±±±±±±Ü ±±Ü ±±±Üܱ±±Ü ±±±±±±Ü ±±±±±±Ü ±±Ü ±±±Üܱ±±Ü ±±±±±±Ü ±±±±±±Ü ±±Ûß±±Û ±±Û ±±Û±±Û±±Û ±±Ûßßßß ß±±Ûßß ±±Û ±±Û±±Û±±Û ±±Ûßßßß ±±Ûßßßß ±±±±±Ûß ±±Û ±±Û ßß±±Û ±±±±±Ü ±±Û ±±Û ±±Û ßß±±Û ±±±±±Ü ±±±±±±Ü ±±Ûß±±Ü ±±Û ±±Û ±±Û ±±Ûßßß ±±Û ±±Û ±±Û ±±Û ±±Ûßßß ßßß±±Û ±±Û ±±Û ±±Û ±±Û ±±Û ±±±±±±Ü ±±Û ±±Û ±±Û ±±Û ±±±±±±Ü ±±±±±±Û ßß ßß ßß ßß ßß ßßßßßß ßß ßß ßß ßß ßßßßßß ßßßßßß --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- +---------------------------------+ incorporated new versions of | EDITORS FILE | PCBoard, GAP and PCRelay software. | | We have weathered quite well! +---------------------------------+ by John Dodson, Node ->CANTINA. +---------------------------------+ | WHO'S WHO IN RELAYNET | Welcome to the May issue of RIME | | Times! I am very pleased to +---------------------------------+ announce that I now have a co- by Ed Lazarowitz, Node ID ->CAPCON editor! Ed Lazarowitz has generously offered to help me scour Hello! I'm Ed Lazarowitz, and I'm conferences, collect articles, edit the new co-editor of the Rime Times articles and interview RIME users newsletter! I'd like to take a and sysops. Ed is a co-sysop on Bob minute and tell you all a little Shucks Capitol Connection and can be about myself. reached via Node ID->CAPCON. Ed tells us a little about himself in Where to start? Well, I'm 'thirty- the Who's' Who in RelayNet feature. something' years old, married, with I am excited about this prospect as a 3 year old daughter. By it insures growth of the newsletter. profession, I'm a Senior Programmer Please make Ed welcome and do not Analyst with Blue Cross Blue Shield forget to send him your ideas and of the National Capital Area. I articles! work with a dedicated group of professionals in our Data Processing Have you read the newest version of division's Development Support the RelayNet User manual? Hats off Center. What we do, is to provide to Randy Blackmond (Node ID - product and methodology support for >BASEMENT)for writing in terms the applications programming everyone can understand! If you departments within BCBSNCA. I have ever wondered about private personally work in the Product mail, routed mail, encrypted mail, Support section. Since I have some mailboxes or just how this darn mail experience with technical writing, thing works, you need to download both as a writer and critic, John RIMEMAN.ZIP from your friendly local asked if I would be interested in RelayNet BBS. You will become an helping him. I said sure! It could over night netmail expert... highly be fun for all of us! recommended! Although my primary programming It seems to me to have been a rather background and expertise is in calm month. We have weathered the database administration on IBM "Fan-driven Sailboats" thread(I mainframes, I've been involved with think), the new Women only personal computers since the early conference (some eyebrows still are 80's. I started working for Radio upraised), more indiscriminate use Shack shortly after they introduced of network sysop (NS) messages and the Model III. Even though money Page 2 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- was tight, I conned my wife into willing to help answer a question or letting me buy a 48K, 2 floppy disk offer an opinion. Model III. Back then, that was hog- heaven! Well, that's enough about me for now. I look forward to hearing from Shortly after that, I bought a 300 many more of you over the next few baud manual modem and discovered months, both soliciting articles and CompuServe and a couple of local in personal conversation. BBSes. At the time, I really didn't get too involved in telecomputing. +---------------------------------+ It just didn't seem all that | MEET THE CONFERENCE HOST | interesting. Although there were | | lots of little boards, nothing had +---------------------------------+ yet been conceived to tie them all by Sheila Fava, Node ID ->CAPCON together. Additionally, it would often take hours to go through just Greets fellow RelayNet'ers! My name a few dozen messages a week (no off- is Sheila Fava and I'm the HOST(ess) line readers existed back then!). of the disABLED Conference. I'd like to take a few minutes and tell Since then, I've continued as a user you a little about myself and the of CIS and tried most of the other disABLED Conference. subscription services that have come down the pike; not really finding Although I've only been HOST(ess) of any of them to my liking. Until the disABLED Conference for a bit recently, I had pretty much ignored more than a month, I have been the BBS community. involved in tele-computing since 1982, when I purchased my first Anyway, I recently bought into the computer, a TI99/4A. In 1983 I IBM PC market when I upgraded to a purchased a TRS-80 Model 100 and I 386SX-based clone. Even though I'd now have a TRS 1400LT. been using an IBM PS/2 at work for several years, this was my first After spending two years on real exposure to the power of the CompuServe, I discovered the FreeNet IBM PC. At work, I was more of a BBS in Cleveland, Ohio. While 'power-user'. Now, I have the honing my writing skills there, I opportunity to really see what these wrote several very funny stories babies can do! which were submitted to Case Western Reserve University's Literary SIG. As far as RelayNet is concerned, I To make a long story short, I use The Capitol Connection BBS in entered the First Annual Short Story Annandale, Virginia as my window Contest even though I lived out-of- into the network. I actively State. The stories entered in the participate in the UPLINK, STARTREK, contest were voted on anonymously. PETS, NEWUSER, and DEBATE Imagine my surprise when the conferences. Additionally, I monitor Literary SIG Staff told me I had won what's going on in several other First Prize! areas such as COMMON, TELIX, DBASE, and EZ-READER. I've only been One of the best things in my life active here for a few months, and is being a puppeteer for the 'Kids already I've made many new friends; On the Block' program. As far everyone always seems more than as I know, I have the unique distinction of being the only Page 3 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- disABLED puppeteer in the USA. The should take a hike ... they should puppets (life-size 12-year-olds) have taken a hike l-o-n-g ago. are very colorful and the puppeteers wear black in the Japanese 'Bun- Within the disABLED Conference, we Raku' Style of puppetry. Some of the generally have light discussions as puppets are non-disABLED though most well as more technical software and of the puppets have some kind of hardware discussions geared to disABILITY: Spina Bifida, Cerebral particular disABILITIES. Help is Palsy, Deaf, Blind, Four Older also offered with particular Brothers, Obese, With Divorced problems that an individual may be Parents, Retarded, Child Abuse, facing in obtaining services for Sexually Abused, Drug Abuser ... you his/her disABILITY. name it! I've been a puppeteer for 6 years and love it! Why haven't I Although intended primarily as a 'burned out' by now? I find this means for the disABLED to drama troupe is a nift way to dispel communicate trends and ideas, you my anger and frustrations and to don't have to be disABLED to educate students about the disABLED participate in our conference. at the same time. Several of our participants aren't disABLED; they participate to learn Another thing I'm very active in is more about the disABLED and to participating in Aquatic experience the support that's a Competitions for the disABLED. I cornerstone of our conference. Most travel all over the United States newcomers quickly learn that we try and Canada (via Greyhound) to attend to provide more than just a message competitions. Many of my lasting base of where to go for what kind of friendships have been kindled at service or piece of equipment! A these events. Not only do they large percentage of our messages provide necessary physical activity, offer conversation and support to but the competitions allow those needing it. interaction on a social level to those with disABILITIES as well! A recent (non-disABLED) BBS'er Although I enjoy the actual physical commented on the "eye-opening competition, I also enjoy the mental experience reading through the stimulation and emotional support my accumulated message base" and "the fellow competitors provide. love and support is positively astounding! Rarely were there any If I've kept your attention this messages 'moaning and groaning' far, please read on just a little about how bad life is for the bit farther to learn more about the disABLED. Everything was so upbeat conference I take care of on and positive!" This is just the RelayNet. attitude we try to foster on the disABLED Conference. The disABLED Conference that I shepherd USED to be called the - Thanks for taking the time to read HANDICAP- Conference. I have a through this ... I think I'll roam distaste for that name because it is over to the disABLED Conference, but steeped in antiquity. The disABLED if I've piqued your curiosity about person was thought of as standing on the disABLED Conference and you'd a street corner with CAP In HAND ... like more information about anything begging! Noooo ... this is a NEW I've talked about in this article, day and abrasive names like that Page 4 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- please feel free to send me a DESCRIPTION: A place for Women to message at my home board: discuss virtually anything, sans Men. All Sysops that elect to carry Capitol Connection -> CAPCON. Check this conference, please be advised us out! that it is strictly for Women, and this rule is expected to honored. +---------------------------------+ HOST: Kathi Webster Node ID | CONFERENCE NEWS | ->GODFTHR | | ACTIVITY: NEW +---------------------------------+ Posted by Skip Ross, Conference Co- NAME: SCUBA ordinator, Node ->ACC NUMBER: 106 (previously OmniView) Well, it is time for a batch of new DESCRIPTION: A conference that is conferences to be announced, but dedicated to the SCUBA divers in our this time it is going to be slightly network, and hosted by a certified different! We are in the process of PADI SCUBA Instructor, IDC Staff replacing some of the slower Instructor, and who also teaches 7 conferences, and these confs. will types of specialty diving. be our first attempt at doing this, Discussion is open to all folks from so please check the conference the absolute novice to the numbers listed below. experienced diver. HOST: Tom Kellen Node ID NAME: GRAPHICS ->PARADIGM NUMBER: 26 (previously Word ACTIVITY: NEW Processors) DESCRIPTION: This conference will NAME: BOATING encompass all forms of computer NUMBER: 113 (previously graphics, animations, programming, ETHICS) pictures, etc. Would also cover DESCRIPTION: A conference dedicated topics of graphics conversion for to the Boaters. This conference is desktop publishing, and some desktop shared with MetroLink publishing itself. HOST: To Be Announced HOST: Mark Bernat Node ID - ACTIVITY: NEW >DGRAPHIC ACTIVITY: NEW NAME: Nintendo NUMBER: 159 (previously Pre- NAME: Laptop Computers Teens) NUMBER: 29 (previously DESCRIPTION: A conference for the Educational) kids to discuss one of Americas DESCRIPTION: This conference is biggest games. Shared with MetroLink dedicated to the users of Laptop HOST: To Be Announced computers, a place for answers and ACTIVITY: NEW advice on purchasing and tips on using these small wonders. NAME: Non-Profit HOST: Dave Shubert Node ID Organizations ->CASINO NUMBER: 142 (previously ACTIVITY: NEW HORSES) DESCRIPTION: The conference's NAME: Women Only purpose is to exchange information NUMBER: 71 (previously effecting the Non profit Leading Edge) organizations in your area. By Page 5 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- posting events listings as well as Each conference develops it's own fund raises techniques and lingo and abbreviations as well. It membership participation and would be rather time consuming to retention programs. Also to provide compile and list all of the a means for networking between possibilities in all of the people involved in the these conferences, so I will select two. organizations. We are establishing a clearinghouse for all non profit In the Computer/Technical organizations. conference, you will find the HOST: Ira Karlick Node ID - following: >BBSCS ACTIVITY: NEW CPU .... Central Processing Unit DIP .... Dual In-line Package +---------------------------------+ EPROM .. Erasable Programmable Read | NETWORK SHORTHAND | Only Memory | | I/F .... Interface +---------------------------------+ PROM ... Programmable Read Only by Mark Adams, Node ID ->OUTER Memory RAM .... Random Access Memory How many times have you seen an ROM .... Read Only Memory abbreviation in a message and SIMM ... Single In-line Memory wondered what it meant? Most users Module who have been at this for any length SIP .... Single In-line Package of time already know and use many WORM ... Write Once, Read Many abbreviations. We take it for ZIF .... Zero Insertion Force granted that everybody knows what we ZIP .... Zig-zag In-line Package mean. New users, however, may be scratching their heads wondering There are others, but this is a whats going on. I've picked out sampling of what to expect. several of these over the past few weeks and compiled them here, In the 4_Sale conference, you may primarily for the novice user. find some of the above and others, as follows: BBS .... Bulletin Board System BTW .... By The Way BO ..... Best Offer FWIW ... For What It's Worth C/MO ... Cash/Money Order FYI .... For Your Information COD .... Cash On Delivery IMHO ... In My Humble Opinion PPD .... Prepaid L8R .... Later OBO .... Or Best Offer OTOH ... On The Other Hand SASE ... Self Addressed Stamped RIME ... RelayNet International Envelope Message Exchange ROTM ... Right On The Money I'm sure by now you get the idea. RTFM ... Read The Forgotten Manual Usually if you think about it, and (The `F' is variable.) take it in the context in which it's SIG .... Special Interest Group presented, it will become apparent. TTFN ... Ta Ta For Now And don't forget the smiley "faces", TTMS ... Talk (Type) To Me Soon [look sideways], ;-) :-) :^) 8-) TTYL(A) Talk (Type) To You Later :^{) , etc. (Winking, smiling, with (Alligator) nose, with glasses, with moustache.) And then there are the "stage directions", i.e., , . Page 6 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- 3. Don't use the local equivalent of +---------------------------------+ a PAGE command unless you really | BEGINNERS CORNER | have some clear cut notion of what | | you want to say and why. Almost any +---------------------------------+ Sysop is more than happy to answer by Jim Daly, Node ->TREASURE questions or offer help concerning his system. Unfortunately, because Bulletin Board Etiquette about 99% of the people who want to Chat with the Sysop have absolutely The following are a few points of nothing to say besides "How old are general BBS etiquette. If you wish you?" or something equally to maintain your welcome on whatever irrelevant, few Sysops even bother system you happen to call, it would turning on their pagers let alone be to YOUR advantage to observe respond when Paged. these few rules. 4. When you are offered a place to 1. Don't habitually hang up on a leave comments when exiting a system. Every Sysop is aware that system, don't try to use this area accidental disconnections happen to ask the Sysop questions. It is once in a while but we do tend to very rude to the other callers to get annoyed with people who hang up expect the Sysop to carry on a half every single time they call because visible conversation with someone. they are either too lazy to If you have a question or statement terminate properly or they labor to make and expect the Sysop to under the mistaken assumption that respond to it, it should always be the 10 seconds they save on-line is made in the section where all the going to significantly alter their other messages are kept. This allows phone bill. "Call Waiting" is not an the Sysop to help many people with acceptable excuse for long! If you the same problem with the least have it and intend to use the line amount of effort on his part. to call BBS systems, you should either have it disconnected or find 5. Before you log on with your some other way to circumvent it. favorite pseudonym, make sure that (CALLWAIT.ZIP) handles are allowed. Most Sysops don't want people using handles on 2. Don't do dumb things like leave the system. There is not enough room yourself a message that says; "Just for them, they get silly games of testing to see if this thing works". one-upmanship started, it's much Where do you think all those other nicer to deal with a person on a messages came from if it didn't personal basis, and last but not work? Also, don't leave whiny least, everyone should be willing to messages that say; "Please leave me take full responsibility for his a message". If ever there was a actions or comments instead of person to ignore, it's the one who slinging mud from behind a phony begs someone to leave him a message. name. If you want to get messages, start by reading the ones that are already Also when signing on, why not sign on-line and getting involved in the on just like you would introduce conversations that are already on- yourself in your own society? How going. many of you usually introduce yourselves as Joe W Smutz the 3rd or 4th? Page 7 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- are going to do next. Most BBS 6. Take the time to log on properly. systems will automatically log you There is no such place as ORL, WS, off if there is no keyboard activity WP or any of a thousand other for an extended period of time abbreviations people use. You may (usually 2-5 minutes). think that everyone knows what WP is supposed to mean, but most BBS On the same subject, if you are systems have members that call from going to Send or Receive a file and all around the country and I assure think that you may not be able to you that someone from Atlanta has no wait for completion of the transfer, idea what you're talking about. then wait till you can, or use the Local equivalent of the (G)oodbye 7. Don't go out of your way to make after completion. rude observations like "Gee, this system is slow". Every BBS is a Auto log-offs due to keyboard tradeoff of features. You can timeouts show up in the System's generally assume that if someone is Activity Log (and your personal running a particular brand of statistics) as Security violations! software, that he is either happy On some Multi-Tasking systems, this with it or he'll decide to find type of disconnect can cause the another system he likes better. It program to lose it's place in MEMory does nobody any good when you make and freeze all the NODES!! comments about something that you perceive to be a flaw when it is 11. Have the common courtesy to pay running the way the Sysop wants it attention to what passes in front of to. Constructive criticism is your face. When a BBS displays your somewhat more welcome. If you have name and asks "Is this you?", don't an alternative method that seems to say YES when you can see perfectly make good sense then run it up the well that it is misspelled. Also, flagpole. don't start asking questions about simple operation of a system until 8. When leaving messages, stop and you have thoroughly read all of the ask yourself whether it is necessary instructions that are available to to make it PRIVATE. Unless there is you. I assure you that it isn't any some particular reason that everyone fun to answer a question for the shouldn't know what you're saying, thousandth time when the answer is don't make it private. We don't call prominently displayed in the system them PUBLIC bulletin boards for bulletins or instructions. Use some nothing, folks. It's very irritating common sense when you ask your to other callers when there are huge questions. The person who said blank spots in the messages that "There's no such thing as a stupid they can't read and it stifles question" obviously never operated a interaction between callers. BBS. 9. If your favorite BBS has a time 12. Don't be personally abusive! It limit, observe it. If it doesn't, doesn't matter whether you like a set a limit for yourself and abide Sysop or think he's a jerk. The fact by it instead. remains that he has a large investment in making his computer 10. Do not sit in front of your available, usually out of the screen with your hands in your lap goodness of his heart. If you don't while trying to figure out what you like a Sysop or his system, just Page 8 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- remember that you can change the doesn't expect nonstop pats on the channel any time you want. Besides, back, it seems reasonable that he whether you are aware of it or not, should at least be able to expect if you make yourself enough of an fair treatment from his callers. annoyance to any Sysop, he can take This includes following any of the the time to trace you down and make rules for system use he has laid out your life, or that of your parents, without griping about it. Every miserable. Sysop has his own idea of how he wants his system to be run. It is 13. Keep firmly in mind that you are really none of your business why he a guest on any BBS you happen to wants to run it the way he does. call. Don't think of logging on as Your business is to either abide by one of your basic human rights. what he says, or call some other BBS Every person that has ever put a where you feel that you can obey the computer system on-line for the use rules. of other people has spent a lot of time and money to do so. While he +---------------------------------+ | 'C' TUTOR | | | +---------------------------------+ by Doug Maclean, node ->RUNNINGB Last month we looked at routine to copy a file from one place to another. This month we will be improving the through put and error checking. The increased speed is the result of replacing open and read/write statements with fopen and fread/fwrite. This permits us the option of using the setvbuf statement. This routine permits us to set up very large buffers to minimize disk access. In the routine fastcopy, we set up a set of 20K buffers to expedite file I/O. We also use the access command to determine if the destination file exists. This is much faster than checking with the success of failure of an open. #include "fcntl.h" #include "types.h" #include "stat.h" #include "errno.h" #include "dos.h" #include "io.h" #if defined(__TURBOC__) /* Turbo C */ #include "alloc.h" #else #include "malloc.h" #endif #include "stdio.h" #include "stdlib.h" #include "fcntl.h" #define BUFSIZE 20480 Page 9 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- #define IOBUF BUFSIZE fastcopy(srcfile,destfile,overwrite,touch) char *srcfile,*destfile; int overwrite,touch; /* flags */ { char *buffer; int n; union REGS r; FILE *srcptr,*destptr; char *srcbuf,*destbuf; int src,dest; if(access(srcfile,0) == ENOENT) return(1); if(!access(destfile,6) && !overwrite) return(1); buffer = malloc(BUFSIZE); srcbuf = malloc(IOBUF); destbuf = malloc(IOBUF); srcptr = fopen(srcfile,"rb"); setvbuf(srcptr,srcbuf,_IOFBF,IOBUF); destptr = fopen(destfile,"w+b"); setvbuf(destptr,destbuf,_IOFBF,IOBUF); while(!feof(srcptr)) { n = fread(buffer,1,BUFSIZE,srcptr); if(fwrite(buffer,1,n,destptr) != n) { fclose(srcptr); fclose(destptr); free(srcbuf); free(destbuf); free(buffer); return(1); } } fclose(srcptr); fclose(destptr); free(srcbuf); free(destbuf); free(buffer); if(touch == 1) { src = open(srcfile,O_RDONLY | O_BINARY); dest = open(destfile, O_WRONLY | O_BINARY,S_IREAD | S_IWRITE); r.h.ah = 0x57; r.h.al = 0; r.x.bx = src; intdos(&r,&r); Page 10 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- r.h.ah = 0x57; r.h.al = 1; r.x.bx = dest; int86(0x21,&r,&r); close(dest); close(src); } return(0); } +---------------------------------+ | 'BRIEF' MACROS | | FOR EZ-READER | +---------------------------------+ by Doug Maclean, node ->RUNNINGB As an active member of the relay I find myself writing a lot of messages with EZ-Reader. I use Brief as my editor and wrote the following macro to help with some of the mundane chores. This macro will automatically split the screen into a message and reply if you are answering a message or keep one screen if you are preparing a new message. The macro also sets up hot keys to route a reply based on the home board of the original message. F2 will route the mail and F3 will also request a return receipt. F1 will search for the person's name and start the reply off for you. extern blktype; string ascii_table; rime() { int buff_id; if(exist("i:\\work\\msg")) { top_of_buffer(); create_edge(0); buff_id = next_buffer(); set_buffer(buff_id); attach_buffer(buff_id); } assign_to_key("","_ro 0"); assign_to_key("","_ro 1"); assign_to_key("","salute"); assign_to_key("","sign"); assign_to_key("","regards"); message("RIME Handler loaded"); } Page 11 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- _ro(int ret) { end_of_buffer(); search_back("PCRelay",0,1,0); search_fwd(":",0,0,0); right(); mark(1); search_fwd(" ",0,0,0); left(); copy(); change_window(2); top_of_buffer(); paste(); beginning_of_line(); insert("->"); end_of_line(); if(ret) insert("*"); insert("\n\n"); change_window(0); top_of_buffer(); } salute() { int temp; top_of_buffer(); search_fwd("From:",0,1,0); right();right();right();right();right();right(); mark(1); search_fwd(" ",0,0,0); left(); copy(); change_window(2); paste(); beginning_of_line(); right(); mark(1); end_of_line(); insert(","); temp = blktype; blktype = 1; vi_tilde(); end_of_line(); left(); insert("\n"); blktype = temp; change_window(0); top_of_buffer(); change_window(2); Page 12 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- } sign() { insert("\n\nDoug\n"); } regards() { insert("\n\nRegards,\nDoug\n"); } vi_tilde (...) { int ascval, row; int rep_cnt; string chr; if (inq_marked (row, NULL)) { if (blktype == 3) move_abs (row, 1); else swap_anchor (); rep_cnt = inq_mark_size (); raise_anchor (); } if (strlen (read ()) == 1) { --rep_cnt; next_char (); } while (--rep_cnt >= 0) { ascval = ascii (chr = read (1)); delete_char (); if (ascval >= 65 && ascval <= 90) sprintf (chr, "%c", ascval + 32); if (ascval >= 97 && ascval <= 122) sprintf (chr, "%c", ascval - 32); insert (chr); refresh (); } } ascii_init (...) { int a_count; string a_chr; Page 13 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- ascii_table = ""; a_count = 0; while (++a_count < 128) { sprintf (a_chr, "%c", a_count); ascii_table += a_chr; } sprintf (ascii_table, "%s", ascii_table); } ascii (...) /* converts 1st character in string to ascii value */ { string parm; get_parm (0, parm); if (first_time ()) ascii_init (); if (parm == "") returns 0; else returns index (ascii_table, substr (parm, 1, 1)); } You should, of course, change the name in the signature macros to your own. I hope you enjoy this macro and join us in the Brief Support conference. +---------------------------------+ The primary purposes of these marks | TRADEMARKS | are to indicate origin, imply | AND SERVICE MARKS | quality, and stimulate demand. +---------------------------------+ While they keep others from using by James Spinelli, Node ID ->VMC similar names, they don't prevent others from making or selling In our previous columns we talked similar goods or services. about patents and copyrights as methods used to protect our Only the owners of the marks are inventions, creations and entitled to use them. If your idea expressions of ideas. In this is a marketing concept that depends column we'll address the use of on a particular name, you had trademarks and service marks to better learn at the outset whether protect our ideas. you are free to adopt it. One marketeer spent considerable time A trademark is a word, name, and money developing the "French symbol, device, or a combination of Kiss" candy idea before checking these actually used in trade with the status of the name. Last-minute goods to indicate their source and research revealed it to be a to distinguish them from products registered trademark of a of others. A service mark serves a California company. The mark was similar function for services. They not actually being used at the are essentially brand names. time, and the company could have been contacted about licensing its Page 14 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- use. However, the marketeer decided Registering a trademark or service that the profit potential was not mark grants the right AND THE great enough to pay licensing fees, OBLIGATION to use the circled "R" and the project was abandoned with or "S" symbols or certain phrases some egg on face but with tongue indicating registered status. still safely in cheek. A mark owner has an obligation to To avoid a similar fiasco, you can protest its misuse or risk losing do your own preliminary search in it. If a mark falls into general the TRADEMARK REGISTER OF THE public use to denote a TYPE of UNITED STATES. Verifying whether or article, as opposed to a particular not a particular mark is currently brand, it may be deemed generic and registered will save you the the trademark protection lost. possibility of a lawsuit to Anyone making that type of article preclude you're using someone could then use the former trademark else's mark. You may find it useful to describe it. Preventing this can to spend a few hundred dollars to require diligence in informing the have a professional search done for public that the mark should only be you by a Patent and Trademark used to refer to the specific specialist brand. Former trademarks that have become generic, for example, The requirements for registration include aspirin, cellophane, and are quite technical and linoleum. complicated. You can file your own application, but, as with patents, Registration is effective for it is wise to consult an agent or twenty years and is renewable, but attorney. A trademark cannot be an affidavit must be filed within registered if it is: six years showing that the mark is still in use and that there is no - Immoral or deceptive intention of abandoning it. Fees - Disparaging of living or dead for the original registration and persons, institutions, national renewals are several hundred symbols, or beliefs (remember, dollars. there's no issue of "freedom of speech" involved here) Trademarks should not be confused - The flag or coat of arms of any with TRADE NAMES. Trademarks and state or nation service marks refer to goods and - The name, portrait, or services, while trade names relate signature of a living person to those who produce and sell them. without his or her permission Businesses always have trade names, - The name, signature, or but they might not use any marks. portrait of a deceased U.S. Trade names are not protected by President while his widow is alive, federal law, but state law may without her permission protect them by statute or by - So similar to an existing mark common law concepts of unfair as to cause confusion, mistake, or competition. A trade name can be deception registered and used as a trademark. - A common English term, common It is then protected by the same name, or a descriptive or generic procedures and to the same extent term as any other trademark. Coca Cola is a trade name. It is also a trademark. Page 15 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- +---------------------------------+ As with patents, marks are better | PRACTICE SAFE HEX! | in theory than in practice, at | | least for individuals and small +---------------------------------+ businesses. They are difficult to by Ed Lazarowitz, Node ->CAPCON obtain and can be quite costly to maintain and protect. On the other "Prevent computer viruses - hand, if you have ample financial Practice safe hex!" resources, the system can be most effective. Inadvertently running This admonition recently appeared afoul of someone with a mark and as the tagline from a RelayNet BBS. the means to enforce it can be Sage words of advice in this time costly indeed. of paranoia over the multitude of viruses and Trojan horses floating Another rather unknown small around. Most programmers and PC business marketeer helped found a users give little thought to the small company that sold salad security of their valuable software dressing, using a red and white and hardware - until it's too late. checkered pattern for the border on I'd like to present to you my its label. Although this very 'unofficial' checklist of PC common pattern was used solely to protection do's and don'ts: achieve an attractive design the firm was promptly "requested" by o First and foremost, back up your attorneys from the Ralston Purina hard drive frequently. The Company to remove it. Even though frequency of backup is only the small company strongly believed something you can determine. the BORDER design did not in any However, the more suspect software way infringe the Ralston you acquire and use, the shorter trademarked checkerboard SQUARE, your backup cycle should be. At the producers of the salad dressing the same time, maintain at least 3 had to comply. Doing battle with or 4 levels of backups. Be aware the enormous multi-billion-dollar that if a virus is timed to go off Ralston Purina Company was, without after a three-month period, for any doubt, out of the question, and example, it could also be resident the cost of revising all of the on your most recent backup disks. graphics and printing new labels If a virus is detected, your hard were more than enough to put the disk can be reformatted and files fledgling salad dressing restored. manufacturer out of business. o One of the simplest active- In the final article of our series protection actions you can take is regarding the protection of our to alter the file attributes of all ideas, to appear next month, we'll executable files to 'read-only'. talk about State and Common Law This will prevent poorly engineered protections. viruses from being able to alter these program files. This category includes any files loaded in the CONFIG.SYS file and those with extensions of .BAT, .COM, or .EXE. Most of the commercially available low-level DOS tools have a facility Page 16 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- for doing this, such as The Norton your risk of infection from these Utilities FA command. sources by minimizing contact with BBSes that have large download o Another active protection method directories of games, hacked or you can use to protect your otherwise. COMMAND.COM file is to rename AND relocate it using the SHELL command o Be extremely leery of from within CONFIG.SYS. suspicious-looking files. Avoid running downloaded files that don't o Although many viruses will not include documentation written by be caught by a hard drive the program's author. Also, if the protection utility, they still program documentation doesn't offer relatively cheap insurance include name, address, and phone against corruption by a wide number of the author. variety of known viruses. These include such packages as Flushot o While they may be the most Plus, Bombsquad, and Write Protect attractive tools to the technically Tab. (A recent issue of "PC oriented, use extreme caution with Magazine" reviewed several packages low-level tools. Since these available. FOr more information, programs by nature are designed to see the ??????, 1990 issue.) tinker with the kinds of data most often corrupted by viruses, it may o Avoid ANY software downloaded be very difficult to ascertain that from those BBSes that don't a tool has a virus imbedded in it validate or otherwise verify new until it's too late. Beware of users. Along the same lines, Don't public domain disk optimizers, run files downloaded from BBSes directory sorters, bulk unerasers, where the Sysop doesn't test and FAT/directory editors, and other approve all files. There are many low-level DOS utilities. The best BBSes where the Sysop has a bet for safe low-level hard disk separate test PC management is a known commercial for verification of uploaded package like The Norton Utilities software. If you find a board that 4.5 Advanced Edition or PC Tools has this setup, they would be a Deluxe 5.5. prime source of download software. o Of course, it goes without o If you use shareware software, saying that programs you copy onto such as EZ-Reader or Telix, try to your hard drive should come from a download that software from the source that you know and trust. author's BBS. Most authors provide support BBSes for their products or Well, that's the 10 most obvious frequent one particular BBS where steps you can take to try and they post new releases and bug protect yourself against the fixes. onslaught of viruses and Trojan horses that may come your way. o Avoid at all costs hacked or However, this information is just pirated software. Some of the the tip of the iceberg. If you're deadliest viruses created have been interested in obtaining more data hacked versions of mainstream on viruses and protection schemes, applications. Game programs are the National Computer Security especially prone to this kind of Association, Washington, D.C., attack philosophy. You can reduce sells a Virus Self-Defense Kit for Page 17 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- a very reasonable $45.00. This Blasters, one IBM Music Feature, includes the program, and one-year and one CMS card. membership in the group. They also run a BBS (unfortunately not part I also asked for a satisfaction of RelayNet). The number is rating from 1 to 10. The general (202)364-1304. consensus is that you like your music cards. The average vote is +---------------------------------+ 8.1 out of 10. The overall vote | RIME TIMES POLL | for the AdLib is about the same at | | 8, and the Sound Blaster is 8.3. +---------------------------------+ The users of the IBM Music Feature by Nathan Anderson, Node ->OUTER and the CMS card voted at 10 and 5, respectively. Since I am an avid user of RIME and I found the new newsletter I'll probably run out of good ideas informative and entertaining, I for polling questions soon, so I'd really wanted to give some appreciate all the suggestions that continuing contribution. I figured you wonderful people have. If any that the best way to do this was to of you can recommend something that organize a poll and collate all the I could ask in a future poll, just information that I received from drop me a line in the COMMON it. I hope that in the future conference. I'll be there to there will be more participation in receive it. Make it R/O if you this poll than there was in the want, I'm R/O capable. first one. Only 27 of you answered the first poll. Although the poll I'll probably have started my next applied to only a few people, I poll by the time you read this. I think there are more people who still hope to see you answer, have a sound board and DIDN'T though. The more that answer, the answer. merrier. Just take a minute and a half to vote, and I'll really My first poll dealt with music appreciate it. cards for the PC. These are cards such as the AdLib, Game Blaster, +---------------------------------+ Sound Blaster, and IBM Music | BETA THIS! | Feature. | | +---------------------------------+ As I said before, only 27 of you by Jeff Woods, Node id ->MUSICAL answered, but I can really only count 25. Kevin Nelander, with Well, it's official. The PCBoard some friends of his, once got his world is topsy turvy. I acquired Apple II+'s drive to play such the beta code for 14.5 about four songs as "Colonel Bogie's March." hours after posting. One thing Another RIME user, has some exotic beta testing does for you is to pieces of hardware that I couldn't keep your board off-line while you really fit into the results of the get new code. Judging on the poll. volume of calls to Salt Air, my board spends more time making calls This leaves 25 of you left. There than receiving them. are 27 cards among the 25 of you. There are 21 AdLibs, four Sound Beta testing should be called bet- a-testing. "Oh, I bet the code Page 18 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- will run......" No slur intended the same of the BBS. Just ask my against CDC, but with 10,000 users. PCBoard is colorful, and so customers, you can bet there will is my users' language these days. be 10,001 problems. First was the multiple events. I found that Ok, now to the actually running. getting multiple events was an Yes, I was running - all over town event in itself. I had to actually to find blank disks, and a copy of program something. Never mind Norton's so I could recover my old that six other people did it at the 14.2 files. Let me back up. same time, including Daniel Rall (Ooops, I can't, I forgot to back who had to outdo me by including my up). Anyway yes, it works. It future features in his current works me to the bone. It runs. release. So, what's a few hours It runs me ragged. Its improved. of compiling bug-ridden software? Its improved my tolerance for If Dave Terry can fight several stress (even with the Vivarin). thousand lines of PCBoard code, I And, I'm afraid. I'm a-Fraid Clark can muddle through 100 lines of fan, and that's that. I wouldn't code to do a simple task, right? have sacrificed this experience for Ha! the world. (Well, maybe for the WHOLE world......) Now, before Well, that was solved. Now on to you go to Terr-your hair out, configuration. Another misnomer. remember, I am still the The word is con-figure-it-out incorrigible punster, and should (pronounced with an accent - Can't not be incorriged. CDC you figure it out). By this time I later..... had already bought stock in Vivarin and Foldgers (too bad it was de- +---------------------------------+ caf).... First order of business | NOTES FROM | - keep the nodes happy. I never | ADMIN | should have upgraded.... ;-) +---------------------------------+ Nothing works as planned. Starting with the next beta release Something tells me I use the only of PCRelay, serial numbers will be utilities that are NOT required. Bonnie Anthony is compatible..... distributing the version of the node software 41B15 along with the Ok, on to setup. No misnomer required serial numbers. there. I was definitely set up. They KNEW it would take a full day +---------------------------------+ off work to completely reconfigure | AS SEEN ON THE BIT STREAM | the system. The features may be | | worth it, but sheesh! This isn't +---------------------------------+ a 14.2 to 14.5 upgrade. This TAGLINE OF THE MONTH: thing should be called version 42.0 "Outlaw puns and only outlaws will (42 being the meaning of life and have puns!" (As seen on a tag of Ed everything but the kitchen sink.) Lazarowitz, suggested by Mark Speaking of sinks, I have this Burfeind) sinking feeling about the upgrade to 15.0...... BORING THREAD OF THE MONTH: (There wasn't one! ) Testing. What can I say. My patience and endurance were EXCITING THREAD OF THE MONTH: definitely tested. I can't say "Laptop/Toshiba Conference..." Page 19 --------------------------------------------------------------------------- MAY RELAYNET INTERNATIONAL MESSAGE EXCHANGE NEWSLETTER 1990 --------------------------------------------------------------------------- (which somehow evolved into a detailed discussion of Howard Belascos tush! For those that do not know, Howard weighs 260lbs. Last we heard, someone was demanding a GIF of his tush!) THE THREAD THAT LOST CONTROL: "Fan-driven Sailboats" (What else! Amazing how many mechanical engineers we have on RIME! ) MALFUNCTION OF THE MONTH: Bonnie's node ->RUNNINGA (after installing PCBoard 14.5, the BBS continually crashed... which had Bonnie AND David Terry scrambling!) +---------------------------------+ | NOTICES | | | +---------------------------------+ The RIME Times is published monthly by the membership of RelayNet In- ternational Message Exchange as its official newsletter. Users and Sysops are encouraged to con- tribute. Submissions and questions may be directed to the editor John Dodson, node ->CANTINA or Ed Lazarowitz, node ->CAPCON. (c)Copyright 1990, The RelayNet International Message Exchange. Permission is hereby granted for unlimited distribution and duplication, provided such distribution and duplication are strictly for non-commercial purposes only. All other rights reserved. RelayNet and RIME are registered trademarks.