summaryrefslogtreecommitdiffstats
path: root/usr.bin/shar/shar.1
diff options
context:
space:
mode:
Diffstat (limited to 'usr.bin/shar/shar.1')
-rw-r--r--usr.bin/shar/shar.110
1 files changed, 5 insertions, 5 deletions
diff --git a/usr.bin/shar/shar.1 b/usr.bin/shar/shar.1
index d44fe64..09adc5e 100644
--- a/usr.bin/shar/shar.1
+++ b/usr.bin/shar/shar.1
@@ -56,9 +56,9 @@ utility does this correctly).
The
.Nm
command is normally used for distributing files by
-.Xr ftp 1
+.Xr ftp 1
or
-.Xr mail 1 .
+.Xr mail 1 .
.Sh SEE ALSO
.Xr compress 1 ,
.Xr mail 1 ,
@@ -79,7 +79,7 @@ It is easy to insert trojan horses into
files.
It is strongly recommended that all shell archive files be examined
before running them through
-.Xr sh 1 .
+.Xr sh 1 .
Archives produced using this implementation of
.Nm
may be easily examined with the command:
@@ -88,11 +88,11 @@ egrep -v '^[X#]' shar.file
.Ed
.Sh EXAMPLES
To create a shell archive of the program
-.Xr ls 1
+.Xr ls 1
and mail it to Rick:
.Bd -literal -offset indent
cd ls
-shar `find . -print` \&| mail -s "ls source" rick
+shar `find . -print` \&| mail -s "ls source" rick
.Ed
.Pp
To recreate the program directory:
OpenPOWER on IntegriCloud