Something to please rmemeber when attempting to do all these funky security policy protection mechanisms: A lot of people have remote servers. These servers do not have a keyboard/monitor. A few (and I mean very few) have serial lines attached so people can dialin/etc. The vast majority are accessed via ssh/telnet and other network protocols. So what? If I cannot modify my security policy by remotely ssh'ing in I can't really use your security mechanism. I am sure this applies to other people as well. Please keep this in mind =). Kurt Seifried, seifriedat_private _______________________________________________ linux-security-module mailing list linux-security-moduleat_private http://mail.wirex.com/mailman/listinfo/linux-security-module
This archive was generated by hypermail 2b30 : Sun Apr 15 2001 - 22:21:51 PDT