X Window Authorization
In the X Window System, programs connect to the X server, possibly via a computer network. Since the network may be accessible to other users, a method for forbidding access to programs run by users different from the one who is logged in is necessary.
There are five standard access control mechanisms that control whether a client application can connect to an X server. They can be grouped in three categories:
- access based on host
- access based on cookie
- access based on user
Additionally, like every other network connection, tunnelling can be used.
Read more about X Window Authorization: Host-based Access, Cookie-based Access, User-based Access, Tunneling
Famous quotes containing the word window:
“Loach: What happened to your nose, Gittes? Somebody slam a bedroom window on it?
J.J. Gittes: Nope, your wife got excited. She crossed her legs a little too quick.”
—Robert Towne (b. 1936)