On So, Okt 30, 2011 at 15:11:04 (CET), staticd wrote: >> Windows NT is designed so that, unless system security is already >> compromised in some other way, only the Winlogon process, a trusted >> system process, can receive notification of this keystroke >> combination. This is because the kernel remembers the process ID of >> the Winlogon process, and allows only that process to receive the >> notification. >> >> So says Wikipedia. >> >> Interestingly, VMWare catches the sequence as well. >> >> > I was thinking of a Alt+Sysrq combination capturable only by the kernel. > (Ctrl+Alt+Sysrq ?)
The SAK for Linux systems is Alt+Sysrq+k While this SAK can be disabled, Ubuntu ships with this functionality enabled. It safely and uncatchably terminates your running X11 session, returning back to your login manager. Cheers, Reinhard. -- Gruesse/greetings, Reinhard Tartler, KeyID 945348A4 -- Ubuntu-devel-discuss mailing list Ubuntu-devel-discuss@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss