Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP Posting-Version: version B 2.10.2 9/18/84; site uwai.UUCP Path: utzoo!watmath!clyde!burl!ulysses!allegra!mit-eddie!genrad!panda!talcott!harvard!seismo!uwvax!uwai!Thomas Scott Christiansen From: Thomas@uwai.UUCP Newsgroups: net.unix-wizards Subject: Re: invisibility. Message-ID: <239@uwai.UUCP> Date: Tue, 17-Sep-85 09:09:30 EDT Article-I.D.: uwai.239 Posted: Tue Sep 17 09:09:30 1985 Date-Received: Thu, 19-Sep-85 04:38:31 EDT References: <1162@srcsip.UUCP> <10283@ucbvax.ARPA> <1161@srcsip.UUCP> Sender: tom@uwai.UUCP Followup-To: net.unix-wizards Organization: UWisc Systems Lab Lines: 17 one method of operating under a cloaking device is to start up a shell on a network connection. thus % rsh hostname csh -i gets you a csh with no job control but which doesn't get recorded in utmp. if the host is different from your own (where you *should* have a utmp entry) this can be mystifying to mere mortals. tom -- Tom Christiansen University of Wisconsin Computer Science Systems Lab ...!{allegra,heurikon,ihnp4,seismo,uwm-evax}!uwvax!tom tom@wisc-ai.arpa Brought to you by Super Global Mega Corp .com