As X moves out of the hacker's domain and into the "real world," users can't be expected to master all the ins and outs of setting up and administering their own X software. That will increasingly... This description may be from another edition of this product.