From mboxrd@z Thu Jan 1 00:00:00 1970 Message-ID: To: 9fans@cse.psu.edu From: "Russ Cox" MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit Subject: [9fans] old trick, new os Date: Sun, 9 Mar 2003 13:18:57 -0500 Topicbox-Message-UUID: 7d888d34-eacb-11e9-9e20-41e7f4b1d025 this is basically what rob posted in november, except that it works with windows instead of vnc. # urls to internet explorer on another machine type is text data matches '(https?|ftp|file|gopher|mailto|news|nntp|telnet|wais|prospero)://[a-zA-Z0-9_@\-]+([.:][a-zA-Z0-9_@\-]+)*/?[a-zA-Z0-9_?,%#~&/\-+=]+([:.][a-zA-Z0-9_?,%#~&/\-+=]+)*' plumb to web plumb start winstart iexplore -new $0 you run /sys/src/cmd/unix/winplumb.exe on the windows machine, and that causes it to listen for commands to run on port 17890. you can specify a particular ip address for listening, to try to keep the amount of possible damage down. for example, i run winplumb tcp!192.168.233.1!17890 so that it only listens on the vmware interface (rather than taking commands from the whole internet). this is really meant to run on a trusted network. if you're directly on the internet, you have been warned. then i have a shell script g% cat /bin/winstart #!/bin/rc echo $* | aux/trampoline tcp!192.168.233.1!17890 g% that sends a command to execute. you could use your browser of choice of course, and you could also use it to start programs other than web browsers.