Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In all seriousness, what if it's a machine that no one should ever really be running commands on? This could be an effective, albeit naive, way to discourage undesirables in the system.


That is the most absurd approach to access control I have ever heard... but I like it.


Sadly, the machines I don't want people running commands on happen to be also the machines I don't want to rm -rf everything on as well.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: