tAdd more information in the manpage. - sup - small tool for privilege escalation
 (HTM) git clone https://git.parazyd.org/sup
 (DIR) Log
 (DIR) Files
 (DIR) Refs
 (DIR) README
 (DIR) LICENSE
       ---
 (DIR) commit e50cc7dcf0d0b8f8550a70d2155739c64b024c15
 (DIR) parent a1433c21cfd8539d3c34a0d40cc18022dcbfd0c6
 (HTM) Author: parazyd <parazyd@dyne.org>
       Date:   Mon,  8 Jul 2019 18:05:06 +0200
       
       Add more information in the manpage.
       
       Diffstat:
         M sup.1                               |       6 ++++--
       
       1 file changed, 4 insertions(+), 2 deletions(-)
       ---
 (DIR) diff --git a/sup.1 b/sup.1
       t@@ -1,4 +1,4 @@
       -.TH SUP 1 2019-07-02
       +.TH SUP 1 2019-07-08
        .SH NAME
        sup \- scale user privileges
        .SH SYNOPSIS
       t@@ -14,7 +14,9 @@ sup \- scale user privileges
        sup is a minimal privilege escalation utility that allows normal users
        to run other programs as different user and group. It is "secured" by
        hardcoding SHA256 sums of the executables into itself to decide if a
       -user is actually authorized to run the requested command.
       +user is actually authorized to run the requested command. The way sup
       +works is that it is installed as a setuid binary and is statically
       +linked to avoid any possible LD_PRELOAD trickery.
        .TP
        The configuration is done in config.h at compile time.
        .SH OPTIONS