Copy Link
Add to Bookmark
Report

Birmingham Telecommunications News 025

  

BTN: Birmingham Telecommunications News
COPYRIGHT 1990

June 1990 Volume 3, Issue 5

Table Of Contents
-----------------
Article Title Author

Policy Statement and Disclaimer................Staff
Editorial Column...............................Mark Maisel
Its' Not Too Late!!!...........................Ricky Morgan
Copyright Law..................................Jordan J. Breslow
PC-MENU MASTER: A Review.......................Radio Active
WWIV: Part 2 of 3..............................Duck Capps
Profile: Richard Foshee.......................Chris Mohney
PC Board 14.5 (beta) New and Enhanced Commands.David Terry
Known BBS Numbers..............................Staff

-----------------------------------------------------------------------

Disclaimer and Statement of Policy for BTN

We at BTN try our best to assure the accuracy of articles and
information in our publication. We assume no responsibility for
damage due to errors, omissions, etc. The liability,if any for BTN, its
editors and writers, for damages relating to any errors or omissions,
etc., shall be limited to the cost of a one year subscription to BTN,
even if BTN, its editors or writers have been advised of the likelihood
of such damages occurring.

With the conclusion of that nasty business, we can get on with our
policy for publication and reproduction of BTN articles. We publish
monthly with a deadline of the fifteenth of the month prior to
publication. If you wish to submit an article, you may do so at any
time but bear in mind the deadline if you wish for your work to appear
in a particular issue. It is not our purpose to slander or otherwise
harm a person or reputation and we accept no responsibility for the
content of the articles prepared by our writers. Our writers own their
work and it is protected by copyright. We allow reprinting of articles
from BTN with only a few restrictions. The author may object to a
reprint, in which case he will specify in the content of his article.
Otherwise, please feel free to reproduce any article from BTN as long as
the source, BTN, is specified, and as long as the author's name and the
article's original title are retained. If you use one of our articles,
please forward a copy of your publication to:

Mark Maisel
Editor, BTN
221 Chestnut St.
BHM, AL 35210-3219

We thank you for taking the time to read our offering and we hope that
you like it. We also reserve the right to have a good time while doing
all of this and not get too serious about it.

-----------------------------------------------------------------------

N E W S F L A S H

For those of you who read BTN regularly, please pay
attention! Several boards in town that maintain
transfer ratios allow BTN to be downloaded freely
through ProDoor. You may download BTN from these
boards without penalty to your ratio. Among these
that I am aware of are CONNECTION, LZ BIRMINGHAM,
CHANNEL 8250, and Bus System. I am sure that
there are more of them out there.

If you are a sysop and you allow BTN to be downloaded
freely, please let me know via EzNet so that I can
post your board as a free BTN distributor. Thanks.

I am also looking for a new, more useful format for
the Known BBS List. Please send me your suggestions
via EzNet or upload them to Channel 8250, Bus, or
Crunchy Frog. The best way to demonstrate a
suggestion would be to edit the bbs list in this
issue and show how you want it to look. Should
there be more WWIV info, PC Board info, FidoNet
info, other networks and/or systems info???

Remember, I can't do it if you don't suggest it. I
gave up telepathy a few years ago.

MM

EVEN MORE NEWS!

There are two new boards in town worthy of note.
Alter-Ego, run by Lee & Maggie Harden has some,
well, weird conferences. It is definitely worth a
look. If you are a ProDoor freak, you will love
it. Camelot BBS is also a newcomer, so to speak.
Joe McDonald has pulled down Professional's BBS and
put up Camelot in its place. This is much more
than a facelift. He is now running Teleguard 2.5,
has more drive space, no subscriptions, and all are
welcome. Please give these new boards a call.

-----------------------------------------------------------------------

Editorial
by Mark Maisel

The summer is upon us and the seasonal BBS lull has struck. The
local systems are, for the most part, pretty dead as far as messages go.
It is nothing to be alarmed about. It happens every year. Pretty soon,
the sysops will start griping about the kids tying up the boards playing
games and leaving weird messages. We are going to do our best to keep
publishing during the summer as we have in the past. I had thought that
this being self-employed business would have allowed me more time for
stuff like BTN. It has not, at least not yet. I am taking a week in
June to visit up north, much further north than Dean's home swamp. I am
also going to be gone to New England later in July and August. Yes, it
is nice. No, you can't accompany me. We will do our best to keep the
articles coming and you can help by writing a few yourself. Don't give
me that business about how you can't write. I have heard it too many
times. Just talk with your fingers. It works every time.

This issue is a good mix. We have humor, reviews, information
about software copyrights, articles on WWIV and PC Board BBS software,
and of course, the ole BTN Known BBS List. Please take the time to read
the articles that have been prepared for you and comment publicly on
them. We don't care if your comments are favorable or otherwise, we
just want to hear them. We can't possibly attempt to go on without
feedback from you. Well, we might attempt it but it will go much better
if we are an interactive publication. Thanks for taking the time!

-----------------------------------------------------------------------

Its' not too late!!!
by Ricky Morgan

Well, here it is after midnight...again. The kids have long since
been in bed. My wife stumbled off after them not long ago. So what am I
still doing sitting here, staring bleary eyed at this stupid computer?

Sound familiar? If it does, you just may want to read on. I think
maybe I can furnish an answer for you.

I remember it as if it were only yesterday. I purchased a copy of
"Computer Shopper Magazine" just last year. I was enthralled by the
shear number of ads for computers, parts and peripherals. I leafed
through the hefty magazine, eyeing each ad with lecherous desire,
turning each page slowly. Hoping against hope that one day, soon, I
would be able to afford a better, faster machine than the one I owned.
It wasn't until later that I realized my credit rating wasn't the only
thing in danger from this simple looking magazine.

Unknown to me, laying innocently in the back of this cumbersome
magazine, lay a sleeping virus. Titled, innocently enough, "Bulletin
Boards."

I had been on CompuServe years ago during my Commodore 64 and 300
baud modem days but I found the system too slow and expensive for my
simple needs. But as time passed my work began to demanded that I was
more and more IBM literate. So I found I was able to use the work angle
in acquiring an IBM clone and a new 2400 baud modem. So it was with
naive curiosity that I decided to log on to one of these local
electronic bulletin boards. After all, unlike CompuServe, these boards
are free. Little did I suspect, as I anxiously logged onto The Pinson
Valley PCBoard, that I was changing the direction that my life and my
computer would take; perhaps forever.

I sat diligently reading all those warnings and notices for new
users. Scrutinizing each screen, I sat and watched in wonder, eyes
gleaming with excitement, as the glow from the CRT cast malevolent
shadows across the darkened room where I sat, hunched over the keyboard.
At the time, I saw a whole new world of information opening for me.
Unfortunately I was oblivious to the fact that, even at this early
stage, I was now entrapped in an addiction stronger than any drug.

It wasn't enough that Pinson Valley taunted me with all sorts of
information, messages and free, or semi-free, software. At the end of
the session, I was teased with "Numbers of other BBS's to call."

My heart pounded as I quickly jotted down each number. I was
surprised that there were more boards out there, just sitting, yearning
for me to call. If only I had known. There was still hope for me. Now
it's too late.

Within minutes each new number was in my dialing directory and I
began calling these other systems. I sat there and watched the program
(Procomm 2.4.2) dial each number over and over; waiting for an open
line. I sat on the edge of my chair listening intently as the modem
dialed number after number. If only I had listened closer I would have
noticed that my modem (I always keep the speaker on during dialing)
dialed each number with a sinister chuckle. It knew what I did not. I
was addicted.

I logged on and registered on each system. I couldn't help myself,
the questions were easy and the SySops asked for so little. It was an
easy way to pass computer time, plus, I vindicated myself by saying,
"Look at all the free software, the message bases. All the subjects that
were covered! Call the Birmingham News and cancel the subscription!" I
covertly schemed to put that money to good use. Upgrade!

Oh, I raped and pillaged a few of the first boards. Taking any file
that looked good but soon that wasn't enough. I started reading messages
and actually leaving my own. I started getting replies. I also started
seeing a lot of the same names from board to board. Did I ever once
suspect that this was because these people might be addicted to BBS's?
No. Had the thought crossed my mind, would I have taken action? No.

Months passed, I was registered on more BBS's than I could log onto
in any 24 hr. period. With the, so called, help a local SySop, who shall
remain nameless, I gained access to programs that would call and get
mail and files for me automatically. I didn't even have to be awake.
Finally, I could get some sleep. No longer would I spend endless hours
sitting in front of my screen listening to busy signals; praying
endlessly for an open line. Alas, I still found myself compelled to read
all those messages. It started cutting into less important things; work
and family.

I found that I became nervous and restless, even down right
irritable if I didn't get on at least three boards a day. It was
becoming impossible to even carry on an intelligent conversation with
someone who wasn't into "BBSing." I was a junkie. I still hadn't
realized what was happening. After repeated threats, from my wife, to
have the phone lines disconnected, I tried to cut back on the number of
boards I called. To compensate the loss, I started getting more involved
in the message bases; leaving longer and more detailed messages on the
few systems I let myself call. I even started trying to write articles
for the local newsletter (BTN). It still wasn't enough.

I started lugging my old Compaq into the hotel room with me when I
worked out of town. I accessed boards where ever and when ever I could.
This still wasn't enough.

I began talking to friends and associates about the BBS'. Trying to
get them addicted; I was turning into a pusher. First I would tease them
with files, then turn them on to the message bases. Always helping and
cajoling them to get ever deeper involved. Then, when I no longer could
resist the temptation to be more involved, I actually began
contemplating starting a board of my own; to feed my habit. It was then,
sometime after midnight one night, while I sat pouring over the DOCS for
setting up a BBS, that I realized what was happening. I sat there amid
pile upon pile of incomprehensible instructions and the seed of
realization dawned on me. What a fool I had been.

It's too late for me but I still can warn others. I believe a
computer intelligence, somewhere, has awaken and decided to take over
the world. For good or bad I can't say. It's plan is deceptively simple.
Get as many people involved in electronic communication as possible.
Offer them free software, conversation with intelligent and worldly
people, games, even worldwide mail echoes; no more long distance phone
calls. Entice them, tease them. Once converted they will convince others
to join. Soon you have a self-replicating virus pulling all of humanity
into and under it's control. By controlling the message bases and files,
it controls your thoughts, actions and...your computer.

How many times have you sat down at the computer to, "just waist a
few minutes," only to walk away hours later. Shaking your head and
wondering, "Where did all the time go?" Those little phosphor dots have
a strangely hypnotic effect. What all did you do while you were
hypnotized by the computer? Notice any long distance calls on your phone
bill last month that you're SURE you didn't make? Notice any new files
on your hard disk that you don't remember downloading? Can you really
trust Norton Utilities to tell you the truth?

Do you really know what your computer does at night after you've
gone to bed? How do you know that those files you've gotten off some
board aren't covertly running your computer. Using your computer to call
others after you've left for work. Spreading itself relentlessly.

It's not too late. You can still escape. Don't log on to another
BBS. Toss your modem in the trash. Wipe your hard disk of any and all
software gleaned from BBS'. Then low level format the sucker! It's your
only hope. Good luck!

-----------------------------------------------------------------------

The following is reprinted with permission from CPU/STR 16/32bit
Magazine, No. 4.19, May 11, 1990. It has been split into two parts of
which this is part one. This part ends with Chapter 1. MM

Copyright Law
=============

Jordan J. Breslow
1225 Alpine Road, Suite 200
Walnut Creek, CA 94596
+1 415 932 4828

I am an attorney practicing copyright law and computer law. I read
a series of queries in net.legal about copyright law and was dismayed to
find that people who had no idea what they were talking about were
spreading misinformation over the network. Considering that the
penalties for copyright infringement can include $50,000.00 damages per
infringed work, attorneys fees, court costs, criminal fines and
imprisonment, and considering that ignorance is no excuse and innocent
intent is not even a recognized defense, I cringe to see the network
used as a soapbox for the ill-informed. For that reason, this article
will discuss copyright law and license law as they pertain to computer
software.

My goal is to enable readers to determine when they should be
concerned about infringing and when they can relax about it. I also want
to let programmers know how to obtain copyright for their work. I'll
explain the purpose of software licenses, and discuss the effect that
the license has on copyright. For those of you who are programmers,
I'll help you decide whether you own the programs you write on the job
or your boss owns them. I will also mention trademark law and patent
law briefly, in order to clarify some confusion about which is which.
Incidentally, if you read this entire essay, you will be able to
determine whether or not the essay is copyrighted and whether or not you
can make a printout of it.

This is a long article, and you may not want to read all of it.
Here is an outline to help you decide what to read and what to ignore:

1. The Meaning of Copyright from the Viewpoint of the Software User

1.1 A bit of history
1.2 The meaning of copyright
1.3 The meaning of public domain
1.4 A hypothetical software purchase
1.5 Can you use copyrighted software?
1.6 Can you make a backup copy?
1.7 Licenses may change the rules

(C) Copyright 1986 Breslow, Redistributed by permission

2. Copyright Sounds Neat -- How Do I Get One? Or, How Do I Know
If this Program is Copyrighted?

2.1 How do you get a copyright?
2.2 How do you lose a copyright?
2.3 How do you waste a stamp?
2.4 Do you have to register?
2.5 How copyright comes into existence
2.6 The copyright notice
2.7 Advantages of registration
2.8 A test to see if you understand this article

3. Who Owns The Program You Wrote?

3.1 Introduction
3.2 Programs written as an employee
3.3 Programs written as a contractor

4. A Brief Word about Licenses

4.1 Why a license?
4.2 Is it valid?

5. Trademarks and Patents
5.1 Trademark law explained
5.2 Patent law

6. Conclusion

1. The Meaning of Copyright from the Viewpoint of the Software
User
1.1. A bit of history

If you're not interested in history, you can skip this paragraph.
Modern copyright law first came into existence in 1570, by an act of
Parliament called the Statute of Anne. Like most laws, it hasn't
changed much since. It was written with books and pictures in mind.
Parliament, lacking the foresight to predict the success of the Intel
and IBM corporations, failed to consider the issue of copyrighting
computer programs.

At first, courts questioned whether programs could be copy- righted
at all. The problem was that judges couldn't read the programs and they
figured the Copyright Law was only meant to apply to things humans
(which arguably includes judges) could read without the aid of a
machine. I saw some mythical discussion about that in some of the
net.legal drivel. Let's lay that to rest: programs are copyrightable as
long as there is even a minimal amount of creativity. The issue was
laid to rest with the Software Act of 1980. That Act modified the
Copyright Act (which is a Federal law by the way), in such a way as to
make it clear that programs are copyrightable. The few exceptions to
this rule will rarely concern anyone. The next question to arise was
whether a program was copyrightable if it was stored in ROM rather than
on paper. The decision in the Apple v. Franklin case laid that to rest:
it is.

1.2. The meaning of copyright

Now, what is copyright? As it is commonly understood, it is the
right to make copies of something -- or to put it the other way around,
it is the right to prohibit other people from making copies. This is
known as an exclusive right -- the exclusive right to reproduce, in the
biological language of the Copyright Act -- and what most people don't
know is that copyright involves not one, not two, but five exclusive
rights. These are (1) the exclusive right to make copies, (2) the
exclusive right to distribute copies to the public, (3) the exclusive
right to prepare derivative works (I'll explain, just keep reading), (4)
the exclusive right to perform the work in public (this mainly applies
to plays, dances and the like, but it could apply to software), and (5)
the exclusive right to display the work in public (such as showing a
film).

1.3. The meaning of public domain

Before we go any further, what is public domain? I saw some
discussion on the net about public domain software being copyrighted.
Nonsense. The phrase public domain, when used correctly, means the
absence of copyright protection. It means you can copy public domain
software to your heart's content. It means that the author has none of
the exclusive rights listed above. If someone uses the phrase public
domain to refer to freeware (software which is copyrighted but is
distributed without advance payment but with a request for a donation),
he or she is using the term incorrectly. Public domain means no
copyright -- no exclusive rights.

1.4. A hypothetical software purchase

Let's look at those exclusive rights from the viewpoint of someone
who has legitimately purchased a single copy of a copyrighted computer
program. For the moment, we'll have to ignore the fact that the program
is supposedly licensed, because the license changes things. I'll
explain that later. For now, assume you went to Fred's Diner and
Software Mart and bought a dozen eggs, cat food and a word processing
program. And for now, assume the program is copyrighted.

1.5. Can you use copyrighted software?

What can you do with this copyrighted software? Let's start with
the obvious: can you use it on your powerful Timex PC? Is this a joke?
No. Prior to 1980, my answer might have been No, you can't use it!

People actually pay me for advice like that! Well think: you take
the floppy disk out of the zip lock baggy, insert it in drive A and load
the program into RAM. What have you just done? You've made a copy in
RAM -- in legalese, you've reproduced the work, in violation of the
copyright owner's exclusive right to reproduce. (I better clarify
something here: the copyright owner is the person or company whose name
appears in the copyright notice on the box, or the disk or the first
screen or wherever. It may be the person who wrote the program, or it
may be his boss, or it may be a publishing company that bought the
rights to the program. But in any case, it's not you. When you buy a
copy of the program, you do not become the copyright owner. You just
own one copy.)

Anyway, loading the program into RAM means making a copy. The
Software Act of 1980 addressed this absurdity by allowing you to make a
copy if the copy "is created as an essential step in the utilization of
the computer program in conjunction with a machine and ... is used in
no other manner ...." By the way, somebody tell me what a machine means.
If you connect 5 PC's on a network is that a machine or several
machines? A related question is whether or not running software on a
network constitutes a performance. The copyright owner has the
exclusive right to do that, remember?

1.6. Can you make a backup copy?

OK, so you bought this copyrighted program and you loaded it into
RAM or onto a hard disk without the FBI knocking on your door. Now can
you make a backup copy? YES. The Software Act also provided that you
can make a backup copy, provided that it "is for archival purposes only
...." What you cannot do, however, is give the archive copy to your
friend so that you and your pal both got the program for the price of
one. That violates the copyright owner's exclusive right to distribute
copies to the public. Get it? You can, on the other hand, give both
your original and backup to your friend -- or sell it to him, or lend it
to him, as long as you don't retain a copy of the program you are
selling. Although the copyright owner has the exclusive right to
distribute (sell) copies of the program, that right only applies to the
first sale of any particular copy. By analogy, if you buy a copyrighted
book, you are free to sell your book to a friend. The copyright owner
does not have the right to control resales.

1.7. Licenses may change the rules

At this point, let me remind you that we have assumed that the
program you got at the store was sold to you, not licensed to you.
Licenses may change the rules.

1.8. Can you modify the program?

Now, you're a clever programmer, and you know the program could run
faster with some modifications. You could also add graphics and an
interactive mode and lots of other stuff. What does copyright law say
about your plans? Well ... several different things, actually. First,
recall that the copyright owner has the exclusive right to make
derivative works. A derivative work is a work based on one or more
preexisting works. It's easy to recognize derivative works when you
think about music or books. If a book is copyrighted, derivative works
could include a screenplay, an abridged edition, or a translation into
another language. Derivative works of songs might be new arrangements
(like the jazz version of Love Potion Number 9), a movie soundtrack, or
a written transcription, or a long version, (such as the fifteen minute
version of "Wipe Out" with an extended drum solo for dance parties). In
my opinion, you are making a derivative work when you take the
store-bought word processor and modify it to perform differently. The
same would be true if you translated a COBOL program into BASIC. Those
are copyright infringements -- you've horned in on the copyright owner's
exclusive right to make derivative works. There is, however, some
breathing room. The Software Act generously allows you to adapt the
code if the adaptation "is created as an essential step in the
utilization of the computer program in conjunction with a machine ...."
For example, you might have to modify the code to make it compatible
with your machine.

1.9. Can you break the copy protection scheme?

Moving right along, let's assume your store bought program is copy
protected, and you'd really like to make a backup copy. You know this
nine-year-old whiz who can crack any copy- protection scheme faster than
you can rearrange a Rubix cube. Is there a copyright violation if he
succeeds? There's room to argue here. When you try to figure out if
something is an infringement, ask yourself, what exclusive right am I
violating? In this case, not the right to make copies, and not the right
to distribute copies. Public performance and display have no relevance.
So the key question is whether you are making a derivative work. My
answer to that question is, "I doubt it." On the other hand, I also
doubt that breaking the protection scheme was "an essential step" in
using the program in conjunction with a machine. It might be a "fair
use," but that will have to wait for another article. Anyone interested
in stretching the limits of the "fair use" defense should read the Sony
Betamax case.

1.10. Summary

Let me summarize. Copyright means the copyright owner has the
exclusive right to do certain things. Copyright infringement means you
did one of those exclusive things (unless you did it within the limits
of the Software Act, i.e., as an essential step ....).

-----------------------------------------------------------------------

PC-MENU MASTER: Hard Drive Menu System
by Radio Active

Found on local systems under the name: PCMENU11.ZIP ...71,002

System requirements:
None mentioned

Features:
Execute 80 DOS commands, (any DOS command!)
and/or .EXE, .COM, .BAT programs from one menu window
Easy to set up and use
Power and convenience of a large program without large memory
requirements

*Registered version includes:
Three levels password security
Compress data set for efficiency and space utilization
Control of PC-Menu Master banner page and trailing banner page
Printed documentation
Technical support
Update notices

PCMENU is one of the better hard drive menu programs I have looked
at for the novice computer user. The author mentions in his
documentation that it is especially useful for someone whose wife or
kids may not be too familiar with running programs. I think this is an
excellent point for this menu program.

It doesn't take much technical ability to set it up and once it is,
all there is to running 80 different commands or programs is just
highlighting your choice with a highlight bar and pressing enter twice
(once for your choice and again to confirm that you want to execute the
command). There are two main files, the one memory resident file is
very small and the other one drops out of memory when you run any
command or program. And when I said you could run 80 commands from the
menu, I didn't mean to limit it to that because you can have more than
one of these 80 command windows to work from. This makes this program a
very powerful menu program as well as a very friendly one! The shareware
version 1.10 that I looked at didn't have the password option enabled,
but for a small registration fee that and some other nice extras like a
printed manual can be had.

The commands you're limited to when configuring the menu can be any
DOS command, BATch files, EXEcute files, or COMmand files, I think
"limited" is the wrong word here! Also for every command name on the
menu (80 per menu) you can list up to twelve commands to be processed.

I.E.: 1. CD\GAMES
2. LIST CARDS.DOC
3. 5_CARD .....
4. (etc. up to 12)

-----------------------------------------------------------------------

WWIV: Part 2 of 3
By: Duck the Everpresent
Co-Sysop: The Cathouse

In my last article, I went over some of the basic functions of the
WWIV bulletin board software. Hopefully this helped some people to
better understand some of the operations of a WWIV system and how to go
about logging onto one. This time I will explain the transfer section,
as well as a few of the modifications that can be made to the software.

The most important part of a BBS, (besides the message bases) is
the transfer section. The transfer section is a way to exchange software
of interest and to contribute to a boards assets. The WWIV transfer
section is set up in an easy-to-use format that almost anyone, even the
telecommunications novice, can master in a few minutes.

Uploading to a WWIV system is a very easy task. You press "U", name
your file, give a one line description, then pick your transfer
protocol. There are many protocols, and any that aren't on a system
already can be installed. The letter "Z" will upload the file to the
sysop, but on some systems this is done anyway for verification
purposes. Downloading is accomplished in similar fashion; you press "D",
type the name (or a partial name, an asterisk, then an extension or
asterisk (i.e.: CONQ*.*)) and pick your protocol. If you use the same
protocol every time , then pressing return when it asks for the protocol
will pick the defaulted one . Batch downloads are available with the
letter "X".

Listing the files available for download is as easy as pressing
"L". It will then prompt you with a 'File Mask: ', to which you can
assign a certain letter, word, or extension to search for. For example,
typing *.ZIP will search for all files of the zip extension and list
them for that section. If you want to scan all sections then type "S"
and follow the same procedure for default. If a file is offline, it will
be followed by <ASK> on version 4.10 or lower or <N/A> on 4.11. Changing
sections is accomplished by pressing the appropriate number at the
transfer main prompt, and a listing of sections can be seen by typing an
asterisk at the main prompt. Pressing the "+" or "-" keys will also go
up or down a section respectively. If you wish to search all directories
for new files, pressing "N" will do the job.

There is also a way of viewing what is in an ARCed or ZIPed file
pressing "A", extracting the files you want and placing them in a
temporary file for download, the letter "E", and shuffling these files
around with various other commands attained by the letter "G".

The WWIV BBS is a very expandable system, whether you know how to
program or not. Such feature include ANSI menus, quote/ joke events, and
user best/ worst stats. The ability to expand is almost endless,
especially if you have the source code (obtained by registration) and a
working knowledge of the C programming language.

Well, that's about it for this article. My next article will
explore the different kind of online games available for WWIV's and a
word about networking. Till next time, Hasta.....


WWIV Bulletin Board System is Copyright Wayne Bell 1987, 1990

-----------------------------------------------------------------------

ProFile
by Chris Mohney

The ProFile is a short, half-serious biographical sketch given to
various computer telecommunications personalities around Birmingham.
Victims are selected randomly from a group of names put into the
notorious Hat. Anyone who thinks himself brave or witty enough may
petition for admittance to the Hat by leaving E-Mail to me (Chris
Mohney, most boards around town) to that effect. Anyone who wishes to
suggest more questions or sneakily nominate someone without their
knowledge may take the same route....

---------

Pro File on RICHARD FOSHEE

---------

Age: 22

Birthplace: Birmingham, AL.

Occupation: Surviving childhood

My hobbies include: Computers, Music, Dancing, Dating, Sex.

Years telecomputing: 7

Sysop, past/present/future of: Amiga Alliance

My oddest habit is: I like to get (CENSORED), and suck (CENSORED)

My greatest unfulfilled ambition is: To get a picture of Kelly Rosato
hitting on a drag queen.

The single accomplishment of which I am most proud is:
Getting Kelly Rosato into a gay bar on the night of the male
strippers.

My favorite performers are: Laura Hunter, The Weather Girls, Cher,
Paula Abdul

The last good movie I saw was: The Little Mermaid

The last good book I read was: Where the Red Fern Grows

If they were making a movie of my life, I'd like to see my part played by:
Jeff Stryker

My pet peeves are: Someone saying "I'll respect you in the morning"
when they don't even respect you now.

When nobody's looking, I like to: Bite my toenails

-----------------------------------------------------------------------

PC Board 14.5 (beta) New and Enhanced Commands
by David Terry (Clarke Development)

this article has been edited to fit our space and we hope you
find it useful. MM

B)ulletin
added: A = All, display all bulletins
added: N = New, display all new bulletins
added: S = Scan, allows AND/OR searches and then displays the
entire bulletin if the text was found anywhere in it
added: D = Download, queues up all requested bulletins for
downloading (whether explicitly requested or requested
via the All, New or Scan subfunctions)

D)ownload
enhanced: Batch downloads now accept wildcards
added: Ymodem and Ymodem/G as internal BATCH protocols
enhanced: During shelled protocols the top 3 lines are frozen
enhanced: Prior to initiating the file transfer you can edit the
list of files batched up for file transfer - adding or
removing files from the list.

E)nter Message
added: Full Screen Editor
added: F = return to Full Screen Editor
added: Q = quote mode
added: U = upload mode (non-echo mode)
enhanced: Saves the message "as is" if carrier is lost prior to
the user saving the message (the message can later be
re-edited using the new EDIT command described below)

E)dit Header (subfunction of read command)
added: N = Refer Number
added: R = Read Status
added: P = Protection (including Sender and Group Password)

EDIT) Msg (subfunction of read command)
new cmd: Allows the originator of a message to re-edit his
message after having posted it.

F)iles
enhanced: Optionally will colorize DIR files on the fly (applies
to the "L", "N" and "Z" commands as well)
enhanced: V)iew now passes the comm port number to the batch file
added: G = Goodbye

FLAG) File main prompt, subfunction of Files prompt or more prompt
new cmd: Allows the caller to "flag" a file for later download.
Any number of files may be flagged up to the batch file
limit set by the sysop.

J)oin
enhanced: Now accepts either a conference number or a name

L)ocate
enhanced: Displays all secondary lines after the matched filename
enhanced: If an invalid file is requested it will automatically
switch to a Z)ippy search command
enhanced: If the filename is less than 8 characters long and no
wildcards have been used it automatically appends "*.*"
to the name (ie searching for BETA turns into BETA*.*).
enhanced: Changes a request of "FILE*" to "FILE*.*"
added: D = Download, download files that are found
added: N = New, locate files using filespec and date

N)ew
enhanced: displays all secondary lines after the file is found
added: D = Download, download files that are found

O)p Page
enhanced: When done the caller's screen is restored and the
session continues from where he left off

OPEN a DOOR
enhanced: Now accepts either a door number or a door name

Q)uick Scan
enhanced: TS (see TS enhancements in the Read command)

R)ead command
enhanced: TS = now scans the message text as well as the header
enhanced: TS = if in graphics mode it highlights the text
enhanced: TS = allows AND/OR searches to be performed
enhanced: TS = allows stacking of search text and msg number
added: COPY = COPY a message (similar to MOVE a message)
added: RR = read the reference message
added: L = read in reverse order from the last message back
added: Z = zip (compress) capture file before downloading
added: SET = set last message read pointer
added: G = Goodbye
added: J = Join a conference
added: USER = Read mail either to or from a specific user
added: O = Read Only - it doesn't set Last Msg Read pointer
it doesn't mark a message as being read. It can
be restricted by security level.

SELECT
new cmd: Can be used to select or deselect conferences the user
wants to scan and also to reset the last message read.

TEST
new cmd: Can be used to test a file for CRC errors or viruses
prior to downloading (if the sysop provides the test).

U)pload
added: Ymodem and Ymodem/G as internal BATCH protocols
enhanced: Allows external batch uploads using DSZ-log compatible
protocols
enhanced: Allows user supplied multi-line descriptions with word
wrapping while typing in the descriptions
enhanced: Records the name of the uploader in the description

WHO command
new cmd: Allows a caller to view the list of callers currently
online - WITHOUT giving them access to the node chat
functions (can be useful if you want the caller to know
who is there but don't want them tieing up the system
chatting with other callers while online).

Y)our Mail Scan
added: Q = Quick Scan for your mail. It displays only the
number of messages found and the number that are
for you using 1 line per conference instead of the
normal 3 line display.

Z)ippy Search
enhanced: Displays all secondary lines as well as filename
enhanced: If in graphics mode it highlights the "found" text
enhanced: Allows AND/OR searches to be performed and will even
find matches if keywords are on SEPARATE lines in the
DIR file
added: D = Download, download files that are found
added: N = New, locate files using filespec and date

USERS command
new cmd: Allows caller to see the names of users in a conference
and to search the user names/cities for any text


Enhanced:
* At logon it now displays the bulletin numbers of updated bulletins.

* PCBoard now uses an "auto ansi detection" routine so that if a user
chooses not to use color graphics but his comm program has ansi
capabilities PCBoard will take advantage of them (for faster cursor
movement, defaulting to the full screen editor, etc).

* PCBoard now displays an asterisk "*" to the right of the FILE DATE
when displaying file listings to indicate that the file is new to
you i.e. the file is more recent than your "Date of Last DIR Scan".

* PCBoard now removes the vertical bar "|" from the display when
secondary file descriptions are found.

* PCBoard now only updates the user's "Last Date DIR Scanned" to match
the date of the most recent file posted rather than using the date
on which he performed the scan.

* All multi-letter commands (COPY, MOVE, LANG, OPEN, NODE, etc) can
now be called by typing just the first two letters.

* For a "R A c/d/z" command (capture,download,zip) you can now set the
maximum number of messages by area and total for the scan so that
the caller does not overrun your hard disk on a capture.

* The status lines include not only the logon time and current time
but also the current minutes online and minutes remaining.

* Searching for files (for downloading) now begins with the default
filename extension if no extension was provided by the caller - in
other words if the caller asks for TEST it will first search for a
file called TEST.ZIP and not finding one will then search for TEST.

* When reading messages the caller can have the screen cleared prior
to displaying a message - this can be set with W)rite User Info.

* Input fields which are surrounded by parenthesis (i.e. having the
"(" and ")" characters around the field) can be edited using the
cursor keys or the CTRL-Key substitutes that are used by the Full
Screen Editor.

* PCBSetup now differentiates between "editing your own message" and
"editing any message" for security purposes.

* Door applications can now be executed without having to type OPEN
or DOOR and a number. Plus they can now be given command line
parameters at the time of opening.

* PCBoard now records (in the user's record) when a message is left
for him via PCBoard so that when he logs on he will be informed of
the fact that there is mail waiting for him AND which conferences
have mail waiting without having to scan for new mail.

* Replying to a message that is FROM yourself will now result in the
TO field being copied over to the TO field of the reply rather than
copying the FROM field across.

* Replying to a NON-echo message will now default to NO when asked if
the message should be echoed.

* Added support for FREE files - where files can be downloaded and not
be charged in the files or bytes downloaded record as well as not
charging against the time online if desired.

* The sysop can now set in PCBSetup the hours when he is 'in' for
answering the page bell.

* The name of the message CAPTURE file can now be set in PCBSetup or
when not specified it defaults back to the caller number.

* The CAPTURE file when downloaded can now be set to not charge the
download time against his session time.

------------------------------------------------------------------------
(example usage of some of the new commands):

* TS A 1+ <enter>
PCBoard & LANtastic <enter>

The above commands will search thru every available message in ALL
conferences areas you are set to scan for any message that has both
the word "PCBoard" AND the word "LANtastic" in it.

* TS A 1+ <enter>
PCBoard & (LANtastic | DESQview) <enter>

The above commands will search thru every available message in ALL
conferences areas you are set to scan for any message that has both
the word "PCBoard" AND either the word "LANtastic" OR the word
"DESQview" in it.

The parenthesis tell PCBoard how you want to group your criteria if
you have a complex search request such as the one above. It will
allow for nearly any number of parens and any combination of AND's
(using the "&" character) and OR's (using the "|" character).

* TS A 1+ USER JOHN DOE <enter>
PCBoard & Help <enter>

The above command (similar to examples above) adds the keyword USER
to the command line specifying that only messages that are either
TO or FROM John Doe should be displayed if they are found to have
both the words PCBoard and Help in them.

* Z A <enter>
PCBoard & DESQview <enter>

The above commands will search all of the file directories for any
file that has both the word "PCBoard" and the word "DESQview" in the
description (anywhere - including secondary description lines).

* L PCB*.* A N <enter>
120189 <enter>

The above command combines a Locate Search of the file directories
with a "new files search" for files that begin with "PCB" and were
posted on or after 12/01/89.

* Z DESQview A S D <enter>

The above command combines the Zippy Search of the file directories
with a "new files since" search and then tags all files found for
later downloading (i.e. files with "DESQview" in the description
that are new since the last time you were on)

* USERS <enter>
Utah <enter>

The above command searches for the names of users that participate
in the current conference who have the word "Utah" in their user
record (USERS does a text search on the name and address fields).

* 7 S <enter>
John & (Smith | Doe) <enter>

The above command (sysop function 7) will search the entire user
record (name,address,phone,comments,etc) for the any user record
that has both the word "JOHN" and either the word "SMITH" or the
word "DOE" in it.

* OPEN QMAIL <enter>

The above command will search and find the QMAIL door and open it
(rather than having to know the number of the door).

* J SUPPORT <enter>

The above command will search and join the SUPPORT conference
(rather than having to know the number of the conference).

* B A <enter>

The above command will display all bulletins.

* B N D <enter>

The above command will download all new bulletins.

* B A S D <enter>
DESQview & LANtastic

The above command will download all bulletins that have both the
word "DESQview" and the word "LANtastic" somewhere in the file.

* R A Z <enter>

The above command will capture all messages in all conferences since
the last message read, compress the capture file and the begin the
download procedure.

* 13 A S <enter>
JOHN DOE | JOHN SMITH <enter>

Searches all caller logs and displays entries where either John Doe
or John Smith were logged on.

* R SET 100 <enter>

Sets the last message read for that conference to 100.

* Y A S Q <enter>

The "Q" which is a new parameters gives a new display showing each
conference on a single line and shows only the number of messages
for you and the number found. It looks something like this:

Messages Messages
Num Conference To You Found
--- ---------- -------- --------
0 Main Board 0 18
1 Support 12 1628
2 DOOR 5 370
3 Utility 0 431
4 Net_Mail 1 895
5 LANtasti 2 642

* SELECT D 1-3 6 <enter>

The select command is used to select or deselect conferences. The
above command starts out by deselecting all conferences after which
it reselect conferences 1 thru 3 followed by 6. It will then prompt
the caller for any last message read changes in each of the newly
selected conferences.

* OPEN 1
* OPEN MYDOOR
* OPEN 1 PARAMETERS TO MYDOOR
* OPEN MYDOOR PARAMETERS TO MYDOOR
* MYDOOR
* MYDOOR PARAMETERS TO MYDOOR

All of the above are now valid ways of opening a door. In these
examples the door name is "MYDOOR" and it can be opened either with
or without the words OPEN or DOOR. Additionally, parameters may be
typed in on the command line which will then be sent to the door
application on the assumption that it can use the parameters.

-----------------------------------------------------------------------

Known BBS Numbers For The Birmingham Area

NAME NUMBER BAUD RATES SUPPORTED MODEM TYPE

*Alter-Ego BBS 925-0707 300, 1200, 2400
*American BBS 674-1851 300, 1200, 2400
*Bus System BBS 595-1627 300, 1200, 2400
#*Byte Me 979-2983 1200, 2400, 9600 HST
Camelot BBS 856-0679 300, 1200, 2400
^Cat House 854-5907 300, 1200, 2400, 9600 V.32
-*Channel 8250 Node 1 744-8546 300, 1200, 2400, 9600 HST, V.32
-*Channel 8250 Node 2 744-5166 300, 1200, 2400, 9600 HST
*Crow's Nest 951-5678 300, 1200, 2400
*Crunchy Frog 956-1755 300, 1200, 2400
D3 Systems BBS 663-2759 300, 1200, 2400, 9600 HST, V.32
+Duck Pond BBS 822-0956 300, 1200, 2400, 9600 HST, V.32
^*Eazy's Playhouse 870-0434 1200, 2400 MNP4
Elite Fleet 853-1257 300, 1200, 2400
Emerald Castle 871-6510 300, 1200, 2400
EzNet Central 785-7417 1200, 2400, 9600 HST
Hacker's Corner 674-5449 300. 1200, 2400
+I.S.A. BBS 995-6590 300, 1200, 2400, 9600 HST
*Joker's Castle 744-6120 300, 1200, 2400
^*Lands Of Brittania 791-0421 1200, 2400
*Little Kingdom Node 1 823-9175 300, 1200, 2400, 9600 HST, V.32
*Little Kingdom Node 2 823-9192 300, 1200, 2400 MNP4
LZ Birmingham 870-7770 300, 1200, 2400
*Magnolia BBS 854-6407 300, 1200, 2400, 9600 HST
Posys BBS 854-5131 300, 1200, 2400
*Radio Free Troad 592-6234 300, 1200, 2400, 9600 HST
Role Player's Paradise 631-7654 300, 1200, 2400
Safe Harbor 665-4355 300, 1200, 2400
Sandwich Shop 226-1872 300, 1200, 2400
Shadetree BBS 787-6723 300, 1200, 2400
Sperry BBS 853-6144 300, 1200, 2400, 9600 Hayes
*ST BBS 836-9311 300, 1200, 2400
The Commodore Zone 856-3783 300, 1200, 2400
The Connection 854-9074 1200, 2400
The Islands BBS 870-7776 300, 1200, 2400
The Kingdom Of Teletech 674-0852 300, 1200, 2400
-The Matrix Nodes 1-4 323-2016 300, 1200, 2400
-The Matrix Node 5 251-2344 300, 1200, 2400, 9600 HST
VCM(ee) BBS Node 1 655-4059 300, 1200, 2400
VCM(ee) BBS Node 2 655-4065 300, 1200
Victory Express 425-0731 300, 1200
Willie's DYM Node 1 979-1629 300, 1200, 2400
Willie's DYM Node 2 979-7739 300, 1200, 2400
Willie's RBBS 979-7743 300, 1200, 2400
Ziggy Unaxess 991-5696 300, 1200

Boards with a "*" before their name are members of our local network,
EzNet, and public messages left in the EzNet Conferences of any of these
boards will be echoed to all members.

Boards with a "+" before their name are members of FidoNet, an
international network that provides a variety of public forums as well
as private mail services all over the world.

Boards with a "#" before their name are members of our local WWIV
network, and public messages left in any of the netowrk conferences
will be echoed to all members.

Boards with a "-" before their name are members of MetroNet, an
international network that provides a variety of public forums as well
as private mail services all over the world.

Boards with a "^" before their name are members of WWIV-Net, an
international network that provides a variety of public forums as well
as private mail services all over the world.

If you have any corrections, additions, deletions, etc., please let us
know via EzNet.

-----------------------------------------------------------------------

EzNet Multiple Echo List

EzNet now supports multiple conference echoing but there are a few
things you should be aware of regarding private mail.

A. You have one 'address' for private mail. If you are registered for
private mail on Channel 8250 and someone sends you a private
message in the MS-DOS conference from Crunchy Frog it will wind
up in the Hardware conference on Channel 8250 as it should.

However, if you were registered for private mail on Magnolia and
someone sends you a private message in a conference that Magnolia
does not support (echo) then the message will wind up in the
twilight zone.

B. If you go by a handle on one BBS and your real name on another even
if the private message goes where it is supposed to, you will not
be able to read it because it is addressed to someone else as far
as PC Board is concerned. PC Board has no way of knowing that Red
Foxx and John Doe are the same person. No tickee, no washee.

Advice on sending private mail: If you don't know if the person you
are sending private mail to is registered for private mail then keep a
copy of the message in case you have to find an alternate route. EzNet
Central will delete your private, undelivered message and inform you
that the user you attempted to reach is not registered for private mail
on any EzNet Node.

This is a list of the current echoes that I am aware of. More are
in the making and will be posted in future issues. If you are a sysop
and are running an echo not listed for your board, please make us aware
of it so we may correct it next issue.


Eznet Program IBM Adult Scitech BTNWA

Alter-Ego ........... * ..... ..... ..... ..... ..... ..
American BBS ........ * ..... ..... ..... ..... ..... ..
Bus System BBS ...... * ..... * ..... * ..... ..... * ..... * ..
Byte Me ............. * ..... * ..... * ..... * ..... ..... ..
Channel 8250 ........ * ..... * ..... * ..... ..... * ..... ..
Crow's Nest ......... * ..... ..... ..... ..... ..... ..
Crunchy Frog ........ * ..... ..... * ..... * ..... ..... * ..
Eazy's Playhouse .... * ..... * ..... * ..... * ..... ..... ..
Joker's Castle ...... * ..... ..... ..... * ..... ..... ..
Lands Of Brittania .. * ..... * ..... * ..... ..... ..... ..
Little Kingdom ...... * ..... * ..... * ..... * ..... * ..... ..
Magnolia BBS ........ * ..... ..... ..... ..... ..... ..
Radio Free Troad .... * ..... ..... ..... ..... ..... ..
ST BBS .............. * ..... ..... ..... * ..... ..... ..

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT