...
Back in the 1970s when I was a student at UCLA, it was common practice
when encountering an unattended logged on terminal in the public area
to change the user's password and then log it off.  I highly recommend
this approach.
...

At the University of Waterloo (same time-frame), this kind of stunt was grounds 
for expulsion.

How can you recommend using someone else's I'd for anything (including password 
changes) on a thread related to security?

The onlything we were allowed to do in that situation was to disconnect them 
(CTRL-Y), or wait 10 minutes for it to time out.

-teD
(The secret to success is sincerity.
If you can fake that,
you've got it made!)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to