On 13 April 1999 at 8:42, Hal DeVore <[EMAIL PROTECTED]> wrote: > As was rightly > pointed out such things really should go in to the underlying nmh > code so they are accessible "from the command line". Hal, I hope you can encourage other exmh hackers to think that way if you notice that they "forget." nmh is just about the last MUA that's so programmable; let's not lose that! > So. The question is: how could such a thing be "hooked in" to > nmh? The commands that do aliasing are ali, whom, and send. I haven't checked the source code, but I'd bet there's one underlying function that does the dirty work. That seems like the right place to me. Jerry -- Jerry Peek, [EMAIL PROTECTED], http://www.jpeek.com/~jpeek/
