i've got this dim memory of reading in the plan 9 papers that the
security model is based on physically removing the auth server from
everybody else.

you know, i was thinking the linux folks have hacked those linksys
wireless routers. now that would be an excellent auth server. ;-)

erik

Charles Forsyth <[EMAIL PROTECTED]> writes

[...]
 i don't see why it can't be the auth server as well.
| i put the file servers on a cheap UPS as well, to reduce anxiety
| about scrambled or lost data in venti archives (although
| on wednesday morning i bumped into
| someone else in a shared machine room who
| was crouched down changing some
| batteries that had gone bad on their UPS).

Reply via email to