> > > intended as a backdoor-type feature?
> >
> > Yes, so that the administrator could walk through a lab, and be able to
> > unlock any terminal that was locked by a mere mortal. :)
>
> Ugh - particularly in a lab this is really asking for a trojan! A much
> better way of doing this is to get a VC, log in as root and then kill
> the Xlock process. The same can be done across the network if
> needed...
Yah.... that xlock 'feature' is nasty... I could write a program that
looks and acts like xlock, but actually emails me any password that is
tried.... Pretty handy way to get root's passwd if you know that they
will come by and try it...
-Randy
____________________________________________________________________
Randy Carpenter - UNIX Systems Admin First Network Group
[EMAIL PROTECTED] Wapakoneta, OH
____________________________________________________________________
--
PLEASE read the Red Hat FAQ, Tips, Errata and the MAILING LIST ARCHIVES!
http://www.redhat.com/RedHat-FAQ /RedHat-Errata /RedHat-Tips /mailing-lists
To unsubscribe: mail [EMAIL PROTECTED] with
"unsubscribe" as the Subject.