URI:
       tmanual updates - tomb - the crypto undertaker
  HTML git clone git://parazyd.org/tomb.git
   DIR Log
   DIR Files
   DIR Refs
   DIR README
   DIR LICENSE
       ---
   DIR commit 75416732ba9995d53d50a9c19a503ed9cb72d528
   DIR parent 5afeaac470002d05abd56e4809bdc7fcc5fd7060
  HTML Author: Jaromil <jaromil@dyne.org>
       Date:   Sun,  6 Feb 2011 17:04:52 +0100
       
       manual updates
       
       Diffstat:
         M doc/tomb.1                          |      36 ++++++++++++++++---------------
       
       1 file changed, 19 insertions(+), 17 deletions(-)
       ---
   DIR diff --git a/doc/tomb.1 b/doc/tomb.1
       t@@ -1,4 +1,4 @@
       -.TH tomb 1 "January 25, 2011" "tomb"
       +.TH tomb 1 "February 6, 2011" "tomb"
        
        .SH NAME
        Tomb \- the Crypto Undertaker
       t@@ -15,34 +15,34 @@ Tomb \- the Crypto Undertaker
        
        .SH DESCRIPTION
        
       -Tomb is a  simple commandline tool for encrypted  storage and it comes
       -complete with programs to facilitate its operation by desktop users.
       +Tomb is an application to manage the creation and access of encrypted
       +storage files: it can be operated from commandline, it integrates with
       +desktop managers and offers a simple graphical interface to facilitate
       +its operation by desktop users.
        
        Tomb generates encrypted  storage files to be opened  and closed using
        their associated  keyfiles, which are  also protected with  a password
        chosen by the user.
        
       -A tomb  is like  a locked  folder that can  be safely  transported and
       -hidden in  a filesystem; its keys  can be kept  separate, for instance
       -keeping the tomb file on your computer harddisk and the key files on a
       -USB stick.
       +A tomb is like a locked folder that can be safely transported and
       +hidden in a filesystem; it encourages users to keep their keys
       +separate from tombs, for instance keeping a tomb file on your computer
       +harddisk and its key file on a USB stick.
        
       -When specified,  \fIfile\fR is the name  of the tomb to  be created or
       -opened,  while \fImountpoint\fR  is  an existing  directory where  its
       -contents should be made accessible.
       +When used from commandline, \fIfile\fR is the name of the tomb to be
       +created or opened, while \fImountpoint\fR is an existing directory
       +where its contents should be made accessible.
        
        For simplified use, the command \fItomb-open\fR can be used to start a
        wizard that guides users in the creation of a new tomb or, if the
        \fIfile\fR argument is specified, to open a tomb and make it
        accessible in a default location under the /media folder.
        
       -The other commands \fItomb-status\fR and \fItomb-askpass\fR are mostly
       -for internal  use (they are called  by tomb with  the right arguments)
       -and serve the purpose of communicating with the user via the graphical
       +The other commands \fItomb-status\fR and \fItomb-askpass\fR are for
       +internal use (they are called by tomb with the right arguments) and
       +serve the purpose of communicating with the user via the graphical
        interface.
        
       -The auxiliary programs \fI
       -
        
        .SH COMMANDS
        .B
       t@@ -82,6 +82,8 @@ Display version and quit
        .B
        .IP "-q"
        Run more quietly
       +.IP "-D"
       +Print more informations while running, for debugging purposes
        
        .SH PRIVILEGE ESCALATION
        
       t@@ -124,8 +126,8 @@ notice are preserved on all copies.
        
        .SH AVAILABILITY
        
       -The  most   recent  version  of   Tomb  sourcecode  and  up   to  date
       -documentation    should    be     available    for    download    from
       +The most recent version of Tomb sourcecode and up to date
       +documentation is available for download from its website on
        \fIhttp://tomb.dyne.org\fR.
        
        .SH SEE ALSO