William L. Maltby wrote:
On Sun, 2007-09-16 at 13:09 -0400, Ross S. W. Walker wrote:
William L. Maltby wrote:
On Wed, 2007-09-12 at 17:23 +0300, Ioannis Vranos wrote:
<snip>
Hogwash, while yes you will definitely need more resources as far as hard disk, memory and network there is no need to worry
about user
X overwritting user Y's data. Hell Unix and it's variants had been successfully doing multi-user X sessions for years before
even Windows
95 was a glint in Bill's eyes.
As an after-thought, it occurred to me that I may have not been obvious enough in my original reply. Having been working on *IX variants since PWB V6/7, circa 1978, I've some understanding of *IX general capabilities, and some understanding of the basic capabilities of various utilities that run on *IX systems. I'm not expert at anything, but don't claim such expertise either.
As to my soapbox paragraph, it seems to fit with generally accepted concerns about security issues, at which I'm also no expert. If the requested <CTL>-<ALT>... does not imply a local console, I'm glad to learn new stuff.
My apologies for the abrasiveness of my statement.
Corruption won't occur, but yes if you aren't using the built-in user switching capability of the GUI and are just spawning X sessions on virtual terminals on the console it is conceivable that security can be compromised.
The built-in user switching in KDE and Gnome auto-locks the current session, or if the current session is locked allows the console user to spawn a secondary session on the next available virtual terminal.
This is what the OP is most likely going to want to use.
In a home environment when configuring a shared workstation there is no real need for the extra resources (except memory) as there will really only be 1 interactive user at 1 time.
In a corporate environment where a shared X server is handling multiple X terminals then you will need to scale disk and network appropriately.
-Ross
______________________________________________________________________ This e-mail, and any attachments thereto, is intended only for use by the addressee(s) named herein and may contain legally privileged and/or confidential information. If you are not the intended recipient of this e-mail, you are hereby notified that any dissemination, distribution or copying of this e-mail, and any attachments thereto, is strictly prohibited. If you have received this e-mail in error, please immediately notify the sender and permanently delete the original and any copy or printout thereof.