You are on page 1of 296

Exceed

Users Guide

8370-2M

Exceed Users Guide


0710 8370-2M
8/15/01
Hummingbird Ltd.
1 Sparks Avenue, Toronto, Ontario, Canada M2H 2W1
Tel: +1-416-496-2200 Toll Free Canada/USA: 1-877-FLY-HUMM (1-877-359-4866)
Fax: +1-416-496-2207
E-mail: support@hummingbird.com or getinfo@hummingbird.com
FTP: ftp.hummingbird.com
For more information, visit www.hummingbird.com
RESTRICTED RIGHTS LEGEND. Unpublished rights reserved under the copyright laws of the United States. The SOFTWARE is provided with
restricted rights. Use, duplications, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c) (1)(ii) of The
Rights in Technical Data and Computer Software clause at DFARS 252.227-7013, subparagraph (c)(1) and (2) (a) (15) of the Commercial Computer
Software-Restricted Rights clause at 48 CFR 52.227-19, as applicable, similar clauses in the FAR and NASA FAR Supplement, any successor or
similar regulation.
Information in this document is subject to change without notice and does not represent a commitment on the part of Hummingbird Ltd. Not all
copyrights pertain to all products.
19902001 Hummingbird Ltd. All rights reserved.
Exceed, Exceed 3D, Exceed onDemand, Exceed PowerSuite, Exceed X Development Kit, Exceed Web, HostExplorer Print Services, HostExplorer,
HostExplorer Web, HostExplorer Deployment Wizard, Hummingbird Connectivity Security Pack, Hummingbird Basic Language,
Hummingbird CAP, CAP Server, Hummingbird e-Toolkit, JuMP, Enterprise Toolkit for JuMP, Hummingbird e-Gateway, Hummingbird FTP,
Hummingbird G2G, Hummingbird Web Server, Hummingbird SOCKS Client, NFS Maestro, NFS Maestro Gateway, NFS Maestro Server,
NFS Maestro Solo, PrintExplorer, Web Update, and XWeb are trademarks of Hummingbird Ltd. and/or its subsidiaries.
ACKNOWLEDGEMENTS Some portions of the code have been contributed by MIT. Portions copyright Blue Sky Software Corporation.
OpenGL is a registered trademark of Silicon Graphics Inc. All rights reserved.
All other copyrights, trademarks, and tradenames are the property of their respective owners.
FONTS The fonts distributed are included free of charge. Some of the fonts were donated towards Exceed development by Adobe Systems Inc.,
Bitstream Inc., MIT and Sun Microsystems. Each font contains a copyright message describing the owner of the font.
DISCLAIMER Hummingbird Ltd. software and documentation has been tested and reviewed. Nevertheless, Hummingbird Ltd. makes no
warranty or representation, either express or implied, with respect to the software and documentation included. In no event will Hummingbird Ltd.
be liable for direct, indirect, special, incidental, or consequential damages resulting from any defect in the software or documentation included with
these products. In particular, Hummingbird Ltd. shall have no liability for any programs or data used with these products, including the cost of
recovering such programs or data.

Contents

Chapter 1: Introducing Exceed


1
About Exceed ........................................................................................................................... 3
Exceed Applications ............................................................................................... 4
Exceed Tools ........................................................................................................... 6
Other Exceed Products ............................................................................................................ 6
Exceed X Development Kit (XDK) ........................................................................ 6
Exceed 3D .............................................................................................................. 6
Accessibility .............................................................................................................................. 7
Microsoft Accessibility Options ............................................................................. 8
Hummingbird Information Resources .................................................................................. 8
Documentation Resources ..................................................................................... 8
Technical Support .................................................................................................. 9
Mailing Lists and User Groups ............................................................................. 10
Chapter 2: Installing Exceed
13
Overview ................................................................................................................................ 15
Windows Installer Technology ............................................................................. 15
Hummingbird Setup Wizard ................................................................................ 17
Multi-Language Support ...................................................................................... 19
Preparing to Install ................................................................................................................ 20
Installation Requirements .................................................................................... 21
Choosing a Setup Type ......................................................................................... 23
Installation Directories ......................................................................................... 24
Installed Files ........................................................................................................ 25
Installation and Maintenance ............................................................................................... 27
Personal Installation ............................................................................................. 27
Setup Types .......................................................................................................... 30
Program Maintenance for Personal Installations ................................................ 35
Administrative Installation .................................................................................. 36

Exceed Users Guide

Typical Installation Scenarios ............................................................................................... 40


Personal Installations ........................................................................................... 40
Installing onto a Terminal Server ......................................................................... 42
Advertised Product ............................................................................................... 42
Silent Installation .................................................................................................. 43
Shared Installation ................................................................................................ 46
Hummingbird Sconfig .......................................................................................... 47
Preserving User Profiles ........................................................................................................ 48
Version 6.2 User Profiles ...................................................................................... 48
Version 7.0 User Profiles ...................................................................................... 49
Updating the Product ............................................................................................................ 49
Registering ............................................................................................................................. 50
Chapter 3: Installing on a Terminal Server
51
Overview ................................................................................................................................ 53
Installing Exceed Products on a Terminal Server ................................................................ 53
Stage 1: Creating an Administrative Copy Image ................................................. 53
Stage 2: Personal Installation ................................................................................ 55
Uninstalling Exceed Products from a Terminal Server ....................................................... 58
Chapter 4: Connecting to Hosts and Running X Clients
61
Connecting to Hosts .............................................................................................................. 63
Using the Client Wizard ....................................................................................... 63
Creating a Startup File .......................................................................................... 64
Browsing for Hosts and Applications ................................................................... 68
Load optimization ............................................................................................... 71
Creating an Xstart Shortcut .................................................................................. 75
Running the Xstart File ......................................................................................... 76
Creating a Wstart File ........................................................................................... 78
Common Desktop Environment (CDE) .............................................................................. 79
Using Desktop Environments for Linux .............................................................. 79
Window Modes ..................................................................................................................... 80
Configuring the Window Mode ........................................................................... 81
Using Window Managers ..................................................................................................... 84
Starting HWM or MWM ..................................................................................... 85
Starting Remote X Window Managers ................................................................. 85

iv

Contents

Copying and Pasting .............................................................................................................. 87


Using a Temporary Storage Buffer ...................................................................... 87
Copying and Pasting Data ................................................................................... 88
Copying and Pasting Graphics ............................................................................ 89
Copying and Pasting Between X Clients .............................................................. 91
Automatic ............................................................................................................ 92
Chapter 5: Advanced Connection Methods
93
Advanced Xstart Features ...................................................................................................... 95
Using Login Macros ............................................................................................. 95
Creating a Universal Login ................................................................................... 96
Optimizing System Loads ..................................................................................... 97
Running Multiple Xstart Sessions on One Host .................................................. 98
Running Multiple Xstart and Wstart Sessions ..................................................................... 99
Running the Xsession ..........................................................................................101
The Xsession File Sequence .................................................................................102
Creating an Xsession Shortcut ............................................................................102
Using Exceed on a Remote PC ........................................................................................... 103
Setting Up X Web ................................................................................................104
Chapter 6: XconfigConfiguring Exceed
105
About Xconfig ...................................................................................................................... 107
Keyboard Input .................................................................................................................... 108
Keyboard .............................................................................................................108
Mouse Input Settings .......................................................................................................... 110
Communications ................................................................................................................. 113
Setting the Sequence of Events ............................................................................113
Security ................................................................................................................................. 114
Configuring Exceed X Server and X Screen ....................................................................... 119
X Server Options and Extensions ........................................................................119
Defining a Broadcast Address ............................................................................121
Configuring X Screens .........................................................................................122
X Display, X Selection Type, and PC Standby Function ................................................... 123
Setting the Display ...............................................................................................123
Multiple X Display Support ................................................................................124
Specifying X Selection Type ................................................................................126
Controlling your PC Standby Function ..............................................................127
v

Exceed Users Guide

Maximizing System Performance ....................................................................................... 128


Selecting Fonts ..................................................................................................................... 130
Managing the Font Database .............................................................................. 131
Accessing the Font Server ................................................................................... 133
Creating Font Aliases .......................................................................................... 133
Creating Several Aliases ...................................................................................... 134
Input Methods for Chinese, Japanese, and Korean ........................................... 136
Special Considerations for Traditional Chinese ................................................. 138
Using Xstart on VMS Systems ............................................................................................ 141
TCP/IP Transports .............................................................................................. 141
DECnet Transports ............................................................................................. 141
Chapter 7: System AdministrationSconfig and Jconfig
143
Customizing Installations with Sconfig ............................................................................. 145
About Windows Installer Database Files ............................................................ 145
Microsoft Transform Files .................................................................................. 146
Working with Transform Files in Sconfig .......................................................... 146
About Creating Transform Files in Sconfig ........................................................ 147
Customizing Product Directories ....................................................................... 149
Selecting Features to Install ................................................................................ 150
Selecting Files to Install ...................................................................................... 151
Setting Product Properties .................................................................................. 154
Setting the Registry ............................................................................................. 158
Setting Shortcuts ................................................................................................. 161
Setting Exceed Properties ................................................................................... 162
Setting Custom Font Directories and Servers .................................................... 164
Setting Paths for Font Directories/Servers ......................................................... 171
Saving the .mst File ............................................................................................ 172
Applying the .mst File to an Install .................................................................... 172
Creating Multiple Custom Installations ............................................................. 173

vi

Contents

Configuring Remote Hosts ................................................................................................. 174


How Remote Configuration Works ....................................................................174
Configurable Remote Services .............................................................................175
Installing Jconfig .................................................................................................177
Running Jconfig in a Java-Enabled Browser .......................................................178
Opening a Configuration Session .......................................................................179
Configuring the Jconfig Application Settings .....................................................180
Configuring the Remote Services for a Host .......................................................183
Using Scripts to Configure Multiple Hosts .........................................................184
Locking a Configuration Session .........................................................................185
Chapter 8: System AdministrationInetd and Inetd Admin
187
Introducing Inetd ................................................................................................................ 189
TCP and UDP Servers .........................................................................................189
Maintaining System Security .............................................................................................. 190
Security for Windows 95/98/Me .........................................................................190
Security for Windows NT/2000 ...........................................................................190
Default Services .................................................................................................................... 192
Managing Services ............................................................................................................... 201
Configuration Parameters ...................................................................................204
Administering Daemon SecurityInetd Admin .............................................................. 209
Users and Passwords ...........................................................................................209
Managing Access .................................................................................................211
Chapter 9: Hummingbird Directory Services
217
Introducing Directory Services Applications ..................................................................... 219
About Hummingbird Directory Services ............................................................219
About Directory Services Explorer ......................................................................219
Opening Directory Services Applications ...........................................................220
Directory Services Overview ............................................................................................... 221
Directory Service Protocols .................................................................................222
Directory Service Objects ....................................................................................223
Server Architecture ..............................................................................................224

vii

Exceed Users Guide

Binding to a Domain ........................................................................................................... 224


About Directory Service Profiles ........................................................................ 225
Creating a Profile ................................................................................................ 226
Opening a Properties Dialog Box ....................................................................... 228
Binding to NIS .................................................................................................... 229
Binding to NIS+ .................................................................................................. 230
Keylogin and the System Profile ......................................................................... 234
Binding to LDAP ................................................................................................ 235
Using Hummingbird Directory Services ............................................................................ 240
Selecting a Service ............................................................................................... 240
Modifying a Profile ............................................................................................. 240
Disabling User Profiles ....................................................................................... 241
Specifying a Host Lookup Service ...................................................................... 242
Synchronizing Windows and UNIX Passwords ................................................. 242
Running Keylogin ............................................................................................... 243
Running Command Line Applications ............................................................... 244
Using Directory Services Explorer ...................................................................................... 245
Querying Directory Service Objects ................................................................... 245
Sorting Query Results ......................................................................................... 246
Saving Query Results .......................................................................................... 247
Viewing Object Properties .................................................................................. 247
Modifying a Profile ............................................................................................. 248
Changing a Domain Password ............................................................................ 249
Chapter 10: Troubleshooting
251
Installation Troubleshooting .............................................................................................. 253
Exceed Diagnostics .............................................................................................................. 256
Troubleshooting Xstart ....................................................................................... 256
Logs and Trace Operations ................................................................................. 258
Appendix A: Connectivity Applications
261
Accessories ........................................................................................................................... 263
HostExplorer Accessories .................................................................................................... 264
System Administration ........................................................................................................ 266
Index

viii

269

Chapter 1
Introducing Exceed

About Exceed
Exceed Applications
Exceed Tools

3
4
6

Other Exceed Products


Exceed X Development Kit (XDK)
Exceed 3D

6
6
6

Accessibility
Microsoft Accessibility Options

7
8

Hummingbird Information Resources


Documentation Resources
Technical Support
Mailing Lists and User Groups

8
8
9
10

Chapter 1: Introducing Exceed

About Exceed
Exceed lets you access applications on UNIX workstations from existing
Windows 2000, Windows NT, Windows 95/98/Me, and Windows 3.x-based
personal computers. It lets you run and display UNIX, Linux, VMS, or X
Windows applications (X clients) and integrates your desktop with X
Window Systems, IBM mainframes, and the Internet.
Exceed includes innovative features that accelerate performance, simplify
system administration, optimize personal computing, and delivers ease of
use. Users are shielded from the complexities of network computing by
working within the familiar Microsoft Windows environment. Exceed is an
integrated part of the Hummingbird Host Access Solutions product family
which provide organizations with a comprehensive Host Access and
Network Connectivity solution.
For an overview of the
applications available in
Exceed, see Exceed
Applications on page 4.

By using Exceed to run remote applications on your local PC, you can:

access powerful applications and information running on networked


hosts

establish simultaneous connections to different computers running X


clients

use an appropriate window manager to preserve your familiarity with


the PC or X environment

For system administrators, Exceed provides tools to set up, configure and
administer PCs remotely to ensure consistency among systems.

Exceed Users Guide

X Window Systems and Exceed


Exceed converts your PC into an Exceed X server. In the X Window
environment, the Exceed X server is also referred to as an X window
terminal or display server. Without Exceed X server software, X applications
are accessible only via X terminals, UNIX, Linux, and VMS workstations.
Exceed works with your network transport software (TCP/IP, DECnet, or
IPX/SPX) or your modem, to access X Windows applications on host
computers running the X Window System. The host can be any operating
system that is running the X Window environment.
The figure below shows how Exceed lets your PC access the X Windows
environment.
Host terminals
UNIX Host

Transport software
Your PC
Applications

Displays X Window
applications on the
Exceed X server

Exceed Applications
The Exceed software package includes various applications and sub-folders,
each of which serve a distinct function. The folders are listed by function
throughout the manual. The applications are listed and briefly described
below.

Chapter 1: Introducing Exceed

Client Wizard This application guides you through the process of


creating a connection to a host. See "Chapter 4: Connecting to Hosts and
Running X Clients" on page 61 for details.
Exceed Help
Exceed.

This is the Help documentation that is installed with

Xconfig Xconfig is a utility for configuring a variety of Exceed settings:


input, communication, video, protocol, security, window modes,
performance, X selection, fonts, troubleshooting, and transport settings.
For details, see "Chapter 6: XconfigConfiguring Exceed" on page 105.
Xstart Xstart is an application for automating access to hosts and
starting applications. Use Xstart to create Xstart (.xs) startup files and create
shortcut icons to your UNIX, Linux and X applications. When you click on
these icons, they automatically establish a host connection, log on, and then
start an X client, a character-based host application in a terminal emulator
window, or run a host-based script. For details, see "Chapter 4: Connecting
to Hosts and Running X Clients" on page 61.
Xsession Xsession lets you start multiple X clients (Xstart files) and
Windows programs (Wstart files) simultaneously. For details, see
"Chapter 4: Connecting to Hosts and Running X Clients" on page 61.
Exceed X Server Exceed X server is a PCX server that displays graphical
UNIX, Linux, and X applications on your PC.
You can use the Exceed startup applications to connect to a host and display
UNIX, Linux, VMS and X applications on your PC. You can use the Client
Wizard to guide you through this process, or set up the connection
manually.
Throughout this guide, xterm (a UNIX VT100 terminal emulator) is used as
a sample X client. It provides a terminal emulation window on the host, and
a command line where you can start other X clients.

Exceed Users Guide

Exceed Tools
The following tools are shipped with Exceed, and are located in the Tools
folder:
HWM This tool is Hummingbirds local Motif-like window manager. It is
a local X client that provides you with a graphical interface that you can use
to start and exit clients, and position and iconize the windows on your
display. For more information, see Starting HWM or MWM on page 85
or the Exceed Help.
Transport Monitor This tool lets you monitor the status of current
connections and the total number of open connections. It also indicates
whether your transport is operating successfully. For more information, see
the Exceed Help.
Xdis The X disassembler is a diagnostic tool that lets advanced Exceed
users and system administrators view Exceed trace files. It is a Java
component and requires the Java Virtual Machine. For more information,
see the Exceed Help.
MWM and KINPUT2 tools are shipped with Exceed XDK. For more
information, see the Exceed X Development Kit Users Guide.

Other Exceed Products


These products are not
included with Exceed. To
acquire Exceed XDK and
Exceed 3D, contact a
Hummingbird sales
representative.

Exceed X Development Kit (XDK)


The X Development Kit (XDK) lets you create your own local X clients and
port programs originally developed for the X environment so that they run
on your PC. For more information on the XDK application, refer to the X
Development Kit User's Guide.

Exceed 3D
This application lets you display OpenGL-based X applications, and lets you
create OpenGL X applications with Exceed XDK. OpenGL is a 3D graphics
software interface that lets you create interactive programs that produce still
or animated 3D color objects, including shading, lighting, and other effects.

Chapter 1: Introducing Exceed

Exceed 3D interprets OpenGL calls from an X application, and sends the


information to the video card on your PC. For more details, refer to the
Exceed 3D Users Guide.

Accessibility
Hummingbird products are accessible to all users. Wherever possible, our
software was developed using Microsoft Windows interface standards and
contains a comprehensive set of accessibility features.
Keyboard shortcuts All menus have an associated keyboard shortcut. To
access any menu, press Alt and the underlined letter in the menu name as it
appears on the interface. For example, to access the File menu in any
Hummingbird application, press Alt+F.
Once you have opened a menu, you can access a menu item by pressing the
underlined letter in the menu item name, or you can use the arrow keys to
navigate the menu list. For menu items with an associated keyboard
shortcut, the shortcut is listed on the menu to the right of the item.
Directional arrows Use the directional arrows on the keyboard to
navigate through menu items or to scroll vertically and horizontally. You
can also use the directional arrows to navigate through multiple options.
For example, if you have a series of radio buttons, you can use the arrow
keys to navigate the possible selections.
Tab key sequence To navigate through a dialog box, press the Tab key.
Selected items appear with a dotted border. You can also press Shift+Tab to
go back to a previous selection within the dialog box.
Spacebar Press the Spacebar to toggle check boxes on and off or to select
buttons in a dialog box.
Esc Press the Esc key to close a dialog box without implementing any new
settings.
Enter Press the Enter key to select the highlighted item or to close a dialog
box with the new settings. You can also press the Enter key to close all About
boxes.

Exceed Users Guide

ToolTips ToolTips appear for all functional icons. This feature lets users
use Screen Reviewers to make interface information available through
synthesized speech or through a refreshable Braille display.

Microsoft Accessibility Options


Microsoft Windows environments contain accessibility options that let you
change how you interact with the software. This feature can add sound,
increase the magnification, and create sticky keys.
To access the Microsoft Windows Accessibility options, open Control Panel
and click Accessibility.
If you installed the Microsoft Accessibility components for your Windows
system, you can also find other Accessibility tools on the Start menu under
Programs/Accessories/Accessibility.
To add the Accessibility components:
1

In Control Panel, double-click Add/Remove Programs.

On the Setup tab, select the Accessibility Options check box and click
Apply.

Click OK.

Hummingbird Information Resources


Hummingbird provides the following sources of information regarding
your product.

Documentation Resources
Your product documentation set consists of both print and online sources.
Manuals Hummingbird manuals contain conceptual information on
your product; procedural information on installing and using the product
and related applications; and some manuals contain programming
reference, interface reference, and troubleshooting information.

Chapter 1: Introducing Exceed

All manuals are available in print and online. The online versions require
Adobe Acrobat Reader 5.0 and are installed only if you do a Complete
installation. Your Hummingbird product comes with the following manuals:
Exceed User's Guide
HostExplorer (Host Access) Users Guide
HostExplorer Programmers Guide (in .pdf format only)
Hummingbird Basic Language Programmer's Guide
Online Help The online Help is a comprehensive, context-sensitive
collection of information regarding your Hummingbird product. It
contains conceptual and reference information, and detailed, step-by-step
procedures to assist you in completing your tasks.
Release Notes The release notes for each product contain descriptions of
the new features and details on release-time issues. They are available in
both print and HTML. The HTML version is automatically installed when
you install the software. Read the release notes before installing your
product.

Technical Support
You can contact the Hummingbird Technical Support department Monday
to Friday between 8:00 a.m. and 8:00 p.m. Eastern Time.
Hummingbird Ltd.
1 Sparks Avenue, North York, Ontario, Canada M2H 2W1
Canada and the USA
Technical Support:

International

1-800-486-0095

General Enquiry:

1-877-FLY-HUMM

Main:

+1-416-496-2200

Fax:

+1-416-496-2207

+1-416-496-2200

Exceed Users Guide

Hummingbird Ltd.
1 Sparks Avenue, North York, Ontario, Canada M2H 2W1
E-mail:
FTP:
Online Request Form:
Web Site:

support@hummingbird.com
ftp.hummingbird.com
www.hummingbird.com/support/nc/request.html
www.hummingbird.com/about/contact.html

Mailing Lists and User Groups


For tips, additional help, and contact with other Hummingbird users on all
operating systems, subscribe to Hummingbird Expos Online or join the user
group dedicated to your Hummingbird product.

Subscribing to Hummingbird Expos Online


Hummingbird Expos Online is an electronic mailing list and online
newsletter. It was created to facilitate the delivery of Hummingbird
product-related information. It also provides tips, help, and interaction
with Hummingbird users.
To subscribe to Hummingbird Expos Online:
1

Open your web browser and type the following address:


http://www.hummingbird.com/expose/about.html

In the Subscribe section, type your full name, e-mail address, and
language preference. Then click Subscribe.
Note: To discontinue your subscription, in the Unsubscribe
section, type your e-mail address then click Unsubscribe.

To subscribe to the Mailing List or User Group:


1

Open your web browser and type the following address:


http://www.hummingbird.com/support/usergroups.html

2
10

On the User Groups and Mailing Lists page, click a product link.

Chapter 1: Introducing Exceed

On the Archives page, scroll down to the Subscription Instructions.

In the Online Subscriptions section, type the name you want to display
on the User Group and your e-mail address.

Click Subscribe. The browser opens a confirmation page to tell you your
subscription was successful. You can now post messages to the User
group. See posting instructions in Joining a User Group below.
Note: To discontinue your subscription, in the Online
Unsubscriptions section, type your e-mail address then click
Unsubscribe.

To search the mailing list archives:


Go to the following web site:
http://www.hummingbird.com/support/usergroups.html

Joining a User Group through E-mail


The user group is an unmoderated electronic mailing list that facilitates
discussion of product-related issues and UNIX issues to help users resolve
common problems and to provide tips, help, and contact with other users.
To join a User Group:
1

Send an email to listserv@hummingbird.com. Leave the Subject line


blank.

In the body of the e-mail message, type the following:


subscribe exceed-users Your Name

To post a message to a User Group:


Create an e-mail and send it to the following address:
exceed-users@hummingbird.com

11

Chapter 2
Installing Exceed

Overview
Windows Installer Technology
Hummingbird Setup Wizard
Multi-Language Support

15
15
17
19

Preparing to Install
Installation Requirements
Choosing a Setup Type
Installation Directories
Installed Files

20
21
23
24
25

Installation and Maintenance


Personal Installation
Setup Types
Program Maintenance for Personal Installations
Administrative Installation

27
27
30
35
36

Typical Installation Scenarios


Personal Installations
Installing onto a Terminal Server
Advertised Product
Silent Installation
Shared Installation
Hummingbird Sconfig

40
40
42
42
43
45
47

Preserving User Profiles


Version 6.2 User Profiles
Version 7.0 User Profiles

48
48
49

Updating the Product

49

Registering

50

Chapter 2: Installing Exceed

Overview
The Hummingbird Setup Wizard (beginning with version 7.0) supports
Windows Installer technology. Setup Wizard is based on three standard,
top-level user interfaces or modes: installation, administration, and
advertisement. Each defines a different installation path and user interface
flow.
The following sections in this chapter provide:

For more information, see


see Preserving User
Profiles on page 48.

an overview of the technology

an outline of the installation requirements and preparations

installation procedures and program maintenance

advanced implementation scenarios


a procedure for migrating user profiles from earlier versions

Note: You cannot preserve user profiles for products before


version 6.2.

For information about updating products (version 7.x or greater), see


Updating the Product on page 49.

Windows Installer Technology


For more information about
Windows Installer, see the
documentation available in
the MSDN online library at
msdn.microsoft.com

Windows Installer copies


files onto the hard disk,
modifies the registry,
creates shortcuts on the
desktop, and displays
dialog boxes that prompt
for user input.

The Windows Installer service is an operating system component that acts


as a setup engine. The installer includes:

an operating system-resident installation service

a standard format for component management

a management API (such as Hummingbird Setup Wizard) for


applications and tools

Windows Installer consists of a client-side installer service (Msiexec.exe)


and a Microsoft Software Installation (.msi) package file. The installer uses
information in the package file to install the Hummingbird product.
Msiexec.exe is called by Hummingbird Setup Wizard and uses a dynamiclink library (.dll) to read the package files, apply transformation (.mst)
files, and incorporate options supplied by Setup Wizard.
15

Exceed Users Guide

For more information, see


Multi-Language Support
on page 19.

Windows Installer changes the registered file type of .msi files so that
double-clicking the file runs Msiexec.exe with the .msi file. Each .msi
package file contains a relational database that stores instructions and data
required to install (and uninstall) the program.
Note: Double-clicking an .msi file that requires language
translation produces an error message (Error 2803). Instead, run
Hummingbird Setup Wizard (setup.exe) and select the
appropriate setup language in the user interface.

The installer eliminates the need to run a setup engine on each target
computer. Since installations are run through this common engine, the
operating system can keep track of installation databases.
The key benefits of this technology are:

efficient management of shared resources

consistent installation rules

easy customization

choice of what pieces of the application are installed

the ability to diagnose and repair problems at run-time

These and other benefits are outlined below:


Consistent Installation and Setup Rules Windows Installer ensures all
setup rules are implemented by the operating system. To follow those rules
and avoid problems, a Hummingbird application describes itself in the
standard Windows Installer format. The installer then performs the
installation duties on behalf of the application.
Restores computer state if installation fails Windows Installer tracks
changes made to the system during the installation process. If the
installation fails, the installer restores the system to its initial state.

16

Chapter 2: Installing Exceed

Prevents program conflicts Conflicts occur, for example, when an


installation operation updates a dynamic-link library (.dll) file shared by
an existing program (sometimes replacing a newer .dll with an older one),
or when an uninstall operation deletes a .dll file shared by another
program. This might cause the computer to stop responding. The installer
enforces installation rules that help prevent such conflicts.
Diagnoses and repairs corrupted or damaged files Windows Installer
can determine whether an installed program has missing or corrupted files.
The installer repairs the program as necessary by replacing only those files.
Reliably uninstalls existing programs Windows Installer reliably
uninstalls any program it previously installed. All the associated registry
entries and program files are removed, except for those shared by other
software.
For more information about
Sconfig for Windows
Installer, see the System
AdministrationSconfig
and Jconfig chapter in
this manual.

Supports Hummingbird Sconfig Sconfig is an advanced system


administration tool that lets administrators customize the Setup Wizard
program.

Hummingbird Setup Wizard


Hummingbird Setup Wizard is the interface displayed by Windows
Installer. Setup Wizard does the following:

uses the Windows Installer service to maintain the applications and


resources installed on the computer

determines the correct path to specific components

ensures that applications do not point to missing files

The Windows Installer service views all applications as three logical


building blocks: products, features, and components. For more details
about these terms, see the following sub-sections.

Products
A product represents a single Hummingbird product such as Exceed, NFS
Maestro, or HostExplorer. Products consist of one or more features. Each
product is described to the Windows Installer service in the form of a single
package file (.msi) or installation database.

17

Exceed Users Guide

Products do not own any resources directly, but they do have globallyunique identifiers known as Product Codes. These enable the service to
identify applications that are clients of a given component. Windows
Installer service maintains a list of client products for each component.
Product Codes let the service determine if a given product is already
installed on a particular computer.

Features
Features are the individual pieces of an application that you can choose to
install. Typically, they represent the functional features of an application.
When you select Custom in the Setup Wizard program, the interface
provides you with a tree that is composed of features (and sub-features). An
example of a feature is X Server or Traceroute.

Components
A component is the smallest and most fundamental of the three logical
building blocks. A component is a collection of files, registry keys, and other
resources that are all installed or uninstalled together. When a given
component is selected for installation or removal, all of the resources in that
component are either installed or removed.
Components are invisible to the user; Hummingbird Setup Wizard manages
whatever components make up a given Hummingbird application.
Examples of components include single files, a group of related files, COM
objects, registration, registry keys, shortcuts, resources, libraries grouped
into a directory, or shared pieces of code.

18

Chapter 2: Installing Exceed

Multi-Language Support
Hummingbird Setup Wizard can perform installation for the following
languages:
Language

Transform File

German

1031.mst

English1

1033.mst

Spanish

1034.mst

French

1036.mst

Italian

1040.mst

Portuguese

2070.mst

English (United States) is the default installation language. Some Hummingbird


products are available only in English. For more information, see the table on
page 20.

Each language has an associated .mst transform file. Depending on the


language selected, Setup Wizard applies the appropriate .mst file to the
original .msi (which initially does not contain any user interface).
You can by-pass Setup Wizard and apply a language transformation using
the following command line syntax:
For more information about
Msiexec command line
options, see the Windows
Installer documentation in
the MSDN online Library at
msdn.microsoft.com
or on CD-ROM via
subscription.

msiexec /i path TRANSFORMS=filename.mst

where path is the path to the .msi file, and filename.mst is the appropriate
transform file listed in the table above. For example, the following applies
an English transformation to Exceed:
msiexec /i Hummingbird Exceed.msi TRANSFORMS=1033.mst

19

Exceed Users Guide

The following are the multi-language support options for Hummingbird


products:
Product

Support Language(s)

Exceed

German, English, Spanish, French,


Italian, Portuguese

Exceed 3D
Exceed XDK
Exceed PowerSuite
Hummingbird Connectivity Security Pack
HostExplorer
HostExplorer Deployment Wizard
NFS Maestro Client
NFS Maestro Server
NFS Maestro Solo
NFS Maestro Gateway
Hummingbird Inetd

English only

Hummingbird FTP for Windows Explorer

Preparing to Install
System and shared files currently in use cannot be updated. Close all
applications before proceeding with the installation.
Note: Before installing on Windows NT/2000, it is recommended
that you log on with Administrator authority. You also require write
access to the Windows system directory and registry. If necessary,
consult your system administrator.

20

Chapter 2: Installing Exceed

Hummingbird connectivity products (version 7.0 and later) use Windows


Installer. It is included with Windows 2000 and Windows Me. If Windows
Installer is not present on your Windows 95, Windows 98, or Windows NT
4.0 operating system, then Hummingbird Setup Wizard installs and
configures the service.
Note: The first time Hummingbird Setup Wizard installs and
configures Windows Installer, you may be prompted to restart the
machine. Installation continues after your system restarts.

If Windows Installer is present on the operating system, Setup Wizard


checks the version. If necessary, Windows Installer is updated.

Installation Requirements
You can preserve user
profiles from version 6.2 of
Hummingbird products.
For more information, see
Preserving User Profiles
on page 48.

The following table outlines installation requirements for Hummingbird


connectivity products:
Product
Exceed
Exceed XDK

Exceed 3D

Operating
System

Disk
Space1

Other Requirements

Windows 95
Windows 98
Windows Me

78 MB

Winsock compliant TCP/IP

219 MB

Winsock compliant TCP/IP


Microsoft Visual C/C++
(MSVC) 4.2 or later, for X
client development

6 MB

Exceedto display Open


GLX
Exceed XDKto display
and develop Open GLX
Microsoft Visual C/C++
(MSVC) 4.2 or later, for X
client development

Windows NT2
(service pack 4
or later)
Windows 20002

21

Exceed Users Guide

Product

Operating
System

Exceed PowerSuite

Disk
Space1
96

Other Requirements
Winsock compliant TCP/IP
An assigned IP address
and the ability to
communicate with other
computers on the network
(Windows NT)
A HOSTS file if a domain
name server is not
available (Windows
95/98). See the operating
system documentation for
details.

1
2

Approximate free hard disk space required for a Complete installation of all
program features.
Administrator privileges are required to install some portions of the product.

Note: For some installation scenarios, Windows NT 4.0 requires


Internet Explorer 4.01 or greater, and Windows Desktop Update
(shell32.dll version 4.72.3110.0). See Advertised Product on
page 42.

Third Party Software


JRE consists of the Java
Virtual Machine, the Java
platform core classes, and
supporting files.

Certain third party software must be installed to run some Hummingbird


products. The Sun Java Runtime Environment (JRE) is required to run Java
programs.
For example, you must install JRE before installing the following product
sub-features:

Systems AdministrationJconfig (client)

Systems AdministrationJconfig Daemon

Exceed (Tools)Xdis

Hummingbird Master Setup lets you install third party add-on(s) such as:

22

Adobe Acrobat Reader

Sun Java 2 Runtime Environment

Chapter 2: Installing Exceed

Microsoft SNA Server (for Windows NT/2000)

IntranetWare for SAA Client

Choosing a Setup Type


For an illustration of setup
types, see the dialog box
on page 29.

Hummingbird Setup Wizard prompts you to choose either a Typical,


Custom, or Complete setup type. For assistance with choosing a setup type,
consult the following quick reference table:
Setup
Type
Typical

Function

Recommended for:

More information:

standard features

new users

see Typical on
page 30

advanced users
and system
administrators

see Custom on
page 33

no feature or
feature directory
changes
Custom

control over feature


and directory
changes

users with
restricted disk
space
Complete

everything is
installed in default
directories

users without disk


space restrictions

see Complete on
page 34

Note: All setup types allow you to change the destination folder
(also known as the root home directory). However, this change
affects all feature directories.

Hummingbird Sconfig
Sconfig is an advanced system administration tool that lets administrators
customize the Setup Wizard program. For more information, see the
System AdministrationSconfig and Jconfig chapter in this manual.

23

Exceed Users Guide

Installation Directories
Hummingbird Setup Wizard installs program-specific and user-specific
files to the directories described below.
Installation

Description

Location/Type

Destination
folder

Program files install into the


destination folder (also known
as the root home directory). It is
recommended that you use the
default directory:

Location: a remote network


drive or a local hard drive.
Can be a read-only directory.

C:\Program Files\
Hummingbird\Connectivity\
Version\
However, you can specify a
different directory.
User
directory

User files install into the user


directory.
These files are configuration
files or related files that your
Hummingbird product can
change.

There are two kinds of user


directories and user files. For
more information, see Installed
Files below.
Warning: Do not make a user
directory read-only.
Location: a remote network
drive or a local hard drive.

Current user:
<Application Data>\Hummingbird\Connectivity\Version

All users:
<Common Application Data>\Hummingbird\Connectivity\Version

Setup Wizard supports the Uniform Naming Convention (UNC) so you can
begin path specifications with \\ in place of the disk drive to specify a
shared directory on a file server. For example:
\\machine_specification\share_name

24

Chapter 2: Installing Exceed

where machine_specification is the name of the computer to which you


are connecting, and share_name is the name of the shared directory. If you
use UNC names to install to a Novell server, you must install the OS/2
support patch on the NetWare server as NetWare servers do not support
UNC paths.

Installed Files
User files for Hummingbird connectivity products fall into two categories:

Per-machine files are local


so that key operating
system components, such
as device drivers and
services, can reliably
access them during login.

per-machine

per-user (current user and All Users)

Per-machine files are those application or service files that, when changed,
affect all users of the computer. An example is the inetd.ini file. If you
change inetd.ini to stop the Telnet daemon from running, then regardless
of which user is logged onto the computer, the Inetd service rejects Telnet
connections.
Per-user files are all application or service files that, when changed, affect
only the user who is making the change (that is, the currently logged in
user). An example of a user-specific file is exceed.cfg. If you configure
exceed.cfg with Xconfig to use a certain Display, then other users of the
machine are not affected.
Note: Only the user who installs the product has access to those
user files in the current user directory.

The following are the per-machine file locations:


Operating
System

Per-MachineFile Location

Windows
95/98/Me

C:\Windows\System\Hummingbird\Connectivity\<Version>\

Windows
NT 4.0

C:\Winnt\System32\Hummingbird\Connectivity\<Version>\

Windows
2000

25

Exceed Users Guide

Current User versus All Users


For Windows NT/2000 platforms, Hummingbird Setup Wizard prompts
you to choose between installing the product on the computer for the
currently logged in user, or for all users. For the current user, shortcuts are
created in the appropriate user profile folder, along with copies of all other
user files. For all users (anyone who uses the computer), shortcuts are
created in the All Users profile folder, along with copies of all other user
files.
The following are the default locations for user files:
Operating
System

Per-User FilesDefault Location (Current User)

Windows
95/98/Me

C:\Windows\Application Data

Windows
95/98/Me
(user profiles
enabled)

C:\Windows\Profiles\%USERNAME%\Application Data

Windows NT
4.0

C:\Winnt\Profiles\%USERNAME%\Application Data

Windows 2000 C:\Documents and Settings\%USERNAME%\Application Data


(hidden)

Operating
System

Per-User FilesDefault Location (All Users)

Windows
95/98/Me

C:\Windows\Application Data

Windows
C:\Windows\Profiles\All Users\Application Data
95/98/Me (user
profiles
enabled)
Windows NT
4.0

C:\Winnt\Profiles\All Users\Application Data

Windows 2000 C:\Documents and Settings\All Users\Application Data


(hidden)

26

Chapter 2: Installing Exceed

Installation and Maintenance


This section describes basic installation procedures and setup types:

personal installationsuch as one user installing on one computer

setup typestypical, custom, complete

administrative installationsystems administrators create an image of


the product at a network location

For examples of how to implement these procedures, see Typical


Installation Scenarios on page 40.

Personal Installation
Autorun launches the Hummingbird Master Setup application when you
insert the CD into your drive. If Master Setup does not launch
automatically, run Msetup.exe from the root directory of the CD.
To configure Windows Installer and prepare Setup Wizard:
1

In the Hummingbird Master Setup application window, you can select


options to install third party add-ons, register online, or view release
notes. Otherwise, click Install Product, then Personal Installation.

If you are prompted, select a setup language and click OK. English is the
default.

Note: For certain products, English is the only supported


language. For more information, see the table on page 20. When
selected, the language applies to all subsequent users installing
Hummingbird products on the PC.

27

Exceed Users Guide

Your Hummingbird product prepares Setup Wizard, checks the


operating system, and checks the current Windows Installer version.

If necessary, the version is updated and the Setup Wizard continues.

If Windows Installer is not present on your operating system, Setup


Wizard installs the service. Click Restart System to continue
installing the product.

Setup Wizard reboots the computer. This is necessary only the first
time Windows Installer is configured and installed on your
Windows 95/98 or Windows NT operating system.
4

After configuring Windows Installer and preparing to install, Setup


Wizard proceeds to the Welcome dialog box. Click Next.
Note: To quit installation, click Cancel in any Setup Wizard dialog
box. Your computer is not affected if you do this before the Setup
Wizard copies files. To review or change settings in a previous
dialog, click Back.

The Next button is dimmed


if the terms of the license
agreement are not
accepted.

Note: Failure to read or understand the License Agreement does


not affect the terms and conditions of the agreement.

28

Read the licensing agreement. If you select the option that indicates the
terms are acceptable, then click Next.

The Customer Information dialog box opens. Type the appropriate


information, select an installation option (all users, current user), and
click Next.

Chapter 2: Installing Exceed

Destination Folder is the


same as the home
directory (a term familiar to
users of version 6.2 and
earlier products).

The Destination Folder dialog box opens. Accept the default installation
folder for the product, or click Change to open a dialog box for
browsing to an alternate location. Click Next.
Note: Some product features are not affected by changes to the
destination folder.

The Setup Type dialog box opens. Select a setup type and click Next.

For more information, see


Typical on page 30 and
Complete on page 34.

For Typical and Complete setup types, a dialog box opens and
indicates Setup Wizard is ready to begin installation. Click Install.

For more information, see


Custom on page 33.

For Custom setup type, a Custom Setup dialog box opens. Customize
the installed program features and click Next.
A dialog box indicates Setup Wizard is ready to begin installation.
Click Install.

29

Exceed Users Guide

Various dialog boxes prompt you to specify Exceed configuration


options:

You can change the


password later by using
the Security application in
Xconfig.

Keyboard PreferenceSetup Wizard detects the current keyboard


in use, but you can select another from the drop-down list. Click
Next.
Xconfig PasswordPrevents unauthorized users from running
Xconfig and configuring the Exceed software. Specify a password
and click Next.
Specifying a password is optional. To not specify a password (by
leaving the boxes blank), click Skip to continue.

You can peform this


procedure later by using
the Performance
application in Xconfig.

X Server Tuning3 to 8 minute procedure to maximize display


graphics. To perform this procedure, click Next.
The procedure is optional. To not perform this procedure, click Skip
to continue.

10 A dialog box opens and indicates installation is complete. Click Finish.


For information about product modification, repairs, or removal, see
Program Maintenance for Personal Installations on page 35.

Setup Types
The following sections describe options that determine what product
(program) features are installed.

Typical
Complete setup type
includes all the features
listed in the table on
page 31.

30

Selecting this setup type means that standard features are installed to
default destination folders. In contrast to the Complete option, only the
essential features of the product are installed.

Chapter 2: Installing Exceed

Typical setup type usually requires less disk space than the other types. The

following table lists features installed and those not installed with this setup
type:
Features (and Sub-Features)
Accessories

Not installed with Typical


2

Directory Services Configuration

Command Line Utilities3

Directory Services Explorer2


Finger1
Host Editor2
Hummingbird Basic1, 3
Launch Pad1
Network Time1
NSLookup1
Ping1
Remote Tools1
Tar1
TraceRoute1
Whois1
Exceed (core files
including
miscellaneous fonts
and Launch Pad)1

Exceed Fonts (100 DPI, 75 DPI, Andrew,


Dec 100 DPI, Dec 75 DPI, Euro, HP,
Latin1, PC, Symbol)
Local X Clients (Bitmap, Ico, Maze,
MotifAnim, Xev, Periodic, Seltest,
Showcmap, Xdpyinfo, Xev, Xlogo)1 4

Exceed Fonts (Arabic, Central European,


Chinese, Cyrillic, Greek, Hebrew,
Japanese, Korean, Siemens, Thai,
Turkish, Unicode)
Exceed Tools (Kinput2)1 4
Xconfig Management Console1 2

Exceed Tools (MWM4, HWM1,


Transport1 Monitor1, Xdis [Java
Component]1)
X Web Browser Plug-in2, 3
Xsession1, Xstart1, Client Wizard1
HostExplorer

Command Line Utilities

FTP1, 3

Hummingbird Neighborhood2, 3
[FTP for Windows Explorer2, 3,
HostExplorer Profile Type2 (3270,
5250, Telnet)2, PrintExplorer2]

HostExplorer Development Kit1 2

LPQ1
LPR2, 3
WyseTerm1

31

Exceed Users Guide

Features (and Sub-Features)


2, 3

Hummingbird Inetd

Not installed with Typical

Finger Daemon

2, 3

Bootp Daemon2, 3

FTP Daemon2, 3

Trivial FTP Daemon2, 3

LP Daemon2, 3

Trivial Name Daemon2, 3

Telnet Daemon2, 3
Time Daemon2, 3
Xstart Daemon2, 3
Online Documentation

Hummingbird Basic Language


Programmers Guide1
Exceed Users Guide1
Exceed XDK Users Guide1 4
HostExplorer (Host Access) Users
Guide1

System Administration

Jconfig Daemon (Java Component)3

Jconfig (Java Component)1, 3

Hummingbird Update3

Sconfig1

SOCKS Information1
X Development Kit4

GCC Libraries
Motif 1.2 (GCC Libraries)
Motif 2.1 with CTL (GCC Libraries)
Local X Clients Source (Hellomotif, Ico,
Periodic, Xlogo)
X11R5 Local X Clients Runtime
1
2
3
4

32

The feature or sub-feature can be advertised.


Installing the feature or sub-feature requires Administrator privileges.
You cannot run the feature from a network location.
Exceed XDK only.

Chapter 2: Installing Exceed

Custom
This setup type lets you select the program features to install and where to
install them. This setup type is recommended for advanced users and
administrators. When you click Next in the Setup Type dialog box, the
following dialog box opens:

You can view more information about features and perform the following
customization:

Expand a feature category by clicking the plus icon to view a tree of


features or sub-features. Similarly, click the minus icon to collapse
the feature tree.

Click a feature icon to display a pop-up menu of icons and install


options (see above). Click a pop-up menu icon. The icon in the feature
tree changes according to your selection. Click Help to view a dialog box
with tips.

33

Exceed Users Guide

Click Change to open the Change Current Destination Folder dialog box
and install the feature to a folder other than the default.
Note: For some product features (such as Hummingbird Inetd),
the Change button is disabled and you cannot specify an
installation folder.

Click Space to open a dialog box listing all local drives (logical
partitions) and mapped drives on the machine. It provides detailed
information about available disk space.

Complete
The Complete option
installs all features listed in
the table on page 31.

This setup type requires the most disk space and installs all product features
to the default destination folder:
C:\Program Files\Hummingbird\Connectivity\<Version>\

Click Change to open a browse dialog box and install the program to
another destination directory.

34

Chapter 2: Installing Exceed

Program Maintenance for Personal Installations


Program maintenance lets you modify, repair, or uninstall existing
Hummingbird products and features (version 7.x).
To launch Hummingbird Setup Wizard in maintenance mode:
1

You can open Program Maintenance by running Msetup.exe from the


product CD. Alternatively, double-click Add/Remove Programs in
Control Panel, select the Hummingbird program, and click
Add/Remove. The Welcome dialog box opens.

In the Welcome dialog box, click Next. The Program Maintenance dialog
box opens.

For more information about maintenance options, see the following


procedures.
To modify the install state of program features:

For more information, see


Custom on page 33.

In the Program Maintenance dialog box, select Modify and click Next.

The Custom Setup dialog box opens. Expand the feature tree and change
the install state, as necessary. Click Next.
35

Exceed Users Guide

Setup Wizard prompts when it is ready to modify the program. Click


Install and the install state of program features changes according to
your specifications.

Installation (modification) proceeds to completion. Click Finish to exit.

To repair a program:
1

In the Program Maintenance dialog box, select Repair and click Next.

The Ready to Repair the Program dialog box indicates Setup Wizard is
ready. Click Install to repair errors such as missing or corrupt files,
shortcuts, and registry entries.

Program repair proceeds to completion. Click Finish to exit.

To remove a program:
1

In the Program Maintenance dialog box, select Remove and click Next.

The Remove the Program dialog box indicates Setup Wizard is ready.
Click Remove to uninstall the program.

Program removal proceeds to completion. Click Finish to exit.


Note: With Windows Installer, you can uninstall (remove) only one
program (product) at a time. Ensure that all programs associated
with the product you are uninstalling are closed.

Administrative Installation
Autorun launches the Hummingbird Master Setup application when you
insert the CD into your drive. If Master Setup does not launch
automatically, run Msetup.exe from the root directory of the CD.
Administrative installations let you create a centralized image of the
product. This means that many users can install the product without the
original CD media. There are two types of administrative installations:

36

Chapter 2: Installing Exceed

Copy Image This installation creates a language-specific image at a


network location, but in all other respects, this image is the same as the
contents of the original CD. Running Setup.exe from a Copy Image is the
same as a personal installation. For more information, see the procedure
Personal Installation, from pages 27 to 30.
Shared Image This installation creates a language-specific image for
running applications from the network. When an application is marked
Run from Network, only the user and system files are installed to the local
computer. All other files remain on the Shared Image server. Running
Setup.exe from a Shared Image is called a workstation installation (see
page 47). This is similar to a personal installation, except advertisement (see
Advertised Product on page 42) is not available and features are set to run
from the network.
All Hummingbird products support AdministrativeCopy Image
installation. AdministrativeShared Image installation is available for the
following products:

Exceed

Exceed 3D

Exceed XDK

Exceed PowerSuite

HostExplorer

NFS Maestro Client

NFS Maestro Solo


Note: An administrative installation only copies files. The product
is not installed to the network location (server), nor does it make
changes to the server. Only the network location folder is
modified.

37

Exceed Users Guide

To run Setup Wizard in Administrative mode:


1

Run Msetup from the product CD. In the Hummingbird Master Setup
application window, you can select options to install third party
add-ons, register online, or view release notes. Otherwise, to run Setup
Wizard, click Install Product, then click Administrative Installation.
Alternatively, from the product directory on the CD, run:
setup /a

38

Select a setup language and click OK. This language will apply to all
installations from the copied image or shared image.

Your Hummingbird product prepares Setup Wizard, checks the


operating system, and checks the current Windows Installer version.

If necessary, the version is updated and the Setup Wizard continues.

If Windows Installer is not present on your operating system, Setup


Wizard installs the service. Click Restart System to continue
installing the product.

Chapter 2: Installing Exceed

Setup Wizard reboots the computer. This is necessary only the first
time Windows Installer is configured and installed on your
Windows 95, Windows 98, or Windows NT 4.0 operating system.
4

After configuring Windows Installer and preparing to install, Setup


Wizard proceeds to the Welcome dialog box. Click Next.
Note: To quit the installation, click Cancel in any Setup Wizard
dialog box. Your computer is not affected if you do this before the
Setup Wizard copies files. To review or change settings in a
previous dialog, click Back.

The Network Location dialog box opens. Accept the default installation
folder for the product or click Change to open a dialog box for browsing
to an alternate network location.

Click Next and the Network Location Type dialog box opens. Select a
network location type.

Click Next. The Ready to Install Network Image dialog box opens.

Click Install. Installation of the network image proceeds to completion.


39

Exceed Users Guide

Typical Installation Scenarios


This section describes installation scenarios. The conditions and parameters
affecting implementation in your environment may vary from these
examples.

Personal Installations
Administrators, or users who do not have Administrator privileges
(Windows NT/2000), or Any User in Windows 95/98, are able to perform
personal installations for HostExplorer. FTP for Windows Explorer,
Hummingbird Inetd, and Hummingbird NFS Maestro Client Gateway
require Administrator privileges for personal installations in Windows
NT/2000. However, Any User in Windows 95/98 can install these products
or features.
This type of installation
applies to all Windows
platforms, but not
Windows NT 4.0 Server
Terminal Server Edition or
Windows 2000 Advanced
Server with Terminal
Services enabled.

PersonalWithout Administrator Privileges


This scenario assumes:

you are logged in to the PC as a user, not as Administrator

you do not have administrative privileges

you are installing the product for one user (the current user) on one PC

the product CD is available locally or on the network


Note: Some product features are not available for installation if
you do not have administrative privileges.

To launch a personal installation without Administrator privileges:


1

40

Launch Setup Wizard in installation mode by one of the following


methods:

from the command line, run Setup.exe from the product CD or


from a server image

run Msetup.exe from the product CD

Chapter 2: Installing Exceed

If Setup.exe is run from


a server image, you are not
prompted to select an
installation language. This
is already selected during
the copied image or shared
image installation.

This type of installation


applies to all Windows
platforms, but not
Windows NT 4.0 Server
Terminal Server Edition or
Windows 2000 Advanced
Server with Terminal
Services enabled.

If you are prompted, select a language for the installation. English is the
default.
Note: For certain products, English is the only supported
language. For more information, see the table on page 20. Once
selected, the language applies to all subsequent users installing
Hummingbird products on the computer.

Dialog boxes provide information and prompt for input.

In the Setup Type dialog box, select either Typical, Custom, or Complete.

PersonalWith Administrator Privileges


This scenario assumes:

you are logged in to the PC as the (local) Administrator

the product CD is available locally or on the network

To launch a personal installation as Administrator:


1

For more information about


creating a server image,
see Silent Installation on
page 43.

Launch Setup Wizard in installation mode by one of the following


methods:

from the command line, run Setup.exe on the product CD or from


a server image

from the product CD, run Msetup.exe

In the Customer Information dialog box under Install this application for,
select one of the following options:

Anyone who uses this computer (all users)

Only for me (username)applicable to the current user


Note: These options are available only in Windows NT/2000,
provided that you are logged in to the PC as Administrator.

41

Exceed Users Guide

If you are prompted, select a language for the installation. English is the
default.
Note: For certain products, English is the only supported
language. For more information, see the table on page 20. When
selected, the language applies to all subsequent users installing
Hummingbird products on the PC.

Dialog boxes provide information and prompt for input.

In the Setup Type dialog box, select Typical, Custom, or Complete.


Installation proceeds to completion.

Installing onto a Terminal Server


For information about installing Exceed onto a Terminal Server, see the next
chapter.

Advertised Product
Applies to all Windows
platforms, but not
Windows NT 4.0 Server
Terminal Server Edition or
Windows 2000 Advanced
Server with Terminal
Services enabled.
Windows NT 4.0 requires
Internet Explorer 4.01
(SP1) or greater, and
Windows Desktop Update
(shell32.dll version
4.72.3110.0 or later).

42

Advertisement (install on demand or deferred installation) means all


features of a product are available even if they are not installed on the
computer. This scenario assumes:

you are logged in to the PC as the (local) Administrator

the product CD is available locally or on the network


Note: Not all product features can be advertised.

Warning! Do not advertise Hummingbird Exceed 3D.

Chapter 2: Installing Exceed

To advertise a product and all its features:


1

Launch Setup Wizard in advertisement mode by one of the following


methods:

on the command line type E:\setup /V/jm for all users or


E:\setup /V/ju for the current userwhere E:\ is the CD-ROM
drive

run Msetup.exe from the product CD


Note: For a deferred installation, the product CD must be in the
drive and the drive must be accessible.

Shortcuts and registry


entries exist on the
computer, but files are not
installed.

Select the Complete setup type.

A Hummingbird product icon is installed on the PC desktop, and in the


Windows program group (on the Start menu), for each feature.
Note: Shortcuts for features requiring Administrator privilege will
not launch correctly if the user does not have the required
privileges to install the feature. For more information about these
features, see the table on page 31.

Silent Installation
A silent installation runs in the background. This scenario assumes:

you are logged in to the PC as the (local) Administrator

the product CD is available locally or on the network


Note: This scenario describes a local installation.

43

Exceed Users Guide

To run a silent installation:


1

Launch Setup Wizard from the command line using the following
syntax:
E:\setup /S /V/qn [/lnnnn]

where E:\ is the CD-ROM drive. The following describes options:


Option

Description

/S

Specifies a silent installation.


Note: S is upper-case.

/V/qn

/V passes parameters to Msiexec.exe.


Note: There are no spaces between the /V and /qn options and
that V is upper-case. If necessary, you can put quotes around a
character string. For example: /Vparameter space

/lnnnn

Overrides the default English language installation where nnnn is


the transform file name.
Note: For nnnn, type only the number but not the .mst extension.

Installation proceeds to completion.

Microsoft Systems Management Server (SMS)


An Administrator can use SMS to manage network computers, distribute
software from a central location, and perform a variety of other system
management tasks. The Administrator can install a package of products
simultaneously on multiple computers.
Requirements:
You can get the latest
service pack for SMS from
the Microsoft web site.

44

SMS version 2.0 with service pack 2 (or greater)

SMS Client (installed on each client computer) supplied with SMS


Server

Windows Installer on the client computer

Chapter 2: Installing Exceed

A package contains source


files for the program and
various details for directing
the software distribution
process.

To distribute a product using SMS, the Administrator must create a package


definition file according to SMS instructions.
Warning! Do not confuse the package definition file extension
(.pdf) with the Adobe file format (pdfportable document
format).

For convenience, Hummingbird provides a default package definition file


for all products. There are three default scenarios in each package definition
file:

Typical

SilentTypical

SilentComplete

When a package is run through SMS, it prompts you to select one of these
options (scenarios). Use the following command line parameters to apply
modifications or create new package definition files:

For more information about


Msiexec command line
options, see the Windows
Installer documentation
available in the MSDN
online library at
msdn.microsoft.com

Command Line
Parameter

Description

/i

Installs or configures a product.

/q

Sets user interface level (silent).

INSTALLLEVEL=150

Does a complete install.

TRANSFORMS=nnnn.mst

Specifies the product language where nnnn is the


transform file name.

For example, a complete silent installation of a Hummingbird product in


Italian would look like this:
msiexec /i "Hummingbird Product.msi" TRANSFORMS=1040.mst INSTALLLEVEL=150 /q

Refer to Microsoft documentation for command line parameters, switches,


and other information required for Windows Installer and Systems
Management Server.

45

Exceed Users Guide

Shared Installation
This type of installation
applies to Windows
NT/2000 platforms, but not
Windows NT 4.0 Server
Terminal Server Edition or
Windows 2000 Advanced
Server with Terminal
Services enabled.

This advanced installation creates a server image of the Hummingbird


product and saves it to a network location.
Note: On Windows NT 4.0Terminal Server Edition, shared
installation is not possible. For more information, see Installing
onto a Terminal Server on page 42.

To launch a shared installation:


1

Launch Setup Wizard in administration mode by one of the following


methods:

from the command line using the syntax:


E:\setup /a

The /a flag launches the


executable file in
administrative mode.

The language will apply to


all network installations
from this server.

where E:\ is the CD-ROM drive.

run Msetup.exe from the product CD. In the Hummingbird Master


Setup application window, click Install Product, then Administrative
Installation.

If you are prompted, select a language for the installation. English is the
default.
Note: For certain products, English is the only supported
language. For more information, see the table on page 20. Once
selected, the language applies to all subsequent users installing
Hummingbird products on the PC.

46

Click Next in the Welcome dialog box.

In the Network Location dialog box, type a path to an accessible network


location (server) or click Change to open a browse dialog box. Click
Next.

In the Network Location Type dialog box, select Shared Image. Click Next.

When Setup Wizard is ready, click Install.

All of the required files are installed to the specified network location.

Chapter 2: Installing Exceed

Users wanting to use this product must perform a workstation


installation.

Workstation Installation
This scenario requires an existing shared image installation. The product is
installed to network workstations from the shared image located on a
network server. Certain features are set to run from this network location.
Note: This type of installation will not start on Windows NT 4.0
Terminal Server Edition.

To launch a workstation installation:


Users can install products
from the shared image in
the context of either the
Standard/Personal or
Standard/Personal with
Administrator Privileges
scenarios.

Run Setup.exe from the network location.

For details about this part of the procedure, see Personal Installation
beginning at step 3 on page 28.
Note: In the Custom Setup dialog box, the install state of certain
features (and sub-features) are by default set to run from the
network. For workstation installations that are cross-platform (for
example, installing from a shared image on a Windows NT/2000
server to a 95/98 workstation), features that contain platformspecific components are set to run locally on the workstation, not
from the server.

Installation proceeds to completion.

Hummingbird Sconfig
Sconfig (Setup configuration) lets you customize the installation of software
on local and network machines. Use it to customize the folders installed by
Setup Wizard, determine what is installed (as well as limit functionality or
optimize disk space), and simplify user input. For more details, see the
System AdministrationSconfig and Jconfig chapter in this manual.

47

Exceed Users Guide

Preserving User Profiles


Hummingbird Setup Wizard does not preserve user profiles for products
before version 6.2. You must manually uninstall all such products before
installing version 7.x.

Version 6.2 User Profiles


You can preserve user profiles for version 6.2 Hummingbird products. If
you are upgrading the same (single) product from version 6.2 to version 7.1,
Setup Wizard will back up user profiles and automatically uninstall the
version 6.2 product.
User profiles for multiple version 6.2 products can be preserved, but the
products are not automatically uninstalled. These must be uninstalled
manually before installing version 7.1. For more information, see the
following procedure.
General procedure:

User files are stored in the


current users Application
Data folder under MigBack.

After launching Hummingbird Setup Wizard, version 6.2 products are


detected.

Setup Wizard reports that user files are saved for each product.

This part of the procedure varies depending on the number of products


detected:
Single product (upgrade):

Multiple products:

a) The product is uninstalled.


You are prompted to restart.

a) You are informed that these


must be uninstalled
manually. Setup Wizard exits.

b) Launch Setup Wizard again.

b) Uninstall the products.


c) Launch Setup Wizard again.
4

If Setup Wizard does not detect any older product versions, you are
prompted to click one of the following buttons:
Yesto restore the version 6.2 profiles previously saved

48

Chapter 2: Installing Exceed

Noto use the default 7.x profiles and settings

Installation of the version 7.x Hummingbird product proceeds to


completion. Your version 6.2 profiles are available when you run the
version 7.x product.

Version 7.0 User Profiles


Hummingbird version 7.1 products will automatically replace a previously
installed 7.0 version of the same product. All settings are preserved in a
backup location, and those settings that are applicable to the newly installed
features of version 7.1 are migrated.
In cases where an upgrade is not possible, the version 7.1 product installs
side-by-side with existing products.
Note: Some products do not support side-by-side installation.
If version 6.2 to 7.0 migration was disabled to allow side-by-side
installation of a product, an upgrade from version 7.0 to 7.1 is
possible, but the 7.0 settings are migrated instead of the 6.2
settings.

Updating the Product


WebUpdate options for
your Hummingbird product
are preset. For update
options, right-click the
Hummingbird product
entry in the WebUpdate
dialog box and select from
the drop-down menu.

If necessary, you can modify connection settings for updating the product.
Select WebUpdate Settings in the System Administration folder of the
Hummingbird Connectivity program group. Make the appropriate changes
in the WebUpdate dialog box as required.
Note: The WebUpdate application is not available if you
performed a personal installation without Administrator privileges.
Instead, an HTML file is created that links to a Web site for
Hummingbird updates.

49

Exceed Users Guide

To update the product:


1

Click Update Hummingbird Product in the System Administration folder


of the Hummingbird Connectivity program group.
Note: You can also select the Hummingbird product entry and
click Check for Update in the WebUpdate dialog box.

If an update is available, you are prompted to install it. Click Yes.

The update is downloaded. Setup Wizard prepares the setup process.

You are informed when Setup Wizard is ready. Click Next.

Installation proceeds to completion.

Registering
Online registration is available by:

running Msetup from the product CD, then clicking Register Online

completing and registering the form at the following URL:


http://www.hummingbird.com/register/

Alternatively, complete the registration card provided in the product


package and mail it to Hummingbird Ltd.
After registering, you and your organization are recognized as a licensed
product owner with all rights and privileges. This makes you eligible to
receive a wide range of customer services, such as a free subscription to our
quarterly newsletter, Expos Online, as well as notification of software
upgrades and new products. If you and your organization move to a new
location, complete and mail the change of address card included in the
product package. This ensures you will continue receiving update notices
and other important information.

50

Chapter 3
Installing on a Terminal Server

Overview

53

Installing Exceed Products on a Terminal Server


Stage 1: Creating an Administrative Copy Image
Stage 2: Personal Installation

53
53
55

Uninstalling Exceed Products from a Terminal Server

58

Chapter 3: Installing on a Terminal Server

Overview
This chapter explains how to install and uninstall a Hummingbird product
on Windows NT4 Terminal Server Edition, Windows 2000 Server, and
Advanced Server with Terminal Services enabled.
The following procedure assumes:

you are logged onto the Terminal Server as the Administrator

the product CD is available locally or on the network

A Terminal Server installation is a two-stage process that consists of creating


an administrative copy image of Exceed on the Terminal Server, and
installing the Hummingbird product onto the Terminal Server from the
newly-created copy.

Installing Exceed Products on a Terminal Server


This section covers Exceed, Exceed X Development Kit, and Exceed
PowerSuite.

Stage 1: Creating an Administrative Copy Image


You must apply the appropriate product-specific transform to
Hummingbird Exceed, Exceed XDK, or Exceed PowerSuite 7.1 before the
product can be installed on a machine with Terminal Server capabilities.
To create an Administrative Copy Image on the Terminal Server:
1

From the product directory on the CD, run the following commands
from a command prompt.
For Exceed:
setup /a /vTRANSFORMS=ExceedTSE.mst

For Exceed XDK:


setup /a /vTRANSFORMS=ExceedXDKTSE.mst

53

Exceed Users Guide

For Exceed PowerSuite:


setup /a /vTRANSFORMS=ExceedPSTSE.mst
Warning! When creating the Administrative Copy Image, you
must apply the product-specific Transform. For Exceed, apply
ExceedTSE.mst; for Exceed XDK, apply ExceedXDKTSE.mst; for
Exceed PowerSuite, apply ExceedPSTSE.mst.

Select a setup language and click OK.


Note: The language you select during this setup process will be
the language of the administrative image.

Your Hummingbird product prepares Setup Wizard, checks the


operating system, and checks the current Windows Installer version.

If necessary, the version is updated and the Setup Wizard continues.

If Windows Installer is not present on your operating system, Setup


Wizard installs the service. Click Restart System to continue
installing the product.
Setup Wizard reboots the computer. This is necessary only the first
time Windows Installer is configured and installed on your
Windows NT 4.0 Terminal Server Edition operating system.

After configuring Windows Installer and preparing to install, Setup


Wizard opens the Welcome dialog box. Click Next.
Note: To quit the installation, click Cancel in any Setup Wizard
dialog box. Your computer is not affected if you do this before the
Setup Wizard begins copying files. To review or change settings in
a previous dialog, click Back.

54

Chapter 3: Installing on a Terminal Server

The Network Location dialog box opens. Accept the default installation
folder for the product or click Change to browse to an alternate network
location. A folder with the default name Admin is created on the
terminal server. The Administrative Copy Image will be placed in the
Admin folder.
Note: Each user has private shortcuts, registry entries, and user
files. User files are copied from the Admin folder. Each user must
have at least read access to the Admin folder installation point.

Click Next. The Ready to Install Network Image dialog box opens.

Click Install. Installation of the Administrative Copy Image proceeds to


completion.
Note: The Administrative Copy Image must be readable by all
users who are granted permission to use Exceed.

Stage 2: Personal Installation


After creating an Administrative Copy Image, an administrator can install
personal installations of Exceed, Exceed XDK, or Exceed PowerSuite onto
the Terminal Server from this image.
To install Exceed, Exceed XDK, or Exceed PowerSuite onto the Terminal
Server:
1

From the command line, change the directory to C:/Admin and run
setup.exe

where C:\Admin is the name of the drive and folder where the
Administrative Copy Image is located.
Note: The Admin folder and its contents must remain available
during the lifetime of Exceed on the terminal server. Multiple
terminal servers can share the same Admin folder.

55

Exceed Users Guide

Warning! Installing from Add/Remove Programs should be


avoided. When in installation mode, Windows Terminal Server
Edition caches values written into the HKEY_CURRENT_USER registry
hive. This defeats the purpose of the per-user installation and can
cause problems with display assignment.

Click OK.

Setup Wizard opens the Welcome dialog box. Click Next.

Read the Licensing Agreement. If you select the option that indicates
the terms are acceptable, then click Next.
Note: Failure to read or understand the License Agreement does
not affect the terms and conditions of the agreement.

Destination Folder is
synonymous with home
directory (the directory in
which the product is
installed).

56

The Customer Information dialog box opens. Type the appropriate


information, select an installation option (All Users, Current User), and
click Next.

The Destination Folder dialog box opens. Accept the default installation
folder for the product or click Change to browse to an alternate location.
Click Next.
Note: Some product features are not affected by changes to the
destination folder.

Chapter 3: Installing on a Terminal Server

The Setup Type dialog box opens. Select a setup type and click Next.

For more information, see


Typical on page 30 and
Complete on page 34.

For Typical and Complete setup types, a dialog box opens and
indicates Setup Wizard is ready to begin installation. Click Install.

For more information, see


Custom on page 33.

For Custom setup type, a Custom Setup dialog box opens. Customize
the installed program features and click Next.
A dialog box indicates Setup Wizard is ready to begin installation.
Click Install.
Note: The Hummingbird product installed on each users profile
will use the setup type that the administrator chooses in the Setup
Type dialog box.

Various dialog boxes prompt you to specify configuration options:

Keyboard PreferenceSetup Wizard detects the current keyboard


in use, but you can select another from the drop-down list. Click
Next.

57

Exceed Users Guide

You can change the


password later by using
the Security application in
Xconfig.

Xconfig PasswordPrevents unauthorized users from running


Xconfig and configuring the Exceed, Exceed XDK, or Exceed
PowerSuite software. Specify a password and click Next.
Specifying a password is optional. If you do not want to specify a
password (by leaving the boxes blank), click Skip to continue.

A dialog box opens and indicates installation is complete. Click Finish.

You can perform this


procedure later by using
the Performance
application in Xconfig.

For more information about


setting up access
permissions, see
Hummingbird User
Manager Help.

If users are granted product access permission through a Hummingbird


Product User Group, Exceed, Exceed XDK, or Exceed PowerSuite will
automatically be installed into the appropraite user profile the next time
user group members log on. Alternatively, Exceed, Exceed XDK, or Exceed
PowerSuite will automatically uninstall from profiles of users who are not
user group members. Exceed7_Users is the default group name for
Hummingbird Exceed, Exceed XDK, or Exceed PowerSuite users.

Upon completion of Stage 2, the per-user installation of the Hummingbird


product is enabled and Exceed, Exceed XDK, or Exceed PowerSuite will be
automatically installed into the appropriate user profile the next time each
user logs on.

Uninstalling Exceed Products from a Terminal Server


Only administrators can remove Hummingbird Exceed, Exceed XDK, or
Exceed PowerSuite from the Terminal Server using the Add/Remove
Programs option. The Add/Remove Programs procedure removes the
binary files from the Program files folder and prevents existing users from
using Exceed, Exceed XDK, or Exceed PowerSuite. Existing personalized
user settings and shortcuts will be removed automatically for each user
when each user next logs on.

58

Chapter 3: Installing on a Terminal Server

For information about product modification, repairs, or uninstalling using


the Add/Remove Programs option, see Program Maintenance for Personal
Installations on page 35.
Note: To uninstall a product from the Terminal Server for one or
more users, but not for all users, remove the user(s) from the user
group. Do not delete the user(s). For information on creating and
managing user groups, see the Windows NT/2000 Help.

Note: If the Exceed parent product is not available to the user


either because it is uninstalled or access permission has not been
grantedExceed 3D is removed as well.

The following conditions must be met before disabling UsrSetup and


removing the UsrSetup file from the machine:

For more information about


uninstalling using the Add/
Remove Programs option,
see Program Maintenance
for Personal Installations
on page 35.

You are not planning to install Exceed, Exceed 3D, Exceed XDK, Exceed
PowerSuite, or HostExplorer again.
The Terminal Server personal installation has been uninstalled using
the Add/Remove Programs options. After this uninstallation, when a
user logs on, customized settings and user files are automatically
uninstalled from his/her user profile. Only after this process is complete
can you disable UsrSetup and remove the UsrSetup file.
Note: Disabling UsrSetup is an optional procedure.

If the above conditions have been met, you can disable UsrSetup.
To disable UsrSetup:
1

From the Terminal Server command line, run the following command:
%WINDIR%\System32\Hummingbird\Connectivity\UsrSetup /unregserver

Remove the UsrSetup file from the Terminal Server machine.

59

Chapter 4
Connecting to Hosts and Running X
Clients

Connecting to Hosts
Using the Client Wizard
Creating a Startup File
Browsing for Hosts and Applications
Load optimization
Creating an Xstart Shortcut
Running the Xstart File
Creating a Wstart File

63
63
64
68
71
75
76
78

Common Desktop Environment (CDE)


Using Desktop Environments for Linux

79
79

Window Modes
Configuring the Window Mode

80
81

Using Window Managers


Starting HWM or MWM
Starting Remote X Window Managers

84
85
85

Copying and Pasting


Using a Temporary Storage Buffer
Copying and Pasting Data
Copying and Pasting Graphics
Copying and Pasting Between X Clients
Automatic

87
87
88
89
91
92

Chapter 4: Connecting to Hosts and Running X Clients

Connecting to Hosts
You can connect to a host using a wizard or by creating startup files with
Xstart or Wstart.

Using the Client Wizard


Client Wizard guides you through the steps necessary for connecting to a
host application from your PC.
To create a connection using the Client Wizard:
1

In the Exceed folder, double-click Client Wizard.

In the welcome screen, click Next.

In the Host panel, enter the host name or IP address.


Note: If you have configured the NIS or FTP file method on your
machine, you can click Browse to find the host you want.

In the same panel, select a host type, then click Next.


Note: You can edit the Host Type default settings by editing the
stdappdb file, located in the directory where Exceed is installed.

In the Application panel, select an X application from the drop-down list


provided. After you have selected an application, the dialog box
immediately displays the command and default parameters for the
application.
You can modify the parameters, but not the command. When you are
finished entering this information, click Next.

In the Login panel, enter the login information you want to display each
time this connection is made. You can leave the Password box blank, but
not the User ID box.

63

Exceed Users Guide

In the Login panel, test the connection. To do this, select Show Host
Replies and click Run. When you are satisfied with the connection, click
Next.

In the Shortcut panel, you can create a shortcut to the application, and
its name and location. To do this, complete the following information:

Type the name of the shortcut and select the option immediately
below this box.

Select a location from the drop-down list (showing program groups


on the Windows Start menu) or type a new group name. To create a
menu item on the X Server Tools menu, select the check box
immediately below this box.

When you are satisfied with this information, click Next.


9

The system creates the specified connection and the shortcut.

Creating a Startup File


Xstart lets you create (.xs) startup files and install program item icons for
accessing UNIX, Linux, and VMS systems. You can also create script files for
web-based applications that require a user name and password.

64

Chapter 4: Connecting to Hosts and Running X Clients

To create a startup file:


1

Double-click Xstar t in the Exceed program group.

Create and save a startup file by specifying information in the Xstar t


window. By default, all startup files are saved in the directory where
Exceed is installed, although you can specify another location.

Create a shortcut.

Run the connection.

The following sub-sections provide more details about the Xstart window.

Start Method
Select a method from the Star t Method drop-down list. The start method
that you use depends upon the transport that you are using and the host to
which you want to connect.

RSH is an abbreviation for


remote shell.

RLOGIN is an abbreviation
for remote login.

REXEC (TCP/IP)Requires a password to connect to the host. You can


use REXEC to run local X clients on other PCs on your network if they
are running the Xstartd service.
RSH (TCP/IP)The same as REXEC except that no password is
required. Before using RSH, your PC must be authorized for RSH
access on your host.
RLOGIN (TCP/IP)Requires a password.

TELNET (TCP/IP)Requires a password. This start method includes

Kerberos V5 authentication and encryption for added security.


hRPS is the Hummingbird
remote application starter.

PCX$SERVER (DECnet)Requires a password.

hRPS (All)Requires that a client be included with Hummingbird


Extend to establish the connection. To use this method, the client must
be installed and running on the host. No password is required. hRPS is
the only start method supported by all transports.

65

Exceed Users Guide

The following table summarizes the start methods supported by each type
of transport:
Start Methods

DECnet

REXEC

IPX/SPX

TCP/IP

RSH

RLOGIN

PCX$SERVER

dterm

hRPS

If you are on a VMS system, see Using Xstart on VMS Systems on


page 141.

Program Type
Specify the kind of program you want to start in the Program Type dropdown list: either X Window (for X clients) or Terminal Emulator (for
character-based, host applications in a terminal emulator window).
Selecting Terminal Emulator, opens the Terminal Emulation Settings dialog box.
It lets you select options that control how character-based applications run
in a terminal emulator window. You can also display this dialog box by
clicking Program (if enabled) in the Xstar t window.

Login
For more information, see
Using Login Macros on
page 95 and User ID and
Password Macros on
page 95.

Login lets you specify information required to connect to a host, log on, and
execute a command to start an application. Options that do not apply to the
selected start method are dimmed.
User ID

The user ID on the host to which you want to connect.

Password The password on the host to which you want to connect. If you
are unsure whether you typed your password correctly, delete the entire
password and type it again.

66

Chapter 4: Connecting to Hosts and Running X Clients

To see a list of hosts on the


network and the X
applications available for
each one, click

Host The host to which you want to connect. By default, the most recent
host to which you connected appears at the top of the list in the Host dropdown list.
Host Type

The type of host to which you want to connect.

Note: You can edit the Host Type default settings by editing the
stdappdb file, located in the directory where Exceed is installed.

Prompt: None/Login Info/Account Info Indicates what information, if


any, Xstart prompts you for each time you run the Xstart file. As an added
measure of security, you can set Xstart to prompt you for your login or
account information. The Login Info option prompts you for your host, user
ID, password, and command. The Account Info option prompts you for only
the host, your user ID, and password.
When Xstart prompts you for this information at run-time, the displayed
information, other than that in the Password box, contains the login
information you initially specified. When you click OK, Xstart uses the
information currently displayed to make the connection and sends the
command to the host.
Command The command that is sent to the host. The command that you
type depends upon the specified Program Type (X Window or Terminal
Emulator), your host system, and how it is set up. Type the host system
command that you require.
For more information, see
Using Login Macros on
page 95 and Command
Macros on page 95.

You can type the @d, @a, @:, and @# command macros as shortcuts in the
Command box. The @d macro selects the proper IP address if the machine
has more than one address.
The following table lists typical commands you can type to start the xterm
client on a UNIX host with either a DECnet, IPX/SPX, or TCP/IP transport.
With this
transport

Use this command to start xterm

DECnet
IPX/SPX

[path/]xterm -display mypcname:displaynumber &

TCP/IP

67

Exceed Users Guide

The command definitions are as follows:

path is the location of xterm on the host

mypcname corresponds to your network node or address

displaynumber is the display number you entered in the Xconfig

Communication Settings dialog box. The display number is usually


zero (0).

Description
Type a description of the startup file in this box. When you create a shortcut
for this file, the description appears below the icon. You can type up to 40
characters.
Note: If you do not specify a description, Xstart uses the file
name (without the extension).

Show On Client Startup Menu


For more information about
customizing menus, refer
to chapter 4, Customizing
Exceed Settings.

When enabled in a startup settings file, a command is created on the Client


Startup menu that launches the associated X client. To open the Client
Startup menu, select Client Startup on the Exceed X server Tools menu or the
Launch Pad X Apps menu.
Note: For information on advanced Xstart settings, see Advanced
Xstart Features on page 95.

Browsing for Hosts and Applications


For more information about
advanced features, see
Advanced Xstart
Features on page 95.

To browse for hosts, you must first configure the Browse Hosts feature on
the Method sub-tab. To browse for applications, you must first configure the
Browse Apps feature on the Method sub-tab. These Xstart features are
available in the Other Settings dialog box.

Methods
The following file retrieval methods are common to Browse Hosts and
Browse Apps methods:

68

Chapter 4: Connecting to Hosts and Running X Clients

For more information about


hostsdb.txt, see
Host Address File on
page 74. For more
information about
appdb.txt, see
Application Database
File on page 75.

FileUses the hostsdb.txt file as a source for the host browse and

appdb.txt as a source for the application browse. You can create and
maintain these files. The hostsdb.txt file lists IP addresses and their
associated hosts. The appdb.txt file lists hosts or aliases and

application locations or names.


Note: The stdappdb.txt file, which contains applications and
their typical locations on various servers, is located in the Exceed
User directory. See Installation Directories on page 24. An
application may be listed here and consequently appear when
you browse for applications, but there is no automatic
confirmation that the application itself is in the specified directory.

FTPUses a file on an FTP server as a source for the host and

application browse. You can only access a file this way, not edit it. The
source file contains the file structure listed above. To properly configure
the Browse Hosts or Browse Apps tabs using FTP, you must supply a
server name, user name, password, account (if applicable) and path in
the fields provided. In the File box, enter the name and location of the
source file on the FTP server.

NISUses NIS (Network Information Service) maps hosts.byaddr as a

source for the host browse and appdb as a source for the application
browse. Before browsing, you must configure NIS Services. The system
administrator on the UNIX side must create these maps.

NIS+ Uses NIS+ maps hosts as a source for the host browse and

appdb as a source for the application browse. Before browsing, you must

configure NIS+ Services. The system administrator on the UNIX side


must create these maps.

69

Exceed Users Guide

Options
The Browse Hosts, Options sub-tab contains the following options.:

Browse Type options specify which host types are shown in a host browse.

You can show hosts from a host browse, an application browse, or both of
these. The default is to show only hosts from a host browse.
The Remember browse
information area is
common to the Browse
Apps tab, Options sub-tab.

Remember browse information controls whether Exceed remembers (caches)

browse information. If not remembered, each browse reloads the selected


applications file. If remembered, you can use the cached or locally saved list
of applications and only refresh the browse from the source Once a day (the
default) or On a manual refresh (by clicking Refresh on the Browse dialog).
Even if you select Once a day, you can still use Refresh to update the
information.
Default restores Browse Hosts and Browse Apps default selections.

Note: To force a refresh (regardless of these settings), hold down


the Shift key before launching Xstart or an Xstart startup file.

70

Chapter 4: Connecting to Hosts and Running X Clients

The Browse Apps, Options sub-tab contains the following options:

Browse Sor t Order options affect how applications (regardless of source) are

listed. You can sort the list by application and its hosts (the default), or by
host and its applications.
Remember Browse Information indicates whether Exceed remembers (caches)

browse information. If not remembered, each browse reloads the selected


applications file. If remembered, you can use the cached or locally saved list
of applications and only refresh the browse from the source Once A Day (the
default) or On A Manual Refresh (click Refresh in the Browse dialog box).
Even if you select Once A Day, you can still use Refresh to update the
information.
Use application startup macro and expand when running command determines
whether the selected browse item is inserted in the Command field as an

application macro or as the full path and application name. If inserted as a


macro, it expands when the startup session is run. What you specify in
Append To Browse Dialog Selection is appended to the end of whatever you
select from the browse window.

Load optimization
This feature makes Xstart connections more efficient. Where the original
host is already accommodating many connections, the connection may be
diverted to another host.
71

Exceed Users Guide

Methods
To configure Xstart for load optimization, select a Method:
For more information about
rupdb.txt, see Host
List File on page 74.

FileXstart scans the rupdb.txt file for available hosts and tries to run

the application on the least busy host. You can create and maintain this
file, and save it in the User directory. This method is the easiest to run
and is convenient if the desired application resides on every host in
rupdb.txt (such as xterm). If the application runs on certain hosts only
(not necessarily the least busy ones), then this method could fail.
Alternatively, you can use rupdb.txt in conjunction with appdb.txt
(provided you have previously created appdb.txt). In this case, select
Use Apps File in the Options sub-tab. By comparing the two files, Xstart
figures out what subset of hosts in rupdb.txt have the desired
application and selects from those alone.

For more information about


appdb.txt, see
Application Database
File on page 75.

FTPUses a file on an FTP server as the source available hosts. You can

only access a file this way, not edit it. To properly configure Load
Optimization by FTP, enter the server name, user name, password, and
account (if applicable) in the fields provided. In the File field, enter the
name and location of the source file on the FTP server.

NISUses an NIS (Network Information Service) map rupdb as a


source for available hosts. Before browsing, you must configure NIS
Services. The system administrator on the UNIX side has to create the
map.

NIS+ Uses an NIS+ map rupdb as the source for available hosts.

Before browsing, you must configure NIS+ Services. The system


administrator on the UNIX side has to create the map.

Broadcast Sends out a broadcast on the network. This option is

limited to queries within your subnet, unless you type an address for
another subnet. If you selected Use Apps File in the Options sub-tab, then
Xstart broadcasts the rup RPC to the subset of hosts in appdb.txt that
run the desired application. If Use Apps File is not selected, then Xstart
broadcasts to all hosts on the subnet. Using this method, you do not
need a rupdb.txt file.

Browse AppsUses an application database file (appdb.txt) to get a list

of hosts to check.

72

Chapter 4: Connecting to Hosts and Running X Clients

Options
The following load optimization options are available:

Use Apps file specifies that Xstart uses rupdb.txt in conjunction with
appdb.txt. In the Section name(s) box, type one or more section names

(separated by commas). These are defined in rupdb.txt. Each section name


field can include just one section name or several section names (separated
by commas).
In the Timeout: ms box, set a timeout value from 0 up to 9999 milliseconds.
If Broadcast was selected in the Method sub-tab, this time is the total time
that Xstart will be waiting for answers from remote hosts. If other methods
were selected, this time is the maximum time to wait for an answer from
each host.
The Remember Browse Information check box indicates whether Exceed
remembers (caches) browse information. If not remembered, each browse
reloads the selected applications file. If remembered, you can use the cached
or locally saved list of applications and only refresh the browse from the
source Once A Day (the default) or On A Manual Refresh (click Refresh in the
Browse dialog box). Even if you select Once A Day, you can still use Refresh to
update the information.

73

Exceed Users Guide

Host Address File


The hostsdb.txt file lists IP addresses and corresponding host names. For
example:
123.45.67.89

boethius

This information affects which hosts Xstart browses.

Host List File


The rupdb.txt file lists hosts that are running an rpcd daemon that
supports the rstatd service. This service is capable of running the rup
command, which returns status information about the host, including the
service load on the host. The rup command is a Remote Procedure Call
(RPC) and the rpcd daemon handles all incoming RPCs.
Xstart consults rupdb.txt when running Load Optimization by sending a
rup RPC to each host in rupdb.txt to find the least busy one. You can use
section names in rupdb.txt to associate applications with host names. The
following syntax rules apply:

74

Lines beginning with # are comments and are ignored by the system.

Section names are enclosed in square brackets [ ].

If you do not specify a name in the Section name(s) box, the system
inserts the name [Default Section].

If you do not provide a name in the Section name(s) box on the Options
sub-tab (Load Optimization tab), then the system inserts the name
[Default Section] in the rupdb.txt file.

You can use any combination of alphabetic characters, spaces,


capitalization, and numbers in section names. If you want to list more
than one application in section names, then separate them with
commas.

When you add the hosts, type only one host on each line. Host names
may be in short or full form, for example, irix or irix.domain.com.

Chapter 4: Connecting to Hosts and Running X Clients

For example:
[xclock]
onefish
twofish
[xterm]
redfish
bluefish

In this example, the hosts onefish and twofish support the xclock
application; the hosts called redfish and bluefish support the xterm
application. When you specify an application in the section, Xstart queries
only those hosts following each section. This prevents Xstart from
contacting a host that does not run the desired application.
Note: appdb.txt lists hosts that must be running rstatd.
Therefore, the list of hosts in appdb.txt is a subset of the hosts
listed in rupdb.txt, which is itself a subset of the hosts in
hostdb.txt.

Application Database File


The appdb.txt file lists host names, application nicknames, and full path
names for applications on remote hosts. Xstart uses appdb.txt to determine
which hosts run a particular application. For example:
solaris/mailtool: /usr/bin/mailtool
solaris is the host, mailtool is the application, and /usr/bin/mailtool is

the application path.

Creating an Xstart Shortcut


After you have saved Xstart settings as an Xstart (.xs) file, you can install a
shortcut in the Windows Explorer that you can double-click to run the file.
When Xstart installs a file as a shortcut, it uses the entry in the Description
box on the Xstart dialog to name it. If this box is empty, it uses the file name
(minus the extension) to name the icon.

75

Exceed Users Guide

On the File menu, click Install.

In the Description drop-down list, select the location where you want to
install the Xstart icon. If you do not specify a location, the icon is
installed in the current program group (that is, the open folder in
Windows Explorer).

In the Files list, select the .xs file you want to install. To browse files in
another directory, click Directory. Use the Select All and Deselect All
buttons, if necessary.

If you want to use an icon other than the default Xstart icon, click
Change Icon. Choose an icon from the displayed icons or click Browse to
locate another graphic file.

When you are satisfied with the information in this dialog, click OK.
The icon installs with your specifications.

Running the Xstart File


When you run an Xstart file, the following events take place:
1

If you clicked either the Prompt: Login Info or Prompt: Account Info
option button, you are prompted to specify your login/account info.

Exceed starts. The system retries the connection for the length of time
specified in the Connect Timeout box on the Connection tab.

After you have connected, the command specified in the Command box
is sent to the host specified in the Host box. If the command starts a
client, the client session begins. The initial socket closes after the length
of time specified in the Close Timeout box.

If the Show Host Reply check box in the Connection tab is selected, host
or client messages are displayed in a window. You can copy text from
this window to Clipboard.

Running the File from a Command Line


You can also open Xstart from a command line in the Windows Explorer
Run dialog box. The command-line syntax is:

76

Chapter 4: Connecting to Hosts and Running X Clients

home\xstart [settings.xs][-m method]


[-a type] [-h host] [-u userid]
[-p password][-c command] [-l|-l-]
[-t timeout]
Note: Any parameters you specify after the settings.xs
parameter overrides the settings in the .xs file.

The following table describes Xstart parameters:


Parameter

Description

home

This is the directory where Exceed is installed.

settings.xs

This is the name of the Xstart startup file you want to run. You do
not have to type the .xs extension.
If the file name is preceded by a path, Xstart looks for the file in
that directory. If no path is provided, the location of the Exceed
user directory is assumed.

-m method

This is the startup method, specified as one of the following:


rexec, rsh, rlogin, pcx (for PCX$SERVER on DECnet), dterm
(DECnet) or hrps.

-a type

This specifies the program type and can be one of the following:
xwin (for an X Window client) or term (for an application that
does not require X and can be run using a VT terminal
emulator).

-h host

This is the host to which you want to connect. You can type
either the host name or its network address.

-u userid

This is the login name you use to log on to the host.

-p password

This is your password on the host.

-c command

This is the command that you want to execute on the host. If


your command contains spaces, it must be enclosed in double
quotes (command).

-l

This option (minus sign, lowercase L) tells Xstart to prompt the


user for login information. This option displays the Xstart Login
Information dialog box at connect time and prompts the user to
type a hostname, user ID, password, and a command.

77

Exceed Users Guide

Parameter

Description

-l-

This option (minus sign, lowercase L, minus sign) tells Xstart not
to prompt the user for login information.

-t timeout

This is the time in seconds that the remote execution facility


socket remains open after the host acknowledges receipt of the
command.

Creating a Wstart File


Wstart automates host
access and application
startup for Windows
applications. Wstart and
Xstart files are referred to
generically as startup files.

Wstart starts from the Xsession application. To open Wstart, complete the
following steps:
1

In the Exceed folder, double-click Xsession.

Click New Program.

At the prompt, select Windows App.

You can also start Wstart from a command line in the Windows Explorer
Run dialog box. The syntax is: home\wstart [settings.ws]
The Wstart parameters are as follows:

78

Parameter

Description

home

The directory where Exceed is installed.

settings.ws

An optional Wstart startup file. If you do not specify the path, the
file is assumed to be in the Exceed user directory. If you do not
specify a file extension, the .ws extension is assumed.

Chapter 4: Connecting to Hosts and Running X Clients

Common Desktop Environment (CDE)


A handshake is an activity
that keeps two computers
or programs synchronized
(such as the CDE display
manager and the X
protocol). It usually
involves the exchange of
messages or packets of
data between two systems.

When you log into the UNIX host via the CDE display manager using
XDMCP, a handshake implemented by the X protocol is employed. CDE
does not begin unless it detects a supported PC X server (that is, Exceed).
To start CDE:
1

Ensure CDE is configured properly on a UNIX host.

Select a window mode in the Xconfig Window Mode Settings dialog box.
Note: If you select multiple window mode and you are using the
Windows (Native) window manager, verify that the Cascade
Window option is not selected.

Select XDMCP-broadcast in the Xconfig Communication Settings dialog


box and clear the Select First Display Manager check box.

Start Exceed.

From the Display Chooser, select a UNIX host. After you make a
selection from the chooser, the greeter opens.

Log into the UNIX host.

The CDE Session manager starts and the interface is presented on your
PC.

Using Desktop Environments for Linux


There are two types of X Graphical Desktop Environments in Linux.
Depending on which one you chose when you installed Linux, either KDE
or GNOME was set as the Default desktop.

GNOMEGNU Network Object Model Environment works with


window managers such as Enlightenment, Sawmill, and Window
Maker.

KDEK Desktop Environment uses KWM as its window manager.

79

Exceed Users Guide

KDE and GNOME run on a Linux host and are displayed on the remote PC
using standard X protocol.

Window Modes
A window mode determines the appearance of the X client windows on
your PC. The window mode in which you operate depends upon your own
preference. By default, the Exceed X server operates in multiple window
mode and the window manager is configured to default to native.
To open the Screen dialog
box, double-click Screen
Definition in the Xconfig
window.

To configure the PC screen


to reflect the window
mode, see Configuring X
Screens on page 122.

Use Xconfig to select a window mode for the Exceed X serverSingle or


Multiple:

Single window modePresents all clients in a single Exceed window.


You can use any X window manager (local or remote) as your window
manager.
Note: If you minimize the Exceed X server to an icon in this
mode, active client windows are no longer visible.

80

Chapter 4: Connecting to Hosts and Running X Clients

Multiple window modeEach client you start creates its own new
window on your display. You can use either the Native (Microsoft
Windows) or any X window manager (local or remote) as your window
manager.

Configuring the Window Mode


Certain options in the Screen dialog boxare window mode-specific; other
options are common to single or multiple window modes. Selecting these
options affects not only the appearance of your PC, but in certain instances,
how it functions. The following sections describe these options.

Common Options
The following options are common to both single and multiple window
modes.
Panning, Auto Load XRDB,
and Root Size options are
located on the Screen tab
of the Screen dialog box.

Panning Lets you pan to view parts of client windows that are off-screen.
By default, panning is enabled in multiple window mode; in single window
mode, it is disabled. You can specify the following:
SpeedSelect Slow, Medium, or Fast.
AmountSpecify the incremental percentage of the window size in

which panning occurs. You can enter any value between 1 and 100.
Note: In Multiple Window Mode, when you select Panning, do
not select the Fit Window to Display option.

Auto Load XRDB Automatically loads the local resource database named
in the File box each time the Exceed X server restarts or resets. Otherwise,
you have to manually load it by choosing the corresponding command on
the File menu in the Exceed X server. This file name is xrdb.txt by default.
Note: You can find a sample xrdb.txt file in the home\info
directory. To use this file without changing the contents of the
XRDB file box, copy the file to the directory where Exceed is
installed.

81

Exceed Users Guide

Root Size Lets you set the size (in pixels) of the server root window. You
can make the root window larger than your screen. The maximum root
window size is 4096 by 4096 pixels. A width or height of zero implies the
root size will be equal to the size of your screen. For certain applications to
run, you may need to make the root size larger than your screen.
The server reset options
and Close Warning on Exit
option are located on the
Common Settings tab of
the Screen dialog box.

Enable Server Reset, Exit On Server Reset Resets the Exceed X server
when the last client connection is closed. This option is enabled by default.
When you enable this option, you can also enable Exit On Server Reset. This
option lets you terminate the Exceed X server when the last client
connection is closed.
Close Warning on Exit Exceed displays a warning message whenever you
close a client window or choose a command that shuts down the server.
This message prompts you to confirm or cancel the action.

These options are located


on the Screen tab of the
Screen dialog box.

Multiple Window ModeSpecific Options


Root Size Lets you set the size (in pixels) of the server root window. You
can make the root window larger than your screen. The maximum root
window size is 4096 by 4096 pixels. A width or height of zero implies the
root size will be equal to the size of your screen. For certain applications to
run, you may need to make the root size larger than your screen.
Window Manager Lets you select the window manager in Multiple
Window Mode. You can select one of the following from the drop-down
list:
NativeMicrosoft Windows is used as the window manager.
XAny local or remote X window manager is used as the window
manager. Since window managers do not start by default, you must
start the window manager.
Default To NativeBy default, the native window manager (Microsoft
Windows) is used. However, if a local or remote X window manager is
started, it replaces Windows. After the X window manager is closed,
Windows becomes the window manager again.

82

Chapter 4: Connecting to Hosts and Running X Clients

If you are using an X window manager and want to display the X window
manager menus, select the Root Mouse Actions To X option in the Advanced
Multiple Window Mode Settings dialog box. By selecting this option, you can
click the Windows desktop to access the X window manager menus. Normal
Windows desktop mouse actions do not work when this mode is enabled.
To change it immediately, toggle this option in Xconfig, or click a button on
the server toolbar.
Fit Window To Display Makes the window of any client fit your screen if
the window is larger than the physical screen.
Note: If you enable Panning, do not enable Fit Window to
Display.

Focus Policy Located on the Common Settings tab, this feature determines
how a window is given focus if you are not using an X window manager.
You can select one of the following from the drop-down list:
ClickClick the left mouse button on the window to give it focus.
PointerMove the mouse pointer into the window to give it focus.

Note: The window is not brought to the front when it is given


focus with the pointer. To bring the window to the front, click your
left mouse button on the window caption or on its sizing border.

Cascade Windows Determines how to position client windows. It


cascades all top-level windows for which a client does not specify any
position.
These options are located
on the Screen tab of the
Screen dialog box.

Single Window ModeSpecific Options


Root Size Lets you set the size (in pixels) of the server's root window. In
single window mode, you can make the size of the root window smaller
(that is, if you have a high resolution display and want to restrict the size of
the server window) or larger than your screen.

83

Exceed Users Guide

A width or height of zero implies the root size will be equal to the size of the
client area of a maximized window when the Exceed X server menus appear
on the Control menu (that is with no menu bars or scroll bars). If you make
the root size larger than the client window, you can use the Panning feature
or scroll bars to view any hidden parts of the root.
The root size group box also lets you enable Full Screen. This option sizes the
Exceed X server window to the size of the entire screen. To open the server
menu when you select Full Screen, select Panning . To open the server menu
when you select Full Screen, press the ALT key and then the spacebar. The
ALT key you press depends on your ALT key mapping.
Show Scroll Bars Lets you display scroll bars in the Exceed window.
Scroll bars let you view hidden portions of the server root window when the
Root Size option makes it larger than the workspace.
Save Geometry on Exit Saves the server window geometry (that is, its
window position, size, and state) when you exit Exceed. When you restart
Exceed, the options are restored.

Using Window Managers


A window manager interprets requests or commands entered on the PC and
sends them to the Exceed X server. The X server sends the request to the X
application, and the application sends instructions to the Exceed X server to
display.
If you run an X window session without a window manager, you cannot
perform window operations such as resizing, moving, and iconizing.
Overlapping windows can make hidden parts of underlying windows
inaccessible.
Exceed uses two types of window managers: local and remote. Local
window managers run on your PC, while remote window managers run on
a remote host. Running Exceed with a remote X window manager generally
increases network traffic and may decrease overall system performance.

84

Chapter 4: Connecting to Hosts and Running X Clients

In the Xconfig Screen Definition application, select a window manager


type:

NativeRestricts you to using local managers. Local managers are

located on the Exceed X server.

XRestricts you to using remote managers.

DefaultInstructs the system to use a remote manager if available, but


otherwise use a local manager.

You can use any of the following window managers:


HWM (local) Uses the Hummingbird Motif-like window manager. If you
are running the Exceed X server in either single window mode or in
multiple window mode (with one of the X or the Default To Native options
selected), double-click its icon to run HWM.
Microsoft Windows (local) Uses the Microsoft window manager on
your PC. Windows automatically becomes the window manager when you
select either the Native or Default to Native option in the Screen tab of the
Screen Definition dialog box (with Multiple selected as the Window Mode). You
cannot use Windows as your window manager in single window mode.
Remote X Window Managers Uses a window manager that resides on
one of your hosts. You can use a remote window manager in multiple
window mode (when either X or Default To Native as the Window Manager
type).

Starting HWM or MWM


MWM is only available
with Exceed XDK.

HWM and MWM are located in the Exceed Tools folder. To open one of
these window managers, double-click the appropriate icon.

Starting Remote X Window Managers


Start X window managers in the same way that you start any X client in
Passive startup mode. If you are running an XDMCP startup mode, the
remote window manager is likely specified in the hosts startup file.

85

Exceed Users Guide

To start a remote X window manager:


1

Connect to the remote host using any startup method such as Xstart,
Xsession, or Telnet.

Provide your User ID, Password, and any other login information
required.

Type and execute the command to start the window manager.

Some typical window manager startup commands are listed below.


Window Manager

Startup Command Syntax1

DEC (UNIX)

[path/]dxwm&

OpenLook

[path/]olwm&

AIX

[path/]aixwm&

DEC (VMS)

[path/]SPAWN/NOWAIT/INPUT=NL RUN
SYS$SYSTEM:DECW$WINMGR <CR>

Motif (VMS)

[path/]SPAWN/NOWAIT/INPUT=NL RUN
SYS$SYSTEM:DECW$MWM <CR>

1. You must specify the DISPLAY environment variable or command line


parameter so that the remote window manager knows which display it should
use to connect.

86

Chapter 4: Connecting to Hosts and Running X Clients

Copying and Pasting


There are copy and paste commands on the Edit menu of most Exceed X
windows applications. In most cases, these commands are the same as the
copy and paste commands in other Windows applications.
Exceed provides copy and paste commands that can bridge the gap between
X applications and Windows applications. They let you copy and paste
between X and Windows, and X applications. These commands are listed
on the Exceed X server Edit menu. Typically, you may want to copy and
paste data such as long path specifications, command lines, and sections of
script files.
To determine the copy or paste command you need, you may find it useful
to think of the task in terms of the source and destination of the data. The
copying and pasting procedure varies depending upon the source and
destination.
If you are having
difficulties with cutting and
pasting data, ensure
Clipboard contents appear
in Clipboard (ClipBook)
Viewer (on the Start menu,
under the Accessories
group).

The following sections describe copying and pasting procedures for the
following scenarios:

Between Windows-based applications (for example, Microsoft Word,


Notepad, Paintbrush, Telnet, Hummingbird Basic, Xstart, and so on).

Between Windows-based applications and X clients displayed on your


PC (that is, displaying to your Exceed X server).

Between X clients displayed on your PC.

Using a Temporary Storage Buffer


The copying and pasting processes use a temporary buffer to hold data until
it is cleared or replaced. This is similar to Windows Clipboard. The buffer
being used depends upon whether you are running Windows applications
or X applications.
If you are unsure, see your
X client documentation.

The X selection an X client uses, and how it is used, depends upon the
client. Most systems use the PRIMARY X selection, but other selections
such as SECONDARY, CLIPBOARD, and CUT_BUFFER0 to
CUT_BUFFER7 are also defined. Some clients can make use of more than
one X selection.

87

Exceed Users Guide

To specify the X selection buffer:

For information on
automatic copy and paste,
see page 92.

Start Xconfig.

Double-click X Selection.

In the X Selection dialog box, select the correct buffer type, then click
OK.

Copying and Pasting Data


For information on copying
and pasting between X
clients, see page 91.

You can copy data to Clipboard, a file, or to the printer by using the
methods listed below. If you copy and paste using the Clipboard, you can
use csv and biff formats.

For more information, see


the Help.

You can paste data from Clipboard or from a file, using the Paste to X
Selection from Clipboard and the Paste to X Selection from File commands on
the server Edit menu.

Copying
Copy Rectangle to Copies a selected rectangle of the active X client
window (multiple window mode) or the Exceed X server root window
(single window mode). After you choose Copy Rectangle to, the cursor
changes to a camera icon. To define an area to copy, click anywhere within
the window and drag the mouse to define a rectangle. When you release the
mouse button, the Exceed X server copies the selected rectangle to the
destination specified by the selected command.
Copy All to Copies all visible portions of the active X client window
(multiple window mode) or the server root window (single window mode).
Copy X Selection to
For information on
automatic copying and
pasting, see page 92.

Copies the X selection.

You can paste data from Clipboard to another Windows application as long
as the destination application supports the data or format type.

Pasting
Paste to X Selection from Clipboard
selection.

88

Pastes data from Clipboard to the X

Chapter 4: Connecting to Hosts and Running X Clients

When you paste data from Clipboard to the X selection, Exceed assumes
ownership for the X selection. You can then use the X client-specific
method to paste X selection data into one or more X client windows
(usually at the insertion point). If you are using the PRIMARY X selection,
you can usually paste data into an X client window by clicking the middle
mouse button.
Note: If you are using a two-button mouse, start Xconfig, select
Middle Button Emulation on the Mouse Input dialog box, then click
OK . This lets you emulate a middle mouse button by clicking
both the left and right mouse buttons simultaneously. For more
information, see Mouse Input Settings on page 110.

Paste to X Selection from File


selection.

Pastes data from a specified file to the X

Copying and Pasting Graphics


Exceed lets you copy images from X to Clipboard. You can copy an entire
window or a partial window by dragging a rectangle over the window.
For more information, see
Installation Directories
on page 24.

The servers also let you paste images from Clipboard into an X client. The
method of pasting an image to X is based on ICCCM (Inter-Client
Communication Conventions Manual). For a technical description of the
process, refer to seltest.doc, located in the Exceed installation directory.
Note: Many X clients support the copying and pasting of
graphics to other X clients, but only through ICCCM X selections.

An example of copying and pasting images is supplied in a file named


seltest.c in the home\info directory. To build Seltest you must upload it to

a host where an Xlib development environment is available. On a UNIX


host compile Seltest as follows:
cc -o seltest seltest.c -lX11

where the library file libX11.a is on your path.

89

Exceed Users Guide

To copy images from Seltest to Clipboard:


You can find Clipboard
(ClipBook) Viewer on the
Windows Start menu, in
the Accessories program
group.

Clear the contents of Clipboard by selecting Delete from the Clipboard


Viewer Edit menu.

Select Clear X Selection on the server Edit menu if you are running in
single window mode, or from the Edit menu on Seltest system menu if
you are running in multiple window mode. This causes the server to
give up ownership of the primary selection.

Click the left mouse button in the seltest window. Seltest will request
ownership of the primary selection and will associate the image it is
displaying in its window with the primary selection.

Select Copy X Selection on the server Edit menu if you are running in
single window mode, or on the Edit menu (the Seltest system menu) if
you are running in multiple window mode. This causes the server to ask
the primary selection owner (Seltest) for the primary selection image
data. The server copies the image to Clipboard.

Display the Clipboard Viewer to verify the image was transferred from
the Seltest client to Clipboard.

To paste images from Clipboard to Seltest:

90

Copy an image to Clipboard using an appropriate Windows application


like Paintbrush.

Run Exceed and ensure the X selection option on the server Options
menu is set to primary.

Run Seltest from an xterm or Telnet window as information is output to


the standard output stream. Seltest initially displays an empty window.

Select Paste To X Selection on the server Edit menu if you are running in
single window mode or on the Edit menu on Seltest system menu if you
are running in multiple window mode.

Chapter 4: Connecting to Hosts and Running X Clients

Click the right mouse button in the Seltest window. Seltest will request
the current primary selection information and display all of the
selection target types, if any, which are available in the xterm or Telnet
window.
If an image is available, it is displayed in the Seltest window. The
amount of time it takes to display the image in the Seltest window varies
depending on network load, image size, and color resolution, but
should not be longer than 30 seconds in most cases.

Copying and Pasting Between X Clients


If two X clients running on your PC support the same X selection, you can
copy and paste between these X clients.
Note: Copying and pasting between locales is supported if you
set up the input properly on your PC. To do this, open Control
Panel and adjust the settings in the Regional Settings application.

To copy and paste between X clients:


1

Place the data that you want to copy in the X selection buffer using the
X client selection procedure.

On the Exceed X server Edit menu, click Copy X Selection to Clipboard.


This places a copy of the X selection in Clipboard.

If necessary, start Xconfig, select the X selection type used by the


destination client in the X Selection Settings dialog box, then click OK.

Choose Paste to X Selection from Clipboard on the server Edit menu.

Use the X client-specific method to paste the X selection data.

91

Exceed Users Guide

Automatic
You can set your system to automatically copy and paste X selections. This
saves time and is especially useful for high volume copying and pasting.
To set copying and pasting of X selections as automatic:
1

Open Xconfig.

Open the X Selection application.

Select the following options, according to the automatic settings you


want.
Select

To do this

Auto Copy X Selection

Copy the contents of the X selection to the


Clipboard.

Copy On Focus Loss

Copy the contents of the X selection to the


Clipboard when the window containing the X
selection is not in focus.

Auto Paste To X Selection

92

Paste the contents of the Clipboard when the


Clipboard contents change.

Chapter 5
Advanced Connection Methods

Advanced Xstart Features


Using Login Macros
Creating a Universal Login
Optimizing System Loads
Running Multiple Xstart Sessions on One Host

95
95
96
97
98

Running Multiple Xstart and Wstart Sessions


Running the Xsession
The Xsession File Sequence
Creating an Xsession Shortcut

99
101
102
102

Using Exceed on a Remote PC


Setting Up X Web

103
104

Chapter 5: Advanced Connection Methods

Advanced Xstart Features


Using Login Macros
You can use macros as shortcuts in the User ID, Password, and Command
boxes of the Xstar t or Wstar t window.

User ID and Password Macros


You can use the following macros to specify your User ID and Password in
the Xstart window.
Macro

Description

@u or @U

Inserts your User ID

@p or @P

Inserts your Password

To specify default User ID and Password:


1

Open Xstart.

In the Xstar t dialog box, click Other in the Settings area.

Click the Login Macros tab.

In the User ID and Password boxes, type the @u and @p macros


respectively.

Click OK to return to the Xstart dialog box.

Command Macros
In the Xstart Command box (in the Login area), you can type the command
macros shown in the following table.
Note: These macros are automatically defined by Xstart; you do
not need to perform additional steps to define them.

95

Exceed Users Guide

Macro

Description

@d or @D

Inserts your display environment specification. Do not use with VMS


systems. If you use the @d macro, type the following command to
start xterm:
xterm -display @d &

@a or @A

Inserts your network address. If you use the @a macro, type the
following command to start xterm:
xterm -display @a:0 &
Inserts the correct display transport identifier (that is, : for TCP/IP
and IPX/SPX, and : for DECnet). If you use the @: macro, type the
following command to start xterm:

@:

xterm -display @a@:0 &


Inserts your Display Number as configured in Xconfig's
Communication Settings dialog box. If you use the @# macro, type
the following command to start xterm:

@#

xterm -display @a@:@# &

Creating a Universal Login


This feature lets you cache your password, so that during an Xstart session,
you need login just once. The system caches the password until you either
exit Exceed or manually empty the cache. For example, you may need to
manually empty the cache if you are leaving your PC unattended for an long
period of time.
To create a universal login:

96

Create the Xstart file as usual. Refer to Creating a Startup File on


page 64 for detailed instructions.

In the Xstar t dialog box, click Other in the Settings area.

Click the Remember Password tab.

Provide the following informationHost, User ID, Password.

Click the Remember Password drop-down list and select an option.

Click OK.

Chapter 5: Advanced Connection Methods

Click Save on the File menu to save your file.

To manually empty the password cache:


1

Open an Xstart file.

Click Other, then click the Remember Password tab.

Click Delete All. This empties the cache, so that the next time you run or
create an Xstart connection, the system prompts you for your password.

Optimizing System Loads


This feature makes Xstart connections more efficient. When creating a
connection using Xstart, you can indicate that the connection should be
redirected to another host if the original host is already accommodating
many connections.
When you run the Xstart file, the system locates the host you specified. If
that host is busy, the system finds the host best able to accommodate the
connection, based on the search format you specified.
To optimize loads on the hosts:
1

Create the Xstart file as usual. Refer to Creating a Startup File on


page 64 for detailed instructions.

In the main Xstart dialog box, select Load optimization.

97

Exceed Users Guide

Click Other, then click the Load Optimization tab.

In the drop-down list, select one of the file retrieval methods. For more
information, see Browsing for Hosts and Applications on page 68.

When you are satisfied with the information on the Load optimization
tab, click OK.

Running Multiple Xstart Sessions on One Host


When you create an Xstart file, you can put multiple commands in the
Xstart Command box (in the Login area). This starts multiple Xstart files at
once. This feature is useful for simultaneously starting X applications that
you commonly use, such as expense reports, calendar, and mail
applications. To use this feature, all of the X applications must reside on the
same host.
Note: You may need to edit the command line to accommodate a
particular host. For example, each command is separated by a
semi-colon, but some UNIX hosts do not accept semi-colons.

98

Chapter 5: Advanced Connection Methods

Running Multiple Xstart and Wstart Sessions


To run multiple connections, create an Xsession file. Xsession lets you
combine .xs files into one .ses file, to run multiple Xstart sessions on
different hosts.
You can create different
Xsessions to run different
window managers
simultaneously.

Xsession provides other useful options such as specifying a configuration


file with your own settings, window modes, and startup modes. If you select
these settings within Xsession, they override Xconfig settings. For more
information on Xconfig settings, see "Chapter 6: XconfigConfiguring
Exceed" on page 105.
Note: By default, all Xsession files are saved in the user directory
where Exceed is installed, but you can specify another location.
The .ses file extension is appended automatically.

The following sub-sections describe how to create and run an Xsession file.

Entering Startup Information


You may find it useful to create Xsession files that just start the X server with
a specific startup mode and window mode. This lets you install custom
icons to start the X server in different ways, to selectively override the
default settings in Xconfig.

99

Exceed Users Guide

The Xsession window is divided into two areas showing information for the
session: an Available Programs box and a Included Programs pane.

Available Programs This box lists the file names and descriptions of all
Xstart (.xs) and Wstart (.ws) files in the directory where Exceed is installed.
To view files from another directory, click Directory.
For information on creating
an Xstart or Wstart file, see
Creating a Startup File
on page 64.

If you have not already created a file that starts the X client or X application,
click New Program and select the appropriate Program Type (either X Client or
Windows App ). Then click OK. This opens Xstart, where you can create the
required startup file.
Session All programs that start when you run the current Xsession file are
listed in the Included Programs box. The programs start in the order in
which they are listed here. A button panel lets you manage files.
You can also remove file(s) from the Included Programs box. Click Remove
All to remove all of the files in the list. Use Up and Down to re-arrange the list
of files into the desired startup order. To use any of the buttons, select the
file(s) in the Available Programs or Included Programs boxes that you want to
change, then click the appropriate button. You can also add files by dragging
and dropping them into the Included Programs box.

100

Chapter 5: Advanced Connection Methods

Description In this box, type the description of the Xsession file. When
you install an icon for this file, the text you enter in this box appears below
the icon. You can type up to 40 characters. If you do not specify a
description, Xsession uses the file name (minus the extension).
Show On Session Startup Menu If this option is enabled, a command is
created on the Session Star tup menu and Exceed launches the associated X
session. To open the menu, select Session Star tup from the X server Tools
menu, or the Exceed toolbar, or the Launch Pad X Apps menu.
Run X Server If this is enabled, Exceed starts automatically when you run
the Xsession file.
Options If Run X Server is selected, then you can click Options and specify
server options for the session. Defaults are specified in the Xconfig
applications.

For more information about


a specific option, click
Help in the Server Options
dialog box.

Interval This value (in seconds) specifies the time between the startup of
each program listed in the Included Programs box. The default value is 2
seconds.

Running the Xsession


You can run an Xsession file in the following ways:

In Xsession, select an .xs file and click Run on the menu bar.
101

Exceed Users Guide

For more information on


Xsession, see Running
Multiple Xstart and Wstart
Sessions on page 99.

To troubleshoot a
connection, see
"Chapter 10:
Troubleshooting" on
page 251 and "Chapter 4:
Connecting to Hosts and
Running X Clients" on
page 61.

This section describes the sequence of events when you run an Xsession
session. Learning this sequence helps you troubleshoot your connections
later on.

In Xsession, click Run on the File menu. In the Run dialog box, specify an
.ses file name (or multiple file names) and a directory, if necessary.

The Xsession File Sequence

If Run X Server is selected and the X server was not previously started,
the X server starts. If the X server is already running and you have
selected the Prompt for Server Restart option, Xsession asks you if you
want to restart the server.

After the time interval specified in the Xsession file has elapsed, the first
program listed in the Included Programs box starts.

After each program starts, there is a pause corresponding to the


specified interval.

The next program starts. The files start in the order that they are listed.

Creating an Xsession Shortcut


After you save an Xsession (.ses) file, you can install a shortcut.
To install an Xsession shortcut:

102

On the Xsession menu bar, click Install, or on the File menu select Install.

In the Description drop-down list, select the name of the folder where
you want to install the Xstart icon. You can also type a new name to
create a new program group. If you do not specify a folder, the icon is
installed in the current folder (that is, the open folder in Windows
Explorer).

In the Files box, select the .xs file you want to install. To browse files in
another directory, click Directory. Use Select All and Deselect All, if
required.

If you want to use an icon other than the default Xstart icon, click
Change Icon. Select an icon from the displayed icons or click Browse to
locate another graphic. When you are satisfied with the information in
this dialog, click OK. The icon installs with your specifications.

Chapter 5: Advanced Connection Methods

Using Exceed on a Remote PC


X Web is also known as
Broadway or X11R6.x

X Web lets system administrators provide user access to X applications from


a remote PC. The application is designed to extend X to the Internet,
intranet, and extranet without making any modifications to the existing
base of UNIX or X applications.
The system administrator embeds X application links on a web page for
users to access from a remote PC. By using X Web, users can access X
applications from a central location without having to know the UNIX host
name, or be familiar with UNIX or X Windows system protocol. The system
administrator does not need to re-code the applications to make them
available, and can control user access.
X Web (Broadway) includes the Low Bandwidth X (LBX) application, a
transparent extension to the X server that compresses X protocol and uses
server-side caching to cut down X server requests. Overall, LBX improves
the performance of X on WANs and slow dial-up connections. To use LBX,
you must install lbxproxy on the host to which you are connecting.
To run X Web, only the browser and the X server need be Broadwaycompliant. However, each application on the UNIX server must now have
three files associated with it:
Application-name.htmlthe page on which the URL resides.
Application-name.rxAn RX document describing the X server resources
the application needs. For example, a data modeling application might
specify the OpenGL extensions of Exceed for 3D rendering; if the X server
does not support these extensions, an error dialog pops up.
Application-name.plthe CGI (Common Gateway Interface) script that
launches the application.

103

Exceed Users Guide

Setting Up X Web
Complete the following general procedure to install and set up X Web.
To set up X Web:

104

If you have not already done so, install Exceed. Exceed fully supports
X11R6.6 (X Web).

Ensure the UNIX host can compile X11R6.3 or higher and you have
installed a web server.

For each application on the UNIX server, install Applicationname.html, Application-name.rx, and Application-name.pl on the web
server. These files are outlined above.

Chapter 6
XconfigConfiguring Exceed

About Xconfig

107

Keyboard Input
Keyboard

108
108

Mouse Input Settings

110

Communications
Setting the Sequence of Events

113
113

Security

114

Configuring Exceed X Server and X Screen


X Server Options and Extensions
Defining a Broadcast Address
Configuring X Screens

119
119
121
122

X Display, X Selection Type, and PC Standby Function


Setting the Display
Multiple X Display Support
Specifying X Selection Type
Controlling your PC Standby Function

123
123
124
126
127

Maximizing System Performance

128

Selecting Fonts
Managing the Font Database
Accessing the Font Server
Creating Font Aliases
Creating Several Aliases
Input Methods for Chinese, Japanese, and Korean

130
131
133
133
134
136

Special Considerations for Traditional Chinese

138

Using Xstart on VMS Systems


TCP/IP Transports
DECnet Transports

141
141
141

Chapter 6: XconfigConfiguring Exceed

About Xconfig
Xconfig includes applications for configuring the Exceed X server input,
communication, video, protocol, security, window mode, performance, X
selection, font, troubleshooting, and transport settings. In most cases, the
default settings are sufficient. If the Exceed X server is running while you
make changes to the configuration, the changes may take effect immediately
or require a server reset, depending on the settings changed. If the change
requires a server reset, a confirmation message appears. A server reset
terminates all X clients.
The default configuration file used by the Exceed X server is exceed.cfg. It
is located within the system directory where Exceed is installed for the user.
For example, in Windows NT (for the current user):
c:\WINNT\Profiles\user name\Application Data\Hummingbird...

You can use Xconfig to make changes to exceed.cfg and create other
configuration files (using Save As on the File menu). To have the Exceed X
server use a configuration file other than exceed.cfg, you can either:

Consult the Xconfig Help


to determine whether a
particular configuration
setting is global.

Use the Xsession X server options to specify the configuration file in a


session startup file and enable the Prompt For Server Restart option.

Specify /f and the full path to the configuration file on the Exceed X
server command line.

Certain settings, such as all security settings, are global to all configuration
files. If you make a change to a global setting it changes in all configuration
files.

107

Exceed Users Guide

Keyboard Input
Keyboard Input lets you control Exceed X server settings for your keyboard.
Keyboard files are provided, and contain keyboard layout and symbol
mappings. You can create an entire custom keyboard manually, but usually
it is better to start with one of the existing keyboard files, then customize it
to suit your needs. You can also configure the keyboard file for the primary
and alternate Exceed X server keyboards.
Use this application to:

Customize the current keyboard file

Select an alternate keyboard file

Map Shift and Alt keys for Exceed

Keyboard
To customize the keyboard:
1

Save a copy of the original keyboard file. This is a precaution in case you
change a setting and it does not work, or you do not like the new
settings.
Note: By default, keyboard files (*.kbf) are stored in the directory
where the Exceed user directory is installed.

108

In the Exceed folder, double-click Xconfig.

In the Xconfig folder, double-click Keyboard Input.

Select the keyboard you want to use. For both types of keyboards
(Primary and Alternate), you can select which one to use by clicking on
its corresponding drop-down list.

Primary displays the name of the current primary keyboard file. The
keyboard file contains the appropriate keyboard layout and
alphabet for the language selected.

Alternate displays the name of the current alternate keyboard file.

Chapter 6: XconfigConfiguring Exceed

To change the individual settings of either the Primary or Alternate


keyboards, click Edit. By customizing your keyboard file, you can
associate keys with X keysyms, compose key sequences, and redefine
keys.
Note: If you are not using one of the supported keyboards or if
you are using a keyboard without a separate cursor keypad and
12 function keys, you can create a custom keyboard file to interact
with Exceed.

To locate a keyboard file not listed in the drop-down lists, click Browse.

To allow users to modify keyboard files from their computers, select


Allow Clients to Modify Keyboard Mapping .

For keyboards containing two Alt keys, you can select options to assign
the left and right Alt keys. To direct Alt key sequences toward Microsoft
Windows or X Windows clients, select an option from the Alt Key dropdown list:

To Windows

To X

Left to Windows, Right to X

Right to Windows, Left to X

For keyboards containing two Windows keys, you can select options to
assign the left and right keys. To direct Windows key sequences to X
Windows clients, select an option from the Windows Key drop-down
list:

To Windows

To X

Left To Windows, Right to X

Right To Windows, Left to X

You can have each Windows key control a different function.


Note: The Windows key does not exist in the default keyboard file.
To map a Windows key, you must add it manually. See the Exceed
Help for details.

109

Exceed Users Guide

10 To define how the Shift keys on the keyboard are interpreted by Exceed,
select an option from the Shift Key drop-down list:

Map Both Left and Right

Map Left as Right

Map Right as Left

The Map Both Left and Right setting causes the left and right Shift keys to
be treated and interpreted separately. When you select the Map Left as
Right setting, any time you press a Shift key on your keyboard, it is
treated as a right Shift. If you select the Map Right as Left setting, any
time you press a Shift key on your keyboard, it is treated as a left Shift.

Mouse Input Settings


Use the following procedure to customize the mouse settings.
1

In Xconfig, double-click Mouse Input.

Select an option for mouse wheel action:

Wheel movement is ignoredSelect this option to invalidate all

mouse wheel input.

Wheel movement scrolls Root windows (in Single Window Mode


only)Select this option to enable scrolling in the main root

window only.

Wheel movement invokes macroSelect this option to map the

wheel movement to a macro. This is the only option that lets you
scroll in multiple window mode. For instructions on how to map to
a macro, see the procedure below.

Wheel movement sends Mouse button event (button 4/5)Use button

4/5 events to scroll the windows of existing X applications.


ButtonPress and ButtonRelease events are sent according to the
mouse wheel motion (up/down).
3

110

Make your two-button mouse into a three-button mouse for X client


windows:

Chapter 6: XconfigConfiguring Exceed

You can paste data (for


PRIMARY X selection) into
an X client window by
clicking the middle mouse
button. For more
information, see Pasting
on page 88.

Selecting Middle Button Emulation enables the feature.

Click Interval indicates the time lapse between clicking the left and

right mouse buttons for middle-button emulation to occur.

Movement Threshold indicates how much movement is allowed

when you click the left and right mouse buttons. If you stay within
the specified number of pixels, the system understands you are
indicating middle button emulation.
To map the mouse wheel to a macro:

X windows does not


recognize a mouse wheel.
This application lets you
translate it. You can map
the mouse wheel for
specific X applications.

Select Wheel movement invokes macro, then click Macro Mappings. The
Mouse Wheel Macro Bindings dialog box opens.

111

Exceed Users Guide

112

On the Assigned Wheel Macros panel, select a mouse action


combination, then click the adjacent browse button. The Macro Selector
dialog box opens.

Click Add. The New Macro Properties dialog box opens.

In the Name and Description boxes, type the function and brief
description. For example, type vi_scroll_up and Scroll Up.

Chapter 6: XconfigConfiguring Exceed

After you have decided on the keys you want to map to the mouse
wheel, in the Event List panel click Star t Record.

Enter the key sequence on the keyboard. When you are finished, the
application stops recording automatically.

Click OK to return to the Macro Selector.

Select your new macro from the list, then click OK.

The new macro is associated with the wheel action you selected. Click
OK to return to the Mouse Input dialog box.

Communications
The Communication application lets you control how connections are
made.

Setting the Sequence of Events


The startup mode determines the sequence of events that occur when you
start the Exceed X server, including whether a host connection occurs
automatically. There are two basic types of startup modes: Passive and
XDMCP. The mode you use depends on your transport, host, and
preferences.
Passive Mode If you intend to use Telnet, Xstart, Xsession, or a remote
process to connect to a host and start an X client, you should select Passive
from the Modes drop-down list. This startup mode lets you start the Exceed
X server without making any initial attempt to connect to a specific host.
XDMCP Modes The XDMCP (X Display Manager Control Protocol)
modes lets you automatically activate the XDM connection process. After
you start the Exceed X server, and successfully login to XDM, the clients
listed in the XDM session script file are started.

113

Exceed Users Guide

XDM lets you manage X displays. It allows for centralized control over the X
environment and provides an added measure of security. XDM provides an
X-based login function and generates authorization information that can be
used by the Exceed X server to control which users on which hosts may be
given access to an Exceed X server display.
If you use an XDMCP startup mode, you do not need a separate startup
application to start X clients (that is, Xstart, Xsession, or Telnet). However,
you may use these applications to start additional X clients.

Security
You can set security to either restrict or allow access to specific components
of the Exceed X server. You can use the Security application to:

114

Change security settings for Xconfig

Enable or disable host access

Create a security file (.xauth)

Modify Xweb security settings

Change security settings for Extend

Chapter 6: XconfigConfiguring Exceed

To perform these tasks, double-click Xconfig, then double-click Security.

Changing the Xconfig Password


To change the Extend
password, see Modifying
Extend Settings on
page 118.

The Password button in the Security dialog box lets you change your
Xconfig password.
1

In the Security dialog box, click Password. The Xconfig Password dialog
box opens.

Type the current (old) password, type a new password, then confirm
the new password by retyping it.

Click OK.
115

Exceed Users Guide

Enabling and Disabling Host Access


Use the following options in the Security dialog box to modify host access
on your system.
Host Access Control List Lets you restrict access to your Exceed X server
to specific hosts. By default, the Host Access Control List is the xhost.txt
file, in the directory where the Exceed user directory is installed.
Note: If you select the xhost.txt file, you can use only the
Passive startup mode in the Communication dialog box.

Specify another file through one of the following methods:

Type its full path (if other than the directory where the Exceed user
directory is installed) and file name in the File box.

Locate it by clicking Browse adjacent to the File box.

Modify the Host Access Control List file in a text editor by clicking Edit.

Enabled (no host access) Instructs Exceed to use an empty Host Access
Control List to regulate access. With an empty list, no hosts are allowed
access.
Disabled (any host access) Terminates the use of the Host Access Control
List and allows unrestricted access to all hosts on the network.
Allow Clients to Modify Host Access Control List This setting regulates
client modification of the Host Access Control List (xhosts.txt).
Enable User Access Control List Lets you enable security at the user level
(rather than at the host level) without using XDMCP. By default, this setting
is not selected. For optimal security when using this option, clear the Allow
Clients to Modify Host Access Control List check box and select an option in
the Host Access Control List area.

116

Chapter 6: XconfigConfiguring Exceed

Creating a Security File


User level security is controlled through an Xauthority file (by default
.xauth) that is read each time the server is started or reset. You can create an
Xauthority file using the host-based Xauth utility. To make this binary file
available to Exceed, download it from the host and copy it to the directory
where the Exceed user directory is installed. To select an Xauthority file
other than the default xauth file, click Browse.

Modifying Xweb Settings


You can use Xweb security settings to control running X clients from web
sites, either independently or embedded within the browser. Select from the
options described below.
Security Policy File This file lets you specify certain restrictions on
clients. Each line in the Security Policy text file starts with a keyword:
#Lines starting with this symbol are treated as comments.
sitepolicyLines starting with this keyword are used to specify or

name the policies that Exceed X server supports. These lines are
characterized by a specific syntax: a collection of alphanumeric
characters designed to match a similar collection in the configuration
file of a firewall proxy.
propertyLines starting with this keyword are used to assign
permissions to untrusted clients regarding access to window properties.
For more details about
property access rules and
keyword syntax, see the
various comment lines in
the security.txt file
(click Edit in the X Web
area of the Security dialog
box).

The syntax of property keyword lines are as follows:


Keyword

Syntax

property

The property name, such as, RESOURCE_MANAGER,


WM_NAME, CUT_BUFFER0

window

The rule is applied to all windows.

propertyselector

The rule is applied only to the root window.

117

Exceed Users Guide

Keyword

Syntax

permissions

The rule is applied to windows having the specified


property.

operation

Denotes read, write, and delete respectively.

action

Denotes allow, ignore, and error respectively.

In many cases, errors in the security policy file can cause applications to
terminate, or even crash. The alternative is to specify ignore as the action,
in which case, the operation is not carried out, but returns success.
Plug-in/Helper App Configuration Files The corresponding Edit buttons
open Notepad with the respective configuration file loaded. This is the only
place you can edit configuration files. If you edit them outside of Xconfig,
the system returns a warning or error message, and it ignores the
configuration files.

Modifying Extend Settings


Extend is a suite of X Window clients that reside on the UNIX host.
Enable Extension If you select this box, the Extend extension is enabled.
You must select this box to use Extend. This feature provides server support
to the X Window clients. By default, this setting is not activated.
Password Opens the Extend Password dialog box, which lets you restrict
access to the Extend extension by specifying a password. When the Extend
clients are available on the host, authorized users with the password can:

Launch applications on the server PC

Access and transfer files between the host and PC

Print files
Note: If you do not specify a Extend password, then anyone can
access files on your PC.

118

Chapter 6: XconfigConfiguring Exceed

To change the extension password:


1

In the Extend area of the Security dialog box, ensure Enable Extension is
selected, then click Password. The Extend Password dialog box opens.

Type the current (old) password, type a new password, then confirm
the new password by retyping it.

Click OK.
Note: Remember the password. It is required to change the
password again.

Configuring Exceed X Server and X Screen


X Server Options and Extensions
The Protocol application lets you control the options that regulate how the
Exceed X server operates. Protocol also lets you enable, disable, and
configure Exceed X server extensions.

119

Exceed Users Guide

Allow Old X11 Bugs Tells the Exceed X server to permit a number of
protocol-related problems which were allowed or missed in X11 R3 and X11
R4 X servers. By default, this setting is turned on.
DECwindows Compatibility

Provides DECwindows compatibility.

X Conformance Test Compatibility Configures the Exceed X server so it


will pass certain tests in the X Conformance Test Suite (X Test Suite), which
it would normally fail. These failures occur because some X clients have
problems for which the Exceed X server has benign workarounds. You
should also select Allow Clients to Modify Host Access Control List in the
Security Settings dialog box, to pass certain X Test Suite tests.
Additionally, selecting this option overrides your current Delay Window
Mapping setting (Xconfig window Screen Definition Screen tab
Advanced). If this option is selected, there is no delay on window mapping.
Pad Depth 1 Pixmaps to 32 Bits Forces the Exceed X server to pad
scanlines in monochrome bitmaps to a multiple of 32 bits instead of 16 bits.
Some X clients require this setting in order to draw properly. If your X client
draws images incorrectly resulting in aliasing (lines having a staggered or
staircase-like effect), try enabling this setting.
Use 32 Bits Per Pixel for TrueColor Forces the Exceed X server to use 32
bits per pixel instead of 24 bits when using the TrueColor visual. Some X
clients require this setting in order to draw properly. If your X client draws
images incorrectly resulting in a scrambled image, enable this setting. By
default, this setting is enabled.
Disabling this setting may result in an improvement in the performance of
your Exceed X server; however, your images may draw incorrectly as a
result. In that case, re-enable the setting.
Enable Custom Vendor String Lets you specify the vendor string that is
passed to clients at connection time (in the connection block). If your client
requires a specific vendor string, select Enable Custom Vendor String, type the
Vendor String in the box, and click OK.
Extensions This button opens a dialog box that lets you enable and
disable various protocol extensions. Click Default to restore the original
settings.

120

Chapter 6: XconfigConfiguring Exceed

Defining a Broadcast Address


Double-click Transpor ts to select the transport used by the Exceed X server
and local X clients. If you have previously selected the XDMCP broadcast
mode, you can define the broadcast address here.

To broadcast on the local network, this address must consist of the network
portion of your IP address with a host portion numeral set to 1 (binary).
For example, if your IP address is 192.9.200.6 (a Class C address), the
network portion of the address is 192.9.200. For more information
regarding broadcast address specification, consult your TCP/IP network
software documentation.
To switch to different transport type, click Choose, then select a transport
interface.

121

Exceed Users Guide

Configuring X Screens
The Screen Definition dialog box lets you select the window mode (and
related options), server visual, and monitors to use for each X screen. For
more information, see Window Modes on page 80. In addition, you can
add, enable or disable, and delete X screens. You can also provide
information about your monitor configuration.

By default, one X screen (screen 0) is available. To add more X screens, click


Add. Up to four X screens and sixteen monitors can be supported. This
feature is useful for users who need their data split across as many as sixteen
monitors or divided into many screens.
Note: To use multiple monitors, you need to install multiple video
cards on your PC.

Configuring Four Screens


If you configure four screens, they appear on the monitor as top left, top
right, bottom left, and bottom right for screens 0, 1, 2, and 3 respectively. By
default, one X screen is defined.

122

Chapter 6: XconfigConfiguring Exceed

Deleting a Screen
To delete a screen, select the tab for the screen, click Delete, then click Yes at
the prompt. Screens must be deleted in reverse numerical order. That is, if
you have four screens (0, 1, 2, and 3), you cannot delete Screen 2 before
deleting Screen 3. You cannot delete Screen 0.

Disabling a Screen
As an alternative to deleting a screen, you can disable it by clearing Enable
Screen on the Screen tab. If you disable a screen, all higher numbered
screens are disabled as well. You cannot disable Screen 0.

Performing Other Common Tasks

To add screens, click Add.

To add monitors, select the Monitor(s) To Use For Screen option and type
the number of monitors in the adjacent box.

To customize screen focus changes, click the Common Settings tab and
complete the information there.

To indicate a custom monitor size, click the Monitor Info tab and type the
monitor size in the boxes provided.

X Display, X Selection Type, and PC Standby Function


Setting the Display
Video lets you customize the video mode and colors displayed by the Exceed
X server. You can set the width and height of the your monitor, associate
names with red-green-blue values in an RGB database and specify the icon
defaults for native window manager mode.

123

Exceed Users Guide

The Palette area lets you modify how the Exceed X server interacts with the
Windows color palette.

Multiple X Display Support


Support for multiple X displays is available. It lets users run multiple
simultaneous copies of the Exceed X server (limited only by available
memory and resources) as long as each copy has a unique display number.
This feature is useful for users who want to establish multiple XDM (X
Display Manager) sessions with different hosts.
The following command line parameters are supported by the Exceed X
server (Exceed.exe):
-d <display#>
-d <filename.cfg>

where <display#> represents the desired display number from 0 to 9999


inclusive and <filename.cfg> is the configuration file name.
The following command line parameters are optional:
-m passive|query|indirect|broadcast
-h <hostname>
-w multiple|single

124

Chapter 6: XconfigConfiguring Exceed

where <hostname> represents the connect host for the XDMCP-query or


XDMCP-indirect startup modes.
For example, to start the Exceed X server in single window mode on display
1 with a startup mode of XDMCP-query to host xdmhost specify:
home\EXCEED -d 1 -m query -h xdmhost -w single

For a particular command-line parameter, if you want the setting to default


to its current Xconfig value in the exceed.cfg configuration file, then omit
its specification on the command line.
The easiest way to startup multiple simultaneous copies of the Exceed X
server is to use Xsession. In Xsession, you should clear the Run X Server
option, add a New Program of type Windows App to the session for every
copy of the Exceed X server in the session. For each Exceed X server in the
session make sure either the command line is fully specified or the
exceed.cfg value is suitable, and ensure a unique display number is used.
Enter the session description text in the Description box, save the session,
and install a program shortcut to enable double-click startup of the session.
The current implementation of multiple X display support has several
restrictions or caveats. For example:

Since certain X displays might share the same configuration file, do not
make changes to your configuration while the Exceed X server is
running.

Since only one X display can own the desktop/root window and the
configuration file is shared, do not enable the following multiple
window mode Xconfig settings if you are using the multiple X display
feature: Root Mouse Actions to X and multiple screens. The Root Drawing
option should be None. You can still use the Root Mouse Actions to X
toolbar button, but ensure the setting is selected for only one X display
at a time.

Colormaps are not shared between X displays which may result in color
flashing in 256 color video mode when you change the focus between
windows which are on different X displays.

Multiple copies of the Exceed X server cannot share a single log file. To
solve this problem, the name of the log file in your configuration file is
used to construct the log file name for each copy of the Exceed X server.
This is done in the following manner: if the log file name in your
125

Exceed Users Guide

configuration file is exceed.log then each copy of the Exceed X server


will use a log file whose name is exceed<display#>.log where
<display#> is the display number of the Exceed X server.
To disable support for multiple X displays, set a value named
DisableMultipleXDisplays to 1 (DWORD) for the registry key
HKEY_LOCAL_MACHINE\SOFTWARE\Hummingbird\Connectivity\7.10\
Exceed\XServer in the registry database.

Specifying X Selection Type


The X Selection application lets you specify the type of X selection used by
the commands in the Exceed X server Edit menu.

You can also set the Auto Copy X Selection and Auto Paste to X Selection
options in this dialog box. For details, see Automatic on page 92.

126

Chapter 6: XconfigConfiguring Exceed

Controlling your PC Standby Function


The Power Management application lets you prevent your PC from entering
standby or sleep mode. Double-click Power Management and select a delay
option.

127

Exceed Users Guide

Maximizing System Performance


Performance lets you adjust the amount of Microsoft Windows system
resources used by the Exceed X server to enable various performancerelated drawing techniques. It also lets you tune the Exceed X server for
optimal graphics performance for your current video configuration.

System Resource Usage This slide bar displays the amount of total system
resources allocated for use by the Exceed server. To reduce resources
available to the Exceed server, slide the bar towards Limited. This lets
resource-intensive X clients execute without exhausting system resources.
However, limiting server resource usage may reduce server performance.
Dynamic Adjust When this option is activated, the system uses the value
set in System Resource Usage as a starting point from which the Exceed X
server automatically adjusts the resource usage to compensate for the
system conditions. When system resources are low, the system temporarily
reduces resources to the Exceed X server to help alleviate further drain on
resources. Conversely, when system resources are high, the system
temporarily increases resources to the Exceed X server to help improve
system performance.
128

Chapter 6: XconfigConfiguring Exceed

Exact Zero-Width Lines To force exact line drawing for zero-width lines,
select this option. By default, the Exceed server lets Microsoft Windows
directly draw zero-width lines. This method is generally much faster than
the exact pixel algorithm used by X to draw lines of other widths.
Note: Some video drivers ignore color information on some styles
of zero-width line drawing. You should select this option if lines
appear in an incorrect color, or do not appear at all.

Draft Mode Lets you improve performance through a slight and


generally unnoticeable reduction in drawing accuracy. By default, this
option is turned on.
Maximize X11Per Results If enabled, Exceed passes X conformance tests.
Use this option only if you are performing X conformance testing.
Batch Requests
performance.

Batches X client requests to improve overall server

Save Unders Lets you save parts of a window that become obscured by
menus/windows in the foreground to system memory. The option
eliminates the need to refresh the window when the menu rolls back up.
The system ignores this check box if the Maximum Backing Store box is set to
None.
Backing Store Refers to storing the information required to refresh the
screen from the client in server memory. Backing store options let you
specify the circumstances under which you want backing store to occur.
Either the client requests a specific backing store, or the client leaves the
type of backing store to the server.
You can specify a maximum and a default backing store value. Maximum
governs when the client requests a type of backing store, and the default
governs when the client leaves the backing store setting to the server. The
following backing store settings are available:

NoneNever save the contents of the client window.

When MappedBacking store is provided to all mapped windows. The

storage of screen information only occurs when the client draws the
screen in mapped mode.

129

Exceed Users Guide

AlwaysAlways attempt to preserve the contents of any window,


whether it is mapped or not, as long as it is displayed on the Exceed X
server. This option is available only for maximum.

Tune Starts the Xperf application. Xperf lets you override the current
drawing methods used by the server and run tests to determine the optimal
graphics configuration for your Exceed server. Before running Xperf,
terminate all X clients since Xperf automatically terminates and restarts the
server. If the server is already running, Xperf prompts you to confirm a
server reset.
Note: If you change video cards, drivers, your video configuration,
or the Accelerated Drawing Mode setting in the Performance
Settings dialog box, run Xperf to ensure optimal server
performance.

Selecting Fonts
The Font Settings dialog box lets you view and edit the font database
available to Exceed, import and export font aliases, compile BDF and PCF
font files to the an Exceed format, and select default text and cursor fonts.

When you install Exceed, you automatically install font databases that
support the International CDE.
Note: You do not have to modify the font database created during
installation unless you want to use these new features.

130

Chapter 6: XconfigConfiguring Exceed

The font database includes support for scalable fonts and font servers. You
can also create multiple font sets and load the one(s) you want to use at
run-time. Exceed can automatically connect to a font server running on the
XDMCP host server.
The font database is stored in the lfp.xdb file in the directory where Exceed
is installed. Specific fonts in the font database are stored in font directories
and font servers. Exceed also supports pseudo fonts for Unicode.

Managing the Font Database


To view and Edit the font database:
1

In the Xconfig folder, double-click Font.

Click Font Database. A dialog box opens, listing all font directories and
servers in the font database.

Use the buttons and options in the Font Database dialog box to make the
following changes:

Add, change, or delete font directories in the database

Add, change, or delete font servers in the database

Change the paths of the font directories/servers


131

Exceed Users Guide

Determine (resolve) the physical font names of logical fonts

Rebuild the database

Enable automatic font substitution and advanced font server


options

Place the font directories/servers containing the most commonly


requested fonts at the top of the list to reduce the amount of time it
takes to find a match. Click Move Up and Move Down to change the
display (search) order.

To add, change, or delete fonts:

132

In the Font Database dialog box, click Font List for Directory. This displays
the fonts contained in the selection.

Use the buttons in the Font List dialog box to make the following
changes:

Add, change, and delete fonts

Load another font database file

View font lists for each database, create aliases, and scale fonts

Rebuild font databases

Chapter 6: XconfigConfiguring Exceed

After you have made changes, click Save As. The modified file is saved
in the directory where Exceed is installed with an .xdb extension.
Note: When you install fonts, you should install both 75 dpi and
100 dpi fonts for best font matching. Additionally, if the monitor
size is greater than 1024 x 768, in the Font Database dialog box,
place the 100 dpi font in a higher priority than the 75 dpi font.

Accessing the Font Server


After you have added a font server to your list of font databases, you can
control how it is accessed. To access these options, in the Font Database
dialog box, click Advanced.
Enable Auto Reopen Select this option to keep the font server available
(active) at all times. This option requires your system to periodically check
the font server and restart it, so it slows your system.
Enable Cache Select this option to automatically obtain or update a font
cache on your local drive. This option is enabled by default.
Local Fonts First Select this option to search local fonts first select this
option. Usually, the search priority is from top to bottom in the font
database list.
Click OK to save your changes and return to the Font Database dialog box.

Creating Font Aliases


In some cases, X clients may request a font not included in the database.
The server responds by issuing a Font not available error message and
logging the logical name or search pattern of that font in the log file.
You can use a font alias to link the requested font to an existing font with
similar characteristics. After you create the font alias, clients can request the
previously denied font so that the server can deliver the font alias.
Note: Check the log file regularly for denied font requests.

133

Exceed Users Guide

To create a font alias:


1

In the Xconfig folder, double-click the Font icon, click Font Database,
then click Font List for Directory. The Font List dialog box opens.

Click Search to find an existing font resembling the requested font


pattern. If you do not find one in this directory, try another directory
until you find one that you consider a reasonable match.

Click Make Alias.

Type the font name in the box. If the font name is on the Clipboard,
click Paste.

Click OK.

The font alias appears immediately below the logical font name in the
second column of the Font List dialog box.

Creating Several Aliases


To create several aliases at the same time, create an alias file containing all of
the desired aliases. An alias file is a text file that you can create or edit in any
text editor, such as Windows Notepad. You can then import the contents of
the alias file into the font database.

Importing Alias Files


Import Alias lets you import a file containing aliases into the font database.

To import an alias file:

134

Double-click the Font icon.

Click Import Alias in the Font dialog box.

Select an input alias file by selecting the appropriate file name and
directory from the boxes.

To limit the search to one font directory, select the desired font
directory in the Limit Import to Selected Font Directory box. Otherwise, all
font directories are used for searching.

Click Import to start importing.

Chapter 6: XconfigConfiguring Exceed

Repeat steps 3 to 5 for the each alias file you want to import.

Click Close.

Exporting Alias Files


The Expor t Alias dialog box lets you export aliases from the font database.
Using this feature, you can export a group of aliases to a file so that you can
distribute them among other Exceed users in your company.

To export an Alias file:


1

Double-click the Font icon.

Click Expor t Alias in the Font dialog box.

Type the name of the output alias file in the File Name box.

Select the desired Output Type.

135

Exceed Users Guide

If you want to limit the search to one font directory, select the
appropriate font directory from the Limit Export to Selected Font
Directory box. Otherwise, all font directories are used in the search.

Click Expor t to start exporting.

Click Close.

Input Methods for Chinese, Japanese, and Korean


This icon
appears in
Xconfig only
if you are
running a CJK Windows
operating system or
Windows 2000 (provided
Microsoft IME is installed
and enabled).

This dialog box lets you configure how to enter and pass Chinese, Japanese,
or Korean (CJK) text to an X client.

The Exceed X server supports both Simplified and Traditional Chinese. To


enter CJK text in an X client, you need to run an Input Method (IM) server.
You can configure the Exceed X server to use either an external X client as
the IM server or an IM server built into the X server. To use the Microsoft
Windows Input Method Editor (IME) to enter text in an X client, you must
configure Exceed to use an IM server built into the X server.
You can select one of the following input methods to enter CJK text:

136

Select Use Input Server on the host to use an input method server X
client.

Chapter 6: XconfigConfiguring Exceed

Select Protocol to use an Input Method Server built into the Exceed X
server.

Select Copy and Paste to use copy and paste commands to input CJK
text.

Using an Input Method Server X Client


For information on the
remote Input Method
Server, refer to your host
documentation.

The Use Input Method Server on the host option lets you enter CJK text using
whatever mechanism the input method (IM) server X client supports. Select
this option if you are using an external IM server X client. This means the
Exceed X server will not support internal CJK input methods. This option
does not permit the use of the Microsoft Windows IME to enter CJK text.
The available IM Server X clients vary by host type. The following table
shows the IM Servers typically available on specific host types:
Host Type

IM Server

HP

xkim/xjim/xsim/stim

Solaris

htt

Digital

dxhangulim/dxhanyuim/dxhaziim/dxjim

Using an Input Method Server Built into the Exceed X Server


Select the Protocol option. The Exceed X server internally manages an Input
Method Server and uses the Microsoft Windows IME to enter CJK text.
When you enter text, the Exceed X server uses one of the selected protocols
to pass text to the X client.
The Exceed X server registers and manages an Input Method Server for each
protocol selected in the Protocol Selection area. This means that you can
enable multiple protocols, and each X client can use the protocol of its
choice. We recommend that you enable all available protocols.

Specifying Locale (Ximp/XIM)


The Exceed X server supports most of the standard encoding names. In
most cases, you do not have to specify the encoding name. However, if your
X clients are running in a non-standard encoding environment, enter the
appropriate locale name.

137

Exceed Users Guide

Using Copy and Paste to Input CJK Text


Select the Copy and Paste option. The Exceed X server does not register an
Input Method (IM) Server when this option is selected. Instead, it uses the
Microsoft Windows IME to enter CJK text, and rather than using an IM
Server to pass text to the X client, it copies the text into the X selection and
tries to paste the X selection CJK text into the X client.
Exceed supports two copy and paste input methods. One is designed for
Kterm and the other for OpenLook. Select the copy and paste method you
want to use in the Use Environment area. If the CJK text is not automatically
pasted into your X client, you need to use the X client Paste operation to
paste the CJK text.

Special Considerations for Traditional Chinese


Because there is no standard encoding in Traditional Chinese
environments, Exceed can support only one encoding name at a time. By
default, the Exceed X server supports the HP-BIG5 (HP Traditional Chinese
Environment) encoding. If you want to use the BIG5-0 (Digital Traditional
Chinese Environment) encoding instead, you need to make changes to the
Exceed initialization file and the xlc_locale file.
To input Traditional Chinese using the BIG5-0 (Digital Traditional
Chinese Environment) encoding:
1

Open the exceed.ini file in the directory where Exceed is installed and
add the following line under the [Options] heading:
BIG5EncodingName=BIG5-0
Note: Remove this line to input Traditional Chinese in an HP
environment (HP-BIG5).

Open the xlc_locale file on your PC and make the following changes:
a) under the heading fs1, modify as follows:

138

# used for HP-UX

# charset HP-BIG5:GLGR

# used for Digital UNIX

Chapter 6: XconfigConfiguring Exceed

charset

BIG5-0:GLGR

b) under the heading cs1, modify as follows:

# used for HP-UX

# ct_encoding
HP-BIG5:GLGR:\x1b\x25\x2f\x30\x80\x8aHP-BIG5\x02

# used for Digital UNIX

ct_encoding
BIG5-0:GLGR:\x1b\x25\x2f\x32\x80\89BIG5-0\x02

Restart the Exceed X server if it is running.

To view the Traditional Chinese HP Common Desktop environment:


1

Download the following Chinese Big5 fonts from


ftp://ftp.edu.tw/Chinese/ifcss/software/fonts/big5/bdf
or search for them at http://ftpsearch.lycos.com:
uwb5-16m.bdf.gz
eb5-24f.bdf.gz

Decompress the GZIP compressed fonts.

In Xconfig Font Settings, select Compile Fonts in the Font Settings dialog
box and compile the downloaded .bdf fonts to the .fon format.

Copy uwb5-16m.fon and eb5-24f.fon to:


home\font\chinese directory.

Import the font aliases:


a) Select Import Alias in the Font Settings dialog box.
b) Select the chinese.ali file residing in the directory where Exceed is
installed.
c) For the Limit Import to Selected Font Directory option, select
home\font\chinese.
d) Click Import.

139

Exceed Users Guide

If the Exceed X server is running, point to Reload Database, then on the


Exceed X server File menu, click Font.

To view the Traditional Chinese Digital Common Desktop environment:


1

Follow the steps in the above procedure.

Create a new font subdirectory in the home\font directory.

Download the following fonts from a Digital UNIX host that supports
Traditional Chinese into the new font directory created in step 2:

adecw_hei_cns11643_16_16_75.pcf

adecw_screen_cns11643_16_18_75.pcf

adecw_screen_cns11643_24_24_75.pcf

jdecw_screen_decsuppl_8_18.pcf

jdecw_screen_decsuppl_12_24.pcf

In Xconfig Font Settings, select Compile Fonts in the Font Settings dialog
box and compile the downloaded .pcf fonts to the .fon format.

Add the new font directory to the font database and move it to the top
of the font database list using the Move Up button.

Import the font aliases. To import the font aliases:


a) Select Import Alias in the Font Settings dialog box.
b) Select the dec_tw.ali file in the directory where Exceed is installed.
c) For the Limit Impor t to Selected Font Directory option, select the new
subdirectory created in step 2 from the home\font directory.
d) Click Import.

140

If the Exceed X server is running, point to Reload Database, then on the


Exceed X server File menu, click Font.

Chapter 6: XconfigConfiguring Exceed

Using Xstart on VMS Systems


You can use Xstart on VMS systems by selecting the correct start method for
your transport software and entering all of the required information in the
Xstart window.

TCP/IP Transports
You can use Xstart on a VMS system running TCP/IP if your VMS system
supports REXEC or RSH. You must create a script on the host containing
the DISPLAY environment variable specification and the command to start
the X client. You can then use REXEC or RSH to connect to the host and
execute the script.
If your VMS system supports REXEC or RSH, and it is running Version 5.0
of the PCX$SERVER command processor, start an application by choosing
the REXEC or RSH start method and type the following in the command
box:
@sys$system:pcx$server 4,display-number, screennumber,tcpip,node-address, command <CR>

For example:
@sys$system:pcx$server 4,0,0,tcpip,
2.10 DECW$TERMINAL <CR>

Otherwise, use Telnet to connect and start remote applications.

DECnet Transports
To use Xstart on a VMS system running DECnet, choose the PCX$SERVER
(DECnet) startup method and, depending upon which version of the
PCX$SERVER command processor you are using, type one of the following
in the Command box:

By typing a command, you can select Version 2 of the PCX$SERVER


command processor. For example,
DECW$TERMINAL

141

Exceed Users Guide

You can specify that you want to use Version 3 of the PCX$SERVER
command processor by typing the following command:
3,transport,node-address,command

For example, to send the command DECW$TERMINAL to your node


address 2.10 on DECnet, type the following:
3,DECNET,2.10,DECW$TERMINAL

You can specify that you want to use Version 4 of the PCX$SERVER
command processor by typing a command as follows:
4,display-number,screen-number,transport,
node-address,command <CR>

For example, to specify display number 0 and screen number 0, and


send the command DECW$TERMINAL to your node address 2.10 via
DECnet, you would type the following:
4,0,0,DECNET,2.10,DECW$TERMINAL

You can also use command field macros when specifying this
information. For example:
4,@#,0,DECNET,@a,DECW$TERMINAL

142

Chapter 7
System AdministrationSconfig
and Jconfig

Customizing Installations with Sconfig


About Windows Installer Database Files
Microsoft Transform Files
Working with Transform Files in Sconfig
About Creating Transform Files in Sconfig
Customizing Product Directories
Selecting Features to Install
Selecting Files to Install
Setting Product Properties
Setting the Registry
Setting Shortcuts
Setting Exceed Properties
Setting Custom Font Directories and Servers
Setting Paths for Font Directories/Servers
Saving the .mst File
Applying the .mst File to an Install
Creating Multiple Custom Installations

145
145
146
146
147
149
150
151
154
158
161
162
164
171
172
172
173

Configuring Remote Hosts


How Remote Configuration Works
Configurable Remote Services
Installing Jconfig
Running Jconfig in a Java-Enabled Browser
Opening a Configuration Session
Configuring the Jconfig Application Settings
Configuring the Remote Services for a Host

174
174
175
177
178
179
180
183

Using Scripts to Configure Multiple Hosts


Locking a Configuration Session

184
185

Chapter 7: System AdministrationSconfig and Jconfig

Customizing Installations with Sconfig


Many users in an enterprise maintain different development needs and
require customized software to meet those needs. For example, some users
may require specific features of the Hummingbird product such as Telnet
and FTP setting files to connect to frequently used hosts, while other users
would not. Instead, these users may require specific font settings and
features installed with their Hummingbird product.
For more information on
Windows Installer, see the
installation chapter.

Sconfig is an advanced system administration tool that helps users make the
best use of their Hummingbird software in specific networked
environments. With Sconfig, you can customize the Setup Wizard to create
tailored installation packages of Hummingbird software for different users.
You can:

Customize the directories in which the product is installed.

Tailor the list of applications or components to be installed. You can


alter the list to limit the functionality available to users, or to optimize
the use of disk space.

Simplify user input during the installation by preselecting information,


such as the properties of the software being installed.
Note: When installing the Hummingbird software on the
administrator machine, you must choose Custom or Complete
installation. The Sconfig utility does not install on a Typical
installation.

You can use Sconfig to package customized installations that cater to each
user by creating a Microsoft transform file (.mst). After creating a transform
file, you can then include those applications (and subsequent components)
that are useful for each user.

About Windows Installer Database Files


Microsoft Windows Installer uses Microsoft Software Installation package
files (.msi) to install the Hummingbird product. A package file is a database
file which contains information on product components and installation
directories.

145

Exceed Users Guide

Sconfig uses the package files as a foundation for building customized


installations. Using Sconfig, you can open any Hummingbird product
package file, modify the settings, and save the customized settings in a
Microsoft transform file.

Microsoft Transform Files


A Microsoft transform file makes changes to the elements of a package file.
When a transform file is applied to a package file, it changes the behaviour
of an installation.
Whenever Windows Installer needs to perform a customization or a
configuration change, it applies the transform file to the package file to
create and change the installation database. Like the package file, the
transform file is a relational database with information about product
components and installation directories, but the transform file contains
only those changes that you want to apply to the installation package.
Instead of changing the package file, Sconfig stores all the customized
settings in a transform file. You can then use Sconfig to open the transform
file and make future customizations by applying your customized settings
to an updated package file.

Working with Transform Files in Sconfig


Using a transform file, Sconfig lets you make modifications to an existing,
preconfigured package file. When you run the Setup Configuration Wizard,
you must first identify the package file that you want to customize. Then
you can specify the transform file that you want to use.
Once you have specified the transform file you want to configure, Sconfig
opens the Setup Configuration Wizard Customization dialog box. Here you
can begin making alterations to the installation database.
When preparing for multiple custom installations, you need to create a
separate transform file for each user. You can then apply each transform file
to the Hummingbird products package file, thus temporarily updating the
package file and storing the changes in your customized transform file.

146

Chapter 7: System AdministrationSconfig and Jconfig

When opening Sconfig you must specify the transform and package files.
You can work with a new package file or with a preconfigured one.
Note: Sconfig is not installed in a Typical installation. It installs only
if you choose Custom or Complete.

To open Sconfig:
1

On the Star t menu, navigate to the Hummingbird System Administration


folder.

Click Sconfig to open the wizard. A short welcome screen appears.

Click Next to continue.

Specify the package file that you want to customize and click Next. You
can choose a package file in one of the following ways:

Specify a package file (.msi) that you previously configured.

Browse for a new package file (.msi).

Specify the transform file that you want to create. You can specify a
transform file in one of the following ways:

Specify a transform file (.mst) that you previously configured.

Browse for a new transform file (.mst) by clicking the Browse


button.

Create a new one yourself. You can do this by clicking the Browse
button.

Click Next to continue.

About Creating Transform Files in Sconfig


Once you have specified the package and transform files that you want to
configure, you can open the installation database and make alterations to
create a custom install. Sconfig opens the Setup Configuration Wizard
Customization dialog box. In this dialog box you can make alterations to the
transform file and create a custom install.

147

Exceed Users Guide

Sconfig lets you customize the following:


Product Directories The Directories option lets you customize product
directories for the installation of the Hummingbird product. See
Customizing Product Directories on page 149 for more information.
Product Features The Features option lets you select Hummingbird
product features for a custom install. See Selecting Features to Install on
page 150.
Files
The Files option lets you select external custom program files for
the Hummingbird product. See Selecting Files to Install on page 151 for
more information.
Product Properties
The Properties option lets you set custom properties
to change the behavior of a custom installation package and set properties
for Hummingbird product features. See Setting Product Properties on
page 154 for more information.
Registry The Registry option lets you preset the Registry editor for any
Windows operating system registry. The advantage of editing the registry
before the installation saves time, especially when installing for multiple
target machines. See Setting the Registry on page 158 for more
information.
Custom Shortcuts The Shortcut option lets you create custom shortcuts
on user machines for any Hummingbird product feature added to your
installation database. See Setting Shortcuts on page 161 for more
information.
Exceed Properties Available in Exceed, Exceed XDK, and Exceed
PowerSuite installations, the Exceed Settings option lets you modify or
remove properties. See Setting Exceed Properties on page 162 for more
information.
NFS Properties Available only in NFS Maestro product and Exceed
PowerSuite installations, the NFS Settings option lets you modify or remove
properties for NFS Maestro Client. See Setting NFS Properties on
page 163 for more information.

148

Chapter 7: System AdministrationSconfig and Jconfig

Custom Font Directories and Servers Available in Exceed, Exceed XDK,


and Exceed PowerSuite installations, the Custom Font Settings option lets
you install customized font directories and servers to the Exceed Xconfig
utility. See "Setting Custom Font Directories and Servers" on page 164 for
more information.
Custom Font Paths Available in Exceed, Exceed XDK, and Exceed
PowerSuite installations, the Font Paths Settings option lets change the order
in which font directories/servers are loaded by X Server. See Setting Paths
for Font Directories/Servers on page 171 for more information.
When the dialog box opens, it defaults to the Directories dialog box. You can
browse to the other options by clicking their names on the left panel of the
Setup Configuration Wizard.

Customizing Product Directories


The Directories dialog box lets you to specify where your Hummingbird
product will be installed. You can set the following directories:

Destination

Current User

All Users

149

Exceed Users Guide

To customize directories:
1

In the Destination Folder box, type the directory where all non-volatile
files will be stored.

In the Current User box, type the directory where all volatile files will be
stored for the current user.

In the All Users box, type the directory where all volatile files will be
stored for all users.

Selecting Features to Install


To view the Features dialog box, click Features in the left panel of the Setup
Customization Wizard. The Features dialog box lets you choose which
Hummingbird product features to install. Selecting features is similar to
customizing your product installation using Windows Installer. Choose
features that cater to each user in your enterprise. Sconfig also lets you
specify sub-features for each feature you specify.
Hummingbird product features can be added to, modified within, and
removed from an installation database for different users in an enterprise.
For quick access to these features on user machines, you can create shortcut
icons for Hummingbird product features for users and groups. For more
information see Setting Shortcuts on page 161.

150

Chapter 7: System AdministrationSconfig and Jconfig

Adding a Feature to an Installation Database


Recognizing features commonly used by specific users is necessary during a
custom installation. Some use the Hummingbird product at an
administrative level (system administrators). These users will find features
that monitor trace operations and troubleshoot logs to be a very important
component of their install, while users that use the product at strictly a user
level may not.
To add a feature, in the Features dialog box, select the check box of the
Hummingbird product feature(s) you want to add to the install.

Modifying a Feature in an Installation Database


The Features box provides you with the flexibility to modify features by
changing the combination of sub-features that get installed for any
particular Hummingbird feature. Modifications become necessary when
application requirements for a particular user change. These changes must
then be reapplied to the package file to reflect the update.
To modify a feature:
1

In the Features dialog box, expand the tree of the Hummingbird


product feature(s) you want to modify.

Select or clear the check box of the sub-feature(s) you want to add or
remove for that Hummingbird feature.

If you want to modify another feature, repeat steps 1-2.

Removing a Feature from the Installation Database


When users no longer require a feature, you can remove the product feature
from the installation database. Removing a feature in Sconfig deletes it from
the transform file. These changes must then be reapplied to the package file
to reflect the update.
To remove a feature, in the Features dialog box, clear the check box of the
Hummingbird product feature(s) you want to remove.

Selecting Files to Install


To view the Files dialog box, click Files in the left panel of the Setup
Customization Wizard.
151

Exceed Users Guide

Sconfig lets you add, modify or remove external program files that do not
come with your Hummingbird product. You can specify the destination
path of a file on a users computer and specify a feature to install with this
file. The Files dialog box provides you with the opportunity to accessorize
the installation database and optimize task efficiency amongst users while
using the Hummingbird product.
Files can be added to, modified within, and removed from an installation
database for different users in an enterprise.

Adding a Custom File to an Installation Database


The Files box lets you add to the installation database, external program files
that are frequently used by users. You can add mini program files such as
email, drawing and graphics files, or other executable files that are used by
users to carry out routine tasks.

152

Chapter 7: System AdministrationSconfig and Jconfig

To add a file:
1

In the Files dialog box, click Add. A standard Windows Open dialog box
opens.

Select a file in the dialog box and click OK. The Add/Modify File dialog
box opens.

From the drop-down list, select a destination path folder. This folder
can be a Windows Systems folder or a Hummingbird folder, depending
upon where you want to store the file.

From the Install With Feature drop-down list, select a feature or select
Always to include this file with every install and click OK. The Files box
appears listing the added file.

If you want to add another file, repeat steps 1-4.

Modifying a Custom File in an Installation Database


You can modify a file in the installation database. This option provides you
with the flexibility to change the associated feature that gets installed with
the file and specify a new destination path for the file. These changes must
then be reapplied to the package file to reflect the update.

153

Exceed Users Guide

To modify a file:
1

In the Files dialog box, select a file and click Modify. The Add/Modify File
dialog box opens.

If you want to change the destination folder in which your file gets
stored, from the drop-down list, select a new destination path folder.

If you want to change the feature that the file gets installed with, from
the Install with drop-down list, select a new feature and click OK. The
Files dialog box appears listing the files in your installation database.

If you want to modify another file, repeat steps 1-3.

Removing a Custom File from an Installation Database


You can remove a file from the installation database when users no longer
require that file with the installation of the Hummingbird product.
Removing a file in Sconfig deletes it from the transform file. These changes
must then be reapplied to the package file to reflect the update.
To remove a file, in the Files dialog box, select a file from the list and click
Remove.

Setting Product Properties


To view the Properties dialog box, click Properties in the left panel of the
Setup Customization Wizard. Sconfig lets you customize which
Hummingbird product properties install. The Proper ties dialog box lists
required properties that are needed for product functionality and optional
properties.You can set properties that customize Hummingbird product
features, that control user input, and that define the installation behavior of
the product.

154

Chapter 7: System AdministrationSconfig and Jconfig

You can also set properties for Exceed and NFS Maestro Client. However,
these properties become available only when installing the appropriate
package files for each of these products. For more information on Exceed
and NFS Maestro Client properties, see Setting Exceed Properties on
page 162 and Setting NFS Properties on page 163. Hummingbird product
properties can be added to, modified within, and removed from an
installation database for different users in an enterprise.

Adding a Custom Property to an Installation Database


You can add optional properties that customize Hummingbird product
features, such as the COMPANYNAME property which includes the name of
your organization in the product installation. You can also include
properties that control user input during installation, such as the
TransformSecure property which protects your transform files from user
modification. Other optional properties define the installation behavior of
the product, such as the ALLOWBROWSE property, which lets the product
browse to the home directory during an install.
Set properties that make the best use of the Hummingbird software features
and that facilitate a users installation session.

155

Exceed Users Guide

To add a property:
1

In the Properties dialog box click Add. The Add Property dialog box
opens.

From the drop-down list, select a property. The bottom panel of the
dialog box provides the validation information for the property.

In the box, type a value for the new property and click OK. The
Proper ties box appears listing any new properties youve added to the
installation database.

If you want to add more properties, repeat steps 1-3.

Modifying a Custom Property in an Installation Database


After you add custom properties to the installation database, Sconfig lets
you modify these property settings as needed. Modifications to property
values become necessary when requirements for features and files added to
the installation database change among users, or when existing properties
need to be updated to reflect the current install package.

156

Chapter 7: System AdministrationSconfig and Jconfig

To modify a property:
1

In the Properties dialog box, select a property.

Click Modify. The Modify Property dialog box opens. The bottom panel
of the dialog box provides the validation information for the property.

In the box, type a new value for the property and click OK. The Property
box appears listing your properties in the installation database.

If you want to modify other properties, repeat steps 1-3.

Removing a Custom Property from an Installation Database


You can clean the installation database of properties that are no longer in
use. Properties can become obsolete when changes amongst users occur.
Some scenarios that may require the removal of a property include changes
made to:

feature requirements

user privileges during an installation session

user permissions for the software

To remove a property, in the Properties dialog box, select a property from


the list and click Remove.

157

Exceed Users Guide

Setting the Registry


Click the Registry option in the left panel of the Setup Customization
Wizard to view the Registry dialog box.You can use Sconfig to customize the
general software settings of your Hummingbird product. After your
Hummingbird product package file installs the custom components and
files on the target machine, it can write the custom registry keys and values
set in Sconfig to the system registry. You establish the keys and values your
package file writes to the system registry by setting them up in your
transform file in Sconfig.
Hummingbird or system registry keys can be added to, modified within,
and removed from an installation database for different users in an
enterprise.

Adding a Custom Registry Key to an Installation Database


Sconfig lets you make necessary registry key additions to the system registry.
Making additions to the installation database reduces administration time
as additions are made once for all target machines that will use that
customized install file.

158

Chapter 7: System AdministrationSconfig and Jconfig

To add a registry key:


1

In the Registry dialog box, click Add. The Add/Modify Registry Entry
dialog box opens.

In the Root drop-down list, select a hive name.

In the Data Type drop-down list, select a data value type.

In the Key box, type the registry key name.

In the Value name box, type the registry value name.

In the Value data box, type the registry data value and click OK. The
Registry dialog box appears listing your new keys.

If you want to add more registry keys, repeat steps 1-6.

Modifying a Custom Registry Key in an Installation Database


Make necessary registry modifications to the system registry from Sconfig.
Making modifications from the installation database reduces
administration time, as modifications are made once for all target machines
that will use that customized install file.

159

Exceed Users Guide

To modify a registry key:


1

In the Registry dialog box, click Modify. The Add/Modify Registry Entry
dialog box opens.

If you want to change the existing hive name of the registry key, from
the Root drop-down list, select the new hive name.

If you want to change the existing value type of the registry key, from
the Data Type drop-down list, select the new data value type.

If you want to change the existing name of the registry key, in the Key
box, type the new name for the registry key.

If you want to change the existing registry value name, in the Value
name box, type the new registry value name.

If you want to change the existing registry data for the key, in the Value
data box, type the new registry data and click OK. The Registry box
appears listing your registry keys in the installation database.

If you want to modify other registry keys, repeat steps 1-6.

Removing a Custom Registry Key from an Installation


Database
To remove a registry key, in the Registry dialog box, select a registry key
from the list and click Remove.

160

Chapter 7: System AdministrationSconfig and Jconfig

Setting Shortcuts
Click the Shortcuts option in the left panel of the Setup Customization
Wizard to view the Shortcuts dialog box. This option enables quick access to
commonly used Hummingbird components. While customizing your
transform file in Sconfig, create custom shortcuts for Hummingbird
product features for quick access on user machines.

To set a custom shortcut:


1

In the Shortcut tree of the Shortcut dialog box, select and right-click the
folder to which you want to add a new shortcut. In the menu, click Add
Shortcut Here.

In the Shor tcut dialog box, into the Name text box, type the name of the
shortcut that you want add. To rename a shortcut, select the name of
the shortcut in the Name box and enter the new name. The name must
appear in the format:
short name|long name

where the short name must be less than 8 characters long and followed
by the character |, and the long name is the name of the shortcut as it
appears on the Windows desktop. For example,
ExceedF|Exceed Finger

161

Exceed Users Guide

If you want to include a description for the shortcut, into the Description
text box, type a description for the shortcut. This appears when you
move your mouse pointer over the shortcut icon.

From the Install with drop-down list, select a component for which you
want to provide a shortcut. The installer uses the installation state of
this component to determine whether to create or delete the shortcut.

From the Target drop-down list, select a destination folder of the


component for which you want to provide a shortcut.
Note: For advertised shortcuts, the file launched by the shortcut is
the file associated with this feature. When you activate this
shortcut, Windows Installer verifies that all components in the
feature are installed before launching the file. For non-advertised
shortcuts, the field should contain a property identifier enclosed
by square brackets.

The Default Path text box displays the destination path of the
component for which you want to create a shortcut.

If you want to provide any arguments for this shortcut, type them into
the Arguments text box.

In the Icon area, click Select to launch the Change Icon dialog box. In this
box, select an icon to associate with the shortcut and click OK.

If you want to create another shortcut, repeat steps 1-7.

Setting Exceed Properties


If you are installing Hummingbird Exceed, Exceed XDK, or Exceed
PowerSuite, then the Exceed Settings option becomes available to you. To
view the Exceed Settings dialog box, click the Exceed Settings option in the
left panel of the Setup Customization Wizard. This dialog box lets you
modify or remove Exceed properties, such as the Exceed.XServer.Tune
property, which executes the Xperf application for optimal graphics
performance.

162

Chapter 7: System AdministrationSconfig and Jconfig

When you modify or remove a property, the property gets added or deleted
from the property table in the Proper ties dialog box. You can modify or
remove properties in the same way as they are in the Proper ties option. See
Modifying a Custom Property in an Installation Database on page 156
and Removing a Custom Property from an Installation Database on
page 157.

Setting NFS Properties


During NFS Maestro product or Exceed PowerSuite installations, the NFS
Settings option becomes available to you. To view NFS Settings dialog box,
click the NFS Settings option in the left panel of Setup Customization
Wizard. This dialog box lets you modify or remove properties for NFS
Maestro Client, such as Maestro.NFSClient.UseDOSStyleSharing, which
enables file sharing common to most Windows file operations. Like Exceed,
modifying a property for NFS Maestro Client adds it to the property table,
while removing a property removes it from the property table in the
Proper ties dialog box of the Setup Customization Wizard.
Properties can be modified or removed in the same way as they are in the
Proper ties dialog box, see Modifying a Custom Property in an Installation
Database on page 156 and Removing a Custom Property from an
Installation Database on page 157.

163

Exceed Users Guide

Setting Custom Font Directories and Servers


To view the Custom Fonts Settings dialog box, expand the Exceed Settings
option in the left panel of the Setup Customization Wizard and click the
Custom Fonts Settings option. When you execute custom installations for
Hummingbird Exceed, Sconfig lets you control the directories and servers
added to the font database. The font database is stored in the lfp.xdb file;
Xconfig uses this file when locating font directories and servers. The end
result of the customization is that users should see a new customized font
directory or server in Xconfig.
Note: You need to plan your font directories and servers
according to the demands of each user.

Hummingbird font directories and servers can be added to, modified


within, and removed from an installation database for different users in an
enterprise.

164

Chapter 7: System AdministrationSconfig and Jconfig

Setting Custom Font Directories


This option is available for users that use Exceed and require custom font
files in the Xconfig utility. During a mass installation, you need to provide
font directories that are tailored to meet the demands of each user. This
means including only those font files (.fon) in each directory that are useful
to each user.
With Sconfig, you can provide custom (.fon) files in each directory for
specific users to optimize disk space and to enhance productivity.

Adding a Custom Font Directory and Font Files


Adding font directories with Sconfig creates new customized font
directories in Xconfigs font database. The font database in Xconfig is stored
in the lfp.xdb file in the User directory. Specific fonts in the font database
are stored in font directories and on font servers.
Before you can add the font directory to a custom installation database with
Sconfig, you must do the following in the Exceed Xconfig utility:

Create a custom font directory

Add custom font files (.fon) to this directory

For more information, refer to the Exceed Users Guide.

165

Exceed Users Guide

To add a custom font directory:


1

In the Custom Fonts Settings dialog box, click Add. The Add/Modify
Custom Fonts Settings dialog box opens.

From the Font Type drop-down list, select Directory.

In the Font Directory box, type the name of the custom directory. In the
File Name box, click Browse and navigate to the font database file (.fdb).
This file is created by Xconfig and stored in
Application Data\Hummingbird\Connectivity\version\Exceed\

where version is the version number of your Hummingbird product.


4

Select the status of the font directory. You can select the Load, Keep, or
Inactive states.

To make matches to this directory using its physical font name as well as
its logical font name, select the Match Physical Font Name box and click
OK. The Custom Fonts Settings dialog box appears listing the new
directory added to the installation database.

If you want to add another font directory, repeat steps 1-7.


Note: The name of the custom font directory appears in the
Custom Font Settings dialog box. You can now add your custom
font files (.fon) to the custom font directory you created.

166

Chapter 7: System AdministrationSconfig and Jconfig

In the Custom Fonts Settings dialog box, select the font directory to
which you want to add a custom font file(s).

In the Custom Fonts Settings dialog box, click the Add Font Files button.
A standard Windows Open dialog box appears.

In the box, browse to the custom font files (.fon) located in your custom
font directory and stored on your local machine. Select and copy the
custom font files (.fon) you need into your custom font directory and
click OK. The Custom Fonts Settings dialog box appears listing new font
files added to the directory.

10 If you want to add new font files to the directory, repeat steps 8-11.
A new custom font directory along with (.fon) files is added to the
installation database.

Modifying a Custom Font Directory


Modifying a custom font directory lets you change the specifications for the
selected font directory in Xconfigs font database. You can change the font
type from directory to server, change the name of the font directory, and
add a new font database file (.fdb) to this directory.
Warning! When changing the name of a font directory, you must
re-add the font files (.fon) to that directory.

If you are changing a font directory in the database, you need to know the
name of the directory and the name of the font database file corresponding
to the new font directory.
To modify a custom font directory:
1

In the Custom Fonts Settings dialog box, click Modify. The Add/Modify
Custom Fonts Settings dialog box opens.

From the Font Type drop-down list, select Directory to display directory
settings.

If you want to rename the directory, in the Font Directory box, type the
new directory name.

167

Exceed Users Guide

If you want to change the existing font database file, in the File Name
box, click Browse and point to the new file (.fdb). This custom .fdb file
is created by Xconfig and stored in
Application Data\Hummingbird\Connectivity\version\Exceed\

where version is the version number of the Hummingbird product.


5

If you want to change the status of the font directory, in the Status area,
select the new status of the font directory. You can select the Load, Keep,
or Inactive states.

If you want to make matches to this directory using its physical font
name as well as its logical font name, select the Match Physical Font
Name box and click OK. The Custom Fonts Settings dialog box appears,
listing any directories or servers in the installation database.

If you want to modify another font directory, repeat steps 1-6.

Removing a Custom Font Directory


You can remove a font directory from the installation database when users
no longer require that directory in Xconfigs font database. Removing a font
directory in Sconfig deletes it from the transform file. These changes must
then be reapplied to the package to reflect the update.
To remove a custom font directory, in the Custom Fonts Settings dialog box,
select a directory from the list and click Remove.

Removing a Custom Font File


You can remove a font file from the font directory when users no longer
require that font file in Xconfigs font database. Removing the font file in
Sconfig deletes it from the transform file. These changes must then be
reapplied to the package file to reflect the update.
In the Custom Fonts Settings dialog box, select the font file(s) (.fon) you
want to remove and click Remove File.

Setting Custom Font Servers


This option is available for users that use Exceed and require a connection
to custom font servers in the font database. During a mass installation, you
can connect users to a customized font server tailored for their task
requirements.
168

Chapter 7: System AdministrationSconfig and Jconfig

Adding a Custom Font Server


Adding a font server to the installation database connects users to a
customized font database in Xconfig. You need to know the network node
specification of the host where the font server is located and the port or
object name (DECnet transports). You can also specify additional font
catalogues.
To add a custom font server:
1

In the Custom Font Settings dialog box, click Add. The Add/Modify
Custom Fonts Settings dialog box opens.

From the Font Type drop-down list, select a server.

In the Host Name box, type the server name.

In the Port box, type or select the port number.

If you want to specify a catalogue, type the catalogue name in the


Catalogue box.

Select the status of the server directory. You can select the Load, Keep, or
Inactive states.

169

Exceed Users Guide

To make matches to this directory using its physical font name as well as
its logical font name, select the Match Physical Font Name box and click
OK. The Custom Fonts Settings dialog box appears listing the new font
server added to the installation database.

If you want to add another font server, repeat steps 1-7.

Modifying a Custom Font Server


If you are modifying a font server in the database, you need to know the
network node specification of the host where the font server is located and
the port or object name (DECnet transports). You can also specify
additional font catalogues.
To modify a custom font server:

170

In the Custom Fonts Settings dialog box, click Add. The Add/Modify
Custom Fonts Settings dialog box opens.

From the Font Type drop-down list box, select a new server.

If you want to rename the server, in the Host Name box, type the new
server name.

If you want to connect to a new port, in the Por t box, type the new port
number.

If you want to specify a catalogue, type the catalogue name in the


Catalogue box.

If you want to change the status of the server, from the Status area, select
the new state of the server directory. You can select the Load, Keep, or
Inactive states.

If you want to make matches to this directory using its physical font
name as well as its logical font name, select the Match Physical Font
Name box and click OK. The Custom Fonts Settings dialog box appears,
listing any directories or servers in the installation database.

If you want to modify other font servers, repeat steps 1-7.

Chapter 7: System AdministrationSconfig and Jconfig

Removing a Custom Font Server


You can remove a font server from the installation database when users no
longer require that server in the font database. Removing a font server in
Sconfig deletes it from the transform file. These changes must then be
reapplied to the package file to reflect the update.
To remove a custom font directory, in the Custom Fonts Settings dialog box,
select a server from the list and click Remove and then click OK.

Setting Paths for Font Directories/Servers


To view the Font Paths dialog box, expand the Exceed Settings option in the
left panel of the Setup Customization Wizard and click the Font Paths
option. This option lets you place font directories/servers in the most
efficient search order for X Server requests.

171

Exceed Users Guide

Setting Font Paths


The path page for Exceed fonts lets you change the order in which font
directories/servers are loaded by X Server. Place font directories/servers
containing the most commonly requested fonts at the top of the list to
reduce the amount of time it takes to find a match. Setting font paths in the
custom install with Sconfig
To set font paths, in the Font Paths dialog box, select a font directory/server,
click Move Up and Move Down to change the display (search) order.

Saving the .mst File


Once you have made your modifications to the Hummingbird product
properties, go through the following steps to save your transform file:
1

In the Setup Configuration Wizard, click Next. The Sconfig Configuration


Wizard Commit dialog box opens confirming that you are about to save
your configurations to a transform file.

Click Next to create the transform file (.mst). This process is automatic
and does not display on screen. The Sconfig Wizard Configuration
Complete dialog box opens, stating that you have created your transform
file.

Click Finish to exit Sconfig.

Sconfig saves your transform file in the same folder as the package file. This
makes it easier for users to find when they want to access the file from the
administrative installation point.

Applying the .mst File to an Install


After you have created an transform file, you can use it to customize
Hummingbird product installation. To do this, you must tell the setup.exe
where to find your transform file.
To change the setup.exe:
For more information on
installing with an .mst file,
see the Sconfig Help.

172

In Windows Explorer, browse to the folder that contains the setup.ini


file of your Hummingbird product.

Open the setup.ini file.

Chapter 7: System AdministrationSconfig and Jconfig

On the line beginning with CmdLine, add the following text:


TRANSFORMS=full path to the .mst file

For example, the CmdLine for Hummingbird YourProduct would look like
this:
CmdLine=TRANSFORMS=c:\Hummingbird YourProduct.mst

Where YourProduct is the Hummingbird Connectivity product you are


customizing.
4

On the File menu, click Save then click Close.

The new CmdLine in the setup.ini file tells the setup program to
incorporate the new transform file in the program install. When you run
setup.exe, it uses both the original package file, and the transform file that
you created using Sconfig.

Creating Multiple Custom Installations


Multiple custom installations are important for disparate users with
different development needs. Users demand software that makes efficient
use of both their time and disk space. Rather than having users sift through
a large Hummingbird product installation, use the Sconfig utility to package
custom installations for each user.
To create another .mst file:
1

Open Sconfig and browse to a new transform file (.mst).

Create and save the transform file (.mst) to the administration


installation point.

If you want to create more transform files for custom installations,


repeat steps 1-2.

To use your new transform file (.mst), launch the Setup Wizard by using
the following command:
setup /vTRANSFORMS=c:\YourTransform.mst"

This way multiple transform files can exist in one source location, without
repeated modifications to the setup.ini file.

173

Exceed Users Guide

Configuring Remote Hosts


Jconfig is a remote configuration tool that system administrators can use to
configure the Hummingbird applications on any network host running a
Jconfig Daemon. Jconfig offers a variety of configuration options. You can
create application-specific profiles for users, install shortcuts on user
desktops, monitor and log user activities, and send messages to user
machines. As well, you can use Jconfig to configure remote PCs one at a
time or to create script files that, when played, customize the configuration
of multiple remote PCs. Jconfig can be used with many different
Hummingbird products and applications: Exceed, HostExplorer, NFS
Maestro, and HostExplorer Print Services.

How Remote Configuration Works


The Jconfig three-tier system allows you to connect to a remote PC and
configure the services available on that machine. All remote connections are
made from the Jconfig Client to the Jconfig administration host, then
through the administration host to other hosts running a Jconfig Daemon.

hosts running
Jconfig
Daemon
Jconfig Client

Jconfig
administration host

Jconfig Client The Jconfig Client can be any Windows 2000/NT/98/95


machine from which you perform remote configuration tasks.

174

Chapter 7: System AdministrationSconfig and Jconfig

Jconfig administration host The Jconfig administration host is the


machine through which you connect to other hosts. This machine also
stores your Jconfig client configuration settings and the Jconfig host
database. Your Jconfig administration host can be the same machine as your
Jconfig Client, but you will still need to make the initial connection to the
administration Daemon.
Note: You designate the administration host. You do not need to
install a separate daemon for this host.

Jconfig hosts A Jconfig host is the remote PC running a Jconfig Daemon.


You connect to this host through the administration host in order to
configure the Hummingbird application on the remote PC.

Configurable Remote Services


When you connect to a remote host, you will see a list of configurable
services for that host. The following list describes the services you can
configure.
Note: The availability of each service depends on whether or not
the corresponding application is installed on the host to which you
are connected.

Message Service

Send messages to remote hosts.

File Service Complete many of the Windows Explorer or File Manager


tasks on a remote host. If connections are open to multiple remote hosts,
you can perform file operations between hosts.
Environment Settings Service View and optionally append the list of
environment settings to the Jconfig administration log file.
For more details on the
configurable services, see
the Jconfig Help.

Editor Service

Edit single text files on a remote host interactively.

System Information Service View and optionally log system information


or remote Java information to the administration log file.

175

Exceed Users Guide

Exceed Configuration Service Change Exceed operating parameters as


you would using the Xconfig application in Exceed. You can access the
parameters stored in the default exceed.cfg configuration file, or in
another configuration file. This service is available only when Exceed is
installed.
Font Database Service Change the settings of the remote font database.
You can add, modify, and delete font directories in the database, and extract
fonts from it. This service is available only in Exceed.
Registry Service

Add, modify, and delete items in the Windows Registry.

INI File Service View and modify entries in an .ini file, such as win.ini.
You can add, modify, and delete sections or entries in the selected .ini file.
NFS Maestro Client Configuration Service Set configuration
parameters that are common to all of the NFS Maestro client programs.
This service is available only when NFS Maestro is installed.
Install Service
menu.

Install icons or shortcuts on the remote host desktop or

Java Property File Service View and modify the parameters stored in a
Java property file. You must select the desired Java property file.
Host Database Service Store host names along with their associated
passwords. This database is also used to assign hosts to groups for
configuration purposes. Use this database with the Jconfig scripting
function, to apply scripts to selected groups of hosts.
Jconfig Daemon Settings Service Change operating parameters for the
Jconfig Daemon to which you are connected. You can change the port on
which Jconfig monitors service requests, some logging parameters, and the
Jconfig Daemon password.
HostExplorer Settings Service Change the HostExplorer profile
parameters as you would using the Options/Edit Session Profile menu item
in HostExplorer. This service is available only when HostExplorer is
installed.
HostExplorer Print Services Configure profiles for printing from a host
computer to a specific LAN printer. This service is available only when
HostExplorer Print Services is installed.

176

Chapter 7: System AdministrationSconfig and Jconfig

Xstart Service Force the host or application cache to refresh. This feature
is available only in Exceed.
Gateway Service Configure NFS Gateway parameters as you would using
the NFS Maestro Gateway Access application. This service is available only
when NFS Maestro is installed.

Installing Jconfig
In order to use Jconfig, you must load it on the hosts in your network. The
following section lists what parts of the Jconfig software to install on each
tier and guides you through the installation process.

Jconfig clientInstall Jconfig client software.

Jconfig administration hostInstall a Jconfig Daemon.

Jconfig hostsInstall a Jconfig Daemon.

To install Jconfig on a client:


1

Run Setup for your Hummingbird product.

When prompted for the type of installation, select Custom Installation


and click Next.

When prompted to select the components, select Jconfig along with any
other features you want to install. Continue with the rest of the
installation.

To install Jconfig on an administration host and other remote hosts:


1

Run Setup for your Hummingbird product.

When prompted for the type of installation, select Custom Installation


and click Next.

When prompted to select the components, select Jconfig Daemon along


with any other features you want to install. Continue with the rest of the
installation.

177

Exceed Users Guide

Running Jconfig in a Java-Enabled Browser


You can run Jconfig in two ways, from a Windows environment or from a
Java-enabled web browser. If you want to run Jconfig in a browser, you need
to make some additional configurations.
To run Jconfig from your browser:
HomeThe directory in
which the software is
installed.

Set up a web server on your administration host to serve the


JconfigApplet.html file. This file is found in the Hummingbird home
directory. The web server should set the home directory to be either the
root or virtual root so that all relative links and files will be valid.

Run a Jconfig Daemon on your web server.

Using a web browser, connect to the web server by typing the URL of
the JconfigApplet.html file. The Jconfig applet currently uses Java
Plug-In technology. This allows the applet to run using Sun
Microsystems Java 2 Runtime Environment, Standard Edition (JRE)
instead of the web browsers default virtual machine. The plug-in
supports both Netscape Navigator TN (3.0 and later on Windows 95,
98, NT 4.0, and 2000) and Microsoft Internet Explorer (4.0 and later on
Windows 95, 98, NT 4.0, and 2000).
Note: If you want to run in a language other than English, modify
the language parameter in the JconfigApplet.html file to the
language variable you want. You can choose from the following
variables:
enEnglish
esSpanish
deGerman
ptPortuguese
itItalian
frFrench

178

Chapter 7: System AdministrationSconfig and Jconfig

Opening a Configuration Session


To configure a host, you first need to open a connection. Opening a
connection to a host consists of two steps: connecting to the administration
host and connecting from the administration host to the PC running the
Jconfig Daemon. The following two procedures guide you through those
connections.
To connect to the administration host:
1

Run the Jconfig Client application. The Administrator Connection dialog


box opens.

In the Administrator Workstation box, type the name or IP address for the
administration host.

In the Password box, type the password for the administration host and
click OK.
Note: The passwords for initial connections to both the
administration host and the other remote hosts are the IP
addresses for the respective machines. We recommend changing
connection passwords. For more information on how to change
passwords for hosts, see Changing the Default Password on
page 180.

To connect to a remote host:


1

On the Jconfig toolbar, Click Connect.

Select the type of connection you want to make and click Next. The
following list describes the types of connections you can make.

InteractiveAn Interactive connection lets you connect to a single


remote host running a Jconfig Daemon and interactively perform
configuration activities.

Script DrivenA Script Driven connection lets you use a script file
to configure multiple remote PCs simultaneously. Before using this
type of connection, you must have recorded (and compiled) a
script as well as configured your host database.

179

Exceed Users Guide

Administrator DaemonWhen you make an Administrator


Daemon connection, the Administrator Daemon connects to itself
to conduct an interactive configuration session. You can also use an
administration connection to record a script for a script-driven
multiple configuration, and to configure the administration host
itself.

In the Workstation box, type the machine name (or IP address) of the
host to which you are connecting. You can also browse to a machine in
the host database.

In the Password box, type the password for the host to which you are
connecting and click Finish.

Configuring the Jconfig Application Settings


After you have made a successful connection, you may want to customize
the Jconfig applet settings. Use the Options tool and the Daemon Settings
service to configure the Jconfig settings for remote hosts. You can do the
following:

replace default passwords

customize how information from the administration host and other


remote hosts is logged

modify the list of available services

create a database of hosts to which you frequently connect

specify the web browser in which you want to display Help

Changing the Default Password


When Jconfig runs for the first time, it uses the IP address of the host to
which you are connecting as the password for configuration activities. We
strongly recommend that you change the default passwords. Use the Jconfig
Daemon Settings service to do this.
To change the default password:

180

Connect to the remote host using Interactive Connection.

On the Jconfig Available Services pane, double-click the Jconfig folder.

Double-click Daemon Settings. The Daemon Settings Service appears.

Chapter 7: System AdministrationSconfig and Jconfig

On the General tab, select the Change Password check box.

In the New Password box, type the new password.

In the Confirmation box, retype the new password.

Click Apply Changes on the Daemon Settings Service toolbar to make


the new password effective.

Configuring Jconfig Daemon Settings


You can also use the Daemon Settings service to configure other server
options for the administration host and any other remote host running a
Jconfig Daemon.
To access the Daemon Settings Service, double-click the Jconfig folder in the
Available Services window. Then select the Daemon Settings service. Use the
following tabs to configure the Jconfig Daemon options:
The connection port is the
port that the Jconfig
Daemon monitors for
requests.

General Configure the connection port, change passwords, and display or


hide the Jconfig Daemon window.
Note: You can also use The Password Wizard to change
passwords for multiple hosts, a selected group of hosts, or all
hosts in the Host Database service. Changes to passwords made
in the Password Wizard take effect immediately. To get to the
Password Wizard, click Password Wizard on the toolbar.

Logging Set where you want to log information from the Jconfig Daemon
to which you are connected. You can define the name of the log file and set
the log file to clear at startup.
Services

Edit, add, or delete services from the Available Services list.

Configuring the Host Database


A host database file stores information for hosts to which you frequently
connect. To specify the file you want to use as the host database, click
Options on the Jconfig toolbar and specify the file name in the Workstation
Database File Name box. You can then add host connections to the file using
the Workstation Database service. If your network includes a large number of
hosts, you can populate the host database using a script.

181

Exceed Users Guide

To add entries to the Host Database file:


1

Connect to the Remote host using an Interactive Connection.

On the Jconfig Available Services pane, double-click the Jconfig folder.

Double-click Workstation Database. The Workstation Database Service


opens.

On the Workstation Database toolbar, click Add Entry. The Add Entry
dialog box opens.

Type the name of the host group in the Group box.

Type the name of the new host in the Workstation box.

If you want to change the port number, click Port and type a new port
number in the box.

Type the password for the new host in the Password and Confirmation
boxes. Click OK.

On the Workstation Database toolbar, click Save Host Database to save


the new entry and any other changes.

To use a script to populate the host database:


Write a Java program to use the class:
com.hcl.apps.rcfg.Services.WorkstationDb.Server.workstationDBCreator

This class has the following public methods:


// --- Creates a workstation database with the file name
JCONFIG.HDB
workstationDBCreator()
// --- Creates a workstation database with given file name
workstationDBCreator(String fileName)
// --- Adds a new entry to the database without a password
public boolean addNewEntry (String group, String workstation,
String port)
// --- Adds a new entry to the database with a password

182

Chapter 7: System AdministrationSconfig and Jconfig

public boolean addNewEntry (String group, String workstation,


String port, String password)
// --- Saves the workstation database to disk
public void save() throws IOException
// --- Closes the workstation database file
public void close() throws IOException

Logging Administrative Information


To allow you to troubleshoot connections, Jconfig logs status information
generated by the administration host to a file called jconfig.log. As well,
many of the services available through Jconfig provide the option of logging
information to this file. To view the log file, click Log on the Jconfig toolbar.
You can also log information to a file other than the default file,
jconfig.log. If you want to configure the administrative log settings, click
Options on the Jconfig toolbar.

Opening Jconfig Help


The Jconfig HTML Help system allows you to view context-sensitive
information about using Jconfig. If you are running Jconfig as an
application instead of in a web browser, you need to specify the browser in
which you want to open Jconfig Help. To specify a browser, click Options on
the Jconfig toolbar, and type the full path of the web browser in the Web
Browser section of the Options pane.

Configuring the Remote Services for a Host


Once you have connected to a remote host, you can configure the services
available to that host. The main Jconfig display area for each remote host
tab is divided into two panes. The left pane shows the list of configurable
services for the host, and the right pane shows the configurable options for
the service selected. To configure a service, double-click the service. The
configuration options appear. For information on the configurable options
for each service, see the Jconfig Help and the Help for the corresponding
application.

183

Exceed Users Guide

Using Scripts to Configure Multiple Hosts


You can use the Jconfig scripting option to record a sequence of
configuration activities in a script, which you can then run to perform the
same activities on multiple remote hosts. Click Script on the Jconfig toolbar
to view the Scripting Wizard. The following two procedures outline the
basic steps for using configuration scripts and how to record a script using
the Jconfig Scripting Wizard.
To use a script to configure multiple hosts:

HomeThe directory in
which the software is
installed.

Create a Host Database file. You need to create a Host Database file
that contains the names and passwords of the PCs you want. To make it
easier to configure similar PCs, you can group them.

Record a Script. You need to record a script that will perform the
required configuration activities on the hosts. Perform the
configuration steps on the administration host while running the
Scripting Wizard.

Compile the Script. Use a Java compiler to perform this task. You must
compile the file in conjunction with a file that contains the required
classes. For example, if you have recorded a script with the file name
test.java, and you are using the Sun Microsystems JDK Java compiler,
type the following on the command line in the home directory:

See your Java compiler


documentation for details
about compiling the script
file.
For more information on
running scripts, see the
Jconfig Help.

javac -classpath .\hccljcofig.jar <userdir>\test.java

The compiler generates a file called test.class. This is the file that is
used to perform the configuration of the remote hosts.
4

Run the Script. Go to the Connection Wizard and select the Script Driven
option. Proceed through the subsequent steps for that process.

To record a script:

184

On the Jconfig toolbar, click Script. The Jconfig Scripting Wizard opens.

In the Script Class box, type the class name of the script and click Next.

If you do not want the changes to apply to the remote host while you
record, clear the Apply Changes check box. Click Next. This option is
selected by default.

Select any miscellaneous settings you require and click Finish.

Chapter 7: System AdministrationSconfig and Jconfig

After running the Wizard, you can start one or more Jconfig services
and perform configuration activities. As configuration progresses, the
script tool records your actions.

To stop recording, click Script on the Jconfig toolbar. A message appears


confirming that the script was recorded.

Locking a Configuration Session


If you are going to leave your computer but do not wish to terminate the
Jconfig application, you can lock the current configuration session so that
only someone with the administration password can reopen the session.
Click Lock Session on the Jconfig toolbar. The Administrator Connection
dialog box opens. The session is locked as soon as this dialog box appears.

185

Chapter 8
System AdministrationInetd and
Inetd Admin

Introducing Inetd
TCP and UDP Servers

189
189

Maintaining System Security


Security for Windows 95/98/Me
Security for Windows NT/2000

190
190
190

Default Services

192

Managing Services
Configuration Parameters

201
204

Administering Daemon SecurityInetd Admin


Users and Passwords
Managing Access

209
209
211

Chapter 8: System AdministrationInetd and Inetd Admin

Introducing Inetd
Inetd is a super-daemon that lets you enable and disable various daemon
services through a single application. It determines the network services to
which your PC responds when a client makes an incoming network request.
In Windows 95/98/Me environments, Inetd runs automatically when placed
in the Startup folder. In Windows NT/2000 environments, Inetd is installed
as a service.
Note: The Inetd daemon is installed in the Control Panel by Setup.

Instead of running separate server applications for each service, Inetd


conserves workstation resources by continuously monitoring connection
attempts in the background and starting the appropriate daemon upon
receiving a network request. You can selectively enable or disable daemons
to accommodate your local requirements. For example, you can use FTPd
to distribute corporate files from a server. Clients would connect to the
server and use FTP to download the files.
Inetd handles both TCP (Transmission Control Protocol) and UDP (User
Datagram Protocol) servers. The Inetd daemon is based on asynchronous
notification. It uses no CPU time and only a small amount of memory
when waiting for incoming requests.
With Windows 95, you can restrict users access to your drives/directories
with the permissions you assign in the Inetd Admin application. With
Windows NT, if there are TelnetAccess or FTPAccess groups in the user
administration program, the NT user must be a member of these groups to
access the machine using Telnet or FTP. No security check is performed if
the group does not exist, and access is allowed for every NT user account.

TCP and UDP Servers


TCP Inetd simultaneously monitors connection requests on multiple
ports. When it detects a request, it starts the appropriate daemon and
screens the user.

189

Exceed Users Guide

UDP Inetd monitors the UDP port for packets. When it detects packets, it
uses the port number to link the packet flow to an enabled daemon. The
connection is refused if no daemon is enabled, or if permission is denied to
the UDP user/password.

Maintaining System Security


Users that connect to your drives and directories uisng the Inetd services are
restricted to file access based on the permission you assigned.

Security for Windows 95/98/Me


With Windows 95/98/Me, you assign permissions using the Inetd Admin
application. Inetd Admin is an administration tool designed to control
access to your files and resources.
When remote users on the network try to log onto your PC via the Inetd
server programs, Inetd Admin screens them and determines the level of
access. To allow anonymous FTP access to your PC via the FTP daemon,
you must set up an anonymous user account in Inetd Admin.

Security for Windows NT/2000


Windows NT/2000 supports NTFS, FAT, and HPFS file systems. Of these,
only NTFS file systems provide security at the file and directory level (access
control).
Users that link NTFS drives and directories by means of the Inetd services
are restricted to file access according to Windows NT/2000 permissions.
Users that link FAT drives and directories using the Inetd services are not
restricted in the exported file system. FAT file systems always use the same
permissions for Owner, Group, and World (rwxrwxrwx).
To set NTFS file security:

190

Select one or more files in My Computer.

On the File menu, click Properties. The Properties dialog box opens.

Click the Sharing tab.

Chapter 8: System AdministrationInetd and Inetd Admin

Click Permissions. The Access Through Share Permissions dialog box


opens.

Specify the appropriate security options. See your Windows NT


documentation for details on setting file security.

If you have enabled FTPd and/or Telnetd, there are some further security
considerations. If you have local disk volumes other than NTFS volumes,
consider the following when determining whether to allow remote users to
have access to your local machine using FTP or Telnet:
FTPtransfers both text and binary (graphic) files between your PC
and a remote computer running a server implementation of FTP. It can
also perform file and directory management.
Telnetprovides a VT220/VT320/ANSI/ Wyse 50/Wyse 60 terminal
emulation window on a PC, UNIX, or VMS host.

FTP Security Considerations (Windows NT/2000)


The FTP daemon (FTPd) lets you set read and write access to restrict users
writing to FAT and HPFS volumes. For FTP users, you can set access to the
NTFS file system using the access privileges granted to specific users or
groups in the User Manager program (the native Windows security system).
Note: FTP can limit access to volumes. We recommend that you
do not include FAT or HPFS disk volumes in the ~r or ~w
parameters of FTPd. If there is an FTPAccess group in the user
administration program, the NT user must be a member to access
the machine using FTP. No check is performed if the group does
not exist; access is then allowed for every NT user account.

Telnet Security Considerations (Windows NT/2000)


The server application, Telnetd, cannot restrict incoming users to a
particular local disk volume. NTFS allows for file access control under
Windows NT/2000, whereas FAT and HPFS file systems have no security. If
you have a FAT or HPFS disk volume on your machine, and you enable
Telnet access over the network, incoming users have unrestricted access to
those disk volumes. This means they could potentially delete all files.

191

Exceed Users Guide

There are two solutions to this problem:

Use only NTFS file systems on your computer.

If you have FAT or HPFS disk volumes, do not enable Telnet access over
the network.
Note: If there is a TelnetAccess group in the user administration
program, the NT user must be a member of the group to
successfully access the machine using Telnet. No check is
performed if the group does not exist; access is then allowed for
every NT user account.

Default Services
The following daemon services are provided with your software package:

192

TCP Services Daemon

Description

BOOTPd

Enables client workstations using Bootstrap Protocol


to request their configuration information. For more
information, see BOOTPd (Windows NT/2000) on
page 193.

Fingerd

Lets a remote user query the state of your current


configuration. For more information, see Fingerd on
page 194.

FTPd

Enables users to transfer files between other


computers and your computer. For more information,
see FTPd (File Transfer Protocol Daemon) on
page 194.

LPD

Lets other workstations send print files directly to your


PC printer, or to a network print queue on the PC. For
more information, see LPD on page 196.

Chapter 8: System AdministrationInetd and Inetd Admin

TCP Services Daemon

Description

Telnetd

Lets Telnet clients make connections your PC. For


more information, see Telnetd on page 197.

Xstartd

A local X client starter daemon that enables users to


access X clients on your PC. For more information, see
Xstartd on page 198.

UDP Services Daemon

Description

TFTPd

Lets users transfer files to and from your PC using the


TFTP protocol. For more information, see TFTPd on
page 200.

Timed

A time server that other workstations can use to


synchronize their current date and time. For more
information, see Timed on page 201.

Tnamed

A Trivial Name Server that accepts incoming Trivial


Name requests for host name resolution. For more
information, see Tnamed on page 201.

BOOTPd (Windows NT/2000)


BOOTPd enables client workstations using Bootstrap Protocol to request
their configuration information. If a client machine is configured for
BOOTP, each time it starts, a BOOTP request is broadcast over the network.
The BOOTP request contains the MAC (Media Access Control) address of
the machine (physical hardware address). When BOOTPd is enabled, it
responds to requests if the clients MAC address is found in the Bootptab
configuration file. The possible responses are as follows:
Response

Description

Using UDP

BOOTPd sends a BOOTP reply to the client on UDP port


67.

Using Hummingbirds
TCP/IP

BOOTPd sends a BOOTP reply directly to the client


machine.

Using another
vendors TCP/IP

BOOTPd sends a BOOTP reply as a broadcast response.

193

Exceed Users Guide

To use BOOTPd you must fulfill the following requirements:

You must enable BOOTPd in Inetd on at least one machine in the


network. It is best to enble BOOTPd on several machines so that if one
machine fails to respond, the configuration information is still available
for other machines on the network.

There must be a configuration file, BOOTPtab, in the home directory.


You must use the same file on all machines running BOOTP.

You must configure each of the client machines on the network for the
BOOTP setting of the IP address instead of User Entered.

All incoming BOOTP requests are written to the bootpd.log file in the
home directory.
Comparison to RARP An alternate protocol, Reverse Address Resolution
Protocol (RARP), also lets a client determine its IP address when the MAC
(Media Access Control) address is known. The difference between RARP
and BOOTP is that RARP is hardware, link-level protocol instead of an IP/
UDP protocol. This means that RARP can be implemented only on local
hosts on the same subnet.

Fingerd
Windows system
directory
Windows 95/98/Me:
Windows\System,
Windows NT/2000:
Winnt\System32.

Fingerd enables remote users to query the state of your current


configuration. If the remote user requests a long listing, Fingerd also
displays the contents of the plan.hcl and project.hcl files from:
%System%\Hummingbird\Connectivity\version\Inetd

where version is the version number of your Hummingbird product.


The plan.hcl file typically contains your contact information (phone
number, address, e-mail, and so on), while the Project file typically contains
information on your function or current project.

FTPd (File Transfer Protocol Daemon)


FTPd handles incoming requests to transfer files between other computers
and your own. Many Internet nodes contain files that are generally available
through anonymous FTP.

194

Chapter 8: System AdministrationInetd and Inetd Admin

When an FTP transfer is requested, the program checks for a user ID,
password, and access rights to read, create, delete and write on the various
server drives, before forwarding the request to FTPd. FTP requires the
services of the TCP protocol to move files. Do not select UDP in the Daemon
Configuration dialog box for this service.
Optional Parameters Use the following syntax to specify the password
files to be used to validate access:
- p password_file
Inetd Adminprovides
access to the password
database that controls
access to your PC from
external users through
passwords and user
names.

where password_file is the full path and file name of the password file you
are using. By default, the password file is called password.hcl in the system
directory:
%System%\Hummingbird\Connectivity\version\Inetd

where version is the version number of your Hummingbird product.


To create a password file, use Inetd Admin.
The following optional parameters are available for FTPd in a Windows NT
environment:
Parameter

Description

-rdrives

Limits FTP users to only read access on the listed drives.

-wdrives

Limits FTP users to only write access on the listed drives.

-rwdrives

Limits FTP users to read/write access on the listed drives.

The format for specifying drives is:


-rwd:\

This limits FTP users to read/write access on the listed drive.


Specifying options in the ftpd.ini file You can create an FTPd
configuration file that specifies the following:

Timeout periodEnsures that FTPd closes a connection after a period


of client inactivity.

Banner displayDisplays a text banner when a user connects to your


machine using FTP.
195

Exceed Users Guide

To specify FTP configuration options:


1

Create a file named ftpd.ini.

To specify a timeout period, type the following in the file:


[Inactive]
TimeOut=n

where n is the maximum number of seconds of inactivity after which


FTPd closes a connection. If n is less than or equal to 0, the timeout
feature is disabled.
3

To display a banner, type the following in the file:


[Custom]
Banner=BannerText

where BannerText is the text banner you want to display.

LPD
LPD (Line Printer Daemon) lets other workstations send print files directly
to your PC printer, or to a network print queue on your PC. Print options
are not directly configurable under Inetd, but if you want to let users print
host files to your PC printer, you must define your default printer. See your
Windows documentation for information about setting up the default
printer.
Depending upon the remote host from which you want to print, you may
need to define an entry for the printer in the /etc/printcap file on the
remote host, or create a printer queue with the appropriate host
administration tools.
To configure the LPD program to use an existing printer, you must
configure the remote host to send print jobs to a queue. The printcap file
on the remote host links the local queue name (to which the local PC sends
print requests) to the remote queue name (where the files are actually
printed).

196

Chapter 8: System AdministrationInetd and Inetd Admin

For example, a user sends a print job to the queue hpjohn, that is actually a
printer called hplaser connected to the remote machine john. The remote
host between these two PCs might have a printcap entry that links these
two queue names like this:
HPJOHN|printer:\
:in:ttl:rp=dos-hplaser:ih=JOHN

On the remote system the queue names for the PC are defined in the form
queueformat-printername, where queueformat is one of the following:

dos(ff)If xxx is DOS, the file is printed without modification. If xxx

ends in FF, a form feed is appended to the job if one is not already
present.

unix(ff)If xxx is UNIX, linefeeds are converted to carriage returns


and linefeeds. If xxx ends in FF, a form feed is appended to the job if one

is not already present.

text (ff)If xxx is TEXT, the output is rendered. This is usually used
for printing text files directly to PostScript printers. If xxx ends in FF, a

form feed is appended to the job if one is not already present.


Note: Some systems have a limit on the number of characters in
the remote queue name. Thus, if unixff-printer-name is too
long, use shortened prefixes (D, DF, U, UF, and T). Also, some
systems do not allow a dash character in the remote queue name.
For these systems, use an underscore character instead.

Telnetd
Telnetd is a Telnet server that lets Telnet clients make connections to your
PC. Users can connect using the Hummingbird Telnet client, a graphical
VT100/320 terminal emulator application, or any VT100 Telnet client.

197

Exceed Users Guide

In a Windows NT/2000 environment, the user must have an account on the


Windows NT system, and have appropriate permissions in the Windows NT
security system. Users are restricted to the protection and access rights
specified by the system administrator for each of the Windows machines,
drives, directories, and files.
Note: If the user administration program has the group
TelnetAccess, the user must be a member to successfully access
your workstation. No check is performed if the group does not
existaccess is then allowed for every user account.

Optional Parameters (Windows 95/98/Me)


parameter is available for Telnetd:

The following optional

- p password_file

where password_file is the full path and file name of the password file you
are using. Use the specified password file to validate access. . By default, the
password file is called password.hcl, located in the following directory:
%System%\Hummingbird\Connectivity\<version>\Inetd

where version is the version number of your Hummingbird product.


Note: The password file is empty until you modify it with Inetd
Admin.

Xstartd
Xstartd is the local X client starter daemon. When Xstartd is enabled, other
users can access X clients on your PC. They can connect to your PC and
start X clients by using their Xstart application and the REXEC or RSH
connection methods.
Note: RSH is available only for Windows 95/98/Me. You cannot
use the RSH protocol with Windows NT/2000.

198

Chapter 8: System AdministrationInetd and Inetd Admin

When using the REXEC protocol, Xstartd verifies the user name and
password in Inetd Admin to ensure that access has been granted to the
remote user. When the RSH protocol is used, RSH looks for the rhosts file
in the %System%\Hummingbird\Connectivity\<version>\Inetd directory,
where version is the version number of your Hummingbird product. Only
the hosts and users listed in this file can log in using Xstartd.
REXEC When using the REXEC protocol, Xstartd verifies the user name
and password in Inetd Admin to ensure that access has been granted to the
remote user.

In Windows 95/98/MeUse Inetd Admin to verify user names and


passwords For REXEC, -p password_file specifies the password file to be
used to validate access. By default, the password file is password.hcl,
located in the following directory:
%System%\HUMMINGBIRD\Connectivity\<version>\Inetd

where version is the version number of your Hummingbird product.

In Windows NT/2000User names and Passwords are verified by the


operating system itself. The user name used must belong to someone
who uses that PC or to a fully qualified Domain user who is permitted
to login to that PC.

RSH RSH is available on Windows 95/98/Me. The RHOSTS file


determines which hosts are allowed to connect to the PC and is located in
the following directory:
%System%\HUMMINGBIRD\Connectivity\<version>\Inetd

where <version> is the version number of your Hummingbird product.


The RHOSTS file consists of one or more lines in the following format:
hostname username

where hostname represents a hostname from which RSH is allowed, and


username represents the user ID of a user on host hostname who is allowed
to RSH to your PC.
Note: You must put a space between the hostname and
username parameters.

199

Exceed Users Guide

You can use the plus character (+) in the hostname or username fields to
represent any host and any user. For example, to let all users with the user
ID of John Smith on any host to RSH to your PC, specify the following:
+

JohnSmith

To include a comment in the file, begin the comment line with the number
or pound sign (#).

TFTPd
TFTPd lets you use your PC as a TFTP (Trivial File Transfer Protocol)
server. The TFTP server lets users transfer files to and from your PC. Any
TFTP client program can use the TFTP server, including the DOS TFTP
client.
Warning! TFTP does not require a user name and password, so
take great care when setting up this server.

One of the major applications for TFTP is to allow diskless workstations or


PCs with BOOT PROMs to retrieve boot images from a Windows
workstation in conjunction with the BOOTPdw server. To prevent
unauthorized users from accessing your PC, we suggest creating a directory
specifically for boot image files and making only that directory available to
TFTP clients using the -r option.
Optional Parameters

Description

-r directory

Specify a read directory for clients. For example,


-rc:\bootptab

-w directory

Specify a read directory for clients. For example,


-wc:\hcltcp

-o or O

Allow clients to overwrite existing files.

TFTPd has an inactive timeout feature that you can use to ensure that
TFTPd closes a connection after a period of client inactivity.

200

Chapter 8: System AdministrationInetd and Inetd Admin

To specify a timeout limit:


1

Create a file named tftpd.ini.

Type the following in the file:


[Inactive]
TimeOut=n

where n is the maximum number of seconds of inactivity after which


TFTPd closes a connection. The minimum timeout is 10 seconds.
3

Save the file in the following directory:


%System%\Hummingbird\Connectivity\<version>\Inetd

where version is the version number of your Hummingbird product.

Timed
Timed is a time server that other workstations can use to synchronize their
current dates and times. When a machine sends a time request to your PC,
Timed returns the current time. This is the time value since Jan 1, 1970
GMT. You can set up workstations with the hcltime or hctime32 program
to synchronize the date and time across the network.

Tnamed
Tnamed is a Trivial Name Server that accepts incoming Trivial Name
requests for host name resolution. It calls the local name resolution routine,
gethostbyname( ), then searches the main lookup paradigm specified on
the machine.

Managing Services
Enabling and Disabling Services
You can enable and disable daemon services in the Hummingbird Inetd
Configuration dialog box. Configuration information is stored in the file
inetd.ini.

201

Exceed Users Guide

To enable a service, select the service in the Inetd Service list and click Enable.
To disable a service, select the service in the Inetd Service list and click
Disable. To save changes, click Save.

Configuring Services
To configure a Network Service:

For more information about


available parameters, see
Default Services on
page 192.

In the Hummingbird Inetd Configuration dialog box, select the service that
you want to configure and click Configure. The Daemon Configuration
dialog box opens.

Verify that the Daemon Name box contains the name of the selected
service and that the Program Filename box contains the file name for the
service.

In the Optional Parameters box, type optional parameters associated with


the selected service.

In the Port box, type a port number between 0 and 65535 to uniquely
identify the service.

Select either the TCP or UDP protocol required for the server. If you
select TCP, type the maximum number of servers that can be used for
the service in the Maximum Servers box.

Click OK.

To save changes, click Save.

Adding and Deleting Services


Any of the existing servers can be configured to run on any port or run on
more than one port at a time.
To add a service:

202

In the Hummingbird Inetd Configuration dialog box, click Add. The


Daemon Configuration dialog box opens.

In the Daemon Name box, type the name of the service you want to add.

In the Program Filename box, type file name of the service.

Chapter 8: System AdministrationInetd and Inetd Admin

In the Optional Parameters box, type any optional parameters associated


with the service.

In the Port box, type a port number between 0 and 65535 to uniquely
identify the service.

Select the protocol required for the server: either TCP or UDP. If you
selected TCP, type the maximum number of servers that can be used for
the service in the Maximum Servers box.

Click OK.

To save changes, click Save.

To remove any or all of the services from the list of available Inetd services,
click Delete in the Hummingbird Inetd Configuration dialog box. To save the
changes, click Save.
Note: To reload all network services back into the Setup menu,
click Reload. To reload the original default settings, click Defaults.

Reloading Updated Configuration Information


After making changes to the Inetd configuration, such as enabling or
disabling a service, you can load the updated configuration without exiting
your configuration session. To reload the Inetd configuration file, click
Reload in the Hummingbird Inetd Configuration dialog box.

Restoring Default Services


If your current Inetd configuration file is lost or corrupted, you can restore
the default settings. To restore the settings, click Defaults in the Inetd
Configuration dialog box. After you have restored the default settings, you
can enable the services you require.

Logging Server Activity


With Windows 95/98/Me, you can record all server start and stop messages
in a log file. To enable logging, select Connection Logging in the Hummingbird
Inetd Configuration dialog box.

203

Exceed Users Guide

Inetd stores messages in the inetd.log file, located in the following


directory:
%System%\Hummingbird\Connectivity\<version>\Inetd

where <version> is the version number of your Hummingbird product.


With Windows NT/2000, you can send all server start and stop messages to
the Windows NT/2000 Event Viewer Log file. To enable logging, select
Connection Logging in the Hummingbird Inetd Configuration dialog box.

Configuration Parameters
Destination Folder
Program files install into the home directory. During setup, you can specify
a different home directory, other than the default. For more information,
see the Installation chapter in this manual.

BOOTPD.LOG File
All BOOTP requests and responses are recorded in the bootpd.log file in
the default hclnfs directory. Requests are time and date stamped to provide
a chronological record of BOOTP events on the network. A sample segment
from a bootpd.log file is as follows:
info(6)version 3.2
info(6)reading c:\hcltcp\bootptab
info(6)read 38 entries (38 hosts) from c:\hcltcp\bootptab
info(6)recvd pkt from IP addr 0.0.0.0 AT Tue Aug 16 08:14:44 1995
info(6)request from Ethernet address 00:60:8C:E8:CE:55
info(6)found 185.75.64.10 (pete)
info(6)vendor magic field is 99.130.83.99
info(6)sending reply (with RFC1048 options)
info(6)setarp 185.75.64.10 - 00:60:8C:E8:CE:55
info(6)recvd pkt from IP addr 0.0.0.0 AT Tue Aug 16 08:16:32 1995
info(6)request from Ethernet address 00:60:8C:E8:CE:77
info(6)found 185.75.64.12 (bobg)

204

Chapter 8: System AdministrationInetd and Inetd Admin

info(6)vendor magic field is 99.130.83.99


info(6)sending reply (with RFC1048 options)
info(6)setarp 185.75.64.12 - 00:60:8C:E8:CE:77
info(6)recvd pkt from IP addr 0.0.0.0 AT Tue Aug 16 08:17:57 1995
info(6)request from Ethernet address 00:60:8C:E8:CE:99
info(6)found 185.75.64.14 (roger)
info(6)vendor magic field is 99.130.83.99
info(6)sending reply (with RFC1048 options)
info(6)setarp 185.75.64.14 - 00:60:8C:E8:CE:99

You can include more detail in the log by inserting the -d option in the
configuration for BOOTPdw. Up to four -d options (separated by spaces)
can be inserted for increasing levels of detail. Specify the -d option(s) in the
Optional Parameters box of the BOOTPd Daemon Configuration dialog box.

BOOTPTAB Configuration File


The bootptab file is an ASCII file that matches the client machine MAC
address (physical hardware address) with other configuration information.
The configuration information in the bootptab file can vary from simply
the IP address for each machine, to a complete set of configuration
information such as default gateway, Domain Name Server, subnet mask,
Time Server, etc. All entries must be in the format:
xx=value

where xx is a two-letter designation for a parameter. The value is either a


number or text entry depending upon the nature of the parameter.
The configuration information can appear in several forms as illustrated by
the parameter definitions listed below:
bf

The name of the boot file.

bs

The size of boot requests.

da

The IP address of the server providing authentication (user


name/verification) on your network.

df

The name of the dump file.


205

Exceed Users Guide

206

dl

The length of the DHCP lease.

dn

The domain name for your network. For example, zyx.com.

ds

The IP address of the domain name server for your network.

ef

The name of the file containing further options.

gw

The IP address of a gateway for your network.

ha

The unique MAC address from the network adapter card located
inside your PCs and workstations. For PCs, this address is usually
printed on a label on the network adapter card. You can also
attach the PC to the network, configure it for BOOTP support,
reboot it, and then examine the bootpd.log file for the entry that
contains the MAC address.

hd

The name of the home directory.

hn

Resets the host name of the recipient.

ht

For almost all PC networks, the network type is Ethernet.

ip

The unique IP address assigned to this PC or workstation.

lg

The name of the machine that will receive log requests.

lp

The IP addrss of the server providing the printing control


function (LPD protocol).

mw

The amount of time after which the boot request is ignored.

ns

The IP address of a Trivial Name Server.

nt

The IP address of a time server using the NTP (Network time


Protocol).

ra

The reply address.

rl

The name of the RLP server.

rp

Leads to the root of the file system.

sa

The address of the machine used for booting.

Chapter 8: System AdministrationInetd and Inetd Admin

sm

The four-octet, dotted, decimal, subnet mask as per the standard


on subnetting, for example, 255.255.255.0. This field must
precede the gateway (gw=) field, if used.

sw

The name of the swap server.

tc

The text string contained in this field must match a previously


defined common configuration block, for example, hcleth. Any
valid field can be contained in a common configuration block.

td

The name of the TFTP directory.

to

The time offset specified in seconds from Coordinated Universal


Time (UTC). For example, EDT is 5 hours from 0000 UTC;
therefore, to=18000 (5 x 60 x 60 = 18000).

ts

The IP address of a server using TIME (Time Server Protocol).

vm

The value of the magic cookie is 99.130.83.99. Other BOOTP


servers can use other values in this field, but the current release of
bootpd requires 99.130.83.99.

yd

The Domain Name for the server providing NIS (Yellow Pages)
service.

ys

The IP address of the server providing NIS (Yellow Pages) service.

See the following sub-sections for examples.


IP Address Only In this example, the only configuration item is the IP
address corresponding to the MAC address. One entry line is required for
each client machine in the network.
pete ht=ethernet:ha=00608ce8ce55:ip=185.75.64.10
barbg ht=ethernet:ha=00608ce8ce77:ip=185.75.64.12
roger ht=ethernet:ha=00608ce8ce99:ip=185.75.64.14

Multiple Parameters In this example, the subnet mask, default Gateway,


Domain Name Server, Domain Name, and Time Server are returned to each
client workstation.

207

Exceed Users Guide

pete:
ht=ethernet:ha=00608ce8ce55:ip=185.75.64.10:sm=255.255.255.0\
:gw=185.75.64.254:ds=185.75.64.5:dn=xyz.com:ts=185.75.64.5
barbg:
ht=ethernet:ha=00608ce8ce77:ip=185.75.64.12:sm=255.255.255.0\
:gw=185.75.64.254:ds=185.75.64.5:dn=xyz.com:ts=185.75.64.5
roger:
ht=ethernet:ha=00608ce8ce99:ip=185.75.64.14:sm=255.255.255.0\
:gw=185.75.64.254:ds=185.75.64.5:dn=xyz.com:ts=185.75.64.5

If you have many client machines and multiple configuration parameters,


this form of entry can become cumbersome. Instead, you can define all of
the common parameters just once and use a single entry for all the common
parameters.
Multiple Parameters with a Common Parameter Block In this example,
all of the common parameters are defined in the hcleth:\ statement. The
common parameters are then identified for each client by using a single
entry, tc=hcleth. This format makes it easier to add new PCs and
workstations to the bootptab file.
hcleth:\
ht=ethernet:sm=255.255.255.0:gw=185.75.64.254:ds=185.75.64.5\
dn=xyz.com:ts=185.75.64.5:vm=99.130.83.99:to=18000\
da=185.75.64.5
pete tc=hcleth:ha=00608ce8ce55:ip=185.75.64.10
barbg tc=hcleth:ha=00608ce8ce77:ip=185.75.64.12
roger tc=hcleth:ha=00608ce8ce99:ip=185.75.64.14

There can be multiple common configuration blocks, each with a unique


name. The tc=field of the client entry can then point to the appropriate
common configuration block.

208

Chapter 8: System AdministrationInetd and Inetd Admin

Administering Daemon SecurityInetd Admin


All NFS Maestro and Exceed local daemons, including FTPd, Xstartd,
Fingerd, and Lpd, are started in the Inetd application where they are listed
as Setup options in the Inetd window. In NFS Maestro and Exceed, Inetd
acts as the network super server daemon, enabling network services without
their own stand-alone services.
When external users log into your daemons through Xstartd or FTPd
programs, Inetd Admin plays a security role by screening them and
regulating their activities.
Inetd Admin is available only for Windows 95/98/Me systems, and is
installed in the System Administration folder of your application. Windows
NT/2000 systems have security features equivalent to Inetd Admin.

Users and Passwords


Creating a User List
Inetd Admin is an administration tool that enables you to control access to
the server daemons on your PC. You can assign a password for each remote
user, specify the services the user can access (Telnet, Xstart, and FTP), and
specify file access permissions.
Access information is stored in the Inetd password file so daemon servers
can verify user information. By default, the password file is named
password.hcl, and is saved in the following directory:
%System%\Hummingbird\Connectivity\<version>\Inetd

where <version> is the version number of your Hummingbird product.


Each password file entry contains a user name, an assigned password, setup
information, and permissions.
You can use Inetd Admin for typical user access management tasks,
including:

creating new user entries

assigning access rights to new users

modifying user access rights


209

Exceed Users Guide

changing user passwords

deleting user access rights

Opening a Password File


Inetd stores access rights information in a password file. By default, the
password file is named password.hcl, and is saved in the following
directory:
%System%\Hummingbird\Connectivity\<version>\Inetd

where <version> is the version number of your Hummingbird product.


When you start Inetd Admin, you must specify the password file you want
to open. To start Inetd Admin, click the Inetd Admin icon.
To open a password file:
1

Start Inetd Admin. The Open Password File dialog box opens.

Select the password file you want to open. The default password file is
password.hcl. Click Open. The Username/Password Administration dialog
box opens.

Assigning User Names and Passwords


The first time you use Inetd Admin, you need to create a list of remote users
who are permitted to access your PC. After you create the list of user names
and associated passwords, you can assign access permissions.
To assign user names and passwords:

Passwords are casesensitive.

For more information, see


Specifying Access
Rights on page 211.

210

In the Username/Password Administration dialog box, click Add. The Add


Username dialog box opens.

In the Username box, type the user name for the new user.

In the Password box, type a password for the new user. Retype the
password in the Confirm Password box.

Click OK. The User Access Rights dialog box opens.

Specify the access rights for the user and click OK.

In the Username/Password Administration dialog box, click Save to save


the changes to your password file.

Chapter 8: System AdministrationInetd and Inetd Admin

Changing Passwords
If users forget their passwords, the system administrator can assign new
ones.
To assign a new password:

Passwords are casesensitive.

In the Username/Password Administration dialog box, select the


appropriate user and click Modify. The User Access Rights dialog box
opens.

Click Change Password. The Change Password dialog box opens.

In the Password box, type a password for a new user. Retype the
password in the Confirm Password box.

Click OK. Inetd assigns the new password.

Managing Access
Specifying Access Rights
For each user, you can specify access rights on your PC. If you give the user
access to the FTP service, you can also specify file access privileges for up to
10 directories.
To specify user access to your PC:
1

In the Username/Password Administration dialog box, select the


appropriate user and click Modify. The User Access Rights dialog box
opens.

In the Services Permitted section, select the check boxes for services you
want the user to access:

TelnetdThe supplied Telnet daemon provides a VT320/VT100/


VT52 terminal emulation window on a host.

FTPdThe File Transfer Protocol Daemon is a Windows server


program that lets you handle incoming requests to transfer files
between computers. When an FTP transfer is requested, the
program checks for a user ID, a password, and access rights to read,
create, delete and write on the various server drives, before
forwarding the request to FTPd.
211

Exceed Users Guide

XstartdThis remote execution server implements the REXEC and


RSH protocol. This server allows other users on your network to
run local X clients on your PC when the local PC is running
Xstartd.

Set the environment variables for users:

Temp DirectorySpecifies the temporary directory on your PC


used to store temporary files. Set this temporary directory to full
read/write access since many applications started using telnetd
require temporary files. This directory must already exist on your
PC.

Initial DirectorySpecifies the directory that is opened first when


the FTPd or telnetd daemon application starts. Users must have
permission to access this directory. Otherwise, the connection is
terminated.

COMSPEC VarSpecifies the default command shell that starts


when users try to access your PC. The default COMSPEC variable is
c:\windows\command.com, although other shells may be used when
the DOS shell has been customized. For example, you can use
4dos.com, ndos.com, or pcdos.com.

You must assign read and write permission to Telnet users in directories
containing command.com or the command interpreter. Otherwise, the
system cannot change the directory when users try to execute a remote
command.
4

212

If you enabled access to FTP for a user, specify file access permissions in
the Directory Permissions section.

Chapter 8: System AdministrationInetd and Inetd Admin

Directory Permissions
To specify directory permissions:
1

In the User Access Rights dialog box, click Add. The Add Directory dialog
box opens.

In the text box, type the directory name.


Note: Do not add a backslash (\) at the end of the name,
because only the specified directory has the specified
permissions. You can include all subdirectories by adding a
backslash asterisk (\*) to the directory name.

The conventions for specifying directories are as follows:

Directory

Interpretation by Directory Listings

c:\hcl

The C:\HCL directory only

c:\hcl\*

The C:\HCL directory and all subdirectories

c:\hcl\a*

All subdirectories of C:\HCL starting with "A"

d:

The entire D: disk

The root directory of the C: disk

c:*

The entire C: disk

c:\

NOTHING (ends in backslash)

Specify file access permissions in the directory:

ReadThe remote user can open files and search directories on


your PC. Execute permission is also required to open directories.

WriteThe remote user can edit files on your PC. Generally, users
also need Create permission to write to files.

CreateThe remote user can create new files and subdirectories on


your PC. Generally, users also need Write permission to create files.

213

Exceed Users Guide

DeleteThe remote user can delete files and directories from your
PC.

ModifyThe remote user can change file attributes on your PC.

ExecuteThe remote user can run applications and open


directories on your PC.
Note: The permissions you specify apply only to the selected
directory. You must repeat this process for each directory listed.

Click OK.

Removing Access Rights


You can restrict a users permissions on your PC by removing specific access
rights. There are three types of rights you can remove:

Access to your PCYou can remove all access to your PC by deleting


the user from your password file.

Access to servicesYou can disable access to services on your PC.

Access to directoriesIf the user has access to the FTP service, you can
restrict access to directories on your PC and to the file access privileges
within those directories.
Note: If users attempt to access a service that is missing or
disabled in Inetd, the connection is terminated. For more
information, see Inetd Help.

To remove a user from the password file:

214

In the Username/Password Administration dialog box, select the user you


want to remove and click Delete.

Click Save to save changes to the password file.

Chapter 8: System AdministrationInetd and Inetd Admin

To remove access to a service:


1

In the Username/Password Administration dialog box, select the


appropriate user and click Modify. The User Access Rights dialog box
opens.

In the Services Permitted section, clear the check box for the service you
want to disable. Click OK.

Click Save to save changes to the password file.

To remove directory or file access rights:


1

In the Username/Password Administration dialog box, select the


appropriate user and click Modify. The User Access Rights dialog box
opens.

In the Directory Permissions section, do either of the following:

Remove access to a directory by selecting the directory and clicking


Delete.

Remove file access rights by selecting the appropriate directory and


clearing the check boxes for rights you want to disable.

When you are finished, click OK.

In the Username/Password Administration dialog box, click Save to save


changes to the password file.

Granting Anonymous FTP Access


To grant anonymous FTP access rights to users connecting to your PC
through the FTPd daemon, you must add an anonymous FTP user to your
password file. After this account is set up, any user can access your PC by
typing the user name anonymous, and any password.
To create an anonymous account:
1

In the Username/Password Administration dialog box, click Add. The Add


Username dialog box opens.

In the Username box, type ftp. The user name must be lower case.

215

Exceed Users Guide

In the Password box, type ftp. The password must be lower case. Retype
the password in the Confirm Password box.

Click OK. The User Access Rights dialog box opens.

Assign access privileges for anonymous FTP connections.


Warning! Be extremely careful when assigning access rights for
anonymous FTP. You should not allow anonymous users to delete
files from your PC.

216

Chapter 9
Hummingbird Directory Services

Introducing Directory Services Applications


About Hummingbird Directory Services
About Directory Services Explorer
Opening Directory Services Applications

219
219
219
220

Directory Services Overview


Directory Service Protocols
Directory Service Objects
Server Architecture

221
222
223
224

Binding to a Domain
About Directory Service Profiles
Creating a Profile
Opening a Properties Dialog Box
Binding to NIS
Binding to NIS+
Keylogin and the System Profile
Binding to LDAP

224
225
226
228
229
230
234
235

Using Hummingbird Directory Services


Selecting a Service
Modifying a Profile
Disabling User Profiles
Specifying a Host Lookup Service
Synchronizing Windows and UNIX Passwords
Running Keylogin
Running Command Line Applications

240
240
240
241
242
242
243
244

Using Directory Services Explorer


Querying Directory Service Objects

245
245

Sorting Query Results


Saving Query Results
Viewing Object Properties
Modifying a Profile
Changing a Domain Password

246
247
247
248
249

Chapter 9: Hummingbird Directory Services

Introducing Directory Services Applications


About Hummingbird Directory Services
Hummingbird Directory Services provides directory services (NIS, NIS+,
and LDAP) for Hummingbird Connectivity applications. Using
Hummingbird Directory Services, you can set up configuration profiles for
your machine and for each user of that machine. Each profile stores the
information necessary to bind to a given domain.
Once you have selected a service and established its domain profile, all
directory service queries made by Hummingbird Connectivity applications
target the domain you have specified. Hummingbird Directory Services also
lets you:

select the target service or services for host name resolution

synchronize your Windows password with your password in a directory


service domain

select a profile type

About Directory Services Explorer


Directory Services Explorer is a browsing tool that lets you access and query
directory services without leaving the familiar Windows environment.
Using Directory Services Explorer, you can:

bind your machine to multiple domains simultaneously

browse object contents and properties

run selective queries

save query results to a file

change your password in a directory service domain

Directory Services Explorer supports NIS, NIS+, and LDAP.

219

Exceed Users Guide

Opening Directory Services Applications


To open Hummingbird Directory Services:
Navigate to the Hummingbird Connectivity program group on the Windows
Star t menu, point to Accessories, then click Directory Services Configuration.
The Hummingbird Directory Services Properties dialog box opens, as shown
below.

The Hummingbird Directory Services Properties dialog box is also accessible in


view mode through NFS Maestro Client and NFS Maestro Server. If you
open the dialog box from within one of these applications, you can only
view the properties of the user and system profiles. To create, modify, or
select a profile, you must open the dialog box using the method described
above.

220

Chapter 9: Hummingbird Directory Services

To open Directory Services Explorer:


Navigate to the Hummingbird Connectivity program group on the Windows
Star t menu, point to Accessories , then click Directory Services Explorer. The
Directory Services Explorer window opens, as shown below.

Directory Services Overview


A directory service stores and discloses information about a network such
as host names, user IDs, and available resources.
The service works in essentially the same way as a phone directory: to phone
someone, a caller uses a phone book to look up the number associated with
the persons name; to connect to a remote host, a client queries a directory
service to retrieve the IP address associated with the name of the host.

221

Exceed Users Guide

Centralized Information
Without a directory service, every host in a network needs to store and
maintain its own copy of the network information. A directory service, on
the other hand, centralizes network information in a single repository that
each client can query. In so doing, a directory service ensures the
consistency of the information and simplifies network administration.

Directory Service Domains


Directory services organize their information into domains. A domain
consists of a group of computers and users that share the same network and
configuration information. Typically, a domain corresponds to a particular
organization or department within an organization.
When you query a particular service, you must specify a domain for that
service.

Directory Service Protocols


Clients communicate with a given service using a protocol specific to that
service. Directory Services Explorer and Hummingbird Directory Services
support NIS, NIS+, and LDAP.
NIS The Network Information System (NIS) protocol was developed by
Sun Microsystems to simplify the administration of network and
configuration data. NIS stores its information in objects called maps that
can be accessed over the network using the Remote Procedure Call (RPC)
protocol. NIS domains are flat and discrete: any map within a given domain
belongs to and records information about that domain alone.
NIS+ NIS+ was developed by Sun as an enhancement of the NIS
protocol. NIS+ objects, called tables, can be searched on multiple columns
(unlike NIS maps). Clients access NIS+ tables using the RPC protocol.
Unlike NIS domains, NIS+ domains are hierarchical and can be extended to
match the growth of the organizations they describe. NIS+ also protects its
data using Secure RPC authentication.
LDAP The Lightweight Directory Access Protocol (LDAP) was developed
by CCITT and ISO as a scaled-down version of the X.500 protocol. Unlike
NIS and NIS+, which are proprietary protocols, LDAP is an open standard.
Like NIS+, LDAP secures its objects by requiring client authentication.
Unlike NIS+, LDAP also supports anonymous client access.
222

Chapter 9: Hummingbird Directory Services

Directory Service Objects


For more information on
directory service objects,
see Hummingbird
Directory Services Help.

NIS and NIS+ store their information in tabular form. Only NIS+ refers to
its objects as tables. NIS objects are known as maps because each maps a
particular value (a key) to a piece of network information. LDAP objects
are known as entries.

NIS/NIS+ Objects
Each column in an NIS+ table defines an attribute of the type of
information stored in the object. For example, a table containing password
information typically has a column for each of user name, user ID, primary
group ID, and the password itself.
NIS maps each consist of an information column, which stores the network
information, and a key column, which serves as an index to the information
column. The information column typically separates the various attributes
of the object using a colon (:).
Each row (or entry) in an NIS/NIS+ object represents one coherent piece
of network information, such as the complete password information for
one user.

LDAP Objects
LDAP entries correspond to the rows in an NIS map or NIS+ table.
However, LDAP entries are discrete objects that can be selected and
manipulated independently of one another. LDAP entries can also contain
other LDAP objects.

Object Contents
The type of information stored in a directory service generally reproduces
the content of UNIX /etc files. For example, NIS stores password
information (usually stored in /etc/passwd) in two maps, called
passwd.byname and passwd.byuid. NIS+ stores the same information in a
table called passwd. LDAP stores password information in entries that
belong to the posixAccount class.

223

Exceed Users Guide

Server Architecture
The repository for a directory service usually consists of one main server
the master serverand a group of supplementary servers. The master
server stores and manages the network information. The supplementary
servers store a copy of the master information. Supplementary servers in
NIS are known as slave servers. Supplementary servers in NIS+ are known
as replicas.
Whenever the network information changes on the master server, the
changes propagate across the network to the copies. Therefore, at any given
time there are several hosts capable of disclosing network information to
clients. This architecture lets the administrator evenly distribute the
network load across more than one server. From the point of view of clients
who access the service, the changes are automatic and transparent.
LDAP uses multiple servers that can independently update the network
information and synchronize it with each other.
Directory Services Explorer and Hummingbird Directory Services let you
target your queries to specific servers in a domain.

Binding to a Domain
Before you can query a directory service, you must first bind to a domain.
Each directory service domain is controlled by one or more servers that
store and release the domain information. When you bind to a domain, you
configure your system to send its queries to one of the servers that control
that domain.

Bind Information
The process of binding to a domain differs from service to service. In
general, you need to supply the domain name and names of the servers you
want to query. If the service (such as NIS+) uses an authentication protocol,
you also need to supply valid credentials.

224

Chapter 9: Hummingbird Directory Services

Directory Service Profiles


You save the complete information for binding to a given domain in a
profile. The profile records the details about the domain as well as the
particular method by which you bind to it (for example, under user or
machine credentials, or as one user or another).

Domain Servers
If you are using NIS as your directory service, you can use the ypwhich
command to determine the names of NIS servers for a given domain.
Directory Services Explorer and Hummingbird Directory Services can
automatically locate NIS+ servers that are part of your local NIS+ domain.
For the names of remote NIS+ servers, contact your NIS+ administrator.
For the names of LDAP servers, contact your LDAP administrator.
For more information on
Ping, see Ping Help.

If you know the name of the server, you can use the Ping accessory to
determine if it is accessible from your machine.

About Directory Service Profiles


The type of profile you create for a domain depends on the application you
are using.

Directory Services Explorer Profiles


In Directory Services Explorer, you can create multiple profiles, each
corresponding to a single domain and binding method. In other words,
Directory Services Explorer lets you bind to and explore multiple domains
simultaneously.
You can examine the objects in each domain as if they were directories in a
mapped drive. (The process of binding to a server is analogous to mapping
a remote drive.)
For easy reference, you can give the profile a descriptive name. This is the
name under which the domain appears in Directory Services Explorer.
You can create up to ten profiles for each directory service.

225

Exceed Users Guide

Hummingbird Directory Services Profiles


Hummingbird Directory Services lets you create a directory service profile
for your machine (the system profile) and for each registered user on that
machine.
The profile contains the information necessary to bind to a domain for each
service supported by Hummingbird Directory Services. For example, you
can create different user profiles to bind to an NIS domain, an NIS+
domain, and an LDAP domain.
When you select a particular service from within a Hummingbird
Connectivity application, the application sends your queries (such as host
lookup) to the domain specified in your profile for that service. The system
profile is selected by default.
User Profile Users can set up profiles that let them bind to domains of
their choice. They supply the configuration information for one directory
service (or more) and then select the service they want to use for a given
task. A user profile is specific to a given user; the profile is in effect while the
user is logged into the machine.
System Profile The system profile contains the default configuration
information for any application or user that queries a directory service. A
user that does not have an NIS+ account, for example, can still query the
NIS+ domain specified in the system profile. The Administrator for the
machine can also configure Hummingbird Directory Services so that users
can only bind to the domains specified in the system profile. (In this case,
users cannot create their own profiles.)
If you have used Hummingbird Directory Services to set up user or system
profiles, you can view those profiles (under those names) in Directory
Services Explorer.

Creating a Profile
To create a profile using Directory Services Explorer:

226

On the File menu of Directory Services Explorer, click Settings. The


Directory Services Explorer Settings dialog box opens.

From the Directory Service list, select the service you want to target in
the profileone of NISv2 (YP), NISv3 (NIS+), or LDAP.

Chapter 9: Hummingbird Directory Services

Click Add. The Properties dialog box for the selected service opens. For
example, if you have selected LDAP, the LDAP Proper ties dialog box
opens.

In the Properties dialog box, specify the domain for the selected service
and assign a name to the profile.

For more information on specifying an NIS domain, see


Specifying an NIS Domain on page 229.

For more information on specifying an NIS+ domain, see


Specifying an NIS+ Domain on page 231.

For more information on specifying an LDAP domain, see


Specifying an LDAP Domain on page 237.

After you have specified the domain, its name appears in the Profile box
of the Directory Services Explorer Settings dialog box.
5

In the Directory Services Explorer Settings dialog box, click OK. The
dialog box closes and the profile is stored locally. You can browse the
specified domain under the profile name you assigned to it.

To create a profile using Hummingbird Directory Services:


1

Open the Hummingbird Directory Services Properties dialog box.

To create your user profile, select User Settings. To create the system
profile, select System Settings.
Note: You must be the Administrator for the machine to create the
system profile. Any user, however, can view the system profile.
If the User Settings option is dimmed, the Administrator for your
machine has disabled user profiles. You must use the system
profile. If you want to bind to an NIS+ domain, you can still run
keylogin to retrieve your own DES credentials. For more
information, see Running Keylogin on page 243.

From the Directory Service list, select a directory service.

Click Proper ties. The Properties dialog box for the selected service
opens. For example, if you selected NIS+ in step 3, the NIS+ Proper ties
dialog box opens.
227

Exceed Users Guide

In the Properties dialog box, specify the domain information for the
selected service.

For more information on specifying an NIS domain, see


Specifying an NIS Domain on page 229.

For more information on specifying an NIS+ domain, see


Specifying an NIS+ Domain on page 231.

For more information on specifying an LDAP domain, see


Specifying an LDAP Domain on page 237.

In the Hummingbird Directory Services Proper ties dialog box, click OK.
The dialog box closes. Any queries issued by a Hummingbird
Connectivity application (except Directory Services Explorer) target the
domain specified in the selected profile.

Opening a Properties Dialog Box


For each supported directory service protocol there is a Proper ties dialog
box that lets you specify the domain for the service and configure other
bind options.
To open a Properties dialog box in Directory Services Explorer:
1

On the File menu, click Settings. The Directory Services Explorer Settings
dialog box opens.

From the Directory Service list, select the service you want to
configureNISv2 (YP), NISv3 (NIS+), or LDAP.

Click Add. The appropriate Properties dialog box opens.

To open a Properties dialog box in Hummingbird Directory Services:

228

From the Directory Service list of the Hummingbird Directory Services


Proper ties dialog box, select the service you want to configureNISv2
(YP), NISv3 (NIS+), or LDAP.

Click Proper ties. The appropriate Proper ties dialog box opens.

Chapter 9: Hummingbird Directory Services

Binding to NIS
When you bind to an NIS domain, you can specify a primary and secondary
domain server. Any queries sent to NIS first target the primary server, then,
if the primary server is unavailable, the optional secondary server. Your
choice of primary and secondary servers can affect the distribution of
network load across the NIS master and slaves.
Using Hummingbird Directory Services, you can also specify the maps for
host resolution queries. Hummingbird Connectivity applications that run
host name/address lookups consult the maps that you specify.

Specifying an NIS Domain


When you create a profile for NIS, you need to specify a domain. Use the
NIS Proper ties dialog box.

229

Exceed Users Guide

To specify an NIS domain:


For more information, see
Opening a Properties
Dialog Box on page 228.

Open the NIS Properties dialog box. Type the profile name for the
domain into the NIS Profile box (Directory Services Explorer only).

In the Domain box, type the name of the NIS domain. NIS domain
names typically consist of two labels separated by a period (for example,
abcd.com). The first label indicates the organization; the second label
can be an Internet domain name such as com, org, or edu.

In the Primary Server box, type the name of your primary NIS server.

If you want to specify a secondary server, type its name into the
Secondary Server box.

In the Host Name Resolution Map box, type the name of the host name
resolution map for the selected domain (Hummingbird Directory
Services only). In the standard NIS configuration, this map is called
hosts.byname.

In the Host IP Resolution Map box, type the name of the host IP
resolution map for the selected domain (Hummingbird Directory
Services only). In the standard NIS configuration, this map is called
hosts.byaddr.

Click OK. The NIS Properties dialog box closes. The NIS service is
configured for the specified profile.

Binding to NIS+
When you bind to NIS+, you can set a query order for NIS+ servers.
Alternatively, to balance service loads across the network, you can specify
random access to NIS+ servers. By default, your queries target the NIS+
master (if available), then any available replica servers.
Note: NIS+ requires client authentication. To access NIS+, you
must supply valid credentials. For more information on NIS+
credentials, see Hummingbird Directory Services Help.

230

Chapter 9: Hummingbird Directory Services

Hummingbird Directory Services lets you bind to an NIS+ domain as either


a user or a machine, depending upon the profile you have selected in the
Hummingbird Directory Services Properties dialog box. Certain tasks, such as
connecting to an NFS resource or changing your password in an NIS+
domain, require user credentials. For more information, see Keylogin and
the System Profile on page 234.

Specifying an NIS+ Domain


When you create a profile for NIS+, you need to specify a domain. Use the
NIS+ Proper ties dialog box and the NIS+ Domain Properties dialog box.

231

Exceed Users Guide

To specify an NIS+ domain:


For more information, see
Opening a Properties
Dialog Box on page 228.

For more information on


NIS+ credentials, see
Hummingbird Directory
Services Help.

232

Open the NIS+ Properties dialog box. Type the profile name for the
domain into the NIS+ Profile box (Directory Services Explorer only).

Click Change. The NIS+ Domain Properties dialog box opens.

In the Domain box, type the name of the NIS+ domain. NIS+ domain
names consist of two labels separated by a period and always end with a
period (for example, abcd.com.). The first label indicates the
organization; the second label can be an Internet domain name such as
com, org, or edu.

In the Credentials area, enter your credential information:

If you are setting up the system profile, type the Secure RPC
password for your machine into the activated Secure RPC password
box. (The system profile is accessible in Hummingbird Directory
Services only.)

Chapter 9: Hummingbird Directory Services

For more information, see


Setting a Query Order for
NIS+ Servers below.

If you are setting up a profile as a user, type your user name for the
domain into the User Name box, then type your Secure RPC
password into the activated Secure RPC Password box. Usually, your
Secure RPC password is the same as your UNIX password.

If the NIS+ master server is in the same subnet as your machine, select
Automatically Obtain Server List. Otherwise, select Manually Enter a NIS+
Server, then type the host name or IP address of the server into the
Server Name or IP Address box.

Click OK. The NIS+ Domain Proper ties dialog box closes. The Domain
area of the NIS+ Properties dialog box displays the name of the master
server for the domain and the Secure RPC netname you are using to
bind to the domain.

In the Server Query Order area, set the server query order.

Click OK. The NIS+ Properties dialog box closes. The NIS+ service is
configured for the specified profile.

Setting a Query Order for NIS+ Servers


To set the query order for NIS+ servers:
For more information, see
Opening a Properties
Dialog Box on page 228.

Open the NIS+ Properties dialog box. The Server Query Order area
displays the list of available servers. The list of servers from top to
bottom corresponds to the query order.

In the Server Query Order area, select a server from the list.

Click the Up or Down buttons at the right of the list until the selected
server is in the correct position.

Repeat steps 23 for all other servers in the list until you achieve the
desired query order.

Click OK. The NIS+ Properties box closes. Queries to NIS+ target the
first available server from the ordered list.

233

Exceed Users Guide

To randomly target NIS+ servers during queries:


1

In the NIS+ Proper ties box, select the Use Random Server check box. The
Up and Down buttons become dimmed.

Click OK. The NIS+ Properties box closes. Queries to the specified NIS+
domain randomly target available NIS+ servers.

Keylogin and the System Profile


Certain tasks involving NIS+ require user credentials. For example, you
must supply user credentials if you are using AUTH_DES authentication to
connect to an NFS resource. You must also supply user credentials if you
want to change your password in an NIS+ domain.
For more information on
keylogin and NIS+
credentials, see
Hummingbird Directory
Services Help.

When you create a user profile, Hummingbird Directory Services runs


keylogin based on the name and Secure RPC password you supply in the
profile. It then stores the retrieved credential information locally. This
information is available to any Hummingbird Connectivity application that
needs to build your user credentials.
The system profile stores the credentials for your machine, not your user
credentials. If you are using the system profile and you attempt a task that
requires user credentials, Hummingbird Directory Services automatically
runs keylogin on your behalf. In this case, Hummingbird Directory Services
attempts to use your Windows user name and password as your NIS+ user
name and Secure RPC password.
If this attempt fails and you have registered a user name and password using
the nfs register command or the Connect As dialog box, Hummingbird
Directory Services tries keylogin again with your registered credentials
(Hummingbird NFS Maestro Client users only).
If the automatic keylogin fails, the NIS+ Login dialog box opens to let you
manually specify a user name and Secure RPC password for the NIS+
domain in the system profile.
Keylogin runs on a per user basis. Once you have specified user credentials
for the system profile, you do not need to supply this information again.
Note: If you are using the system profile, you can run keylogin
explicitly to bind to NIS+ using specific credentials. For more
information, see Running Keylogin on page 243.

234

Chapter 9: Hummingbird Directory Services

Binding to LDAP
When you bind to an LDAP domain, you can either bind as a registered
LDAP user (in which case you must have a user account in the domain) or
as an anonymous user. Anonymous users may not have access to all objects
in the domain.
Warning! If you bind as a registered LDAP user but do not use
SSL authentication, your LDAP credentials may be visible to any
third party on the network.

If you choose to use SSL authentication, you must first retrieve a CA


certificate from the same Certificate Authority that is used by the LDAP
server.

Other Options
Protocol Version You can choose to use either version 2 or version 3 of
LDAP. If you use SSL authentication, you must use version 3. Most LDAP
servers running version 3 also support version 2. If you are not using SSL
authentication and the server supports version 2 only, all LDAP queries
made by you use the version 2 protocol (even if you specify version 3).
Query Options You can also set the maximum time (in minutes) for
queries to the LDAP service and the maximum number of entries to return.
If the service does not return any query results within the specified time, the
query is aborted.

LDAP Authentication (SSL)


LDAP version 3 uses the Secure Socket Layer (SSL) protocol for
authentication. SSL was developed by Netscape to secure communication
over the Internet. The basis of SSL authentication is a digital certificate
which one party sends to another to prove its identity. The certificate is
issued by a third party, the Certificate Authority, that both parties trust.

235

Exceed Users Guide

Hummingbird Directory Services and Directory Services Explorer use


server-side certificates, which authenticate an LDAP server to your
machine. To use the server-side certificate from a given LDAP server, you
must first retrieve a CA certificate from the root Certificate Authority used
by the server. The CA certificate lets Hummingbird Connectivity
applications (including Directory Services Explorer) authenticate the
certificate sent from the LDAP server.
Contact your LDAP administrator for information about the applicable
Certificate Authority. You can use most web browsers to download a CA
certificate and save it on your machine.
Once you have retrieved the CA certificate, you need to install it using a
version of Microsoft Internet Explorer that supports SSL. If you are using
Internet Explorer to retrieve a certificate, you can install it directly during
the download process.
Note: Before you can install an SSL certificate using Internet
Explorer, you may need to update your Windows system. For
more information, see article Q286158 in the Microsoft Product
Support Services web site (http://support.microsoft.com).

Installing a CA Certificate
To install a CA certificate at download time (Internet Explorer only):
1

In the File Download dialog box, select Open This File From Its Current
Location. Click OK. The Cer tificate dialog box opens.

On the General page, click Install Certificate. The Certificate Manager


Import Wizard opens.

Follow the instructions in the wizard to install the certificate on your


machine.

To install a CA certificate saved to disk:

236

Open Internet Explorer.

On the Tools menu, click Internet Options. The Internet Options dialog box
opens.

Chapter 9: Hummingbird Directory Services

Select the Content tab, then click Cer tificates. The Cer tificate Manager
dialog box opens.

Click Import. The Certificate Manager Import Wizard opens.

Follow the instructions in the wizard to install the certificate on your


machine.

If you have installed the certificate correctly, it appears in the Trusted Root
Cer tification Authorities page of the Certificate Manager dialog box.

Specifying an LDAP Domain


When you create a profile for LDAP, you need to specify a domain. Use the
LDAP Properties dialog box.

237

Exceed Users Guide

To specify an LDAP domain:


For more information, see
Opening a Properties
Dialog Box on page 228.

Open the LDAP Properties dialog box. The Host Info page is selected by
default. Type the profile name for the domain into the LDAP Account
box (Directory Services Explorer only).

From the LDAP Version list, select the version of LDAP you want to use
(LDAPv2 or LDAPv3).
If you want to bind to the server using SSL authentication, select the
Use SSL Connection check box. Only LDAP version 3 supports SSL. To
use SSL, you must first install a CA certificate.

For more information on


LDAP search bases, see
Hummingbird Directory
Services Help.

Click Add. The LDAP Server Proper ties dialog box opens.

In the Server Name box, type the name of an LDAP server for the
domain.

In the Port Number box, type the port number for the LDAP service.
Alternatively, click the Default button to enter the default number. The
default port number for LDAP is 389, unless you are using SSL
authentication, in which case the default is 636.

Click OK. The LDAP Server Properties dialog box closes and the name of
the server you have added appears in the Server Information area on the
Host Info page.

Repeat steps 36 for any other LDAP servers that support the same
domain. LDAP servers in the same domain have the same base DN.

On the Host Info page, type the search base for LDAP queries into the
Search Base box (for example, dc=abcxyz,dc=com).
Note: The settings you specify in the Search Options area apply
to all servers listed in the Server Information area.

238

Click OK. The LDAP Proper ties dialog box closes. The LDAP service is
configured for the specified profile.

Chapter 9: Hummingbird Directory Services

Setting LDAP Bind Options


Use the LDAP Properties dialog box to set all LDAP bind options.
To set the query order for LDAP servers:
1

Click the Host Info tab. The Server Information area displays the list of
servers you have added. The order of servers from top to bottom
corresponds to their query order.

In the Server Information area, select a server from the list.

Click the arrow buttons at the right of the list until the selected server is
in the correct position.

Repeat steps 23 for all other servers in the list until you achieve the
desired query order. Click OK. The LDAP Properties box closes. Directory
service queries target the first available server from the ordered list.

To specify your user credentials for LDAP:


1
2

Click the User Info tab.


If you want to bind to the server as an anonymous user, select the Login
Anonymously check box. This is the default option.

For more information on


distinguished names, see
Hummingbird Directory
Services Help.

If you want to bind as a registered user, type the distinguished name


(DN) for your LDAP user account into the User DN box, then type your
LDAP password into the Password box.
3

Click OK. The LDAP Proper ties box closes. Queries to LDAP include the
credentials you have specified.

To set the query options for LDAP queries:


1

Click the Advanced tab.

In the Search Timeout box, type the maximum query time (in minutes).

In the Maximum Number of Matches to Return box, type the maximum


number of query results. To specify no limit for the number of results,
type zero (0).

Click OK. The LDAP Proper ties dialog box closes. Queries to LDAP use
the specified settings.
239

Exceed Users Guide

Using Hummingbird Directory Services


Selecting a Service
After you have established a user or system profile using Hummingbird
Directory Services, you can select any service that has a domain specified in
that profile. Any queries made by Hummingbird Connectivity applications
target the domain for the selected service.
To select a service:
1

Open the Hummingbird Directory Services Properties dialog box.

In the Directory Service Setting area, select the profile type you want to
use (User Settings or System Settings).

From the Directory Service list, select the service you want to use. To
specify no service, select HCLNFSD/PCNFSD. If you are using a directory
service to retrieve AUTH_UNIX credentials, the HCLNFSD/PCNFSD
option targets the authentication daemons (hclnfsd or pcnfsd).

Click OK. The Hummingbird Directory Services Proper ties dialog box
closes.

Modifying a Profile
Once you have created a user or system profile, you can modify its
properties at any time. You can also remove the bind information for a
particular service.
Note: You must be the Administrator for the machine to modify the
system profile or remove a service from it.

To modify a profile:

240

Open the Hummingbird Directory Services Properties dialog box.

In the Directory Service Setting area, select the profile you want to
change (User Settings or System Settings).

From the Directory Service list, select the directory service whose
domain information you want to change.

Chapter 9: Hummingbird Directory Services

Click Proper ties. The Properties dialog box for the selected service
opens.

In the Properties dialog box, modify the domain information for the
selected service as necessary. Click OK. The Proper ties dialog box closes.

In the Hummingbird Directory Services Proper ties dialog box, click OK.
The dialog box closes. The specified profile updates according to your
modifications.

To remove a directory service from a profile:


1

Follow steps 13 in the previous procedure.

Click Reset.

From the Directory Service list, select a service that has a domain
specified for it, or select HCLNFSD/PCNFSD. Click OK. The Hummingbird
Directory Services Properties dialog box closes. The specified service has
been removed from the profile.

Disabling User Profiles


The Administrator for the machine can disable all existing user profiles
(and prevent new ones from being created). In this case, all users must bind
to directory service domains using the system profile.
Note: If user profiles have been disabled, you can run keylogin to
bind to NIS+ using your user NIS+ credentials. For more
information, see Running Keylogin on page 243.

To disable user profiles:


1

In the Hummingbird Directory Services Proper ties dialog box, select the
Disable User Settings for All Users check box.

Click OK. The Hummingbird Directory Services Proper ties dialog box
closes. Users can no longer create or bind to domains using a user
profile.

241

Exceed Users Guide

Specifying a Host Lookup Service


Hummingbird Directory Services lets you specify the target service for host
name queries. Hummingbird Connectivity applications that need to resolve
an IP address into a host name (or vice versa) send their queries to the
selected target.
Note: Exceed users cannot use Hummingbird Directory Services
to specify a host lookup service.

To specify a target for host name queries:


1

In the Directory Services Setting area, select the profile you want to use
(User Settings or System Settings). If you want to target a directory
service, select it from the Directory Service list. (The domain for this
service must be specified in the selected profile.)

In the Host Name Lookup Using area, select:

DNSto send queries only to the Domain Name Service (DNS)

Directory Servicesto send queries only to the service selected in


the Directory Service list

DNS and Directory Servicesto send queries to both services

If you select the last option, you can also specify a query order. Select
the Check DNS First check box to send queries to DNS first.
3

Click OK to apply your settings.

Synchronizing Windows and UNIX Passwords


You can use Hummingbird Directory Services to automatically synchronize
your UNIX password for a given domain with your Windows password. The
domain is specified in the currently selected profile for the currently
selected directory service. Anytime you change your Windows password,
your UNIX password in the specified domain changes to the same value.
Note: Users of NFS Maestro Server and Exceed cannot use
Hummingbird Directory Services to synchronize passwords.

242

Chapter 9: Hummingbird Directory Services

To synchronize your passwords:


1

In the Hummingbird Directory Services Proper ties dialog box, select the
Synchronize Windows Network Password check box.

Click OK.

Running Keylogin
You can run the keylogin function to bind to NIS+ using specific user
credentials. You only need to do so if you are using the system profile for
NIS+ and you want to perform a task that requires user credentials.
To run keylogin:
1

Open the NIS+ Properties dialog box. Click Keylogin. The NIS+ Login
dialog box opens.

Type your user name for the NIS+ domain into the User Name box.

Type your Secure RPC password into the Secure RPC Password box.

Click OK. The NIS+ Login dialog box closes. Hummingbird Directory
Services uses the specified name and password to generate your DES
credentials.

You can also run keylogin using the keylogin command line application.
For more information on keylogin, see Hummingbird Directory Services
Help.

243

Exceed Users Guide

Running Command Line Applications


For more information on
the command line
applications, see
Hummingbird Directory
Services Help.

244

The Hummingbird Directory Services command line applications let you


browse and access directory service objects. By default, the applications
target the domains specified in the currently selected profile. The following
table summarizes the applications.
Command

Description

chkey

Changes your private and public key pair or your Secure


RPC password in a given NIS+ domain.

keylogin

Retrieves and decrypts your secret key from the NIS+


cred table, then stores it locally.

niscat

Displays the contents of a given NIS+ table.

nisls

Lists the contents of a given NIS+ domain.

nismatch

Returns the entries in a given NIS+ table that match


specific key values.

nispasswd

Changes or displays your UNIX password information in


a given NIS+ domain.

ypcat

Displays the contents of a given NIS map.

ypmatch

Returns the entries in a given NIS map that match a


specific key value.

yppasswd

Changes your UNIX password information in a given NIS


domain.

ypwhich

Displays the name of the master server for a given NIS


domain or the NIS server for a given host.

ldappasswd

Changes your password in a given LDAP domain.

Chapter 9: Hummingbird Directory Services

Using Directory Services Explorer


Querying Directory Service Objects
For more information on
directory service objects,
see Directory Services
Explorer Help.

When you run a query, you can retrieve the contents of an entire object (for
example, an NIS map, NIS+ table, or LDAP directory) or just the particular
entry that matches a certain key value.
Note: If you want to save the results of your query to a file, you
must configure the file output settings of Directory Services
Explorer prior to running the query. For more information, see
Saving Query Results on page 247.

To retrieve the entire contents of an object:


1

From the drop-down list box of Directory Services Explorer, select the
service you want to query. The left pane displays the profiles you have
created for that service.

Click the plus sign to the left of an object to display the objects it
contains.

Repeat step 2 until you find the object you want to query.

Click the object. The right pane displays the contents of the object.

To retrieve a specific entry from a selected object:


1

Open the Select Entries dialog box using one of the following methods:

right-click the selected object; on the pop-up menu that appears,


click Select Table Entries

click the Select Table Entries button on the toolbar

on the Object menu, click Select Table Entries

The Select Entries dialog box opens.

245

Exceed Users Guide

In the Column Restrictions area, type the desired key value or values into
the Value column.
For example, if you have selected the hosts.byname map and you want
to retrieve the IP address for the host called jane01, you would type
jane01 into the Value column. (The hosts.byname map uses host names
as its key.)
Note: Queries based on key values are case sensitive. The key
value you supply must be an exact match for the corresponding
value in the object. You cannot specify a key value using pattern
matching expressions.

Click OK. Directory Services Explorer forwards your query to the


domain server and displays the results (including any error messages).

Sorting Query Results


You can sort the results of a query returned by Directory Services Explorer,
either in ascending or descending order, using any column as the sort key.
When you run a query, the results appear in tabular form in the right pane
of Directory Services Explorer. The format of the table depends on the
service:
NIS/NIS+ Each row in the table corresponds to an entry in the queried
object. Each column corresponds to an attribute of the object.
LDAP Each row in the table corresponds to an attribute of the queried
object. All attributes of the queried object appear in the first column.
A title bar at the top of each column displays the name of the column.
To sort the results of a successful query:
Click the title bar at the top of the column you want to use as your sort key.
The first time you click a given title bar, the values in the column sort in
ascending order from the top of column to the bottom. The second time
you click the title bar, the values sort in the reverse order. Thereafter,
successive clicks alternate the sort order. To return the results to their
original, unsorted order, re-run the query.

246

Chapter 9: Hummingbird Directory Services

Saving Query Results


You can configure Directory Services Explorer to save your query results to
a text file. You can then use this file to copy and paste directory service data
into other applications. There are two output methods for building the file:

appendadds successive query results to the end of the file; does not
overwrite existing results in the file

replaceoverwrites existing results with the current query results

You must specify the name of the file and the output method before you can
save any queries.
To specify an output file:
1

On the File menu of Directory Services Explorer, select Settings. The


Directory Services Explorer Settings dialog box opens.

In the File Output Settings area, select the Output to File check box.

In the Output Filename box, type the name of the output file. You must
supply an absolute path name for the file, including the drive letter (for
example, c:\temp\results.txt). You must have permission to write to
the specified path.

From the Output Method list, select the desired output methodeither
Append or Replace.

Click OK. The Directory Services Explorer Settings dialog box closes. The
specified file stores the results from any subsequent queries.
Note: You cannot save object properties to an output file.

Viewing Object Properties


Directory Services Explorer lets you view the contents of directory service
objects as well as the properties of those objects. Depending upon the
service and the type of object, the properties you can examine include:

the name of the object

the server that stores the object

the access rights for the object, specified as a permission string


247

Exceed Users Guide

To view the properties of an object:


1

In the left pane of Directory Services Explorer, select the object.

Display the properties for the object using one of the following
methods:

right-click the object; on the pop-up menu that appears, click


Proper ties

on the Object menu, click Properties

click the Properties button on the toolbar

The properties of the object appear in a Properties dialog box named


after the object.

Modifying a Profile
Once you have created a profile, you can modify its properties at any time.
You can also delete a profile.
To modify a profile in Directory Services Explorer:

248

On the File menu, click Settings. The Directory Services Explorer Settings
dialog box opens.

From the Directory Service list, select the service whose profile you want
to change. The Profile box lists the profiles you have created for the
selected service.

In the Profile box, select the profile you want to modify. Click Properties.
The Proper ties box for the selected service opens.

In the Properties dialog box, modify the domain information for the
selected service. Click OK. The Proper ties dialog box closes.

In the Directory Services Explorer Settings dialog box, click OK. The
dialog box closes. The specified profile updates according to your
modifications.

Chapter 9: Hummingbird Directory Services

To delete a profile in Directory Services Explorer:


1

Follow steps 12 in the previous procedure.

In the Profile box, select the profile you want to delete. Click Remove,
then OK. The Directory Services Explorer Settings dialog box closes.

Changing a Domain Password


Using Directory Services Explorer, you can change your password for a
selected service and domain. Specifically, you can change the entries for
your account in the passwd.byname and passwd.byuid NIS maps, the passwd
NIS+ table, and the LDAP posixAccount entry for your user name.
Note: You must have an account on the server or network on
which a service runs in order to update password objects.
If you are changing your password in an NIS+ domain, Directory
Services Explorer changes your Secure RPC password to the new
value as well.
If you are changing your password in an LDAP domain, you must
change it for each of your profiles that bind to that domain.

To update your password information for a given domain:


1

Open Directory Services Explorer.

On the File menu of Directory Services Explorer, select Change User


Password. The Change User Password dialog box opens.

From the Directory Services list, select the service that controls the
domain. The Profile box lists the profiles you have created for the
selected service.

In the Profile box, select the profile that specifies the domain. Click
Change Password. The Password Information dialog box opens.

In the User Name box, type your user name.

In the Old Password box, type your old UNIX password.

In the New Password and Confirm New Password boxes, type your new
UNIX password.
249

Exceed Users Guide

Click OK. If you are updating your password in an NIS+ domain and
your UNIX password is not the same as your Secure RPC password, you
must enter your Secure RPC password in the Secure RPC Password box,
then click OK again.
The Password Information dialog box closes.

In the Change User Password dialog box, click Done. The dialog box
closes. Directory Services Explorer updates your UNIX password (and
Secure RPC password, if applicable) for the specified domain.
Note: The new information may take several minutes to propagate
across supplementary servers in the domain.
If you have selected a replica server as the first server in the NIS+
query order, the new password information must first pass up to
the master server before propagating across the other replica
servers.

250

Chapter 10
Troubleshooting

Installation Troubleshooting

253

Exceed Diagnostics
Troubleshooting Xstart
Logs and Trace Operations

256
256
258

Chapter 10: Troubleshooting

Installation Troubleshooting
The following are common installation issues and questions along with
suggested solutions. For further assistance with troubleshooting issues,
contact Hummingbird Technical Support.

Another instance of the Hummingbird Setup Wizard is


running (Error 2803)
Solutions:

If a product is not currently being installed, you can ignore this error
message and run:
Setup /v"HCL_OVERRIDE_INSTANCE=1"

The message also appears if a non-privileged user tries to uninstall a


product installed for All Users of the computer. In this case, the setup
parameter does not work since only an Administrator of the computer
can uninstall the product.

This error message may display if installer is unable to remove a key


created by the Setup Wizard. This may be because Setup Wizard
encountered problems during a previous installation and the key was
not removed.
Delete the following keys from the registry:
//HKEY_CURRENT_USER/Software/Hummingbird/Connectivity
/<version>/installer/UserIni/InstallActive=1
//HKEY_USERS/biglongnumberhere/Software/Hummingbird/
Connectivity/<version>/installer/UserIni/InstallActive=1

Problems repairing user files


If the user directory is accidently deleted, the user file may not be repaired
properly. In this case, if a program does not start, try removing the UserFiles
registry key in HKEY_CURRENT_USER or HKEY_LOCAL_MACHINE depending on
whether or not the product is installed for All Users.

253

Exceed Users Guide

The feature you are trying is on a network resource that is


unavailable
Solutions:

Click OK in the warning dialog box and try again.

Enter an alternate path to the folder containing the installation package


Hummingbird NFS XXX.msi. Run the install again, then choose repair.

Windows installer has found incompatible software on your


system
If you install version 7.x software (Exceed or NFS Maestro) and older
versions of Hummingbird software exist on your system (for example
versions 6.2 or earlier), you get the above warning message. Windows
Installer will try to remove the older software, but in some cases this is not
possible. Try to manually remove the software.

When trying to uninstall, Setup Wizard asks for the location


of an .msi file
Solution: To perform the uninstall, the installation CD should be in the
drive.

Patch - Sourcedir not found (when trying to install patch)


This means the source files are unavailable. When installing a patch, you
need to have the source from which you installed. The original product CD
must be in the drive.

After installation the software does not workservices are


not starting and/or files are missing
Solution: Ensure the Administrator account is used to perform the
installation. For Windows NT/2000, installing HostExplorer and NFS
Maestro Client requires Administrator privilege. Installing Exceed requires
elevated privilege (that is, a user who is a member of the Administrator
group).

254

Chapter 10: Troubleshooting

When trying to install the product, a message says I must


uninstall it
Solution: You have an old version of one or more products installed. You
will require version 7.x to install all products.

Are there other command line options for Msiexec?


For more detailed
information about
Msiexec command line
options, see the Windows
Installer documentation in
the MSDN online Library at
msdn.microsoft.com
or on CD-ROM via
subscription.

The following are command line options for Msiexec:


Option

Meaning

/i Package|ProductCode

Installs or configures a product.

/f Package|ProductCode

Repairs a product. For more information about


various flags available for this option, see the
MSDN Library.

/a Package

Administrative installation option. Installs a product


on the network.

/x Package|ProductCode

Uninstalls a product.

/j

Advertises a product. For more information about


various flags available for this option, see the
MSDN Library.

/L Logfile

Specifies path to log file and the flags indicate


which information to log. For more information
about various flags available for this option, see the
MSDN Library.

/m filename

Generates an SMS status .mif file and must be


used with the install (-i), remove (-x), administrative
installation (-a), or reinstall (-f) options. For more
information about this option, see the MSDN
Library.

/p PatchPackage

Applies a patch. For more information about this


option, see the MSDN Library.

/q

Sets user interface level. For more information


about various flags available for this option, see the
MSDN Library.

255

Exceed Users Guide

Option

Meaning

/?

Displays copyright information for the Windows


Installer.

/h
/y module

Calls the system API DllRegisterServer to selfregister modules. For more information about this
option, see the MSDN Library.

/z module

Calls the system API DllUnRegisterServer to


unregister modules. For more information about
this option, see the MSDN Library.

How does one create an installation log file (installer error


1631)?
To generate a log file, users should run the following command:
setup /v"/I* C:\install_log.txt"

where C:\ is the path to plaintext file install_log.txt.

Exceed Diagnostics
To find out tips for using
Exceed, or to find out how
other users solve common
problems, join the Exceed
Users Group. See page 10
for details.

This section describes possible solutions to problems that you might


encounter while using Exceed. If you have problems, there are two main
ways to determine the cause:

Diagnosing using progress messagessee details below.

Diagnosing using logs and trace operationssee details beginning on


page 258.

Troubleshooting Xstart
Progress Messages
To open the Other Settings
dialog box, click Other in
the Settings area of Xstart.

256

Usually, the first step in troubleshooting a connection is displaying system


progress messages. On the Connection tab (Other Settings dialog box), select
Show progress and Show host reply in the Status/Debug area.

Chapter 10: Troubleshooting

The Show progress option shows what is happening while you try to
connect and start an application.

The Show host reply option displays a summary of the startup


information, the macros you used displayed in expanded form, and
what reply was given by the host or application.

These options should help you determine the problem. The following
sections detail common connection error messages.
Correct User Name and PasswordSystem Does Not Connect If the
host does not return an Invalid Name or Password message, there may be
something wrong with the communications link. Maybe the host is not
running or it does not support REXEC or RSH. There may also be a
problem with your transport setup or configuration.
Host Returns Invalid Name or Password Message If you receive an
Invalid Name or Password message but the system is connecting, there may
be something wrong with either the syntax or the parameters of the
command you typed in the Xstart Command box. You may need to type
PATH or DISPLAY specifications on the command line.
Xstart Connects But the Client Does Not Start The client may not be
getting enough time to start before the initial Xstart socket closes down. In
the Other Settings dialog box (in Xstart, click Other in the Settings area), set
the Close box in the Timeouts area to -1 (minus one), select the Show host
reply option, then click OK.
This setting keeps the first socket open even after the client socket is
established. It also shows all host-generated messages in a host reply
window that may give you details about what is happening. If the client
seems to start properly, try different values in the Close box until you find a
value that gives the client enough time to start and then closes down the
initial socket.
The Client is Not Authorized to Run on the Server To verify
authorization, in the Xconfig Troubleshooting dialog box select View. In the
Current Log Files dialog box, view the exceed.log file and check for errors.
To fix a problem with permissions, start Xconfig. In the Security dialog box,
edit the Host Access Control List file (select File, browse if necessary, then
click Edit). You may have to also edit the file (if it exists and if the option is
enabled) indicated in the Enable User Access Control List area.

257

Exceed Users Guide

Logs and Trace Operations


Exceed comes with two main tools for troubleshooting using logs and trace
operations: Troubleshooting and Tranport Monitor.

Troubleshooting the Exceed X server


Use the Troubleshooting application in Xconfig to view the log file, to set
what information is recorded in the log file, and to enable tracing. There are
two main areas of active troubleshooting available with this application.
The first area lets you log information into a file for later inspection. You
can log Font Open requests, the initial settings of the WM_COMMAND
and WM_NAME properties on InputOutput root level windows and all
OpenGL requests. You can also generate a security audit in the log file using
X Web Info Logging.

Note: OpenGL support requires Exceed 3D. OpenGL is an


industry-standard three-dimensional graphics software interface.
It lets you create interactive programs that produce still or
animated 3D color objects, with shading, lighting, and other
effects. GLX is the X Window System extension which implements
OpenGL.

The second area is known as tracing. Tracing records all protocol traffic,
between the Exceed X server and the host to a binary file. Options in
Xconfig troubleshooting can help with the trace. For example, you can turn
on tracing as soon as the Exceed X server starts, which means that the dialog
with the first X client is recorded. You can also set Slow Trace in the Xconfig
Troubleshooting dialog box which writes all information directly to the file
without buffering any of the data. This is helpful if you are tracing a
situation where the Exceed X server crashes because any buffered
information would be lost.

258

Chapter 10: Troubleshooting

The trace stops when the Exceed X server terminates. If you turned tracing
on by clicking Trace on the Exceed X server File menu, you can terminate
tracing by selecting Trace again. If tracing was turned on in the
Troubleshooting dialog box, you should clear the Trace Initially On option as
soon as possible. Otherwise, whenever the Exceed X server is restarted,
tracing begins again.

Warning! Tracing creates large disk files on your system, and


can impair Exceed X server performance. Therefore, use tracing
only when you are troubleshooting a problem.
For more information on
Xdis, see the Help.

After the system performs a trace, disassemble the trace file to read it as a
text file in Notepad. Xdis performs the disassembly process for you and lets
you filter the data content of the disassembly.

Transport Monitor
The Transport Monitor application (in the Exceed Tools folder) lets you
monitor network connections by displaying all current connection activity.
Use it to locate connections that are frozen. After you close a connection,
the Transport Monitor should reflect this change. If the Transport Monitor
continues to display a connection you have closed, then the connection is
frozen.

259

Appendix A
Connectivity Applications

Accessories

263

HostExplorer Accessories

264

System Administration

266

Appendix A: Connectivity Applications

Accessories
To quickly locate the online help for an Accessory, open the application and
click help from within the application.
Directory Services Explorer This application lets you browse NIS, NIS+,
and LDAP directory services without leaving the familiar Windows
environment. Using Directory Services Explorer, you can bind your
machine to multiple domains simultaneously, browse object contents and
properties, run selective or global queries, and change your password in a
directory service domain.
Hummingbird Directory Services This application lets you configure
the NIS, NIS+, and LDAP settings for Hummingbird Connectivity
applications. All directory service queries made by Hummingbird
Connectivity applications target the domains specified and selected by you.
Hummingbird Directory Services also lets you synchronize your Windows
and UNIX passwords and select a target service for host name resolution.
Finger This application returns information about the users of a
particular computer. You can display information about a specific user, or
all users currently logged onto a particular computer.
Host Editor This application lets you edit and manage a list of IP
addresses and associated machine names. This information is contained in
the HOSTS file on your PC.
Hummingbird Basic This is a command language included with
Hummingbird products. Hummingbird Basic can be used to create scripts
for frequently performed tasks that you would like to automate. For details,
refer to the Hummingbird Basic Language Programmers Guide.
Launch Pad This application lets you launch applications and manage
application windows. It includes a graphical menu-building facility that lets
you customize your environment, and a Virtual Desktop that increases the
size of the Windows display workspace.
Network Time This application lets you synchronize the time on your PC
with the Network Time Server.
NSLookup This application finds and displays information about hosts
in a domain.

263

Exceed Users Guide

Ping This is a diagnostic tool that lets you quickly check the integrity of a
network communications path and your TCP/IP configuration. Ping sends
Internet Control Message Protocol (ICMP) echo requests to specified
machines and displays the response in graphical form.
Remote Tools This application is an integrated version of several UNIX
commandsRemote Shell, Remote Exec, Remote Copy (RSH) and Remote
Copy (REXEC). You can execute commands and copy files to or from other
machines on the network using the RSH and REXEC protocols.
Tar This application lets you easily transfer entire directories and their
contents to an Archive file, usually for backup purposes. You can create local
and remote Archive files and restore them to your PC at any time.
Traceroute This application shows the route that packets take to the host.
It lets you test, troubleshoot, and manage network connections and find the
route used to connect to a specific host.
Whois This application lets you query the central user name directory
service maintained by the InterNIC (Network Information Center)
Registration Service for an entry name. The InterNIC Registration Services
Host contains Internet information (Networks, ASNs, Domains, and POCs)
for non-military users. For military information, use the Whois server at
NIC.DDN.MIL or MILNET.

HostExplorer Accessories
For more information on all of these applications, see the HostExplorer
(Host Access) Users Guide.
HostExplorer TN3270 This application emulates an IBM mainframe
(including 3179G, 3472G, 3278, and 3279 models), runs 3270 applications,
and transfers files between a host machine and your PC using the
IND$FILE file transfer application.
HostExplorer TN5250 This application emulates IBM AS/400 systems
and runs 5250 applications.

264

Appendix A: Connectivity Applications

5250 File Transfer Wizard This is a new component of HostExplorer that


lets you transfer files between a PC and an AS/400 host. If you transfer a file
from an AS/400 host to your PC, you can specify standard SQL statements
to execute in the file.
FTP The FTP application lets you connect to a remote FTP server and
transfer files between computers. FTP is only supported under TCP/IP
transports. You cannot use this application with DECnet or IPX/SPX. A
server implementation of the FTP protocol must run on the remote
computer to allow for FTP communication. The remote computer is the
FTP server (host); and the PC running the Hummingbird FTP application
is the FTP client.
FTP for Windows Explorer This application is a client implementation
of the File Transfer Protocol. It lets you transfer both text (ASCII) and
image (binary) files between your PC and a remote computer running a
server implementation of FTP. You can also use it to perform file and
directory management on your PC and a remote computer.
Line Printer Query (LPQ) This application is used to return the status of
the print queue on either a UNIX system or another PC running any lineprinter daemon.
Line Printer Requester (LPR) This application lets you print PC files to
any host on a TCP/IP network running LPD. The LPR window displays a
separate window for each printer queue to which you are connected. For
more information, see the LPR online help.
Macro & Profile Converter This utility lets you convert WallData
Rumba or Attachmate Extra! macros into Hummingbird Basic macros and
Attachmate Extra! profiles into HostExplorer session profiles.
PrintExplorer This application emulates IBM mainframe LU1/LU3
printers with TN3270E-capable host systems and 3812 printers with
TN5250E-capable host systems.
HostExplorer Telnet This application emulates the DEC VT420 video
terminal and includes support for VT52, VT100, VT101, VT102, VT220,
VT320, VT420, ANSI, and SCO ANSI.
WyseTerm This is a terminal emulator that emulates Wyse-50 and Wyse60 terminals.

265

Exceed Users Guide

Hummingbird Neighborhood This application is an extension of


Windows Explorer that lets you access and manipulate the profiles and
folders associated with Hummingbird applications such as HostExplorer,
5250 File Transfer Wizard, and FTP for Windows Explorer. Hummingbird
Neighborhood is fully embedded within Windows Explorer.

System Administration
Hummingbird Inetd Inetd is a super-daemon that lets you enable and
disable various daemon services through a single application. It determines
the network services to which your PC responds when a client makes a
network request. In a Windows 95/98/2000 environment, Inetd runs
automatically when placed in the Startup folder. The Startup folder is the
usual location for Inetd. For more information, see System
AdministrationInetd and Inetd Admin.
Jconfig Jconfig is a remote configuration tool that system administrators
can use to configure the Hummingbird applications on any network host
running a Jconfig Daemon. Jconfig offers a variety of configuration options.
You can create application-specific profiles for users, install shortcuts on
user desktops, monitor and log user activities, and send messages to user
machines. As well, you can use Jconfig to configure remote PCs one at a
time or to create script files that, when played, customize the configuration
of multiple remote PCs. For more information, see System
AdministrationSconfig and Jconfig.
Sconfig Sconfig is a wizard that lets you customize the installation of
software on local and network machines. With Sconfig, you can configure
the install in the following ways:

266

Customize the folders installed by Setup.

Tailor the list of applications or components to be installed. You can


alter the list to limit the functionality available to users, or to optimize
the use of disk space.

Appendix A: Connectivity Applications

Simplify user input during the installation by pre-selecting information


such as the names of the directories where the software is installed.
Note: For more information, see System AdministrationSconfig
and Jconfig.

SOCKS Information This link in the Star t menu launches an HTML file
that contains information on what SOCKS is, what it does, and how to use
it.
Update Hummingbird Use this application to install the latest patch to
your product. For more information, see your installation chapter.
Web Update Use this application to modify the connection settings for
updating the product. This application is not available if you performed a
personal installation without Administrator privileges. Instead, an HTML
file is created that links to a Web site for Hummingbird updates.

267

Index

Numerics
5250 File Transfer Wizard ........................... 265

A
about .mst files............................................. 145
about package files....................................... 145
accessibility features......................................... 7
directional arrow keys .............................. 7
Enter key................................................... 7
Esc key ...................................................... 7
in Microsoft Windows ............................. 8
Keyboard shortcuts .................................. 7
Spacebar ................................................... 7
Tab key sequence ..................................... 7
ToolTips ................................................... 8
accessing the font server .............................. 133
accessories.................................................... 263
Finger ................................................... 263
Host Editor........................................... 263
Hummingbird Basic............................. 263
Launch Pad........................................... 263
Network Time ...................................... 263
NSLookup ............................................ 263
Ping....................................................... 264
Remote Tools ....................................... 264
Tar ........................................................ 264
Traceroute ............................................ 264
Whois ................................................... 264

adding .......................................................... 148


features ................................................. 151
files........................................................ 152
font directories ..................................... 165
font files ................................................ 165
font servers ........................................... 169
properties.............................................. 155
registry keys .......................................... 158
shortcuts ............................................... 161
X screens............................................... 122
administration
Jconfig................................................... 174
Jconfig host........................................... 175
logging status information ................... 183
Sconfig .................................................. 174
administration host
installing Jconfig on.............................. 177
opening connection ............................. 179
administrative installations............................ 36
advertisement of products ............................. 42
"All Users"
user files .................................................. 25
allocating system resources.......................... 128
analysing
log file ................................................... 258
progress messages................................. 256
application database file
syntax......................................................75
application settings, Jconfig
configuring ........................................... 180
applications
browsing for ........................................... 68
included with Exceed ...............................4

Exceed Users Guide

applications, Host Explorer .........................264


5250 File Transfer Wizard ....................265
FTP........................................................265
FTP for Windows Explorer ..................265
HostExplorer Telnet .............................265
HostExplorer TN3270 ..........................264
HostExplorer TN5250 ..........................264
Hummingbird Neighborhood .............266
Line Printer Query................................265
Line Printer Requester..........................265
Macro and Profile Converter ...............265
PrintExplorer ........................................265
WyseTerm.............................................265
applications, Update Hummingbird ...........267
applying an .mst file .....................................172
archives, searching mailing list ......................11
authentication
AUTH_DES..........................................234
CA certificates.............................. 235, 236
Secure RPC ...........................................222
SSL ........................................................235
user credentials for LDAP ....................239
automatically copying and pasting ................92
available Exceed products ................................6

B
balancing system loads...................................97
base DN ........................................................238
binding to a domain
LDAP ....................................................235
NIS ........................................................229
NIS+......................................................230
overview ................................................224
using user vs. machine credentials .......231
BOOTPTAB configuration file
configuration information ...................205
entry format ..........................................205
broadcast address .........................................121
defining .................................................121
browser
specifying ..............................................183

270

browsing
for applications ...................................... 68
for hosts.................................................. 68
buttons, configuring the mouse .................. 110

C
CA certificate
definition.............................................. 236
installing ............................................... 236
caching a password........................................ 96
CDE
overview ................................................. 79
starting.................................................... 79
Certificate Authority (CA) .......................... 235
changing default password .......................... 180
Chinese environments................................. 138
Chinese, Japanese, & Korean Input.
See CJK Input
choosing setup types...................................... 23
CJK
input methods...................................... 136
input, Xconfig ...................................... 136
client
installing Jconfig on ............................. 177
Client Wizard
using ....................................................... 63
Client Wizard, overview .................................. 5
client-side installer......................................... 15
command line
Exceed X server parameters ................. 124
running an Xstart file ............................. 76
window manager startup ....................... 86
command line applications
Hummingbird Directory Services ....... 244
command macros in Xstart........................... 95
commands, window managers...................... 86
Common Desktop Environmen. See CDE
Communication application, Xconfig ........ 113
components, defined..................................... 18
configuration file ......................................... 107
configuration session
locking .................................................. 185
opening................................................. 179

Index

configuring
four screens .......................................... 122
host database ........................................ 181
Jconfig application settings .................. 180
Jconfig Daemon settings ...................... 181
Jconfig services ............................. 175177
log settings............................................ 183
multiple hosts using scripts.................. 184
remote hosts, introduction .................. 174
remote services for host ....................... 183
the mouse ............................................. 110
X screens............................................... 122
connecting
Broadway and LBX .............................. 103
to administration host.......................... 179
to hosts ................................................... 63
to remote host ...................................... 179
connections, setting sequence of events...... 113
Copy Image,
administrative installation .............. 37
copying and pasting
overview ................................................. 87
automatically.......................................... 92
between X clients.................................... 91
data ................................................... 8889
graphics .................................................. 89
storage buffer.......................................... 87
to input CJK text .................................. 138
creating ........................................................ 258
a password cache .................................... 96
a security file......................................... 117
font aliases ............................................ 133
multiple installations....................146, 173
startup file............................................... 64
startup file, Wstart.................................. 65
Wstart file ............................................... 78
Xstart shortcut........................................ 75
current user
user files.................................................. 25

custom installations
directories .............................................148
Exceed properties .................................148
features..................................................148
files ........................................................148
font directories and servers ..................149
font paths ..............................................149
NFS properties......................................148
properties..............................................148
registry ..................................................148
shortcuts ...............................................148
customizing
the keyboard .........................................108

D
daemon services ...........................................192
BOOTPd...............................................193
Fingerd..................................................194
FTPd .....................................................194
LPD .......................................................196
Telnetd..................................................197
TFTPd...................................................200
Timed....................................................201
Tnamed.................................................201
Xstartd ..................................................198
Daemon Settings service, Jconfig.................176
database, configuring host ...........................181
DECnet transports, using ............................141
DECwindows compatibility.........................120
default
configuration file ..................................107
default installation language ..........................19
default password
changing ...............................................180
defining a broadcast address........................121
deleting
a password cache ....................................97
a screen .................................................123
Xscreens ................................................122
destination folder, installation .......................24
diagnostics, Exceed ......................................256

271

Exceed Users Guide

directories, customizing with Sconfig


All Users directory ................................149
Current User directory .........................149
Destination directory............................149
directories, customizing
with Sconfig.......................... 148, 149
directory services
definition ..............................................221
domains ................................................222
object types ...........................................223
profiles ..................................................225
protocol types .......................................222
query order .......................... 229, 233, 239
repositories ...........................................224
Directory Services Explorer
changing a UNIX password..................249
overview ................................................219
profiles ..................................................225
querying directory service objects ........245
saving query results...............................247
sorting query results .............................246
viewing object properties......................247
directory services profiles
creating profiles for Directory Services
Explorer............................................226
creating profiles for Hummingbird
Directory Services ............................227
disabling user profiles...........................241
modifying..................................... 240, 248
removing...................................... 241, 249
system profile........................................226
user profiles...........................................226
disabling
a screen .................................................123
display, setting..............................................123
displaying
scroll bars ................................................84
X window manager menus.....................83
distinguished names (DN)...........................239
documentation
Help ..........................................................9
manuals.....................................................8
release notes ..............................................9

272

dynamic-link library
for reading .msi file ................................ 15

E
editing
font database ........................................ 131
fonts...................................................... 132
Editor service, Jconfig.................................. 175
enabling
host access ............................................ 116
protocol extensions .............................. 120
Environmental Settings service, Jconfig...... 175
environments
Chinese................................................. 138
Exceed
available products .................................... 6
diagnostics............................................ 256
included applications ............................... 4
on a remote PC .................................... 103
Exceed 3D ........................................................ 6
Exceed configuration service, Jconfig ......... 176
Exceed properties, setting with Sconfig
adding, modifying,
or removing .....................148, 162, 163
Exceed X Development Kit ............................. 6
Exceed X Server
overview ................................................... 5
and Input Method server ..................... 137
configuring ........................................... 119
resetting .................................................. 82
Expos Online................................................ 50
Extend, modifying settings.......................... 118

F
feature tree ..................................................... 33
features
defined.................................................... 18
features, selecting with Sconfig ........... 148, 150
adding................................................... 151
modifying ............................................. 151
removing .............................................. 151
file sequence for Xsession............................ 102
File service, Jconfig ...................................... 175

Index

files, selecting with Sconfig..................148, 152


adding................................................... 152
modifying ............................................. 153
removing .............................................. 154
Finger ........................................................... 263
font alias
creating................................................. 133
creating several ..................................... 134
exporting .............................................. 130
importing and exporting files ...... 134136
Font application, Xconfig............................ 130
font database
editing................................................... 131
managing.............................................. 131
selecting ................................................ 130
Font Database service, Jconfig..................... 176
font directories, setting with Sconfig...149, 165
adding................................................... 165
modifying ............................................. 167
removing .............................................. 168
font files
adding................................................... 165
removing .............................................. 168
font paths, setting with Sconfig ................... 149
font server access ......................................... 133
font servers, setting with Sconfig
adding................................................... 169
modifying ............................................. 170
removing .............................................. 171
font servers, setting
with Sconfig .................................. 149
fonts
adding, changing, or deleting .............. 132
frozen connection, determining.................. 259
FTP............................................................... 265
FTP for Windows Explorer ......................... 265
FTPd ............................................................ 211

G
General tab................................................... 181
GNOME. See GNU Network Object
Model Environment

GNU Network Object


Model Environment........................79
graphics
copying and pasting................................89

H
Help..................................................................9
opening .................................................183
host
configuring database ............................181
configuring multiple using scripts .......184
configuring remote services .................183
installing Jconfig on..............................177
opening a connection ...........................179
Host Editor...................................................263
host list file
syntax ......................................................74
host lookups
NIS maps ..............................................229
specifying a target service .....................242
host, Jconfig .................................................175
administration ......................................175
HostExplorer Applications ..........................264
5250 File Transfer Wizard ....................265
FTP .......................................................265
FTP for Windows Explorer ..................265
HostExplorer Telnet .............................265
HostExplorer TN3270 ..........................264
HostExplorer TN5250 ..........................264
Hummingbird Neighborhood .............266
Line Printer Query................................265
Line Printer Requester..........................265
Macro and Profile Converter ...............265
PrintExplorer ........................................265
WyseTerm ............................................265
HostExplorer settings service, Jconfig .........176
hosts
browsing for............................................68
load balancing.........................................97
optimizing loads .....................................97
restricting access ...................................116
Hummingbird accessibility..............................7
Hummingbird Basic ....................................263

273

Exceed Users Guide

Hummingbird Directory Services


command line applications ..................244
overview ................................................219
profiles ..................................................226
retrieving AUTH_UNIX credentials....240
selecting a service..................................240
specifying a host lookup service ...........242
synchronizing UNIX and
Windows passwords.........................242
Hummingbird Expose Online
subscribing..............................................10
Hummingbird Inetd ....................................266
Hummingbird Information Resources ...........8
documentation .........................................8
mailing lists .............................................10
Technical Support ....................................9
Hummingbird mailing lists
subscribing..............................................10
Hummingbird Neighborhood.....................266
Hummingbird Setup Wizard...................1718
maintenance mode .................................35
Hummingbird User Group
joining.....................................................11
posting messages.....................................11
Hummingbird users, interacting with ...........10
HWM
overview ....................................................6
HWM, overview.............................................85

I
improving system performance ...................128
Inetd
overview ................................................189
TCP and UDP servers...........................189
Inetd Admin
directory permissions ...........................213
granting anonymous FTP access..........215
maintaining system security .................190
removing access rights..........................214
specifying access rights .........................211

274

Inetd configuration
adding/deleting Services ...................... 202
configuring services.............................. 202
enabling/disabling services .................. 201
logging server activity........................... 203
reloading updated configuration ......... 203
restoring default services...................... 203
Inetd configuration parameters
BOOTPD.LOG File ............................. 204
BOOTPTAB Configuration File.......... 205
Destination Folder ............................... 204
information resources, Hummingbird .....8, 11
documentation......................................... 8
mailing lists ......................................10, 11
Technical Support.................................... 9
information, logging administrative ........... 183
.ini file service, Jconfig................................. 176
input method server .................................... 137
Install service, Jconfig .................................. 176
installation
advertised ............................................... 42
cross-platform from
shared image ...................................... 47
current user versus "All Users" .............. 26
default language ..................................... 19
destination folder ................................... 24
feature options (install state) ................. 33
from shared image ................................. 47
Master Setup .......................................... 22
personal, as Administrator..................... 41
personal, overview.................................. 40
personal, without
Administrator privileges.................... 40
requirements .......................................... 21
scenarios ........................................... 4047
setup type ............................................. 145
setup types.............................................. 23
shared ..................................................... 46
silent ....................................................... 43
third party add-ons ................................ 22
troubleshooting.................................... 253
user directory ......................................... 24

Index

installation files
dynamic-link library (.dll) ...............15, 17
package file (.msi) .................................. 17
package file (.msi) defined ..................... 15
transform (.mst)..................................... 15
transform (.mst) files ............................. 19
installation modes, overview ......................... 15
installing a shortcut
Xsession................................................ 102
Xstart ...................................................... 75
installing Jconfig .......................................... 177
client software ...................................... 177
Daemon................................................ 177
installing Jconfig on
administration host.............................. 177
client ..................................................... 177
remote hosts ......................................... 177
installing on Terminal Server
creating administrative
copy image ................................... 5355
personal installation ......................... 5558
interacting with Hummingbird users ........... 10

Jconfig services
configuring ...................................175177
Daemon Settings ..................................176
Editor ....................................................175
Environment Settings...........................175
Exceed configuration............................176
File.........................................................175
Font Database .......................................176
HostExplorer settings ...........................176
.ini file ...................................................176
Install ....................................................176
Java property.........................................176
Message.................................................175
NFS Maestro Client ..............................176
NFS Maestro Gateway ..........................177
Registry .................................................176
System Information..............................175
Xstart.....................................................177
joining Hummingbird
mailing lists.............................................10
User Group .............................................11

K
J
Java browser
Jconfig configuration for...................... 178
Java property service, Jconfig ...................... 176
Java Runtime Environment (JRE), Sun ........ 22
Jconfig .......................................................... 266
administration host.............................. 175
Client .................................................... 174
configuring Daemon settings............... 181
configuring Java browser for................ 178
configuring remote hosts ..................... 174
host ....................................................... 175
installing ............................................... 177
installing software ................................ 177
introduction ......................................... 174
locking configuration session .............. 185
opening Help........................................ 183
running from browser.......................... 178

K Desktop Environment................................79
KDE. See K Desktop Environment
keyboard
customizing ..........................................108
Keyboard Input application, Xconfig ..........108
Keyboard shortcuts ..........................................7
keylogin
failure ....................................................234
running .................................................243
using a user profile ...............................234
using the system profile ........................234

L
Launch Pad...................................................263
launching personal installation
as Administrator .....................................41
without Administrator privileges ...........40

275

Exceed Users Guide

LDAP
authentication.......................................235
bind options..........................................235
definition ..............................................222
entries....................................................223
objects ...................................................223
posixAccount class................................223
query order ...........................................239
server architecture ................................224
specifying an LDAP domain.................238
specifying user credentials ....................239
version 2 vs. version 3...........................235
Lightweight Directory
Access Protocol (LDAP) ...............222
Line Printer Query .......................................265
Line Printer Requester .................................265
Linux
desktop environments ............................79
GNOME .................................................79
KDE ........................................................79
load optmization ............................................71
loading
resource databases ..................................81
locale name
specifying ..............................................137
locking configuration session ......................185
log files..........................................................258
analysing ...............................................258
logging administrative information.............183
logging in to CDE ..........................................79
Logging tab...................................................181
login macros in Xstart....................................95
command................................................95
user ID and password .............................95
login, special for Xstart ..................................96
LPQ. See Line Printer Query.
LPR. See Line Printer Requester.

M
Macro and Profile Converter .......................265

276

mailing lists, Hummingbird....................10, 11


joining .................................................... 10
searching archives .................................. 11
subscribing ............................................. 10
making a connection
guided..................................................... 63
managing remote hosts ............................... 174
manuals............................................................ 8
master servers .............................................. 224
Master Setup ............................... 22, 27, 38, 46
Message service, Jconfig .............................. 175
Microsoft System
Management Server (SMS) ............ 44
Microsoft Transform File. See .mst files
Microsoft Windows accessibility options ....... 8
Microsoft Windows manager, overview ....... 85
middle button emulation ............................ 110
modifying..................................................... 148
features ................................................. 151
files ....................................................... 153
font directories ..................................... 167
font servers ........................................... 170
properties ............................................. 156
registry keys.......................................... 159
monitoring connections.............................. 259
Mouse Input application, Xconfig .............. 110
mouse wheel
Macro Selector ..................................... 112
mapping to a macro ............................. 111
New Macro Properties ......................... 112
options.................................................. 110
mouse, adding 3-button function ............... 110
Msetup.exe......................35, 36, 40, 41, 43, 46
personal installation............................... 27
.msi files
about..................................................... 146
using Sconfig ........................................ 146
Msiexec.exe........................................15, 16, 44
command line options ......................... 255
syntax...................................................... 19

Index

.mst files
about..................................................... 146
saving.................................................... 172
using Sconfig ........................................ 146
Windows Installer ................................ 146
mst files
applying ................................................ 172
multi-language support ................................. 19
options.................................................... 20
multiple hosts
configuring using scripts...................... 184
multiple window mode ................................. 81
multiple X displays ...................................... 124
multiple Xstart sessions per host................... 98
MWM. See Microsoft Windows manager

O
opening
configuration session............................179
Jconfig Help..........................................183
.msi files ................................................147
.mst files ................................................147
Sconfig ..................................................147
Wstart .....................................................78
Xstart.......................................................65
opening directory services applications.......221
optimizing load ..............................................71
overview
installation modes ..................................15
installing on Terminal Server .................53
setup types ..............................................23
Windows Installer...................................15

N
Network Information System (NIS) ........... 222
Network Time.............................................. 263
NFS Maestro Gateway service, Jconfig........ 177
NFS Maestro
Client Configuration, Jconfig....... 176
NFS properties, setting with Sconfig
adding, modifying,
or removing .............................148, 163
nfs register command .................................. 234
NIS
bind options ......................................... 229
definition.............................................. 222
objects................................................... 223
query order........................................... 229
server types ........................................... 224
specifying an NIS domain.................... 230
NIS+
bind options ......................................... 230
definition.............................................. 222
objects................................................... 223
query order........................................... 233
server types ........................................... 224
specifying an NIS+ domain ................. 232
NIS+ Login dialog box ................................ 234
NSLookup.................................................... 263

P
package file .....................................................15
about customizing ....................... 146, 147
parameters
Exceed X server.....................................124
Wstart .....................................................78
Xstart.......................................................77
passive mode, overview................................113
password
changing default ...................................180
password cache
creating ...................................................96
deleting ...................................................97
password, changing in Xconfig....................115
pasting data ....................................................88
patching Hummingbird products ...............267
PC, remote configuration of ........................174
Performance application, Xconfig...............128
personal installations, overview .....................40
Ping ..................................................... 225, 264
policy file
syntax ....................................................117
posting to Hummingbird User Group ..........11
Power Management application, Xconfig ...127
preserving user profiles ..................................48
PrintExplorer ...............................................265

277

Exceed Users Guide

product features
defined ....................................................18
feature tree, viewing................................33
products
defined ....................................................17
supported languages ...............................20
Program group
installing an Xsession shortcut .............102
installing an Xstart shortcut ...................75
program maintenance....................................35
modifying install state.............................35
removing.................................................36
repairing..................................................36
progress messages, analysing .......................256
properties, setting with Sconfig .......... 148, 155
adding ...................................................155
modifying..............................................156
removing...............................................157
Protocol application, Xconfig ......................119
protocol extensions, enabling ......................120

Q
query order
LDAP ....................................................239
NIS ........................................................229
NIS+......................................................233
random .................................................234
querying directory services ..........................245

R
recording scripts...........................................184
registering the product...................................50
registry keys, setting with Sconfig ....... 148, 158
adding ...................................................158
modifying..............................................159
removing...............................................160
Registry service, Jconfig ...............................176
release notes .....................................................9
remote
configuration information ...................174

278

remote host
configuring services.............................. 183
installing Jconfig on ............................. 177
opening connection ............................. 179
remote hosts
configuring multiple using scripts ....... 184
remote PC
using Exceed......................................... 103
Remote Tools............................................... 264
remote window managers, starting ............... 85
removing...................................................... 148
features ................................................. 151
files ....................................................... 154
font directories ..................................... 168
font files................................................ 168
font servers ........................................... 171
registry keys.......................................... 160
replica servers .............................................. 224
requirements for installation......................... 21
resource databases
loading.................................................... 81
resources, Hummingbird information .....8, 11
documentation......................................... 8
mailing lists ......................................10, 11
Technical Support.................................... 9
restricting configuration session ................. 185
restricting host access .................................. 116
root window
setting size ........................................82, 83
running
an Xsession file ..................................... 101
an Xstart file ........................................... 76
multiple Exceed X servers .................... 124
multiple files in an Xsession................. 101
multiple Xstart sessions per host ........... 98
Xstart files from command line ............. 76

S
saving
a password .............................................. 96
an .mst file ............................................ 172
saving query results...................................... 247

Index

Sconfig ......................................................... 266


customizations with ............................. 145
introduction ......................................... 174
Sconfig, customizations with....................... 148
Screen Definition application, Xconfig....... 122
Screen Definition, Xconfig .......................... 122
screens
configuring ........................................... 122
configuring four ................................... 122
deleting ................................................. 123
disabling ............................................... 123
scripts
configuring multiple hosts using ......... 184
recording .............................................. 184
scroll bars
displaying ............................................... 84
searching mailing list archives....................... 11
Secure RPC
authentication ...................................... 222
password............................................... 234
Secure Socket Layer (SSL) ........................... 235
security
changing the Xconfig password ........... 115
controlling host access ......................... 116
extension password .............................. 119
files........................................................ 117
policy file .............................................. 117
settings.................................................. 114
Xweb..................................................... 117
Security application, Xconfig ...................... 114
selecting ......................................................... 82
fonts...................................................... 130
start method ........................................... 65
X selection type .................................... 126
Seltest
copying images to Clipboard ................. 90
example, building................................... 89
pasting images from Clipboard ............. 90
servers
LDAP.................................................... 224
master ................................................... 224
replica ................................................... 224
slave ...................................................... 224

Services tab ...................................................181


services, Jconfig
configuring ...................................175177
Daemon Settings for.............................176
Editor ....................................................175
Environmental Settings ........................175
Exceed configuration............................176
File.........................................................175
Font Database .......................................176
HostExplorer settings ...........................176
.ini file ...................................................176
Install ....................................................176
Java property.........................................176
Message.................................................175
NFS Maestro Client ..............................176
NFS Maestro Gateway ..........................177
Registry .................................................176
System Information..............................175
Xstart.....................................................177
session, opening configuration....................179
setting
a window manager..................................82
focus policy .............................................83
font paths ..............................................172
mouse options ......................................110
root window size.............................. 82, 83
security for Xconfig ..............................114
startup mode.........................................113
the display .............................................123
window position .....................................83
setting the window mode
generic options .......................................81
multiple specific options ........................82
single specific options.............................83
settings
configuring Jconfig application............180
configuring Jconfig Daemon................181
setup types
overview..................................................23
choosing..................................................23
Complete ................................................34
Custom ...................................................33
Typical ....................................................30

279

Exceed Users Guide

Setup Wizard
administration mode ..............................46
advertisement mode ...............................43
overview of modes ..................................15
Shared Image, administrative
installation.......................................37
shared installation ..........................................46
shortcuts
installing, Xsession ...............................102
installing, Xstart......................................75
Keyboard...................................................7
setting with Sconfig ..................... 148, 161
silent installation ............................................43
single window mode ......................................80
slave servers ..................................................224
SMS, Microsoft System
Management Server ........................44
SOCKS Information ....................................267
software installation of Jconfig
client......................................................177
Daemon ................................................177
software installation on Jconfig
administration host ..............................177
client......................................................177
hosts ......................................................177
sorting query results.....................................246
specifying
a vendor string ......................................120
locale name ...........................................137
SSL. See Secure Socket Layer
standby function ..........................................127
starting
a host session ..........................................63
a window manager..................................85
an xterm..................................................67
CDE ........................................................79
remote window managers ......................85
startup commands, window managers..........86
startup file
creating for Xstart ...................................64
Wstart (settings.ws) ................................78
Xstart (settings.xs) ..................................77

280

startup mode, selecting................................ 113


storage buffer, temporary .............................. 87
subscribing
Hummingbird Expose Online ............... 10
Hummingbird mailing lists ................... 10
system administration tools ........................ 266
Hummingbird Inetd ............................ 266
Jconfig .................................................. 266
Sconfig.................................................. 266
SOCKS Information ............................ 267
Update Hummingbird......................... 267
system display, setting ................................. 123
System Information service, Jconfig ........... 175
system loads, balancing ................................. 97

T
tabs
General ................................................. 181
Logging................................................. 181
Services ................................................. 181
Tar................................................................ 264
TCP/IP transports, using............................. 141
Technical Support ........................................... 9
Telnet ........................................................... 265
Telnetd......................................................... 211
temporary storage buffer ............................... 87
terminal emulator, selecting.......................... 66
Terminal Server
installing the
Hummingbird product ..................... 53
uninstalling the
Hummingbird product ..................... 58
TN3270 ........................................................ 264
TN5250 ........................................................ 264
tools, system administration ....................... 266
Hummingbird Inetd ............................ 266
Jconfig .................................................. 266
Sconfig.................................................. 266
SOCKS Information ............................ 267
Update Hummingbird......................... 267
trace files ...................................................... 258
Traceroute.................................................... 264

Index

transform files
about..................................................... 146
applying ........................................146, 172
creating.................................146, 147, 173
transform files (.mst),
Setup Wizard .................................. 15
transform files, language ............................... 19
Transport Monitor
overview ................................................... 6
using ..................................................... 259
Transports application, Xconfig.................. 121
Troubleshooting
Finger ................................................... 263
NSLookup ............................................ 263
Ping....................................................... 264
Traceroute ............................................ 264
Whois ................................................... 264
troubleshooting
Exceed diagnostics ............................... 256
installation............................................ 253
log and trace ......................................... 258
log file, (Troubleshooting)................... 258
logs and trace operations ..................... 258
progress messages ........................ 256257
Transport Monitor............................... 259
Xstart .................................................... 256
troubleshooting connections
checking log status information .......... 183
tuning the system......................................... 130

U
uninstalling from Terminal Server................ 58
UNIX
/etc files................................................. 223
changing a password ............................ 249
synchronizing UNIX and
Windows passwords ........................ 242
Update Hummingbird ................................ 267
updating the product.............................49, 267
user directory, installation............................. 24
user files
for connectivity products....................... 25
per-machine and per-user ..................... 25

User Group, Hummingbird


joining.....................................................11
posting message to..................................11
user profiles, preserving .................................48

V
vendor string, specifying ..............................120
Video application, Xconfig ..........................123
viewing
font database.........................................131
log files ..................................................258
off-screen client windows.......................81
scroll bars................................................84
X window manager menus.....................83
viewing directory service objects..................247
VMS systems
DECnet transports................................141
TCP/IP transports ................................141
Xstart and Wstart .................................141
VMS, using Xstart ........................................141

W
WebUpdate ....................................................49
Whois ...........................................................264
window managers ..........................................82
HWM......................................................85
Microsoft Windows................................85
Native, X, Default types..........................85
overview..................................................84
Remote X ................................................85
starting HWM or MWM........................85
starting remote managers .......................85
startup commands..................................86
window modes
overview..................................................80
configuring generic.................................81
configuring multiple...............................82
configuring single ...................................83
multiple...................................................81
options ..............................................8184
single .......................................................80

281

Exceed Users Guide

Windows Installer
benefits....................................................16
installation and configuration ................21
overview ..................................................15
What is it? ...............................................15
Windows Installer Database file.
See .msi files
workstation installations................................37
Wstart
creating a startup file ..............................65
creating a Wstart file...............................78
parameters ..............................................78
running multiple sessions.......................99
start method............................................65
using on VMS systems..........................141
WyseTerm ....................................................265

X
X client
copying and pasting data........................91
X screens, modifying....................................122
X Selection application, Xconfig..................126
X selection type, setting................................126
X web............................................................103
X Windows systems, overview.........................4
xauth, creating..............................................117

282

Xconfig......................................................... 107
overview ...........................................5, 107
changing the password......................... 115
controlling host access ......................... 116
creating a security file........................... 117
setting security...................................... 114
Xconfig applications
CJK Input ............................................. 136
Communication................................... 113
Font ...................................................... 130
Keyboard Input .................................... 108
Mouse Input......................................... 110
Performance......................................... 128
Power Management ............................. 127
Protocol................................................ 119
Screen Definition ................................. 122
Security................................................. 114
Transports ............................................ 121
Video .................................................... 123
X Selection............................................ 126
Xdis .............................................................. 259
XDM mode, overview ................................. 114
XDMCP modes, overview........................... 113
Xperf ............................................................ 130
Xsession
overview .............................................5, 99
file sequence ......................................... 102
installing a shortcut.............................. 102
running multiple sessions ...................... 99
running the file..................................... 101
Xdis
overview ................................................... 6

Index

Xstart
overview ................................................... 5
about the Xstart window........................ 65
browsing for hosts.................................. 68
command macros .................................. 95
creating a startup file........................64, 65
deleting a password cache ...................... 97
installing a shortcut................................ 75
login macros........................................... 95
opening................................................... 65
optimizing system loads......................... 97
parameters.............................................. 77
program type.......................................... 66
prompt ................................................... 67
running a file .......................................... 76
running multiple sessions ...................... 99
running multiple sessions per host ........ 98
start method ........................................... 65
universal login ........................................ 96
using on VMS....................................... 141
using on VMS systems ......................... 141

Xstart service, Jconfig...................................177


Xstartd ..........................................................212
Xweb
installation ............................................104
security..................................................117
setup......................................................104

Y
ypwhich command ......................................225

283

Notes

Notes

Notes

Notes

Notes

You might also like