Lines 1-9
Link Here
|
1 |
.TH RECOVER 6 "9 January 1993" |
1 |
.TH RECOVER 6 "9 January 1993" |
2 |
.UC 4 |
2 |
.UC 4 |
3 |
.SH NAME |
3 |
.SH NAME |
4 |
recover \- recover a NetHack game interrupted by disaster |
4 |
nethack-recover \- recover a NetHack game interrupted by disaster |
5 |
.SH SYNOPSIS |
5 |
.SH SYNOPSIS |
6 |
.B recover |
6 |
.B nethack-recover |
7 |
[ |
7 |
[ |
8 |
.B \-d |
8 |
.B \-d |
9 |
.I directory |
9 |
.I directory |
Lines 21-27
Link Here
|
21 |
The |
21 |
The |
22 |
.I base |
22 |
.I base |
23 |
options tell |
23 |
options tell |
24 |
.I recover |
24 |
.I nethack-recover |
25 |
which files to process. |
25 |
which files to process. |
26 |
Each base option specifies recovery of a separate game. |
26 |
Each base option specifies recovery of a separate game. |
27 |
.PP |
27 |
.PP |
Lines 56-79
Link Here
|
56 |
or "xlock" if the number of concurrent players is being limited. |
56 |
or "xlock" if the number of concurrent players is being limited. |
57 |
It may be necessary to look in the playground to find the correct |
57 |
It may be necessary to look in the playground to find the correct |
58 |
base name of the interrupted game. |
58 |
base name of the interrupted game. |
59 |
.I recover |
59 |
.I nethack-recover |
60 |
will transform these level files into a save file of the same name as |
60 |
will transform these level files into a save file of the same name as |
61 |
.I nethack |
61 |
.I nethack |
62 |
would have used. |
62 |
would have used. |
63 |
.PP |
63 |
.PP |
64 |
Since |
64 |
Since |
65 |
.I recover |
65 |
.I nethack-recover |
66 |
must be able to read and delete files from the playground |
66 |
must be able to read and delete files from the playground |
67 |
and create files in the save directory, |
67 |
and create files in the save directory, |
68 |
it has interesting interactions with game security. |
68 |
it has interesting interactions with game security. |
69 |
Giving ordinary players access to |
69 |
Giving ordinary players access to |
70 |
.I recover |
70 |
.I nethack-recover |
71 |
through setuid or setgid is tantamount to leaving the playground |
71 |
through setuid or setgid is tantamount to leaving the playground |
72 |
world-writable, |
72 |
world-writable, |
73 |
with respect to both cheating and messing up other players. |
73 |
with respect to both cheating and messing up other players. |
74 |
For a single-user system, this of course does not change anything, |
74 |
For a single-user system, this of course does not change anything, |
75 |
so some of the microcomputer ports install |
75 |
so some of the microcomputer ports install |
76 |
.I recover |
76 |
.I nethack-recover |
77 |
by default. |
77 |
by default. |
78 |
.PP |
78 |
.PP |
79 |
For a multi-user system, |
79 |
For a multi-user system, |
Lines 81-102
Link Here
|
81 |
playground to be fed to recover when the host machine boots, |
81 |
playground to be fed to recover when the host machine boots, |
82 |
and handle game crashes individually. |
82 |
and handle game crashes individually. |
83 |
If the user population is sufficiently trustworthy, |
83 |
If the user population is sufficiently trustworthy, |
84 |
.I recover |
84 |
.I nethack-recover |
85 |
can be installed with the same permissions the |
85 |
can be installed with the same permissions the |
86 |
.I nethack |
86 |
.I nethack |
87 |
executable has. |
87 |
executable has. |
88 |
In either case, |
88 |
In either case, |
89 |
.I recover |
89 |
.I nethack-recover |
90 |
is easily compiled from the distribution utility directory. |
90 |
is easily compiled from the distribution utility directory. |
91 |
.SH NOTES |
91 |
.SH NOTES |
92 |
.PP |
92 |
.PP |
93 |
Like |
93 |
Like |
94 |
.I nethack |
94 |
.I nethack |
95 |
itself, |
95 |
itself, |
96 |
.I recover |
96 |
.I nethack-recover |
97 |
will overwrite existing savefiles of the same name. |
97 |
will overwrite existing savefiles of the same name. |
98 |
Savefiles created by |
98 |
Savefiles created by |
99 |
.I recover |
99 |
.I nethack-recover |
100 |
are uncompressed; |
100 |
are uncompressed; |
101 |
they may be compressed afterwards if desired, |
101 |
they may be compressed afterwards if desired, |
102 |
but even a compression-using |
102 |
but even a compression-using |
Lines 106-116
Link Here
|
106 |
nethack(6) |
106 |
nethack(6) |
107 |
.SH BUGS |
107 |
.SH BUGS |
108 |
.PP |
108 |
.PP |
109 |
.I recover |
109 |
.I nethack-recover |
110 |
makes no attempt to find out if a base name specifies a game in progress. |
110 |
makes no attempt to find out if a base name specifies a game in progress. |
111 |
If multiple machines share a playground, this would be impossible to |
111 |
If multiple machines share a playground, this would be impossible to |
112 |
determine. |
112 |
determine. |
113 |
.PP |
113 |
.PP |
114 |
.I recover |
114 |
.I nethack-recover |
115 |
should be taught to use the nethack playground locking mechanism to |
115 |
should be taught to use the nethack playground locking mechanism to |
116 |
avoid conflicts. |
116 |
avoid conflicts. |