L1-A and security
    De Clarke Sys Mgr 
    root%helios.UCSC.EDU at ucscc.ucsc.edu
       
    Fri Jul 14 09:53:23 AEST 1989
    
    
  
This may be just naivety on my part, but...
(1) I don't want my users using single-user mode to do silly or
    malicious things
(2) I don't want to be called in the middle of dinner to "please come
    and type in the root password because my workstation just crashed"
(3) I might settle for having sgl-user mode prompt for a username and
    password, checking it against its passwd file;  then the user could
    log in, but their name and the timestamp would be recorded (where,
    I wonder, that they couldn't gp and erase the record?).  Anyway, you
    get the idea.  The point is that strangers are more likely to be
    malicious than my own small, well-known user group;  and within
    my small group, people are much less likely to do anything stupid
    or "humorous" if it can be traced back to them.
This is obviously a blue-sky notion.  Can anyone point out either why it's
absolutely ridiculous or (if it isn't) how it could be implemented?
..............................
De Clarke, Systems Manager, UCO/Lick Observatory
Still trying to teach it epistemology...
root at helios.ucsc.edu, postmaster at portal.bitnet
voice: 408-429-2630   fax: 408-429-2730
The usual disclaimers apply;  your actual mileage may vary.
    
    
More information about the Comp.sys.sun
mailing list