Relay-Version: version B 2.10 5/3/83; site utzoo.UUCP
Posting-Version: version B 2.10.2 9/18/84; site uwai.UUCP
Path: utzoo!watmath!clyde!burl!ulysses!allegra!mit-eddie!genrad!panda!talcott!harvard!seismo!uwvax!uwai!Thomas Scott Christiansen 
From: Thomas@uwai.UUCP
Newsgroups: net.unix-wizards
Subject: Re: invisibility.
Message-ID: <239@uwai.UUCP>
Date: Tue, 17-Sep-85 09:09:30 EDT
Article-I.D.: uwai.239
Posted: Tue Sep 17 09:09:30 1985
Date-Received: Thu, 19-Sep-85 04:38:31 EDT
References: <1162@srcsip.UUCP> <10283@ucbvax.ARPA> <1161@srcsip.UUCP>
Sender: tom@uwai.UUCP
Followup-To: net.unix-wizards
Organization: UWisc Systems Lab
Lines: 17

one method of operating under a cloaking device is to start up
a shell on a network connection.  thus

    % rsh hostname csh -i

gets you a csh with no job control but which doesn't get recorded
in utmp.  if the host is different from your own (where you *should*
have a utmp entry) this can be mystifying to mere mortals.

tom
-- 

Tom Christiansen
University of Wisconsin
Computer Science Systems Lab 
...!{allegra,heurikon,ihnp4,seismo,uwm-evax}!uwvax!tom
tom@wisc-ai.arpa