05-24-2017
Heh, I wrote an incomplete snake clone a few years ago on my SparcStation LX running Gentoo. I'll post a link to a video of it once I get a chance who knows I might even dig up the source and see about finishing it. It's just plain ncurses... and uses a pretty inefficient implementation so the longer your "Wooly Bear" as I called it gets the slower it runs! Here is a link to a video of my LX running and me dorking around with it
SparcStation LX booting Gentoo Linux - YouTube
Last edited by cb88; 05-24-2017 at 11:35 PM..
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hello everyone. I am new to these forums and also new to Unix. And by saying "new to Unix" I mean I have never used it and 10 minutes ago was asked to start learning. So here I am.
I was wondering if anyone could help me find out how long it would take to write code in Unix that will do the... (1 Reply)
Discussion started by: idesaj
1 Replies
2. UNIX for Dummies Questions & Answers
Hi there..
I know this is a kind low question, but do anyone know where I can find some hints and or clues for the "adventure" game on UNIX ?
( /usr/games/adventure ).
I already searched on this forum but didnt find the answer to my question.
Thanks a lot.... (3 Replies)
Discussion started by: TARFU
3 Replies
3. UNIX for Advanced & Expert Users
Hi, there are some servers here at work which issue a Safeword challenge after I login. Can anyone tell me exactly how the challenge/response system works? In particular, how are the valid keys decided? (2 Replies)
Discussion started by: blowtorch
2 Replies
4. Shell Programming and Scripting
I have the following text
Microsoft iSCSI Initiator version 2.0 Build 3497
Targets List:
iqn.2001-05.com.equallogic:0-8a0906-daef43402-138000002a4477ba-grsrv12-extra
iqn.2001-05.com.equallogic:0-8a0906-986f43402-520000002b447951-exchange
... (9 Replies)
Discussion started by: netmedic
9 Replies
5. Shell Programming and Scripting
Here's a regex substitution operation that has stumped me with sed:
How do you convert lines like this:
first.key ?{x.y.z}
second.key ?{xa.ys.zz.s}
third.key ?{xa.k}
to:
first.key ?{x_y_z}
second.key ?{xa_ys_zz_s}
third.key ?{xa_k}
So i'm basically converting all the... (11 Replies)
Discussion started by: neked
11 Replies
6. Shell Programming and Scripting
Ok then i Have a challenge for you :
Give me PS1 so that it always display the least 2 levels of directory
(except if i am above of course)
I want it this way :
so if i go to
/
/home/
/home/user
/home/user/whatever
/home/user/whatever1/whatever2
my PS1 should respectively... (12 Replies)
Discussion started by: ctsgnb
12 Replies
7. UNIX for Dummies Questions & Answers
I've been given a directory full of subdirectories full of logfiles of the same name:
/logfiles/day1/file1/blockednodes.csv
day1-14
file1-48
The above is the actual directory structure for 14 days worth of a logfile that is generated every 30 minutes. It's been done this way to preserve the... (15 Replies)
Discussion started by: Cludgie
15 Replies
8. Shell Programming and Scripting
Hi,
I am designing snake and ladder game in unix. I am writing my script in bash shell in Solaris version.
This game is designed by me for which I would like to give access to two players.
When these players execute the game, there should be communication between the three participants(game... (7 Replies)
Discussion started by: ayarlaga
7 Replies
9. Shell Programming and Scripting
I have searched through google, and this forum to try and find the answer, but alas, nothing quite hits the whole answer.
I am trying to read the last line (or lines) of some log files. I do this often.
The files are named sequentially, using the date as part of the file name, and appending... (18 Replies)
Discussion started by: BatterBits
18 Replies
DM(8) BSD System Manager's Manual DM(8)
NAME
dm -- dungeon master
SYNOPSIS
ln -s dm game
DESCRIPTION
dm is a program used to regulate game playing. dm expects to be invoked with the name of a game that a user wishes to play. This is done by
creating symbolic links to dm, in the directory /usr/games for all of the regulated games. The actual binaries for these games should be
placed in a ``hidden'' directory, /usr/lib/games/dm, that may only be accessed by the dm program. dm determines if the requested game is
available and, if so, runs it. The file /etc/dm.conf controls the conditions under which games may be run.
The file /etc/nogames may be used to ``turn off'' game playing. If the file exists, no game playing is allowed; the contents of the file
will be displayed to any user requesting a game.
FILES
/etc/dm.conf configuration file
/etc/nogames turns off game playing
/usr/lib/games/dm directory of ``real'' binaries
/var/games/games.log game logging file
SEE ALSO
dm.conf(5)
HISTORY
The dm command appeared in 4.3BSD-Tahoe.
SECURITY CONSIDERATIONS
Two issues result from dm running the games setgid ``games''. First, all games that allow users to run UNIX commands should carefully set
both the real and effective group ids immediately before executing those commands. Probably more important is that dm never be setgid any-
thing but ``games'' so that compromising a game will result only in the user's ability to play games at will. Secondly, games which previ-
ously had no reason to run setgid and which accessed user files may have to be modified.
BSD
May 31, 1993 BSD