From mboxrd@z Thu Jan 1 00:00:00 1970 From: erik quanstrom To: 9fans@cse.psu.edu References: <301a9b2cdbba04ebf2d3c42a7d64d761@terzarima.net> In-Reply-To: <301a9b2cdbba04ebf2d3c42a7d64d761@terzarima.net> Subject: Re: [9fans] killing processes Message-Id: <20050916133439.BAB3EB0710@conchobor.berzerked.org> Date: Fri, 16 Sep 2005 09:34:39 -0400 Topicbox-Message-UUID: 8b306b96-ead0-11e9-9d60-3106f5b1d025 i've got this dim memory of reading in the plan 9 papers that the security model is based on physically removing the auth server from everybody else. you know, i was thinking the linux folks have hacked those linksys wireless routers. now that would be an excellent auth server. ;-) erik Charles Forsyth writes [...] i don't see why it can't be the auth server as well. | i put the file servers on a cheap UPS as well, to reduce anxiety | about scrambled or lost data in venti archives (although | on wednesday morning i bumped into | someone else in a shared machine room who | was crouched down changing some | batteries that had gone bad on their UPS).