... Back in the 1970s when I was a student at UCLA, it was common practice when encountering an unattended logged on terminal in the public area to change the user's password and then log it off. I highly recommend this approach. ...
At the University of Waterloo (same time-frame), this kind of stunt was grounds for expulsion. How can you recommend using someone else's I'd for anything (including password changes) on a thread related to security? The onlything we were allowed to do in that situation was to disconnect them (CTRL-Y), or wait 10 minutes for it to time out. -teD (The secret to success is sincerity. If you can fake that, you've got it made!) ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

