...
Under Unix-based operating systems, the Worker does a setuid in order to switch user identities before starting the process. One implication of this is that the user's shell environment is not set up (tcshrc or equivalent is not run), so it will not be identical to an actual login by that user.
Windows
On Windows, this is handled quite differently. Under Windows, any process attempting to impersonate another user will have to provide certain security information, including the user's encrypted password.
...