DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T r

⟦74cdc44e2⟧ TextFile

    Length: 988 (0x3dc)
    Types: TextFile
    Names: »ransom.1«

Derivation

└─⟦b20c6495f⟧ Bits:30007238 EUUGD18: Wien-båndet, efterår 1987
    └─⟦this⟧ »EUUGD18/General/Ransom/ransom.1« 

TextFile

.TH RANSOM 1 "April 1, 1987" "The Hollow Stump" "UNIX Criminal's Manual"
.SH NAME
ransom \- generate a ransom letter for troff
.SH USAGE
.I ransom 
[commands]
.SH DESCRIPTION
.I ransom
reads plain text from the standard input for which it
randomly assigns font, size, and vertical motion control codes
to individual words.
The output should be processed by
.I troff.
The goal is to produce text that looks like it has been
cut out from newspapers and haphazardly glued to a ransom note.
Optionally,
.I troff
commands can be supplied on the command line to aid in the
formatting of the ransom note.
.SH EXAMPLE
The following example makes a fortune look like a ransom note.
It puts the fortune in no-file mode, sets the page offset to one inch,
and spaces one inch before the fun begins.
.ce
fortune | ransom .nf .po1i ".sp 1i" | troff
.SH BUGS
The output is hard to read.
.SH "SEE ALSO
jive(1), valspeak(1), fortune(1) for other wastes of time.
.SH AUTHOR
We need not use any names here.