Well that gets a bit complicated.
Basicly what you what to do is get what ever bootloader you plan on using to be able to boot into either OS. As for me, I use VC++, VB, and Photoshop a ton, and I hate Gimp. Noone said Linux or apache were perfect, but go count the number of IIS exploits and the number of apache exploits and tell me which one seems safer?
At work we use the norton anti virus stuff on OS X, and I don't blame them because it is a heavily networked enviroment with semi-anonymous and untrustworhty users using any computer they please at random, but I don't really think that viruses are really a threat to OS X, but of course that won't stop magazines and anti-virus companies from telling you need them or selling them. I vote for keeping it 9.2 and keeping your sanity.
If the computer is not completely locked up try switching to a console display. Use crtl-alt and the f(1-6) buttons to switch... Also check your logs in /var/log, likely auth.log or something similar. The commands "last", "who", and "w" may also be of some use.
If you have a different computer at home and they are both hooked up to a lan try ssh'ing or telnet'ing into the Redhat box. Also an advantage for users in asia where typing characters is more time consuming than writing them on the screen.
If you get command line access to the box try reconfiguring X using XFree86 or xf86config or whatever, or/and try disabling graphical login using linuxconfig.
btw.. sure it's possible as long as your servers log that sort of thing. I don't know if Redhat is setup to do that or not... and even if it did keep proper logs how do you know the cracker didn't just modify the logs to keep his identity secret.
HTH, HAND.