|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix |
BABY(1) USER COMMANDS BABY(1) NAME baby - create new process from two parents SYNOPSIS baby -sex [m|f] [-name name] DESCRIPTION baby is initiated when one parent process polls another server process through a socket connection in the BSD ver- sion or through pipes in the System V implementation. baby runs at low priority for approximately forty weeks and then terminates with a heavy system load. Most systems require constant monitoring when baby reaches its final stages of execution. Older implementations of baby did not require both initiat- ing processes to be present at the time of completion. In those versions the initiating process which was not present was awakened and notified of the results upon completion. It has since been determined that the presence of both parent processes result in a generally lower system load at completion, and thus current versions of baby expect both parent processes to be active during the final stages. Successful completion of baby results in the creation and naming of a new process. Parent processes then broadcast messages to all other processes, local and remote, informing them of their new status. OPTIONS -sex define the gender of the created process -name assign the name name to the new process EXAMPLES baby -sex f -name Jacqueline completed successfully on July 9, 1992 at 9:11pm. Jacqueline's vital statistics: 8 pounds 3 oz, 20 inches, long dark hair. The parent process, Kim Dunbar, is report- edly doing fine. SEE ALSO cigar(6), dump(5), cry(3). BUGS Despite its complexity, baby only knows one signal, SIGCHLD, (or SIGCLD in the System V implementation), which it uses to contact the parent processes. One or both parent processes must then inspect the baby process to determine the cause of the signal. The sleep(1) command may not work as expected on either parent process for some time afterward, as each new instance of baby sends intermittent signals to the parent processes which must be handled by the parents immediately. A baby process will frequently dump core, requiring either or both parent processes to clean up after it. Despite the reams of available documentation on invoking and maintaining baby, most parent processes are overwhelmed. AUTHORS From a man page by Joe Beck,. ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ CONDOM(1) USER COMMANDS CONDOM(1) NAME condom - protection against viruses and prevention of child processes SYNOPSIS condom [options] [processid] DESCRIPTION condom provides protection against System Transmitted Viruses (STVs) that may invade your system. Although the spread of such viruses across a network can only be abated by aware and cautious users, condom is the only highly effective means of preventing viruses from entering your system (see celibacy(1)). Any data passed to condom by the protected process will be blocked, as specified by the value of the -s option (see OPTIONS below). condom is known to defend against the following viruses and other malicious afflictions: o+ AIDS o+ Herpes Simplex (genital varieties) o+ Syphilis o+ Crabs o+ Genital warts o+ Gonhorrea o+ Chlamydia o+ Michelangelo o+ Jerusalem When used alone or in conjunction with pill(1), sponge(1), foam(1), and/or setiud(3), condom also prevents the concep- tion of a child process. If invoked from within a synchro- nous process, condom has, by default, an 80% chance of preventing the external processes from becoming parent processes (see the -s option below). When other process contraceptives are used, the chance of preventing a child process from being forked becomes much greater. See pill(1), sponge(1), foam(1), and setiud(3) for more informa- tion. If no options are given, the current user's login process (as determined by the environment variable USER) is pro- tected with a Trojan rough-cut latex condom without a reser- voir tip. The optional ``processid'' argument is an integer specifying the process to protect. NOTE: condom may only be used with a hard disk. condom will terminate abnormally with exit code -1 if used with a floppy disk (see DIAGNOSTICS below). OPTIONS The following options may be given to condom: -b brand brands are as follows: trojan (default) ramses sheik goldcoin fourex -m material The valid materials are: latex (default) saranwrap membrane WARNING! The membrane option is not endorsed by the System Administrator General as an effective barrier against certain viruses. It is supported only for the sake of tradi- tion. -f flavor The following flavors are currently supported: plain (default) apple banana cherry cinnamon licorice orange peppermint raspberry spearmint strawberry -r Toggle reservoir tip (default is no reservoir tip) -s strength strength is an integer between 20 and 100 specifying the resilience of condom against data passed to condom by the protected process. Using a larger value of strength increases condom's protective abilities, but also reduces interprocess communication. A smaller value of strength increases interprocess communication, but also increases the likelihood of a security breach. An extremely vigorous process or one passing an enormous amount of data to condom will increase the chance of condom's failure. The default strength is 80%. -t texture Valid textures are: rough (default) ribbed bumps lubricated (provides smoother interaction between processes) WARNING: The use of an external application to condom in order to reduce friction between processes has been proven in benchmark tests to decrease condom's strength factor! If execution speed is important to your process, use the ``-t lubricated'' option. DIAGNOSTICS condom terminates with one of the following exit codes: -1 An attempt was made to use condom on a floppy disk. 0 condom exited successfully (no data was passed to the synchronous process). 1 condom failed and data was allowed through. The danger of transmission of an STV or the forking of a child process is inversely proportional to the number of other protections employed and is directly proportional to the ages of the processes involved. BUGS condom is NOT 100% effective at preventing a child process from being forked or at deterring the invasion of a virus (although the System Administrator General has deemed that condom is the most effective means of preventing the spread of system transmitted viruses). See celibacy(1) for infor- mation on a 100% effective program for preventing these problems. Remember, the use of sex(1) and other related routines should only occur between mature, consenting processes. If you must use sex(1), please employ condom to protect your process and your synchronous process. If we are all respon- sible, we can stop the spread of STVs. AUTHORS and HISTORY The original version of condom was released in Roman times and was only marginally effective. With the advent of modern technology, condom now supports many more options and is much more effective. The current release of condom was written by Ken Maupin at the University of Washington ([email protected]) and was last updated on 10/7/92. SEE ALSO celibacy(1), sex(1), pill(1), sponge(1), foam(1), and setiud(3) ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ FLAME(1) USER COMMANDS FLAME(1) NAME flame - reply to Usenet News posting automatically SYNOPSIS flame [options] [filename] DESCRIPTION Flame is a AI tool providing an automated method for reply- ing to articles posted to Usenet News. Special care is paid to allow the user to specify the type of reply he desires. The following options are supported by flame: -- Take input from stdin. -x regexp Crosspost to all newsgroups matching regexp. -n number Post this reply number times. -b Reply in BIFF MODE. -d Delay response until original posting expires. -m Misdirect to a random Author. -r ROT13 quotes from original posting. -g regexp Reply to all messages in newsgroups matching regexp. -A Call the Author Assh*le in 12 languages. -B Bait the Author. -C Accuse the Author of communist leanings. -D Denigrate the Author. -E Picks apart the Author's educational background. -F Accuse the Author of fascist leanings. -G Post using Greek insult module. -H Accuse the Author of homophobic leanings. -I Question the Author's intelligence. -J Accuse the Author of purchasing Japanese imports. -K Accuse the Author of working for the KGB, MOSSAD, CIA, or MI5 as appropriate. -L Post using Latin insult module. -M Insult the Author's mother. -N Accuse the Author of Neo-Nazi leanings. -O Quote obscure references proving falsehood of the post- ing. -P Question the Author's parentage. -Q Accuse the Author of deviant sexual practices. -R Accuse the Author of racist leaning. -S Accuse the Author of sexist leanings. -T Accuse the Author of cross dressing. -U State that the Author just doesn't understand anything. -V Pretend sympathy for Author's virgin sensibilities. -W Accuse the Author of voting for George Bush. -X Prepend obscene adjectives wherever syntactically correct. -Y Accuse the Author of PLO membership. -Z Accuse the Author of Zionist leanings. ENVIRONMENT The environment variable FLAMETYPE can be set to any combi- nation of the above parameters, and will be used as the default flame type to generate. The environment variable OBSCENE points to a file containing miscellaneous obscene adjectives for the -X option above. MACROS Macro Support will be added to the next release of flame. AUTHOR Unknown FILES .lastflame This file contains the number of the last article flamed. Used when flameing an entire newsgroup. .prefflame This file contains the user's preferred flames. .altflame This file contains alternate phrasing of some of the more standard flames. Used to keep the program from flaming itself. SEE ALSO rn(1), more(1), newsrc(5), readnews(1), Pnews(1), Rnmail(1) DIAGNOSTICS Self Documenting. BUGS Occasionally, flame will turn on the user, and flame all outgoing postings. When this happens, the best thing to do reinstall your news software and flame. ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ XKILL(1) USER COMMANDS XKILL(1) NAME xkill - extended kill - kill processes or users, including Usenet posters. SYNOPSIS xkill [-signal] pid ... xkill -l xkill username[@host] ... xkill -u [-qs] [-p] [newsgroup] DESCRIPTION xkill sends a signal to a process or a terminal. The first two forms send a signal to a process. The functionality in this case is the same as kill(1). When the command xkill is invoked with an username as argu- ment, it attempts to locate the specified user on the local host. If the user is logged on, the signal ECUTE (electro- cute, 666) is sent to the user's terminal. This will cause the keyboard to electrocute the user. If the user is not logged on, the appropriate line of the file /etc/passwd is marked. The first time the user logs on the ECUTE signal is sent to the terminal he is using. When the command xkill is invoked with a remote username, in the form user@host, a connection with the remote host is attempted (see xkilld(8)), to send the ECUTE signal to the user's terminal. USENET KILL The -u (Usenet) option is an extension of the concept of KILL file. The program will attempt to locate a remote user by scanning the news spool area. When the user is located, a connection is attempted with the appropriate host, and the ECUTE (elec- trocute, 666) signal is sent to the appropriate user. The search only considers one newsgroup. If none is specified, rec.humor is assumed by default. The program attempts to locate people whose signature is too long, and who quote a whole article in order to comment on a single line. The option -s can be used to consider only the size of signa- tures, while the option -q can be used to consider only the size of the quotations. The option -qs corresponds to the default. When the -p (post) switch is used, the user is electrocuted next time he post news. FILES /etc/passwd to keep track of users marked for elec- trocution /etc/hosts list of remote hosts /usr/spool/news news spool directory; the news articles are stored here SEE ALSO kill(1), telnet(1c), xkilld(8) BUGS To kill a remote user, it is sometimes better to use the command telnet(1c) using the standard xkilld port (number 666). When the connection is attempted by xkill(1) some gateways will explode after the user is electrocuted. To decide what is a quotation, and what is a signature, a very complicated pattern matching is used. This does not always work, even if the program hasn't yet electrocuted somebody who is not guilty of bandwidth waste. ---------------------------------------------------------------------------- SEX(6) EUNUCH Programmer's Manual SEX(6) NAME sex - have sex SYNOPSIS sex [ options ] ... [ username ] ... DESCRIPTION _s_e_x allows the invoker to have sex with the user(s) speci- fied in the command line. If no users are specified, they are taken from the LOVERS environment variable. Options to make things more interesting are as follows: -1 masturbate -a external stimulus (aphrodisiac) option -b buggery -B bestiality with -c chocolate sauce option -C chaining option (cuffs included) (see also -m -s -W) -d get a date with the features described in -e exhibitionism (image sent to all machines on the net) -f foreplay option -F nasal sex with plants -i coitus interruptus (messy!) -j jacuzzi option (California sites only) -l leather option -m masochism (see -s) -M triple parallel (Menage a Trois) option -n necrophilia (if target process is not dead, program kills it) -o oral option -O parallel access (orgy) -p debug option (proposition only) -P pedophilia (must specify a child process) Printed 2/15/87 2/15/87 1 SEX(6) EUNUCH Programmer's Manual SEX(6) -q quickie (wham, bam, thank you, ma'am) -s sadism (target must set -m) -S sundae option -T voice-net sex via standard uucp autodialer facilities; area code prefix of 900 is assumed. -v voyeurism (surveys the entire net) -w whipped cream option -W whips (see also -s, -C, and -m) ENVIRONMENT LOVERS is a list of default partners which will be used if none are specified in the command line. If any are specified, the values in LOVERS is ignored. FILES /usr/lib/sex/animals animals for bestiality /usr/lib/sex/blackbook possible dates /usr/lib/sex/sundaes sundae recipes /usr/lib/sex/s&m sado-masochistic equipment BUGS ^C (quit process) may leave the user very unsatisfied. ^Z (stop process) is usually quite messy. MAN AUTHOR Author prefers to be anonymous. HISTORY Oldest program ever.
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March, 12, 2019