Simon Perreault wrote at 16:41 -0500 on Jan 9: > Would that create obvious security holes? a few things to consider... You'd have to make sure you followed sym links in the implementation. How about mount points? etc. What you propose is a kind of chroot. And it's not hard for root to break out of a chroot.