On Mon, 18 Jul 2005 00:12:44 +0100 Charles Forsyth <[EMAIL PROTECTED]> wrote:
> >>Rebooting has been easy enough, so we haven't bothered to put
> >>more complexity into the system to make changing users easier.
> 
> also if you are certain you've rebooted (eg, little reset button
> or perhaps power cycle) there's much less chance that preceding
> person using the same terminal has left something lurking
> (such as a fake login screen for instance, which UNIX has had
> almost from the beginning)

I understand, and in many situations agree with, all the
arguments for re-booting to change users.

Nevertheless, I must add that this is one reason why I haven't
installed Plan9 on my systems at home - there are more people than
computers here, and I can't lose all my context (of active windows,
etc), when my wife needs to check her email, or my daughter wants to
paint a picture....

There are environments where you can be reasonably sure that a trojan
hasn't been installed (and security amoungst the people with physical
access isn't that important either), but where you really do want to
be able to change your identity/context without re-booting. Linux
virtual consoles are a great solution (although not 100% reliable, in
my experience).

Martin

-- 
Martin C. Atkins                        [EMAIL PROTECTED]
Parvat Infotech Private Limited         http://www.parvat.com{/,/martin}

Reply via email to