Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

pbmtog3(1) [ultrix man page]

pbmtog3(1)						      General Commands Manual							pbmtog3(1)

NAME
pbmtog3 - convert a portable bitmap into a Group 3 fax file SYNOPSIS
pbmtog3 [pbmfile] DESCRIPTION
Reads a portable bitmap as output. Produces a Group 3 fax file as input. REFERENCES
The standard for Group 3 fax is defined in CCITT Recommendation T.4. BUGS
Probably. SEE ALSO
g3topbm(1), pbm(5) AUTHOR
Copyright (C) 1989 by Paul Haeberli <paul@manray.sgi.com>. 02 October 1989 pbmtog3(1)

Check Out this Related Man Page

g3topbm(1)						      General Commands Manual							g3topbm(1)

NAME
g3topbm - convert a Group 3 fax file into a portable bitmap SYNOPSIS
g3topbm [-kludge] [-reversebits] [-stretch] [g3file] DESCRIPTION
Reads a Group 3 fax file as input. Produces a portable bitmap as output. OPTIONS
-kludge Tells g3topbm to ignore the first few lines of the file; sometimes fax files have some junk at the beginning. -reversebits Tells g3topbm to interpret bits least-significant first, instead of the default most-significant first. Apparently some fax modems do it one way and others do it the other way. If you get a whole bunch of "bad code word" messages, try using this flag. -stretch Tells g3topbm to stretch the image vertically by duplicating each row. This is for the low-quality transmission mode. All flags can be abbreviated to their shortest unique prefix. REFERENCES
The standard for Group 3 fax is defined in CCITT Recommendation T.4. BUGS
Probably. SEE ALSO
pbmtog3(1), pbm(5) AUTHOR
Copyright (C) 1989 by Paul Haeberli <paul@manray.sgi.com>. 02 October 1989 g3topbm(1)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

A short history of UNIX by l.madden@ic.ac.uk

<h1>A short history of UNIX</h1> <p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell Laboratories, which is the research arm of the giant American corporation ATT. He and many colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
Discussion started by: Neo
0 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. Programming

How do you detect keystrokes in canonical mode?

I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
Discussion started by: Ultrix
4 Replies

4. UNIX for Dummies Questions & Answers

Linux (Ubuntu) = Unix (NOT IMPORTANT - NO RUSH)

I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu. In other words is there kind of an equal Linux with Unix? Also what do I need to... (10 Replies)
Discussion started by: Linux_Guy
10 Replies

5. IP Networking

Can I change my hostname without messing things up?

I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies