invisibility.

Thomas at uwai.UUCP Thomas at uwai.UUCP
Tue Sep 17 23:09:30 AEST 1985


one method of operating under a cloaking device is to start up
a shell on a network connection.  thus

    % rsh hostname csh -i

gets you a csh with no job control but which doesn't get recorded
in utmp.  if the host is different from your own (where you *should*
have a utmp entry) this can be mystifying to mere mortals.

tom
-- 

Tom Christiansen
University of Wisconsin
Computer Science Systems Lab 
...!{allegra,heurikon,ihnp4,seismo,uwm-evax}!uwvax!tom
tom at wisc-ai.arpa



More information about the Comp.unix.wizards mailing list