# the Z Shell (zsh) for the nmh mail system.
#
# You may need to edit where it says EDIT ME.
-# These were orginally written for MH by Peter Stephenson
+# These were originally written for MH by Peter Stephenson
# The following three functions are best autoloaded.
#
As of the 1.5 release, nmh has made significant changes to the way most of
-the message composition utilites work, specifically with the way
+the message composition utilities work, specifically with the way
the components templates are handled. If you use the default
components templates that come with nmh then everything should work
with only minor changes, but if you have custom component templates
%(putlit) - Out the contents of the str register without space
compression.
%(concataddr) - Construct an address list like %(formataddr), except that
- it will NOT perform duplicate supression (currently
- duplicate supression only happens inside of
+ it will NOT perform duplicate suppression (currently
+ duplicate suppression only happens inside of
"repl"). One possible use of this function is to
construct an address list and use %(match) to decide
which "From:" address to use.
If you are curious as to whether or not your communications are actually
encrypted or not, you can use the -snoop flag to the POP or SMTP utilities.
-Communication that is encrypted is preceeded by an (encrypted) or
+Communication that is encrypted is preceded by an (encrypted) or
(decrypted), depending on the direction of communication.
If you would like to use the GSSAPI SASL mechanism (Kerberos V), you
Set literal text (such as flags) in bold. Set parameters
in italic. Mutually exclusive options (like "-foo" and
- "-nofoo") should be grouped together and seperated by a
+ "-nofoo") should be grouped together and separated by a
"|":
.RI [ +folder ] <---- parameter
INC
---
* Add ability to do filtering (call filterproc) when incorporating mail
-* Change inc to use libary function folder_addmsg().
+* Change inc to use library function folder_addmsg().
MHBUILD
-------
Search message entries with a 'less'-like search system.
A searchstring is entered and selection advances to the first match.
-After that the C<n> will search for the next occurance,
+After that the C<n> will search for the next occurrence,
and C<N> the previous.
=item * C<?>
last path name component of the field body must match.
If the
.B -number
-option is used in conjuction with the
+option is used in conjunction with the
.B -delete
option, header field
.I num
.B repl
commands
are invoked and the draft you indicated already exists, these programs
-will prompt the user for a reponse directing the program's action.
+will prompt the user for a response directing the program's action.
The prompt is
.PP
.RS 5
from the sequence. If a sequence contains no messages, it should be
removed from the sequence file. The exception to this is the
.B cur
-sequence, which can refer to a nonexistant message.
+sequence, which can refer to a nonexistent message.
.RE
.PP
.SS Locking
.\" process 200 messages a day and still get some real work
.\" done." The authors apparently only planned to get
.\" real work done for about 50 days per folder.)
-Nontheless (as noted above)
+Nonetheless (as noted above)
the various scan format strings are inherited
from older MH versions, and are generally hard-coded to 4
digits of message number before formatting problems
.RS 5
Still more recipients. However, the \*(lqDcc:\*(rq line is not
copied onto the messages as delivered. Recipients on the \*(lqDcc:\*(rq
-line receive the same messsage as recipients on the \*(lqTo:\*(rq and
+line receive the same message as recipients on the \*(lqTo:\*(rq and
\*(lqcc:\*(rq lines. See
.IR send (1)
for more details.
command (part of the StarOffice package) can be used to display
Microsoft Word content, but it uses the suffix to determine how to display
the file. If no suffix is present, the file is not correctly loaded.
-Similarily, older versions of the
+Similarly, older versions of the
.B gs
command append a \*(lq.ps\*(rq suffix to
the filename if one was missing. As a result, these cannot be used to read
.B sortm
reports that as an error and exits with non-zero status.
.B \-noall
-is most useful in the user's profile, to avoid inadvertant sorting of
+is most useful in the user's profile, to avoid inadvertent sorting of
an entire folder. The
.B \-all
switch can then be used on the command line to disable it. Of course,