• Aucun résultat trouvé

SEE ALSO

N/A
N/A
Protected

Academic year: 2022

Partager "SEE ALSO"

Copied!
1
0
0

Texte intégral

(1)

Perl version 5.10.0 documentation - Pod::Perldoc::ToChecker

Page 1 http://perldoc.perl.org

NAME

Pod::Perldoc::ToChecker - let Perldoc check Pod for errors

SYNOPSIS

% perldoc -o checker SomeFile.pod No Pod errors in SomeFile.pod (or an error report)

DESCRIPTION

This is a "plug-in" class that allows Perldoc to use Pod::Simple::Checker as a "formatter" class (or if that is not available, then Pod::Checker), to check for errors in a given Pod file.

This is actually a Pod::Simple::Checker (or Pod::Checker) subclass, and inherits all its options.

SEE ALSO

Pod::Simple::Checker, Pod::Simple, Pod::Checker, Pod::Perldoc

COPYRIGHT AND DISCLAIMERS

Copyright (c) 2002 Sean M. Burke. All rights reserved.

This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.

This program is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of merchantability or fitness for a particular purpose.

AUTHOR

Sean M. Burke sburke@cpan.org

Références

Documents relatifs

Tracking is used in conjunction with Delivery Status Notifications (DSN) [RFC-DSN-SMTP] and Message Disposition Notifications (MDN) [RFC-MDN]; generally, a message

A malicious sender could insert a large number of solicitation class keywords or improperly formatted solicitation keywords, thus performing a Denial of Service attack

Not only do multiple labeling requirements compete with legitimate subject lines, but also there is no easy way for the sender of a legitimate message to effectively insert

This document and the information contained herein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF

IANA is advised that the "ip6.int" domain for reverse mapping of IPv6 addresses to domain names is no longer part of Internet Standards Conformant support of IPv6 as of

The document describes a transparent cell transport service that makes use of the "N-to-one" cell relay mode for Pseudowire Emulation Edge-to-Edge (PWE3)

The responsibility of the user concerned about the authenticity of his mail is to understand that mail marked as authentic means that the sending host has determined the identity of

We extend LoST with three additional <findService> query types, giving the protocol the ability to find the N nearest instances of a particular service, all services