Running Applications from Drop Zones on the Front Panel
Certain controls on the Front Panel—such as the Printer, Mailer and Web Browser controls—act as drop zones that activate the relevant application when you drag and drop appropriate text or files on them. For example, if you drop a file on the Mailer control, Mailer displays a New Message window with the file attached to the new message.
You can perform desktop tasks using your keyboard instead of your mouse.
When you use your keyboard for desktop navigation, note the following:
The Alt key is the same as the Extend char key on some keyboards
Return is the same as Enter on some keyboards
Pressing Esc halts most interactive operations
In Style Manager, the Window Behavior setting must be Click In Window To Make Active (this is the default value)
Keyboard focus uses the highlight to show you which element of a window, menu, or control will respond to your input. To activate a selected menu item or control (such as a button), press the Spacebar.
A desktop session occurs between the time you log in and the time you log out. The login screen, displayed by the Login Manager, is your gateway to the desktop. It provides a place for you to type your login name and password. The Options menu on the login screen lists your login options. In addition to running a desktop session, you can run a failsafe session. You can also select the language for your session.
Command Line Login mode enables you to temporarily leave the desktop to work in your operating system environment. Command Line Login mode is not a desktop session. When your system is in Command Line Login mode, the desktop is suspended. You log in using your operating system mechanism rather than Login
Manager. There are no windows because the X server is not running.
Ordinarily, the desktop saves session information when you log out and uses that information to start your next session. If you start or stop applications during your session, or use Style Manager to change the appearance and behavior of your system, changes you make are reflected in your next session. This type of session is called a current session .
The desktop also provides a home session . A home session is a session that you explicitly save. It’s like taking a snapshot of your current session at some point in time.
Once you’ve saved a home session, you can specify that logging in always restores that session instead of the current session.
The Front Panel is your “dashboard” or control area for the CDE desktop. It gives you point-and-click and drag-and-drop access to the majority of applications on your system; it allows you to switch workspaces; and it displays information such as time and date, printer status, and so on.
You can customize your Front Panel to include
your favorite applications, and you can move or minimize the Front Panel.
A link icon is a copy of an icon that points to the same file or folder as the original icon. Any changes you make after opening the link icon will also appear when you access the file or folder using the original icon.
The traditional UNIX file and folder protection scheme provides read , write , and execute permissions for three user types: owner , group , and other . These are called basic permissions .
Access Control Lists (ACLs) provide greater control over file and folder permissions than do basic permissions. ACLs enable you to define file or folder permissions for the owner, owner’s group, others, and specific users and groups, and default permissions for each of these categories.
Owner – The user who owns the file or folder. Only a system administrator (root user) can change the owner of a file or folder.
Group – Users who have been grouped together by the system administrator. For example, the members of a department might belong to the same group. This group is the owning group and usually includes the file or folder’s owner.
Other – All other users on the system besides the owner and owning group.
ACLs enable you to define file or folder permissions for the owner, owner’s group, others, and specific users and groups, and default permissions for each of these categories.
You can set up only one ACL per file or folder. An ACL consists of ACL entries . Each entry has a user type associated with it, much as basic permissions have Owner, Group, or Other associated with them.
ACL-enabled files and folders have a mask defined whose default permissions are the group permissions for the file or folder. The mask is the maximum allowable permissions granted to any user on all ACL entries and for Group basic permissions.
It does not restrict Owner or Other basic permissions. For example, if a file’s mask is read-only, then you cannot create an ACL with write or execute permission for a user without changing the mask value.
Hidden files and folders are those whose file types are selected in the filter list .
The criterion for hiding or showing a file or folder is based on its data type. Use the Set Filter Options command to change which data types are shown and hidden. The default hidden data types are DOT_FILE, DOT_FOLDER, and CURRENT_FOLDER.
The desktop provides a tool that helps you create icons for running scripts, applications, and other commands. You may want to use this tool if you have a personal application your system administrator has not configured for you.
UNIX® key bindings enable you to use a set of extended Emacs keys, such as Alt+B (back word) or Control+N (next line), in Text Editor. To enable UNIX key bindings (which are set off by default) you edit a file in your home directory.
Add the following line to the .Xdefaults file in your home directory:
UNIX works with processes. Your login shell, application programs, the edit session you run, and even the ls program that lists your files are all processes under control of the operating environment.
In UNIX you can perform operations on these processes. For example, you can look at all the programs you’re running at any time, stop and restart programs as you choose, and investigate and debug errant processes.
An errant process is a process that is not doing the job you expect it to do.
For example, a process might be consuming a large percentage of your available resources due to a bug, or it might be interfering with another process. Use Process Manager to detect errant processes when you experience the following:
Workstation performance or response seems to have slowed.
A program will not respond to user input.
A standard service such as printing, file transfer or remote login does not respond.
When displaying all processes, Process Manager typically displays thirty to fifty
processes, so finding the errant processes can be daunting to the untrained eye.
Use Process Manager to identify:
Processes using a large percentage of the available CPU or RAM when they
shouldn’t Orphaned processes whose parent process has reverted to 1, that is init (but
not processes such as sched, dtlogin , or cron whose parent process ID should be 1)
Processes that were started a long time ago and weren’t terminated when they should have been Large processes owned by another user that are degrading performance
The kill command in UNIX enables the user to send a signal to a process. A signal is a message sent to a process to interrupt it and cause a response. If the process has been designed to respond to signals of the type sent it does so; otherwise, it terminates.
Application developers and system administrators sometimes use a debugging application such as Sun Workshop to investigate an errant process. The Debug item on the Process menu invokes your preferred debugger on the selected process.
The equivalent UNIX command is:
workshop -d command
where workshop is the name of the debugger program and command is the command needed to pass the process ID to the debugger.
Use the Hotkey Editor to create, modify, or delete CDE hotkeys. Hotkey is a general term used to show the association between a specific key and a specified event (target event). For example, choosing Alt+Left will move the workspace to the left. The target event could be a CDE action, an application, a document, a workspace management
function, or a multiple monitor management function.