> Sources are available under [.SRC] directory in XHOST.ZIP file  : The FREEWARE_DEMO.COM procedure only defines Xhost symbol.  	   OPTIONS   J     Xhost accepts the following command line options described below.  ForM     security, the options that effect access control may only be run from the J     "controlling host".  For workstations, this is the same machine as the3     server.  For X terminals, it is the login host.   
         -help      Prints a usage message.           "[+]" "name" .     The given name (the plus sign is optional)<     is added to the list allowed to connect to the X server./     The name can be a host name or a user name.            - "name"6     The given name is removed from the list of allowedJ     to connect to the server.  The name can be a host name or a user name.0     Existing connections are not broken, but new'     connection attempts will be denied. L     Note that the current machine is allowed to be removed; however, furtherJ     connections (including attempts to add it back) will not be permitted.;     Resetting the server (thereby breaking all connections) 5     is the only way to allow local connections again.   	         + B     Access is granted to everyone, even if they aren't on the list)     (i.e., access control is turned off).   	         - 2     Access is restricted to only those on the list(     (i.e., access control is turned on).           nothing +     If no command line arguments are given, K     a message indicating whether or not access control is currently enabled A     is printed, followed by the list of those allowed to connect. E     This is the only option that may be used from machines other than      the controlling host.     Patrick Moreau   pmoreau@cena.dgac.fr moreau_P@decus.decus.fr 