kdesu - Runs a program with elevated privileges
kdesu [-c command] [-d] [-f file] [-i icon name] [-n] [-p priority] [-r] [-s] [-t] [-u user] [--noignorebutton] [--attach winid] kdesu [KDE Generic Options] [Qt Generic Options]
KDE su is a graphical front end for the UNIX su command for the K Desktop Environment. It allows you to run a program as different user by supplying the password for that user. KDE su is an unprivileged program; it uses the system's su. KDE su has one additional feature: it can optionally remember passwords for you. If you are using this feature, you only need to enter the password once for each command. This program is meant to be started from the command line or from .desktop files. Since kdesu is no longer installed in $(kde4-config --prefix)/bin but in kde4-config --path libexec and therefore not in your Path, you have to use $(kde4-config --path libexec)kdesu to launch kdesu.
-c command This specifies the command to run as root. It has to be passed in one argument. So if, for example, you want to start a new file manager, you would enter at the prompt: $(kde4-config --path libexec)kdesu -c Dolphin -d Show debug information. -f file This option allow efficient use of KDE su in .desktop files. It tells KDE su to examine the file specified by file. If this file is writable by the current user, KDE su will execute the command as the current user. If it is not writable, the command is executed as user user (defaults to root). file is evaluated like this: if file starts with a /, it is taken as an absolute filename. Otherwise, it is taken as the name of a global KDE configuration file. -i icon name Specify icon to use in the password dialog. You may specify just the name, without any extension. -n Do not keep the password. This disables the keep password checkbox in the password dialog. -p priority Set priority value. The priority is an arbitrary number between 0 and 100, where 100 means highest priority, and 0 means lowest. The default is 50. -r Use realtime scheduling. -s Stop the kdesu daemon. This is the daemon that caches successful passwords in the background. This feature may also be disabled with -n when KDE su is initially run. -t Enable terminal output. This disables password keeping. This is largely for debugging purposes; if you want to run a console mode app, use the standard su instead. -u user While the most common use for KDE su is to run a command as the superuser, you can supply any user name and the appropriate password. --noignorebutton Do not display an ignore button. --attach winid Makes the dialog transient for an X app specified by winid.
su(1) More detailed user documentation is available from help:/kdesu (either enter this URL into Konqueror, or run khelpcenter help:/kdesu).
Run kfmclient as user jim, and show the Konqueror icon in the password dialog: $(kde4-config --path libexec)kdesu -u jim -i konqueror kfmclient
KDE su was written by Geert Jansen <email@example.com> and Pietro Iglio <firstname.lastname@example.org>.
Lauri Watts <email@example.com> Author.
More Linux Commands
start-pulseaudio-x11(1) - PulseAudio Sound Server X11 Startu
This script starts pulseaudio (if not already running) and loads modules to publish access credentials to the PulseAudio server in the X11 root window and to sy
grub2-mkfont(1) make GRUB font files - Linux manual page....
Convert common font file formats into PF2 -a, --force-autohint force autohint -b, --bold convert to bold font -c, --asce=NUM set font ascent -d, --desc=NUM set
ypmatch(1) - print the values of one or more keys from a NIS
ypmatch prints the values of one or more keys from the NIS database specified by mapname, which may be a map name or a map nickname. OPTIONS -d domain Specify a
systemd-inhibit(1) Execute a program with an inhibition lock
systemd-inhibit may be used to execute a program with a shutdown, sleep or idle inhibitor lock taken. The lock will be acquired before the specified command lin
addchstr(3ncurses) - add a string of characters (and attribu
These functions copy the (null-terminated) chstr array into the window image structure starting at the current cursor position. The four functions with n as the
Tk_Draw3DRectangle(3) - draw borders with three-dimensional
These procedures provide facilities for drawing window borders in a way that produces a three-dimensional appearance. Tk_Alloc3DBorderFromObj allocates colors a
crypt_rn(3) - password hashing (Library - Linux man page)...
The crypt, crypt_r, crypt_rn, and crypt_ra functions calculate a cryptographic hash function of key with one of a number of supported methods as requested with
ifsysctl(5) - (unknown subject) (Formats - Linux man page)
These files are intended to contain sysctl settings, that should be applied when a network interface is created. This are usually interface specific settings, l
neomagic(4) - Neomagic video driver - Linux manual page.....
neomagic is an Xorg driver for the Neomagic graphics chipsets found in many laptop computers. SUPPORTED HARDWARE neomagic supports the following chipsets: Magic
lvmchange(8) - change attributes of the logical volume manag
lvmchange is not currently supported under LVM2, although dmsetup(8) has a remove_all command. SEE ALSO dmsetup(8) lvmchange.8 (Administration - Linux manual p
XcmsCreateCCC(3) - creating and destroying CCCs (Man Page)
The XcmsCreateCCC function creates a CCC for the specified display, screen, and visual. The XcmsFreeCCC function frees the memory used for the specified CCC. No
sgetspent(3) - get shadow password file entry (Man Page)....
Long ago it was considered safe to have encrypted passwords openly visible in the password file. When computers got faster and people got more security-consciou