URI: 
       Add more information in the manpage. - sup - small tool for privilege escalation
  HTML git clone git://bitreich.org/sup git://enlrupgkhuxnvlhsf6lc3fziv5h2hhfrinws65d7roiv6bfj7d652fid.onion/sup
   DIR Log
   DIR Files
   DIR Refs
   DIR Tags
   DIR README
   DIR LICENSE
       ---
   DIR commit e50cc7dcf0d0b8f8550a70d2155739c64b024c15
   DIR parent a1433c21cfd8539d3c34a0d40cc18022dcbfd0c6
  HTML Author: parazyd <parazyd@dyne.org>
       Date:   Mon,  8 Jul 2019 18:05:06 +0200
       
       Add more information in the manpage.
       
       Diffstat:
         M sup.1                               |       6 ++++--
       
       1 file changed, 4 insertions(+), 2 deletions(-)
       ---
   DIR diff --git a/sup.1 b/sup.1
       @@ -1,4 +1,4 @@
       -.TH SUP 1 2019-07-02
       +.TH SUP 1 2019-07-08
        .SH NAME
        sup \- scale user privileges
        .SH SYNOPSIS
       @@ -14,7 +14,9 @@ sup \- scale user privileges
        sup is a minimal privilege escalation utility that allows normal users
        to run other programs as different user and group. It is "secured" by
        hardcoding SHA256 sums of the executables into itself to decide if a
       -user is actually authorized to run the requested command.
       +user is actually authorized to run the requested command. The way sup
       +works is that it is installed as a setuid binary and is statically
       +linked to avoid any possible LD_PRELOAD trickery.
        .TP
        The configuration is done in config.h at compile time.
        .SH OPTIONS