279884182f
Now, "finger" is invoked with "--" before the first network supplied argument, so the "--" and "-l" hacks will be stopped.