💾 Archived View for gemini.spam.works › mirrors › textfiles › humor › COMPUTER › manpage.sh captured on 2022-06-12 at 09:18:40.

View Raw

More Information

-=-=-=-=-=-=-

From: dws@ssec.wisc.edu (DaviD W. Sanderson)
Newsgroups: rec.humor
Subject: Funny Man Pages
Message-ID: <1993Jan10.190016.8259@cs.wisc.edu>
Date: 10 Jan 93 19:00:16 GMT
Organization: UW-Madison Space Science and Engineering Center
Lines: 2420

In article <1993Jan10.143051.12284@cs.tu-berlin.de> rossi@opal.cs.tu-berlin.de (Oliver Rosenkranz) writes:
>Are there other man pages out there ???

This is my collection of tongue-in-cheek man pages I have seen posted
to the Net.  I did not write them, but in some cases I have done a
considerable amount of work to back-engineer them to source form and/or
beautify them.  They are all in source form, so people can use nroff or
troff as they wish.

I welcome any new pages people would like to contribute.  (I do have
the penix man pages, but I'm still working on converting them to nroff
source.)

Enjoy!

DaviD W. Sanderson (dws@ssec.wisc.edu)

	"The Noah Webster of smileys is David Sanderson"
		- The Wall Street Journal, 15 Sep 1992

#!/bin/sh
# This is a shell archive (produced by shar 3.49)
# To extract the files from this archive, save it to a file, remove
# everything above the "!/bin/sh" line above, and type "sh file_name".
#
# made 01/10/1993 18:51 UTC by dws@ssec
# Source directory /home/dws/pub/src/dws/funman
#
# existing files will NOT be overwritten unless -c is specified
#
# This shar contains:
# length  mode       name
# ------ ---------- ------------------------------------------
#    407 -rw------- README
#   2508 -r-------- babya.1
#   3032 -r-------- babyb.1
#    125 -r-------- celibacy.1
#   6137 -r-------- condom.1
#   4195 -r-------- date.1
#   2721 -r-------- echo.1
#   3637 -r-------- flame.1
#   1971 -r-------- flog.1
#   1882 -r-------- gong.1
#   3372 -r-------- grope.1
#   1295 -r-------- rescrog.1
#   6074 -r-------- rm.1
#   2024 -r-------- sex.1
#   1740 -r-------- strfry.3
#   1748 -r-------- tm.1
#   2982 -r-------- xkill.1
#   1063 -rw------- Makefile
#
# ============= README ==============
if test -f 'README' -a X"$1" != X"-c"; then
	echo 'x - skipping README (File already exists)'
else
echo 'x - extracting README (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'README' &&
This is my collection of tongue-in-cheek man pages I have seen posted
to the Net.  I did not write them, but in some cases I have done a
considerable amount of work to back-engineer them to source form and/or
beautify them.  They are all in source form, so people can use nroff or
troff as they wish.  I welcome any new pages people would like to
contribute.
X
Enjoy!
X
DaviD W. Sanderson (dws@ssec.wisc.edu)
SHAR_EOF
chmod 0600 README ||
echo 'restore of README failed'
Wc_c="`wc -c < 'README'`"
test 407 -eq "$Wc_c" ||
	echo 'README: original size 407, current size' "$Wc_c"
fi
# ============= babya.1 ==============
if test -f 'babya.1' -a X"$1" != X"-c"; then
	echo 'x - skipping babya.1 (File already exists)'
else
echo 'x - extracting babya.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'babya.1' &&
.\"-------
.\" b a b y . 1
.\"
.\" Created from a post-nroff version posted in rec.humor.funny:
.\"
.\" Message-id: <S2a9.10d1@looking.on.ca>
.\" Date: Sat, 29 Jun 91 6:30:4 EDT
.\" From: beck@cs.ualberta.ca (Bob Beck)
.\" Subject: BABY man page, I've ben told I should submit this, was posted locally.
.\"
.\" DaviD W. Sanderson
.\"-------
.TH BABY 1
.SH NAME
baby \(em create new process from two parent processes
.SH SYNOPSIS
.B baby
.I sex
.RI [ name... ]
.SH "SYSTEM V SYNOPSIS"
.B /usr/5bin/baby
.RB [ \-sex \0\fIsex\fR]
.RB [ \-name \0\fIname...\fR]
.SH AVAILABILITY
The System V version of this command is available
with the System V software installation option.
Refer to Installing SunOS 4.1 for information
on how to install and invoke
.IR baby .
.SH DESCRIPTION
.I baby
is initiated when one parent process polls another server process
through a socket connection (BSD)
or through pipes in the System V implementation.
.I baby
runs at low priority for approximately 40 weeks
and then terminates with a heavy system load.
Most systems require constant monitoring when
.I baby
reaches its final stages of execution.
.PP
Older implementations of
.I baby
required that the initiating process not
be present at the time of completion.
In these
versions the initiating process
is
awakened and notified of the results upon completion.
Modern versions allow both parent processes to be active
during the final stages of
.IR baby .
.PP
.RS
example% baby \-sex m \-name fred
.RE
.SH OPTIONS
.TP
.B \-sex
option indicating type of process created.
.TP
.B \-name
process identification to be attached to the new process.
.SH RESULT
Successful execution of
.IR baby (1)
results in new process being created and named.
Parent processes then typically
broadcast messages to all other processes informing them of their
new status in the system.
.SH BUGS
The
.I sleep
command may not work on either parent processes for some time afterward,
as new
.I baby
processes constantly send interrupts
which must be handled by one or more parent.
.PP
.I baby
processes upon being created may frequently dump
in /tmp requiring /tmp to be cleaned out frequently by one
of the parent processes.
.PP
The original AT&T version was provided without instructions
regarding the created process; this remains in current implementations.
.SH "SEE ALSO"
.IR cigars (6),
.IR dump (5),
.IR cry (3)
.SH "OTHER IMPLEMENTATIONS"
.TP
.IR gnoops (1)
FSF version of
.I baby
where none of the authors will accept responsibility for anything.
SHAR_EOF
chmod 0400 babya.1 ||
echo 'restore of babya.1 failed'
Wc_c="`wc -c < 'babya.1'`"
test 2508 -eq "$Wc_c" ||
	echo 'babya.1: original size 2508, current size' "$Wc_c"
fi
# ============= babyb.1 ==============
if test -f 'babyb.1' -a X"$1" != X"-c"; then
	echo 'x - skipping babyb.1 (File already exists)'
else
echo 'x - extracting babyb.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'babyb.1' &&
.\"-------
.\" b a b y b . 1
.\"
.\" Created from a post-nroff version posted in rec.humor:
.\"
.\" From: tencati@nssdca.gsfc.nasa.gov
.\" Newsgroups: rec.humor
.\" Subject: UNIX man page for new baby
.\" Message-ID: <10JUL199210414089@nssdca.gsfc.nasa.gov>
.\" Date: 10 Jul 92 15:41:00 GMT
.\" Article-I.D.: nssdca.10JUL199210414089
.\" Organization: NASA - Goddard Space Flight Center
.\"
.\" One of my co-workers just had a new baby added to their family. He
.\" emailed the following announcement:
.\" (You have to understand the UNIX doc set to fully appreciate this)
.\"
.\" DaviD W. Sanderson
.\"-------
.TH BABY 1
.SH NAME
baby \(em create new process from two parents
.SH SYNOPSIS
.B baby
.B \-sex
.RI [ m | f ]
.RB [ \-name
.IR name ]
.SH DESCRIPTION
.I baby
is initiated when one parent process polls another server process
through a socket connection in the BSD version
or through pipes in the System V implementation.
.I baby
runs at low priority for approximately forty weeks
and then terminates with a heavy system load.
Most systems require constant monitoring when
.I baby
reaches its final stages of execution.
.PP
Older implementations of
.I baby
did not require both initiating processes to
be present at the time of completion.
In those
versions the initiating process
which was not present was
awakened and notified of the results upon completion.
It has since been determined that the presence of both parent
processes result in a generally lower system load at completion,
and thus current versions of
.I baby
expect both parent processes to be active during the final stages.
.PP
Successful completion of
.I baby
results in the creation and
naming of a new process.
Parent processes then broadcast
messages to all other processes, local and remote, informing
them of their new status.
.SH OPTIONS
.TP
.B \-sex
define the gender of the created process
.TP
.B \-name
assign the name name to the new process
.SH EXAMPLES
.RS
baby \-sex f \-name Jacqueline
.RE
.PP
completed successfully on July 9, 1992 at 9:11pm.
Jacqueline's vital statistics: 8 pounds 3 oz, 20 inches, long dark hair.
The parent process, Kim Dunbar, is reportedly doing fine.
.SH "SEE ALSO"
.IR cigar (6),
.IR dump (5),
.IR cry (3).
.SH BUGS
Despite its complexity,
.I baby
only knows one signal, SIGCHLD,
(or SIGCLD in the System V implementation),
which it uses to contact the parent processes.
One or both parent processes must then inspect the baby process
to determine the cause of the signal.
.PP
The
.IR sleep (1)
command may not work as expected on either parent
process for some time afterward, as each new instance of
.I baby
sends intermittent signals to the parent processes
which must be handled by the parents immediately.
.PP
A
.I baby
process will frequently dump core, requiring either
or both parent processes to clean up after it.
.PP
Despite the reams of available documentation on invoking and
maintaining
.IR baby ,
most parent processes are overwhelmed.
.SH AUTHORS
XFrom a man page by Joe Beck, <beck@cs.ualberta.ca>.
SHAR_EOF
chmod 0400 babyb.1 ||
echo 'restore of babyb.1 failed'
Wc_c="`wc -c < 'babyb.1'`"
test 3032 -eq "$Wc_c" ||
	echo 'babyb.1: original size 3032, current size' "$Wc_c"
fi
# ============= celibacy.1 ==============
if test -f 'celibacy.1' -a X"$1" != X"-c"; then
	echo 'x - skipping celibacy.1 (File already exists)'
else
echo 'x - extracting celibacy.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'celibacy.1' &&
.TH CELIBACY 1
.SH NAME
celibacy \(em don't have sex
.SH SYNOPSIS
.B celibacy
.SH DESCRIPTION
Does nothing worth mentioning.
SHAR_EOF
chmod 0400 celibacy.1 ||
echo 'restore of celibacy.1 failed'
Wc_c="`wc -c < 'celibacy.1'`"
test 125 -eq "$Wc_c" ||
	echo 'celibacy.1: original size 125, current size' "$Wc_c"
fi
# ============= condom.1 ==============
if test -f 'condom.1' -a X"$1" != X"-c"; then
	echo 'x - skipping condom.1 (File already exists)'
else
echo 'x - extracting condom.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'condom.1' &&
.\" -------
.\" Message-ID: <S48e.386a@looking.on.ca>
.\" Date: Mon, 26 Oct 92 4:30:03 EST
.\" Newsgroups: rec.humor.funny
.\" Subject: condom(1) man page (original)...
.\" From: maupin@cs.washington.edu (Ken Maupin)
.\" Keywords: chuckle, original, computers, sexual
.\" Approved: funny@clarinet.com
.\"
.\" The following was inspired by the sex.1 and celibacy.6 EUNUCH
.\" man pages I found hiding in, of all places, the GNU Emacs
.\" distribution on my machine (I guess we know what Richard Stallman
.\" thinks about when he isn't writing GNU software, eh?).
.\" -------
.\" Reverse-engineered to [nt]roff -man source by DaviD W. Sanderson
.\" -------
.TH CONDOM 1 "" "EUNUCH Programmer's Manual"
.SH NAME
condom \- protection against viruses and prevention of child processes
.SH SYNOPSIS
.B condom
.RI [ options ]
.RI [ processid ]
.SH DESCRIPTION
.I condom
provides protection against System Transmitted
Viruses (STVs) that may invade your system.
Although the spread of such viruses across a network
can only be abated by aware and cautious users,
.I condom
is the only highly effective means of preventing
viruses from entering your system (see
.IR celibacy (1)).
Any data passed to
.I condom
by the protected process will be blocked, as specified by
the value of the
.B \-s
option (see
.B OPTIONS
below).
.I condom
is known to
defend against the following viruses and other malicious
afflictions:
.RS
.IP \(bu
AIDS
.PD 0
.IP \(bu
Herpes Simplex (genital varieties)
.IP \(bu
Syphilis
.IP \(bu
Crabs
.IP \(bu
Genital warts
.IP \(bu
Gonhorrea
.IP \(bu
Chlamydia
.IP \(bu
Michelangelo
.IP \(bu
Jerusalem
.PD
.RE
.PP
When used alone or in conjunction with
.IR pill (1),
.IR sponge (1),
.IR foam (1),
and/or
.IR setiud (3),
.I condom
also prevents the conception of a child process.
If invoked from within a synchronous process,
.I condom
has, by default, an 80% chance of preventing the external processes
from becoming parent processes (see the
.B \-s
option below).
When other process contraceptives are used,
the chance of preventing a child process from being forked
becomes much greater.
See
.IR pill (1),
.IR sponge (1),
.IR foam (1),
and
.IR setiud (3)
for more information.
.PP
If no options are given, the current user's login process (as
determined by the environment variable USER) is protected with a
Trojan rough-cut latex condom without a reservoir tip.
The optional
.RI `` processid ''
argument is an integer specifying the process to protect.
.PP
NOTE:
.I condom
may only be used with a hard disk.
.I condom
will terminate abnormally with exit code \-1 if used with a floppy
disk (see
.B DIAGNOSTICS
below).
.ne 5
.SH OPTIONS
The following options may be given to
.IR condom :
.TP
.BI \-b " brand"
.IR brand s
are as follows:
.RS 1i
.TP
trojan (default)
.PD 0
.TP
ramses
.TP
sheik
.TP
goldcoin
.TP
fourex
.PD
.RE
.TP
.BI \-m " material"
The valid
.IR material s
are:
.RS 1i
.TP
.PD 0
latex (default)
.TP
saranwrap
.TP
membrane
.B WARNING!
The membrane option is
.I not
endorsed by the System Administrator General as an
effective barrier against certain viruses.
It is supported only for the sake of tradition.
.PD
.RE
.TP
.BI \-f " flavor"
The following
.IR flavor s
are currently supported:
.RS 1i
.TP
.PD 0
plain (default)
.TP
apple
.TP
banana
.TP
cherry
.TP
cinnamon
.TP
licorice
.TP
orange
.TP
peppermint
.TP
raspberry
.TP
spearmint
.TP
strawberry
.PD
.RE
.TP
.B \-r
Toggle reservoir tip (default is no reservoir tip)
.TP
.BI \-s " strength"
.I strength
is an integer between 20 and 100 specifying the resilience of
.I condom
against data passed to
.I condom
by the protected process.
Using a larger
value of
.I strength
increases
.IR condom 's
protective abilities,
but also reduces interprocess communication.
A smaller value of
.I strength
increases interprocess communication,
but also increases the likelihood of a security breach.
An extremely vigorous process or
one passing an enormous amount of data to
.I condom
will increase the chance of
.IR condom 's
failure.
The default
.I strength
is 80%.
.ne 8
.TP
.BI \-t " texture"
Valid
.IR texture s
are:
.RS 1i
.TP
.PD 0
rough (default)
.TP
ribbed
.TP
bumps
.TP
lubricated
(provides smoother interaction between processes)
.PD
.RE
.PP
WARNING: The use of an external application to
.I condom
in order to reduce friction between processes has been proven in
benchmark tests to decrease
.IR condom 's
strength factor!
If execution speed is important to your process, use the
.RB `` \-t
.BR lubricated ''
option.
.SH DIAGNOSTICS
.I condom
terminates with one of the following exit codes:
.TP
\-1
An attempt was made to use
.I condom
on a floppy disk.
.TP
0
.I condom
exited successfully (no data was passed to the synchronous process).
.TP
1
.I condom
failed and data was allowed through.
The danger of transmission of an STV or the forking of a child process
is inversely proportional to the number of other protections employed
and is directly proportional to the ages of the processes involved.
.SH BUGS
.I condom
is
.B NOT
100% effective at preventing a child process
from being forked or at deterring the invasion of a virus (although
the System Administrator General has deemed that
.I condom
is the most
effective means of preventing the spread of system transmitted
viruses).
See
.IR celibacy (1)
for information on a 100% effective program
for preventing these problems.
.PP
Remember, the use of
.IR sex (1)
and other related routines
should only occur between mature, consenting processes.
If you must use
.IR sex (1),
please employ
.I condom
to protect your process and your synchronous process.
If we are all responsible, we can stop the spread of STVs.
.SH "AUTHORS and HISTORY"
The original version of
.I condom
was released in Roman times and was only marginally effective.
With the advent of modern technology,
.I condom
now supports many more options and is much more effective.
.PP
The current release of
.I condom
was written by Ken Maupin at the University of Washington
(maupin@cs.washington.edu) and was last updated on 10/7/92.
.SH "SEE ALSO"
.IR celibacy (1),
.IR sex (1),
.IR pill (1),
.IR sponge (1),
.IR foam (1),
and
.IR setiud (3)
SHAR_EOF
chmod 0400 condom.1 ||
echo 'restore of condom.1 failed'
Wc_c="`wc -c < 'condom.1'`"
test 6137 -eq "$Wc_c" ||
	echo 'condom.1: original size 6137, current size' "$Wc_c"
fi
# ============= date.1 ==============
if test -f 'date.1' -a X"$1" != X"-c"; then
	echo 'x - skipping date.1 (File already exists)'
else
echo 'x - extracting date.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'date.1' &&
.\"-------
.\" I made some formatting improvements. -dws
.\"-------
.\" From: overby@sendit.nodak.edu (Glen Overby)
.\" Newsgroups: rec.humor.funny
.\" Subject: date(6) get or set a date
.\" Keywords: original, computer, maybe
.\" Message-ID: <S3b9.516d@looking.on.ca>
.\" Date: 27 Mar 92 09:30:05 GMT
.\" Lines: 106
.\" Approved: funny@clarinet.com
.\" 
.\" (I wrote this, but the idea came from a friend)
.\" 
.TH DATE 6 "January 1, 1992"
.UC 4
.SH NAME
date \- get and print a date
.SH SYNOPSIS
.B date
.RB [ \-s ]
.RB [ \-local ]
.RB [ \-k ]
.RB [ \-blind ]
.IR option = value ...
.SH DESCRIPTION
If no arguments are given, a date will be selected at random.
Providing an argument will restrict the search pool of dates.
Hopefully these arguments will not carry forward into the actual date.
Only the superuser can select dates by name.
.PP
The
.B \-s
option registers you in the date database and (if not
.BR \-local )
posts your vitals to alt.personals (and, optionally, alt.sex.wanted).
.PP
Using the
.B \-k
option selects a date, but does not make any further arrangments.
.PP
Ranges are specified with parentheses and brackets: (18,25) is 18 to 25
exclusive while [18,25] is 18 to 25 inclusive.
An array of selections is given with braces
such as ``{blonde, brunette, redhead}''.
Multiple responses are separated with commas,
as in ``sex=female,yes,please''.
.TP
.B \-blind
To arrange a blind date.
.PP
.BR view [=\c
.IR must ]
.PD 0
.IP
.PD
View prospective date's picture.
To locate a picture,
.I date
searches several picture databases, including FaceSaver (uunet.uu.net)
alt.sec.pictures, alt.binaries.pictures.erotica,
and several FTP gif archives.
You must have access to the Internet for FTP to work.
.IP
If view=must is set, and
.I date
is unable to find a picture, a request will be automaticly posted to
alt.binaries.pictures.d asking for one.
.IP
Options to
.IR xv (1)
may follow "view" or be put in the environment parameter XV.
.PP
The following options restrict the search pool
to those who have supplied the necessary information.
.TP
.BI dim= range,range,range
.TP
.BI height= range
Synonyms are also supported: midget, twerp, short, beanstalk,
giant, basketball-player
.TP
.BI weight= range
Synonyms: toothpic, feather, wide-load, blimp
.TP
.BI age= range
Synonyms: juvenile, underage, thirty-nine, over-the-hill, {mom, dad},
{grandma, grandpa}
.PP
.BR sex= "{male, female}"\c
[,{yes, no, maybe}]\c
.RI "[," opt = sex "(6) options]"
.PD 0
.IP
.PD
If sex=yes and you are registering,
your vitals are posted to alt.sex.wanted
in addition to alt.personals.
.TP
.BR race= "{white, black, native-american, ...}"
Various slang terms are also supported.
.TP
.BR marriage= "{flirting, noway, maybe, once, twice, several}"
Seriousness and experience.
.PP
.BR kids= "{never, rightaway, oops, have, want}"\c
[,{one, two, three, four, bunch}]
.PD 0
.IP
.PD
Domestic leanings.
.TP
.BR cooking= "{never, loveit, when_hungry}"
.TP
.B color
Synonym for race.
.TP
.BR religion= "{Atheist, Moslem, Lutheran, Catholic, ...}"
.TP
.BR temper= "{mellow, quiet, hot-head}"
.PP
.BR interests=\c
.RI { "lists of possible interests" }
.PP
.BR name=\c
.IR lastname , firstname
.PD 0
.IP
.PD
Specify name of your date.
Perfect for hitting on.
Names can only be specified by super-user.
.SH FILES
.IP "$HOME/.daterc"
Optional place to store options, for frequent daters.
.IP "$HOME/.datehist"
History of dates, to avoid duplication.
.IP "$HOME/.persona"
Options describing yourself, if you haven't registered in the database.
Note that the first time you use
.I date
and supply this information,
you are registered in the blind-date database.
.SH SEE ALSO
.IR man (1),
.IR woman (1),
.IR sex (6)
.PP
.IR "RFC1036: Standard for exchange of USENET messages" ,
M. Horton and R. Adams.
.PP
.IR "A Primer on how to work with the USENET community" ,
Chuq Von Rospach and Gene ``net.god'' Spafford.
.SH DIAGNOSTICS
Exit status is 0 on success, 1 on complete failure to get a date.
.PP
``You are not superuser: date not set''
if you try to use the name parameter
but are not the super-user.
.PP
``Vitals posted to alt.personals [,alt.sex.wanted]''
when you register globally.
.SH AUTHOR
Won't admit to it!
SHAR_EOF
chmod 0400 date.1 ||
echo 'restore of date.1 failed'
Wc_c="`wc -c < 'date.1'`"
test 4195 -eq "$Wc_c" ||
	echo 'date.1: original size 4195, current size' "$Wc_c"
fi
# ============= echo.1 ==============
if test -f 'echo.1' -a X"$1" != X"-c"; then
	echo 'x - skipping echo.1 (File already exists)'
else
echo 'x - extracting echo.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'echo.1' &&
.\" -------
.\" Reverse-engineered to [nt]roff source by DaviD W. Sanderson
.\" -------
.TH GNUecho 1
.SH NAME
echo \- echo arguments
.SH SYNOPSIS
.B echo
.RI [ options ]...
.SH DESCRIPTION
.I Echo
writes its arguments separated by blanks and terminated
by a newline on the standard output.
Options to filter and redirect the output are as follows:
.TP
.B \-2
generate rhyming couplets from keywords
.TP
.B \-3
generate Haiku verse from keywords
.TP
.B \-5
generate limerick from keywords
.TP
.B \-a
convert ASCII to ASCII
.TP
.B \-A
disambiguate sentence structure
.TP
.B \-b
generate bureaucratese equivalent (see
.BR \-x )
.TP
.B \-B
issue equivalent C code with bugs fixed
.TP
.B \-c
simplify/calculate arithmetic expression(s)
.TP
.B \-C
remove copyright notice(s)
.TP
.B \-d
define new echo switch map
.TP
.B \-D
delete all ownership information from system files
.TP
.B \-e
evaluate lisp expression(s)
.TP
.B \-E
convert ASCII to Navajo
.TP
.B \-f
read input from file
.TP
.B \-F
transliterate to french
.TP
.B \-g
generate pseudo-revolutionary marxist catch-phrases
.TP
.B \-G
prepend GNU manifesto
.TP
.B \-h
halt system (reboot suppressed on Suns, Apollos, and VAXen,
not supported on NOS-2)
.TP
.B \-i
emulate IBM OS/VU (recursive universes not supported)
.TP
.B \-I
emulate IBM VTOS 3.7.6
(chronosynclastic infundibulae supported
with restrictions documented in IBM VTOS Reference Manual rev 3.2.6)
.TP
.B \-J
generate junk mail
.TP
.B \-j
justify text (see
.B \-b
option)
.TP
.B \-k
output "echo" software tools
.TP
.B \-K
delete privileged accounts
.TP
.B \-l
generate legalese equivalent
.TP
.B \-L
load echo modules
.TP
.B \-M
generate mail
.TP
.B \-N
send output to all reachable networks (usable with
.BR \-J ,
.BR \-K ,
.B \-h
options)
.TP
.B \-n
do not add newline to the output
.TP
.B \-o
generate obscene text
.TP
.B \-O
clean up dirty language
.TP
.B \-p
decrypt and print /etc/passwd
.TP
.B \-P
port echo to all reachable networks
.TP
.B \-P1
oolcay itay
.TP
.B \-q
query standard input for arguments
.TP
.B \-r
read alternate ".echo" file on start up
.TP
.B \-R
change root password to "RMS"
.TP
.B \-s
suspend operating system during output (Sun and VAX BSD 4.2 only)
.TP
.B \-S
translate to swahili
.TP
.B \-T
emulate TCP/IP handler
.TP
.B \-t
issue troff output
.TP
.B \-u
issue unix philosophy essay
.TP
.B \-v
generate reverberating echo
.TP
.B \-V
print debugging information
.TP
.B \-x
decrypt DES format messages
(NSA secret algorithm CX 3.8, not distributed outside continental US)
.PP
.I Echo
is useful for producing diagnostics in shell programs
and for writing constant data on pipes.
To send diagnostics to the standard error file, do `echo ... 1>&2'.
.SH AUTHOR
Richard M. Stallman
SHAR_EOF
chmod 0400 echo.1 ||
echo 'restore of echo.1 failed'
Wc_c="`wc -c < 'echo.1'`"
test 2721 -eq "$Wc_c" ||
	echo 'echo.1: original size 2721, current size' "$Wc_c"
fi
# ============= flame.1 ==============
if test -f 'flame.1' -a X"$1" != X"-c"; then
	echo 'x - skipping flame.1 (File already exists)'
else
echo 'x - extracting flame.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'flame.1' &&
.\"-------
.\" f l a m e . 1
.\"
.\" Created from a post-nroff version posted in rec.humor:
.\"
.\" >From: felton@eng3.UUCP (Ed Felton)
.\" Subject: New Unix Utility
.\" Message-ID: <571@eng3.UUCP>
.\" Date: 17 Oct 90 15:43:53 GMT
.\" Reply-To: felton@sci34hub.sci.com (Ed Felton)
.\"
.\" We found the following man page on our system...
.\" What do you folks think??
.\" --
.\" Ed Felton uunet!sci34hub!eng3!felton
.\"
.\" DaviD W. Sanderson
.\"-------
.TH FLAME 1
.SH NAME
flame \(em reply to Usenet News posting automatically
.SH SYNOPSIS
.B flame
.RI [ options ]
.RI [ filename ]
.SH DESCRIPTION
Flame is a AI tool providing an automated method
for replying to articles posted to Usenet News.
Special care is paid to allow the user to specify
the type of reply he desires.
The following options are supported by flame:
.TP
.B \-\-
Take input from stdin.
.TP
.BI \-x " regexp
Crosspost to all newsgroups matching
.IR regexp .
.TP
.BI \-n " number
Post this reply
.I number
times.
.TP
.B \-b
Reply in BIFF MODE.
.TP
.B \-d
Delay response until original posting expires.
.TP
.B \-m
Misdirect to a random Author.
.TP
.B \-r
ROT13 quotes from original posting.
.TP
.BI \-g " regexp
Reply to all messages in newsgroups matching
.IR regexp .
.TP
.B \-A
Call the Author Assh*le in 12 languages.
.TP
.B \-B
Bait the Author.
.TP
.B \-C
Accuse the Author of communist leanings.
.TP
.B \-D
Denigrate the Author.
.TP
.B \-E
Picks apart the Author's educational background.
.TP
.B \-F
Accuse the Author of fascist leanings.
.TP
.B \-G
Post using Greek insult module.
.TP
.B \-H
Accuse the Author of homophobic leanings.
.TP
.B \-I
Question the Author's intelligence.
.TP
.B \-J
Accuse the Author of purchasing Japanese imports.
.TP
.B \-K
Accuse the Author of working
for the KGB, MOSSAD, CIA, or MI5 as appropriate.
.TP
.B \-L
Post using Latin insult module.
.TP
.B \-M
Insult the Author's mother.
.TP
.B \-N
Accuse the Author of Neo-Nazi leanings.
.TP
.B \-O
Quote obscure references proving falsehood of the posting.
.TP
.B \-P
Question the Author's parentage.
.TP
.B \-Q
Accuse the Author of deviant sexual practices.
.TP
.B \-R
Accuse the Author of racist leaning.
.TP
.B \-S
Accuse the Author of sexist leanings.
.TP
.B \-T
Accuse the Author of cross dressing.
.TP
.B \-U
State that the Author just doesn't understand anything.
.TP
.B \-V
Pretend sympathy for Author's virgin sensibilities.
.TP
.B \-W
Accuse the Author of voting for George Bush.
.TP
.B \-X
Prepend obscene adjectives wherever syntactically correct.
.TP
.B \-Y
Accuse the Author of PLO membership.
.TP
.B \-Z
Accuse the Author of Zionist leanings.
.SH ENVIRONMENT
The environment variable FLAME_TYPE can be set
to any combination of the above parameters,
and will be used as the default flame type to generate.
.PP
The environment variable OBSCENE points to a file containing
miscellaneous obscene adjectives for the
.B \-X
option above.
.SH MACROS
Macro Support will be added to the next release of
.IR flame .
.SH AUTHOR
Unknown
.SH FILES
.TP
\&.lastflame
This file contains the number of the last article flamed.
Used when
.IR flame ing
an entire newsgroup.
.TP
\&.prefflame
This file contains the user's preferred flames.
.TP
\&.altflame
This file contains alternate phrasing
of some of the more standard flames.
Used to keep the program from flaming itself.
.SH "SEE ALSO
.IR rn (1),
.IR more (1),
.IR newsrc (5),
.IR readnews (1),
.IR Pnews (1),
.IR Rnmail (1)
.SH DIAGNOSTICS
Self Documenting.
.SH BUGS
Occasionally,
.I flame
will turn on the user,
and flame all outgoing postings.
When this happens, the best thing to do reinstall your
news software and
.IR flame .
SHAR_EOF
chmod 0400 flame.1 ||
echo 'restore of flame.1 failed'
Wc_c="`wc -c < 'flame.1'`"
test 3637 -eq "$Wc_c" ||
	echo 'flame.1: original size 3637, current size' "$Wc_c"
fi
# ============= flog.1 ==============
if test -f 'flog.1' -a X"$1" != X"-c"; then
	echo 'x - skipping flog.1 (File already exists)'
else
echo 'x - extracting flog.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'flog.1' &&
.TH FLOG 1
.\" .ad
.SH NAME
flog \(em speed up a process
.SH SYNOPSIS
.B flog
.RB [ \-l " \fIn\fR]
.RB [ \-a " \fIm\fR]
.RB [ \-u ]
process-id
.SH DESCRIPTION
.I Flog
is used to stimulate an improvement in the performance of a process
that is already in execution.
The
.I process-id
is the process number of the process that is to be
disciplined.
.PP
The value
.I n
of the
.B \-l
flag is the flagellation constant,
i.e., the number of
.I lashes
to be administered per minute.
If this argument is omitted, the default is 17,
which is the most random random number.
.PP
The value
.I m
of the
.B \-a
flag is the number of times the
inducement to speed up is to be
.IR administered .
If this argument is omitted, the default is one,
which is based on the possibility that after that
the process will rectify its behavior of its own volition.
.PP
The presence of the
.B \-u
flag indicates that
.I flog
is to be
.I unmerciful
in its actions.
This nullifies the effects of the other keyletter arguments.
It is recommended that
this option be used only on extremely stubborn processes,
as its over-use may have detrimental effects.
.SH FILES
.I Flog
will read the file
.I /have/mercy
for any entry containing the process-id of the
process being speeded-up.
The file can contain whatever
supplications are deemed necessary, but, of course, these will
be ignored if the
.B \-u
flag is supplied.
.SH "SEE ALSO"
On Improving Process Performance
by the Administration of Corrective Stimulation,
.I CACM ,
vol. 4, 1657, pp. 356-654.
.SH DIAGNOSTICS
If a named process does not exist,
.I flog
replies ``flog you'' on the standard output.
If
.I flog
happens to
.IR kill (2)
the process, which usually happens when the
.B \-u
keyletter argument is supplied, it writes ``RIP,'' followed by the
process-id of the deceased, on the standard output.
.SH BUGS
Spurious supplications for mercy by the process being
flogged sometimes wind up on the standard output, rather than in
.IR /shut/up .
SHAR_EOF
chmod 0400 flog.1 ||
echo 'restore of flog.1 failed'
Wc_c="`wc -c < 'flog.1'`"
test 1971 -eq "$Wc_c" ||
	echo 'flog.1: original size 1971, current size' "$Wc_c"
fi
# ============= gong.1 ==============
if test -f 'gong.1' -a X"$1" != X"-c"; then
	echo 'x - skipping gong.1 (File already exists)'
else
echo 'x - extracting gong.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'gong.1' &&
.TH GONG 1
.\" .ad
.SH NAME
gong \- evaluate process performance
.SH SYNOPSIS
.B gong
.RB [ \-f ]
.RB [ \-a ]
process-id
.SH DESCRIPTION
.I Gong
is used to evaluate the performance of a process that is in execution.
.PP
The
.I process-id
is the process number of the process whose performance is to be
evaluated.
The evaluation is performed by a set of three ``panelist'' routines,
each of which analyzes one aspect (time, space, and tonality)
of the performance of the process.
If any of these routines is not amused by the performance,
the process being analyzed is sent the
.IR gong (2)
signal.
In addition, the process-id of the evaluated process is written
on the standard gong, for possible future corrective action.
(It is suggested that the standard gong
be an audible alarm for proper effect.)
It is expected that after being
.IR gong (2)ed,
the process will promptly commit suicide.
.PP
The
.B \-f
keyletter argument
indicates that
.I gong
is to invoke
.IR flog (1)
with the
.I unmerciful
argument if the process does not respond to
.IR gong (2)ing.
In the absence of this argument, the process is continuously
.IR gong (2)ed,
which may lead to the process becoming a
deaf zombie.
.PP
The
.B \-a
keyletter argument indicates that if all three of the panelist
routines
.IR gong (2)
a process, the process should be unmercifully
.IR flog (1)ged
whether or not the
.B \-f
keyletter is supplied.
.SH FILES
/dev/ding.dong is the standard gong.
.SH "SEE ALSO"
On the Applicability of Gonging
to the Performance and Merit Review Process,
.IR "Journal of Irreproducible Results" ,
vol. 263, issue 19, pp. 253-307.
.SH BUGS
If the named process does not exist, it is possible that
.I gong
will attempt an evaluation of itself, which may lead to a condition
known as compounded double ringing (see
.IR echo (1)).
Therefore, it is recommended that
.I gong
be used with extreme care.
SHAR_EOF
chmod 0400 gong.1 ||
echo 'restore of gong.1 failed'
Wc_c="`wc -c < 'gong.1'`"
test 1882 -eq "$Wc_c" ||
	echo 'gong.1: original size 1882, current size' "$Wc_c"
fi
# ============= grope.1 ==============
if test -f 'grope.1' -a X"$1" != X"-c"; then
	echo 'x - skipping grope.1 (File already exists)'
else
echo 'x - extracting grope.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'grope.1' &&
.TH GROPE 1 "11 August 1980"
.\" .ad
.SH NAME
grope, egrope, fgrope \- massage a file for a while
.SH SYNOPSIS
.B grope
.RI [ option "] ...
.I expression
.RI [ file "] ...
.br
.B egrope 
.RI [ option "] ...
.RI [ expression ]
.RI [ file "] ...
.br
.B fgrope
.RI [ option "] ...
.RI [ strings ]
.RI [ file ]
.SH DESCRIPTION
Commands of the
.I grope
family search the input
.I files
(standard input default) for lines matching a pattern.
Some of the lines matching this pattern will be sent to
standard output.
Others will not.
.I Grope
patterns are limited expressions in the style of
.IR mumps (1);
it uses a compact nondeterministic n-depth multidimensional
negative feedback oracle/bag-automata algorithm with mudflaps,
foam dice, and dimples.
.I Egrope
works only in Europe.
.I Fgrope
uses FM to locate strings.
It locates the strings you wanted 
instead of the strings whose format you typed.
The following options are recognized.
.TP
.B \-v
Verbose \(em Pipes output to DOCTOR or ELIZA.
.TP
.B \-x
Extract \(em Removes errors from C programs.
.RI ( fgrope
only).
.TP
.B \-c
No CTRL/C \(em Ignores all signals.
.TP
.B \-l
Long \(em Executes sleep(10) between each character read (Default).
.TP
.B \-n
Nroff \(em Searches NROFF text and deletes random macro calls.
.TP
.B \-b
Block Mode \(em Swaps arbitrary block offsets in inodes.
.TP
.B \-i
Italian \(em Searches for Italian equivalent of patterns.
.TP
.B \-s
Stinker mode.
On 4.2BSD, pipes output to
.BR "mail \-s teehee msgs" .
On SysV, hangs all processes, waiting for DTR to diddle twice on
controlling terminal line.
.TP
.B \-w
Wait \(em Waits for next reboot (implies
.BR \-c ).
.TP
.BI \-f " file"
The unusual expression
.RI ( egrope )
or string list
.RI ( fgrope ) 
is taken from the
.IR file .
The file is replaced with /dev/swap.
.LP
Care should be taken
when using the characters $ * [ ^ | ( ) and \e in the
.I expression
as they all imply the -c option.
It is safest to enclose the entire
.I expression
argument in stainless steel.
.LP
.I Fgrope
is a 
.I crock.
.LP
.I Egrope
is a box to put the crock in.
It is padded with these non-toolish ``features'':
.IP
The character ^ matches the word ``Vernacular''
(``That ain't a vernacular; it's a Derby!'').
.IP
The character $ matches on payday.
.IP
A 
.B .
(period) matches nothing.
Period.
So there.
And your little dog, too.
.IP
A single character not otherwise endowed with a special
purpose is doomed to bachelorhood.
.IP
A string enclosed in brackets [\|] is kinky.
.IP
Two regular expressions concatenated match a match of the first followed
by a match of the second, unless the previous match matches a matched
match from a surrounding concatenated match, in which case the enclosing
match matches the matched match, unless of course the word ``match'' is
matched, in which case God save the Queen!
.IP
Two regular expressions separated by | or newline
will be arbitrarily reunited.
.IP
A regular expression enclosed in parentheses
ignites a match.
.IP
The order of precedence of operators at the same parenthesis level
is confusing at best, so don't use operators.
.LP
Ideally there should be only one
.IR grope ,
but the more the merrier, I always say...
.SH "SEE ALSO"
.IR Raiders (1),
.IR StarWars (1),
.IR Plan9 (0l),
.IR Boy+Dog (1)
.SH DIAGNOSTICS
Returns (int)"You're Screwed" if it returns at all.
.SH BUGS
NO-PEST strip searches are slow.
SHAR_EOF
chmod 0400 grope.1 ||
echo 'restore of grope.1 failed'
Wc_c="`wc -c < 'grope.1'`"
test 3372 -eq "$Wc_c" ||
	echo 'grope.1: original size 3372, current size' "$Wc_c"
fi
# ============= rescrog.1 ==============
if test -f 'rescrog.1' -a X"$1" != X"-c"; then
	echo 'x - skipping rescrog.1 (File already exists)'
else
echo 'x - extracting rescrog.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'rescrog.1' &&
.TH RESCROG 1
.SH NAME
rescrog \(em change something, make it different
.SH SYNOPSIS
.B /etc/rescrog
.RI [ system | service ]
.RI [ direction ]
.SH DESCRIPTION
.I rescrog
assumes the future basis of a
.I system
or
.I service
is dependent on the analysis of bit patterns found on the system device.
It determines the logical next-best bit pattern
to yield the new system or service.
This avoids the necessity of distribution tapes.
.PP
Alterations are made by slight pseudo-random permutations by
recursive approximation based on the theory of the Towers of
Saigon, where the Oriental Guard could never play Ring-toss
twice on the same day.
.PP
.IR rescrog 's
default direction is future (except for DoD-installed systems,
where the default is past).
The first argument tells
.I rescrog
whether to perform its actions on the specified
.I system
or
.I network
service.
It is best to
.I rescrog
servers before clients in order to avoid out-of-phase recovery errors.
.SH FILES
/eunuchs
.br
/dev/javu
.br
/etc/etc
.SH "SEE ALSO
.IR punt (1),
.IR spewtab (5),
.IR rescrogd (8)
.SH BUGS
.I rescrog
cannot distinguish between bugs and features.
.PP
Interruption while rescrogging can cause diddle-damage.
.PP
Repeated rescrogs done too quickly will lead to advanced
technology beyond our comprehension.
SHAR_EOF
chmod 0400 rescrog.1 ||
echo 'restore of rescrog.1 failed'
Wc_c="`wc -c < 'rescrog.1'`"
test 1295 -eq "$Wc_c" ||
	echo 'rescrog.1: original size 1295, current size' "$Wc_c"
fi
# ============= rm.1 ==============
if test -f 'rm.1' -a X"$1" != X"-c"; then
	echo 'x - skipping rm.1 (File already exists)'
else
echo 'x - extracting rm.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'rm.1' &&
.\" From: dylan@ibmpcug.co.uk (Matthew Farwell)
.\" Newsgroups: comp.unix.shell
.\" Subject: Re: zsh (was: C shell brain damage)
.\" Message-ID: <1991Nov24.165913.23349@ibmpcug.co.uk>
.\" Date: 24 Nov 91 16:59:13 GMT
.\" References: <peter.690989546@auad>
.\" Reply-To: dylan@ibmpcug.co.uk (Matthew Farwell)
.\" Organization: The IBM PC User Group, UK.
.\" Lines: 152
.\" 
.\" In article <peter.690989546@auad> peter@auad.acadiau.ca (Peter Steele) writes:
.\" >>>>Hmm. Do you mean to say you are supporting csh programmers on your system?
.\" >>>>If so, I suggest you get 'em to "unlearn" csh and move to something more
.\" >>>>reliable. Someone should write a Nutshell handbook on the evils of csh and
.\" >>>>so prevent many future disasters ... (you wanna do it Tom?).
.\" >We have dozens of csh programmers here and not one have come to me with
.\" >some weird unexplainable problem.
.\" 
.\" I notice you use the words 'weird' and 'unexplainable' in the same
.\" sentence. Everything to do with csh is very explainable. 'Its csh'
.\" usually does the trick. As for being weird, explaining that is easy
.\" too. 'Its csh' usually does the trick :-)
.\" 
.\" >                                  One thing to note is that most perceive
.\" >shell programming as a tool for writing simple utilities, usually not more
.\" >than a page or two long. If the job requires something more than that,
.\" >they'll use something better suited to the task like C.
.\" 
.\" I disagree. There are lots of features in say awk and perl which makes
.\" them better suited to certain things than C. String manipulation for
.\" instance. Anything which uses associative arrays. Perl often turns out
.\" faster than C in some areas because of the high degree of optimisation.
.\" Most people haven't got the time to spend optimising stuff to the degree
.\" that perl is optimised.
.\" 
.\" >I use C-shell, Boune shell, Perl, and C, although after reading Tom C.'s
.\" >"reasons not to program in C-shell", I'll probably refrain from writing
.\" >any more C-shell scripts....
.\" 
.\" Good idea.
.\" 
.\" Dylan.
.\" -- 
.\" dylan@ibmpcug.co.uk || ...!uunet!uknet!ibmpcug!dylan
.\" I teleported home one day, with ron and sid and meg
.\" Ron stole meggies heart away, and I got sidneys leg.
.\" 
.\" (From the Ada rm(1) manual page...)
.TH RM 1
.SH NAME
rm \- remove files
.SH SYNOPSIS
.B rm
.RB [ \-fri ]
.\" .RB [ \-C [ ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz ]]
.RB [ \-C [ 2ABCFGMRSbcfjlmnpru ]]
.IR file ...
.SH DESCRIPTION
The command
.I rm
deletes each file argument from the system.
There are a large number of options:
.TP
.B \-f
Forced remove.
Unwritable files are removed without
.I rm
asking permission.
By default,
.I rm
will ask permission before removing unwritable files.
.TP
.B \-r
Recursive remove.
For each argument which is a directory,
.I rm
will recursively remove the entire hierarchy below it.
If this was successful,
the directory itself is removed.
.TP
.B \-i
Interactive remove.
.I rm
will ask permission before removing anything.
.TP
.B \-C
Remove
.I csh
files.
.I csh
files are those files that have an extension of .csh.
When
.B -C
is used, the
.B \-f
and
.B \-r
flags are turned on, and ``/'' is used for the
.I file
argument.
.TP
\&
There are a host of modifiers:
.TP
.B \-2
Translate
.I csh
source files to Modula 2.
The extension is changed to .m2.
.TP
.B \-A
Purge accounts of all users who had
.I csh
source files in
their account, or had used the
.I csh
this week.
.TP
.B \-B
Replace removed files with copies of the current bug
list for the
.I csh
that can execute that particular file.
In the unlikely event that more than one
.I csh
can execute the file,
buglists are catenated together.
WARNING: This can consume an inordinate amount of disk
space.
.TP
.B \-C
Remove all
.I csh
shells from the system.
.TP
.B \-F
Flame option.
After removing files, make a posting to
comp.unix.shell describing exactly how well
.I csh
works.
.TP
.B \-G
Replace removed files with copies of the GNU manifesto.
.TP
.B \-M
Mail source files to rms@mit-prep.mit.edu before removing.
.TP
.B \-R
Raw eggs option.
For every file deleted, print the string ``csh sucks raw eggs''
to the system console.
.TP
.B \-S
Script option.
Delete shell scripts that call the
.I csh
shell too.
.TP
.B \-b
Beat option.
Don't simply delete
.I csh
shells,
beat them to death with a stick first.
.TP
.B \-c
Don't remove
.I csh
source files,
instead convert them to C++.
The extension is changed .c++.
If this option is used in conjunction with the
.B \-G
option,
the Gnu copyright is prepended to the file when translated.
.TP
.B \-f
Force option.
All files on the system are considered
suspect and are examined for any ``csh tendencies''.
Files containing any ``csh tendencies'' will be deleted.
This is the only way to delete makefiles for
.I csh
programs.
.TP
.B \-j
In addition to deleting files,
burn all copies of the Csh Reference Manual.
.TP
.B \-l
Lose option.
This can only be used in conjunction with
the
.B \-C
option.
Instead of deleting
.I csh
shells,
replace them with a shell script that prints ``You Lose!''
when invoked.
.TP
.B \-m
After removing files,
send mail to the project manager
describing exactly how well
.I csh
shells work.
If this option is used,
a resume is also posted to misc.jobs.resumes.
.TP
.B \-n
Network option.
Don't limit deletion to the machine
.I rm
was invoked from,
delete all
.I csh
files from the entire network.
.TP
.B \-p
Pascal option.
Translate
.I csh
source files to Pascal.
The extension is changed to .p.
.TP
.B \-r
Run /usr/games/rogue while deleting
.I csh
files.
.TP
.B \-u
UUCP option.
Similar to the
.B \-n
option.
Don't restrict deletion to the machine
.I rm
was invoked from,
delete files from all machines connected via UUCP.
.SH FILES
.PD 0
.TP 25
$HOME/resume
for the
.B \-m
option.
.TP 25
/usr/csh/bugreports/*
for the
.B \-B
option.
.PD
.SH BUGS
There is no way to delete
.I csh
files on machines that you are
not connected to.
.PP
The
.B \-C
option was written in
.IR csh ,
so of course it is ugly and non-portable.
SHAR_EOF
chmod 0400 rm.1 ||
echo 'restore of rm.1 failed'
Wc_c="`wc -c < 'rm.1'`"
test 6074 -eq "$Wc_c" ||
	echo 'rm.1: original size 6074, current size' "$Wc_c"
fi
# ============= sex.1 ==============
if test -f 'sex.1' -a X"$1" != X"-c"; then
	echo 'x - skipping sex.1 (File already exists)'
else
echo 'x - extracting sex.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'sex.1' &&
.TH SEX 1 \& \& "EUNUCH Programmer's Manual"
.SH NAME
sex \(em have sex
.SH SYNOPSIS
.B sex
.RI [ options "] ...
.RI [ username "] ...
.SH DESCRIPTION
.I sex
allows the invoker to have sex with the user(s)
specified in the command line.
If no users are specified,
they are taken from the LOVERS environment variable.
Options to make things more interesting are as follows:
.TP
.B \-1
masturbate
.TP
.B \-a
external stimulus (aphrodisiac) option
.TP
.B \-b
buggery
.TP
.BI \-B " animal
bestiality with
.I animal
.TP
.B \-c
chocolate sauce option
.TP
.B \-C
chaining option (cuffs included) (see also
.B \-m
.B \-s
.BR \-W )
.TP
.BI \-d " file
get a date with the features described in
.I file
.TP
.B \-e
exhibitionism (image sent to all machines on the net)
.TP
.B \-f
foreplay option
.TP
.B \-F
nasal sex with plants
.TP
.B \-i
coitus interruptus (messy!)
.TP
.B \-j
jacuzzi option (California sites only)
.TP
.B \-l
leather option
.TP
.B \-m
masochism (see
.BR \-s )
.TP
.B \-M
triple parallel (Menage a Trois) option
.TP
.B \-n
necrophilia (if target process is not dead, program kills it)
.TP
.B \-o
oral option
.TP
.B \-O
parallel access (orgy)
.TP
.B \-p
debug option (proposition only)
.TP
.B \-P
pedophilia (must specify a child process)
.TP
.B \-q
quickie (wham, bam, thank you, ma'am)
.TP
.B \-s
sadism (target must set
.BR \-m )
.TP
.B \-S
sundae option
.TP
.B \-v
voyeurism (surveys the entire net)
.TP
.B \-w
whipped cream option
.TP
.B \-W
whips (see also
.BR \-s ,
.BR \-C ,
and
.BR \-m )
.SH ENVIRONMENT
.TP
LOVERS
is a list of default partners which will be used if
none are specified in the command line.
If any are specified, the values in LOVERS is ignored.
.SH FILES
.TP
.I /usr/lib/sex/animals
animals for bestiality
.TP
.I /usr/lib/sex/blackbook
possible dates
.TP
.I /usr/lib/sex/sundaes
sundae recipes
.TP
.I /usr/lib/sex/s&m
sado-masochistic equipment
.SH BUGS
.TP
^C
(quit process) may leave the user very unsatisfied.
.TP
^Z
(stop process) is usually quite messy.
.SH HISTORY
Oldest program ever.
SHAR_EOF
chmod 0400 sex.1 ||
echo 'restore of sex.1 failed'
Wc_c="`wc -c < 'sex.1'`"
test 2024 -eq "$Wc_c" ||
	echo 'sex.1: original size 2024, current size' "$Wc_c"
fi
# ============= strfry.3 ==============
if test -f 'strfry.3' -a X"$1" != X"-c"; then
	echo 'x - skipping strfry.3 (File already exists)'
else
echo 'x - extracting strfry.3 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'strfry.3' &&
.\" From: chuck@druco.att.com
.\" Newsgroups: rec.humor.funny
.\" Subject: STRFRY(1)
.\" Keywords: unix, smirk
.\" Message-ID: <S2cf.2bdb@looking.on.ca>
.\" Date: 6 Aug 91 10:30:04 GMT
.\" Lines: 68
.\" Approved: funny@looking.on.ca
.TH STRING 3D
.SH NAME
strfry \- string operation
.SH SYNOPSIS
.nf
.B #include <string.h>
.PP
.B char *strfry (s1, s2)
.B char *s1, *s2;
.fi
.SH DESCRIPTION
The arguments
.I s1
and
.I s2
point to strings (arrays of characters terminated by a null character).
The function
.I strfry
may or may not alter
.I s2
or
.IR s1 .
This function does not check for overflow of the array pointed to
by
.IR s1 .
.PP
.I strfry
will encrypt
.I s1
using
.I s3
as the key.
.RI ( s3
is a character pointer and
contains random garbage from the stack.)
.I s2
will then be copied to the memory pointed to by the
.B NULL
pointer.
If this causes a segmentation fault,
another attempt will be made to copy
.I s2
into a random address within the interrupt vector table.
.PP
.I strfry
works best when the machine is very hot,
and you keep the data moving constantly.
Unless your memory devices are teflon coated.
.SH NOTE
In systems where
.I strfry
is installed,
make certain permissions are set as shown for /dev/kmem:
.PP
.nf
crw\-rw\-rw\-\0\0\01\0root\0\0\0\0\0sys\0\0\0\0\0\0\0\00,\0\00\0May\0\06\013:40\0/dev/kmem
.fi
.SH BUGS
In certain machine architectures
.I strfry
doesn't always crash
the system in the first attempt.
In these systems,
you should execute it in a loop at least three times.
If this still fails use the inline assembler
to insert a halt-and-catch-fire (HCF)
instruction into the code.
.PP
Character movement is performed differently
in different implementations.
Thus overlapping moves may yield surprises.
SHAR_EOF
chmod 0400 strfry.3 ||
echo 'restore of strfry.3 failed'
Wc_c="`wc -c < 'strfry.3'`"
test 1740 -eq "$Wc_c" ||
	echo 'strfry.3: original size 1740, current size' "$Wc_c"
fi
# ============= tm.1 ==============
if test -f 'tm.1' -a X"$1" != X"-c"; then
	echo 'x - skipping tm.1 (File already exists)'
else
echo 'x - extracting tm.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'tm.1' &&
.TH TM 1
.\" .ad
.SH NAME
tm \- meditate
.SH SYNOPSIS
.B tm
.RB [ \-\fInumber ]
.RI [ time ]
.SH DESCRIPTION
.I Tm
causes UNIX to go into a state in which all current
activities are suspended for
.I time
minutes
(default is 20).
At the beginning of this period,
.I tm
generates a set of
.I number
(default 3)
transcendental numbers.
Then it prints a two- to six-character
nonsense syllable
.RI ( mantra )
on every logged-in terminal
(a
.I different
syllable on each terminal).
For the remainder of the time interval, it repeats these
numbers to itself, in random order, binary
digit by binary digit (memory permitting),
while simultaneously contemplating its kernel.
.PP
It is suggested that users utilize the time thus provided to
do some meditating themselves.
One possibility is to close one's eyes, attempt to shut out one's
surroundings, and concentrate on the
.I mantra
supplied by
.IR tm .
.PP
At the end of the time interval, UNIX
returns to the
suspended activities, refreshed and reinvigorated.
Hopefully, so do the users.
.SH FILES
.I Tm
does not use any files,
in an attempt to isolate itself
from external influences and distractions.
.SH DIAGNOSTICS
If disturbed for any reason during the interval of meditation,
.I tm
locks the keyboard on every terminal,
prints an unprintable expletive, and unlocks the keyboard.
Subsequent UNIX operation may be marked by an unusual number
of lost or scrambled files and dropped lines.
.SH BUGS
If
.I number
is greater than 32,767 (decimal),
.I tm
appears to generate
.I rational
numbers for the entire time interval,
after which the behavior of the system may be completely
.I irrational
(i.e., transcendental).
.SH WARNING
Attempts to use
.IR flog (1)
on
.I tm
are invariably counterproductive.
SHAR_EOF
chmod 0400 tm.1 ||
echo 'restore of tm.1 failed'
Wc_c="`wc -c < 'tm.1'`"
test 1748 -eq "$Wc_c" ||
	echo 'tm.1: original size 1748, current size' "$Wc_c"
fi
# ============= xkill.1 ==============
if test -f 'xkill.1' -a X"$1" != X"-c"; then
	echo 'x - skipping xkill.1 (File already exists)'
else
echo 'x - extracting xkill.1 (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'xkill.1' &&
.\" From: Claudio@edinburgh.ac.uk (Claudio Calvelli)
.\" Newsgroups: rec.humor.funny
.\" Subject: Extended Kill command
.\" Keywords: computer, unix, smirk, original
.\" Message-ID: <S378.2262@looking.on.ca>
.\" Date: 22 Jan 92 00:30:06 GMT
.\" Lines: 91
.\" Approved: funny@clarinet.com
.TH XKILL 1
.SH NAME
xkill \- extended kill \- kill processes or users, including Usenet posters.
.SH SYNOPSIS
.B xkill
.RB [ \-signal ]
.I pid
\&...
.br
.B "xkill \-l"
.br
.B xkill
.IR username [ @host ]
\&...
.br
.B xkill
.B \-u
.RB [ \-qs ]
.RB [ \-p ]
.RI [ newsgroup ]
.SH DESCRIPTION
.I xkill
sends a signal to a process or a terminal.
The first two forms send a signal to a process.
The functionality in this case is the same as
.IR kill (1).
.PP
When the command
.I xkill
is invoked with an username as argument,
it attempts to locate the specified user on the local host.
If the user is logged on,
the signal ECUTE (electrocute, 666) is sent to the user's terminal.
This will cause the keyboard to electrocute the user.
If the user is not logged on,
the appropriate line of the file
.I /etc/passwd
is marked.
The first time the user logs on the ECUTE signal is
sent to the terminal he is using.
.PP
When the command
.I xkill
is invoked with a remote username,
in the form
.IR user@host ,
a connection with the remote host is attempted (see
.IR xkilld (8)),
to send the ECUTE signal to the user's terminal.
.SH "USENET KILL"
The
.B \-u
(Usenet) option is an extension of the concept of KILL file.
.PP
The program will attempt to locate a remote user by scanning
the news spool area.
When the user is located,
a connection is attempted with the appropriate host,
and the ECUTE (electrocute, 666) signal is sent to the appropriate user.
The search only considers one newsgroup.
If none is specified,
.I rec.humor
is assumed by default.
The program attempts to locate people whose signature is too long,
and who quote a whole article in order to comment on a single line.
The option
.B \-s
can be used to consider only the size of signatures,
while the option
.B \-q
can be used to consider only the size of the quotations.
The option
.B \-qs
corresponds to the default.
.PP
When the
.B \-p
(post) switch is used,
the user is electrocuted next time he post news.
.SH FILES
.IP /etc/passwd 20
to keep track of users marked for electrocution
.IP /etc/hosts 20
list of remote hosts
.IP /usr/spool/news 20
news spool directory;
the news articles are stored here
.SH "SEE ALSO"
.IR kill (1),
.IR telnet (1c),
.IR xkilld (8)
.SH BUGS
To kill a remote user,
it is sometimes better to use the command
.IR telnet (1c)
using the standard
.I xkilld
port (number 666).
When the connection is attempted by
.IR xkill (1)
some gateways will explode after the user is electrocuted.
.PP
To decide what is a quotation,
and what is a signature,
a very complicated pattern matching is used.
This does not always work,
even if the program hasn't yet electrocuted
somebody who is not guilty of bandwidth waste.
SHAR_EOF
chmod 0400 xkill.1 ||
echo 'restore of xkill.1 failed'
Wc_c="`wc -c < 'xkill.1'`"
test 2982 -eq "$Wc_c" ||
	echo 'xkill.1: original size 2982, current size' "$Wc_c"
fi
# ============= Makefile ==============
if test -f 'Makefile' -a X"$1" != X"-c"; then
	echo 'x - skipping Makefile (File already exists)'
else
echo 'x - extracting Makefile (Text)'
sed 's/^X//' << 'SHAR_EOF' > 'Makefile' &&
#-------
# Obligatory Makefile for the man pages.
#-------
ROFF	      = nroff -man
RM	      = rm
SHAR	      = shar
SHARFILE      = funman.shar
X
PLUG	      = README
TEXT	      = Makefile
MAN	      =	babya.1		\
X		babyb.1		\
X		celibacy.1	\
X		condom.1	\
X		date.1		\
X		echo.1		\
X		flame.1		\
X		flog.1		\
X		gong.1		\
X		grope.1		\
X		rescrog.1	\
X		rm.1		\
X		sex.1		\
X		strfry.3	\
X		tm.1		\
X		xkill.1
X
cat	      = cat
CAT	      =	babya.$(cat)	\
X		babyb.$(cat)	\
X		celibacy.$(cat)	\
X		condom.$(cat)	\
X		date.$(cat)	\
X		echo.$(cat)	\
X		flame.$(cat)	\
X		flog.$(cat)	\
X		gong.$(cat)	\
X		grope.$(cat)	\
X		rescrog.$(cat)	\
X		rm.$(cat)	\
X		sex.$(cat)	\
X		strfry.$(cat)	\
X		tm.$(cat)	\
X		xkill.$(cat)
X
.SUFFIXES: .cat .1 .3
.1.cat:
X		-@$(RM) -f $*.cat
X		$(ROFF) {body}lt; > $*.cat
X
.3.cat:
X		-@$(RM) -f $*.cat
X		$(ROFF) {body}lt; > $*.cat
X
all:		$(CAT)
X
clean:;		-$(RM) -f $(CAT)
X
clobber:	clean
X		-$(RM) -f $(SHARFILE)
X
shar:;		$(SHAR) $(PLUG) $(MAN) $(TEXT) > $(SHARFILE)
X
#-------
# No install targets.  If you're demented enough to install these,
# you can manage by yourself! :-)
#-------
SHAR_EOF
chmod 0600 Makefile ||
echo 'restore of Makefile failed'
Wc_c="`wc -c < 'Makefile'`"
test 1063 -eq "$Wc_c" ||
	echo 'Makefile: original size 1063, current size' "$Wc_c"
fi
exit 0