BTN: Birmingham Telecommunications News COPYRIGHT 1990 June 1990 Volume 3, Issue 5 Table Of Contents ----------------- Article Title Author Policy Statement and Disclaimer................Staff Editorial Column...............................Mark Maisel Its' Not Too Late!!!...........................Ricky Morgan Copyright Law..................................Jordan J. Breslow PC-MENU MASTER: A Review.......................Radio Active WWIV: Part 2 of 3..............................Duck Capps Profile: Richard Foshee.......................Chris Mohney PC Board 14.5 (beta) New and Enhanced Commands.David Terry Known BBS Numbers..............................Staff ----------------------------------------------------------------------- Disclaimer and Statement of Policy for BTN We at BTN try our best to assure the accuracy of articles and information in our publication. We assume no responsibility for damage due to errors, omissions, etc. The liability,if any for BTN, its editors and writers, for damages relating to any errors or omissions, etc., shall be limited to the cost of a one year subscription to BTN, even if BTN, its editors or writers have been advised of the likelihood of such damages occurring. With the conclusion of that nasty business, we can get on with our policy for publication and reproduction of BTN articles. We publish monthly with a deadline of the fifteenth of the month prior to publication. If you wish to submit an article, you may do so at any time but bear in mind the deadline if you wish for your work to appear in a particular issue. It is not our purpose to slander or otherwise harm a person or reputation and we accept no responsibility for the content of the articles prepared by our writers. Our writers own their work and it is protected by copyright. We allow reprinting of articles from BTN with only a few restrictions. The author may object to a reprint, in which case he will specify in the content of his article. Otherwise, please feel free to reproduce any article from BTN as long as the source, BTN, is specified, and as long as the author's name and the article's original title are retained. If you use one of our articles, please forward a copy of your publication to: Mark Maisel Editor, BTN 221 Chestnut St. BHM, AL 35210-3219 We thank you for taking the time to read our offering and we hope that you like it. We also reserve the right to have a good time while doing all of this and not get too serious about it. ----------------------------------------------------------------------- N E W S F L A S H For those of you who read BTN regularly, please pay attention! Several boards in town that maintain transfer ratios allow BTN to be downloaded freely through ProDoor. You may download BTN from these boards without penalty to your ratio. Among these that I am aware of are CONNECTION, LZ BIRMINGHAM, CHANNEL 8250, and Bus System. I am sure that there are more of them out there. If you are a sysop and you allow BTN to be downloaded freely, please let me know via EzNet so that I can post your board as a free BTN distributor. Thanks. I am also looking for a new, more useful format for the Known BBS List. Please send me your suggestions via EzNet or upload them to Channel 8250, Bus, or Crunchy Frog. The best way to demonstrate a suggestion would be to edit the bbs list in this issue and show how you want it to look. Should there be more WWIV info, PC Board info, FidoNet info, other networks and/or systems info??? Remember, I can't do it if you don't suggest it. I gave up telepathy a few years ago. MM EVEN MORE NEWS! There are two new boards in town worthy of note. Alter-Ego, run by Lee & Maggie Harden has some, well, weird conferences. It is definitely worth a look. If you are a ProDoor freak, you will love it. Camelot BBS is also a newcomer, so to speak. Joe McDonald has pulled down Professional's BBS and put up Camelot in its place. This is much more than a facelift. He is now running Teleguard 2.5, has more drive space, no subscriptions, and all are welcome. Please give these new boards a call. ----------------------------------------------------------------------- Editorial by Mark Maisel The summer is upon us and the seasonal BBS lull has struck. The local systems are, for the most part, pretty dead as far as messages go. It is nothing to be alarmed about. It happens every year. Pretty soon, the sysops will start griping about the kids tying up the boards playing games and leaving weird messages. We are going to do our best to keep publishing during the summer as we have in the past. I had thought that this being self-employed business would have allowed me more time for stuff like BTN. It has not, at least not yet. I am taking a week in June to visit up north, much further north than Dean's home swamp. I am also going to be gone to New England later in July and August. Yes, it is nice. No, you can't accompany me. We will do our best to keep the articles coming and you can help by writing a few yourself. Don't give me that business about how you can't write. I have heard it too many times. Just talk with your fingers. It works every time. This issue is a good mix. We have humor, reviews, information about software copyrights, articles on WWIV and PC Board BBS software, and of course, the ole BTN Known BBS List. Please take the time to read the articles that have been prepared for you and comment publicly on them. We don't care if your comments are favorable or otherwise, we just want to hear them. We can't possibly attempt to go on without feedback from you. Well, we might attempt it but it will go much better if we are an interactive publication. Thanks for taking the time! ----------------------------------------------------------------------- Its' not too late!!! by Ricky Morgan Well, here it is after midnight...again. The kids have long since been in bed. My wife stumbled off after them not long ago. So what am I still doing sitting here, staring bleary eyed at this stupid computer? Sound familiar? If it does, you just may want to read on. I think maybe I can furnish an answer for you. I remember it as if it were only yesterday. I purchased a copy of "Computer Shopper Magazine" just last year. I was enthralled by the shear number of ads for computers, parts and peripherals. I leafed through the hefty magazine, eyeing each ad with lecherous desire, turning each page slowly. Hoping against hope that one day, soon, I would be able to afford a better, faster machine than the one I owned. It wasn't until later that I realized my credit rating wasn't the only thing in danger from this simple looking magazine. Unknown to me, laying innocently in the back of this cumbersome magazine, lay a sleeping virus. Titled, innocently enough, "Bulletin Boards." I had been on CompuServe years ago during my Commodore 64 and 300 baud modem days but I found the system too slow and expensive for my simple needs. But as time passed my work began to demanded that I was more and more IBM literate. So I found I was able to use the work angle in acquiring an IBM clone and a new 2400 baud modem. So it was with naive curiosity that I decided to log on to one of these local electronic bulletin boards. After all, unlike CompuServe, these boards are free. Little did I suspect, as I anxiously logged onto The Pinson Valley PCBoard, that I was changing the direction that my life and my computer would take; perhaps forever. I sat diligently reading all those warnings and notices for new users. Scrutinizing each screen, I sat and watched in wonder, eyes gleaming with excitement, as the glow from the CRT cast malevolent shadows across the darkened room where I sat, hunched over the keyboard. At the time, I saw a whole new world of information opening for me. Unfortunately I was oblivious to the fact that, even at this early stage, I was now entrapped in an addiction stronger than any drug. It wasn't enough that Pinson Valley taunted me with all sorts of information, messages and free, or semi-free, software. At the end of the session, I was teased with "Numbers of other BBS's to call." My heart pounded as I quickly jotted down each number. I was surprised that there were more boards out there, just sitting, yearning for me to call. If only I had known. There was still hope for me. Now it's too late. Within minutes each new number was in my dialing directory and I began calling these other systems. I sat there and watched the program (Procomm 2.4.2) dial each number over and over; waiting for an open line. I sat on the edge of my chair listening intently as the modem dialed number after number. If only I had listened closer I would have noticed that my modem (I always keep the speaker on during dialing) dialed each number with a sinister chuckle. It knew what I did not. I was addicted. I logged on and registered on each system. I couldn't help myself, the questions were easy and the SySops asked for so little. It was an easy way to pass computer time, plus, I vindicated myself by saying, "Look at all the free software, the message bases. All the subjects that were covered! Call the Birmingham News and cancel the subscription!" I covertly schemed to put that money to good use. Upgrade! Oh, I raped and pillaged a few of the first boards. Taking any file that looked good but soon that wasn't enough. I started reading messages and actually leaving my own. I started getting replies. I also started seeing a lot of the same names from board to board. Did I ever once suspect that this was because these people might be addicted to BBS's? No. Had the thought crossed my mind, would I have taken action? No. Months passed, I was registered on more BBS's than I could log onto in any 24 hr. period. With the, so called, help a local SySop, who shall remain nameless, I gained access to programs that would call and get mail and files for me automatically. I didn't even have to be awake. Finally, I could get some sleep. No longer would I spend endless hours sitting in front of my screen listening to busy signals; praying endlessly for an open line. Alas, I still found myself compelled to read all those messages. It started cutting into less important things; work and family. I found that I became nervous and restless, even down right irritable if I didn't get on at least three boards a day. It was becoming impossible to even carry on an intelligent conversation with someone who wasn't into "BBSing." I was a junkie. I still hadn't realized what was happening. After repeated threats, from my wife, to have the phone lines disconnected, I tried to cut back on the number of boards I called. To compensate the loss, I started getting more involved in the message bases; leaving longer and more detailed messages on the few systems I let myself call. I even started trying to write articles for the local newsletter (BTN). It still wasn't enough. I started lugging my old Compaq into the hotel room with me when I worked out of town. I accessed boards where ever and when ever I could. This still wasn't enough. I began talking to friends and associates about the BBS'. Trying to get them addicted; I was turning into a pusher. First I would tease them with files, then turn them on to the message bases. Always helping and cajoling them to get ever deeper involved. Then, when I no longer could resist the temptation to be more involved, I actually began contemplating starting a board of my own; to feed my habit. It was then, sometime after midnight one night, while I sat pouring over the DOCS for setting up a BBS, that I realized what was happening. I sat there amid pile upon pile of incomprehensible instructions and the seed of realization dawned on me. What a fool I had been. It's too late for me but I still can warn others. I believe a computer intelligence, somewhere, has awaken and decided to take over the world. For good or bad I can't say. It's plan is deceptively simple. Get as many people involved in electronic communication as possible. Offer them free software, conversation with intelligent and worldly people, games, even worldwide mail echoes; no more long distance phone calls. Entice them, tease them. Once converted they will convince others to join. Soon you have a self-replicating virus pulling all of humanity into and under it's control. By controlling the message bases and files, it controls your thoughts, actions and...your computer. How many times have you sat down at the computer to, "just waist a few minutes," only to walk away hours later. Shaking your head and wondering, "Where did all the time go?" Those little phosphor dots have a strangely hypnotic effect. What all did you do while you were hypnotized by the computer? Notice any long distance calls on your phone bill last month that you're SURE you didn't make? Notice any new files on your hard disk that you don't remember downloading? Can you really trust Norton Utilities to tell you the truth? Do you really know what your computer does at night after you've gone to bed? How do you know that those files you've gotten off some board aren't covertly running your computer. Using your computer to call others after you've left for work. Spreading itself relentlessly. It's not too late. You can still escape. Don't log on to another BBS. Toss your modem in the trash. Wipe your hard disk of any and all software gleaned from BBS'. Then low level format the sucker! It's your only hope. Good luck! ----------------------------------------------------------------------- The following is reprinted with permission from CPU/STR 16/32bit Magazine, No. 4.19, May 11, 1990. It has been split into two parts of which this is part one. This part ends with Chapter 1. MM Copyright Law ============= Jordan J. Breslow 1225 Alpine Road, Suite 200 Walnut Creek, CA 94596 +1 415 932 4828 I am an attorney practicing copyright law and computer law. I read a series of queries in net.legal about copyright law and was dismayed to find that people who had no idea what they were talking about were spreading misinformation over the network. Considering that the penalties for copyright infringement can include $50,000.00 damages per infringed work, attorneys fees, court costs, criminal fines and imprisonment, and considering that ignorance is no excuse and innocent intent is not even a recognized defense, I cringe to see the network used as a soapbox for the ill-informed. For that reason, this article will discuss copyright law and license law as they pertain to computer software. My goal is to enable readers to determine when they should be concerned about infringing and when they can relax about it. I also want to let programmers know how to obtain copyright for their work. I'll explain the purpose of software licenses, and discuss the effect that the license has on copyright. For those of you who are programmers, I'll help you decide whether you own the programs you write on the job or your boss owns them. I will also mention trademark law and patent law briefly, in order to clarify some confusion about which is which. Incidentally, if you read this entire essay, you will be able to determine whether or not the essay is copyrighted and whether or not you can make a printout of it. This is a long article, and you may not want to read all of it. Here is an outline to help you decide what to read and what to ignore: 1. The Meaning of Copyright from the Viewpoint of the Software User 1.1 A bit of history 1.2 The meaning of copyright 1.3 The meaning of public domain 1.4 A hypothetical software purchase 1.5 Can you use copyrighted software? 1.6 Can you make a backup copy? 1.7 Licenses may change the rules (C) Copyright 1986 Breslow, Redistributed by permission 2. Copyright Sounds Neat -- How Do I Get One? Or, How Do I Know If this Program is Copyrighted? 2.1 How do you get a copyright? 2.2 How do you lose a copyright? 2.3 How do you waste a stamp? 2.4 Do you have to register? 2.5 How copyright comes into existence 2.6 The copyright notice 2.7 Advantages of registration 2.8 A test to see if you understand this article 3. Who Owns The Program You Wrote? 3.1 Introduction 3.2 Programs written as an employee 3.3 Programs written as a contractor 4. A Brief Word about Licenses 4.1 Why a license? 4.2 Is it valid? 5. Trademarks and Patents 5.1 Trademark law explained 5.2 Patent law 6. Conclusion 1. The Meaning of Copyright from the Viewpoint of the Software User 1.1. A bit of history If you're not interested in history, you can skip this paragraph. Modern copyright law first came into existence in 1570, by an act of Parliament called the Statute of Anne. Like most laws, it hasn't changed much since. It was written with books and pictures in mind. Parliament, lacking the foresight to predict the success of the Intel and IBM corporations, failed to consider the issue of copyrighting computer programs. At first, courts questioned whether programs could be copy- righted at all. The problem was that judges couldn't read the programs and they figured the Copyright Law was only meant to apply to things humans (which arguably includes judges) could read without the aid of a machine. I saw some mythical discussion about that in some of the net.legal drivel. Let's lay that to rest: programs are copyrightable as long as there is even a minimal amount of creativity. The issue was laid to rest with the Software Act of 1980. That Act modified the Copyright Act (which is a Federal law by the way), in such a way as to make it clear that programs are copyrightable. The few exceptions to this rule will rarely concern anyone. The next question to arise was whether a program was copyrightable if it was stored in ROM rather than on paper. The decision in the Apple v. Franklin case laid that to rest: it is. 1.2. The meaning of copyright Now, what is copyright? As it is commonly understood, it is the right to make copies of something -- or to put it the other way around, it is the right to prohibit other people from making copies. This is known as an exclusive right -- the exclusive right to reproduce, in the biological language of the Copyright Act -- and what most people don't know is that copyright involves not one, not two, but five exclusive rights. These are (1) the exclusive right to make copies, (2) the exclusive right to distribute copies to the public, (3) the exclusive right to prepare derivative works (I'll explain, just keep reading), (4) the exclusive right to perform the work in public (this mainly applies to plays, dances and the like, but it could apply to software), and (5) the exclusive right to display the work in public (such as showing a film). 1.3. The meaning of public domain Before we go any further, what is public domain? I saw some discussion on the net about public domain software being copyrighted. Nonsense. The phrase public domain, when used correctly, means the absence of copyright protection. It means you can copy public domain software to your heart's content. It means that the author has none of the exclusive rights listed above. If someone uses the phrase public domain to refer to freeware (software which is copyrighted but is distributed without advance payment but with a request for a donation), he or she is using the term incorrectly. Public domain means no copyright -- no exclusive rights. 1.4. A hypothetical software purchase Let's look at those exclusive rights from the viewpoint of someone who has legitimately purchased a single copy of a copyrighted computer program. For the moment, we'll have to ignore the fact that the program is supposedly licensed, because the license changes things. I'll explain that later. For now, assume you went to Fred's Diner and Software Mart and bought a dozen eggs, cat food and a word processing program. And for now, assume the program is copyrighted. 1.5. Can you use copyrighted software? What can you do with this copyrighted software? Let's start with the obvious: can you use it on your powerful Timex PC? Is this a joke? No. Prior to 1980, my answer might have been No, you can't use it! People actually pay me for advice like that! Well think: you take the floppy disk out of the zip lock baggy, insert it in drive A and load the program into RAM. What have you just done? You've made a copy in RAM -- in legalese, you've reproduced the work, in violation of the copyright owner's exclusive right to reproduce. (I better clarify something here: the copyright owner is the person or company whose name appears in the copyright notice on the box, or the disk or the first screen or wherever. It may be the person who wrote the program, or it may be his boss, or it may be a publishing company that bought the rights to the program. But in any case, it's not you. When you buy a copy of the program, you do not become the copyright owner. You just own one copy.) Anyway, loading the program into RAM means making a copy. The Software Act of 1980 addressed this absurdity by allowing you to make a copy if the copy "is created as an essential step in the utilization of the computer program in conjunction with a machine and ... is used in no other manner ...." By the way, somebody tell me what a machine means. If you connect 5 PC's on a network is that a machine or several machines? A related question is whether or not running software on a network constitutes a performance. The copyright owner has the exclusive right to do that, remember? 1.6. Can you make a backup copy? OK, so you bought this copyrighted program and you loaded it into RAM or onto a hard disk without the FBI knocking on your door. Now can you make a backup copy? YES. The Software Act also provided that you can make a backup copy, provided that it "is for archival purposes only ...." What you cannot do, however, is give the archive copy to your friend so that you and your pal both got the program for the price of one. That violates the copyright owner's exclusive right to distribute copies to the public. Get it? You can, on the other hand, give both your original and backup to your friend -- or sell it to him, or lend it to him, as long as you don't retain a copy of the program you are selling. Although the copyright owner has the exclusive right to distribute (sell) copies of the program, that right only applies to the first sale of any particular copy. By analogy, if you buy a copyrighted book, you are free to sell your book to a friend. The copyright owner does not have the right to control resales. 1.7. Licenses may change the rules At this point, let me remind you that we have assumed that the program you got at the store was sold to you, not licensed to you. Licenses may change the rules. 1.8. Can you modify the program? Now, you're a clever programmer, and you know the program could run faster with some modifications. You could also add graphics and an interactive mode and lots of other stuff. What does copyright law say about your plans? Well ... several different things, actually. First, recall that the copyright owner has the exclusive right to make derivative works. A derivative work is a work based on one or more preexisting works. It's easy to recognize derivative works when you think about music or books. If a book is copyrighted, derivative works could include a screenplay, an abridged edition, or a translation into another language. Derivative works of songs might be new arrangements (like the jazz version of Love Potion Number 9), a movie soundtrack, or a written transcription, or a long version, (such as the fifteen minute version of "Wipe Out" with an extended drum solo for dance parties). In my opinion, you are making a derivative work when you take the store-bought word processor and modify it to perform differently. The same would be true if you translated a COBOL program into BASIC. Those are copyright infringements -- you've horned in on the copyright owner's exclusive right to make derivative works. There is, however, some breathing room. The Software Act generously allows you to adapt the code if the adaptation "is created as an essential step in the utilization of the computer program in conjunction with a machine ...." For example, you might have to modify the code to make it compatible with your machine. 1.9. Can you break the copy protection scheme? Moving right along, let's assume your store bought program is copy protected, and you'd really like to make a backup copy. You know this nine-year-old whiz who can crack any copy- protection scheme faster than you can rearrange a Rubix cube. Is there a copyright violation if he succeeds? There's room to argue here. When you try to figure out if something is an infringement, ask yourself, what exclusive right am I violating? In this case, not the right to make copies, and not the right to distribute copies. Public performance and display have no relevance. So the key question is whether you are making a derivative work. My answer to that question is, "I doubt it." On the other hand, I also doubt that breaking the protection scheme was "an essential step" in using the program in conjunction with a machine. It might be a "fair use," but that will have to wait for another article. Anyone interested in stretching the limits of the "fair use" defense should read the Sony Betamax case. 1.10. Summary Let me summarize. Copyright means the copyright owner has the exclusive right to do certain things. Copyright infringement means you did one of those exclusive things (unless you did it within the limits of the Software Act, i.e., as an essential step ....). ----------------------------------------------------------------------- PC-MENU MASTER: Hard Drive Menu System by Radio Active Found on local systems under the name: PCMENU11.ZIP ...71,002 System requirements: None mentioned Features: Execute 80 DOS commands, (any DOS command!) and/or .EXE, .COM, .BAT programs from one menu window Easy to set up and use Power and convenience of a large program without large memory requirements *Registered version includes: Three levels password security Compress data set for efficiency and space utilization Control of PC-Menu Master banner page and trailing banner page Printed documentation Technical support Update notices PCMENU is one of the better hard drive menu programs I have looked at for the novice computer user. The author mentions in his documentation that it is especially useful for someone whose wife or kids may not be too familiar with running programs. I think this is an excellent point for this menu program. It doesn't take much technical ability to set it up and once it is, all there is to running 80 different commands or programs is just highlighting your choice with a highlight bar and pressing enter twice (once for your choice and again to confirm that you want to execute the command). There are two main files, the one memory resident file is very small and the other one drops out of memory when you run any command or program. And when I said you could run 80 commands from the menu, I didn't mean to limit it to that because you can have more than one of these 80 command windows to work from. This makes this program a very powerful menu program as well as a very friendly one! The shareware version 1.10 that I looked at didn't have the password option enabled, but for a small registration fee that and some other nice extras like a printed manual can be had. The commands you're limited to when configuring the menu can be any DOS command, BATch files, EXEcute files, or COMmand files, I think "limited" is the wrong word here! Also for every command name on the menu (80 per menu) you can list up to twelve commands to be processed. I.E.: 1. CD\GAMES 2. LIST CARDS.DOC 3. 5_CARD ..... 4. (etc. up to 12) ----------------------------------------------------------------------- WWIV: Part 2 of 3 By: Duck the Everpresent Co-Sysop: The Cathouse In my last article, I went over some of the basic functions of the WWIV bulletin board software. Hopefully this helped some people to better understand some of the operations of a WWIV system and how to go about logging onto one. This time I will explain the transfer section, as well as a few of the modifications that can be made to the software. The most important part of a BBS, (besides the message bases) is the transfer section. The transfer section is a way to exchange software of interest and to contribute to a boards assets. The WWIV transfer section is set up in an easy-to-use format that almost anyone, even the telecommunications novice, can master in a few minutes. Uploading to a WWIV system is a very easy task. You press "U", name your file, give a one line description, then pick your transfer protocol. There are many protocols, and any that aren't on a system already can be installed. The letter "Z" will upload the file to the sysop, but on some systems this is done anyway for verification purposes. Downloading is accomplished in similar fashion; you press "D", type the name (or a partial name, an asterisk, then an extension or asterisk (i.e.: CONQ*.*)) and pick your protocol. If you use the same protocol every time , then pressing return when it asks for the protocol will pick the defaulted one . Batch downloads are available with the letter "X". Listing the files available for download is as easy as pressing "L". It will then prompt you with a 'File Mask: ', to which you can assign a certain letter, word, or extension to search for. For example, typing *.ZIP will search for all files of the zip extension and list them for that section. If you want to scan all sections then type "S" and follow the same procedure for default. If a file is offline, it will be followed by on version 4.10 or lower or on 4.11. Changing sections is accomplished by pressing the appropriate number at the transfer main prompt, and a listing of sections can be seen by typing an asterisk at the main prompt. Pressing the "+" or "-" keys will also go up or down a section respectively. If you wish to search all directories for new files, pressing "N" will do the job. There is also a way of viewing what is in an ARCed or ZIPed file pressing "A", extracting the files you want and placing them in a temporary file for download, the letter "E", and shuffling these files around with various other commands attained by the letter "G". The WWIV BBS is a very expandable system, whether you know how to program or not. Such feature include ANSI menus, quote/ joke events, and user best/ worst stats. The ability to expand is almost endless, especially if you have the source code (obtained by registration) and a working knowledge of the C programming language. Well, that's about it for this article. My next article will explore the different kind of online games available for WWIV's and a word about networking. Till next time, Hasta..... WWIV Bulletin Board System is Copyright Wayne Bell 1987, 1990 ----------------------------------------------------------------------- ProFile by Chris Mohney The ProFile is a short, half-serious biographical sketch given to various computer telecommunications personalities around Birmingham. Victims are selected randomly from a group of names put into the notorious Hat. Anyone who thinks himself brave or witty enough may petition for admittance to the Hat by leaving E-Mail to me (Chris Mohney, most boards around town) to that effect. Anyone who wishes to suggest more questions or sneakily nominate someone without their knowledge may take the same route.... --------- Pro File on RICHARD FOSHEE --------- Age: 22 Birthplace: Birmingham, AL. Occupation: Surviving childhood My hobbies include: Computers, Music, Dancing, Dating, Sex. Years telecomputing: 7 Sysop, past/present/future of: Amiga Alliance My oddest habit is: I like to get (CENSORED), and suck (CENSORED) My greatest unfulfilled ambition is: To get a picture of Kelly Rosato hitting on a drag queen. The single accomplishment of which I am most proud is: Getting Kelly Rosato into a gay bar on the night of the male strippers. My favorite performers are: Laura Hunter, The Weather Girls, Cher, Paula Abdul The last good movie I saw was: The Little Mermaid The last good book I read was: Where the Red Fern Grows If they were making a movie of my life, I'd like to see my part played by: Jeff Stryker My pet peeves are: Someone saying "I'll respect you in the morning" when they don't even respect you now. When nobody's looking, I like to: Bite my toenails ----------------------------------------------------------------------- PC Board 14.5 (beta) New and Enhanced Commands by David Terry (Clarke Development) this article has been edited to fit our space and we hope you find it useful. MM B)ulletin added: A = All, display all bulletins added: N = New, display all new bulletins added: S = Scan, allows AND/OR searches and then displays the entire bulletin if the text was found anywhere in it added: D = Download, queues up all requested bulletins for downloading (whether explicitly requested or requested via the All, New or Scan subfunctions) D)ownload enhanced: Batch downloads now accept wildcards added: Ymodem and Ymodem/G as internal BATCH protocols enhanced: During shelled protocols the top 3 lines are frozen enhanced: Prior to initiating the file transfer you can edit the list of files batched up for file transfer - adding or removing files from the list. E)nter Message added: Full Screen Editor added: F = return to Full Screen Editor added: Q = quote mode added: U = upload mode (non-echo mode) enhanced: Saves the message "as is" if carrier is lost prior to the user saving the message (the message can later be re-edited using the new EDIT command described below) E)dit Header (subfunction of read command) added: N = Refer Number added: R = Read Status added: P = Protection (including Sender and Group Password) EDIT) Msg (subfunction of read command) new cmd: Allows the originator of a message to re-edit his message after having posted it. F)iles enhanced: Optionally will colorize DIR files on the fly (applies to the "L", "N" and "Z" commands as well) enhanced: V)iew now passes the comm port number to the batch file added: G = Goodbye FLAG) File main prompt, subfunction of Files prompt or more prompt new cmd: Allows the caller to "flag" a file for later download. Any number of files may be flagged up to the batch file limit set by the sysop. J)oin enhanced: Now accepts either a conference number or a name L)ocate enhanced: Displays all secondary lines after the matched filename enhanced: If an invalid file is requested it will automatically switch to a Z)ippy search command enhanced: If the filename is less than 8 characters long and no wildcards have been used it automatically appends "*.*" to the name (ie searching for BETA turns into BETA*.*). enhanced: Changes a request of "FILE*" to "FILE*.*" added: D = Download, download files that are found added: N = New, locate files using filespec and date N)ew enhanced: displays all secondary lines after the file is found added: D = Download, download files that are found O)p Page enhanced: When done the caller's screen is restored and the session continues from where he left off OPEN a DOOR enhanced: Now accepts either a door number or a door name Q)uick Scan enhanced: TS (see TS enhancements in the Read command) R)ead command enhanced: TS = now scans the message text as well as the header enhanced: TS = if in graphics mode it highlights the text enhanced: TS = allows AND/OR searches to be performed enhanced: TS = allows stacking of search text and msg number added: COPY = COPY a message (similar to MOVE a message) added: RR = read the reference message added: L = read in reverse order from the last message back added: Z = zip (compress) capture file before downloading added: SET = set last message read pointer added: G = Goodbye added: J = Join a conference added: USER = Read mail either to or from a specific user added: O = Read Only - it doesn't set Last Msg Read pointer it doesn't mark a message as being read. It can be restricted by security level. SELECT new cmd: Can be used to select or deselect conferences the user wants to scan and also to reset the last message read. TEST new cmd: Can be used to test a file for CRC errors or viruses prior to downloading (if the sysop provides the test). U)pload added: Ymodem and Ymodem/G as internal BATCH protocols enhanced: Allows external batch uploads using DSZ-log compatible protocols enhanced: Allows user supplied multi-line descriptions with word wrapping while typing in the descriptions enhanced: Records the name of the uploader in the description WHO command new cmd: Allows a caller to view the list of callers currently online - WITHOUT giving them access to the node chat functions (can be useful if you want the caller to know who is there but don't want them tieing up the system chatting with other callers while online). Y)our Mail Scan added: Q = Quick Scan for your mail. It displays only the number of messages found and the number that are for you using 1 line per conference instead of the normal 3 line display. Z)ippy Search enhanced: Displays all secondary lines as well as filename enhanced: If in graphics mode it highlights the "found" text enhanced: Allows AND/OR searches to be performed and will even find matches if keywords are on SEPARATE lines in the DIR file added: D = Download, download files that are found added: N = New, locate files using filespec and date USERS command new cmd: Allows caller to see the names of users in a conference and to search the user names/cities for any text Enhanced: * At logon it now displays the bulletin numbers of updated bulletins. * PCBoard now uses an "auto ansi detection" routine so that if a user chooses not to use color graphics but his comm program has ansi capabilities PCBoard will take advantage of them (for faster cursor movement, defaulting to the full screen editor, etc). * PCBoard now displays an asterisk "*" to the right of the FILE DATE when displaying file listings to indicate that the file is new to you i.e. the file is more recent than your "Date of Last DIR Scan". * PCBoard now removes the vertical bar "|" from the display when secondary file descriptions are found. * PCBoard now only updates the user's "Last Date DIR Scanned" to match the date of the most recent file posted rather than using the date on which he performed the scan. * All multi-letter commands (COPY, MOVE, LANG, OPEN, NODE, etc) can now be called by typing just the first two letters. * For a "R A c/d/z" command (capture,download,zip) you can now set the maximum number of messages by area and total for the scan so that the caller does not overrun your hard disk on a capture. * The status lines include not only the logon time and current time but also the current minutes online and minutes remaining. * Searching for files (for downloading) now begins with the default filename extension if no extension was provided by the caller - in other words if the caller asks for TEST it will first search for a file called TEST.ZIP and not finding one will then search for TEST. * When reading messages the caller can have the screen cleared prior to displaying a message - this can be set with W)rite User Info. * Input fields which are surrounded by parenthesis (i.e. having the "(" and ")" characters around the field) can be edited using the cursor keys or the CTRL-Key substitutes that are used by the Full Screen Editor. * PCBSetup now differentiates between "editing your own message" and "editing any message" for security purposes. * Door applications can now be executed without having to type OPEN or DOOR and a number. Plus they can now be given command line parameters at the time of opening. * PCBoard now records (in the user's record) when a message is left for him via PCBoard so that when he logs on he will be informed of the fact that there is mail waiting for him AND which conferences have mail waiting without having to scan for new mail. * Replying to a message that is FROM yourself will now result in the TO field being copied over to the TO field of the reply rather than copying the FROM field across. * Replying to a NON-echo message will now default to NO when asked if the message should be echoed. * Added support for FREE files - where files can be downloaded and not be charged in the files or bytes downloaded record as well as not charging against the time online if desired. * The sysop can now set in PCBSetup the hours when he is 'in' for answering the page bell. * The name of the message CAPTURE file can now be set in PCBSetup or when not specified it defaults back to the caller number. * The CAPTURE file when downloaded can now be set to not charge the download time against his session time. ------------------------------------------------------------------------ (example usage of some of the new commands): * TS A 1+ PCBoard & LANtastic The above commands will search thru every available message in ALL conferences areas you are set to scan for any message that has both the word "PCBoard" AND the word "LANtastic" in it. * TS A 1+ PCBoard & (LANtastic | DESQview) The above commands will search thru every available message in ALL conferences areas you are set to scan for any message that has both the word "PCBoard" AND either the word "LANtastic" OR the word "DESQview" in it. The parenthesis tell PCBoard how you want to group your criteria if you have a complex search request such as the one above. It will allow for nearly any number of parens and any combination of AND's (using the "&" character) and OR's (using the "|" character). * TS A 1+ USER JOHN DOE PCBoard & Help The above command (similar to examples above) adds the keyword USER to the command line specifying that only messages that are either TO or FROM John Doe should be displayed if they are found to have both the words PCBoard and Help in them. * Z A PCBoard & DESQview The above commands will search all of the file directories for any file that has both the word "PCBoard" and the word "DESQview" in the description (anywhere - including secondary description lines). * L PCB*.* A N 120189 The above command combines a Locate Search of the file directories with a "new files search" for files that begin with "PCB" and were posted on or after 12/01/89. * Z DESQview A S D The above command combines the Zippy Search of the file directories with a "new files since" search and then tags all files found for later downloading (i.e. files with "DESQview" in the description that are new since the last time you were on) * USERS Utah The above command searches for the names of users that participate in the current conference who have the word "Utah" in their user record (USERS does a text search on the name and address fields). * 7 S John & (Smith | Doe) The above command (sysop function 7) will search the entire user record (name,address,phone,comments,etc) for the any user record that has both the word "JOHN" and either the word "SMITH" or the word "DOE" in it. * OPEN QMAIL The above command will search and find the QMAIL door and open it (rather than having to know the number of the door). * J SUPPORT The above command will search and join the SUPPORT conference (rather than having to know the number of the conference). * B A The above command will display all bulletins. * B N D The above command will download all new bulletins. * B A S D DESQview & LANtastic The above command will download all bulletins that have both the word "DESQview" and the word "LANtastic" somewhere in the file. * R A Z The above command will capture all messages in all conferences since the last message read, compress the capture file and the begin the download procedure. * 13 A S JOHN DOE | JOHN SMITH Searches all caller logs and displays entries where either John Doe or John Smith were logged on. * R SET 100 Sets the last message read for that conference to 100. * Y A S Q The "Q" which is a new parameters gives a new display showing each conference on a single line and shows only the number of messages for you and the number found. It looks something like this: Messages Messages Num Conference To You Found --- ---------- -------- -------- 0 Main Board 0 18 1 Support 12 1628 2 DOOR 5 370 3 Utility 0 431 4 Net_Mail 1 895 5 LANtasti 2 642 * SELECT D 1-3 6 The select command is used to select or deselect conferences. The above command starts out by deselecting all conferences after which it reselect conferences 1 thru 3 followed by 6. It will then prompt the caller for any last message read changes in each of the newly selected conferences. * OPEN 1 * OPEN MYDOOR * OPEN 1 PARAMETERS TO MYDOOR * OPEN MYDOOR PARAMETERS TO MYDOOR * MYDOOR * MYDOOR PARAMETERS TO MYDOOR All of the above are now valid ways of opening a door. In these examples the door name is "MYDOOR" and it can be opened either with or without the words OPEN or DOOR. Additionally, parameters may be typed in on the command line which will then be sent to the door application on the assumption that it can use the parameters. ----------------------------------------------------------------------- Known BBS Numbers For The Birmingham Area NAME NUMBER BAUD RATES SUPPORTED MODEM TYPE *Alter-Ego BBS 925-0707 300, 1200, 2400 *American BBS 674-1851 300, 1200, 2400 *Bus System BBS 595-1627 300, 1200, 2400 #*Byte Me 979-2983 1200, 2400, 9600 HST Camelot BBS 856-0679 300, 1200, 2400 ^Cat House 854-5907 300, 1200, 2400, 9600 V.32 -*Channel 8250 Node 1 744-8546 300, 1200, 2400, 9600 HST, V.32 -*Channel 8250 Node 2 744-5166 300, 1200, 2400, 9600 HST *Crow's Nest 951-5678 300, 1200, 2400 *Crunchy Frog 956-1755 300, 1200, 2400 D3 Systems BBS 663-2759 300, 1200, 2400, 9600 HST, V.32 +Duck Pond BBS 822-0956 300, 1200, 2400, 9600 HST, V.32 ^*Eazy's Playhouse 870-0434 1200, 2400 MNP4 Elite Fleet 853-1257 300, 1200, 2400 Emerald Castle 871-6510 300, 1200, 2400 EzNet Central 785-7417 1200, 2400, 9600 HST Hacker's Corner 674-5449 300. 1200, 2400 +I.S.A. BBS 995-6590 300, 1200, 2400, 9600 HST *Joker's Castle 744-6120 300, 1200, 2400 ^*Lands Of Brittania 791-0421 1200, 2400 *Little Kingdom Node 1 823-9175 300, 1200, 2400, 9600 HST, V.32 *Little Kingdom Node 2 823-9192 300, 1200, 2400 MNP4 LZ Birmingham 870-7770 300, 1200, 2400 *Magnolia BBS 854-6407 300, 1200, 2400, 9600 HST Posys BBS 854-5131 300, 1200, 2400 *Radio Free Troad 592-6234 300, 1200, 2400, 9600 HST Role Player's Paradise 631-7654 300, 1200, 2400 Safe Harbor 665-4355 300, 1200, 2400 Sandwich Shop 226-1872 300, 1200, 2400 Shadetree BBS 787-6723 300, 1200, 2400 Sperry BBS 853-6144 300, 1200, 2400, 9600 Hayes *ST BBS 836-9311 300, 1200, 2400 The Commodore Zone 856-3783 300, 1200, 2400 The Connection 854-9074 1200, 2400 The Islands BBS 870-7776 300, 1200, 2400 The Kingdom Of Teletech 674-0852 300, 1200, 2400 -The Matrix Nodes 1-4 323-2016 300, 1200, 2400 -The Matrix Node 5 251-2344 300, 1200, 2400, 9600 HST VCM(ee) BBS Node 1 655-4059 300, 1200, 2400 VCM(ee) BBS Node 2 655-4065 300, 1200 Victory Express 425-0731 300, 1200 Willie's DYM Node 1 979-1629 300, 1200, 2400 Willie's DYM Node 2 979-7739 300, 1200, 2400 Willie's RBBS 979-7743 300, 1200, 2400 Ziggy Unaxess 991-5696 300, 1200 Boards with a "*" before their name are members of our local network, EzNet, and public messages left in the EzNet Conferences of any of these boards will be echoed to all members. Boards with a "+" before their name are members of FidoNet, an international network that provides a variety of public forums as well as private mail services all over the world. Boards with a "#" before their name are members of our local WWIV network, and public messages left in any of the netowrk conferences will be echoed to all members. Boards with a "-" before their name are members of MetroNet, an international network that provides a variety of public forums as well as private mail services all over the world. Boards with a "^" before their name are members of WWIV-Net, an international network that provides a variety of public forums as well as private mail services all over the world. If you have any corrections, additions, deletions, etc., please let us know via EzNet. ----------------------------------------------------------------------- EzNet Multiple Echo List EzNet now supports multiple conference echoing but there are a few things you should be aware of regarding private mail. A. You have one 'address' for private mail. If you are registered for private mail on Channel 8250 and someone sends you a private message in the MS-DOS conference from Crunchy Frog it will wind up in the Hardware conference on Channel 8250 as it should. However, if you were registered for private mail on Magnolia and someone sends you a private message in a conference that Magnolia does not support (echo) then the message will wind up in the twilight zone. B. If you go by a handle on one BBS and your real name on another even if the private message goes where it is supposed to, you will not be able to read it because it is addressed to someone else as far as PC Board is concerned. PC Board has no way of knowing that Red Foxx and John Doe are the same person. No tickee, no washee. Advice on sending private mail: If you don't know if the person you are sending private mail to is registered for private mail then keep a copy of the message in case you have to find an alternate route. EzNet Central will delete your private, undelivered message and inform you that the user you attempted to reach is not registered for private mail on any EzNet Node. This is a list of the current echoes that I am aware of. More are in the making and will be posted in future issues. If you are a sysop and are running an echo not listed for your board, please make us aware of it so we may correct it next issue. Eznet Program IBM Adult Scitech BTNWA Alter-Ego ........... * ..... ..... ..... ..... ..... .. American BBS ........ * ..... ..... ..... ..... ..... .. Bus System BBS ...... * ..... * ..... * ..... ..... * ..... * .. Byte Me ............. * ..... * ..... * ..... * ..... ..... .. Channel 8250 ........ * ..... * ..... * ..... ..... * ..... .. Crow's Nest ......... * ..... ..... ..... ..... ..... .. Crunchy Frog ........ * ..... ..... * ..... * ..... ..... * .. Eazy's Playhouse .... * ..... * ..... * ..... * ..... ..... .. Joker's Castle ...... * ..... ..... ..... * ..... ..... .. Lands Of Brittania .. * ..... * ..... * ..... ..... ..... .. Little Kingdom ...... * ..... * ..... * ..... * ..... * ..... .. Magnolia BBS ........ * ..... ..... ..... ..... ..... .. Radio Free Troad .... * ..... ..... ..... ..... ..... .. ST BBS .............. * ..... ..... ..... * ..... ..... ..