![]() |
![]()
| ![]() |
![]()
NAME
SYNOPSIS
DESCRIPTIONThe - Configuring Time Zone - Configuring
Hostname/Domain - Configuring Network
Interfaces - Configuring Default
Router/Gateway - Configuring DNS
nameservers The following options are available:
This utility provides either a Terminal (using
dialog(1),
the default) or Graphical (using
Xdialog(1),
passing In many cases, DEPENDENCIESThe following standard commands are required by
awk(1), cat(1), chmod(1), chown(8), chsh(1), cmp(1), cp(1), date(1), df(1), dhclient(8), dialog(1), find(1), grep(1), hostname(1), id(1), ifconfig(8), mktemp(1), mv(1), printf(1), rm(1), route(8), sed(1), sh(1), sleep(1), stat(1), strings(1), su(1), sudo(8), tail(1), tzsetup(8), uname(1), which(1) The following standard commands are optional, based on arguments
passed and situation, but enhance the abilities of
FILES
EXAMPLESBelow are some simple examples of how
Launches the default console-based
user interface (must be root) sudo Prompts for
sudo(8)
credentials if not already root before launching the default console-based
user interface with escalated privileges sudo Launches the gaphical user interface
as root in a compatible X11 environment (requires appropriate DISPLAY
variable)
By default, root privileges are
required to make the sorts of changes that are required during system
configuration. This usually means launching via
sudo(8) as
in the above example. However, when executing from another X11 application,
this utility may need to escalate privileges to function properly. The
addition of the -s flag causes the user to be prompted with
Xdialog(1)
for sudo(8)
credentials. LIMITATIONSThe Other limitations are self-imposed for safety reasons. For
example, Another self-imposed limitation is that while you are allowed to view and change the hostname while connected via an X11-Forwarded ssh(1) session, you are not allowed to activate the new hostname until re-executed from either a local terminal or non-X11-Forwarded ssh(1) session (preventing the fatal error “X11 connection rejected because of wrong authentication”). SEE ALSOAUTHORSDevin E. Teske.
|