Volume 3, Number 36 22 September 1986 +---------------------------------------------------------------+ | _ | | / \ | | /|oo \ | | - FidoNews - (_| /_) | | _`@/_ \ _ | | International | | \ \\ | | FidoNet Association | (*) | \ )) | | Newsletter ______ |__U__| / \// | | / FIDO \ _//|| _\ / | | (________) (_/(_|(____/ | | (jm) | +---------------------------------------------------------------+ Editor in Chief: Thom Henderson Chief Procrastinator Emeritus: Tom Jennings FidoNews is the official newsletter of the International FidoNet Association, and is published weekly by SEAdog Leader, node 1/1. You are encouraged to submit articles for publication in FidoNews. Article submission standards are contained in the file ARTSPEC.DOC, available from node 1/1. Copyright (C) 1986, by the International FidoNet Association. All rights reserved. Duplication and/or distribution permitted for noncommercial purposes only. For use in other circumstances, please contact IFNA. The contents of the articles contained here are not our responsibility, nor do we necessarily agree with them. Everything here is subject to debate. Table of Contents 1. ARTICLES HELP!!! Copyright Violation OUTER is here! A new program for the "O" command Pittsburgh Area BBS Picnic Sweden and their Vikings! An Unsolicited Testimonial Shareware Authors: Under Attack?! Who Reads FidoNews? 2. COLUMNS MS-DOS Directory Trees Computer Industry Spotlight FidoUtil ver 1.10 review 3. FOR SALE DataCare Hard Disk Utility Public Domain Software Library Sale!! 4. NOTICES The Interrupt Stack ListGen warning! Pixie and Sched update Fidonews Page 2 22 Sep 1986 ================================================================= ARTICLES ================================================================= By: Brian Walsh Sysop 109/640 COPYRIGHT VIOLATION ------------------- MOVBASIC.COM,MOVBASIC.ARC I have recently noticed a program called MOVBASIC.COM and I also noticed that it was very similar to a piece of commercial software that my company is currently beta testing. I then downloaded the file MOVBASIC.ARC. When I unarced it and checked it out I relized that it was the beta test version of our package with the messages changed a bit. I then called all the people that we had beta testing and asked them about it and I found that one person had inadvertantly uploaded it to a RBBS-PC system. I was given a copy of the message left to the sysop of the Board after he relized what he did but couldn't "kill" the file. I will list it below. (Names Changed for our security) TO:SYSOP FROM:John Doe Subj:PAKBASIC sysop, Please delete the file PAKBASIC.COM From your file listing and you hard disk as in it was mistakenly uploaded and is a beta test version of a commercial package that I am testing. Thank You VERY much! John Doe The Sysop Did delete it but somewhere someone must have gotten it before he could delete it. The Only Thing I ask Is that All Fido Sysops PLEASE delete it from your board and put in you files.bbs: MOVBASIC.ARC NOT P.D. Commercial Software I Thank You For This and Hope that you will call out BBS Soon. ----------------------------------------------------------------- Fidonews Page 3 22 Sep 1986 OUTER is here! A new program for the "O" command There has been a program floating around for some time now called OUTSIDE that was a "mini BBS" and could be used in conjunction with the "O" command from FIDO's main menu. The problem was that OUTSIDE was unreliable - it would occasionally cause the system to hang up, and it was hard to use. Upon contacting the author, I found out the program was written in what he called "an antiquated language" and he was not willing to release the source. I realized it was time to re-write the whole thing. Jim Fullton did most of the work, and I've been making fixes and small improvements from the beginning. The program is called OUTER, and we believe that it will soon replace OUTSIDE. From Grant Fengstad (134/0) Alberta Fido Coordinator: DATE: 10 Sep 86 23:32:12 TO: Ron Bemis SUB: Howdy Hi Ron. I recently rec'd your Outer program and I must say "Fantastic". I had used Outside previously, but your program puts it to shame... The comments are rolling in, and the program hasn't even been released yet! Some of the advantages: o Single keystroke execution of commands o SysOp-selectable access by privilege level - no passwords o Built-in watchdog timer/carrier detect monitor o Control-C and Control-Break disabled o Absolute security when used with IBMAUX o Checks SCHED.BBS so a user can't "over-run" an event o Displays "time left" each time a user sees the menu o Easy to understand and set up command file for control o Optional help and welcome messages may be displayed o Complete accountability of user activity The program can be downloaded from file area #5 on Fido 151/104 Nibbles and Bytes. A first-time user can download it. C source code is available for "registered" users. Oh, and for the folks that got the program before it was released - we're now in version 1.15 and there are quite a few goodies in the ARC that you probably don't have. Ron Bemis Fido 151/104 (919) 942-9267 ----------------------------------------------------------------- Fidonews Page 4 22 Sep 1986 Clay Zahrobsky FIDO 129/26 Sounding Board Pittsburgh, Pa. Pittsburgh Area BBS Picnic Recently the Pittsburgh Area BBS SysOps got together and organized the 1st BBS picnic for all FIDO users in the area. Before the SysOps had SysOp picnics but they decided to have one that involved everyone. A nearby picnic area was chosen and directions and info was distributed through out the net. Not being a SysOp (Hoping to be one soon) I was excited about this type of gathering. I was wondering about the people I would meet. Would they meet my expectations that I have associated their messages with their personality? Then the day came, and to say the least I was not disappointed!!! It was very interesting to meet all the people that I have typed to and have had discussions (sometimes arguments) with. Some met their type of messages and some even over my expectations. All day people ate, drank, played and of course talked SHOP. SysOps gave info on how to run FIDO more efficiently and correctly. Some also brought defective equipment to see if anyone could figure out how to fix it. There was one Tandon Hard drive that even Tandon would not want to fix. I would advise all other nets and such to try to organize something of this nature. All the users that showed up did not go home disappointed. This is a great way to get people closer together and to make new friends. I can't wait for the next one. ----------------------------------------------------------------- Fidonews Page 5 22 Sep 1986 By Joaquim Homrighausen Sysop at Future Hacker Central 501/4609 September 7th, 1986 at 3:49 am! Hello all people out there. This should be an unusual place to receive an article from. Here in Sweden, things are growing rapidly, and as times goes by it gets colder. But what the heck we're vikings right?! And we're born from a packet of ice with a label on it telling wether it's a female or a male. Let's get serious. The main reason for this article is to let people (mainly FIDO sysops of course) listen to the voice from this part of the foreign world. And don't worry, Tjernobyl has not poluted these bytes in which this letter resides! But anyway, I've just finished a "hot" dispute with my fellow sysop (or co-sysop). And we've come up with some (from a "poor" guy like me) interesting facts. Fido started all up as a Public Domain and there weren't any problems opening a new BBS because it was all free. Sure great, I can just download the CORE files and then open a FIDO BBS of my own, and then eventually join the net. Sounds good to me, except for the terrifying "news" from the "good-old-US" (yes, I've been working at both Apple, Commodore, and IBM in the United States of America, so I'm not a total outsider) that Fido probably won't be "Public Domain" anymore. What's this (my co-sysop said BULLS??? about it), we're getting greedy aren't we? OK, let's look at it from this angle. How many hours do you think people have spent all over the world creating new FIDO utilities to make life easier for users/sysops of a FIDO BBS? Several (me included), and how many hours compared to that do you think the developer(s) of FIDO have spent? About a ten to one ratio would be very close. So let's start charging all users/hosts and sysops all over the world so we could get something in return for all the work we have put in to it. THINK (yes with those gray things called cells)! WHY do "we" have to start charging people for this GREAT service? Huh? This is not IBM nor is it DEC, or IS IT? Since when did Public Domain BBS go off the market? Well, I guess it started with a program called FIDO, or something like it uh? This is really a "John Cleese" (M.Python) classic. I mean BE SERIOUS. Well, I'd like to have some FEEDBACK on this, my Net/Node number was at the top of this article, so start typing. And to the author(s) of FIDO I'd like to dedicate this last line. If a machine isn't anything without good software what good is the core of an apple without the "goodies" around it? ----------------------------------------------------------------- Fidonews Page 6 22 Sep 1986 Christopher Baker Metro-Fire Fido, 135/14(0) SEAdog, I Love It! This is an unsolicited testimonial. I have no financial interest in SEAdog or in S.E.A. I have never met Thom Henderson or any of his S.E.A. cohorts. I am writing this to encourage other Sysops to become SEAdog capable (XP:) and make their systems much more flexible. SEAdog is a stand-alone, E-Mail processing program. It sells, on the open market, for $100.00. It is designed to provide a method for corporate users to automate their message and file handling between branches or offices during regular business hours or after the offices close for the day. It allows corporate users to get more value from their computer installations by making them work nights when they might otherwise be idle. SEAdog has an added benefit for Fido system operators. In addition to its mail and file handling abilities, SEAdog can invoke a BBS by setting a command line and executing a batch file. When run in front of a Fido board, SEAdog becomes a 24 hour, mail handling system and allows your system to send or receive mail at any time. With SEAdog on-line, you are no longer restricted to the National FidoNet window for message or file transfers. The SEAdog package comes with several utility programs that further enhance the operation. Included are two powerful file handling utilities; GET and SEND. With these programs, it is possible to send or request files to or from other SEAdogs at any time. The MAIL program also allows you to request updates of files you already have and the files will only be transferred if the remote SEAdog has a NEWER version of the file than you do. If you are in a hurry, you can send mail or make file transfers immediately by invoking a CRASH event. The MAIL program is also a sophisticated message editor that allows you to FORWARD messages to other Nodes, operate under different Net/Node numbers (useful for Hosts and private Net participants), print messages, write messages to files, send 'Carbon Copies' of messages to other Nodes while writing the message to one Node, enter messages by entering the name of the person you are sending it to while SEAdog adds the appropriate Net/Node number, and many other features. This Node has been operating under SEAdog 3.80 for several months and the support from S.E.A. has been terrific, both by telephone and by Net mail. I have had several weird problems in fully implementing SEAdog due to my peculiar hardware and Thom has been patient with my myriad questions and helped me at every turn. I've also received a lot of help from the IBM HELP, SEADOG HELP and MODEMS EAST HELP Nodes in resolving some of the more arcane problems. Fidonews Page 7 22 Sep 1986 SEAdog is available to Fido Sysops for the ridiculously low price of $50.00. This is a special offer to Fido Sysops only. SEAdog requires an IBM or compatible computer and a Hayes or compatible modem. There is a DEC version in beta-test on 1/0, even as I write. I suggest you send for the program as soon as possible. You will find it much more valuable than the fifty dollars it costs and your system will be tied into the growing number of SEAdog capable Nodes and become a 24 hour NetMail system. Your system's efficiency and capabilities will be dramatically enhanced. I love it. If you are into NetMail, you will too! ----------------------------------------------------------------- Fidonews Page 8 22 Sep 1986 From: Mark J. Welch, Fido 161/459 [WelchNet, Berkeley, CA] Shareware Authors: Under Attack [Even if you skip the article, please read the request at the end.-mjw] I have just been notified that PC-SIG's attorney is sending threatening letters to a number of firms engaged in the business of selling disks that contain Shareware and public domain programs. For those who don't realize, PC-SIG is not a user group. It is a profitable business, owned by an individual. It has a rapidly-growing staff of paid employees, and is planning to release a CD-ROM disk soon with its entire library on it. Its main business is selling disks with MS-DOS Shareware and public domain programs on them for $6 each. I have not yet seen the letter, but was told it makes the following demands: a) The recipient firm must cease using the PC-SIG numbering scheme. (Trivia question: where did PC-SIG get its numbering scheme?) b) The recipient firm may not include the PC-SIG disk summary files on disks being resold or in their own catalogs. PC- SIG is claiming copyright ownership of that text, despite the lack of any copyright notice on the disk or file. c) The recipient firm is ordered to put a notice in its newsletter or other brochures advising all its customers that it is not PC-SIG, does not represent PC-SIG, and including PC-SIG's address and phone number. Several firms, not having the financial resources to investigate their legal options or resist this intimidation, have complied with the first two demands, adopting new numbering schemes and creating their own "disk summary" files. In my opinion, these letters are intended to intimidate legitimate individuals and companies who wish to assist Shareware authors and their customers, and who usually want to make a few dollars from that enterprise. The immediate effect is that several such companies have pulled GAGS and other programs from their software libraries until they can review the disks to create their own summary files. In other words, fewer copies of GAGS are being sold, and PC- SIG is thus attempting to monopolize the market for my program (and others). [This is not to say that all of the folks out there selling Fidonews Page 9 22 Sep 1986 disks are good guys. Many are themselves selling GAGS (and other programs) illegally, since they haven't requested my permission to do so, as required in the documentation. But at least one firm that properly asked for my permission was later forced to pull the disk while he re-did the summary file.] I would like to gather as much information about all of this as possible. REQUEST: I am trying to gather information on the facts and legal issues surrounding all of this. 1) Please send me the names and addresses of any organization (commercial or non-profit, user group, individual, or business) which sells disks containing public domain and Shareware programs. 2) Please let me know if you, as a Shareware author or vendor, have been treated in an unexpected way by any vendor or author. (In other words, have any authors been screwed over, or vendors received threatening letters? Also, has anyone been exceptionally nice to you?) 3) Please point me to any legal authorities, articles, or such, which discuss the legal issues involved in Shareware. Have there been any legal actions yet? 4) Please let me know of other authors who have placed a price-per-disk restriction on PC-SIG's right to sell their programs. (Their CD-ROM disk will sell for considerably more than the $8 maximum I allow.) PLEASE: Don't assume that "someone else" will provide me with information you know about! Every little piece of information will help! Thanks. I will try to gather the information together and will summarize the results in a future issue of FidoNews. Mark J. Welch P.O. Box 2409 San Francisco, CA 94126 (415) 845-2430 [voice: Berkeley CA] Fido: 161/459 [private] BIX: 'mwelch' [Disclaimer no longer needed: as noted earlier, I no longer work for InfoWorld or BYTE. I am now a law student and freelance writer. -mjw] ----------------------------------------------------------------- Fidonews Page 10 22 Sep 1986 Robert A. Rudolph FIDO 109/628 Who Reads FidoNews out there? A few weeks ago I wrote an article for FidoNews enthusiastically praising a product I know and have come to love, DataCare. I did this because I thought it to be a good, worthwhile product, and had learned that not many people out there in FidoLand have ever heard anything at all about it, good or bad. So I wrote this article, and it appeard, and I looked at it, found a misspelled word and asked myself, "If I read this, would it interest me?", and myself replied "It sure would!". The reason for the rhetorical question that is the title is that the author of the product read the review (he probably got it off my board, wlthough I am not sure) and left me mail thanking me for my effort, as he had not known of my intentions to review his product. HE liked the review. He also found the misspelled that I thought nobody would find. I ran into him at lunch today and asked "Have you had any feed- back from that review?", expecting that he had been inundated with inquiries as a consequence of having had his product re- viewed in FidoNews. He responded that he had had ONE inquiry. So I thought I would write this article soliciting FidoMail from anyone reading it, just to see if the response I get is about the same in quantity as the inquiry volume he got. Please do not misunderstand - I look forward to each new issue of FidoNews - I really enjoy reading them, and just made the dumb assumption that everyone else did. With the number of Fidos that we know about, the network connections, the number of potential users and readers, FidoNews readership should be eclipsed only by the readership of the Wall Street Journal. I will continue to write articles to FidoNews as long as they continue to be published. I would like to think they were being read, but most folks who write would, as I do, write for their own amusement only if there were no other audience. But I would like to hear from folks out there in FidoLand, as to who reads FidoNews, and what they seek in it. We have a very powerful vehicle here for the dissemination of ideas and information - an idea and medium that exists nowhere else in the (known) universe - a totally unorganized network, amorphous in topology, largely unmanaged, that actually works. FidoNet sets historical precedent on a daily basis. With the vehicle of FidoNews there is not any excuse for us not to be informed about any issue that impacts our precious BBSes. But two things are needed - 1. Someone's gotta write the stuff; 2. Someone ELSE has got to read it. Fidonews Page 11 22 Sep 1986 is anybody out there??? s ----------------------------------------------------------------- Fidonews Page 12 22 Sep 1986 ================================================================= COLUMNS ================================================================= CLIMBING TREES By Bill Ross The only advantage to the study of history is that it might allow us to learn from past mistakes. In this regard, MS-DOS is the child of CP/M. Like most children though, it does things a little differently than its parent. And in many cases, a little better. For some of us, one of the greatest irritants to CP/M is the limitation of 64 floppy disk directory entries, even on a double sided disk. If we keep copies of short correspondence, such as letters, on a disk, we usually run out of directory space long before we exhaust disk file storage capacity. MS-DOS is a little better; a single sided disk provides 64 directory entries and a double sided disk allows 112. The availability of hard disks muddied the water. Although there was no longer a realistic problem on directory space, they presented another problem: how to keep track of so many directory entries. For CP/M somebody, I'm not sure who, finally wrote LIBRARY, a program that allows you to keep track of numerous files under one directory space. And for hard disks, CP/M resorted to User Areas. These are both good solutions, with only minor flaws. LIBRARY is a program external to the operating system and User Areas are awkward and still limited. MS-DOS utilizes a combination of both ideas. Technically, it's called pathing but most of us commonly refer to it as Trees. The term trees comes from the fact that the main directory of a disk under MS-DOS is, in fact, only the root of a potential structure of inumerable subdirectories that spread out much like the branches of a tree. Each directory space may be utilized to build a completely isolated "user" area with as many files as necessary to fill its particular needs. The advantages of such a system are immediately apparent. We now can have as many "user" areas as we are allowed directory entries on a disk (SS-64, DS- 112, or Hard Disks-512), and the size of the area is limited only by the total capacity of the disk on which it resides. As an illustration, let us suppose that we might wish to place all MicroPro programs in one area utilizing a root directory name of STAR. Each program would then be listed under the root as follows: WORDSTAR DATASTAR CALCSTAR REPORTSTAR These programs would not, in actuality, lie one under the other Fidonews Page 13 22 Sep 1986 of course; each would be directly acccessible from the root as in the following illustration: STAR WORDSTAR/ DATASTAR/ \CALCSTAR \REPORTSTAR and the subfiles under these programs would reside in a similar manner: STAR / / \ \ WORDSTAR DATASTAR CALCSTAR REPORTSTAR / \ / \ / \ / \ WS.1 WS.2 DS.1 DS.2 CS.1 CS.2 RS.1 RS.2 The subfiles above might include any of the program files required to make the named programs functional (i.e. WSMSG.OVR, WINSTALL.COM, etc.) and were limited to two here just to illustrate the tree like structure that pathing generates. For those of you who fail to see any semblance of a tree, turn the page upside down. Pathing is accomplished with the aid of three internal MS-DOS commands: MKDIR (MAKE DIRECTORY), CHDIR (CHANGE DIRECTORY), and RMDIR (REMOVE DIRECTORY). More commonly used but fully functional short forms for these commands are MD, CD, and RD. They are relatively simple to use. Let's generate the pathway directory structure of the previous illustration. Utilizing MD we first generate the STAR subdirectory listing in the disk root directory. A>MD STAR(Return) We can view the results by calling up the disk directory. A>DIR(Return) DOS shows the file STAR: Volume in drive X has no label Directory of X:\ STAR 07-23-85 8:15a 1 File(s) 360448 bytes free If we want to view the contents of a subdirectory we address it specifically: A>DIR STAR(Return) Fidonews Page 14 22 Sep 1986 and will see the following: Volume in drive X has no label Directory of X:\star . 07-23-85 8:15a .. 07-23-85 8:15A 2 File(s) 360448 bytes free Even though we just created this subdirectory, it would seem that two files all ready exist in it. These subdirectory file entries are reference files only and are generated for the use of the subdirectory functions. For the moment, note their presence but don't worry about them. We can, if we desire, now copy each of the programs we want into the subdirectory, but in this case it would not be a good idea. The reason for this is that each program is composed of multiple files and, after we transfered them in, they would be listed amongst the files of the other programs, as well as any working files we might generate as we use them. Gad! how confusing. No, the purpose of this system is to maintain order so let's go one step further by generating additional subdirectories for each of the programs to occupy. In this way, we can actually provide each with its own private "user" area in which to reside and work. We do that in a similar manner in which we made the first one. The primary difference is that these subdirectories will reside at a lower level and we must use specific instructions to MS-DOS so they will appear where we want them. In this case we want them all to reside within the area commanded by STAR. In order to place them there, we give the command: A>MD \STAR\WS(Return) This command instructs MS-DOS to (MD) Make a Directory (\) below STAR (\) under the name WS. Since we still physically reside in the Root Directory, we utilize these \ (reverse slash) marks to show the PATH to the place in which the new subdirectory is to be generated. We generate subdirectories for each of the other programs by repeating this procedure with appropriate titles and, to save space, will not repeat it here. and, if we perform a DIR STAR, we will then see: Volume in drive X has no label Directory of X:\star . 07-23-85 8:15a .. 07-23-85 8:15a WS 07-23-85 8:15a DS 07-23-85 8:15a CS 07-23-85 8:15a RS 07-23-85 8:15a 6 File(s) 358304 bytes free Fidonews Page 15 22 Sep 1986 Well now that we have this orderly layout of directories under which to organize our programs, how do we get the programs in them so that we can utilize them? We simply use the same commands that we have always used, except that we add Path directions. For the purposes of illustration, we will assume that we have generated STAR on the Drive B. In order to copy our WordStar program and its supporting files into the WS subdirectory, place the disk with these files in Drive A and issue the command: A>COPY *.* B:\STAR\WS/V(Return) and MS-DOS will echo each file as it copies and then state how many files were copied. We can check our work by requesting a directory listing of the WS subdirectory. Using path directions we enter: A>DIR B:\STAR\WS(Return) and MS-DOS displays the following directory: Volume in drive B has no label Directory of B:\star\ws . 07-23-85 8:23a .. 07-23-85 8:23a WS COM 21375 01-01-80 11:02a WSOVLY1 OVR 41216 03-16-84 8:02a WSMSGS OVR 29056 03-16-84 8:02a 5 File(s) 7726496 bytes free And of course we repeat this procedure for each of the programs. All right, now that we have everything where we want them, how do we use them? Up to now, we have done everything from the root directory. We have generated subdirectories, copied files into them and examined the directory listings without moving ourselves at any time. This is all well and good for disk maintenance and the like, but things become very awkward if we try to use subpositioned programs from such a lofty position. To begin with, program functions seldom recognize the path instructions that would be necessary under such conditions. So, if the mountain can't come to Mohammad, then Mohammad must go to the mountain. Our magic carpet in this case is CHDIR or, more simply, just CD. ----------------------------------------------------------------- Fidonews Page 16 22 Sep 1986 William/Eunhee Hunter Fido 109/626 Computer Industry Spotlight on: COMPUTER SCIENCES CORPORATION -- CSC is one of the world's largest, most diversified information service companies. Clients range from NASA to FORTUNE 500 companies around the world. CSC experts are responsible for the analysis, design, and implementation of large-scale communications and management information systems for government and commercially based clients. There are ongoing entry-level positions for programmers, systems analysts, computer scientists, and customer service representatives. There is also tuition reimbursement for company-approved courses. Contact: Corporate College Relations, Computer Sciences Corporation, 650 N. Sepulveda Blvd., El Segundo, CA 90245. ----------------------------------------------------------------- Fidonews Page 17 22 Sep 1986 Jerry Hindle 123/6 In this article i will attempt to give you a synapse of the features of FidoUtility version 1.10. This program was written by Benn Mann and Marshall Presnell of Fido 151/10 and 151/2. I found the first version of this amazing utility on the Region 18 coordinators system and after toying around with it for a few days I decided to go ahead and send the message to the author (sneaky wasn't he). I discovered that the first version used a hidden read- only file as the key to testing for the message send prompt. He has since changed this. Ok on to the good stuff. In version 1.10 he has implemented the following utilities: Killsrvr Lastuser Twituser Bounce Ricochet Killto Killfrom Waittime Month Userlist Wait Weekday Killrobt Status Password Setpriv Adopt Twix Robot Sched Although all of the programs reside in this utility, some are limited in scope (and in my opinion, use). Marshell and Benn have done an admirable job of implementing those that are there however and they are to be commended for their efforts. I will take the utilities one-at-a-time from the top of the above list. Killsrvr -------- This will follow the fidomail message path and kill ALL messages generated by server whether they have been sent or not. If you run server on your system then you can run this as a scheduled event after sending the messages to insure that the same message is not sent twice. This program has limited application in that it is NOT selective as to which server messages it kills. An improvement here would be to add the ability to kill only those messages that have been sent, or all messages, selectable by switchline command. Lastuser -------- This will tell you the name of the lastuser and print it to the standard output device. While there may be a need to know this information sometime I find no valid use for this program as all the system operator need do it TYPE the "lastuser.bbs" file to see who was the last one on the system. The authors do however make provisions for generating an errorlevel if the lastuser on the system matches a name entered on the command line. The only use I can think Fidonews Page 18 22 Sep 1986 of for this would be remote triggering of a non-standard event by the sysop by placing a call to the system. One could have the RUNBBS.BAT file trap an errorlevel 2 and if the last user to call before a specified time was in fact the sysop (or some other user specified on the command line) then this errorlevel could trip a non- standard event to run. Twituser -------- This is useful for those of us who like to "lurk" on our side of the keyboard. I have occasion to have to RAPIDLY twit a user if they are the type that likes to call right before midnight use up all their time and log off at 23:59, only to call right back at 00:01 to go to it again. This type person can be taught a QUICK lesson by simply breaking out of Fido typing the command to TWIT him and re- booting Fido. When the user calls back they are surprised to find they can do little other then get off. The command line again contains the name of the user (exactly as shown in the userlog) to twit. Bounce ------ This sends the message back to it's originator, why I don't know. If a person sends a message to me that I do not care to get I simply kill it when I read it. Why bother (not to mention the cost) to send their own message back to them. I find this utility totally useless, and will not go into any detail here on it. Ricochet -------- This one is GREAT. Kind of like call forwarding for messages! The command line contains the net/node to forward to and if applicable the name to send it to. If no name is specified then it is sent as a message to ALL. The only flaw with this utility is that if the message being forwarded is from out of town then the REPLY link is broken since the from line in the header is changed to read FIDOUTIL RICOCHET and the net/node number is changed to read your net/node number instead of the original senders. I suggest the authors change this to keep the original senders name and net/node number. Killto & Killfrom ----------------- These utilities will kill any messages either to or from the username specified on the command line. You must also specify the area # to kill messages in. This is handy for cleaning up after a user has gone berserk and left illegal (or profane) messages all over your system. You simply kill them all with one fell swoop. I suggest that the author make a switch to kill messages either to or from a user in ALL areas at one time (very handy). I also suggest that you TWITuser immediately after running this utility. Fidonews Page 19 22 Sep 1986 Waittime & Wait --------------- These two do just what the names imply. Waittime will stall a batch file until a specified time and then resume execution, while wait (if invoked without any switches) will wait till the next minute. If Wait is invoked with a number after it (ie WAIT 15) then it will stall that many seconds and then resume. This is nice for those 1 minute events that actually take 15 or 20 seconds to execute, thus keeping Fido from cycling thru the same thing over and over till the next minute when the window closes. Month ----- Month if used in conjunction with the runbbs.bat file will return an errorlevel based on the month of the year (ie 0 for January and 8 for September...etc.). While this may be useful for certain things, I have yet to find any of these to use this particular item on. Userlist -------- This one is used to get a listing of certain information from the userlog. It will list either: Username, password, times called (command switch "/p") Username, last date on, times called ( " "/d") Username, Privilege level, times called ( " "/r") Username, Fidomail credit, times called ( " "/$") With no command line switches it will list the username, city, and times called. Handy for a quick printout. Weekday ------- Like month this will return an errorlevel based on the day of the week. I find this one more useful the month since I run different things on different days at odd hours. Killrobt -------- This one acts like Killsrvr and kills any messages from ROBOT found in the network message area. Again I suggest a switch to kill only SENT messages. Status ------ Probably the BEST status report layout and information content I have ever seen! This utility is GREAT. The information it lists is EVERY system?.bbs file you have showing the path for u/l and files and messages and privilege, etc. It also list the info set with the 4 command (ie net/node # , alt net/node #, etc). It will also list out Fidonews Page 20 22 Sep 1986 the schedule file showing all events you have whether enabled or disabled. The whole program is worth it for this utility alone. I forgot to mention it will also list out your route?.bbs files and what they contain. A GREAT UTILITY guys ! Password -------- This one as the name implies allows you to change a users password. You invoke it with the NEW password and the username on the command line, in that order. Handy for changing the sysop password easily. Setpriv ------- This will allow you to change the privilege level of any user from the command line. You use the first letter of the privilege and the username to change. Handy for reversing Twituser. Adopt ----- Allows you to adopt those orphan messages for a retry at sending them out. Simple straightforward and easy to use. Twix ---- Works exactly like the free-standing utility. This will list to the printer messages that are NEW. It is also able to list to the screen. Robot ----- This is a limited use version of Thom famous automated file transfer utility. The author of FidoUtil says it operates in the interactive mode. I say it operates PERIOD. It does what it is supposed to do when it is supposed to do it. Sched ----- This one allows you to change the scheduler from outside Fido. While this is not a bad idea I think most of us dummies would like to have a printout on the screen to look at while we make the changes needed. As it is not you must either use the status to get a hard copy printout and work from that, or go into Fido to make the changes, or use some other utility. Suggestion here is to add a switch to list the entire scheduler to the screen, then allow the sysop to change as he needs. There are a number of other things about FidoUtil that make it nice. These are the savings in disk space as mentioned by the authors, due to the smaller size of the file as opposed to the size Fidonews Page 21 22 Sep 1986 of the combined utilities. Also this program has a config file that takes the place of the config files of the other programs that make use of one. This file is also smaller then the config files of the rest combined. The authors have gone to great trouble to put EXTENSIVE help files into the setup for each utility involved with such info as the syntax for the command line, what switches are available, and the version number of the individual utility involved. They have also done a good job on the documentation included in the ARC file of their program. I commend them for a job well done. I also say that they continue to do the job as they are making every effort to ad at least one new utility a month to the package. Pretty soon we can use one program to do it ALL. The authors request that any bug reports be sent to Fido 151/10. Although I haven't as yet found any I will pass this info along. The latest version of FidoUtil is available from either 151/2 (the authors system) or mine (123/6). Again I take my hat off to these two men for an excellent job. (Benn and Marshall....I believe bows are in order here gentlemen) Jerry Hindle 123/6 (901)353-4563 300/1200/2400 24hrs 365 days ----------------------------------------------------------------- Fidonews Page 22 22 Sep 1986 ================================================================= FOR SALE ================================================================= Ellicott Software Fido 109/628 DataCare, a PC Magazine choice in its recent review of hard disk products, is available at a new low price - $49.95, down from $129.95. This is the same product that has been favorably reviewed. The price is for a limited time only. This product is used by a number of Fido BBS's in net 109, and has found favor with many people that are not SYSOPS in the Baltimore - DC - Virginia area. Three-week trials are available from any user of the product. The review can be read in the PC magazine issue that had as its emphasis EGA boards. A review has also appeared in FidoNews Volume 3 Issue 29, written by the Sysop of Fido 109/628, the Reindeer Shed in Reisterstown, who uses and loves the product. DataCare is published by: Ellicott Software, Inc. 3777 Plum Hill Court Ellicott City, MD 21043 (301) 465-2690 ----------------------------------------------------------------- Fidonews Page 23 22 Sep 1986 Now available from Micro Consulting Associates!! Public Domain collection - 550+ "ARC" archives - 20+ megs of software and other goodies, and that's "archived" size! When unpacked, you get approximately 28 megabytes worth of all kinds of software, from text editors to games to unprotection schemes to communications programs, compilers, interpreters, etc... Over 66 DS/DD diskettes!! This collection is the result of more than 15 months of intensive downloads from just about 150 or more BBS's and other sources, all of which have been examined, indexed and archived for your convenience. Starting a Bulletin Board System? Want to add on to your software base without spending thousands of dollars? This is the answer!!! To order the library, send $100 (personal or company check, postal money order or company purchase order) to: Micro Consulting Associates, Fido 166/1 Post Office Box 4296 200-1/2 E. Balboa Boulevard Balboa, Ca. 92661-4296 Please allow 3 weeks for delivery of your order. Note: No profit is made from the sale of the Public Domain software in this collection. The price is applied entirely to the cost of downloading the software over the phone lines, running a BBS to receive file submissions, and inspecting, cataloguing, archiving and maintaining the files. Obtaining this software yourself through the use of a computer with a modem using commercial phone access would cost you much more than what we charge for the service... The following format choices are available: - IBM PC-DOS Backup utility - Zenith MS-DOS 2.11 Backup Utility - DSBackup - Fastback - ACS INTRCPT 720k format (Requires a 1.2m floppy drive and PC-DOS 3.2) - Plain ol' files (add $50) Add $30 if you want the library on 1.2 meg AT disks (more expensive disks). There are no shipping or handling charges. California residents add 6% tax. For each sale, $10 will go to the FidoNet Administrators. ----------------------------------------------------------------- Fidonews Page 24 22 Sep 1986 ================================================================= NOTICES ================================================================= The Interrupt Stack 24 Aug 1989 Voyager 2 passes Neptune. If you have something which you would like to see on this calendar, please send a message to FidoNet node 1/1. ----------------------------------------------------------------- I.P.R. Echomail ( Interpersonal Relationships ) Are you interested in the discussing the moral,social, and ethical issuses of our time? I have had quite a bit of success offering such a message sig on my B.B.S. It has encouraged a great deal of intelligent interaction. Have several issues often passed through your board on today's controversial subjects like Euthinasia, Divorce, Abortion, public aide programs, Genetic Engineering Etc.? Well then you may be interested in hooking your users into I.P.R. National Echomail. This forum is assured to spur users to engage in stating the various viewpoints in an interesting fashion that will get all involved. It is an enjoyable sig for everyone. For information on how to hookup please Netmail a note to: Randall Kobetich 150/130 Wilmington, Delaware ----------------------------------------------------------------- The ListGen program, used to translate node lists into Fido- usable form, currently has a limit of 1400 node list entries. As of next week, the FidoNet node list will be too large for ListGen to handle. You are advised to make other arrangements for translating your node list. ----------------------------------------------------------------- I've recently received several notes from people who are using old versions of these utilities. Because of this I think an update notice is in order. Fidonews Page 25 22 Sep 1986 Pixie's latest version is 1.31. This is much faster than older versions and depending on the version you have may have several new features, as well as a few bug fixes. This will be the last major release in a while as major changes are planned for Pixie. The latest version of Sched is 5.0. This version allows completely initialization of a file and specification of the filename to work on. Both of these changes were made to facilitate Sched's use with a stand-alone scheduler which is currently on the back burner here at the Ark. Both of these utilities may be File Requested or downloaded from node 137/19. Pre-registration is required if you come in person so send me a password first. Wes Cowley Ark Tangent Fido/SEAdog 137/19 -----------------------------------------------------------------