ASKER
The Linux operating system, in all its flavors, has its own share of security flaws that allow intrusions, but there are various mechanisms by which these flaws can be removed, generally divided into two parts: authentication and access control. Authentication is responsible for ensuring that a user requesting access to the system is really the user with the account, while access control is responsible for controlling which resources each account has access to and what kind of access is permitted.
TRUSTED BY
Append the following two lines into $KDEDIR/share/config/kdegl
-----
[KDE Action Restrictions][$i]
editable_desktop_icons=fal
movable_toolbars=false
----
Such as:
echo '[KDE Action Restrictions]' >> ~/.kde/share/config/kdeglo
echo 'editable_desktop_icons=fa
echo 'movable_toolbars=false' >> ~/.kde/share/config/kdeglo
Then logout and log back in to KDE
Regards,
Wesly