Using Linux on Windows with Cygwin
Cygwin also lets you set up a remote desktop session through a secure SSH tunnel. First type
X & at the Cygwin console to open a local X server. (The
& sends the service into the background and ensures that you can continue using the console.) This command calls the X binary directly. The X server starts in a large window, with no terminal for setting up an SSH session. This approach helps you avoid closing the wrong window in the desktop environment and thus terminating all open applications. After opening the X window, go back to the Cygwin window and run the following command to launch a KDE desktop environment remotely:
DISPLAY=:0.0; ssh -Y -f \ <IP-of-Linux-PC>; startkde
DISPLAY, you need to run an SSH call that again releases the console after executing a command on the remote host (
-f option). The
-Y parameter initiates X forwarding in trusted mode, so the window manager can use the X instance remotely.
For Xfce, replace
startxfce4; and for LXDE, use
startlxde. Gnome 3 proved problematic in our lab with the
gnome-session startup command: The desktop environment failed because of the lack of 3D support. A general method to enforce fallback mode over the network does not seem to exist.
Another option is to install a ported desktop environment (or at least a window manager) locally in the Cygwin environment. The desktop offers the look and feel of Linux – for remote applications, but also for locally installed ports. The standard Cygwin repository lets you install Windowmaker and the FWM and Twm window managers. Gnome, KDE, LXDE, Mate, ROX, Xfce, and the Sugar desktop environment are all available as Cygwin ports .
I tried to install KDE, and the
libqt4 dependency turned up missing. Although
libqt4 is available in the normal repositories, it is not provided in the Cygwin Ports version. To resolve the problem, I needed to restart the installer and integrate the appropriate package. After this step, I managed to launch a KDE desktop in the Cygwin environment (Figure 5), but only after a relatively long startup time.
The Gnome shell was not available on the server, so I was unable to launch the Gnome desktop. The spartan Windowmaker environment (Figure 6) worked out of the box, however. The download volume is fairly small, and Windowmaker is included in the standard Cygwin repository.
startx startup script is also used in the Cygwin environment to launch X plus a display manager. The following command opens a KDE session:
$ startx /usr/bin/startkde -- \ -nodecoration
The start scripts for the other desktop environments are the same as for the remote calls. Before you launch any other programs, you need to set DISPLAY manually. The "Starting the Cygwin X Server" box gives more details. The Cygwin Installer also offers a graphical user interface named XLaunch, which removes the need for users to enter the command lines described in the box to users (Figure 7).
Starting the Cygwin X Server
startxwin in the Cygwin console or selecting the menu item created by the installer starts the X server in multiwindow mode (one window per application with Windows window dressing).
Without parameters, the tool – which replaces the
startxwin.bat scripts of earlier versions of Cygwin – opens an Xterm window with the
DISPLAY variable set. You can log in directly by typing
ssh -X <IP-of-Linux-PC>
and starting graphical programs remotely. The command-line parameters for
startxwin and its configuration file
~/.startxwinrc are explained in the tool's man page .
XWin.exe or X
A call to
X only starts the X server; you launch programs that access the server at the Cygwin console after setting the
DISPLAY=:0.0 shell variable. The Cygwin X server parameters differ in part from those of the Linux version and are described in the man page .
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm