aboutsummaryrefslogtreecommitdiff
path: root/misc
diff options
context:
space:
mode:
authorSilvio Rhatto <rhatto@riseup.net>2014-09-18 16:47:55 -0300
committerSilvio Rhatto <rhatto@riseup.net>2014-09-18 16:47:55 -0300
commitb4e2708c6f8cc2191c581aef404803478e65e678 (patch)
tree703d3f7f8f96d9564e7cc3f8ebf85a38c93ab3e1 /misc
parent4fdd3ebb2b0622fb6cff7376a02a5b92c1aba2ae (diff)
downloadscripts-b4e2708c6f8cc2191c581aef404803478e65e678.tar.gz
scripts-b4e2708c6f8cc2191c581aef404803478e65e678.tar.bz2
Moved scripts to custom repos
Diffstat (limited to 'misc')
-rwxr-xr-xmisc/dupbackup51
-rwxr-xr-xmisc/email/checkmail14
-rwxr-xr-xmisc/email/eml2mbox/eml2mbox.rb265
-rw-r--r--misc/email/eml2mbox/licence.txt458
-rwxr-xr-xmisc/email/estripa-emails.c50
-rwxr-xr-xmisc/email/vcard-filter154
-rwxr-xr-xmisc/parse-remind41
-rw-r--r--misc/sed/entities.sed24
-rwxr-xr-xmisc/sed/justify.sed68
-rw-r--r--misc/sed/mail-iso2txt.sed55
-rw-r--r--misc/sed/mini-html2latex.sed9
-rw-r--r--misc/sed/syndication.sed27
-rwxr-xr-xmisc/sed/twiki-to-tiki.sed14
-rw-r--r--misc/sed/unicode-zoado.sed11
-rwxr-xr-xmisc/sed/wrap-forced.sed46
-rw-r--r--misc/sed/yahoogroups-kill-sig.sed248
-rwxr-xr-xmisc/telneter22
-rwxr-xr-xmisc/wifi16
18 files changed, 0 insertions, 1573 deletions
diff --git a/misc/dupbackup b/misc/dupbackup
deleted file mode 100755
index f020c36..0000000
--- a/misc/dupbackup
+++ /dev/null
@@ -1,51 +0,0 @@
-#!/bin/bash
-#
-# dupbackup: duplicity wrapper
-# feedback: rhatto at riseup.net
-#
-# dupbackup is free software; you can redistribute it and/or modify it under the
-# terms of the GNU General Public License as published by the Free Software
-# Foundation; either version 2 of the License, or any later version.
-#
-# common.sh is distributed in the hope that it will be useful, but WITHOUT ANY
-# WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
-# A PARTICULAR PURPOSE. See the GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License along with
-# this program; if not, write to the Free Software Foundation, Inc., 59 Temple
-# Place - Suite 330, Boston, MA 02111-1307, USA
-
-# Usage: dupbackup <host> [option]
-
-USER="`whoami`"
-LOCAL_FOLDER="/mnt/crypt/home/$USER/"
-REMOVE_OLDER_THAN="3M"
-KEY=""
-HOST="$1"
-OPTION="$2"
-
-# Load configuration
-if [ -e "$HOME/.config/scripts/dupbackup" ]; then
- source $HOME/.config/scripts/dupbackup
-fi
-
-if [ ! -z "$HOST" ]; then
- DEST="/var/backups/remote/$USER/duplicity"
- DEST="scp://$USER@$HOST/$DEST"
-else
- DEST="file:///var/backups/users/$USER/duplicity"
-fi
-
-if [ -z "$OPTION" ]; then
- OPTION="incr"
-fi
-
-mkdir -p $LOCAL_FOLDER/tmp/duplicity
-
-duplicity $OPTION -v6 --full-if-older-than $REMOVE_OLDER_THAN \
- --allow-source-mismatch --encrypt-key $KEY \
- --sign-key $KEY $LOCAL_FOLDER $DEST \
- --tempdir $LOCAL_FOLDER/tmp/duplicity \
- --exclude $LOCAL_FOLDER/tmp/duplicity
-
-duplicity remove-older-than $REMOVE_OLDER_THAN $DEST --force
diff --git a/misc/email/checkmail b/misc/email/checkmail
deleted file mode 100755
index 078f111..0000000
--- a/misc/email/checkmail
+++ /dev/null
@@ -1,14 +0,0 @@
-#!/bin/bash
-#
-# Simple mail counter
-# Inspired by http://www.vivaolinux.com.br/dicas/verDica.php?codigo=2432
-#
-
-# Fetch and compute
-FETCH=`fetchmail -c`
-TOTAL=`echo $FETCH | awk '{ print $1 }'`
-SEEN=`echo $FETCH | awk '{ print $3 }' | sed -e 's/(//'`
-NEW=`echo "$TOTAL - $SEEN" | bc`
-
-# Display response
-echo $NEW/$TOTAL
diff --git a/misc/email/eml2mbox/eml2mbox.rb b/misc/email/eml2mbox/eml2mbox.rb
deleted file mode 100755
index 1fc7bca..0000000
--- a/misc/email/eml2mbox/eml2mbox.rb
+++ /dev/null
@@ -1,265 +0,0 @@
-#!/usr/bin/ruby
-#============================================================================================#
-# eml2mbox.rb v0.08 #
-# Last updated: Jan 23, 2004 #
-# #
-# Converts a bunch of eml files into one mbox file. #
-# #
-# Usage: [ruby] eml2mbx.rb [-c] [-l] [-s] [-yz] [emlpath [trgtmbx]] #
-# Switches: #
-# -c Remove CRs (^M) appearing at end of lines (Unix) #
-# -l Remove LFs appearing at beggining of lines (old Mac) - not tested #
-# -s Don't use standard mbox postmark formatting (for From_ line) #
-# This will force the use of original From and Date found in mail headers. #
-# Not recommended, unless you really have problems importing emls. #
-# -yz Use this to force the order of the year and timezone in date in the From_ #
-# line from the default [timezone][year] to [year][timezone]. #
-# emlpath - Path of dir with eml files. Defaults to the current dir if not specified #
-# trgtmbx - Name of the target mbox file. Defaults to "archive.mbox" in 'emlpath' #
-# #
-# Ruby homepage: http://www.ruby-lang.org/en/ #
-# Unix mailbox format: http://www.broobles.com/eml2mbox/mbox.html #
-# This script : http://www.broobles.com/eml2mbox #
-# #
-#============================================================================================#
-# Licence: #
-# #
-# This script is free software; you can redistribute it and/or modify it under the terms of #
-# the GNU Lesser General Public License as published by the Free Software Foundation; #
-# either version 2.1 of the License, or (at your option) any later version. #
-# #
-# You should have received a copy of the GNU Lesser General Public License along with this #
-# script; if not, please visit http://www.gnu.org/copyleft/gpl.html for more information. #
-#============================================================================================#
-
-require "parsedate"
-
-include ParseDate
-
-#=======================================================#
-# Class that encapsulates the processing file in memory #
-#=======================================================#
-
-class FileInMemory
-
- ZoneOffset = {
- # Standard zones by RFC 2822
- 'UTC' => '0000',
- 'UT' => '0000', 'GMT' => '0000',
- 'EST' => '-0500', 'EDT' => '-0400',
- 'CST' => '-0600', 'CDT' => '-0500',
- 'MST' => '-0700', 'MDT' => '-0600',
- 'PST' => '-0800', 'PDT' => '-0700',
- }
-
- def initialize()
- @lines = Array.new
- @counter = 1 # keep the 0 position for the From_ line
- @from = nil # from part of the From_ line
- @date = nil # date part of the From_ line
- end
-
- def addLine(line)
- # If the line is a 'false' From line, add a '>' to its beggining
- line = line.sub(/From/, '>From') if line =~ /^From/ and @from!=nil
-
- # If the line is the first valid From line, save it (without the line break)
- if line =~ /^From:\s.*@/ and @from==nil
- @from = line.sub(/From:/,'From')
- @from = @from.chop # Remove line break(s)
- @from = standardizeFrom(@from) unless $switches["noStandardFromLine"]
- end
-
- # Get the date
- if $switches["noStandardFromLine"]
- # Don't parse the content of the Date header
- @date = line.sub(/Date:\s/,'') if line =~ /^Date:\s/ and @date==nil
- else
- if line =~ /^Date:\s/ and @date==nil
- # Parse content of the Date header and convert to the mbox standard for the From_ line
- @date = line.sub(/Date:\s/,'')
- year, month, day, hour, minute, second, timezone, wday = parsedate(@date)
- # Need to convert the timezone from a string to a 4 digit offset
- unless timezone =~ /[+|-]\d*/
- timezone=ZoneOffset[timezone]
- end
- time = Time.gm(year,month,day,hour,minute,second)
- @date = formMboxDate(time,timezone)
- end
- end
-
- # Now add the line to the array
- line = fixLineEndings(line)
- @lines[@counter]=line
- @counter+=1
- end
-
- # Forms the first line (from + date) and returns all the lines
- # Returns all the lines in the file
- def getProcessedLines()
- if @from != nil
- # Add from and date to the first line
- if @date==nil
- puts "WARN: Failed to extract date. Will use current time in the From_ line"
- @date=formMboxDate(Time.now,nil)
- end
- @lines[0] = @from + " " + @date
-
- @lines[0] = fixLineEndings(@lines[0])
- @lines[@counter] = ""
- return @lines
- end
- # else don't return anything
- end
-
- # Fixes CR/LFs
- def fixLineEndings(line)
- line = removeCR(line) if $switches["removeCRs"];
- line = removeLF(line) if $switches["removeLFs"];
- return line
- end
-
- # emls usually have CR+LF (DOS) line endings, Unix uses LF as a line break,
- # so there's a hanging CR at the end of the line when viewed on Unix.
- # This method will remove the next to the last character from a line
- def removeCR(line)
- line = line[0..-3]+line[-1..-1] if line[-2]==0xD
- return line
- end
-
- # Similar to the above. This one is for Macs that use CR as a line break.
- # So, remove the last char
- def removeLF(line)
- line = line[0..-2] if line[-1]==0xA
- return line
- end
-
-end
-
-#================#
-# Helper methods #
-#================#
-
-# Converts: 'From "some one <aa@aa.aa>" <aa@aa.aa>' -> 'From aa@aa.aa'
-def standardizeFrom(fromLine)
- # Get indexes of last "<" and ">" in line
- openIndex = fromLine.rindex('<')
- closeIndex = fromLine.rindex('>')
- if openIndex!=nil and closeIndex!=nil
- fromLine = fromLine[0..4]+fromLine[openIndex+1..closeIndex-1]
- end
- # else leave as it is - it is either already well formed or is invalid
- return fromLine
-end
-
-# Returns a mbox postmark formatted date.
-# If timezone is unknown, it is skipped.
-# mbox date format used is described here:
-# http://www.broobles.com/eml2mbox/mbox.html
-def formMboxDate(time,timezone)
- if timezone==nil
- return time.strftime("%a %b %d %H:%M:%S %Y")
- else
- if $switches["zoneYearOrder"]
- return time.strftime("%a %b %d %H:%M:%S "+timezone.to_s+" %Y")
- else
- return time.strftime("%a %b %d %H:%M:%S %Y "+timezone.to_s)
- end
- end
-end
-
-
-# Extracts all switches from the command line and returns
-# a hashmap with valid switch names as keys and booleans as values
-# Moves real params to the beggining of the ARGV array
-def extractSwitches()
- switches = Hash.new(false) # All switches (values) default to false
- i=0
- while (ARGV[i]=~ /^-/) # while arguments are switches
- if ARGV[i]=="-c"
- switches["removeCRs"] = true
- puts "\nWill fix lines ending with a CR"
- elsif ARGV[i]=="-l"
- switches["removeLFs"] = true
- puts "\nWill fix lines beggining with a LF"
- elsif ARGV[i]=="-s"
- switches["noStandardFromLine"] = true
- puts "\nWill use From and Date from mail headers in From_ line"
- elsif ARGV[i]=="-yz"
- switches["zoneYearOrder"] = true
- puts "\nTimezone will be placed before the year in From_ line"
- else
- puts "\nUnknown switch: "+ARGV[i]+". Ignoring."
- end
- i = i+1
- end
- # Move real arguments to the beggining of the array
- ARGV[0] = ARGV[i]
- ARGV[1] = ARGV[i+1]
- return switches
-end
-
-#===============#
-# Main #
-#===============#
-
- $switches = extractSwitches()
-
- # Extract specified directory with emls and the target archive (if any)
- emlDir = "." # default if not specified
- emlDir = ARGV[0] if ARGV[0]!=nil
- mboxArchive = emlDir+"/archive.mbox" # default if not specified
- mboxArchive = ARGV[1] if ARGV[1] != nil
-
- # Show specified settings
- puts "\nSpecified dir : "+emlDir
- puts "Specified file: "+mboxArchive+"\n"
-
- # Check that the dir exists
- if FileTest.directory?(emlDir)
- Dir.chdir(emlDir)
- else
- puts "\n["+emlDir+"] is not a directory (might not exist). Please specify a valid dir"
- exit(0)
- end
-
- # Check if destination file exists. If yes allow user to select an option.
- canceled = false
- if FileTest.exist?(mboxArchive)
- print "\nFile ["+mboxArchive+"] exists! Please select: [A]ppend [O]verwrite [C]ancel (default) "
- sel = STDIN.gets.chomp
- if sel == 'A' or sel == 'a'
- aFile = File.new(mboxArchive, "a");
- elsif sel == 'O' or sel == 'o'
- aFile = File.new(mboxArchive, "w");
- else
- canceled = true
- end
- else
- # File doesn't exist, open for writing
- aFile = File.new(mboxArchive, "w");
- end
-
- if not canceled
- puts
- files = Dir["*.eml"]
- if files.size == 0
- puts "No *.eml files in this directory. mbox file not created."
- aFile.close
- File.delete(mboxArchive)
- exit(0)
- end
- # For each .eml file in the specified directory do the following
- files.each() do |x|
- puts "Processing file: "+x
- thisFile = FileInMemory.new()
- File.open(x).each {|item| thisFile.addLine(item) }
- lines = thisFile.getProcessedLines
- if lines == nil
- puts "WARN: File ["+x+"] doesn't seem to have a regular From: line. Not included in mbox"
- else
- lines.each {|line| aFile.puts line}
- end
- end
- aFile.close
- end
diff --git a/misc/email/eml2mbox/licence.txt b/misc/email/eml2mbox/licence.txt
deleted file mode 100644
index 3b20440..0000000
--- a/misc/email/eml2mbox/licence.txt
+++ /dev/null
@@ -1,458 +0,0 @@
- GNU LESSER GENERAL PUBLIC LICENSE
- Version 2.1, February 1999
-
- Copyright (C) 1991, 1999 Free Software Foundation, Inc.
- 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
- Everyone is permitted to copy and distribute verbatim copies
- of this license document, but changing it is not allowed.
-
-[This is the first released version of the Lesser GPL. It also counts
- as the successor of the GNU Library Public License, version 2, hence
- the version number 2.1.]
-
- Preamble
-
- The licenses for most software are designed to take away your
-freedom to share and change it. By contrast, the GNU General Public
-Licenses are intended to guarantee your freedom to share and change
-free software--to make sure the software is free for all its users.
-
- This license, the Lesser General Public License, applies to some
-specially designated software packages--typically libraries--of the
-Free Software Foundation and other authors who decide to use it. You
-can use it too, but we suggest you first think carefully about whether
-this license or the ordinary General Public License is the better
-strategy to use in any particular case, based on the explanations below.
-
- When we speak of free software, we are referring to freedom of use,
-not price. Our General Public Licenses are designed to make sure that
-you have the freedom to distribute copies of free software (and charge
-for this service if you wish); that you receive source code or can get
-it if you want it; that you can change the software and use pieces of
-it in new free programs; and that you are informed that you can do
-these things.
-
- To protect your rights, we need to make restrictions that forbid
-distributors to deny you these rights or to ask you to surrender these
-rights. These restrictions translate to certain responsibilities for
-you if you distribute copies of the library or if you modify it.
-
- For example, if you distribute copies of the library, whether gratis
-or for a fee, you must give the recipients all the rights that we gave
-you. You must make sure that they, too, receive or can get the source
-code. If you link other code with the library, you must provide
-complete object files to the recipients, so that they can relink them
-with the library after making changes to the library and recompiling
-it. And you must show them these terms so they know their rights.
-
- We protect your rights with a two-step method: (1) we copyright the
-library, and (2) we offer you this license, which gives you legal
-permission to copy, distribute and/or modify the library.
-
- To protect each distributor, we want to make it very clear that
-there is no warranty for the free library. Also, if the library is
-modified by someone else and passed on, the recipients should know
-that what they have is not the original version, so that the original
-author's reputation will not be affected by problems that might be
-introduced by others.
-
- Finally, software patents pose a constant threat to the existence of
-any free program. We wish to make sure that a company cannot
-effectively restrict the users of a free program by obtaining a
-restrictive license from a patent holder. Therefore, we insist that
-any patent license obtained for a version of the library must be
-consistent with the full freedom of use specified in this license.
-
- Most GNU software, including some libraries, is covered by the
-ordinary GNU General Public License. This license, the GNU Lesser
-General Public License, applies to certain designated libraries, and
-is quite different from the ordinary General Public License. We use
-this license for certain libraries in order to permit linking those
-libraries into non-free programs.
-
- When a program is linked with a library, whether statically or using
-a shared library, the combination of the two is legally speaking a
-combined work, a derivative of the original library. The ordinary
-General Public License therefore permits such linking only if the
-entire combination fits its criteria of freedom. The Lesser General
-Public License permits more lax criteria for linking other code with
-the library.
-
- We call this license the "Lesser" General Public License because it
-does Less to protect the user's freedom than the ordinary General
-Public License. It also provides other free software developers Less
-of an advantage over competing non-free programs. These disadvantages
-are the reason we use the ordinary General Public License for many
-libraries. However, the Lesser license provides advantages in certain
-special circumstances.
-
- For example, on rare occasions, there may be a special need to
-encourage the widest possible use of a certain library, so that it becomes
-a de-facto standard. To achieve this, non-free programs must be
-allowed to use the library. A more frequent case is that a free
-library does the same job as widely used non-free libraries. In this
-case, there is little to gain by limiting the free library to free
-software only, so we use the Lesser General Public License.
-
- In other cases, permission to use a particular library in non-free
-programs enables a greater number of people to use a large body of
-free software. For example, permission to use the GNU C Library in
-non-free programs enables many more people to use the whole GNU
-operating system, as well as its variant, the GNU/Linux operating
-system.
-
- Although the Lesser General Public License is Less protective of the
-users' freedom, it does ensure that the user of a program that is
-linked with the Library has the freedom and the wherewithal to run
-that program using a modified version of the Library.
-
- The precise terms and conditions for copying, distribution and
-modification follow. Pay close attention to the difference between a
-"work based on the library" and a "work that uses the library". The
-former contains code derived from the library, whereas the latter must
-be combined with the library in order to run.
-
- GNU LESSER GENERAL PUBLIC LICENSE
- TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
-
- 0. This License Agreement applies to any software library or other
-program which contains a notice placed by the copyright holder or
-other authorized party saying it may be distributed under the terms of
-this Lesser General Public License (also called "this License").
-Each licensee is addressed as "you".
-
- A "library" means a collection of software functions and/or data
-prepared so as to be conveniently linked with application programs
-(which use some of those functions and data) to form executables.
-
- The "Library", below, refers to any such software library or work
-which has been distributed under these terms. A "work based on the
-Library" means either the Library or any derivative work under
-copyright law: that is to say, a work containing the Library or a
-portion of it, either verbatim or with modifications and/or translated
-straightforwardly into another language. (Hereinafter, translation is
-included without limitation in the term "modification".)
-
- "Source code" for a work means the preferred form of the work for
-making modifications to it. For a library, complete source code means
-all the source code for all modules it contains, plus any associated
-interface definition files, plus the scripts used to control compilation
-and installation of the library.
-
- Activities other than copying, distribution and modification are not
-covered by this License; they are outside its scope. The act of
-running a program using the Library is not restricted, and output from
-such a program is covered only if its contents constitute a work based
-on the Library (independent of the use of the Library in a tool for
-writing it). Whether that is true depends on what the Library does
-and what the program that uses the Library does.
-
- 1. You may copy and distribute verbatim copies of the Library's
-complete source code as you receive it, in any medium, provided that
-you conspicuously and appropriately publish on each copy an
-appropriate copyright notice and disclaimer of warranty; keep intact
-all the notices that refer to this License and to the absence of any
-warranty; and distribute a copy of this License along with the
-Library.
-
- You may charge a fee for the physical act of transferring a copy,
-and you may at your option offer warranty protection in exchange for a
-fee.
-
- 2. You may modify your copy or copies of the Library or any portion
-of it, thus forming a work based on the Library, and copy and
-distribute such modifications or work under the terms of Section 1
-above, provided that you also meet all of these conditions:
-
- a) The modified work must itself be a software library.
-
- b) You must cause the files modified to carry prominent notices
- stating that you changed the files and the date of any change.
-
- c) You must cause the whole of the work to be licensed at no
- charge to all third parties under the terms of this License.
-
- d) If a facility in the modified Library refers to a function or a
- table of data to be supplied by an application program that uses
- the facility, other than as an argument passed when the facility
- is invoked, then you must make a good faith effort to ensure that,
- in the event an application does not supply such function or
- table, the facility still operates, and performs whatever part of
- its purpose remains meaningful.
-
- (For example, a function in a library to compute square roots has
- a purpose that is entirely well-defined independent of the
- application. Therefore, Subsection 2d requires that any
- application-supplied function or table used by this function must
- be optional: if the application does not supply it, the square
- root function must still compute square roots.)
-
-These requirements apply to the modified work as a whole. If
-identifiable sections of that work are not derived from the Library,
-and can be reasonably considered independent and separate works in
-themselves, then this License, and its terms, do not apply to those
-sections when you distribute them as separate works. But when you
-distribute the same sections as part of a whole which is a work based
-on the Library, the distribution of the whole must be on the terms of
-this License, whose permissions for other licensees extend to the
-entire whole, and thus to each and every part regardless of who wrote
-it.
-
-Thus, it is not the intent of this section to claim rights or contest
-your rights to work written entirely by you; rather, the intent is to
-exercise the right to control the distribution of derivative or
-collective works based on the Library.
-
-In addition, mere aggregation of another work not based on the Library
-with the Library (or with a work based on the Library) on a volume of
-a storage or distribution medium does not bring the other work under
-the scope of this License.
-
- 3. You may opt to apply the terms of the ordinary GNU General Public
-License instead of this License to a given copy of the Library. To do
-this, you must alter all the notices that refer to this License, so
-that they refer to the ordinary GNU General Public License, version 2,
-instead of to this License. (If a newer version than version 2 of the
-ordinary GNU General Public License has appeared, then you can specify
-that version instead if you wish.) Do not make any other change in
-these notices.
-
- Once this change is made in a given copy, it is irreversible for
-that copy, so the ordinary GNU General Public License applies to all
-subsequent copies and derivative works made from that copy.
-
- This option is useful when you wish to copy part of the code of
-the Library into a program that is not a library.
-
- 4. You may copy and distribute the Library (or a portion or
-derivative of it, under Section 2) in object code or executable form
-under the terms of Sections 1 and 2 above provided that you accompany
-it with the complete corresponding machine-readable source code, which
-must be distributed under the terms of Sections 1 and 2 above on a
-medium customarily used for software interchange.
-
- If distribution of object code is made by offering access to copy
-from a designated place, then offering equivalent access to copy the
-source code from the same place satisfies the requirement to
-distribute the source code, even though third parties are not
-compelled to copy the source along with the object code.
-
- 5. A program that contains no derivative of any portion of the
-Library, but is designed to work with the Library by being compiled or
-linked with it, is called a "work that uses the Library". Such a
-work, in isolation, is not a derivative work of the Library, and
-therefore falls outside the scope of this License.
-
- However, linking a "work that uses the Library" with the Library
-creates an executable that is a derivative of the Library (because it
-contains portions of the Library), rather than a "work that uses the
-library". The executable is therefore covered by this License.
-Section 6 states terms for distribution of such executables.
-
- When a "work that uses the Library" uses material from a header file
-that is part of the Library, the object code for the work may be a
-derivative work of the Library even though the source code is not.
-Whether this is true is especially significant if the work can be
-linked without the Library, or if the work is itself a library. The
-threshold for this to be true is not precisely defined by law.
-
- If such an object file uses only numerical parameters, data
-structure layouts and accessors, and small macros and small inline
-functions (ten lines or less in length), then the use of the object
-file is unrestricted, regardless of whether it is legally a derivative
-work. (Executables containing this object code plus portions of the
-Library will still fall under Section 6.)
-
- Otherwise, if the work is a derivative of the Library, you may
-distribute the object code for the work under the terms of Section 6.
-Any executables containing that work also fall under Section 6,
-whether or not they are linked directly with the Library itself.
-
- 6. As an exception to the Sections above, you may also combine or
-link a "work that uses the Library" with the Library to produce a
-work containing portions of the Library, and distribute that work
-under terms of your choice, provided that the terms permit
-modification of the work for the customer's own use and reverse
-engineering for debugging such modifications.
-
- You must give prominent notice with each copy of the work that the
-Library is used in it and that the Library and its use are covered by
-this License. You must supply a copy of this License. If the work
-during execution displays copyright notices, you must include the
-copyright notice for the Library among them, as well as a reference
-directing the user to the copy of this License. Also, you must do one
-of these things:
-
- a) Accompany the work with the complete corresponding
- machine-readable source code for the Library including whatever
- changes were used in the work (which must be distributed under
- Sections 1 and 2 above); and, if the work is an executable linked
- with the Library, with the complete machine-readable "work that
- uses the Library", as object code and/or source code, so that the
- user can modify the Library and then relink to produce a modified
- executable containing the modified Library. (It is understood
- that the user who changes the contents of definitions files in the
- Library will not necessarily be able to recompile the application
- to use the modified definitions.)
-
- b) Use a suitable shared library mechanism for linking with the
- Library. A suitable mechanism is one that (1) uses at run time a
- copy of the library already present on the user's computer system,
- rather than copying library functions into the executable, and (2)
- will operate properly with a modified version of the library, if
- the user installs one, as long as the modified version is
- interface-compatible with the version that the work was made with.
-
- c) Accompany the work with a written offer, valid for at
- least three years, to give the same user the materials
- specified in Subsection 6a, above, for a charge no more
- than the cost of performing this distribution.
-
- d) If distribution of the work is made by offering access to copy
- from a designated place, offer equivalent access to copy the above
- specified materials from the same place.
-
- e) Verify that the user has already received a copy of these
- materials or that you have already sent this user a copy.
-
- For an executable, the required form of the "work that uses the
-Library" must include any data and utility programs needed for
-reproducing the executable from it. However, as a special exception,
-the materials to be distributed need not include anything that is
-normally distributed (in either source or binary form) with the major
-components (compiler, kernel, and so on) of the operating system on
-which the executable runs, unless that component itself accompanies
-the executable.
-
- It may happen that this requirement contradicts the license
-restrictions of other proprietary libraries that do not normally
-accompany the operating system. Such a contradiction means you cannot
-use both them and the Library together in an executable that you
-distribute.
-
- 7. You may place library facilities that are a work based on the
-Library side-by-side in a single library together with other library
-facilities not covered by this License, and distribute such a combined
-library, provided that the separate distribution of the work based on
-the Library and of the other library facilities is otherwise
-permitted, and provided that you do these two things:
-
- a) Accompany the combined library with a copy of the same work
- based on the Library, uncombined with any other library
- facilities. This must be distributed under the terms of the
- Sections above.
-
- b) Give prominent notice with the combined library of the fact
- that part of it is a work based on the Library, and explaining
- where to find the accompanying uncombined form of the same work.
-
- 8. You may not copy, modify, sublicense, link with, or distribute
-the Library except as expressly provided under this License. Any
-attempt otherwise to copy, modify, sublicense, link with, or
-distribute the Library is void, and will automatically terminate your
-rights under this License. However, parties who have received copies,
-or rights, from you under this License will not have their licenses
-terminated so long as such parties remain in full compliance.
-
- 9. You are not required to accept this License, since you have not
-signed it. However, nothing else grants you permission to modify or
-distribute the Library or its derivative works. These actions are
-prohibited by law if you do not accept this License. Therefore, by
-modifying or distributing the Library (or any work based on the
-Library), you indicate your acceptance of this License to do so, and
-all its terms and conditions for copying, distributing or modifying
-the Library or works based on it.
-
- 10. Each time you redistribute the Library (or any work based on the
-Library), the recipient automatically receives a license from the
-original licensor to copy, distribute, link with or modify the Library
-subject to these terms and conditions. You may not impose any further
-restrictions on the recipients' exercise of the rights granted herein.
-You are not responsible for enforcing compliance by third parties with
-this License.
-
- 11. If, as a consequence of a court judgment or allegation of patent
-infringement or for any other reason (not limited to patent issues),
-conditions are imposed on you (whether by court order, agreement or
-otherwise) that contradict the conditions of this License, they do not
-excuse you from the conditions of this License. If you cannot
-distribute so as to satisfy simultaneously your obligations under this
-License and any other pertinent obligations, then as a consequence you
-may not distribute the Library at all. For example, if a patent
-license would not permit royalty-free redistribution of the Library by
-all those who receive copies directly or indirectly through you, then
-the only way you could satisfy both it and this License would be to
-refrain entirely from distribution of the Library.
-
-If any portion of this section is held invalid or unenforceable under any
-particular circumstance, the balance of the section is intended to apply,
-and the section as a whole is intended to apply in other circumstances.
-
-It is not the purpose of this section to induce you to infringe any
-patents or other property right claims or to contest validity of any
-such claims; this section has the sole purpose of protecting the
-integrity of the free software distribution system which is
-implemented by public license practices. Many people have made
-generous contributions to the wide range of software distributed
-through that system in reliance on consistent application of that
-system; it is up to the author/donor to decide if he or she is willing
-to distribute software through any other system and a licensee cannot
-impose that choice.
-
-This section is intended to make thoroughly clear what is believed to
-be a consequence of the rest of this License.
-
- 12. If the distribution and/or use of the Library is restricted in
-certain countries either by patents or by copyrighted interfaces, the
-original copyright holder who places the Library under this License may add
-an explicit geographical distribution limitation excluding those countries,
-so that distribution is permitted only in or among countries not thus
-excluded. In such case, this License incorporates the limitation as if
-written in the body of this License.
-
- 13. The Free Software Foundation may publish revised and/or new
-versions of the Lesser General Public License from time to time.
-Such new versions will be similar in spirit to the present version,
-but may differ in detail to address new problems or concerns.
-
-Each version is given a distinguishing version number. If the Library
-specifies a version number of this License which applies to it and
-"any later version", you have the option of following the terms and
-conditions either of that version or of any later version published by
-the Free Software Foundation. If the Library does not specify a
-license version number, you may choose any version ever published by
-the Free Software Foundation.
-
- 14. If you wish to incorporate parts of the Library into other free
-programs whose distribution conditions are incompatible with these,
-write to the author to ask for permission. For software which is
-copyrighted by the Free Software Foundation, write to the Free
-Software Foundation; we sometimes make exceptions for this. Our
-decision will be guided by the two goals of preserving the free status
-of all derivatives of our free software and of promoting the sharing
-and reuse of software generally.
-
- NO WARRANTY
-
- 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
-WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
-EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
-OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY
-KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
-PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
-LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
-THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-
- 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
-WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
-AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU
-FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
-CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
-LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
-RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
-FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
-SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
-DAMAGES.
-
- END OF TERMS AND CONDITIONS
diff --git a/misc/email/estripa-emails.c b/misc/email/estripa-emails.c
deleted file mode 100755
index 66c5473..0000000
--- a/misc/email/estripa-emails.c
+++ /dev/null
@@ -1,50 +0,0 @@
-/*
- * Copyleft 2003:
- *
- * Esse software é distribuído através da licença URUBU:
- * você só pode fazer um número de cópias cuja paridade
- * seja a mesma do dia do mês que você se encontra;
- * modificações são permitidas em qualquer dia da semana;
- *
- * estripa.c
- * rhatto@riseup.net
- *
- */
-
-#include <stdio.h>
-
-main(int argc, char *argv[]) {
-
- FILE *fp1, *fp2;
- char letra;
- short flag = 0;
-
- if(argc != 3) { fprintf(stderr, "sintaxe: estripa <origem> <destino>\n"); return 0; }
-
- fp1 = fopen(argv[1], "rb");
- fp2 = fopen(argv[2], "wb");
-
- if(fp1 == (FILE *)0 || fp2 == (FILE *)0) {
-
- fprintf(stderr, "erro ao abrir arquivo\n");
- exit(1);
-
- }
-
- while((letra = getc(fp1)) != EOF) {
-
- if(letra == '<') { flag = 1; }
- else if(flag && (letra == '>')) { flag = 0; fprintf(fp2, ", "); }
-
- if(flag && (letra != '<')) { putc(letra, fp2); }
-
- }
-
- fprintf(fp2, "\n");
-
- fclose(fp1);
- fclose(fp2);
-
- return 0;
-
-}
diff --git a/misc/email/vcard-filter b/misc/email/vcard-filter
deleted file mode 100755
index 363aa07..0000000
--- a/misc/email/vcard-filter
+++ /dev/null
@@ -1,154 +0,0 @@
-#!/usr/bin/perl -Tw
-
-# mutt.vcard.filter - vcard filter for use with the mutt autoview facility
-# Copyright (C) 1997,1998,1999 David A Pearson
-#
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation; either version 2 of the license, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program; if not, write to the Free Software
-# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
-
-# This little perl script is a simple filter for text/x-vcard
-# attachments. I'm pretty sure I've *not* included everything
-# possible in here, but it "works for me". Feel free to improve
-# in any way you see fit.
-#
-# Here is how I use it. In my ~/.mutt_mailcap (use your filename of
-# choice) I have the following entry:
-#
-# text/x-vcard; mutt.vcard.filter; copiousoutput
-#
-# All you then need to do is add a line like:
-#
-# auto_view text/x-vcard
-#
-# to your ~/.muttrc (use your filename of choice).
-#
-# All comments/flames/feedback can be directed to:
-#
-# davep@davep.org
-#
-# http://www.davep.org/mutt/
-#
-
-use strict;
-
-my $in_card = 0;
-my @address = ();
-my @contacts = ();
-my @additional = ();
-my @notes = ();
-my $name = "";
-my $title = "";
-my $org = "";
-my $found_note = 0;
-my $len;
-my $i;
-my $addr_line;
-my $contact_line;
-
-while ( <> )
-{
- if ( $in_card )
- {
- if ( /^fn:\s*(.*)$/i )
- {
- $name = $1;
- }
- elsif ( /^n:\s*(.*);\s*(.*)$/i )
- {
- @additional = ( "", "Additional information:", "" ) if $#additional == -1;
-
- @additional = ( @additional, "Last Name:\t$1", "First Name:\t$2" );
- }
- elsif ( /^title:\s*(.*)$/i )
- {
- $title = $1;
- }
- elsif ( /^org:\s*(.*)$/i )
- {
- $org = $1;
- }
- elsif ( /^adr:\s*(.*)$/i )
- {
- my $addr = $1;
-
- $addr =~ s/;+/;/g;
-
- @address = split( /;/, $addr );
- }
- elsif ( /^email;\s*(.*?):\s*(.*)$/i || /^tel;\s*(.*?):\s*(.*)$/i )
- {
- my $type = $1;
- my $value = $2;
-
- @contacts = ( @contacts, uc( substr( $type, 0, 1 ) ) .
- substr( $type, 1 ) . ": $value" );
- }
- elsif ( /^note:\s*(.*)$/i )
- {
- @notes = ( "" ) if $#notes == -1;
- @notes = ( @notes, $1 );
-
- $found_note = 1;
- }
- elsif ( /^=.{2}=$/ && $found_note )
- {
- my $line = <>;
-
- chomp( $line );
-
- @notes = ( "" ) if $#notes == -1;
- @notes = ( @notes, $line );
- }
- elsif ( /^end:\s*vcard$/i )
- {
- $in_card = 0;
- }
- }
- else
- {
- $in_card = /^begin:\s*vcard\s*$/i;
- }
-}
-
-@address = ( $org, @address ) if $org;
-@address = ( $title, @address ) if $title;
-@address = ( $name, @address ) if $name;
-
-format STDOUT =
-@<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< @<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-$addr_line, $contact_line
-.
-
-$len = $#address > $#contacts ? $#address : $#contacts;
-
-print "" . ( "=" x 76 ) . "\n";
-
-for ( $i = 0; $i <= $len; $i++ )
-{
- $addr_line = $i <= $#address ? $address[ $i ] : "";
- $contact_line = $i <= $#contacts ? $contacts[ $i ] : "";
- write;
-}
-
-for ( $i = 0; $i <= $#notes; $i++ )
-{
- print "$notes[ $i ]\n";
-}
-
-for ( $i = 0; $i <= $#additional; $i++ )
-{
- print "$additional[ $i ]\n";
-}
-
-print "" . ( "=" x 76 ) . "\n";
diff --git a/misc/parse-remind b/misc/parse-remind
deleted file mode 100755
index bdd9f23..0000000
--- a/misc/parse-remind
+++ /dev/null
@@ -1,41 +0,0 @@
-#!/usr/bin/perl
-#
-# This script is designed to have an email piped to it eg. from mutt.
-# It will split apart all the text/calendar attachments and enter them into
-# the 'remind' calendar.
-#
-
-use strict;
-use warnings;
-
-use MIME::Parser;
-
-my $CONVERT = '~/.mutt/ical2rem.pl';
-my $REMINDERS = '~/remind/mutt.rem';
-
-################################################################################
-
-my $parser = new MIME::Parser;
-$parser->output_under('/tmp');
-my $entity = $parser->parse(\*STDIN);
-
-my @parts = $entity->parts();
-my $count = 0;
-
-foreach my $part (@parts) {
- if ($part->head->mime_type eq 'text/calendar') {
- my $body = $part->bodyhandle;
- my $cmd = $CONVERT.' '.$body->path.' >> '.$REMINDERS;
- print STDERR `$cmd`;
- last if ($? != 0);
- $count++;
- }
-}
-
-$parser->filer->purge;
-if ($count == 0) {
- print STDERR "No calendar entries found.";
- exit(1);
-}
-
-exit(0);
diff --git a/misc/sed/entities.sed b/misc/sed/entities.sed
deleted file mode 100644
index b2b4929..0000000
--- a/misc/sed/entities.sed
+++ /dev/null
@@ -1,24 +0,0 @@
-s/á/\&aacute;/g
-s/ã/\&atilde;/g
-s/â/\&acirc;/g
-s/à/\&agrave;/g
-s/é/\&eacute;/g
-s/ê/\&ecirc;/g
-s/í/\&iacute;/g
-s/ó/\&oacute;/g
-s/õ/\&otilde;/g
-s/ô/\&ocirc;/g
-s/ú/\&uacute;/g
-s/ç/\&ccedil;/g
-s/Á/\&Aacute;/g
-s/Ã/\&Atilde;/g
-s/Â/\&Acirc;/g
-s/É/\&Eacute;/g
-s/Ê/\&Ecirc;/g
-s/Í/\&Iacute;/g
-s/Ó/\&Oacute;/g
-s/Õ/\&Otilde;/g
-s/Ô/\&Ocirc;/g
-s/Ú/\&Uacute;/g
-s/Ç/\&Ccedil;/g
-s/ñ/\&ntilde;/g
diff --git a/misc/sed/justify.sed b/misc/sed/justify.sed
deleted file mode 100755
index 0a2e5af..0000000
--- a/misc/sed/justify.sed
+++ /dev/null
@@ -1,68 +0,0 @@
-#!/bin/sed -f
-# justify.sed - aurélio marinho jargas <verde (a) aurelio net>
-#
-# it gets a text already wrapped on the desired number of columns
-# and add extra white spaces, from left to right, word by word,
-# to justify all the lines. there is a maximum of 5 spaces to be
-# inserted between the words. if this limit is reached, the line
-# is not justified (come on, more than 5 is horrible). empty
-# lines are ignored. btw, this comments were justified with this
-# script &:)
-#
-# 20000715 1st release
-# 20000722 code cleaned
-
-# cleaning extra spaces of the line
-s/ \+/ /g
-s/^ //
-s/ $//
-
-# we'll only justify lines with less than 65 chars
-/^.\{65\}/b
-
-# backup of the 'stripped' line
-h
-
-# spaces -> pattern
-# convert series of spaces to a internal pattern `n
-:s2p
-s/ /`5/g
-s/ /`4/g
-s/ /`3/g
-s/ /`2/g
-s/ /`1/g
-t 1space
-b
-
-# pattern -> spaces
-# restore the spaces converted to the internal pattern `n
-:p2s
-s/`5/ /g
-s/`4/ /g
-s/`3/ /g
-s/`2/ /g
-s/`1/ /g
-t check
-b
-
-# check if we've reached our right limit
-# if not, continue adding spaces
-:check
-/^.\{65\}/!b s2p
-b
-
-# here's the "magic":
-# add 1 space to the first and minor internal pattern found.
-# this way, the extra spaces are always added from left to right,
-# always balanced, one by one.
-# right after the substitution, we'll restore the spaces and
-# test if our limit was reached.
-:1space
-s/`1/`2/ ; t p2s
-s/`2/`3/ ; t p2s
-s/`3/`4/ ; t p2s
-s/`4/`5/ ; t p2s
-
-# we don't want to justify with more than 5 added spaces between
-# words, so let's restore the original line
-/`5/x
diff --git a/misc/sed/mail-iso2txt.sed b/misc/sed/mail-iso2txt.sed
deleted file mode 100644
index d3bf429..0000000
--- a/misc/sed/mail-iso2txt.sed
+++ /dev/null
@@ -1,55 +0,0 @@
-#!/bin/sed -f
-# mail-iso2txt.sed - 20000906 <verde (a) aurelio net>
-# convert the email encoded chars =xx to the right hexa char
-#
-# ps.: needs GNU sed >= 3.02.80 because the s//\xnn/ notation
-
-s|=09|\x09|g
-s|=20|\x20|g
-s|=B7|\xb7|g
-s|=BA|\xba|g
-s|=C1|\xc1|g
-s|=C2|\xc2|g
-s|=C3|\xc3|g
-s|=C4|\xc4|g
-s|=C5|\xc5|g
-s|=C6|\xc6|g
-s|=C7|\xc7|g
-s|=C8|\xc8|g
-s|=C9|\xc9|g
-s|=CA|\xca|g
-s|=CB|\xcb|g
-s|=CC|\xcc|g
-s|=CD|\xcd|g
-s|=CE|\xce|g
-s|=CF|\xcf|g
-s|=D7|\xd7|g
-s|=E1|\xe1|g
-s|=E2|\xe2|g
-s|=E3|\xe3|g
-s|=E4|\xe4|g
-s|=E5|\xe5|g
-s|=E6|\xe6|g
-s|=E7|\xe7|g
-s|=E8|\xe8|g
-s|=E9|\xe9|g
-s|=EA|\xea|g
-s|=EB|\xeb|g
-s|=EC|\xec|g
-s|=ED|\xed|g
-s|=EE|\xee|g
-s|=EF|\xef|g
-s|=F1|\xf1|g
-s|=F2|\xf2|g
-s|=F3|\xf3|g
-s|=F4|\xf4|g
-s|=F5|\xf5|g
-s|=F6|\xf6|g
-s|=F7|\xf7|g
-s|=F8|\xf8|g
-s|=F9|\xf9|g
-s|=FA|\xfa|g
-s|=FB|\xfb|g
-s|=FC|\xfc|g
-s|=$||g
-
diff --git a/misc/sed/mini-html2latex.sed b/misc/sed/mini-html2latex.sed
deleted file mode 100644
index 03fd2d5..0000000
--- a/misc/sed/mini-html2latex.sed
+++ /dev/null
@@ -1,9 +0,0 @@
-s/<strong>/\\section{/g
-s/<\/strong>/}/g
-s/<i>/\\emph{/g
-s/<\/i>/}/g
-s/<a href=\"/\\link{/g
-s/\">/}{/g
-s/<\/a>/}/g
-s/<pre>/\\begin{verbatim}/g
-s/<\/pre>/\\end{verbatim}/g
diff --git a/misc/sed/syndication.sed b/misc/sed/syndication.sed
deleted file mode 100644
index 4b6b195..0000000
--- a/misc/sed/syndication.sed
+++ /dev/null
@@ -1,27 +0,0 @@
-s/Â/\&#194;/g
-s/â/\&#226;/g
-s/ã/\&#227;/g
-s/é/\&#233;/g
-s/ô/\&#244;/g
-s/á/\&#225;/g
-s/Ã/\&#205;/g
-s/í/\&#237;/g
-s/ç/\&#231;/g
-s/õ/\&#245;/g
-s/ê/\&#234;/g
-s/Ç/\&#199;/g
-s/Ã/\&#195;/g
-s/ó/\&#243;/g
-s/ú/\&#250;/g
-s/Ê/\&#202;/g
-s/É/\&#201;/g
-s/Ã/\&#193;/g
-s/Ú/\&#218;/g
-s/á/\&#225;/g
-s/ê/\&#233;/g
-s/&amp;aacute;/\&#225;/g
-s/&amp;ecirc;/\&#234;/g
-s/À/\&#192;/g
-s/–/\-/g
-s/è/\&#232;/g
-s/Õ/\&#213;/g
diff --git a/misc/sed/twiki-to-tiki.sed b/misc/sed/twiki-to-tiki.sed
deleted file mode 100755
index d0fe2f5..0000000
--- a/misc/sed/twiki-to-tiki.sed
+++ /dev/null
@@ -1,14 +0,0 @@
-#!/bin/sed -f
-#
-# twiki-to-tiki.sed: formatting conversion
-# feedback: rhatto@riseup.net
-#
-
-s/^ \*/\*/
-s/---+++/\!\!\!/
-s/---++/\!\!\!/
-s/---+/\!/
-s/\*\([A-Za-z0-9]*\)\*/__\1__/g
-s/<verbatim>/~pp\~/g
-s/<\/verbatim>/~\/pp\~/g
-s/%TOC%/{maketoc}/
diff --git a/misc/sed/unicode-zoado.sed b/misc/sed/unicode-zoado.sed
deleted file mode 100644
index c372a71..0000000
--- a/misc/sed/unicode-zoado.sed
+++ /dev/null
@@ -1,11 +0,0 @@
-s/á/\&aacute;/g
-s/Ã/\&iacute;/g
-s/ó/\&oacute;/g
-s/ç/\&ccedil;/g
-s/õ/\&otilde;/g
-s/ã/\&atilde;/g
-s/â/\&acirc;/g
-s/é/\&eacute;/g
-s/ê/\&ecirc;/g
-s/ó/\&oacute;/g
-s/â/\&acirc;/g
diff --git a/misc/sed/wrap-forced.sed b/misc/sed/wrap-forced.sed
deleted file mode 100755
index e7f2cc9..0000000
--- a/misc/sed/wrap-forced.sed
+++ /dev/null
@@ -1,46 +0,0 @@
-#!/bin/sed -f
-# wrap-forced.sed - wrap lines at column n
-#
-# acts like fmt, but ignores the 'word' context,
-# wrapping the line exactly at the specified column
-#
-# pt_BR comments:
-# funciona como o fmt, mas ignora o contexto de 'palavra'
-# quebrando a linha exatamente na coluna especificada
-#
-# c1: na primeira linha do texto...
-# c2: laço para colocar todas as linhas em 1 linha apenas
-# c3: isto é para eliminar espaços em branco repetidos
-# você pode comentá-lo se não quiser alterá-los
-# c4: dica: tire o espaço da 2ª parte do comando s para
-# apagar todos os espaços (parece arte ascii &:) )
-# c5: aqui é quem quebra a linha na coluna especificada
-# mude o 25 para o número que você quiser
-# o gnu-sed >= 3.02.80 é necessário por causa do \n
-#
-# 20000726 <verde (a) aurelio net>
-
-#c1: at the first line of the text...
-1{
-
- #c2: loop to put all the lines of the text at one single line
- :a
- $!N
- s/\n//
- ta
-
- #c3:
- # this is to squeeze blanks
- # you can comment it if you want blanks untouched
- #c4:
- # tip: take off the space at replacement part to have a result with
- # NO spaces at all (looks like ascii art &:) )
- s/[[:blank:]]\+/ /g
-
- #c5:
- # here is the guy who breaks the line at the specified column
- # just change the 25 whatever column you like
- # gnu-sed >= 3.02.80 required because the \n
- s/.\{50\}/&\n/g
-}
-
diff --git a/misc/sed/yahoogroups-kill-sig.sed b/misc/sed/yahoogroups-kill-sig.sed
deleted file mode 100644
index f7eb8c9..0000000
--- a/misc/sed/yahoogroups-kill-sig.sed
+++ /dev/null
@@ -1,248 +0,0 @@
-#!/bin/sed -f
-# yahoogroups-kill-sig.sed by Aurelio Marinho Jargas
-#
-# Erases the Yahoo! Groups e-mail signature ad
-#
-# CHANGELOG:
-# 20000??? v0.1 First one
-# 20000725 v0.2 Now it has BEGIN/END marks, it's easier!
-# 20000906 v0.3 Marks changed
-# 20001107 v0.3.1 Contrib: Schlemer HTML killer
-# ----- eGroups has changed to Yahoo! Groups -----
-# 20010206 v0.4 Contrib: Morcego's s/egroups/yahoo/s fix
-# 20010716 v0.5 Marks changed again
-# 20030428 v0.6 Policy Terms and Unsubscribe killers included
-# 20030506 v0.6.1 One-char fix on the Policy killer, added SAMPLE DATA
-#
-# DESCRIPTION:
-# Yahoogroups.com puts advertises on every sent message to the free groups.
-# This file is a sed filter to erase it. It handles quoted '> ' ads also.
-# If you do use procmail to filter e-mail messages, use this sed to
-# automaticaly remove the Ads for every message you receive.
-#
-# HOW TO USE:
-# Save this file on the disk and put at the begin of your ~/.procmailrc:
-# :0 fhw
-# * Delivered-To:.*@yahoogroups.com
-# | sed -f /path/to/yahoogroups-kill-sig.sed
-#
-# If preferred, make this file executable (chmod +x), put it in your PATH and:
-# :0 fhw
-# * Delivered-To:.*@yahoogroups.com
-# | yahoogroups-kill-sig.sed
-#
-#
-# SAMPLE DATA FILE:
-# You can use this sample data file to test these rules "by hand",
-# before including them on the procmail file.
-# Save the following fake e-mail message on a 'data.txt' file
-# (remove the leading # chars!) and run:
-#
-# prompt$ sed -f yahoogroups-kill-sig.sed data.txt
-#
-# All the Ads and Yahoo! messages should be removed.
-#
-#---------------------------8<---------------------------
-#From: foo@foo.com
-#To: foo@foo.com
-#Subject: test me
-#
-#Here's the message body.
-#And now, the evil sig.
-#
-#------------------------ Yahoo! Groups Sponsor ---------------------~-->
-#Secure your servers with 128-bit SSL encryption! Grab your copy of
-#VeriSign's FREE Guide "Securing Your Web Site for Business." Get it now!
-#http://www.verisign.com/cgi-bin/go.cgi?a=n094442340008000
-#http://us.click.yahoo.com/6lIgYB/IWxCAA/yigFAA/dkFolB/TM
-#---------------------------------------------------------------------~->
-#
-#Your use of Yahoo! Groups is subject to
-#http://docs.yahoo.com/info/terms/
-#
-#To unsubscribe from this group, send an email to:
-#foo-unsubscribe@yahoogroups.com
-#--------------------------->8---------------------------
-
-
-
-#-------------------------------------------------------------------------
-
-
-# +----+
-# | Ad |
-# +----+
-#
-# Ad details: * a line w/ 24 hifens, 'Yahoo...Sponsor', 21 hifens and '~-->'
-# * lines with yahoogroups propaganda
-# * a line with 69 hifens, and '~->' at the end
-# Ad Sample:
-# ------------------------ Yahoo! Groups Sponsor ---------------------~-->
-# Secure your servers with 128-bit SSL encryption! Grab your copy of
-# VeriSign's FREE Guide "Securing Your Web Site for Business." Get it now!
-# http://www.verisign.com/cgi-bin/go.cgi?a=n094442340008000
-# http://us.click.yahoo.com/6lIgYB/IWxCAA/yigFAA/dkFolB/TM
-# ---------------------------------------------------------------------~->
-#
-# Ad Killer:
-/^\(> \)*-\{24\} Yahoo! Groups Sponsor -\{21\}~-->$/,/^\(> \)*-\{69\}~->$/d
-
-
-#-------------------------------------------------------------------------
-
-
-# +--------+
-# | Policy |
-# +--------+
-#
-# You can also remove the Policy Terms message.
-#
-# Policy Details: A one line message, sometimes broken into two,
-# which appears at the very end of the message.
-# Policy Sample:
-# Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
-#
-# Policy Killer:
-/^\(> \)*Your use of Yahoo! Groups is subject to *$/N
-/^\(> \)*Your use of Yahoo! Groups is subject to/d
-
-
-#-------------------------------------------------------------------------
-
-
-# +-------------+
-# | Unsubscribe |
-# +-------------+
-#
-# This one is to remove the *default* unsubscribe footer.
-#
-# Unsubscribe Details: A one line message, sometimes broken into two,
-# which appears before the Ads.
-# Unsubscribe Sample:
-# To unsubscribe from this group, send an email to:
-# foo-unsubscribe@yahoogroups.com
-#
-# Unsubscribe Killer:
-/^\(> \)*To unsubscribe from this group, send an email to: *$/N
-/^\(> \)*To unsubscribe from this group, send an email to:/d
-
-
-#-------------------------------------------------------------------------
-
-
-# +---------+
-# | Ad HTML |
-# +---------+
-#
-# For those who receive the Yahoo! messages in HTML (argh!), you may use
-# this one also, because the HTML signature is way different.
-#
-# Ad Details: * an HTML comment with bar-star-star-bar,text,bar-star-star-bar
-# * lines with egroups propaganda
-# * an HTML comment with bar-star-star-bar,text,bar-star-star-bar
-# Ad Sample:
-# <!-- |**|begin egp html banner|**| -->
-#
-# <hr>
-# <!-- |@|begin eGroups banner|@| runid: 8193 crid: 4101 -->
-# <a target=3D"_blank"
-# href=3D"http://click.egroups.com/1/8193/8/_/134812/_/9=
-# 66089206/"><center>
-# <img width=3D"468" height=3D"60"
-# border=3D"0"
-# alt=3D""
-# src=3D"http://adimg.egroups.com/img/8193/8/_/134812/_/966089206/468x60_ma=
-# ze12k.gif"></center><center><font color=3D"black"></font></center></a>
-# <!-- |@|end eGroups banner|@| -->
-# <hr>
-#
-# <!-- |**|end egp html banner|**| -->
-#
-# Ad Killer:
-#/^\(> \)*<!-- |\*\*|begin egp html banner|\*\*| -->$/,/^\(> \)*<!-- |\*\*|end egp html banner|\*\*| -->$/d
-
-
-
-
-
-
-#-------------------------------------------------------------------------
-# +-------------+
-# | OLD KILLERS |
-# +-------------+
-#-------------------------------------------------------------------------
-#
-# +---------+
-# | Ad v0.4 |
-# +---------+
-#
-# Ad details: * a line w/ 24 hifens, 'Yahoo!...Sponsor', 21 hifens and '~-~>'
-# * lines with yahoogroups propaganda
-# * a line with 69 hifens, and '_->' at the end
-# Ad Sample:
-# ------------------------ Yahoo! Groups Sponsor ---------------------~-~>
-# eGroups is now Yahoo! Groups
-# Click here for more details
-# http://click.egroups.com/1/11231/1/_/161736/_/980877852/
-# ---------------------------------------------------------------------_->
-#
-# Ad Killer:
-#/^\(> \)*-\{24\} Yahoo! Groups Sponsor -\{21\}~-~>$/,/^\(> \)*-\{69\}_->$/d'
-#
-#-------------------------------------------------------------------------
-#
-# +---------+
-# | Ad v0.3 |
-# +---------+
-#
-# Ad details: * a line w/ 26 hifens, 'eGroups Sponsor', 25 hifens and '~-~>'
-# * lines with egroups propaganda
-# * a line with 69 hifens, and '_->' at the end
-#
-# Ad Sample:
-# -------------------------- eGroups Sponsor -------------------------~-~>
-# GET A NEXTCARD VISA, in 30 seconds! Get rates
-# of 2.9% Intro or 9.9% Ongoing APR* and no annual fee!
-# Apply NOW!
-# http://click.egroups.com/1/7872/14/_/_/_/967638075/
-# ---------------------------------------------------------------------_->
-#
-# Ad Killer:
-#/^\(> \)*-\{26\} eGroups Sponsor -\{25\}~-~>$/,/^\(> \)*-\{69\}_->$/d
-#
-#-------------------------------------------------------------------------
-#
-# +---------+
-# | Ad v0.2 |
-# +---------+
-#
-# Ad details: * a line with 68 hifens, an '<e|' and another hifen
-# * lines with egroups propaganda
-# * a line with 68 hifens, an '|e>' and another hifen
-# Ad Sample:
-# --------------------------------------------------------------------<e|-
-# Huge Shoe Selection at Zappos.com
-# (small sizes also available)
-# http://click.egroups.com/1/7062/5/_/193628/_/964577029/
-# --------------------------------------------------------------------|e>-
-#
-# Ad Killer:
-#/^\(> \)*-\{68\}<e|-$/,/^\(> \)*-\{68\}|e>-$/d
-#
-#-------------------------------------------------------------------------
-#
-# +---------+
-# | Ad v0.1 |
-# +---------+
-#
-# Ad Details: * a line with exactly 72 hifens before and after
-# * any number of lines between
-# * a line with 'http://click.egroups.com'
-# Ad Sample:
-# ------------------------------------------------------------------------
-# $60 in FREE Long Distance! Click Here to join beMANY! today.
-# http://click.egroups.com/1/4126/10/_/_/_/958599956/
-# ------------------------------------------------------------------------
-#
-# Ad Killer:
-#/^\(> \)*-\{72\}$/{N;:l;/-\{72\}$/bs;N;bl;:s;s%^.*\n\(> \)*http://click\.egroups\.com.*%%;}
diff --git a/misc/telneter b/misc/telneter
deleted file mode 100755
index acb9404..0000000
--- a/misc/telneter
+++ /dev/null
@@ -1,22 +0,0 @@
-#!/usr/bin/expect
-#
-# Simple telnet application to log in a server
-# WARNING: passphrase is sent in the clear!
-#
-
-spawn telnet example.org
-# Not absolutely necessary, but good to keep the spawn_id for later
-set telnet $spawn_id
-# Case insensitive, just in case..
-expect -nocase "login:"
-send "user\r"
-# My telnetd insisted on an uppercase P. This works bothways
-expect -nocase "password:"
-send "SENHA\r"
-# Match the prompt (contains a $)
-expect -re {\$}
-# Get the environment variables
-send "env\r"
-# Wait for the prompt
-expect -re {\$}
-exit
diff --git a/misc/wifi b/misc/wifi
deleted file mode 100755
index 6a3a3b5..0000000
--- a/misc/wifi
+++ /dev/null
@@ -1,16 +0,0 @@
-#!/bin/bash
-#
-# Wifi initializer
-#
-
-#DEVICE="ath0"
-DEVICE="wlan0"
-
-if [ ! -z "$1" ]; then
- read -sp "Enter the WPA passphrase: " PASS
- echo ""
- wpa_passphrase $1 $PASS
-elif [ -f "wpa_supplicant.conf" ]; then
- sudo wpa_supplicant -B -Dwext -i$DEVICE -cwpa_supplicant.conf
- sudo dhclient $DEVICE
-fi