Hugo van der Merwe wrote:

> Great, so I go and write an executable file in /etc/apm/event.d/01x_bugfix
> containing:

[script omitted]

> This strikes me as a security risk

A mild one, but yes.  It strikes me that a better solution would be to
figure out why suspend causes problems with X.  I know it doesn't on
most machines -- works great on mine.

If you really need a more secure approach, maybe you can set up some
sort of daemon that can be prodded to remember the vt on suspend, and
can keep the # in memory, and regurgitate it on resume.  But that seems
like an awful lot of work.  Possibly more than debugging the X vs.
suspend conflicts.

-- 
Chris Waters, Systems Engineer, Critical Path, Inc.
phone: 1(415) 344-5518 or 1(415) 254-5913 (mobile)
mailto:[EMAIL PROTECTED]

Reply via email to