In the X Window System, programs run as X clients, and as such they connect to the X display server, possibly via a computer network. Since the network may be accessible to other users, a method for forbidding access to programs run by users different from the one who is logged in is necessary.
There are five standard access control mechanisms that control whether a client application can connect to an X display server. They can be grouped in three categories:
Additionally, like every other network connection, tunnelling can be used.
The host-based access method consists in specifying a set of hosts that are authorized to connect to the X display server. This system has inferior security, as it allows every user who has access to such a host to connect to the display. The xhost
program and three X Window System core protocol requests are used to activate this mechanism and to display and change the list of authorized hosts. Improper use of xhost
can inadvertently give every host on the Internet full access to an X display server.
I will die
So will you
When we go
I will choose
Now it's time
To make you pay
End it all
In just one day
Hold out your wrists for me
It is your fantasy
Bleed out your pains
From your wounded veins
I was born
So were you
Through the womb
To the tomb
Now it's time
To make you pay
End it all
In just one day
Hold out your wrists for me
It is your fantasy
Bleed out your pains
From your wounded veins
No one gets past me today
Their is no other way
No one gets past me today
Make a line to be saved
Now maybe you'll see
Connection to death is me
Now maybe you'll see
Connection to death is me
Hold out your wrists for me
It is your fantasy
Bleed out your pains