notch@srcsip.UUCP (Michael k Notch) (09/10/85)
I have heard a rumor that it is possible for a user on 4.2bsd to go invisible to other users. Has anyone else heard this rumor and possibly confirm it. Also, if it is true, could someone explain to me how it is done. Thanks. I will take this in the strictest confidence. -- But... What about Naomi? USENET: ihnp4!umn-cs!srcsip!notch US-SMAIL: Michael k Notch (The small k is on purpose) MN17-2349 [1-612-378-5338] Honeywell Inc. Systems & Research Center 2600 Ridgeway Parkway NE Minneapolis, Minnesota 55440 --
Thomas@uwai.UUCP (09/17/85)
one method of operating under a cloaking device is to start up a shell on a network connection. thus % rsh hostname csh -i gets you a csh with no job control but which doesn't get recorded in utmp. if the host is different from your own (where you *should* have a utmp entry) this can be mystifying to mere mortals. tom -- Tom Christiansen University of Wisconsin Computer Science Systems Lab ...!{allegra,heurikon,ihnp4,seismo,uwm-evax}!uwvax!tom tom@wisc-ai.arpa