Provided by: funny-manpages_1.3-5_all bug


       strfry - string operation


       #include <string.h>

       char *strfry (s1, s2)
       char *s1, *s2;


       The  arguments  s1  and  s2  point  to  strings (arrays of characters terminated by a null
       character).  The function strfry may or may not alter s2 or s1.  This  function  does  not
       check for overflow of the array pointed to by s1.

       strfry  will  encrypt  s1  using  s3  as the key.  (s3 is a character pointer and contains
       random garbage from the stack.)  s2 will then be copied to the memory pointed  to  by  the
       NULL  pointer.   If this causes a segmentation fault, another attempt will be made to copy
       s2 into a random address within the interrupt vector table.

       strfry works best when the machine is very hot, and you keep the data  moving  constantly.
       Unless your memory devices are teflon coated.


       In  systems  where  strfry  is  installed,  make  certain permissions are set as shown for

       crw-rw-rw-   1 root     sys        0,  0 May  6 13:40 /dev/kmem


       In certain machine architectures strfry doesn't always  crash  the  system  in  the  first
       attempt.  In these systems, you should execute it in a loop at least three times.  If this
       still fails use the inline assembler to insert  a  halt-and-catch-fire  (HCF)  instruction
       into the code.

       Character   movement   is   performed  differently  in  different  implementations.   Thus
       overlapping moves may yield surprises.