õàõà íÿìà äà å çëå :D Àêî ãîâîðèø çà vnc-òî â ìîìåíòà ñå îïèòâàì äî ãî ïóñíà, íî íåùî ãúðìè è íå ìîãà äà ñòèãíà äî ñàìèÿ virtualbox, ÷å äà ãî ðåñíà.<div><br></div><div><div>** If NO ONE is logged into an X session yet, but there is a greeter login</div>
<div> program like "gdm", "kdm", "xdm", or "dtlogin" running, you will need</div><div> to find and use the raw display manager MIT-MAGIC-COOKIE file.</div><div> Some examples for various display managers:</div>
<div><br></div><div> gdm: -auth /var/gdm/:0.Xauth</div><div> -auth /var/lib/gdm/:0.Xauth</div><div> kdm: -auth /var/lib/kdm/A:0-crWk72</div><div> -auth /var/run/xauth/A:0-crWk72</div>
<div> xdm: -auth /var/lib/xdm/authdir/authfiles/A:0-XQvaJk</div><div> dtlogin: -auth /var/dt/A:0-UgaaXa</div><div><br></div><div> Sometimes the command "ps wwwwaux | grep auth" can reveal the file location.</div>
<div><br></div><div> Starting with x11vnc 0.9.9 you can have it try to guess by using:</div><div><br></div><div> -auth guess</div><div><br></div><div> (see also the x11vnc -findauth option.)</div><div><br>
</div><div> Only root will have read permission for the file, and so x11vnc must be run</div><div> as root (or copy it). The random characters in the filenames will of course</div><div> change and the directory the cookie file resides in is system depen</div>
</div>