it to perform file and directory management on your PC and a remote computer. For more information, see the HostExplorer Users Guide.

Hummingbird Deployment Wizard


Hummingbird Deployment Wizard lets you create web-deployable installations of certain Hummingbird products. This multi-component application is not installed as a Connectivity product feature. You must install it separately from the Connectivity product CD.

272

Appendix C HWM

A Quick Tour of HWM HWM Configuration File Formatting Rules Enabling Virtual Desktop Functions Statements Virtual Desktop Font Statements Window Statements Color Statements Icon Manager Statements Menu Definitions Mouse Button Bindings Preprocessor Statements

275 277 277 279 280 281 282 285 285 286 287 289 291 292

Appendix C: HWM

This appendix describes how to use the Hummingbird local, Motif-like window manager, HWM. Like host-based window managers, HWM provides a graphical interface you can use to start and exit clients as well as position and create icons for the windows on your display. Unlike other window managers, which run on the host and use the network for window management function, HWM is a local X client that runs on your PC. Running locally speeds up window management functions while reducing network traffic. To start HWM, double-click the HWM icon in the Exceed Tools folder. Depending on how you configured HWM, the Virtual Desktop and/or the Icon Manager display.
Note: You can run HWM either when the X server is operating in Single Window mode, or in Multiple Window mode when configured for X, or Default To Native Window Manager.

A Quick Tour of HWM


This section briefly describes the HWM menus. System menu Contains most of the HWM commands. In single window mode, display this menu by clicking the left mouse button anywhere in the X server window background. If the cursor is in a client window, you can also display this menu by holding down the Alt key and clicking the left mouse button.
For more information, see Window Mode Options on page 218.

In multiple window mode, displaying the System menu when you click the Windows desktop requires certain options selected. Open Xconfig, click Screen Definition in Classic View (or click Display And Video in Category View) and then click Advanced. The Multiple Window Mode Advanced dialog box opens. Do one of the following:

Select Full Suppor t from the Root Drawing drop-down list and click OK. Select either Background Only or None from the Root Drawing drop-down list, select Root Mouse Actions To X, and then click OK. Alternatively, you can select one of the Root Drawing options (and click OK), and then click Root Mouse Actions To X on the Exceed X server toolbar. 275

Exceed Users Guide

The System menu includes standard functions that let you raise a window, circulate a window up and down, refresh the display, and kill a client.
Note: When you choose the Kill Client command, the pointer changes to a skull and crossbones. You can exit an application by choosing this command, moving the pointer to the application window, and then clicking the left mouse button.

The System menu also contains the commands and submenus discussed below. Window Ops menu Contains commands that let you create icons, move, resize, raise, lower, zoom/unzoom, refresh, and close a window. You can display this menu by choosing it from the System menu or by clicking Window Ops in the client window. When you select a Window Ops command from the client window, the operation takes place on the client. When you select a Window Ops command from the System menu, the operation takes place on the next client that you click. Desktop Settings menu Contains commands that show or hide the Virtual Desktop, the Icon Manager, or any X clients displayed as icons.
For more information about Local Commands or adding X clients to the X Commands menu, see the examples under Active Functions on page 290.

Local Commands menu Contains commands to open Xconfig, Xstart, or open Hwmcfg.src for editing in Notepad. X Commands menu Initially, this is an empty menu. You can add commands that start X clients by editing the HWM configuration file. You can also display this menu by clicking the right mouse button on the X server window background. Root Window menu Contains commands that let you change the pattern or color of the X server window (root window) background. Your selection is implemented immediately.
Note: If you are running in multiple window mode, you must make sure that Root Drawing (on the Xconfig Screen page, click Advanced settings) is set to either Background or Full Support. If Root Drawing is set to None, then the changes you make using the Root Window menu will not take effect.

276

Appendix C: HWM

Exit/Restart menu HWM.

Contains commands that let you exit or restart

Help command Displays a quick reference table that shows you how to invoke various HWM and Virtual Desktop functions using keystroke or mouse button combinations.

HWM Configuration File


HWM operates according to the specifications in its configuration file, Hwmcfg.src, located in the Exceed default User directory:
C:\Program Files\Hummingbird\Connectivity\version\ Default User\Exceed

This text file is loaded each time you start or restart HWM. You can customize HWM by editing Hwmcfg.src. You can display Hwmcfg.src when HWM is running by choosing the Edit HWM Config command from the Local Commands submenu on the System menu.
Note: This file is annotated to help you understand the functions and statements in it. We recommend that you make a backup of the configuration file before customizing it. This ensures that the original file remains intact if you need to revert to it later. Changes to HWM configuration file take effect when you restart HWM.

Formatting Rules
The sections below outline some basic formatting rules to consider when customizing the configuration file.

277

Exceed Users Guide

Configuration File Syntax


Component Statements Exclamation Mark (!) #If...#Then Appears at the beginning of the line and indicates that this line is a comment. Preprocessor statements must always begin with a number sign (#). For more information, see Preprocessor Statements on page 292. Formatting Rule

Menus Submenus Lines Backslash (\) Continued Rows Indicates that this line continues onto the next line. Continued rows must appear sequentially in the configuration file. You cannot have blank lines between continued lines. Submenus must always be defined before they can be included in another menu.

Tokens Usage/Spacing Each statement should consist of one or more tokens separated by one or more spaces. Note: A token is either a series of non-space characters, or any sequence of characters enclosed by matching quotation marks (for example, a b/c? d*e). Case Sensitivity Backslash (\) Tokens that are HWM functions are not case-sensitive. Any string that displayed as text on the screen is case-sensitive. Within a string, the backslash character (\) starts an escape sequence (see the Supported Character Escape Sequences table below).

Supported Character Escape Sequences


Sequence Function Represents a single backslash (\). Generates a newline character (0x0A). Generates a carriage return character (0x0D). Formulates any byte value except 0. Each d is a hexadecimal digit.

\\ \n \r \xdd

278

Appendix C: HWM

Sequence

Function Inserts the default user path. A trailing \ is also inserted, if needed. For example, "\uhwmcfg.src" is equivalent to: ..Program Files\Hummingbird\Connectivity\version\ Default User\Exceed\hwmcfg.src

\u

\i

Inserts the home\info path. A trailing \ is also inserted, if needed. For example, "\ixrdb.txt" is equivalent to: ..Program Files\Hummingbird\Connectivity\version\ Exceed\info\xrdb.txt

\h

Inserts the home path. A trailing \ is also inserted, if needed. For example, "\hexceed.exe" is equivalent to: ..Program Files\Hummingbird\Connectivity\version\ Exceed\Exceed.exe

\ \?

Continues a single line, onto the next line. Enters a wildcard character that is otherwise used to delineate a string or start an escape sequence. Note: A question mark (?) denotes any wildcard character.

Enabling Virtual Desktop


The Virtual Desktop is a window that represents an area many times larger than the actual server root window. It displays an overview of the entire contents of the server root window, including those X clients that are currently off-screen.
For more information, see Statements on page 281.

You can enable the Virtual Desktop by including the VirtualDesktop statement in your HWM configuration file. A thin frame outlines the portion of the Virtual Desktop that is visible on your display. This frame can be moved by clicking it with the right mouse button and dragging it to the desired location. If you move it to a client application, that gives it the focus. Each active client appears as a shaded box. When you click the left mouse button in a shaded box, the name of the client appears in the Virtual Desktop title bar. The client window with the focus appears with its title bar, border color, and shaded box in the highlight color.

279

Exceed Users Guide

You can position client windows anywhere within the Virtual Desktop by clicking the window with the left mouse button and dragging it to the desired location. When you release the mouse button, the window moves to the specified location.

Functions
Functions are commands in the configuration file that perform specific actions. If you invoke any of the functions that affect a single window (such as iconify, refresh, zoom) from a menu that is bound to that window, the function operates immediately. However, if you invoke the same function from a menu that is not bound to the window, you have to click the left mouse button in the appropriate window to perform the operation. The following table lists the supported functions:
Function Nop Iconify Menu menu_name Description Specifies a no operation token. Iconifies/restores a window. Activates the named menuwhen this function is called, HWM places the upper left corner of the menu at the current mouse position. Raises and moves a window or icon. Raises and resizes a window. Zooms/unzooms a window. Forces a redraw of the selected window. Refreshes the entire screen. Shows/raises the Icon Manager. Removes the Icon Manager. Displays client icons. Hides client icons.

Move Resize Zoom Refresh RefreshScreen ShowIconMgr HideIconMgr ShowIcons HideIcons

280

Appendix C: HWM

Function Up Down Top Bottom Kill Exit Restart

Description Circulates a window up. Circulates a window down. Raises a window to the top. Lowers a window to the bottom. Kills a client. Exits HWM. Restarts the window manager (and rereads the Hwmcfg.src file). Releases ownership of the PRIMARY selection. Changes the appearance of the root window.

Freesel Setroot

Statements
Statements are a sequence of actions in the HWM configuration file (Hwmcfg.src) that carry out a specific function in HWM. Editing the statements in Hwmcfg.src lets you customize HWM. When used in a Hwmcfg.src file, a single statement carries out a single action, while a series of statements carries out a complex sequence of actions. The following sections describe the representative statements in the
Hwmcfg.src file in the order they appear in the file. However, not all

statements listed below are included in the default configuration. The supported HWM statements can be grouped into the following categories:

Virtual Desktop statements Font statements Window statements Color statements Icon Manager statements Menu Definition statements 281

Exceed Users Guide

Mouse Button Binding statements


Note: You can disable any of the statements in the configuration file by inserting a comment indicator, or exclamation mark (!), at the beginning of the statement.

Virtual Desktop
The Virtual Desktop is the first section in the configuration file. The following statements appear in the default configuration file. VirtualDesktop Opens the Virtual Desktop when you run HWM. You can disable the Virtual Desktop by inserting an exclamation mark (!) at the beginning of this line. The syntax for this statement is as follows:
VirtualDesktop

VdeskScale Specifies the scale of the Virtual Desktop window. number defines the scale of the Virtual Desktop in comparison to your screen. This value indicates the number of screen pixels that each pixel of the Virtual Desktop represents. By default, the value is 20. Therefore, each pixel on the Virtual Desktop represents 20 pixels on your screen. The syntax for this statement is as follows:
VdeskScale number

StickyVdesk Places the Virtual Desktop within itself to prevent the Virtual Desktop itself from being displayed from within the Virtual Desktop window. This statement ensures that you will not inadvertently move the Virtual Desktop off the screen. The syntax for this statement is as follows:
StickyVdesk

If you want the Virtual Desktop to appear as a rectangle within the Virtual Desktop window, insert an exclamation mark (!) at the beginning of this statement. DoubleClick Specifies double-click span in milliseconds. The default is 300 as shown in the following syntax:
DoubleClick_msec 300

282

Appendix C: HWM

FadedMenus To specify faded menus, remove the exclamation mark (!) from the beginning of the statement.
Note: The Render extension must be active.

The syntax for this statement is as follows:


FadedMenus

borderwidth Sets the 3D border width to the desired number of pixels. The default is 8 as shown in the following syntax:
borderwidth 8

nocascade If you do not want to cascade windows, remove the exclamation mark (!) from the beginning of this statement:
!nocascade

positionisframe To specify (x, y) coordinates for your client window (not for its frame), remove the comment indicator (!) from the beginning of this statement:
!positionisframe 0 Note: You must also uncomment (remove the ! from) nocascade to set (x, y) coordinates for the window.

Other Supported Virtual Desktop Statements


The following statements control the operation of HWM Virtual Desktop; they are not included in the default configuration file. color vdesk Sets the foreground (screen frame) and background color of the Virtual Desktop. The syntax for these statements are as follows:
color vdesk foreground colorname color vdesk background colorname

VdeskGeom Specifies the placement of the Virtual Desktop window. The syntax for this statement is as follows:
VdeskGeom [+|-]x[+|-]y

283

Exceed Users Guide

This statement only works if windows are automatically placed (for example, if NoGhost is specified in Hwmcfg.src). A single + or - must precede each x and y. The parameters are described in the table below.
Parameter Description Specifies the horizontal position of the window, where x is the number of pixels from the left edge of the server root window to the left border of the Virtual Desktop. Specifies the horizontal position of the window, where x is the number of pixels from the right edge of the server root window to the right border of the Virtual Desktop. Specifies the vertical position of the window, where y is the number of pixels from the top edge of the server root window to the top border of the Virtual Desktop. Specifies the vertical position of the window, where y is the number of pixels from the bottom edge of the server root window to the bottom border of the Virtual Desktop.

+x

-x

+y

-y

VdeskButton Lets you configure which mouse button is needed to drag the server window frame or client windows to a new location. The syntax for this statement is as follows:
VdeskButton b1 b2 Note: b1 is the button that moves the frame; b2 is the button that moves the client windows. The values for b1 and b2 can be either 1, 2 or 3, which represent the left, middle and right buttons on the mouse, respectively. The values for b1 and b2 must be different. The default is VdeskButton 3 1, where the left button (number 1) moves the client windows and the right button (number 3) moves the frame.

284

Appendix C: HWM

For more information on bind statements, see Mouse Button Bindings on page 291.

ShowVdesk/HideVdesk Lets you show or hide the Virtual Desktop when the Virtual Desktop is enabled via an preceding VirtualDesktop statement. The syntax for this statement is as follows:
ShowVdesk HideVdesk Note: Statements and functions can also be called using mousebutton bind statements. For example, to show the Virtual Desktop whenever you hold down Alt-Shift and then click the right mouse button, use the following statement: bind alt shift b3 showvdesk

Font Statements
For more information on preprocessor statements, see Preprocessor Statements on page 292.

The preprocessor statement shown below sets the font used by HWM. It uses the preprocessor #if...#else...#endif format to set one of two different fonts, depending on the size of the server screen.
#if Xpixels >= 1024 font 10x20 #else font 6x10 #endif

Window Statements
Window statements let you move, resize, and focus windows. NoGhost Lets you instruct HWM to automatically place and size client windows. The syntax for this statement is as follows:
NoGhost

To move and resize client windows when they first appear on your screen, add an exclamation mark (!) to this statement. The windows then appear as outlines, which you can place anywhere on the screen or Virtual Desktop.

285

Exceed Users Guide

ClickToFocus Lets you focus client windows. This statement, by default, requires that you click with the left mouse button to focus and raise a client window. The syntax for this statement is as follows:
ClickToFocus [raise] 1

If you want the pointer to focus the window, insert an exclamation mark (!) before this statement. The raise parameter is optional. You can also specify one of 1 (left), 2 (middle), or 3 (right) to indicate which mouse button to click.

Color Statements
Color statements set the colors that HWM displays for windows, menus, icons, dialogs, and the Icon Manager. 3D Effect HWM achieves its 3D effect by using three colors. In each of the areas where you can set background and foreground color, HWM allocates a third color that is a shade of the background. If colors are not specified for WINDOW, TRANSIENT, ICON, ICONMGR, or MENU, HWM assumes the colors are black and white, with gray shading. Setroot color_specification Specifies the color of the root server window. The syntax for this statement is as follows:
Setroot color_specification

The following table describes different types of color_specification.


Color_Specification Description Resets the server root window to its default. Changes server root window to a solid color, where color is any color defined in the RGB database. If the color name contains spaces or tabs, enclose it in quotation marks (" "). Changes the server's root window to the pattern described in the file filespec, where filespec specifies a standard X11 bitmap. You can optionally specify the foreground and background color.

default solid color

bitmap filespec [fg color bg color]

286

Appendix C: HWM

Icon Manager Statements


This section describes the Icon Manager configuration statements that appear in the default configuration file. IconMgrOn Enables the Icon Manager when you run HWM. The syntax for this statement is as follows:
IconMgrOn

This statement automatically displays the Icon Manager in the server window. You can disable the Icon Manager by inserting an exclamation mark (!) at the beginning of this line. stickyIconMgr Prevents the Icon Manager itself from being displayed from within the Virtual Desktop window. This statement ensures that you will not inadvertently move the Icon Manager off the screen while using the Virtual Desktop. The syntax for this statement is as follows:
stickyIconMgr

If you want the Icon Manager to appear as a rectangle within the Icon Manager window, add a (!) before this statement. HideIcons Hides any client that is currently iconified. The syntax for this statement is as follows:
HideIcons

If you want the icons displayed, you can replace this statement with the ShowIcons function.

Other Supported Icon Manager Statements


This section describes additional supported statements that relate to the operation of HWM Icon Manager. These statements are not included in the default Hwmcfg.src file: IconImage Associates a specific bitmap file to act as an icon for a particular client window. The syntax for this statement is as follows:
IconImage window-name bitmap

287

Exceed Users Guide

For example, you can use the Hummingbird bitmap file in the Info directory (by default, C:\Program Files\Hummingbird\Connectivity\ version\Exceed\Info) as an icon for an xterm window by using the following statement:
IconImage xterm "\bird.bit"

You can also associate a pixmap to be used as the default HWM icon for clients that do not specify an icon by using the following statement:
IconPixmap filespec Note: filespec must specify a standard X11 bitmap file.
For more information on the x and y variables, see VdeskGeom on page 283.

IconMgrGeom Specifies the placement of the Icon Manager window. The syntax for this statement is as follows:
IconMgrGeom [+|-]x[+|-]y

288

Appendix C: HWM

Menu Definitions
This section of the configuration file lets you configure how menus appear on HWM. Menu definitions start with the word menu, followed by the name of the menu enclosed in quotation marks (" ") and ending with the word endmenu. Any items that appear on the menu are defined on the lines in between these two words.
Note: Menu names are case-sensitive.

All HWM menus appear in the menu definition section and can be divided into two distinct categories: menus with inactive menu functions and menus with active functions. Both types are discussed below.

Inactive Functions
Menus with inactive functions are menus that do not perform any operations. They present information, rather than provide menu commands. For example, the VdeskHelp menu defined below has no active functions. Lines that do not invoke functions (or blank lines on a menu), are exited with nop, which indicates No Operation. Strings in the menu definition, or text enclosed in quotation marks (" "), display on the menu using the default font specified in this file.
Note: Blank lines on the menu are indicated with an empty string ("").

For example:
menu VdeskHelp "Click on "-------"anywhere "anywhere " " "in Vdesk left Move the view" With Mouse Button --------------Alt Shift right Alt Shift left Function" --------" Show VirtualDesktop" Hide VirtualDesktop" nop nop nop nop nop nop

289

Exceed Users Guide

"in Vdesk on a window right Move and/or show the name of a window" endmenu

nop

Active Functions
Menus with active function menu items execute a specific operation, or invoke a specific submenu, when the user chooses it from the menu. For example, the Window Ops menu includes items which perform various window functions:
menu "Window Ops" "Iconify" "Move" "Resize" "Raise" "Lower" "Zoom" "Refresh" "Close" endmenu iconify move resize top bottom zoom refresh kill

To start an application from an HWM menu, use run with the specified command. You can use the Local Commands menu to execute local Windows or X apps. For example:
menu "Local Commands" "Xconfig" Xsession" "Xstart" "Hwm config" endmenu run "xconfig" run "xsession" run "xstart" run "notepad hwmcfg.src"

290

Appendix C: HWM

You can use the X Commands menu to start remote X clients using Xstart. For example:
menu "X Commands" "XTerm Packard" endmenu run "xstart packard.xs"

Mouse Button Bindings


The mouse button bindings section of the Hwmcfg.src file lets you display a menu or perform a function by either binding it to a mouse button, or to a mouse button and keystroke combination. In general, the syntax for a bind statement is:
bind [location] [modifier] button menu_or_function

Mouse button binding parameters are described in the chart below:


Mouse Button Binding Parameters Location1 Root (or R) Window (or W) Icon (or I) Left (or L) OutsideRight (Right, OR, or R) Description Binding is valid on the root window. Binding is valid on a window. Binding is valid on an icon. Binding is valid on a window banner's left button (typically the Window Ops button). Binding is valid on a window banner's outside right button (typically the zoom button). Binding is valid on a window banner's inside right button (typically the button to iconify). Binding is valid on a window banner's title bar, that is, outside of the buttons. Description <Shift> required. <Ctrl> required. Mod1 required.

InsideRight (or IR)

Middle (Mid or M) Modifier2

Shift (or S) Control (CTRL or C) Mod1 (ALT or A)

291

Exceed Users Guide

Mouse Button Binding Parameters

Mod2... Mod 5
Button3 B1 (or 1) B2 (or 2) B3 (or 3)
1

Mod2... Mod5 required. Description Mouse button 1 (left). Mouse button 2 (middle). Mouse button 3 (right).

If none of Root, Window, Icon, Left, Right, InsideRight, or Middle is specified, then all are assumed. 2 Alt is used as a synonym for Mod1, as this is the modifier associated with the Alt key in the keyboard files supplied with Exceed. 3 Only one of B1, B2, or B3 can be specified in any one statement.

Preprocessor Statements
Preprocessor statements let you set if...else conditions that define which statements in the Hwmcfg.src file are processed. The following preprocessor statements are supported:
Statement Description Used to specify an expression. Expression format is described in the Expressions in Preprocessor Statements section below. If the expression is true, successive statements are processed. If the expression is false, successive statements are not processed. This statement marks the end of the range of the #if statement. For each #if statement there must be one #endif statement. You can use one #else statement within each #if...#endif range. If the expression in the associated if statement is false, all statements between #else and the associated #endif are processed.

#if expression

#endif

#else statement(s)

292

Appendix C: HWM

For example:
#if Planes == 8 !test for 256 colors color active transient foreground blue color inactive window background red color... #else color active transient foreground white color inactive window background black color... #endif Note: #if...#endif statements can be nested, that is if...#endif ranges can be placed within each other. !different colors !specify colors

Expressions in Preprocessor Statements Expressions in preprocessor statements take the following format, and the fields must be separated by one space:
id operator constant

These fields are discussed in the following table:


Field id xpixels ypixels Planes The width of the server screen in pixels. The height of the server screen in pixels. Represents the number of video planes. The number of colors is 2planes, that is, 4 planes specifies 16 colors; 8 planes specifies 256 colors. Used to test whether or not the server supports color. (For example: PseudoColor or StaticColor.) If the default server supports color, Color is set to 1. Otherwise, it is set to 0. Description

Color

293

Exceed Users Guide

Field Static

Description Used to test whether or not the server supports static read-only colormaps or dynamic read/write colormaps. If the server supports only static colormaps, Static is set to 1. If the server supports dynamic colormaps, Static is set to 0. Used to test whether the Virtual Desktop is specified in Hwmcfg.src. If the Virtual Desktop is specified, VdeskOn is set to 1, otherwise it is 0.

VdeskOn operator == <> < <= > >= constant constant

TRUE if ID is equal to constant. TRUE if ID is not equal to constant. TRUE if ID is less than constant. TRUE if ID is less than or equal to constant. TRUE if ID is greater than constant. TRUE if ID is greater than or equal to constant.

A decimal numeric value.

294

Appendix D General Accessibility and Technical Support

General Accessibility Microsoft Accessibility Options Technical Support

297 298 299

Appendix D: General Accessibility and Technical Support

General Accessibility
Hummingbird products are accessible to all users. Wherever possible, our software adheres to Microsoft Windows interface standards and contains a comprehensive set of accessibility features. Access Keys All menus have associated access keys (mnemonics) that let you use the keyboard, rather than a mouse, to navigate the user interface (UI). These access keys appear as underlined letters in the names of most UI items. (If this is not the case, press Alt to reveal them.) To open any menu, press Alt and then press the key that corresponds with the underlined letter in the menu name. For example, to access the File menu in any Hummingbird application, press Alt+F. Once you have opened a menu, you can access an item on the menu by pressing the underlined letter in the menu item name, or you can use the arrow keys to navigate the menu list. Keyboard Shortcuts Some often-used menu options also have shortcut (accelerator) keys. The shortcut key for an item appears beside it on the menu. Directional Arrows Use the directional arrows on the keyboard to navigate through menu items or to scroll vertically and horizontally. You can also use the directional arrows to navigate through multiple options. For example, if you have a series of radio buttons, you can use the arrow keys to navigate the possible selections. Tab Key Sequence To navigate through a dialog box, press the Tab key. Selected items appear with a dotted border. You can also press Shift+Tab to go back to a previous selection within the dialog box. Spacebar Press the Spacebar to select or clear check boxes, or to select buttons in a dialog box. Esc Press the Esc key to close a dialog box without implementing any new settings. Enter Press the Enter key to select the highlighted item or to close a dialog box and apply the new settings. You can also press the Enter key to close all About boxes.

297

Exceed Users Guide

ToolTips ToolTips appear for all functional icons. This feature lets users use Screen Reviewers to make interface information available through synthesized speech or through a refreshable Braille display.

Microsoft Accessibility Options


Microsoft Windows environments contain accessibility options that let you change how you interact with the software. These options can add sound, increase the magnification, and create sticky keys. To enable/disable Accessibility options: 1 2 3 In Control Panel, double-click Accessibility Options. In the Accessibility Options dialog box, select or clear the option check boxes on the various tabs as required, and click Apply. Click OK.

If you installed the Microsoft Accessibility components for your Windows system, you can find additional accessibility tools under Accessibility on the Star t menu.

298

Appendix D: General Accessibility and Technical Support

Technical Support
You can contact the Hummingbird Technical Support department Monday to Friday between 8:00 a.m. and 8:00 p.m. Eastern Time.
Hummingbird Ltd. 1 Sparks Avenue, Toronto, Ontario, Canada M2H 2W1 Canada and the USA Technical Support: General Enquiry: Main: Fax: E-mail: FTP: Web Support: Web Site: 1-800-486-0095 1-877-FLY-HUMM +1-416-496-2200 +1-416-496-2207 support@hummingbird.com ftp.hummingbird.com support.hummingbird.com/customer www.hummingbird.com www.connectivity.hummingbird.com International +1-416-496-2200 +1-416-496-2200

299

Index

Numerics
5250 Data Transfer Wizard (HostExplorer component) .................................. 271

A
access control list .........................166, 209, 210 accessibility, general..................................... 297 accessing the font server .............................. 235 accessing X applications remotely............... 142 Accessories........................................... 267268 Add Font Directory dialog box ................... 233 Add Keysym dialog box............................... 182 Add Set Name dialog box............................ 183 adding font directories ..................................... 233 font servers ........................................... 235 physical keys......................................... 184 to password list..................................... 134 X screens............................................... 219 aliases ........................................................... 240 allocating system resources ......................... 241 analysing log file ................................................... 255 progress messages ................................ 254 API ............................................................... 271 appdb map................................................... 116 applications browsing for ......................................... 111 database file, syntax.............................. 116 included with Exceed ............................... 4

authentication .............................................. 155 X clients ................................................ 211 automatic copying and pasting ............................. 227 font substitution................................... 247 host access ............................................ 101 re-sizing of fonts................................... 236 avoiding PC shutdown ................................ 243

B
backing store ................................................ 242 balancing system loads................................. 117 broadcast host list.................................................. 200 Host List file .................................200, 201 requests, startup modes........................ 122 XDMCP Broadcast............................... 126 XDMCP Indirect.................................. 125 Broadway .............................................157, 211 Browse Applications dialog box .................. 111 Browse Hosts dialog box ............................. 111 Browse NIS Maps dialog box....................... 116 browsing for applications..................................... 111 for hosts ................................................ 111 Build Compose Sequence dialog box .......... 181 buttons configuring, mouse .............................. 185 sending button events .......................... 187 two-button mouse, middle button emulation ......................................... 189

Exceed Users Guide

C
cache deleting password, Xstart .....................134 Exceed browse information..................113 global login ...........................................132 password .............................. 132, 133, 134 password, creating ................................133 Xweb, server-side..................................142 CDE ..............................................................152 multiple sessions...................................153 traditional Chinese HP.........................193 Change All Font Paths dialog box ...............234 Change dialog box........................................135 Change Font Directory dialog box ..............233 changing broadcast/multicast address .................201 font directories......................................233 font servers............................................235 Hosts across multiple files ....................135 IDs across multiple files........................135 order, transport service providers and protocols ...................................201 passwords across multiple files.............135 paths, font database ..............................233 window modes......................................218 Xconfig settings ....................................165 Chinese environments .................................192 Chinese, Japanese, and Korean (CJK) Input .......190194 Classic FTP...................................................267 click interval .................................................189 color default server visual ..............................222 denied requests ............................ 246, 261 RGB database........................................225 specifications, Xconfig..........................165 testing video adapter, monitor .............221 command line Exceed X server parameters..................151 running an Xstart file............................137 switches, launching Windows applications......................107

syntax.................................................... 137 window manager startup ....................... 92 command line (Sconfig) error conditions ..................................... 74 generating .mst files from ...................... 73 invoking .mst files from ......................... 74 options.................................................... 73 validation conditions ............................. 75 commands DISPLAY variable ................................ 140 Exceed menus......................................... 93 flag, override Xconfig options.............. 166 host connection syntax .......................... 85 starting X clients...................137, 141, 142 UNIX, sending to host ......................... 131 window managers .................................. 92 Xstart Command box .................. 108, 131 Xstart macros ....................................... 131 Common Desktop Environment. See CDE. Compose Sequences dialog box .................. 180 compose-key sequence ..........................95, 180 configuration files........................................ 211 comparing ............................................ 169 Virtual Desktop section ....................... 282 Xconfig .........................................161, 165 Configure GLX dialog box .......................... 217 configuring graphics hardware ................................ 243 the mouse ............................................. 185 X screens............................................... 219 connections blocked, detecting, and terminating .... 262 Broadway and LBX .............................. 142 information about................................ 261 optimizing loads................................... 117 problems, detecting.............................. 262 setting sequence of events .................... 195 to hosts ................................................... 85 to hosts automatically .......................... 101 troubleshooting.................................... 258 using the wizard ..................................... 85 with Xstart ............................................ 101

302

Index

Connectivity Secure Shell ....................103, 157 overview ............................................... 155 startup method..................................... 103 Copy X Selection To File dialog box ............. 99 copying and pasting automatically........................................ 227 between X clients.................................. 100 data .............................................96, 9697 graphics .................................................. 98 storage buffer........................................ 227 to input CJK text .................................. 192 creating a password cache .................................. 133 a security file......................................... 206 compose-key sequences ....................... 180 custom symbols.................................... 182 font aliases ............................................ 237 host access control list.......................... 209 host list ................................................. 200 keysym sets ........................................... 182 local XRDB database............................ 220 physical keys......................................... 184 startup file............................................. 104 trace files............................................... 259 user access control list.......................... 210 Xsession files ........................................ 148 Xstart shortcut...................................... 106 Cryptoki....................................................... 156 customizing files and folders ...................................... 76 font database ........................................ 229 installation........................................ 7581 keyboard file......................................... 175 keysyms ................................................ 182 symbols................................................. 182 X server................................................. 165 customizing installations with Sconfig directories............................................... 36 Directory Services properties ...........37, 60 environment variables............................ 55 Exceed properties ................................... 37 features .............................................36, 42 files....................................................36, 44

font directories and servers ....... 37, 65, 68 font paths ................................................37 for Terminal Services..............................38 Metering properties ......................... 37, 53 migrating user settings ...........................57 Profile Spaces..........................................58 properties......................................... 37, 46 registry ....................................................37 shortcuts .......................................... 37, 51

D
database ........................................................229 font, changing path...............................233 XRDB....................................................220 DECnet...........................................................85 starting X clients ...................................141 transport errors.....................................260 transports, using ...................................120 DECwindows compatibility.........................216 default command line parameter .......................95 configuration file ......................... 161, 165 host type settings ....................................86 login information, Xstart............. 131, 133 port, IPDisCov daemon .......................197 restoring protocol extension selections..........................218 restoring Xconfig settings.....................163 root directories, connectivity settings ....76 Rupdb.txt, section names .....................115 shortcut icon, Xstart .............................106 trace options .........................................263 user directory............................. 75, 76, 77 window mode/manager..........................93 Xconfig settings ....................................161 defining custom symbols ....................................182 user ID and password macros ..............135 deleting a password cache ..................................134 from password list ................................134 keysyms.................................................178 physical keys .........................................185

303

Exceed Users Guide

Xscreens ................................................219 denied color requests ...................................246 desktop sharing ....................................... 88, 89 Destination directory .....................................39 destination folder/directory installation ..............................................13 detecting blocked connections.............................262 transport activity.......................... 261, 262 developing clients.............................................7 diagnostics, Exceed ......................................254 directories default user ...................................... 75, 76 personal (per-user).................................75 directories, customizing with Sconfig..... 36, 39 creating custom folders ..........................40 creating custom subfolders.....................40 Current User directory ...........................39 Destination directory..............................39 directories, installation...................................13 global user...............................................14 per-user...................................................14 directories/folders destination (root home) .........................13 user..........................................................13 Directory properties setting with Sconfig ................................60 Directory Services Explorer .........................269 Directory Services properties setting with Sconfig ................................37 disable Host List File, use of .............................201 DISPLAY connecting via NAT/VPN ....................197 environment variable.....93, 108, 198, 199 not defined (UNIX hosts) ....................141 not defined (VMS hosts) ......................141 passive startup mode ............................123 setting environment variable................139 starting X clients .....................................88

Display Parameters Advanced Settings dialog box.......................... 87 displaying errors in Xstart ..................................... 111 log file ................................................... 245 login information in Xstart.................. 110 video settings........................................ 225

E
editing font database ........................................ 230 font directories ..................................... 233 font servers ........................................... 235 fonts...................................................... 232 host access control list.......................... 209 host list ................................................. 200 local XRDB database............................ 220 encoding, traditional Chinese ..................... 192 Enter Reply for Prompt dialog box ............. 109 environment variables ............ 55, 85, 122, 139 adding..................................................... 55 modifying ............................................... 55 removing ................................................ 55 values ...................................................... 55 Exceed overview ................................................... 3 accessing menus ..................................... 93 applications .............................................. 4 diagnostics............................................ 254 included applications ............................... 4 log file ................................................... 245 on a remote PC .................................... 142 required port numbers......................... 257 Exceed Multiple Sessions dialog box........ 223 Exceed 3D ........................................................ 8 Exceed Connection Manager ......................4, 5 Exceed Desktop Sharing dialog box.............. 89 Exceed Multiple Sessions dialog box........... 136 Exceed properties setting with Sconfig....................37, 62, 63 Exceed X server overview ................................................... 4 and Input Method server ..................... 191

304

Index

configuring ........................................... 215 multiple instances ................................ 150 Exceed XDK (Exceed X Development Kit)..... 7 Exceed.log file .............................................. 245 Exceed.xcfg file ....................................165, 215 executing multiple X clients, Windows programs ......................... 136 X clients ..................................88, 123, 126 Xstart, from command line ................. 137 Export Alias dialog box ............................... 239 Expos Online................................................ 25 Extend hRPS ..................................................... 103 modifying settings................................ 208 Extend Password dialog box........................ 208

F
failed color requests ..................................... 246 features, customizing with Sconfig..........36, 43 adding..................................................... 42 modifying ............................................... 42 removing ................................................ 43 File Converter .............................................. 267 files creating Xsession files .......................... 148 disassembling traces ............................. 263 Exceed.log ............................................ 245 Exceed.xcfg...................................165, 215 .humfst ................................................... 57 invalid policy files................................. 212 Lfp.xdb ................................................. 229 Mandatory.xcfg .................................... 215 .mst ......................................................... 35 .mst for Terminal Services ..................... 38 Passexp.ini............................................ 157 restoring and migrating, Wizard ......... 268 Rgb.txt ..........................................225, 247 rxplugin ................................................ 211 server trace ........................................... 259 Xdmcp.txt.....................................200, 201 Xhost.txt .......................................206, 209 Xrdb.txt ................................................ 220

Xsession sequence ................................149 Files and Settings Transfer Wizard ..............268 migrating per-user settings.....................79 migrating user settings ...........................80 files, customizing with Sconfig ......................36 adding custom ........................................44 modifying custom...................................45 removing.................................................46 Find and Replace dialog box........................135 finding blocked connections........................262 firewall open ports, desktop sharing ...................89 rxplugin/xrx configuration file.............211 Xweb settings ........................................207 folders. See directories. folders, Sconfig. See directories, customizing with Sconfig. font automatic substitution .........................247 denied requests .....................................247 directory................................................233 errors.....................................................247 making scalable.....................................236 paths......................................................233 search order ..........................................234 working with.........................................232 font alias creating .................................................237 creating several .....................................238 exporting...............................................228 importing and exporting files.......238240 font database overview................................................229 editing ...................................................230 file (*.fdb) .............................................233 updating................................................166 Font Database dialog box............ 229240, 245 font directories, setting with Sconfig.................. 37, 65 adding .....................................................65 modifying................................................65 removing.................................................67

305

Exceed Users Guide

font files (Sconfig)..........................................65 adding .....................................................65 removing.................................................67 Font List dialog box ............................ 236, 237 Font page, Xconfig .......................................228 font servers accessing ...............................................235 adding, changing ..................................235 font servers, setting with Sconfig ............ 37, 68 adding .....................................................68 modifying................................................68 removing.................................................70 Font Settings dialog box...................... 193, 194 format alias file..................................................240 host list file............................................200 log file....................................................245 frozen connection, determining ..................257 FTP ...............................................................267 Hummingbird client ............................272 Local Application startup method........................ 103, 136 required port number...........................257 searching Internet for fonts ..................193 starting settings files with Xsession........................... 144, 145 using Hummingbird FTP in Xweb ......144

G
GLX protocol extension...............................217 GNOME .......................................................153 window manager command...................93 GNU Network Object Model Environment. See GNOME. graphics copying and pasting................................98 testing....................................................243

H
hardware configuration ...............................243 host list file ...................................................201 creating .................................................200 editing ...................................................200

format................................................... 201 syntax.................................................... 115 HostExplorer ............................................... 270 HostExplorer Management Console .......... 271 HostExplorer Migration Wizard................. 271 HostExplorer Print Services ........................ 271 HostExplorer SDK....................................... 271 hosts access control list.......................... 206, 209 browsing for ......................................... 111 errors .................................................... 260 font servers ........................................... 235 load balancing ...................................... 117 optimizing loads................................... 117 reply window........................................ 111 restricting access................................... 206 startup file............................................. 139 hosts.byaddr map ........................................ 116 HTTP Proxy Server (HostExplorer component) .................................. 269 .humfst file ..................................................... 80 base......................................................... 80 base location........................................... 80 current user ............................................ 80 Hummingbird accessibility ......................... 297 Hummingbird Basic ................................7, 267 Hummingbird Connectivity User Settings uninstalling products ............................. 81 Hummingbird Directory Services ............... 269 Hummingbird FTP ..................................... 272 Hummingbird InetD................................... 270 Hummingbird Setup Wizard ........................ 11 maintenance mode................................. 18 Hummingbird Update ................................ 268 .humreg file.................................................... 77 HumSettings.exe............................................ 81 location................................................... 78 passing arguments.................................. 78 HWM........................................................... 122 overview ................................................... 5 configuration file functions ......... 280281 configuration file specifications... 277280 configuration file statements ....... 281293

306

Index

Kill Client command............................ 276 menus ........................................... 275277 Hwmcfg.src HWM configuration file ...................... 277 icon manager statements ..................... 287 location................................................. 277 mouse bindings .................................... 291 mouse button bindings ........................ 291 preprocessor statements....................... 292 restart function..................................... 281 statements............................................. 281 VdeskGeom desktop statement ........... 284 VdeskOn field ...................................... 294

Installer Database files. See MSI files. installing a shortcut Xstart.....................................................106 invalid configuration files ............................212 IP discovery ................................. 156, 197200 IPDisCov daemon ................................197 IPX/SPX .........................................................85 starting X clients ...................................141 transport errors.....................................260

K
K Desktop Environment..............................153 KBD file ........................................................170 KDE. See K Desktop Environment. Kerberos .......................................................155 key sequences ...............................................180 keyboard entering data ...........................................95 files ........................................................170 reload file ..............................................166 selecting ................................................170 Keyboard Input page, Xconfig.....................170 keysym mapped to key, deleting .......................178 mapping................................................176 Keysym File Editor dialog box .....................182

I
image save .................................................... 242 Import Alias dialog box............................... 238 improving speed .......................................... 243 font matching....................................... 234 image save fields ................................... 242 system performance ............................. 241 Incoming Call dialog box .............................. 89 input method server .................................... 191 Input Settings dialog box............................. 174 inputing data.................................................. 95 installation controlling per-user settings .................. 75 destination folder/directory ................... 13 Media Location Manager..................... 268 migrating user settings ..................... 7981 passing arguments, per-user settings..... 78 personal, overview.................................. 20 requirements .......................................... 12 scenarios ................................................. 20 silent ....................................................... 21 troubleshooting.................................... 251 user directory ......................................... 13 installations creating multiple with Sconfig .........36, 73 for Terminal Services ............................. 38 setup type for Sconfig............................. 35

L
launching multiple X clients, Windows programs..........................136 Windows applications on hosts ...........107 X clients ...........................85, 88, 123, 126 Xstart.....................................................137 LDAP....................................................... 37, 60 Lfp.xdb file ...................................................229 Line Printer Query .......................................267 Line Printer Requester .................................267 Linux desktop environments ..........................153 GNOME ...............................................153 KDE ......................................................153

307

Exceed Users Guide

load optimization.........................................117 Rupdb.txt ..............................................115 local X clients ...................................................7 locale name specifying ..............................................191 log error messages ........................................260 log file analysing ...............................................255 Exceed.log .............................................245 format ...................................................245 server error messages............................260 troubleshooting ....................................255 logging in to CDE ........................................152 login information prompt in Xstart ...................................110 login macros in Xstart..................................131 command..............................................131 password ...............................................131 user ID ..................................................131 login, special for Xstart ................................132 LPQ. See Line Printer Query. LPR. See Line Printer Requester.

M
Macro and Profile Converter (HostExplorer component)...................................271 Macro Selector dialog box .................. 179, 188 macros keyboard events ....................................180 mapping to keys....................................179 mouse wheel .........................................187 password ...............................................135 user ID and password ...........................135 user ID, password, and command .......131 Xstart.....................................................131 Macros dialog box........................................179 managing PC performance ..........................243 mandatory Xconfig settings ................ 213, 215 Mandatory.xcfg file ......................................215 mapping keysyms.................................................176 macros to a mouse wheel......................187

Master Setup ............................................15, 19 matching fonts...................................................... 234 Media Location Manager ............................ 268 menus Exceed .................................................... 93 Metering Client Settings.............................. 269 Metering properties setting with Sconfig..........................37, 53 Metering Server ...................................269, 270 Microsoft System Management Server (SMS)................................... 23 Microsoft Transform file. See MST files. Microsoft Windows manager........................ 92 middle button emulation .................... 185, 189 migrating files and settings .............................25, 268 user settings with Sconfig....................... 57 modifying an Xsession file ..................................... 148 keyboard files ....................................... 175 Monitor Configuration dialog box ............. 224 monitoring connections.............................. 257 mouse adding 3-button function .................... 185 entering data........................................... 95 middle button emulation..................... 189 Mouse Input page, Xconfig ......................... 186 mouse wheel Macro Selector ..................................... 188 mapping macros .................................. 187 mapping to a macro ............................. 187 New Macro Properties ......................... 188 options.................................................. 186 Mouse Wheel Macro Bindings dialog box.. 187 moving font directories, servers ........................ 234 fonts...................................................... 233 Msetup.exe.........................................18, 19, 22 personal installation............................... 15 MSI files applying .mst files to .............................. 74 customizing............................................ 38

308

Index

Msiexec.exe.................................................... 21 command line options ......................... 253 MST files ........................................................ 35 applying error conditions ...................... 74 applying to .msi files .............................. 72 applying validation conditions .............. 75 creating.............................................36, 73 creating for Terminal Services ............... 38 generating from a command line .......... 73 invoking from a command line ............. 74 saving...................................................... 71 Windows Installer .................................. 35 multicast address ......................................... 201 multiple Exceed X servers, starting..................... 150 Windows applications.......................... 107 X displays........................................94, 150 XDM sessions......................................... 94 Xstart sessions per host ........................ 137 multiple custom installations ..................36, 73 multiple window mode ................................. 93 menus ..................................................... 93 Screen Definition ................................. 218 Multiple Window Mode Advanced dialog box 216

NIS+ ........................................................ 37, 60

O
OpenGL........................................................248 opening .msi files ..................................................38 .mst files ..................................................38 Sconfig ....................................................38 optimizing load on hosts.........................................117 performance ................................ 242, 243 overriding settings........................................166

P
parameters Exceed X server.....................................151 passive startup mode....................................122 sequence of events ................................195 password aging............................................. 157, 158 change, UNIX prompt ................ 157, 158 changing across files .............................135 changing in Xconfig .............................164 expiry prompts, UNIX .........................135 host, remembering ...............................134 macros...................................................135 managing lists .......................................134 protect settings option..........................214 Xstart login macros...............................131 password cache creating .................................................133 deleting .................................................134 Password Expired dialog box.......................157 Paste File To X Selection dialog box..............99 patching Hummingbird products ...............268 PATH .............................................................55 path font database.........................................233 shortcuts ...............................................121

N
NAT support........................................156, 197 native window manager ................................ 93 network connections .......................................... 261 service provider .................................... 201 Network Interfaces dialog box .................... 198 Network Time.............................................. 267 New Macro Properties dialog box......179, 180, 188 NFSD .......................................................37, 60 NIS ...........................................................37, 60 listing maps .......................................... 116

309

Exceed Users Guide

PC standby mode .........................................243 Performance page, Xconfig..........................241 personal installations, overview .....................20 personal user directory...................... 75, 77, 81 automatic update....................................77 manual update ........................................78 PerUser Migration.ini [Directory Mappings.x.yz] section.........80 [Migration Control Options] section ....79 controlling migration .............................79 PerUser Settings.ini [PerUser Installation Parameters] section............................79 [Registry Files] section............................77 associating a .humreg file .......................77 customizing files, folders ........................76 update personal user directory ...............77 physical fonts name matching ............................ 234, 240 resolving names ....................................231 physical keys adding .......................................... 176, 184 deleting .................................................185 layout ....................................................174 mapping keysyms .................................185 physical monitors, screens arranging...............................................224 create, edit.............................................218 Ping...............................................................268 policy file invalid ...................................................212 syntax ....................................................207 ports font server .............................................236 incoming, required ...............................257 IPDisCov daemon ................................197 Power Management page, Xconfig..............247 Print Services................................................271 printing setting printer specifications.................100 product access control creating administrative image ..........2931 on a Terminal Server ..............................29

personal installation......................... 3132 removing from Terminal Server ............ 33 Product Migration dialog box....................... 80 Profile Publishing Wizard ........................... 268 Profile Space Creation Wizard ...................... 58 Profile Space Editor ..................................... 269 Profile Spaces configuring with Sconfig........................ 58 File System.............................................. 58 LDAP...................................................... 58 program maintenance ................................... 18 modifying install state ............................ 18 removing ................................................ 19 repairing ................................................. 18 progress messages, analysing....................... 254 prompts C, Bourne shells ................................... 140 multiple sessions .................................. 136 password expiry....................135, 157, 158 server restart ......................................... 161 Xstart timeout ...................................... 109 properties Exceed, Xconfig Console ......................... 5 font ....................................................... 230 macro events ........................................ 180 security policy file, Xweb ..................... 207 XKeys, macro ....................................... 179 XRDB database .................................... 220 properties, setting with Sconfig...............37, 46 adding..................................................... 46 removing ................................................ 47 Protocol page, Xconfig ................................ 216 Provider List dialog box .............................. 201 Proxy Server Console .................................. 270

Q
query startup mode ..................................... 123 Quick Script Editor...................................... 268

R
registering the product .................................. 25 registry entries adding and removing ............................. 76

310

Index

adding per-user ...................................... 77 registry keys, setting with Sconfig ...........37, 49 removing ................................................ 50 remote configuration, Xconfig Console........... 167 process.................................................... 88 window managers ............................85, 92 Remote Tools............................................... 268 re-ordering font directories ..................................... 234 font servers ........................................... 234 requirements for installation ......................... 12 re-sizing fonts .............................................. 236 resolving connection problems ........................... 258 restricting host access .................................. 206 REXEC required port number .......................... 257 Xstart ............................................101, 138 RGB database.......................................166, 246 syntax.................................................... 225 Rgb.txt file............................................225, 247 root size Screen Definition ................................. 218 Run dialog box Xstart .................................................... 106 running an Xstart file ......................................... 103 multiple Exceed X servers .................... 150 multiple X clients ................................. 136 multiple Xstart sessions per host ......... 137 Windows programs.............................. 136 X clients ................... 85, 88, 122, 123, 126 Xstart from command line .................. 137 rxplugin configuration file ..........157, 211, 212

S
save unders................................................... 242 saving a password ............................................ 132 images, windows .................................. 242 .mst files.................................................. 71

scalable font..................................................236 Sconfig............................................. 34, 35, 269 Screen (definition) page, Xconfig................219 screens configuring ...........................................219 scrolling in X applications ...........................187 search order .....................................................234 secure shell ...................................................103 security .........................................................213 changing the Xconfig password ...........164 Connectivity Secure Shell .....................157 controlling host access..........................206 extension password ..............................208 files ........................................................206 host access control list ..........................209 invalid configuration files.....................212 password aging .....................................157 password expiry prompts, UNIX .........135 password protect...................................214 policy file...............................................207 settings ..................................................205 user access control list ..........................210 user-level...............................................157 X11 authentication ...............................157 Xconfig settings ....................................205 Xweb .....................................................207 Security page, Xconfig..................................205 Select Computer dialog box.........................168 selecting keyboard files........................................170 startup methods....................................101 transport interfaces...............................201 X selection type.....................................226 Seltest copying images to Clipboard .................99 example, building ...................................98 pasting images from Clipboard..............98 server error messages ......................................260 settings in Xconfig........................................162 access control........................................206 CJK Input..............................................190

311

Exceed Users Guide

comparing, tracing modifications ........169 customizing Exceed X server................165 display ...................................................225 mandatory.............................................215 mouse options ......................................185 Performance .........................................241 Screen Definition..................................218 security..................................................205 startup mode.........................................195 System Administration.........................213 Transports.............................................201 Troubleshooting ...................................245 X Selection ............................................226 XKeys ....................................................173 Setup Wizard advertisement mode ...............................22 installation modes, overview ..................11 shortcuts installing, Xstart....................................106 path .......................................................121 Xstart, Xsession.....................................106 shortcuts, setting with Sconfig ................ 37, 51 showing host reply ..............................................111 silent installation ............................................21 single window mode ............................. 93, 218 sleep mode (Power Management)...............243 Smart Card Manager........................................6 SMS, Microsoft System Management Server ........................23 specifying a vendor string ......................................217 locale name ...........................................191 path shortcuts .......................................121 standby function ..........................................247 starting a host session ..........................................85 CDE ......................................................152 local window managers ..........................91 multiple X clients..................................144 multiple X clients, Windows programs..........................136 remote window managers ............... 85, 92

X clients ...........85, 88, 122, 123, 125, 126 X Clients with DISPLAY not defined (Unix Hosts).................................... 141 X clients with DISPLAY not defined (Unix Hosts).................................... 141 X clients with DISPLAY not defined (VMS Hosts).................................... 141 Xstart from a command line................ 137 startup commands, window managers ......... 92 startup file .................................................... 139 creating for Xstart ................................ 104 startup method ......................................92, 101 CDE ...................................................... 153 DECnet................................................. 120 hRPS, troubleshooting......................... 258 multiple X clients ................................. 136 RSH, troubleshooting .......................... 258 Secure Shell .......................................... 155 TELNET ............................................... 155 VMS systems ........................................ 120 Windows applications.................. 107, 136 Xsession................................................ 150 startup modes Passive .................................................. 122 selecting ................................................ 195 XDMCP Broadcast............................... 126 XDMCP Indirect.................................. 125 XDMCP Query .................................... 123 status font directories ............................. 233, 234 host information .................................. 115 storage buffer, temporary ............................ 227 syntax alias file, font ........................................ 240 Appdb.txt ............................................. 112 display parameter, Bourne Shell .......... 108 host access control list.......................... 209 log file ................................................... 245 RGB database ....................................... 225 Rupdb.txt rules..................................... 115 security policy file................................. 207 startup commands ................................. 92 Xstart, command line .......................... 137

312

Index

system administration settings..........................................162, 213 System Administration page, Xconfig......... 213 system display, setting ................................. 225 system loads, balancing ............................... 117

T
TCP/IP...........................................85, 123, 126 IPDisCov service .................................. 156 starting X clients................................... 141 startup methods ................................... 103 transport errors .................................... 260 Xstart on a VMS system....................... 120 Technical Support ....................................... 299 TELNET....................................................... 136 required port number .......................... 257 temporary storage buffer ............................. 227 Terminal Server product access control ........................... 29 removing product access control........... 33 testing........................................................... 243 timeouts XDMCP................................................ 128 Xstart .................................................... 109 TN3270 emulation ...................................... 270 TN5250 emulation ...................................... 270 trace file disassembling ....................................... 263 troubleshooting.................................... 255 Traceroute.................................................... 268 tracing disassembling trace file ........................ 263 server operation ................................... 259 transform files. See MST files. Transport Monitor ...................................... 261 overview ................................................... 5 using ..................................................... 257 Transport Settings dialog box ..................... 122 transports..................................................... 201 activity .................................................. 262 confirming operation........................... 261 error messages ...................................... 260 support ................................................... 85

Transports page, Xconfig.............................201 troubleshooting............................................260 Exceed diagnostics................................254 installation ............................................251 log and trace..........................................255 log file........................................... 245, 255 logs and trace operations......................255 progress messages.........................254255 resolving connection problems ............258 settings ..................................................245 tracing ...................................................259 Transport Monitor ...............................257 transport operation ..............................261 Xdis .......................................................263 Xstart............................................ 111, 254 trusted/untrusted clients..................... 157, 211 tuning server performance.................. 242, 243 two-button mouse .......................................189

U
uninstalling controlling per-user................................81 UNIX commands ............................................139 hosts ......................................................141 IP Discovery..........................................198 updating databases ...............................................166 the product ...........................................268 user access control list..................................210 user directory, installation .............................13 user files per-machine and per-user......................14 user ID macros .............................................135 User Information dialog box .........................89 user settings migrating with Sconfig ...........................57

V
vendor string, specifying ..............................217 Video page, Xconfig.....................................225 viewing font database.........................................230

313

Exceed Users Guide

log file....................................................245 log files ..................................................255 NIS maps ..............................................116 server error messages............................260 the log file..............................................245 Virtual Desktop enabling ................................................279 statements .............................................282 virtual private network........................ 197, 198 external addresses .................................196 IP discovery...........................................197 support..................................................156 VMS commands ..........................................139 VMS systems DECnet transports................................120 TCP/IP transports ................................120 Xstart.....................................................120 VPN. See virtual private network. VT.................................................................270

Windows Installer Database file. See MSI files. workspaces................................................... 169 WyseTerm ................................................... 271

X
X Client Startup Wizard....................... 4, 5, 85 X clients authorizing ........................................... 211 copying and pasting data ..................... 100 launching................. 85, 88, 122, 123, 126 security ................................................. 211 starting multiple................................... 144 trusted and untrusted........................... 157 XDMCP Broadcast startup mode........ 126 XDMCP Indirect startup mode........... 125 X Compose Mapping dialog box ................ 181 X Display Manager ...................................... 125 X screens ...................................................... 219 X screens, modifying ................................... 219 X selection commands............................................ 226 copy, paste options............................... 226 X Selection page, Xconfig............................ 226 X Windows overview ................................................... 3 X Window manager ............................... 93 X11 authentication ...................................... 157 Xauthority.................................................... 157 Xauth files.....................................206, 210 *.xcfg file ...................................................... 215 external access ...................................... 165 Xcommands................................................. 139 Xconfig.............................................4, 161, 162 overview ...........................................5, 161 changing settings.................................. 165 changing the password......................... 164 command line override........................ 166 controlling host access ......................... 206 creating a security file........................... 206 password............................................... 214 setting security...................................... 205 *.xcfg file............................................... 165

W
window managers overview ..................................................91 HWM............................................. 91, 122 MWM ............................................ 91, 122 Native......................................................91 starting local............................................91 starting remote managers .......................92 startup commands..................................92 window modes overview ..................................................93 multiple...................................................93 settings ..................................................218 single .......................................................93 switching...............................................218 Windows applications launching on hosts....................... 107, 136 Windows Installer overview ..................................................11

314

Index

Xconfig applications Advanced Settings (Display and Video) ........................ 226 Advanced Settings (Font Management) ........................ 235 CJK Input ............................................. 190 Communication Settings ..................... 195 Font ...................................................... 228 Keyboard Input .................................... 170 Mouse Input......................................... 186 Performance......................................... 241 Power Management ............................. 247 Protocol................................................ 216 Screen (definition) ............................... 219 Security and Access Control Settings .. 205 System Administration ........................ 213 Transports ............................................ 201 Transports Settings .............................. 201 Video .................................................... 225 X Selection............................................ 226 Xconfig Console .................................. 167169 Xconfig Mandatory Settings window.......... 215 Xconfig Password dialog box ...................... 164 *.xdb file....................................................... 229 Xdis ..............................................256, 259, 263 XDM modes, overview................................ 195 XDMCP modes, overview................................... 195 CDE ...................................................... 152 Communication page, Xconfig............ 196 host list .........................................200, 201 IP discovery .................................. 198199 multiple X display ..........................94, 151 required port number .......................... 257 timeouts................................................ 128

XDMCP Broadcast.......................... 4, 126, 201 XDMCP Display Manager Chooser dialog box 125, 127 XDMCP Idle dialog box ..............................128 XDMCP Indirect..........................................125 XDMCP Query ....................................... 4, 123 XDMCP Query dialog box ..........................124 XDMCP Startup Modes dialog box... 122126, 196, 199, 200 Xdmcp.txt ........................................... 200, 201 Xfonts remote configuration............................169 Xhost.txt file ........................................ 206, 209 XKeys..................................................... 95, 173 mapping dialog box..................... 176, 178 Xperf.............................................................243 XRDB database ................................... 218, 220 Xrdb.txt file ..................................................220 xrx configuration file................... 157, 211, 212 Xsession overview........................................... 5, 145 creating a file.........................................148 file sequence..........................................149 modifying a file .....................................148 multiple CDE sessions..........................153 multiple Exceed X servers.....................150 running multiple sessions.....................145 shortcuts, creating ................................106 starting X clients, programs..................136 Xsession Options dialog box ...... 145, 149150 Xstart overview........................................... 6, 101 browsing for hosts ................................111 changing information, multiple files....135 creating a startup file ............................104 events ....................................................103 functional details ..................................101 installing a shortcut ..............................106 login macros .........................................131 optimizing system loads .......................117 required port number...........................257 shortcuts, creating ................................106 startup methods........................... 101, 103

315

Exceed Users Guide

timeouts ................................................109 troubleshooting ....................................111 universal login ......................................132 using on VMS systems..........................120 Xstartd daemon ....................................103 Xstart Global Options dialog box ...... 131, 133, 134, 135 Xstart Information dialog box .... 103, 110, 133 Xstart Settings dialog box ........... 105, 154, 200 Xstart, commands ........................................108 login macros .........................................131 macros...................................................131 Xstart, displaying errors.....................................................111 host reply ..............................................111 login information .................................110

Xstart, password .......................................... 134 change, UNIX prompt ................. 157, 158 deleting cache....................................... 134 expiry, UNIX........................................ 135 list ......................................................... 134 Xstart, running files ...............................................103, 106 from command line ............................. 137 multiple sessions per host .................... 137 sessions ................................................. 145 Xstartd daemon ........................................... 103 Xweb ............................................................ 205 installation............................................ 143 security ................................................. 207 setup ..................................................... 143 trusted/untrusted clients...................... 157 Wizard...................................................... 4

316

You might also like