Setting up users with very limited access to systems — nothing more than they need, used to be a little tricky. You could create a specialized environment, chain the visitor to his home directory and ...