-K, --no-kerberos don't use Kerberos. |
-f don't read .cshrc. |
-l, --full simulate full login. |
-m leave environment unmodified. |
-i instance, --instance=instance root instance to use. |
-c command, --command=command command to execute. |