WORMS(6) BSD Games Manual WORMS(6)NAME
worms -- animate worms on a display terminal
SYNOPSIS
worms [-ft] [-d delay] [-l length] [-n number]
DESCRIPTION
A UNIX version of the DEC-2136 program ``worms''.
The options are as follows:
-f Makes a ``field'' for the worm(s) to eat.
-t Makes each worm leave a trail behind it.
-d Specifies a delay, in milliseconds, between each update. This is useful for fast terminals. Reasonable values are around 20-200.
The default is 0.
-l Specifies a length for each worm; the default is 16.
-n Specifies the number of worms; the default is 3.
May 31, 1993
Check Out this Related Man Page
XScreenSaver(1) General Commands Manual XScreenSaver(1)NAME
worm - multicolored worms that crawl around the screen.
SYNOPSIS
worm [-display host:display.screen] [-visual visual] [-window] [-root] [-count number] [-delay number] [-ncolors number] [-size number]
DESCRIPTION
An ancient hack that draws multicolored worms that crawl around the screen.
OPTIONS -visual visual
Specify which visual to use. Legal values are the name of a visual class, or the id number (decimal or hex) of a specific visual.
-window Draw on a newly-created window. This is the default.
-root Draw on the root window.
-count number
Count. -100 - 100. Default: -20.
-delay number
Per-frame delay, in microseconds. Default: 17000 (0.02 seconds.).
-ncolors number
Number of Colors. Default: 150.
-size number
Size. -20 - 20. Default: -3.
ENVIRONMENT
DISPLAY to get the default host and display number.
XENVIRONMENT
to get the name of a resource file that overrides the global resources stored in the RESOURCE_MANAGER property.
SEE ALSO X(1), xscreensaver(1)COPYRIGHT
Copyright (C) 2002 by Brad Taylor, Dave Lemke, Boris Putanec, and Henrik Theiling. Permission to use, copy, modify, distribute, and sell
this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all
copies and that both that copyright notice and this permission notice appear in supporting documentation. No representations are made
about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
AUTHOR
Brad Taylor, Dave Lemke, Boris Putanec, and Henrik Theiling.
X Version 11XScreenSaver(1)
Dear experts
I have a 200MG text file in this format:
text \tab number
I try to sort using options -fd and it takes very long! is that normal or I can speed it up in some ways?
I dont want to split the file since this one is already splitted.
I use this command: sort -fd file >... (12 Replies)
Hi - little introductory post for this thread:
The discussion started in the "What's your most useful shell?" poll thread and I think the discussion's gone on long enough that I don't want new posts related to that discussion to go there any more. It's a big discussion and it only gets bigger. ... (26 Replies)
Writing my script and I'm banging my head on the desk right now ...
My biggest problem is the 3rd IF statement where I check if the username exists. Doing the grep command on it's own in the shell gives me a 1 or 0 value. Running the script, it always returns a false value (runs the ELSE... (4 Replies)
Hello,
I have to find all directories, which contain files, but dont have subdirectories.
For example if i have tree like:
├── kat11
│ ├── kat21
│ │ └── Dokument\ bez\ nazwy
│ └── kat22
│ ├── kat31
│ │ └── Dokument\ bez\ nazwy
│ └── kat32
│ └──... (13 Replies)
Hey all. I am working on some scripts in bash to perform a variety of functions; there are a variety of steps involved, and they must happen in a specific sequence; what I need help with is a way to calculate some differences in a timestamp in a logfile.
One of the steps in the scripts I am... (3 Replies)
I am unable to change my password even in root (recovery mode), or to unlock it. I can still access my account, but without password protection. In GUI Administrator account 'disabled' is displayed.
This is what I have done so far:
In root:#usermod -U roy
usermod:cannot lock /etc/passwd;... (9 Replies)
Hi !
It is a general question.
When an awk script looks like:
#! bin/awk
function example(i){
<body>
}
{
example(1) #the function uses input_1 and return output_a
}
{
example(2) #the function uses previous output_a as an input and returns... (15 Replies)
Hi!
If your working directory contains a file you want to work on, or give as an argument, you don't have to give the explicit pathname, just the filename, like so:
$ vi while_loop.ksh
But if you want execute an executable file, you must supply the explicate pathname, like so:
./while_loop.ksh... (20 Replies)
Hello, we have a UNIX system the runs our business data.
We have 4 users that use a particular batch command file to extract data for use in the Windows side of the fence: (despreg.bat)
ftp
ftp> open danapak (database name)
connected to danapak
ftp> user ccsb
password ccsb
ftp>... (29 Replies)
How to convert name.sql file into name.csv file.
Basically my input source file is .sql file, I need to verify data after the import of that exported sql file.
Thanks for any help. (3 Replies)
Hi All,
I want to write a domain specific REST/HTTP server to run on FreeBSD. I have control over both the server side and the primary client intended to consume the service.
My question is: how do you think it should be designed to support multiple connections, given:
It will run on a... (6 Replies)
Hi, I am relatively new to firewalls and netfilter. I have a Debian Stretch router box running dnsmasq, connected to a VPN. Occasionally dnsmasq polls all of the desired DNS servers to select the fastest. When it does this it responds to replies of the non-selected DNS servers with a icmp type... (0 Replies)