Rwho Rwho Rwho A UNIX command for displaying information about users logged on to a remote host. Overview Rwho is a UNIX command that listens for the Rwhod daemon (service) running on remote hosts. Rwhod peri- odically broadcasts the user name, host name, and session start time for all users currently logged on to the remote host, and Rwho gathers this information and displays it for all network hosts on which Rwhod is running. While the related Who command displays such information for a single remote host, Rwho displays such informa- tion for all hosts that are running Rwhod. On even a moderate-sized network, the broadcast traffic from such activity is considerable, and as a result best practice usually suggests that Rwhod be disabled on all systems. From a security perspective this is also a good idea since an intruder could use Rwho to gather considerable information for footprinting a target network. See Also: footprinting R 288 Rwho Rwho Rwho A UNIX command for displaying information about users logged on to a remote host. Overview Rwho is a UNIX command that listens for the Rwhod daemon (service) running on remote hosts. Rwhod peri- odically broadcasts the user name, host name, and session start time for all users currently logged on to the remote host, and Rwho gathers this information and displays it for all network hosts on which Rwhod is running. While the related Who command displays such information for a single remote host, Rwho displays such informa- tion for all hosts that are running Rwhod. On even a moderate-sized network, the broadcast traffic from such activity is considerable, and as a result best practice usually suggests that Rwhod be disabled on all systems. From a security perspective this is also a good idea since an intruder could use Rwho to gather considerable information for footprinting a target network. See Also: footprinting R 288 . From a security perspective this is also a good idea since an intruder could use Rwho to gather considerable information for footprinting a target network. See Also: footprinting R 288 Rwho. From a security perspective this is also a good idea since an intruder could use Rwho to gather considerable information for footprinting a target network. See Also: footprinting R 288