Unix Trust
¨Authenticating users on behalf of another machine
¨R-commands
–rlogin
–rsh
–rcp
¨Weakness of r-commands
–Actions based on IP address of trusted machine
–Undermining r-commands via IP address spoofing