home *** CD-ROM | disk | FTP | other *** search
- These three programs supply a laughable imitation of Unix security. On a
- system where no per-user permissions exist on files, any form of security
- will be laughable. Therefore these should more be seen as an attempt for
- user configuration management.
-
- On my A3000, I use login to control the boot sequence. For example, if I'm
- working on my thesis, then I login as thesis, which installs the LaTeX paths
- and fonts. If I'm logging in as games, then the desktop boot sequence is
- pruned to the bare minimum and zero-page write protection is turned off.
-
- Some people may find this useful for managing their use of news and mail
- readers. The protection afforded by read-only variables may help to prevent
- forgery on multi-user machines in this case, though again this is more the
- image of protection than real security. Please, if you're trying to use
- login for such management, feel free to mail me with any suggestions for
- improvements.
-
- Cheers,
- Alun.
-