GOLLY(6) Games Manual GOLLY(6)NAME
golly - Conway's Game of Life
SYNOPSIS
golly [wxoptions]pattern-file
DESCRIPTION
golly is a program to simulate Conway's Game of Life.
AUTHOR
Golly was written by Tomas Rokicki <rokicki@gmail.com> and Andrew Trevorrow <andrew@trevorrow.com>.
January 31, 2008 GOLLY(6)
Check Out this Related Man Page
ggz.modules(5) GGZ Gaming Zone ggz.modules(5)NAME
ggz.modules - GGZ Gaming Zone module configuration file
DESCRIPTION
The GGZ Gaming Zone uses the file ggz.modules in order to configure which game modules are properly installed. The only approved method of
altering this file is using the ggz-config utility, however the file structure is documented here in order to facilitate manual repairs if
necessary.
PARAMETERS
The ggz.modules file is formattted in sections, each of which begins with a [SectionID] line. The first (required) section is [Games].
This section is followed by any number of game-specific sections named [g#].
The [Games] section is formatted as follows:
[Games]
*GameList* = GameName1 GameName2 ...
GameName1 = g1 g2 ...
GameName2 = g3 ...
*GameList*
Should be set to a list of all the game names which are currently installed. Each name should appear once and only once, and should
be the internal game name (eg: NetSpades) and not the full descriptive name of the game.
GameNameX
Should equal a game name from the *GameList*, a real world example would be NetSpades. It should be set to a list of unique game
section ID's of the form g#. Each game section ID must be the name of a section ID which follows in the file. The ID's need not be
in any specific order, and ID numbers may be skipped but NOT repeated.
A game section is formatted as follows:
[g#]
Author = Game's Author
CommandLine = /path/to/command [optionlist]
Frontend = FECODE
Homepage = URL to Game's homepage
Name = GameName
Protocol = ProtocolVersion
Version = GameVersion
Most of these parameters are self explanatory, however the following may need clarification:
[g#] This section code ID must be present in one of the game lists in the [Games] section above.
FECODE The frontend code should be set to either gtk or kde depending on which user interface the game was designed for. Note that the
game is expected to work with either the GTK+ or KDE clients, assuming that the user has the proper windowing system installed.
GameName
This must equal the game name (in the [Games] section) which properly points to this [g#] section.
ProtocolVersion
This will be used to match an installed game client with the protocol version currently used by the game server. This allows a new
game client to be installed, while retaining the old client for backwards compatibility with older servers.
GameVersion
This is simply the version of the game client itself. It need not be the same version as the game server as long as the Proto-
colVersion ID matches.
FILES
@ggzconfdir@/ggz.modules
AUTHORS
The GGZ Development Team <ggz-dev@mail.ggzgamingzone.org>
SEE ALSO ggz-config(6), ggz(7)The GGZ Development Team 0.0.14 ggz.modules(5)
I have written a shell script function, this function reads a encrypted a file and does some processing. I want to give execute permissions to others but I don't want to give read access to the shell script function. Since the shell script function know how to open the encrypted file so that's why... (6 Replies)
Hi,
I am trying to process line by line of a file. But I should not be allocating static allocation for reading the contents of the file. The memory should be dynamically allocated. The confusion here is how do I determine the size of each line, put it into a buffer with the memory allocated... (11 Replies)
As the title implies I'm taking the jump into linux compiling for os x - Mostly out of desperation.
I have a project that hinges on a CLI app called arss (The Analysis & Resynthesis Sound Spectrograph) (note that it used to be called arse;)
it converst bmp into wav files.
All works fine... (4 Replies)
Hi,
I'm hopin' ya can give me an idea or two here.
I'm writing a file transfer tracking program. Users login via FTP or https. These users have NO shell access. I'll get to that in a minute. When they upload or download a file, a script is invoked to log the transfer in a database,... (9 Replies)