On Mon, 18 Jul 2005 00:12:44 +0100 Charles Forsyth <[EMAIL PROTECTED]> wrote: > >>Rebooting has been easy enough, so we haven't bothered to put > >>more complexity into the system to make changing users easier. > > also if you are certain you've rebooted (eg, little reset button > or perhaps power cycle) there's much less chance that preceding > person using the same terminal has left something lurking > (such as a fake login screen for instance, which UNIX has had > almost from the beginning)
I understand, and in many situations agree with, all the arguments for re-booting to change users. Nevertheless, I must add that this is one reason why I haven't installed Plan9 on my systems at home - there are more people than computers here, and I can't lose all my context (of active windows, etc), when my wife needs to check her email, or my daughter wants to paint a picture.... There are environments where you can be reasonably sure that a trojan hasn't been installed (and security amoungst the people with physical access isn't that important either), but where you really do want to be able to change your identity/context without re-booting. Linux virtual consoles are a great solution (although not 100% reliable, in my experience). Martin -- Martin C. Atkins [EMAIL PROTECTED] Parvat Infotech Private Limited http://www.parvat.com{/,/martin}
