LinuxSir.cn,穿越时空的Linuxsir!

 找回密码
 注册
搜索
热搜: shell linux mysql
查看: 816|回复: 5

到底是我的哪里配置错了阿,还是怎么了,大家帮帮我阿?

[复制链接]
发表于 2010-6-21 20:15:29 | 显示全部楼层 |阅读模式
装完scrot就这样:
[root@minilab laborc]# scrot
No protocol specified
No protocol specified
giblib error: Can't open X display. It *is* running, yeah?
[root@minilab laborc]#

还有按那个PrintScreen键,就出来一个错误的窗口:
Metacity:
There was an error running gnome-screenshot:

Failed to execute child process "gnome-screenshot" (No such file or directory)

还有:
[root@minilab laborc]# emacs &
[1] 1740
[root@minilab laborc]# No protocol specified
No protocol specified
Display :0.0 unavailable, simulating -nw
^C

[1]+  Stopped                 emacs
[root@minilab laborc]#
大家帮我看我这是怎么了?是哪里配置不好,还是什么?我牛鳖阿!
发表于 2010-6-22 16:17:02 | 显示全部楼层
还有按那个PrintScreen键,就出来一个错误的窗口:
Metacity:
There was an error running gnome-screenshot:

Failed to execute child process "gnome-screenshot" (No such file or directory)
这个是因为你没有安装gnome-utils吧。
其他的是因为已经有个X进程再运行了。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2010-6-22 17:22:28 | 显示全部楼层
谢谢,再学习学习。
回复 支持 反对

使用道具 举报

 楼主| 发表于 2010-7-12 07:52:46 | 显示全部楼层
Post by ganloo;2098052
这个是因为你没有安装gnome-utils吧。
其他的是因为已经有个X进程再运行了。

正解.................................
回复 支持 反对

使用道具 举报

 楼主| 发表于 2010-7-29 11:38:44 | 显示全部楼层
$ xhost +    //就解决了

The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environment, although it does limit the worst abuses. Environments which require more sophisticated measures should implement the user-based mechanism or use the hooks in the protocol for passing other authentication data to the server.
回复 支持 反对

使用道具 举报

发表于 2010-7-29 16:54:22 | 显示全部楼层
Post by tjdbaa;2105818
$ xhost +    //就解决了

The xhost program is used to add and delete host names or user names to the list allowed to make connections to the X server. In the case of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environment, although it does limit the worst abuses. Environments which require more sophisticated measures should implement the user-based mechanism or use the hooks in the protocol for passing other authentication data to the server.
My faint.
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

快速回复 返回顶部 返回列表