} ZOT(1) USER COMMANDS ZOT(1)
}
} NAME
}
} <ZOT> - Destroy stupid or unworthy supplicants, political enemies, and
} other undesirables.
}
} SYNOPSIS
}
} zot [-] [-V {victim}] [-A] [-S] [-X {spared}] [-R {victim}]
}
} DESCRIPTION
}
} Zot is used as a tool of instantaneous agonizing punishment. It causes
} the victim to, for a brief instant, experience the most incredible pain
} anyone can imagine and then vanish.
}
} OPTIONS
}
} -V indicates the victim of choice. If -V is not used, the software
} will autoselect and <ZOT> Thor.
}
} -A indicates Zot All. This is an emergency measure that will <ZOT>
} everybody within a two-mile radius. The -A flag has never been
} tested.
}
} -S causes zot to autoselect the Supplicant. More about this later.
}
} -X indicates Except. Like -A, this flag causes the <ZOT> ing of a
} two-mile radius, but sparing chosen persons. Unlike -A, -X HAS
} been tested and works perfectly.
}
} -R indicates the dreaded Recursive <ZOT> After <ZOT>ing the chosen
} victim, zot then goes after the victim's family, starting with
} siblings, then parents, and ultimately will not stop until 100
} family members have been <ZOT>ed.
}
} WARNING
}
} Zot is a true UNIX abnormality - a one-user command. The only user
} with access privileges high enough to use zot is The Usenet Oracle.
} Zot is self-protecting; through an incredibly advanced artificial
} intelligence program it identifies and <ZOT>s any would-be hackers who
} might try to use this poweful command. So far, zot has had a perfect
} record; the only entity in the known and unknown universes who has ever
} wielded the power of the <ZOT> is the Great and Powerful Oracle (tm).
}
} You owe The Oracle an HP48SX with <ZOT> software and a NeXT interface
} cable.
|