[quoted lines by John J. Boyer on December 12, 2001, at 14:38] >I wonder why >logging in with an address other than your login name is considered a >security risk. Because you can lie about who you are. You're used to the Windows world where anyone is free to do that all of the time. It's not really a good idea to allow it though. For those companies and organizations who don't allow their users to have root access, and who do care a lot about accountability, it's a good constraint. >How do I delete a user? userdel old-user-name >How do I stop a running daemon like fetchmail without rebooting? killall fetchmail >How can I transfer the messages in the inbox of one use to the inbox of >another? cd /var/spool/mail cat old-user-name >>new-user-name rm old-user-name Note the two right angle brackets before new-user-name in the cat command. This is important. It means append. If you only put one of them there then existing messages for new-user-name will be deleted as the whole file will be replaced. -- Dave Mielke | 2213 Fox Crescent | I believe that the Bible is the Phone: 1-613-726-0014 | Ottawa, Ontario | Word of God. Please contact me EMail: dave@mielke.cc | Canada K2A 1H7 | if you're concerned about Hell.