F I D O N E W S -- Volume 13, Number 43 21 October 1996 +----------------------------+-----------------------------------------+ | The newsletter of the | ISSN 1198-4589 Published by: | | FidoNet community | "FidoNews" | | _ | 1-904-409-7040 [1:1/23] | | / \ | | | /|oo \ | | | (_| /_) | | | _`@/_ \ _ | | | | | \ \\ | Editor: | | | (*) | \ )) | Christopher Baker 1:18/14 | | |__U__| / \// | | | _//|| _\ / | | | (_/(_|(____/ | | | (jm) | Newspapers should have no friends. | | | -- JOSEPH PULITZER | +----------------------------+-----------------------------------------+ | Submission address: FidoNews Editor 1:1/23 | +----------------------------------------------------------------------+ | MORE addresses: | | | | submissions=> cbaker84@digital.net | +----------------------------------------------------------------------+ | For information, copyrights, article submissions, | | obtaining copies of FidoNews or the internet gateway FAQ | | please refer to the end of this file. | +----------------------------------------------------------------------+ REPEAT AFTER ME: "FIDONET IS A HOBBY." Table of Contents 1. EDITORIAL ................................................ 1 FidoNet dead ends? ....................................... 1 2. ARTICLES ................................................. 3 Response to Bob Moravsik ................................. 3 A Short *.MSG Programming Tutorial [I] ................... 4 3. REVIEWS .................................................. 11 Digital Engineering's K-384 ISDN Network Simulator ....... 11 4. COORDINATORS CORNER ...................................... 16 Nodelist-statistics as seen from Zone-2 for day 292 ...... 16 5. WE GET EMAIL ............................................. 17 Region 13 fun and games .................................. 17 Nodelist problem revisited ............................... 17 6. NET HUMOR ................................................ 20 Some New Telephone Options ............................... 20 May the Geeks be with you? ............................... 21 7. COMIX IN ASCII ........................................... 24 What price glory? ........................................ 24 8. QUESTION OF THE WEEK ..................................... 25 Who uses speech synthesizers in FidoNet? ................. 25 9. NOTICES .................................................. 26 Future History ........................................... 26 10. FIDONET SOFTWARE LISTING ................................ 27 Latest Greatest Software Versions ........................ 27 11. FIDONEWS PUBLIC-KEY ..................................... 34 And more! FIDONEWS 13-43 Page 1 21 Oct 1996 ================================================================= EDITORIAL ================================================================= When FidoNet began under the sole aegis of the Fido mailer program invented by Tom Jennings, things were primitive and simple. So, too, were the issues [or lack thereof] concerning daily FidoNet ops or FidoNet structure and modus. Fido, the program, came to a dead end when Tom Jennings stopped working on it. By then, there was Opus and SEAdog and BinkleyTerm and FrontDoor and D'Bridge, to name a few, to make what was once just simple, unattended file transfers into the Hydra of today's FidoNet environment. Fido is still operated by a few hardy souls out there but it dead-ended, development-wise, for lack of interest in making it more complicated. Opus, SEAdog, and D'Bridge all dead-ended but are still in use because of our FidoNet standards. Now, we have routing systems and Echomail structures and CRPs and BBS interfaces and Internet links that make everything seem more complicated. But is it really more complicated or are a lot of folks just confused about what FidoNet is and does at the basic level? FidoNet is defined by a few published standards and its weekly Nodelist. Its glue is this weekly document. None of these things are inherently complicated when boiled down for their oil. FidoNet exists: 1. at the will of its inventor and trademark holder, Tom Jennings; 2. for the express purpose of providing a lowest common denominator means of telecommunicating with a minimum of hardware and software; 3. as an amateur hobby between consenting practitioners. The standards are maintained by an internal group known as the FidoNet Technical Standards Committee [FTSC]. This group operates under direct license from the trademark holder, Tom Jennings. Only Tom Jennings can cause the FTSC to change structure or responsibility. The FTSC does NOT create standards nor does it impose standards. The FTSC documents existing standards as they become de facto operational practices for the majority of FidoNet participants and/or software developers. This is something many folks don't understand or never knew. The FTSC collects, documents, and publishes standards and proposals. It is up the Coordinator structure to enforce those standards. It is up to the developers to get their proposals into wide acceptance and usage before they become standards. Proposals [also known as FSCs] ARE NOT standards. Their implementation is strictly voluntary. They become standards only when they become indispensable to FidoNet ops. There is discussion in several Echos and in these pages about whether the FTSC as currently configured is a dead-end. Is FidoNet going anywhere from here? Does it need to go somewhere from here? What does it take to go somewhere else? Who will be driving this bus to somewhere else? I invite all the principals to take this discussion to future Issues FIDONEWS 13-43 Page 2 21 Oct 1996 of FidoNews so all of us can better understand the dynamics and the expectations of getting FidoNet where it needs to be. ======= On a separate note, I got a message from Debra Turner in the FIDONEWS Echo asking if a text description could be included with the comix in our ASCII art section so folks using speech synthesizers to peruse FidoNews each week could get something out of that visual area. The answer was: absolutely! I apologize for not thinking of it. Today's comix contain such a description and all subsequent offerings in that section will be likewise annotated for the speech program group. Speaking of the FIDONEWS Echo, another question came in about how to format a message for FidoNews submission. Specifically, he wanted to know where the filename specification went in a message to identify where the content should go in FidoNews. The answer is: format the submission text in the body of the message as closely as possible to the ARTSPEC.DOC requirements, i.e. 70 columns, no high ASCII, etc. To define what type of submission it is, put the filename as the subject line, e.g. Subj: THISISA.JOK. All message submissions are manually processed by your Editor to meet the physical requirements of MAKENEWS. Including the apparent filename in the Subj: line makes it easier for me to determine where you wish your submission to appear. If none is included, I guess by the content and give the output file an appropriate filename for processing. The FIDONEWS Echo is open to all interested in FidoNews subjects and operations and is available via your regular Zone 1 Backbone Echo links. It is more real-time than FidoNews if you have a question. ******* As for the moving saga, who cares? I'm still not completely moved in but all the hitches have been standard [late movers, phone company foul-ups, utility headaches, etc.] so I'm sure no one cares to have me rehash it here. [grin] ASCII art and net/computer related humor is slowly starting to trickle in from new authors. That's great! Please keep it coming. Enough for now. I got a late start today by attending the simultaneous birthdays of my daughter and brother [same day, different years, similar names {Eric and Erica}] back down in Titusville from whence I fled three weeks ago. Enjoy! C.B. ----------------------------------------------------------------- FIDONEWS 13-43 Page 3 21 Oct 1996 ================================================================= ARTICLES ================================================================= More EP2 nonsense By Lee Kindness, 2:259/7, lkindnes@csl.co.uk BM> As to the practical aspect of a Zone policy why BM> don't each of you read Section one of Policy BM> 4.07. Local policies MUST meet certain tests. BM> One important one is that they are REQUIRED BM> by local conditions. Not desired, wanted, BM> needed etc...but REQUIRED. Please, zone 2 policy is the business of zone 2 - not a zone 1 sysop. If anything EP2 will be a 'shell' of a policy, allowing policies to complement it at a regional level. I'm sure you agree regional policies make good common sense in zone 2, each region has it's own language for a start. Don't base you views on the policy Steve posted to FidoNews. That was a very early 'hash' and has been long abandoned. BM> Let me poise these questions: Well I'll answer them for a zone 2 sysop point of view, nothing else... (As i try to figure out what other possible view point i have...) BM> 1. If the people that "vote" against a Z2 EP ignore BM> it ...then what ? Depends if the policy is ratified as per EP1. If it is adopted then all nodes will be subject to it. I mean just because i don't like P4 doesn't mean i can ignore it. BM> 2. If those people put in another Z2ep is it anymore BM> enforceable then Woodmorepol. Bet you're glad I'm not Z2EC, Kindnesspol doesn't have such a harsh and evil sound ;) If it is: 1. Submitted before Steve's and ratified as per EP1 2. Ratified as per replacement conditions is EP2 Then sure. BM> Section one of the existing ratified policy contains BM> wisdom. Since message flow all over the world and BM> since any node can link to any other node via any BM> way...how do you expect to enforce a policy that BM> is limited by geography..as to a technology that BM> ISN'T. FIDONEWS 13-43 Page 4 21 Oct 1996 A zone 2 EP would apply to ZONE 2 ECHOES!!! Understand!!! BM> Look at the foolishness in Z1. First there was BM> an echopol attempt. It spent more time on distribution BM> then on policy. It bombed. Then we had "boppy". The My view is EP should focus more on distribution and technical issues rather than 'political' stuff. I mean what is the point of all the garbage about removing a moderator if it cannot be enforced? BM> OK WHAT IS THE SOLUTION: BM> So...Mr. Kindness and Mr. Woodmore. Instead of brushing BM> off an article with childish comments. Address the Good, i said last week - why not fix into ECHOPOL2 and make your views count instead of taking cheap shots in FidoNews... ECHOPOL2 was originally for the discussion of a zone 2 specific echopolicy (and that's still its main aim) but with the Z1EC's interest we might well end up with a global (well z1 + z2) policy. I think we have a broadly similar viewpoint (ie minimum politics in Fidonet) but the difference is you're out in the cold shouting where no one will take notice, if anything promoting Steve. In one of your previous messages you said something about 'zone 2 flexing it's geographical muscles' - the general consensus in ENET.SYSOP, 'about bloody time'... Sleep well, and never mind the purple crocus juice. ----------------------------------------------------------------- A Short *.MSG Programming Tutorial [I] Damian Walker, 2:2502/666 One question which pops up occasionally in programming and technical echoes is how to read and/or write netmail messages. This is one of the principal methods of communication in Fidonet, and so it seems a logical place to start when applying your programming skills to Fidonet for the first time. In this tutorial series, I hope to introduce those with moderate programming capabilities to the world of Fidonet netmail programming, using the *.MSG format (as defined in FTS-1) and the C programming language. Such knowledge could be used for a variety of purposes; you could write a simple netmail robot or other netmail utility. A while ago, someone even wrote a netmail MUD! In this series I'm not going to be nearly as ambitious; a simple netmail directory list utility will suffice for our examples. As the series goes on you will see some C source code published. This source code is in the public domain. Feel free to use it for whatever purpose you wish, whether for commercial, personal or educational purposes. Even Microsoft may use it :-) FIDONEWS 13-43 Page 5 21 Oct 1996 The series is split up as follows: Part [I] Disclaimer Introduction to the Message Format Reading *.MSG files from the netmail directory Finding *.MSG files in the netmail directory Part [II] A More Robust Routine to Read Messages Displaying the body of messages Using Other Header Fields Part [III] Writing *.MSG files Final Message Lister Conclusion Disclaimer Although I will take every precaution to ensure that the information in this tutorial is correct, the occasional typo or plain stupid mistake might creep in. In the event of mangled netmail directories, reformatted hard disks, or excessive frustration (with accompanying hair loss) resulting from use or misuse of this information, I take absolutely no responsibility. Introduction to the *.MSG Message Format The *.MSG message format is often used for netmail areas, principally by those operating FrontDoor-style mailers for their node or point. Users of BinkleyTerm-style mailers often have the option of using a *.MSG area for netmail, if their mail processor supports it. The format is defined in the document FTS-1, available from a large number of sources. Your local friendly FTSC member should have it, and any nearby node could also have it. Failing that, check the Internet sites http://www.fidonet.org or ftp://ftp.fidonet.org, or as a last resort, FReq FTS-0001.ARJ from my system (FReq's are welcome, but it may be an international call for you). Here is a quick run-down. In the *.MSG format, each message occupies a single file, the filename being the message number plus the extension '.MSG' (hence the *.MSG name). Each MSG file contains a single header followed by the message text, and 1 ASCII NUL character. The header is as follows: fromusername char/36 Sender's name tousername char/36 Recipient's name subject char/72 Subject line datetime char/20 Date/time stamp timesread int/2 Times read destnode int/2 Recipient's node number orignode int/2 Sender's node number cost int/2 Cost word orignet int/2 Sender's net number destnet int/2 Recipient's net number destzone int/2 Recipient's zone number origzone int/2 Sender's zone number FIDONEWS 13-43 Page 6 21 Oct 1996 destpoint int/2 Recipient's point number origpoint int/2 Sender's point number replyto int/2 Reply linking information attribute int/2 Attribute word nextreply int/2 Next reply to this message Early software implementations lack the zone and point information from the header, and some modern implentations have it but don't use it. For the purpose of this tutorial the full structure will be used, including zone and point numbers, and technicalities of extracting zone and point information from messages which don't use this header information will be dealt with later. The message text, as defined by FTS-1, doesn't have any limit on size. It must be terminated by an ASCII NUL character (0); some software doesn't do this so we'll have to find out how to deal with messages from such software later on. One aspect of Fidonet messages which impresses me is the fact that lines are reformatted in real time by your editor. A good message editor should produce messages in which a whole paragraph occupies one line; these paragraphs can be reformatted to suit the reader's screen, no matter what font, screen or window size is being used. This is by far preferable to the clumsy reformatting codes used by some other systems. Paragraphs (or lines in a table) should be terminated by a single carriage return (13) character, rather than a line feed or CR/LF pair. This standard is not always observed by message editors, especially those which use a standard external text editor to input the message text-- these message editors often leave the line end markers as they are produced by the text editor. The message text contains kludge lines. Although most readers will be familiar with kludge lines, I'll give a brief explanation here for completeness' sake. Kludge lines are lines in the message text beginning with the ASCII character 1 (^A, often shown as a smiley face on MSDOS screens). Most, if not all, message readers filter these lines out of the message display; you won't see them. These lines server a number of purposes. The FMPT and TOPT kludges offer point addressing information for messages in which the point header information is not used. The INTL kludge provides a similar facility for the zone information, showing both source and destination zone addresses. The MSGID kludge serves to identify a message explicitly. There are some other kludge lines in use, ranging from the vaguely useful to the downright silly. We need not consider them here. Now for the message header in C. /* FTS-1 message structure */ struct fts1 { char fromusername[36], tousername[36], subject[72], datetime[20]; int timesread, destnode, orignode, cost, orignet, FIDONEWS 13-43 Page 7 21 Oct 1996 destnet, destzone, origzone, destpoint, origpoint, replyto, attribute, nextreply; }; If you're using a 32-bit compiler such as DJGPP then you'll have to change 'int' to 'short' as all these fields are 16-bit integers. There is a more portable way of ensuring that the correct size of integers is used no matter what the compiler, involving pairs of 'char' variables, but for this tutorial I'll keep things simple. For the purposes of later examples, save this definition in a file called "fidomsg.h"; I'll refer to it later. Reading *.MSG files from the Netmail Directory Reading a netmail message is, in theory, a simple task. If the message is fully compliant with the specification, you just open the file, read the message header, read the message text, and close the file. A simple function to do that would look like this: void readmsg(struct fts1 *msg, char *text, int limit, char *filename) { FILE *msgfile; /* message file handle info */ msgfile = fopen(filename, "rb"); fread(msg, sizeof(struct fts1), 1, msgfile); fread(text, 1, limit, msgfile); fclose(msgfile); } Note that there is no error checking in this function at all; a more robust function will come later. Note also that the size of the message is limited; a more complex algorithm would be needed to read files larger than the maximum buffer you could allocate. This function would be called as in the following example: #include #include "fidomsg.h" #define MAXMSGSIZE 2048 /* include the readmsg() function here */ void main(void) { struct fts1 msg; char text[MAXMSGSIZE]; readmsg(&msg, text, MAXMSGSIZE, "\\fd\\mail\\1.MSG"); printf("From: %s (%d/%d)\n", msg.fromusername, msg.orignet, FIDONEWS 13-43 Page 8 21 Oct 1996 msg.orignode); } This program defines the macro MAXMSGSIZE as 2048, meaning that the program can deal with messages up to 2k in length. Real applications would probably need to use a bigger buffer, or a more complex algorithm for reading large messages as described earlier. The program also assumes that the first message in the directory will be 1.MSG, so you'll have to make sure that this is in fact the case. Alternatively you can modify the program to load another message, or to be more useful, allow a message number or file to be specified on the command line, like this: ... void main(int argc, char *argv[]) ... readmsg(&msg, text, MAXMSGSIZE, argv[1]); ... To make the program more robust you'd have to include some error checking to make sure that there is at least one parameter used on the command line, but we're drawing away from the main point of the article so I'll leave you to figure that one out. Finding *.MSG Files in the Netmail Directory So far we have a program which will display a few details from a single netmail message, as long as the message is 1.MSG or, assuming you've experimented with the suggested modifications, as long as we know the filename of the message. This is a bit useless for our ultimate objective for this article-- to list details of messages in the netmail directory. In this task we don't know the message numbers beforehand, and of course, we want to list more than a single message. In solving this task we need to obtain a directory listing, and thus we must depart for a moment from ANSI standard C; the standard libraries contain no functions to perform this platform-specific task. For our purposes I have chosen to use the widespread functions findfirst() and findnext() defined in the file . These are present in many DOS and UNIX dialects of C, and other dialects may have direct equivalents (such as _dos_findfirst() and _dos_findnext()). A cumbersome way to avoid using these is described later; it needs a more robust message reading routine before we attempt to implement it. The function findfirst() takes three parameters-- a character array containing a wildcard, a pointer to a structure containing the file search information, and an attribute for the search. The findnext() function takes only one parameter-- the pointer to the structure used in findfirst(). How would we use these functions to get a list of messages in the netmail directory? Take a look at the following example code: #include #include void main(void) FIDONEWS 13-43 Page 9 21 Oct 1996 { struct ffblk f; int done; done = findfirst("\\fd\\mail\\*.msg", &f, FA_ARCH); while(!done) { printf("Found: %s\n", f.ff_name); done = findnext(&f); } } The line containing the call to findfirst() sets up the file search parameters-- *.msg files in the \FD\MAIL\ directory, including files with the archive bit set (FA_ARCH). The ff_name member of the f variable (see the printf() line) is a simple filename without a path. The findnext() line just searches for the next occurrence of the file. As you can see, this program will print out the names of the MSG files, but it will not reference their contents. So the program is a little useless, although it could be used to verify the existence of 1.MSG for the earlier example! To make the program more useful, it would have to be combined with earlier examples: #include #include #include "fidomsg.h" #define MAXMSGSIZE 2048 /* include the readmsg() function here */ void main(void) { struct fts1 msg; struct ffblk f; char text[MAXMSGSIZE], directory[128], wildcard[128], msgname[128]; int done; /* initialise directory and wilcard */ strcpy(directory, "\\fd\\mail\\"); sprintf(wildcard, "%s*.msg", directory); /* main list output section */ done = findfirst(wildcard, &f, FA_ARCH); while(!done) { sprintf(msgname, "%s%s", directory, f.ff_name); readmsg(&msg, text, MAXMSGSIZE, msgname); printf("%-12s From: %s (%d/%d)\n", f.ff_name, msg.fromusername, msg.orignet, msg.orignode); done = findnext(&f); } } Notice here that I've created separate variables for directory, FIDONEWS 13-43 Page 10 21 Oct 1996 wildcard and individual message filename. 'Wildcard' is needed to pass to findfirst(), 'directory' is needed in two places: in the creation of 'wildcard' and in the creation of 'msgfile', and 'msgfile' is needed to pass to readmsg(), which expects a full filename. Since the directory is a constant in these examples, the directory name could be included in literal strings, but I've purposely left the variable in there so that you can easily modify the program to obtain it by other means-- from the command line or a configuration file, perhaps. As you can see, this is the full program promised at the start of this tutorial, which lists details of messages in a netmail directory. But the tutorial is far from over, as we haven't considered extracting node and point information from the messages. This will be the subject on which next week's article starts. ----------------------------------------------------------------- FIDONEWS 13-43 Page 11 21 Oct 1996 ================================================================= REVIEWS ================================================================= Digital Engineering's K-384 ISDN Network Simulator Fredric L. Rice (frice@stbbs.com) The Skeptic Tank 1:218/890.0 (818) 335-9601 Lately I've been evaluating the K-384 ISDN Network Simulator from Digital Engineering in Ireland and thought that there might be some netters who would be interested in this box. It's mostly intended for the manufacturer of ISDN equipment rather than the end user or the digital hacker yet the fact that the puppy will provide three ISDN interfaces and six 64K Bps data connections also makes this a pretty good kind of V.110 synchronous Terminal Adapter. The K-384 is an ISDN network simulator, a Terminal Adapter, and a protocol analyzer, granting the user insights into all of the intimate details of the ISDN protocol stack: I.430, Q.921, Q.931, and all anybody really needs of Q.932. Since there are three ISDN interfaces on this box there can be up to six 64K Bps calls up at any one time, pumping data to and from the six data connections on the back panel. It's not a real Terminal Adapter, however, and it doesn't offer asynchronous data out the back panel. If it did then I could ask GTE to bring in three ISDN lines and I could run up to six 57,600 baud connections at any one time or, if Digital Engineering elected to employ the BONDING protocol rather than just V.110 and V.120, I could have up to three 115,200 baud connections up at any one time. I'm going to ask Digital Engineering to think about putting these things into their K-384 because doing so would allow ISDN equipment manufacturers to test every aspect of their devices fully. The box itself has some good points and some bad points: 1) It's easy to use with near plug-and-playability. The menus are simple to use and the analyzer offers all the information about Layers 1, 2, and 3 that are needed. Clearing the analyzer buffer is quick and easy. Redisplaying the whole buffer upon exiting the analyzer and re-entering it is a nice feature as well. There is an LED which displays whether or not we have Layer 1 and another LED which shows us if we have established Layer 2. The ability to see easily if we have Layer 2 established is kind of nice. 2) The K-384 runs cool and silent. The power supply that I have in my sample box some times puts out a very FIDONEWS 13-43 Page 12 21 Oct 1996 quiet high frequency whine which at times can be heard (other people don't seem able to hear it at all.) 3) It doesn't appear to support Low-Power Mode / Warm Start Mode. I could just be doing something wrong, of course. There is the facility for tearing down Layer 3, Layer 2, and Layer 1 after a duration of inactivity yet I haven't been able to get it to successfully go into the deactive Warm Start state. 4) It's got bugs. Some bugs are fatal and some are not. a) Unexpected removal of the U-Interface will often cause the K-384 to crash, requiring power-cycle. Some times when the cable is quickly disconnected and reconnected, the K-384 will buzz, all the B1 and B2 lights will flicker, and then the K-384 will restart; configuration will be lost. b) Calling a B channel which has no physical device plugged into it will illuminate the B channel's LED then the K-384 will properly return a RELEASE COMPLETE yet leave the LED illuminated. I noticed that this problem seems to only exist on Port 2. c) At power-up, there are times when I continue to send ID_REQUESTs to the K-384 and the K-384 will ignore them. Shifting the cable to the other U-Interface connector on the K-384 fixes the problem. For example, there are times when I talk into Port 3 of the K-384 and send dozens of ID_REQUESTs to the K-384 which will ignores them. Moving the cable from Port 3 to Port 2 makes the device perform a Layer 1 LinkUp thereafter the K-384 responds properly to the ID_REQUEST on Port 2. Swapping the cable back to Port 3 fixes the problem on Port 3 since it will start to respond to the ID_REQUESTs. e) The "Analyzer Setup" menu contains a date/time stamp that is constantly updated. It messes up the screen. While in the "Analyzer Setup" menu, using the arrow keys to traverse the menu causes the date/time stamp that's constantly being displayed to be written over the wrong line on the display. Though it's a minor glitch, I tried all the different terminal emulations Procomm Plus has and the ANSI emulators all exhibited the same glitch. f) Output from the K384 will send both CR/LF pairs as well as isolated CRs. This is sloppy... very sloppy. For example, we'll see 0D 0A 0D 0D 0A 0D in the following. Text which follows a 0D can over-write the previous line when the log file is sent to the printer. FIDONEWS 13-43 Page 13 21 Oct 1996 0D 20 20 20 20 20 20 20-20 20 20 53 41 50 49 3D . SAPI= 20 30 2C 20 54 45 49 3D-20 34 30 2C 20 43 2F 52 0, TEI= 40, C/R 3D 20 30 2C 20 50 2F 46-3D 20 30 2C 20 54 59 50 = 0, P/F= 0, TYP 45 3D 20 49 4E 46 4F 0D-0A 0D 20 20 20 20 20 20 E= INFO... 20 20 20 20 4E 28 72 29-3D 20 38 2C 20 4E 28 73 N(r)= 8, N(s 29 3D 20 37 0D 0A 0D 0D-0A 0D 20 20 20 36 31 20 )= 7...... 61 3A 20 54 45 20 43 68 20-20 33 20 4C 33 20 20 20 : TE Ch 3 L3 So there are some software issues that Digital Engineering needs to work out of their K-384 before I would buy it. I pulled the cover off their box to check the manufacturing side of things and noticed that the box I'm using has version "V1.2 LX," whatever that is. As for the mechanics and the workmanship of the box there are also some good things and bad things. First off it took 14 sheet-metal screws to remove the top lid. This is damned good because it gives the construction of the box a great deal of strength. Because the lid rests upon a metal strip along the front and is tied together with 14 screws, I don't have any moral compunctions against stacking heavy equipment on top of it. I would probably keep the power-supply air vents uncovered, of course. The metal strip along the front that the top lid rests upon has a black plastic strip along its entire length giving it a good, solid vibration killer. There's no metal-to-metal interface tending to grind together when installed in a test environment. Lifting the lid off the first thing I noticed was the modular design. If I want any combination of U-Interfaces and S/T-Interfaced, all that Digital Engineering has to do is pop in a small module onto their primary board and then ship it to me. If I want to change the configuration of the hardware interfaces in the field, all I need to do is pull out one screw, unplug the module, and plug the new one in. Whoever designed this piece of the product did a damn good job. The through-hole on the screw is oblate allowing for a good degree of travel side to side if the machining of the container is not exactly the same every time. In so many other products I've looked inside of there is usually only a single screw hole -- circular -- and if the jack on a panel doesn't exactly match-up with the cover plate, something must be bent to make it line up. This design is superior in that the screw hole travels until there is a mechanical alignment and then the screw is tightened down; no bending required. FIDONEWS 13-43 Page 14 21 Oct 1996 They're using the Mitel MT8910AC for the U-Interface and the Mitel MT8930BE for the S/T-Interface, I noticed. I would prefer that they had used Motorola's U-Interfaces simply because I'm biased in favor of Motorola products but these Mitel products are solid and reliable. All the other digital components are manufactured in Malaysia. The power supply is also a good design. I can't tell if Digital Engineering buys this power supply from someone else and installs it in their K-384 or whether they go ahead and manufacturer it in-house. No, I unsoldered some components next to its transformer and see that the power supply was manufactured in Japan. 'Makes good financial sense. Another thing I noticed while looking for who made the power supply was the fact that there is a space for the main board's serial number but that it's blank. There is a serial number on the outside on a sticker but I wonder how Digital Engineering tracks boards if they don't put serial numbers on them. The sticker is easily removed so I could easily cheat on my warranty, I think. Bar far the worse thing about the workmanship is the outrageous number of through-holes and component pins that simply don't have enough solder in them or, in many of the components toward the front of the box, just don't have _any_ solder in them at all. This may be the cause of some of the unexplainable crashes I've been experiencing. It looks like the wave-solder process just did a bad job. Every hole should be filled entirely and every pin should be soldered down, of course. Just stepping through traces and pins and such with a continuity tester shows me that all of the pins that are not soldered onto the board nonetheless have connectivity but with a little probe tip pressure I can make some of the pins break contact with their etches. If I were sitting on a work bench with hardware grunts working on it, I could expect to have some of these pins fail. I'm guessing that because the unsoldered pins normally have continuity with their etches, it's why this particular box managed to make it through their quality control. The only other poorly done workmanship about this particular box is the front-end components driving the data ports on the back panel. It looks like there might have been some component failures and so new components were manually placed on the board to replace them. The surface mounted components are in okay and everything works yet there are tiny peaks of solder on most of the manually-soldered pins. It's not the smooth slope that I'm used to seeing. The only other thing worth mentioning is the manual. In a word, it isn't. A manual, I mean. It's more like a reference book for some of the major aspects of the device. There is a PCMCIA interface and a PCMCIA ROM/FLASH card which came with FIDONEWS 13-43 Page 15 21 Oct 1996 my K-384 which I have no idea what to do with it. The PCMCIA connector is a good one -- it has an ejector lever and it's firmly mounted -- no play; doesn't wiggle like so many other PCMCIA designs I've seen. But the manual doesn't give me any clues. The AT commands, come to think of it, aren't enough for me to utterly control the box remotely. I would also ask Digital Engineering to give me more control over configuration and control through the AT command set. I would think about writing a Windows GUI interface for the K-384 eventually but as it stands now, I don't have enough remote control hooks to get inside the box's brain. My overall summation of the Digital Engineering K-384 Network Simulator is that I would like to personally own a couple. I like the box. I wouldn't even mind actually paying for them if I were doing ISDN related hardware or software development. Before I would spend my own personal money on one, though, I would require them to solve their software problems and their solder-wave process problems first. If they did that I would also ask that they employ the V.120 Rate Adaptation Protocol so that I could do asynchronous out the back and _really_ test all of my hardware and software designs. Then I would expect a proper manual. After that then I could run six high-speed links to The Skeptic Tank -- some to my Unix box and some to the DOS box. This company, by the way, has been most helpful in answering my questions. Even though I asked some difficult technical questions they managed to locate someone with the background and knowledge to answer my questions. I have no idea what my company pays for these boxes. Being a software dink I don't have to worry about such things. It's great just being able to ask for equipment and not give a damn about the cost. Someone said that the cost was around $5,000 but he wasn't sure. There is also a 16-interface version of this Network Simulator which I'm going to ask for eventually. Before I would put 16 ISDN lines into my house, though, I would just as soon have GTE bring in a T1 / E1 span and be done with it. Ascend in Alameda, California, would probably be my T1 equipment supplier of choice. Digital Engineering Ltd. Unit #5 Antrim Line Business Park Sentry Lane, Mallusk Belfast BT36 8XX, Ireland. Telephone: 0232 840004 FAX: 0232 838164 ----------------------------------------------------------------- FIDONEWS 13-43 Page 16 21 Oct 1996 ================================================================= COORDINATORS CORNER ================================================================= Nodelist-statistics as seen from Zone-2 for day 292 By Ward Dossche, 2:292/854 ZC/2 +----+------+------------+------------+------------+------------+--+ |Zone|Nl-264|Nodelist-271|Nodelist-278|Nodelist-285|Nodelist-292|%%| +----+------+------------+------------+------------+------------+--+ | 1 | 11810|11826 16 |11826 0 |11666 -160 |11666 0 |38| | 2 | 16392|16406 14 |16394 -12 |16341 -53 |16356 15 |53| | 3 | 954| 954 0 | 951 -3 | 950 -1 | 956 6 | 3| | 4 | 629| 629 0 | 629 0 | 610 -19 | 620 10 | 2| | 5 | 100| 100 0 | 100 0 | 97 -3 | 97 0 | 0| | 6 | 1020| 1020 0 | 1020 0 | 1022 2 | 1020 -2 | 3| +----+------+------------+------------+------------+------------+--+ | 30905|30935 30 |30920 -15 |30686 -234 |30715 29 | +------+------------+------------+------------+------------+ ----------------------------------------------------------------- FIDONEWS 13-43 Page 17 21 Oct 1996 ================================================================= WE GET EMAIL ================================================================= --- Following message extracted from NETMAIL @ 1:374/14 --- By Christopher Baker on Thu Oct 17 19:22:38 1996 From: Joe Klemmer @ 1:109/370 To: Editor @ 1:1/23 Date: 15 Oct 96 22:16:33 Subj: Article Submission Region 13 fun and games By Joe Klemmer - 1:109/370 klemmerj@webtrek.com This will be short and to the point - The RC screwed up by not renewing the Elistings for the R13 echos. Bob Moravsik then did what is perfectly proper by Elisting the echos himself. The REC then created new R13 echos to supersede the old ones. Again, a perfectly proper thing to do. Final outcome: The old echos are no longer part of the R13 regional distribution and can be whatever the moderator wants them to be. They are not "official" (whatever that is) R13 echos so whatever happens in them means nothing to the region. See? As I said, short and simple. Phil Dampier screwed the pooch; Bob Moravsik did what he does best; the region adapted to correct the situation; the problem is non-existent. To make more of it is a waste of time and effort and only serves to cause trouble for no reason. Joe --- ----------------------------------------------------------------- --- Following message extracted from NETMAIL @ 1:374/14 --- By Christopher Baker on Sun Oct 20 14:06:22 1996 From: John Souvestre @ 1:396/1 To: Christopher Baker @ 1:374/14 Date: 19 Oct 96 03:49:50 Subj: NodeList Problem Hello Chris. Feel free to print this in FidoNews. FIDONEWS 13-43 Page 18 21 Oct 1996 Regards, John === * Original to Ward Dossche at 2:292/854 in "netmail" * Forwarded Sat Oct 19 1996 03:52:59 by John Souvestre at 1:396/1 cc: Bob Satti 1:153/6 David Nugent 3:632/348 Ariel Nardelli 4:905/101 Henk Wolsink of 5:7104/2 Kazuyoshi Shinada 6:730/9 Egons Bush 2:5100/8 ZONEGATE echo FN_SYSOP echo Hello Ward. There has been no Zone 2 updates in the Zone 1 NodeList for over 3 months. All problems with other zones seem to be fixed, including Zone 3 (which passes through your own system on it way here) and Zone 6. In Zone 1, the only remaining problem is with Zone 2 updates. > This is a matter to be sorted out among ZC's. So far ZC/1 has not > voiced a request to get a new full segment which to me means he's > doing OK! What type of leadership is this? The record speaks for itself. ZONE2.AD7 07/04/96 ZONE2.A94 07/10/96 <== Full Segment ZONE2.AD1 07/16/96 ZONE2.AD8 07/23/96 ZONE2.AD5 07/30/96 ... <== Missing... ZONE2.AD9 08/14/96 ZONE2.AD6 08/20/96 ... <== Missing... ZONE2.AD0 09/04/96 ZONE2.AD7 09/11/96 ... <== Missing... ZONE2.AD1 09/28/96 ZONE2.AD8 10/02/96 ... <== Missing... ... <== Missing... Stop playing politics and fix the problem. Either your site or Egons is handling the updates properly. Meanwhile, a full segment is still needed. Regards, FIDONEWS 13-43 Page 19 21 Oct 1996 John Via MsgTrack+ 1:396/1, Sat Oct 19 1996 at 08:55 UTC -30- ----------------------------------------------------------------- FIDONEWS 13-43 Page 20 21 Oct 1996 ================================================================= NET HUMOR ================================================================= Some New Telephone Options by August Abolins, [a.abolins@ieee.ca, 1:253/60] (The following was found on another FTN-based echo system. The posting did not indicate any credits to an original author. I have forwared it here as it was originally posted in the echo.) With the myriad of telephone "services" now so widely available, two of which are actually useful I present to you one interpretation of the madness. ..AA -=- Would the invention of the telephone ever have gotten off the ground if Alexander Graham Bell's first call had gone ... Bell: Mr. Watson, come here; I want you. Voice: If you know Watson's extension, press 1 now. If you would like to leave a message for Watson, press 2 now ... The telephone, which was satisfied for a century or so simply placing and receiving calls, has become a different animal in recent years. These days everybody has an answering machine, a speakerphone, and a slew of other telecommunication doodads. Call waiting, Caller ID, and last number redial are fine, but here are some options that can't be far behind: ON-HOLD DISRUPT. When someone puts you on hold for more than 15 seconds, a digitized voice blares over their speakerphone, "Hey! Remember me? I don't have all day!" This option also shorts out Muzak if it's being played. CALL SCHMOOZING. Stuck listening to a long-winded acquaintance? Call Schmoozing activates a speech-synthesized voice that sounds just like you and repeats, "Uh-huh ... I see ... right" while the other party babbles on. They think you're hanging on every word, when you're actually getting some work done. CALL SCHMOOZING PLUS. Your phone places call to important contacts, trades pleasantries, probes for career-enhancing information, and ends by saying, "You're beautiful. Let's do lunch. Don't ever change." GOSSIP NOTIFICATION. Company rumors are automatically broadcast to selected voice mailboxes. Time once wasted circulating gossip translates into increased productivity. CALL TERMINATE. Imagine being able to fire troublesome employees just by dialing their numbers! An excellent feature for executives with poor confrontation skills. NETWORK EAVESDROP. A must for the paranoid manager. Whenever anyone in the company mentions your name during a phone conversation, a voice- FIDONEWS 13-43 Page 21 21 Oct 1996 activated tape recorder stores the call so you can review it later and hear what people say about you. SELECTIVE CALL DISCOURAGING. Program the numbers of people you _really_ don't want to speak with. When they dial your number, your phone transmits a mild electric shock through their receivers. CELLULAR CRANK CALL. On command, your car phone can dial any other car phone within a 30-mile radius and tell the driver his muffler looks as though it's about to fall off. CALL REMINDING. Store the birthdays and anniversaries of loved ones in your telephone's memory. On the appropriate days, the phone automatically calls them and relays heartfelt sentiments in a digitized voice resembling yours. CALL INTERRUPT. When you need to end a conversation quickly, a button on your phone causes a fake operator to break in and announce that you have an emergency call on the line from Steve Jobs. SUBLIMINA-CALL. Periodically during a conversation, the phone plays subliminal messages to the other party, such as "Say yes" and "Increase my department's budget." CHARGE FORWARDING. A quick push of a button charges any long-distance call to the person you're calling or to friends who don't look too closely at their phone bills. -=- ----------------------------------------------------------------- From: "Mike Riddle" To: "Baker, Christopher" Date: Sat, 12 Oct 96 08:54:31 -0500 Reply-To: "Mike Riddle" Subject: Fwd: Geekaderata ==================BEGIN FORWARDED MESSAGE================== >Date: Thu, 10 Oct 1996 10:05:42 -0500 >From: David Galloway >Reply-To: David.Galloway@chron.com >Organization: Houston Chronicle Interactive >Subject: Geekaderata Geekerata (A UNIX Analog of Desiderata (Max Ehrman, 1927)) (mainly as addressed to a network process) Badri Krishnamoorthy badri@srtc.com ----- FIDONEWS 13-43 Page 22 21 Oct 1996 Route placidly amid channel noise and network failures, And remember what throughput there may be in executing all alone. As far as possible, without overflowing buffer Be on communicative terms with all processes. Broadcast your data quietly and clearly And listen(2) to others. Even to the null and the unreachable, They too have their requests. Avoid long and argumentative sessions They are burdensome to the ether. If you compare your priority with others' You may become vain or bitter For always there will be greater and lesser processes than yourself. Enjoy your CPUtime as well as your idletime. Keep cognizance of your portmapper, however low-level It is a constant port in the changing mappings of the network. Exercise caution in your execution, For the kernel is full of traps. But let this not blind you to what swap space there is; Many channels strive for high bandwidths, and everywhere Computing is full of parallelism. Be yourself. (Check with getpid(2) frequently) Especially do not forge NFS file handles. Neither be cynical about sockets, For in the face of all congestion and delays They are as powerful as STREAMS. Take kindly the influx of new requests, Gracefully re-prioritizing the older ones. Nurture support of check-points to rollback from sudden crashes But do not thrash pages due to imagined pagefaults: Many core dumps are born of bus error or segmentation faults. Beyond a nominal consideration, Be nice(1) to other processes. You are a child in the kernel space No less than the daemons and the device drivers, You have a right to execute here. And whether or not it is apparent to you No doubt the kernel is crashing, though it shouldn't. Therefore be at peace with your programmer However geeky you think s/he is. And wherever your read(2)'s and recvfrom(2)'s, In the noisy communication channels of the network, Keep a valid (void *) buf available in your address space. With all its stopped jobs, missing arguments and broken pipes, It is still a UNIX shell. FIDONEWS 13-43 Page 23 21 Oct 1996 Be backward-compatible. Strive to be up and running always. -- David Galloway Houston Chronicle Interactive mailto:David.Galloway@chron.com http://www.chron.com/david ===================END FORWARDED MESSAGE=================== ----------------------------------------------------------------- FIDONEWS 13-43 Page 24 21 Oct 1996 ================================================================= COMIX IN ASCII ================================================================= [For speech program users: The picture below depicts a stylized five dollar bill where the word dollar has been replaced with the word dullard. it is a Federal Reverse Note from the Untied States of America.] [grin] --- Following message extracted from NETMAIL @ 1:374/14 --- By Christopher Baker on Fri Oct 18 11:26:40 1996 From: Dave Aronson @ 1:109/120 To: Chris Baker @ 1:18/14 Date: 17 Oct 96 23:27:26 Subj: ascii comix CB> Date: 29 Sep 90 22:50:38 CB> From: Dave Aronson CB> To: Jonathan Rolfe @ 906/201 CB> Subj: Re: Happy New Year CB> _________________________________________________________________ CB> CB> > I always wondered what the creative could do within the CB> > constraints of ASCII! Now let's see if anyone can get some CB> > runes together for Hallowe'en! CB> CB> Maybe something like: CB> CB> _ H A P P Y H A L L O W E E N ! ! Wow, talk about ancient history! Guess I'll finally get around to submitting some of my original creations. First, here's payment for my Fidonews subscription: .--------------------------------------------------------------------. | .-- FEDERAL REVERSE NOTE .-- | | |_ ...... THE UNTIED STATES OF AMERICA |_ | | __) `````````` ______ B93810455B __) | | 2 ___ / \ 2 | | /|~\\ / _-\\ \ __ _ _ _ __ | | | |-< | | // \ | |_ | | | |_ | | \|_// | |- o o| | | | `.' |__ | | ~~~ | |\ b.' | | | B83910455B | \ '~~| | | | .-- 2 \_/ ```__/ .... 2 .-- | | |_ ///// ///// //// \__\'`\/ `` //// / //// |_ | | __) F I V E D U L L A R D S __) | `--------------------------------------------------------------------' -30- ----------------------------------------------------------------- FIDONEWS 13-43 Page 25 21 Oct 1996 ================================================================= QUESTION OF THE WEEK ================================================================= I am aware that there are folks out there reading FidoNews with speech programs. I know these programs are also used for Netmail and Echomail. The Question of the Week is who uses these programs, what programs are in use, and are any of these functions available inside mailers or BBS or editor programs? Please send responses as articles, Netmail, Echomail in the FIDONEWS Echo, or email to our Internet address. See the Masthead information at the end of each Issue of FidoNews for contact info. Thanks. ----------------------------------------------------------------- FIDONEWS 13-43 Page 26 21 Oct 1996 ================================================================= NOTICES ================================================================= Future History 29 Oct 1996 Republic Day, Turkey. 5 Nov 1996 Election day, U.S.A. 5 Nov 1996 Guy Fawkes Day, England. 1 Dec 1996 Twelfth Anniversary of FidoNews Volume 1, Issue 1. 12 Dec 1996 Constitution Day, Russia 26 Jan 1997 Australia Day, Australia. 6 Feb 1997 Waitangi Day, New Zealand. 16 Feb 1997 Eleventh Anniversary of invention of Echomail by Jeff Rush. 29 Feb 1997 Nothing will happen on this day. 25 May 1997 Independence Day, Argentina 11 Jun 1997 Independence Day, Russia 1 Dec 1998 Fifteenth Anniversary of release of Fido version 1 by Tom Jennings. 31 Dec 1999 Hogmanay, Scotland. The New Year that can't be missed. 15 Sep 2000 Sydney (Australia) Summer Olympiad opens. -- If YOU have something which you would like to see in this Future History, please send a note to the FidoNews Editor. ----------------------------------------------------------------- FIDONEWS 13-43 Page 27 21 Oct 1996 ================================================================= FIDONET SOFTWARE LISTING ================================================================= Latest Greatest Software Versions by Peter E. Popovich, 1:363/264 Amazingly enough, I'm still pretty much caught up. If you've sent anything in that you haven't heard back on, it was probably eaten up by the routed mail goblin; please resend it. One note: Upon request, I've changed the contact for Maximus & Squish from Gary Gilmore to "Tech" at 1:249/106. Scott Dudley really wishes I listed internet information in the list, but I don't. I will however give him a plug this week: http://www.lanius.com. Phased out this week: Apple II Software Phase-out highlights: This week: QNX Software Deadline for info: 1 Nov 1996. Last week: Archimedes Software Deadline for info: 25 Oct 1996. -=- Snip -=- Submission form for the Latest Greatest Software Versions column OS Platform : Software package name : Version : Function(s) - BBS, Mailer, Tosser, etc. : Freeware / Shareware / Commercial? : Author / Support staff contact name : Author / Support staff contact node : Magic name (at the above-listed node) : Please include a sentence describing what the package does. Please send updates and suggestions to: Peter Popovich, 1:363/264 -=- Snip -=- MS-DOS: Program Name Version F C Contact Name Node Magic Name ---------------------------------------------------------------------- Act-Up 4.6 G D Chris Gunn 1:15/55 ACT-UP BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX CheckPnt 0.5 beta O F Michiel van der Vlist 2:500/9 CHECKPNT FidoBBS (tm) 12u B S Ray Brown 1:1/117 FILES FrontDoor 2.12 M S Joaquim Homrighausen 2:201/330 FD FrontDoor 2.20c M C Joaquim Homrighausen 2:201/330 FDINFO GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO Imail 1.75 T S Michael McCabe 1:297/11 IMAIL FIDONEWS 13-43 Page 28 21 Oct 1996 ImCrypt 1.04 O F Michiel van der Vlist 2:500/9 IMCRYPT InfoMail 1.11 O F Damian Walker 2:2502/666 INFOMAIL InterEcho 1.19 T C Peter Stewart 1:369/35 IEDEMO InterMail 2.29k M C Peter Stewart 1:369/35 IMDEMO InterPCB 1.52 O S Peter Stewart 1:369/35 INTERPCB IPNet 1.11 O S Michele Stewart 1:369/21 IPNET Jelly-Bean 1.01 T S Rowan Crowe 3:635/727 JELLY Jelly-Bean/386 1.01 T S Rowan Crowe 3:635/727 JELLY386 MakePl 1.8 N F Michiel van der Vlist 2:500/9 MAKEPL Marena 1.1 beta O F Michiel van der Vlist 2:500/9 MARENA Maximus 3.01 B P Tech 1:249/106 MAX McMail 1.0g5 M S Michael McCabe 1:1/148 MCMAIL MDNDP 1.18 N S Bill Doyle 1:388/7 MDNDP MsgEd 4.00 O F Paul Edwards 3:711/934 MSGED Opus CBCS 1.73a B P Christopher Baker 1:374/14 OPUS O/T-Track 2.63a O S Peter Hampf 2:241/1090 OT PcMerge 2.7 N F Michiel van der Vlist 2:500/9 PCMERGE PlatinumXpress 1.1 M C Gary Petersen 1:290/111 PX11TD.ZIP RAR 2.00 C S Ron Dwight 2:220/22 RAR RemoteAccess 2.50 B S Mark Lewis 1:3634/12 RA Silver Xpress Door 5.4 O S Gary Petersen 1:290/111 FILES Reader 4.3 O S Gary Petersen 1:290/111 SXR43.ZIP Squish 1.11 T P Tech 1:249/106 SQUISH T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL Terminate 4.00 O S Bo Bendtsen 2:254/261 TERMINATE Tobruk 0.33 T F Paul Edwards 3:711/934 TOBRUK TriBBS 10.0 B S Patrick Driscoll 1:372/19 TRIBBS TriDog 10.0 M S Patrick Driscoll 1:372/19 TRIDOG TriToss 10.0 T S Patrick Driscoll 1:372/19 TRITOSS WWIV 4.24a B S Craig Dooley 1:376/126 WWIV XRobot 3.01 O S Joaquim Homrighausen 2:201/330 XRDOS OS/2: Program Name Version F C Contact Name Node Magic Name ---------------------------------------------------------------------- BGFAX 1.60 O S B.J. Guillot 1:106/400 BGFAX FleetStreet 1.17 O S Michael Hohner 2:2490/2520 FLEET GIGO 07-14-96 G S Jason Fesler 1:1/141 INFO ImCrypt 1.04 O F Michiel van der Vlist 2:500/9 IMCRYPT Maximus 3.01 B P Tech 1:249/106 MAXP MsgEd 4.00 O F Paul Edwards 3:711/934 MSGED PcMerge 2.3 N F Michiel van der Vlist 2:500/9 PCMERGE RAR 2.00 C S Ron Dwight 2:220/22 RAR2 Squish 1.11 T P Tech 1:249/106 SQUISHP T-Mail 2.599I M S Ron Dwight 2:220/22 TMAIL2 Tobruk 0.33 T F Paul Edwards 3:711/934 TOBRUK XRobot 3.01 O S Joaquim Homrighausen 2:201/330 XROS2 FIDONEWS 13-43 Page 29 21 Oct 1996 Windows (16-bit apps): Program Name Version F C Contact Name Node Magic Name ---------------------------------------------------------------------- BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL Windows (32-bit apps): Program Name Version F C Contact Name Node Magic Name ---------------------------------------------------------------------- BeeMail 1.0 M C Andrius Cepaitis 2:470/1 BEEMAIL Maximus 3.01 B P Tech 1:249/106 MAXN PlatinumXpress 2.00 M C Gary Petersen 1:290/111 PXW-INFO T-Mail 2.599I M S Ron Dwight 2:220/22 TMAILNT Unix: Program Name Version F C Contact Name Node Magic Name ---------------------------------------------------------------------- ifmail 2.8f M G Eugene Crosser 2:293/2219 IFMAIL ifmail-tx 2.8f-tx7.7 M G Pablo Saratxaga 2:293/2219 IFMAILTX MsgEd 4.00 O F Paul Edwards 3:711/934 MSGED Tobruk 0.33 T F Paul Edwards 3:711/934 TOBRUK Amiga: Program Name Version F C Contact Name Node Magic Name ---------------------------------------------------------------------- MsgEd 4.00 O F Paul Edwards 3:711/934 MSGED Tobruk 0.33 T F Paul Edwards 3:711/934 TOBRUK Function: B-BBS, M-Mailer, N-Nodelist, G-Gateway, T-Tosser, C-Compression, O-Other. Note: Multifunction will be listed by the first match. Cost: P-Free for personal use, F-Freeware, S-Shareware, C-Commercial, X-Crippleware, D-Demoware, G-Free w/ Source Old info from: 01/27/92 --------------------------------------------------------------------- MS-DOS Systems -------------- BBS Software NodeList Utilities Other Utilities Name Version Name Version Name Version -------------------- -------------------- -------------------- Kitten 1.01 EditNL 4.00 MailBase 4.11a@ Lynx 1.30 FDND 1.10 MSG 4.5* Merlin 1.39n MakeNL 2.31 MsgLnk 1.0c Oracomm 5.M.6P@ Parselst 1.33 MsgMstr 2.03a Oracomm Plus 6.E@ Prune 1.40 MsgNum 4.16d PCBoard 14.5a SysNL 3.14 MSGTOSS 1.3 Phoenix 1.07* XlatList 2.90 Netsex 2.00b ProBoard 1.20* XlaxNode/Diff 2.53 OFFLINE 1.35 QuickBBS 2.75 Oliver 1.0a RBBS 17.3b Other Utilities OSIRIS CBIS 3.02 RemoteAccess 1.11* Name Version PKInsert 7.10 SimplexBBS 1.05 -------------------- PolyXarc 2.1a FIDONEWS 13-43 Page 30 21 Oct 1996 SLBBS 2.15C* 2DAPoint 1.50* QM 1.00a Socrates 1.11 4Dog/4DMatrix 1.18 QSort 4.04 SuperBBS 1.12* ARCAsim 2.31 RAD Plus 2.11 SuperComm 0.99 ARCmail 3.00* Raid 1.00 TAG 2.5g Areafix 1.20 RBBSMail 18.0 TBBS 2.1 ConfMail 4.00 ScanToss 1.28 TComm/TCommNet 3.4 Crossnet 1.5 ScMail 1.00 Telegard 2.7* DOMAIN 1.42 ScEdit 1.12 TPBoard 6.1 DEMM 1.06 Sirius 1.0x WildCat! 3.02* DGMM 1.06 SLMail 2.15C XBBS 1.77 DOMAIN 1.42 StarLink 1.01 EEngine 0.32 TagMail 2.41 Network Mailers EMM 2.11* TCOMMail 2.2 Name Version EZPoint 2.1 Telemail 1.5* -------------------- FGroup 1.00 TGroup 1.13 BinkleyTerm 2.50 FidoPCB 1.0s@ TIRES 3.11 D'Bridge 1.30 FNPGate 2.70 TMail 1.21 Dreamer 1.06 GateWorks 3.06e TosScan 1.00 Dutchie 2.90c GMail 2.05 UFGATE 1.03 Milqtoast 1.00 GMD 3.10 VPurge 4.09e PreNM 1.48 GMM 1.21 WEdit 2.0@ SEAdog 4.60 GoldEd 2.31p WildMail 2.00 SEAmail 1.01 GROUP 2.23 WMail 2.2 TIMS 1.0(mod8) GUS 1.40 WNode 2.1 Harvey's Robot 4.10 XRS 4.99 Compression HeadEdit 1.18 XST 2.3e Utilities HLIST 1.09 YUPPIE! 2.00 Name Version ISIS 5.12@ ZmailH 1.25 -------------------- Lola 1.01d ZSX 2.40 ARC 7.12 Mosaic 1.00b ARJ 2.20 LHA 2.13 PAK 2.51 PKPak 3.61 PKZip 1.10 OS/2 Systems ------------ BBS Software Other Utilities(A-M Other Utilities(N-Z) Name Version Name Version Name Version -------------------- -------------------- -------------------- Kitten 1.01 ARC 7.12 oMMM 1.52 SimplexBBS 1.04.02+ ARC2 6.01 Omail 3.1 ConfMail 4.00 Parselst 1.33 EchoStat 6.0 PKZip 1.02 Network Mailers EZPoint 2.1 PMSnoop 1.30 Name Version FGroup 1.00 PolyXOS2 2.1a -------------------- GROUP 2.23 QSort 2.1 BinkleyTerm 2.50 LH2 2.11 Raid 1.0 BinkleyTerm(S) 2.50 MSG 4.2 Remapper 1.2 BinkleyTerm/2-MT MsgLink 1.0c Tick 2.0 1.40.02 MsgNum 4.16d VPurge 4.09e SEAmail 1.01 FIDONEWS 13-43 Page 31 21 Oct 1996 Xenix/Unix 386 -------------- BBS Software Network Mailers Other Utilities Name Version Name Version Name Version -------------------- -------------------- -------------------- ARC 5.21 C-LHARC 1.00 |Contact: Willy Paine 1:343/15,| MSGLINK 1.01 |or Eddy van Loo 2:285/406 | oMMM 1.42 Omail 1.00 ParseLst 1.32 Unzip 3.10 VPurge 4.08 Zoo 2.01 QNX --- BBS Software Network Mailers Other Utilities Name Version Name Version Name Version -------------------- -------------------- -------------------- QTach2 1.09 QMM 0.50s Kermit 2.03 QCP 1.02 NodeList Utilities Archive Utilities QSave 3.6 Name Version Name Version QTTSysop 1.07.1 -------------------- -------------------- SeaLink 1.05 QNode 2.09 Arc 6.02 XModem 1.00 LH 1.00.2 YModem 1.01 Unzip 2.01 ZModem 0.02f Zoo 2.01 Macintosh --------- BBS Software Network Mailers Other Software Name Version Name Version Name Version -------------------- -------------------- -------------------- FBBS 0.91 Copernicus 1.0 ArcMac 1.3 Hermes 1.6.1 Tabby 2.2 AreaFix 1.6 Mansion 7.15 Compact Pro 1.30 Precision Sys. 0.95b EventMeister 1.0 Red Ryder Host 2.1 Export 3.21 Telefinder Host Import 3.2 2.12T10 LHARC 0.41 MacArd 0.04 Mantissa 3.21 Point System Mehitable 2.0 Software OriginatorII 2.0 Name Version PreStamp 3.2 -------------------- StuffIt Classic 1.6 Copernicus 1.00 SunDial 3.2 CounterPoint 1.09 TExport 1.92 MacWoof 1.1 TimeStamp 1.6 FIDONEWS 13-43 Page 32 21 Oct 1996 TImport 1.92 Tset 1.3 TSort 1.0 UNZIP 1.02c Zenith 1.5 Zip Extract 0.10 Amiga ----- BBS Software Network Mailers Other Software Name Version Name Version Name Version -------------------- -------------------- -------------------- 4D-BBS 1.65 BinkleyTerm 1.00 Areafix 1.48 DLG Pro. 0.96b TrapDoor 1.80 AReceipt 1.5 Falcon CBCS 1.00 WelMat 0.44 ChameleonEdit 0.11 Starnet 1.0q@ ConfMail 1.12 TransAmiga 1.07 ElectricHerald 1.66 XenoLink 1.0 Compression FFRS 1.0@ Utilities FileMgr 2.08 Name Version Fozzle 1.0@ NodeList Utilities -------------------- Login 0.18 Name Version AmigArc 0.23 MessageFilter 1.52 -------------------- booz 1.01 Message View 1.12 ParseLst 1.66 LHARC 1.30 oMMM 1.50 Skyparse 2.30 LhA 1.10 PolyXAmy 2.02 TrapList 1.40 LZ 1.92 RMB 1.30 PkAX 1.00 Roof 46.15 UnZip 4.1 RoboWriter 1.02 Zippy (Unzip) 1.25 Rsh 4.07a Zoo 2.01 Tick 0.75 TrapToss 1.20 |Contact: Maximilian Hantsch 2:310/6| Yuck! 2.02 Atari ST/TT ----------- BBS Software Network Mailers Other Utilities Name Version Name Version Name Version -------------------- -------------------- -------------------- FIDOdoor/ST 2.5.1 BinkleyTerm 2.40n9 ApplyList 1.00@ FiFo 2.1v The Box 1.95* Burep 1.1 LED ST 1.00 ComScan 1.04 QuickBBS/ST 1.06* ConfMail 4.10 NodeList Utilities Echoscan 1.10 Name Version FDrenum 2.5.2 Compression -------------------- FastPack 1.20 Utilities ParseList 1.30 Import 1.14 Name Version EchoFix 1.20 oMMM 1.40 -------------------- sTICK/Hatch 5.50 Pack 1.00 ARC 6.02 Trenum 0.10 LHARC 2.01i PackConvert STZip 1.1* FIDONEWS 13-43 Page 33 21 Oct 1996 UnJARST 2.00 WhatArc 2.02 Archimedes ---------- BBS Software Network Mailers Other Utilities Name Version Name Version Name Version -------------------- -------------------- -------------------- ARCbbs 1.61 BinkleyTerm ARC 1.20 Odyssey 0.37 2.06f-wimp !AskFor 1.01 RiscBBS 0.9.85m BatchPacker 1.00 DeLZ 0.01 MailED 0.95 NetFile 1.00 ParseLst 1.30 Raul 1.01 !Spark 2.16 !SparkMail 2.08 !SparkPlug 2.14 UnArj 2.21 UnZip 3.00 Zip 1.00 Tandy Color Computer 3 (OS-9 Level II) -------------------------------------- BBS Software Compression Utility Other Utilities Name Version Name Version Name Version -------------------- -------------------- -------------------- RiBBS 2.02+ Ar 1.3 Ascan 1.2 DeArc 5.12 AutoFRL 2.0 OS9Arc 1.0 Bundle 2.2 UnZip 3.10 CKARC 1.1 UnLZH 3.0 EchoCheck 1.01 FReq 2.5a LookNode 2.00 ParseLST PReq 2.2 RList 1.03 RTick 2.00 UnBundle 1.4 UnSeen 1.1 -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Key to old info: + - Netmail Capable (Doesn't Require Additional Mailer Software) * - Recently Updated Version @ - New Addition -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Please send updates and suggestions to: Peter Popovich, 1:363/264 ----------------------------------------------------------------- FIDONEWS 13-43 Page 34 21 Oct 1996 ================================================================= FIDONEWS PUBLIC-KEY ================================================================= [this must be copied out to a file starting at column 1 or it won't process under PGP as a valid public-key] -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 Comment: Clear-signing is Electronic Digital Authenticity! -----END PGP PUBLIC KEY BLOCK----- Pending a formal decision about including 'encrypted' material inside FidoNews from the Zone Coordinator Council, the guts of the FidoNews public-key have been removed from this listing. File-request FNEWSKEY from 1:1/23 [1:18/14] or download it from the Rights On! BBS at 1-904-409-7040 anytime except 0100-0130 ET and Zone 1 ZMH at 1200-9600+ HST/V32B. This section will contain only this disclaimer and instructions until a ZCC decision is forwarded to the Editor. Sorry for any inconvenience. ----------------------------------------------------------------- FIDONEWS 13-43 Page 35 21 Oct 1996 ================================================================= FIDONEWS INFORMATION ================================================================= ------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ------- Editor: Christopher Baker Editors Emeritii: Thom Henderson, Dale Lovell, Vince Perriello, Tim Pozar, Tom Jennings, Sylvia Maxwell, Donald Tees "FidoNews Editor" FidoNet 1:1/23 BBS 1-904-409-7040, 300/1200/2400/14400/V.32bis/HST(ds) more addresses: Christopher Baker -- 1:18/14, cbaker84@digital.net cbak.rights@opus.global.org (Postal Service mailing address) FidoNews Editor P.O. Box 471 Edgewater, FL 32132-0471 U.S.A. voice: 1-904-409-3040 [1400-2100 ET only, please] [1800-0100 UTC/GMT] ------------------------------------------------------ FidoNews is published weekly by and for the members of the FIDONET INTERNATIONAL AMATEUR ELECTRONIC MAIL system. It is a compilation of individual articles contributed by their authors or their authorized agents. The contribution of articles to this compilation does not diminish the rights of the authors. OPINIONS EXPRESSED in these articles ARE THOSE OF THE AUTHORS and not necessarily those of FidoNews. Authors retain copyright on individual works; otherwise FidoNews is Copyright 1996 Christopher Baker. All rights reserved. Duplication and/or distribution permitted for noncommercial purposes only. For use in other circumstances, please contact the original authors, or the Editor. =*=*=*=*=*=*=*=*= OBTAINING COPIES: The most recent issue of FidoNews in electronic form may be obtained from the FidoNews Editor via manual download or file-request, or from various sites in the FidoNet and Internet. PRINTED COPIES may be obtained by sending SASE to the above postal address. File-request FIDONEWS for the current Issue. File-request FNEWS for the current month in one archive. Or file-request specific back Issue filenames in distribution format [FNEWSDnn.LZH] for a FIDONEWS 13-43 Page 36 21 Oct 1996 particular Issue. Monthly Volumes are available as FNWSmmmy.ZIP where mmm = three letter month [JAN - DEC] and y = last digit of the current year [6], i.e., FNWSMAY6.ZIP for all the Issues from May 96. Annual volumes are available as FNEWSn.ZIP where n = the Volume number 1 - 12 for 1984 - 1995, respectively. Annual Volume archives range in size from 48K to 1.2M. INTERNET USERS: FidoNews is available via: http://www.fidonet.org/fidonews.htm ftp://ftp.fidonet.org/pub/fidonet/fidonews/ ftp://ftp.aminet.org/pub/aminet/comm/fido/ You can read the current FidoNews Issue in HTML format at: http://www.geocities.com/athens/6894/ STAR SOURCE for ALL Past Issues via FTP and file-request - Available for FReq from 1:396/1 or by anonymous FTP from: ftp://ftp.sstar.com/fidonet/fnews/ Each yearly archive also contains a listing of the Table-of-Contents for that year's issues. The total set is currently about 11 Megs. =*=*=*= The current week's FidoNews and the FidoNews public-key are now also available almost immediately after publication on the Editor's new homepage on the World Wide Web at: http://ddi.digital.net/~cbaker84/fidonews.html There are also links there to jim barchuk's HTML FidoNews source and to John Souvestre's FTP site for the archives. There is also an email link for sending in an article as message text. Drop on over. =*=*=*=*=*=*=*=*= A PGP generated public-key is available for the FidoNews Editor from 1:1/23 [1:18/14] by file-request for FNEWSKEY or by download from Rights On! BBS at 1-904-409-7040 as FIDONEWS.ASC in File Area 18. It is also posted twice a month into the PKEY_DROP Echo available on the Zone 1 Echomail Backbone. *=*=*=*=* Anyone interested in getting a copy of the INTERNET GATEWAY FAQ may file-request GISFAQ.ZIP from 1:133/411.0, or send an internet message to fidofaq@gisatl.fidonet.org. No message or text or subject is necessary. The address is a keyword that will trigger the automated response. People wishing to send inquiries directly to David Deitch should now mail to fidonet@gisatl.fidonet.org rather than the previously listed address. FIDONEWS 13-43 Page 37 21 Oct 1996 *=*=*=*=* SUBMISSIONS: You are encouraged to submit articles for publication in FidoNews. Article submission requirements are contained in the file ARTSPEC.DOC, available from the FidoNews Editor, or file-requestable from 1:1/23 [1:18/14] as file "ARTSPEC.DOC". ALL Zone Coordinators also have copies of ARTSPEC.DOC. Please read it. "Fido", "FidoNet" and the dog-with-diskette are U.S. registered trademarks of Tom Jennings, P.O. Box 410923, San Francisco, CA 94141, and are used with permission. "Disagreement is actually necessary, or we'd all have to get in fights or something to amuse ourselves and create the requisite chaos." -Tom Jennings -30- -----------------------------------------------------------------