From e4078fb254b61fa6cdb8a02967b2aa2543f40439 Mon Sep 17 00:00:00 2001 From: wiz Date: Sat, 8 Dec 2001 19:14:31 +0000 Subject: [PATCH] Sort sections. --- usr.bin/shar/shar.1 | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/usr.bin/shar/shar.1 b/usr.bin/shar/shar.1 index 5dd00e088566..a57d506c5493 100644 --- a/usr.bin/shar/shar.1 +++ b/usr.bin/shar/shar.1 @@ -1,4 +1,4 @@ -.\" $NetBSD: shar.1,v 1.8 2000/02/08 23:48:54 abs Exp $ +.\" $NetBSD: shar.1,v 1.9 2001/12/08 19:14:31 wiz Exp $ .\" .\" Copyright (c) 1990, 1993 .\" The Regents of the University of California. All rights reserved. @@ -58,15 +58,6 @@ is normally used for distributing files by .Xr ftp 1 or .Xr mail 1 . -.Sh SEE ALSO -.Xr compress 1 , -.Xr mail 1 , -.Xr uuencode 1 , -.Xr tar 1 -.Sh BUGS -.Nm -makes no provisions for special types of files or files containing -magic characters. .Sh EXAMPLES To create a shell archive of the program .Xr ls 1 @@ -85,11 +76,20 @@ cd ls \&... sh archive .Ed +.Sh SEE ALSO +.Xr compress 1 , +.Xr mail 1 , +.Xr tar 1 , +.Xr uuencode 1 .Sh HISTORY The .Nm command appeared in .Bx 4.4 . +.Sh BUGS +.Nm +makes no provisions for special types of files or files containing +magic characters. .Sh SECURITY CONSIDERATIONS It is easy to insert trojan horses into .Nm