1612 lines
77 KiB
Plaintext
1612 lines
77 KiB
Plaintext
![]() |
Volume 5, Number 13 28 March 1988
|
|||
|
+---------------------------------------------------------------+
|
|||
|
| _ |
|
|||
|
| / \ |
|
|||
|
| /|oo \ |
|
|||
|
| - FidoNews - (_| /_) |
|
|||
|
| _`@/_ \ _ |
|
|||
|
| International | | \ \\ |
|
|||
|
| FidoNet Association | (*) | \ )) |
|
|||
|
| Newsletter ______ |__U__| / \// |
|
|||
|
| / FIDO \ _//|| _\ / |
|
|||
|
| (________) (_/(_|(____/ |
|
|||
|
| (jm) |
|
|||
|
+---------------------------------------------------------------+
|
|||
|
Editor in Chief Dale Lovell
|
|||
|
Editor Emeritus: Thom Henderson
|
|||
|
Chief Procrastinator Emeritus: Tom Jennings
|
|||
|
Contributing Editors: Al Arango
|
|||
|
|
|||
|
FidoNews is published weekly by the International FidoNet
|
|||
|
Association as its official newsletter. You are encouraged to
|
|||
|
submit articles for publication in FidoNews. Article submission
|
|||
|
standards are contained in the file ARTSPEC.DOC, available from
|
|||
|
node 1:1/1.
|
|||
|
|
|||
|
Copyright 1988 by the International FidoNet Association. All
|
|||
|
rights reserved. Duplication and/or distribution permitted for
|
|||
|
noncommercial purposes only. For use in other circumstances,
|
|||
|
please contact IFNA at (314) 576-4067. IFNA may also be contacted
|
|||
|
at PO Box 41143, St. Louis, MO 63141.
|
|||
|
|
|||
|
The contents of the articles contained here are not our
|
|||
|
responsibility, nor do we necessarily agree with them.
|
|||
|
Everything here is subject to debate. We publish EVERYTHING
|
|||
|
received.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
|
|||
|
1. EDITORIAL ................................................ 1
|
|||
|
FidoNet: Stand Up Now or Watch it Die .................... 1
|
|||
|
2. ARTICLES ................................................. 3
|
|||
|
Public Key Encryption .................................... 3
|
|||
|
FireNet Revisited ........................................ 7
|
|||
|
New Area Code in Florida ................................. 9
|
|||
|
Introducing "The Good Egg Network" ....................... 10
|
|||
|
MegaList - Seven months later (an update) ................ 14
|
|||
|
Nominations for IFNA BoD Positions ....................... 18
|
|||
|
Net 322 forming in Massachusetts ......................... 19
|
|||
|
Setting Up NetMail With QuickBBS ......................... 21
|
|||
|
3. COLUMNS .................................................. 26
|
|||
|
Let's YACK about Electronic Voting ....................... 26
|
|||
|
4. NOTICES .................................................. 28
|
|||
|
The Interrupt Stack ...................................... 28
|
|||
|
Contact Hours Changing for RC 18 ......................... 28
|
|||
|
Latest Software Versions ................................. 28
|
|||
|
FidoNews 5-13 Page 1 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
EDITORIAL
|
|||
|
=================================================================
|
|||
|
|
|||
|
Don Daniels, President
|
|||
|
International FidoNet Association
|
|||
|
FidoNet 1:107/210
|
|||
|
|
|||
|
|
|||
|
FidoNet: Stand Up Now or Watch it Die
|
|||
|
|
|||
|
|
|||
|
I just heard something about Randy Edwards that appalls me. Oh,
|
|||
|
not what HE's said or done, but what is being done to him. It
|
|||
|
seems that someone out there has decided that Randy's
|
|||
|
controversial and rather vociferous opinions have justified, in
|
|||
|
return, certain threats against himself and his family, telephone
|
|||
|
harrassment of them, and attempts to crash his system.
|
|||
|
|
|||
|
This type of response is absolutely wrong.
|
|||
|
|
|||
|
Some might argue that to quite some extent, Randy deserves what
|
|||
|
he gets, in that his behavior has also resulted in a crashed
|
|||
|
system or two and he has certainly abused the hospitality of
|
|||
|
others who freely provide certain resources for specific purposes
|
|||
|
other than those pursued by Randy. But for the most part Randy,
|
|||
|
through overzealousness, is only guilty of certain
|
|||
|
insensitivities of the rights of others and the other results
|
|||
|
have been inadvertant by-products.
|
|||
|
|
|||
|
But, regardless of his own level of any culpability, two wrongs
|
|||
|
never make a right -- and the escalation in this situation has
|
|||
|
moved beyond the realm of insensitivity of the rights of others
|
|||
|
to out-and-out anti-social behavior and illegality. Make no
|
|||
|
mistake about it: telephone harrassment is illegal, regardless of
|
|||
|
whatever form it takes and it should be something that FidoNet
|
|||
|
totally stands against, instead of, unfortunately, being an
|
|||
|
uninvolved party to its promotion.
|
|||
|
|
|||
|
To quite some extent, what we see now is the unsurprising result
|
|||
|
of not taking stands in the past to protect the rights of others.
|
|||
|
On far too many occasions, individuals have been unjustly
|
|||
|
attacked or harrassed and the Net has sat by with a collective,
|
|||
|
"So what?" attitude instead of speaking out against such
|
|||
|
practices or seeking to effect a just disposition of such cases
|
|||
|
as have been brought forward.
|
|||
|
|
|||
|
The result of such inaction is that now we have an atmosphere
|
|||
|
where freedom of dissent - no, freedom of any opinion - is
|
|||
|
likely to bring about personal attacks and where escalation into
|
|||
|
illegality is becoming a norm. The eventual result of this can
|
|||
|
only be the destruction of that ideal of FidoNet and the
|
|||
|
wonderful benefits it could provide to so much of society.
|
|||
|
|
|||
|
Randy has questioned why IFNA should exist. Well, he's certainly
|
|||
|
discovered one of the primary reasons: as a non-profit,
|
|||
|
FidoNews 5-13 Page 2 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
educational body, IFNA sees as one of its main priorities the
|
|||
|
formation and distribution of certain basic policies and
|
|||
|
procedures that are designed to safe-guard the rights of
|
|||
|
individuals thereby giving them the protections to freely
|
|||
|
continue in their personal "pursuit of happiness." Everyone,
|
|||
|
within FidoNet or not, should have the right to say, do, or
|
|||
|
experience anything they wish that, in turn, does not interfere
|
|||
|
with those same rights for others.
|
|||
|
|
|||
|
But the net as a whole cannot just stand by and "let IFNA do it"
|
|||
|
or hope that perhaps someone else will speak out against
|
|||
|
injustices. If you believe in the perpetuation of FidoNet you
|
|||
|
must now take a stand against any and all such practices as have
|
|||
|
been directed against Randy and others. Each and every one of
|
|||
|
you should call for a stop of these blatant violations of rights
|
|||
|
and should demand that those in positions of authority take all
|
|||
|
necessary steps to see that the indiviuals responsibile for such
|
|||
|
acts be removed from FidoNet and that clear guidelines exist to
|
|||
|
prevent reoccurrences.
|
|||
|
|
|||
|
This stand must be taken NOW, before it's too late -- if, indeed,
|
|||
|
it's not too late already.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 3 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
ARTICLES
|
|||
|
=================================================================
|
|||
|
|
|||
|
Public Key Encryption
|
|||
|
|
|||
|
I have seen a few referances to Public Key Encryption
|
|||
|
recently and since I claim to actually know something about the
|
|||
|
subject, I thought I would try to clear up a few misconceptions.
|
|||
|
|
|||
|
Let me start with a bit of history. Some time ago people
|
|||
|
were thinking about electronic communication (lets call it email
|
|||
|
even if most of what I plan to say could also be applied to other
|
|||
|
forms of communications like voice phone calls). This was quite a
|
|||
|
while before Fidonet. They thought that for email to be really
|
|||
|
usefull people need to have confidence in the confidentiality of
|
|||
|
their messages. To be honest it is just too easy to eavesdrop on
|
|||
|
email.
|
|||
|
|
|||
|
These people thought that encryption was the best way to
|
|||
|
ensure confidential email. Other ways are possible but they all
|
|||
|
tend to rely on some form of trust in one way or another. Now
|
|||
|
there is nothing wrong with trusting someone but in practice it is
|
|||
|
depressingly rare.
|
|||
|
|
|||
|
In fact various form of encryption were and are in common
|
|||
|
use for email already. They generally use a, so called, key which
|
|||
|
is used to translate, so called, plain text into a secure form
|
|||
|
before transmision and then used again to reverse the process
|
|||
|
after transmision. So to send a confidential email message you
|
|||
|
first must agree on a key since, of course, if you try to use
|
|||
|
different keys, you won't be able to reverse the original
|
|||
|
conversion appropriatly.
|
|||
|
|
|||
|
This is where the problem comes up. How do you find out
|
|||
|
what key was used to encrypt the original message. The
|
|||
|
conventional answer is that you use a separate channel of
|
|||
|
comunications for agreeing on keys. If you use a telephone for the
|
|||
|
encrypted messages, then you send the key via the post office or a
|
|||
|
courier or an armed gaurd depending on how serious you are.
|
|||
|
|
|||
|
This is where the Public Key Encryption idea started.
|
|||
|
Theses people wanted to use the same channels of communication for
|
|||
|
their keys as they used for the confidential email. They wanted to
|
|||
|
do away with the couriers and the post office and all the
|
|||
|
rigamarole but they did not want to give up the security that had
|
|||
|
been already accomplished. It is pretty obvious that you couldn't
|
|||
|
just put the key to decodeing your message right in front of the
|
|||
|
message since then ANYONE listening in could decode and then read
|
|||
|
your message.
|
|||
|
|
|||
|
What was eventually figured out was that it IS possible to
|
|||
|
first send a message telling someone how to ENCODE a message which
|
|||
|
is then sent BACK to the original person and still have a secure
|
|||
|
message. For instance I can tell you how to scramble a message in
|
|||
|
a certain way so that only I can read it. Anyone listening in will
|
|||
|
FidoNews 5-13 Page 4 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
only find out how to scramble messages and they will also have a
|
|||
|
copy of the scrambled message that you eventually send me but they
|
|||
|
can't unscramble the message to find out what you are saying to
|
|||
|
me.
|
|||
|
|
|||
|
The only practical and secure way of actually implementing
|
|||
|
such a system discovered so far is generally refered to as the RSA
|
|||
|
Public Key Encryption system. It is based on an article called "A
|
|||
|
Method for Obtaining Digital Signatures and Public-Key
|
|||
|
Cryptosystems" writen by R.L.Rivest, A.Shamir and L.Adleman
|
|||
|
published in the February 1978 issue of Comunications of the ACM.
|
|||
|
|
|||
|
The system they discovered is based on very large prime
|
|||
|
numbers. The larger the numbers, the more secure the system
|
|||
|
becomes. Keys based on numbers of the size we contend with every
|
|||
|
day up to millions or billions are pretty easy to decode even if
|
|||
|
you don't know the key. However it is possible to set up keys with
|
|||
|
hundreds of digits and almost guarantee that no one will ever be
|
|||
|
able to decode the messages without the key.
|
|||
|
|
|||
|
The process actually produces two different, but related
|
|||
|
keys. One part is used to encrypt or scramble the original message
|
|||
|
and the other part is then kept to yourself and used to unscramble
|
|||
|
the message. One you have produced a pair of keys, you can give
|
|||
|
out the first part to anyone that wants to send confidential
|
|||
|
messages to you. The half of the key that you give out is refered
|
|||
|
to as a Public Key because you send it out over the public
|
|||
|
comunications channel and it doesn't matter who knows it.
|
|||
|
|
|||
|
If you want to send a private message to someone you must
|
|||
|
first get their public key. For two-way communication there is two
|
|||
|
sets of keys involved. Two public keys and two private secret
|
|||
|
keys. The public keys are exchanged before any confidential
|
|||
|
exchanges can take place.
|
|||
|
|
|||
|
In fact you can publish your public key so that it is
|
|||
|
public knowledge. For instance I have generated a key for myself
|
|||
|
to use. It is:
|
|||
|
|
|||
|
n = 2736819260645630669527694759316520435577
|
|||
|
74311021562498273154432038898470487
|
|||
|
e = 1318658420201053439930112933655370300596
|
|||
|
0307881881836602807819529828909731
|
|||
|
|
|||
|
I had to break the numbers up to fit on these lines. They
|
|||
|
are about 75 digits each. This key is considered to be of
|
|||
|
"moderate" security. A high security key would consist of numbers
|
|||
|
of 150 to 200 digits each. Note that the two numbers above are
|
|||
|
just the one public key. There is a third number to go with the
|
|||
|
two above that is the private part of my key. Now you can use this
|
|||
|
key to send me absolutly (practicly speaking) confidential
|
|||
|
messages.
|
|||
|
|
|||
|
About this time you might be saying "Now wait just a
|
|||
|
minute, what do I do with these big numbers? I don't think my
|
|||
|
computer will even understand numbers that big!" and you are
|
|||
|
FidoNews 5-13 Page 5 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
perfectly justified in asking. As it happens, your computer WILL
|
|||
|
handle numbers like those well enough. You just need the right
|
|||
|
programs. To make it easier for you I have created a program to do
|
|||
|
all the RSA ecryption and decryption work for you. It will even
|
|||
|
generate the big number keys for you to have your own personal
|
|||
|
public keys. The encryption and decryption processes work with
|
|||
|
disk files on your MS-DOS computer. I called the program PKSCrypt
|
|||
|
and it is currently released at version 0.2a. You can call my Fido
|
|||
|
and download the file (called pkscrypt.arc) on your first call.
|
|||
|
(1-403-282-1703 no file requests though, sorry)
|
|||
|
|
|||
|
If you actually go to the trouble of getting a copy of the
|
|||
|
program and play around with it, you will quickly find out why
|
|||
|
this system is not going to replace the conventional encryption
|
|||
|
systems. It is very slow. For example it will take about 15
|
|||
|
minutes to encrypt a 1000 byte file using my key on a PC (give or
|
|||
|
take a few minutes). In fact it is so slow that you might think it
|
|||
|
is completely useless. Before we forget about the whole idea,
|
|||
|
remember what the original problem was. All we need to encrypt is
|
|||
|
the key for one of the standard encryption methods so that we can
|
|||
|
send it over our standard communications channel.
|
|||
|
|
|||
|
Lets get more specific for a minute. Most of the readers of
|
|||
|
Fidonews are sysops on fidonet and I suspect that most of you are
|
|||
|
familiar with Bob Hartman's ConfMail system. Confmail has a built
|
|||
|
in encryption system of the conventional type. Some of you out
|
|||
|
there are probably already using this feature to make some of your
|
|||
|
links secure. You must have agreed with your corespondents on a
|
|||
|
key. Perhaps you just sent the other sysop a private message. You
|
|||
|
probably didn't and wouldn't have any trouble with such an
|
|||
|
arrangement BUT it is remotly possible that for the same reason
|
|||
|
that you descided to use the encryption in the first place, that
|
|||
|
key could have gone astray. You would be no better off than if you
|
|||
|
didn't bother at all.
|
|||
|
|
|||
|
Maybe you thought of that and just phoned up the other
|
|||
|
sysop voice and told him the key. The only problem here is that
|
|||
|
the voice call is more expensive, in general, than a fidonet
|
|||
|
message since it is during daytime, higher rates and it usually
|
|||
|
will be longer in duration than a network call.
|
|||
|
|
|||
|
However, if you knew the public encryption key of the sysop
|
|||
|
who you wanted to send the ConfMail key to, you could encrypt the
|
|||
|
ConfMail key with his public key. That way, only the person who
|
|||
|
knows the secret part of the key could decrypt your message and
|
|||
|
discover the ConfMail key. You can pretty safely assume that only
|
|||
|
one person will know that secret key. You can then send the
|
|||
|
resulting message over the regular insecure links.
|
|||
|
|
|||
|
You can easily use the public key encryption to scramble
|
|||
|
the relativly small ConfMail key. You can still use the relatively
|
|||
|
fast and convientient encryption that is built into ConfMail for
|
|||
|
the bulk of the traffic. And you can do it all over Fidonet with
|
|||
|
the cheap communications possible with this medium.
|
|||
|
|
|||
|
The topic of "digital signatures" was breifly touched upon.
|
|||
|
FidoNews 5-13 Page 6 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
As it turns out the RSA public key encryption can also be used for
|
|||
|
identification purposes. It is possible to use the private key to
|
|||
|
create a, so called, signature which can be verified with that
|
|||
|
person's public key. While this would seem to be usefull to us on
|
|||
|
Fidonet also, it turns out that it is not as practical due to the
|
|||
|
slow speed of the algorithms. If you get my package, I talk about
|
|||
|
digital signatures some more in the dox that come with it.
|
|||
|
|
|||
|
There are other, more controversial, applications of
|
|||
|
encryption techniques. If you are using regular netmail, but your
|
|||
|
mail is being routed through another node and perhaps you think
|
|||
|
the sysop of the intermediate system is reading your private
|
|||
|
messages, you could either "no-route" your mail or you could
|
|||
|
continue to use the same route but encrypt your messages. Most of
|
|||
|
us agree that a host or hub should pass along ANY traffic that he
|
|||
|
has promised to deliver but what would you say if the messages
|
|||
|
were encrypted? You might ask first of all, why is this person
|
|||
|
bothering to encrypt his messages? Is it because he is doing
|
|||
|
something illegal?
|
|||
|
|
|||
|
Some places might even have laws about such practices (the
|
|||
|
cops think they should have the right to read your mail and listen
|
|||
|
to your phone calls even if they need to ask a judge about it
|
|||
|
first and some other government agentcies seem to have similar
|
|||
|
ideas). Of course none of us do anything along those lines do we?
|
|||
|
O:-)
|
|||
|
|
|||
|
What about our pet crime - software piracy? If the pirates
|
|||
|
want to operate on the net they might be able to do it right under
|
|||
|
our noses. If you allow encrypted messages for any reason, you
|
|||
|
will not be able to prevent any other uses of the same techniques.
|
|||
|
One encrypted message looks just like any other encrypted message.
|
|||
|
|
|||
|
You may have noticed, I have not come out and promised this
|
|||
|
system will BE secure for all time. That is only because it has
|
|||
|
not been PROVEN to be secure in a mathematical sense. I am very
|
|||
|
confident of the security of the system but it may be possible
|
|||
|
that tommorow someone will find a simple and cheap way to beat it.
|
|||
|
This situation is not unique to the RSA system. It is actually
|
|||
|
true of most of the modern encryption systems still in use today.
|
|||
|
The primary exceptions are the ones which have been broken. It
|
|||
|
seems that it is much harder to prove that a system is secure than
|
|||
|
it is to come up with the idea in the first place, all of which
|
|||
|
isn't really that surprizing.
|
|||
|
|
|||
|
Lloyd Miller
|
|||
|
1988 March 15
|
|||
|
Calgary, Alberta
|
|||
|
Node 1:134/1, The First Calgary Fido
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 7 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
Christopher Baker
|
|||
|
MetroFire - 135/14
|
|||
|
|
|||
|
|
|||
|
FireNet Echo Recap for the Neophyte
|
|||
|
|
|||
|
Those of you new to FidoNet may have heard of FireNet but may
|
|||
|
not be sure what FireNet is or what it does. Herein lies a
|
|||
|
brief synopsis.
|
|||
|
|
|||
|
Shortly after getting into FidoNet back in early 1985, it
|
|||
|
occurred to me that the FidoNet structure was such that it
|
|||
|
could lend itself very well all sorts of spin-off sub-nets.
|
|||
|
Having set up this system for the fire department I work for
|
|||
|
(Metro-Dade Fire & Rescue in greater Miami)as an experiment,
|
|||
|
I began to toy with the idea that a private Net could be
|
|||
|
created that would allow direct and convenient message
|
|||
|
communication between participating departments. The software
|
|||
|
was readily available, operated on most standard machines and
|
|||
|
modems, and could be configured specifically for fire depart-
|
|||
|
ment use.
|
|||
|
|
|||
|
I began to write articles for FidoNews on the subject and
|
|||
|
began contacting other departments and fire service types who
|
|||
|
might be cajoled into participating in such a venture.
|
|||
|
|
|||
|
At that time, special interest Nets existed in FidoNet (since
|
|||
|
abandonded as redundant) so I applied for and received the
|
|||
|
number Net 911 (now operating as a private Net) and started
|
|||
|
gathering interested systems.
|
|||
|
|
|||
|
It wasn't until the advent of Jeff Rush's famous Echomail
|
|||
|
programs that the real potential of the original idea began
|
|||
|
to emerge. Woody Wood and Chuck Sanders of the Colorado
|
|||
|
Springs Fire Department and I began to exchange ideas and
|
|||
|
plans and Woody and Chuck got Echomail installed on their
|
|||
|
system and began to link-in other FidoNet systems. Echomail
|
|||
|
was much easier to hook into for established systems and
|
|||
|
gave a new dimension to the original concept of a sub-Net
|
|||
|
or private Nodelist. For one thing, Echomail allowed users
|
|||
|
to participate without having to set up a system, first.
|
|||
|
All anyone had to do was find a system carrying FireNet and
|
|||
|
enter messages. This is how many departments first became
|
|||
|
aware of the Echo. Many of those departments went on to set
|
|||
|
up full-fledged FidoNet systems.
|
|||
|
|
|||
|
FireNet is now carried on the Echomail Backbone and has many
|
|||
|
participating systems and even more users. A detailed account
|
|||
|
of the structure of FireNet is in the works and will be related
|
|||
|
in this forum by Chuck and Woody in a future article.
|
|||
|
|
|||
|
Basically, FireNet is an Echo conference devoted to the Fire,
|
|||
|
EMS (Emergency Medical Services) and Public Safety sector. We
|
|||
|
discuss equipment, procedures, service related software,
|
|||
|
hazardous materials, service related legislation and other
|
|||
|
topics directly related to the Fire Services. It has been a
|
|||
|
FidoNews 5-13 Page 8 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
valuable tool in communication and dissemination of bulletins
|
|||
|
and warnings.
|
|||
|
|
|||
|
FireNet is available to anyone who has an interest in the Fire/
|
|||
|
Rescue Services. It is available from the Host and western Hub
|
|||
|
(FireNet Leader, 128/16), from the eastern Hub (MetroFire,
|
|||
|
135/14), or from the Echo Backbone. It is a moderated conference
|
|||
|
that anyone may read or post Fire/Rescue Service messages of
|
|||
|
international interest. A list of the systems carrying FireNet
|
|||
|
will appear in the Sanders/Wood article soon to be published.
|
|||
|
|
|||
|
If you get a link into FireNet from the Backbone or your
|
|||
|
Regional Echo Coordinator, please let Woody or Chuck know about
|
|||
|
it by sending a Netmail message to 128/16. We are trying to
|
|||
|
compile a current list of participating systems.
|
|||
|
|
|||
|
Try it. You'll like it. If you'd like to take a look at the
|
|||
|
Echo, you can call MetroFire at 305-596-8611 or FireNet Leader
|
|||
|
at 719-591-7415 or St. Joe's Hospital at 602-235-9653 or
|
|||
|
SoundingBoard at 412-681-9464 for starters.
|
|||
|
|
|||
|
If you have any questions or comments, you may send them to me
|
|||
|
via Netmail to 135/14. I'll be happy to assist you in
|
|||
|
convincing YOUR department to set up a system and get into the
|
|||
|
FireNet Echo. For a complete ARC of all my previous FireNet
|
|||
|
articles and other FireNet material, you may GET via SEAdog or
|
|||
|
other Bark request type program the file FIRENET.ARC or just
|
|||
|
FIRENET. If you are unable to GET it, I will send it upon
|
|||
|
receipt of a Netmail request.
|
|||
|
|
|||
|
FireNet. It's here. It works and it's growing.
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 9 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
Christopher Baker
|
|||
|
Region 18 Coordinator
|
|||
|
18/0 - 135/14
|
|||
|
|
|||
|
|
|||
|
Southern Bell Declares a New Area Code
|
|||
|
Central/Eastern Florida
|
|||
|
|
|||
|
Effective at midnight, 16 Apr 88, Florida will have a new area
|
|||
|
code. The new prefix will be 407 and will be replacing a large
|
|||
|
portion of what is now area code 305.
|
|||
|
|
|||
|
The area of change will encompass the east coast from Palm
|
|||
|
Beach county north to Brevard and west to Orlando and south to
|
|||
|
Disney World/Kissimmee.
|
|||
|
|
|||
|
Some of the cities affected will be:
|
|||
|
|
|||
|
Apopka, Belle Glade, Boca Raton, Boynton Beach, Cocoa, Cocoa
|
|||
|
Beach, Debary, Delray, Delray Beach, East Orange, Eau Gallie,
|
|||
|
Fort Pierce, Geneva, Hobe Sound, Hutchinson Island, Indian-
|
|||
|
town, Jensen Beach, Jupiter, Kenansville, Kissimmee, Lake
|
|||
|
Buena Vista, Lake Mary, Melbourne, Monteverde, Orlando,
|
|||
|
Oviedo, Pahokee, Port St. Lucie, Reedy Creek, Sanford,
|
|||
|
Satellite Beach, Sebastian, St. Cloud, Stuart, Titusville,
|
|||
|
Vero Beach, West Palm Beach, Windermere, Winter Garden and
|
|||
|
Winter Park.
|
|||
|
|
|||
|
There will be a transition period from 16 Apr 88 through 18 Jun
|
|||
|
88 to allow everyone to get used to the change and implement it.
|
|||
|
Net Coordinators in the affected areas of Florida should make
|
|||
|
sure that these changes are reflected in the Nodelist submissions
|
|||
|
as soon a practicable so the rest of FidoNet doesn't end up with
|
|||
|
voice connections from the Southern Bell recording that goes into
|
|||
|
place at midnight on 19 Jun 88. Both 305 and 407 will operate
|
|||
|
normally during the transition period. Don't forget to change all
|
|||
|
references to your area codes in your Origin lines, bulletins and
|
|||
|
questionnaires when the time comes.
|
|||
|
|
|||
|
Those of you outside of Florida with manual overrides in your
|
|||
|
Nodelist compiler control files will want to make adjustments as
|
|||
|
necessary for any Florida Nodes you may be carrying that are
|
|||
|
affected by this change.
|
|||
|
|
|||
|
Thanks.
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 10 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
Ken Shackelford
|
|||
|
133/1
|
|||
|
|
|||
|
Introducing the Good Egg Network
|
|||
|
|
|||
|
By now, I suspect that there are very few in FidoNet that have
|
|||
|
NOT heard about "The Good Egg Net". Many think it's a joke,
|
|||
|
since it is scheduled to go into operation on April 1st. Some
|
|||
|
think it's an idea from Hell, designed to destroy the FidoNet
|
|||
|
and all who use it. Some folks think that it is a simply grand
|
|||
|
idea, and have given it alot of support.
|
|||
|
|
|||
|
What is the truth here? Just what IS the "Good Egg Net", and
|
|||
|
who is behind it? And why?
|
|||
|
|
|||
|
To answer these questions, you must have a pretty basic under-
|
|||
|
standing of the FidoNet, EchoMail, IFNA, and what has been going
|
|||
|
on in the various conferences lately. I will attempt in this
|
|||
|
article to give a little background, and provide the information
|
|||
|
that so many have been asking for.
|
|||
|
|
|||
|
First of all, Good Egg Net (EGGNET) is NOT a joke, despite the
|
|||
|
fact that it begins it's operation on April Fool's Day. This is
|
|||
|
just pure coincidence. John Zimmatore (133/107) and I were just
|
|||
|
brainstorming at the end of February, and decided to start up an
|
|||
|
alternative network based on how FidoNet USED to be (pre-IFNA).
|
|||
|
We realized that we had two choices: simply announce AND begin
|
|||
|
operations (and be swamped and over our heads), or announce for
|
|||
|
a future date (one month later), and use that month to prepare.
|
|||
|
We chose the latter.
|
|||
|
|
|||
|
Why are John and I doing this? Well, this has been the subject
|
|||
|
of ALOT of "flaming". Very basically, we no longer believe in
|
|||
|
IFNA. We think IFNA has had time enough to get it's act
|
|||
|
together, and it has not done so. IFNA has made promises and
|
|||
|
has not kept them. IFNA, by controlling the NODELIST, controls
|
|||
|
the Sysops in the FidoNet. A good percentage of the members of
|
|||
|
the IFNA BoD are not elected, but appointed (this because the
|
|||
|
elected people got fed up and quit). A full disclosure of the
|
|||
|
IFNA finances was promised; we got a small listing of very
|
|||
|
gross numbers that are meaningless. But I think perhaps the ONE
|
|||
|
thing that it did it for ME, anyway, was the attitude of the
|
|||
|
IFNA Board of Directors that you have only three choices in the
|
|||
|
FidoNet: Lead, Follow, or get the Hell out of the way. This
|
|||
|
very statement is on the origin line of all EchoMail that the
|
|||
|
IFNA *president* puts out in EchoMail. This attitude, quite
|
|||
|
frankly, stinks. Since the early days when IFNA was formed,
|
|||
|
folks disagreed with the premise of IFNA. These folks, myself
|
|||
|
included, were told that if we didn't like what was going on,
|
|||
|
then we should go out and form a NEW network. We are doing so
|
|||
|
here. Now we are being flamed for doing so. Well, you can't
|
|||
|
please everyone it seems.
|
|||
|
|
|||
|
Clearly, IFNA has stumbled and there are quite a few Sysops out
|
|||
|
there like me, like John Zimmatore, and like over two dozen
|
|||
|
others that believe that we need an alternative.
|
|||
|
FidoNews 5-13 Page 11 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
EGGNET is that alternative. What we propose to do with EGGNEt
|
|||
|
is to recreate the way that FidoNet USED to be. We intend to
|
|||
|
have a nodelist that is published bimonthly. This nodelist will
|
|||
|
be PUBLIC DOMAIN. We further propose to have a newsletter that
|
|||
|
will be made available to everyone that wants it, but we will
|
|||
|
NOT make it a requirement that each coordinator down the chain
|
|||
|
carry it. It will be available from one central node, and will
|
|||
|
be available for file request. If a net host in EGGNET wants to
|
|||
|
make it available down the chain, then so much the better. But
|
|||
|
if a certain person in EGGNET decides that he or she does not
|
|||
|
want to carry the newsletter, there will be NO threats, NO ill
|
|||
|
will, and NO warnings from "Powers That Be".
|
|||
|
|
|||
|
How will EGGNET be organized? Simply. We will have a system
|
|||
|
based on democracy, at least as close as we can come to it. We
|
|||
|
will have three "Egg Commissioners" at the top who have as their
|
|||
|
responsibility the creation of the NODELIST and the NEWSLETTER,
|
|||
|
and that is ALL. Nothing else. After the first 6 months, Egg
|
|||
|
Commissioners will be elected by the REGIONAL COORDINATORS.
|
|||
|
Also after the first 6 months, the Regional Coordinators will be
|
|||
|
elected by the Network Coordinators. And of course, the Network
|
|||
|
Coordinators will be elected by the sysops that make up their
|
|||
|
networks. If you have ever read Randy Edward's "Sysop Bill of
|
|||
|
Rights", you get the general idea of what it is that we are
|
|||
|
trying to do here with the "Power". We are trying to put it at
|
|||
|
the BASE of the network where it belongs, rather than at the TOP.
|
|||
|
|
|||
|
How do conflicts get resolved in the EGGNET? Again, simple. We
|
|||
|
will have a Supreme Court. No one that is a Network Coordinator
|
|||
|
or Regional Coordinator will be permitted to serve in this court
|
|||
|
while they also serve as coordinators. And of course, none of
|
|||
|
the Egg Commissioners may serve. Members of the court serve for
|
|||
|
a period of one year. All issues brought before the court must
|
|||
|
be submitted formally and have a preponderance of evidence to
|
|||
|
support the case brought forward. Anyone may bring forward a
|
|||
|
complaint, but if it is judged that the complaint is trivial and
|
|||
|
is made simply for the sake of attention, then the court will
|
|||
|
recommend that the offender be suspended from EGGNET for a
|
|||
|
period of time that can range from 2 weeks to one year. Each
|
|||
|
Region has a representative sitting on the bench, and each rep
|
|||
|
is elected by the Network Coordinators from a list drawn up by
|
|||
|
the Egg Commissioners. The Egg Commissioners make this list up
|
|||
|
based on nominations submitted by anyone in the EGGNET. The Egg
|
|||
|
Commissioners themselves have no vote in the selection of the
|
|||
|
members of the bench. The decision of the Court CAN be appealed
|
|||
|
if an ONLY if at least 1/3 of the EGGNET petitions the court for
|
|||
|
a retrial.
|
|||
|
|
|||
|
What is EGGNET all about? Well, that is real simple. We're
|
|||
|
in this for FUN! Remember that? Remember a time when running a
|
|||
|
node was fun, and you didn't have to worry about IFNA or the
|
|||
|
various cheerleading going on? Remember when FLAMES were some-
|
|||
|
thing that happened in your fireplace? Remember a time before
|
|||
|
Nomex suits were standard equipment in EchoMail? By trying to
|
|||
|
move the POWER out of the way, we hope to make everyone in the
|
|||
|
EGGNET peers such that there are no real Power Brokers. It only
|
|||
|
FidoNews 5-13 Page 12 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
follows that if we can isolate and control the situations where
|
|||
|
power can be taken and abused, then what we are left with is a
|
|||
|
nice, friendly place to communicate and to enjoy our hobby. And
|
|||
|
we end up with a SIMPLISTIC network where intrigue and innuendo
|
|||
|
just don't happen.
|
|||
|
|
|||
|
What about the EGGNET nodelist? How will it be structured?
|
|||
|
Well, it will be structured EXACTLY the same as the IFNA node-
|
|||
|
list is today, so all the various nodelist processors and
|
|||
|
software utilities will still work. The nodelist will be pub-
|
|||
|
lished twice a month: once on the 15th, and again on the 30th.
|
|||
|
We will use Zone 99. Our Regions will lay out EXACTLY the same
|
|||
|
as the FidoNet Regions, and will be numbered 910 through 920.
|
|||
|
All Networks in EGGNET will be numbered 9000 through 9999. As
|
|||
|
far as we are aware, this should not interfere with anything
|
|||
|
that currently exists in FidoNet.
|
|||
|
|
|||
|
One other thing: EGGNET is NOT an "international" system. We
|
|||
|
are doing this for North America only. This is not because we
|
|||
|
don't care about the rest of the world. We do! But trying to
|
|||
|
MANAGE something THAT big would become a nightmare, and we do
|
|||
|
not want to get bogged down in administrivia. That is alot of
|
|||
|
what is wrong in FidoNet these days (our opinion). We would,
|
|||
|
of course, suggest that each area of the world consider well
|
|||
|
their own special circumstances, and if IFNA does it for you,
|
|||
|
then by all means stay there and enjoy. If you have problems
|
|||
|
with IFNA, then you can always do what we in the States are in
|
|||
|
the process of doing, and create your very OWN verison of the
|
|||
|
EGGNET. Different strokes for different folks, and diversity
|
|||
|
there is beauty.
|
|||
|
|
|||
|
Listen folks, EGGNET is not here to try and "destroy Fidonet".
|
|||
|
We do hope to coexist PEACEFULLY with it. Lots of folks that
|
|||
|
will be coming to EGGNET will maintain dual identities so that
|
|||
|
they will ALSO be a part of FidoNet. While we do not encourage
|
|||
|
nodes in EGGNET to have dual or even triple identities, we will
|
|||
|
certainly no prohibit it either. We have decided to use ZONE 99
|
|||
|
so that few if any in FidoNet will become upset over it. Our
|
|||
|
nodelist will be Public Domain, and if folks in FidoNet want to
|
|||
|
compile it in along with their regular nodelist, then super! We
|
|||
|
won't complain at all. No one will have to pay a cent to be in
|
|||
|
the EGGNET. No yearly dues. We will interface with the IFNA
|
|||
|
controlled Fidonet only through EchoMail (it is our view that
|
|||
|
Echomail belongs to EVERYONE, and not just FidoNet). Other than
|
|||
|
that, we just don't see a whole lot of reason for folks that
|
|||
|
stay in IFNA/FidoNet to complain.
|
|||
|
|
|||
|
Currently, we are scheduled to begin normal operations in EGGNET
|
|||
|
on April 1st. John Zimmatore will be taking care of the EGGNET
|
|||
|
nodelist and nodediff, so if you are interested in becoming a
|
|||
|
node in the EGGNET, send a message to John at 133/107 (via 133/0
|
|||
|
after 4/1/88, as Steve Antonoff will be gating netmail into
|
|||
|
EGGNET after that time). I will be continuing to develop the
|
|||
|
basic policies and procedures for EGGNET. We are still looking
|
|||
|
for a third Egg Commissioner to handle miscellaneous chores for
|
|||
|
EGGNET, so if you are interested or know anyone else that would
|
|||
|
FidoNews 5-13 Page 13 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
like to volunteer, please let us know!
|
|||
|
|
|||
|
Finally, the one point to remember about EGGNET is that we are
|
|||
|
made up of volunteers. No one gets paid, no one gets their
|
|||
|
phone bills paid for them, and there is no glory or power OTHER
|
|||
|
THAN the feeling of friendship and accomplishment. This is how
|
|||
|
it originally was with Fidonet, and that is what we are going
|
|||
|
back to. If this flies, then great. Perhaps other networks
|
|||
|
will learn from us. If EGGNET flops, then so be it. At least,
|
|||
|
we will have tried.
|
|||
|
|
|||
|
Ken Shackelford
|
|||
|
John Zimmatore
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 14 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
MegaList - Seven Months Later
|
|||
|
(an update)
|
|||
|
Chris Irwin
|
|||
|
D'Bridge Support, 1:135/68
|
|||
|
(1200-9600/HST)
|
|||
|
|
|||
|
|
|||
|
BACKGROUND
|
|||
|
|
|||
|
Well, it's been seven months since I first wrote an article
|
|||
|
announcing the MegaList and I figured that it was about time to
|
|||
|
write a follow-up. For those of you that don't know about the
|
|||
|
MegaList, it's a national cross-system file listing and (if I may
|
|||
|
say so myself) it's doing rather well! As of this moment, there
|
|||
|
are over 28,000 files listed on 58 systems. (1.2 gigobytes!)
|
|||
|
|
|||
|
When I first started, I envisioned the MegaList as a text
|
|||
|
file sorted by filename listing all the files on participating
|
|||
|
systems. This file still exists today, but it is over 400 pages
|
|||
|
long and unARCs to over a megabyte; it's grown to a point where
|
|||
|
it's a bit unreasonable to file-request or download unless you
|
|||
|
have a high-speed modem. So in early August, I wrote a database
|
|||
|
inquiry program called ML-FIND; this allowed users to inquire
|
|||
|
directly using wildcard searches identical to a DOS directory
|
|||
|
listing. This was setup as the "O" command in the file section
|
|||
|
of my board; instantly, you can locate any file on any system.
|
|||
|
|
|||
|
|
|||
|
CURRENT STATUS
|
|||
|
|
|||
|
Part of the reason for writing this article was to announce a
|
|||
|
revolutionary new service offered by 1:135/68; this is the Mega-
|
|||
|
List inquiry service. Because of the awesome new capabilities of
|
|||
|
D'Bridge, it is now possible for all WaZOO-based mailers to issue
|
|||
|
"Function Requests" to D'Bridge. I won't go into exactly how it
|
|||
|
works here, but I'd like to explain how you can use it. If you
|
|||
|
wish to inquire into the MegaList via netmail, here's what to do:
|
|||
|
|
|||
|
1) Make sure that you are using a WaZOO/ZMODEM-based mailer
|
|||
|
such as D'Bridge, FrontDoor, Opus or BinkleyTerm.
|
|||
|
|
|||
|
2) Create a text file called MEGALIST.INQ; this file should
|
|||
|
contain the filenames (including wildcards) that you wish
|
|||
|
to search for. (one per line)
|
|||
|
|
|||
|
3) Send the file to 1:135/68 and make sure that you have the
|
|||
|
"pickup" option enabled.
|
|||
|
|
|||
|
4) When my system receives MEGALIST.INQ, it spawns the Mega-
|
|||
|
List Search program. This program prepares MEGALIST.OUT
|
|||
|
which contains the results of your search. This program
|
|||
|
has an internal timer so that no search may take over 30
|
|||
|
seconds.
|
|||
|
|
|||
|
5) By ZMODEM "pickup" mail, D'Bridge will send you the output
|
|||
|
file, MEGALIST.OUT. This file is a subset of the current
|
|||
|
FidoNews 5-13 Page 15 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
MEGALIST.TXT file containing just the files that you were
|
|||
|
looking for or an error message if the file doesn't exist
|
|||
|
or your MEGALIST.INQ format was invalid.
|
|||
|
|
|||
|
|
|||
|
Simple, right? I am aware that some other NETs (both here
|
|||
|
and abroad) are creating their own MegaLists for their area. If
|
|||
|
any of you are running D'Bridge or FrontDoor and would like to
|
|||
|
provide this service also, please contact me for the software; it
|
|||
|
is not available as a general release as of this time.
|
|||
|
|
|||
|
|
|||
|
To summarize, the MegaList is available from 1:135/68 in the
|
|||
|
following forms:
|
|||
|
|
|||
|
- By download, WaZOO or Bark request with the filenames:
|
|||
|
|
|||
|
MEGALIST.ARC - A rather "huge" file containing the text
|
|||
|
file MEGALIST.TXT; ALL files on ALL systems.
|
|||
|
|
|||
|
MEGA-ARC.ARC - Another "huge" file with MEGA-ARC.TXT;
|
|||
|
.ARC files on ALL systems.
|
|||
|
|
|||
|
MEGA-TXT.ARC - A small subset of .TXT, .DOC and files with
|
|||
|
no extension.
|
|||
|
|
|||
|
ML-INDEX.ARC - The current database files for ML-FIND.
|
|||
|
This file is somewhere around 400K and can
|
|||
|
only be used with ML-FIND or ML-SEARCH.
|
|||
|
|
|||
|
- By online inquiry through my Opus system using ML-FIND,
|
|||
|
the "Outside" command in the file-section.
|
|||
|
|
|||
|
- Or by the WaZOO-based inquiry described above
|
|||
|
|
|||
|
|
|||
|
JOIN THE MEGALIST
|
|||
|
|
|||
|
All BBS systems in North America are invited to join the
|
|||
|
National MegaList; All that is required is that your system be
|
|||
|
100% IBM compatable and your BBS has Fido/Opus-compatable SYSTEM
|
|||
|
and FILES.BBS files. Get the ML-UPD program from 1:135/68 and
|
|||
|
run it about once per month; systems must supply updates at least
|
|||
|
once every 90 days to remain in the list.
|
|||
|
|
|||
|
ML-UPD takes just a few minutes to run and is completely
|
|||
|
automatic. It creates an update file, ARCs it, then mails it
|
|||
|
to the National MegaList center in Miami, Florida. The following
|
|||
|
software relating to the MegaList is available for download or
|
|||
|
WaZOO/Bark file-request from 1:135/68:
|
|||
|
|
|||
|
ML-UPD.ARC - MegaList update software; used to add your
|
|||
|
system to the national (or a local) list.
|
|||
|
|
|||
|
ML-COL.ARC - Create MegaLists for your NET or REGION with
|
|||
|
this program; this also can create database
|
|||
|
FidoNews 5-13 Page 16 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
files for ML-FIND.
|
|||
|
|
|||
|
ML-FIND.ARC - An "Outside" command designed to be used with
|
|||
|
Opus that allows fast database inquiry into
|
|||
|
the megalist. Requires ML-COL or ML-INDEX
|
|||
|
to operate.
|
|||
|
|
|||
|
|
|||
|
THE FUTURE
|
|||
|
|
|||
|
Well, I meant to release a "version 2" late last year, but
|
|||
|
my six-month project of writing D'Bridge kinda kept me more than
|
|||
|
busy. Now that D'Bridge is ready for preliminary release in the
|
|||
|
middle of March, I am ready to dedicate some time to making some
|
|||
|
revsions to the way MegaList works. It has been suggested that
|
|||
|
the best way to organize the list would be to break down the
|
|||
|
collection process using Regional MegaList Coordinators. These
|
|||
|
coordinators would maintain a list for their region plus submit
|
|||
|
the data to the national collection center on a monthly basis.
|
|||
|
|
|||
|
I agree with this approach, but I think that we should go
|
|||
|
a step further and organize the lists by catagory/machine type.
|
|||
|
As of this time, I haven't written one line of code towards the
|
|||
|
"version 2" because I'm at a loss for exactly what to do. I'm
|
|||
|
at a point where I really need some feedback from the users and
|
|||
|
potential users of the MegaList. If you feel (as I do) that this
|
|||
|
project warrants continuing effort and organization, then your
|
|||
|
input and/or help would be greatly appreciated. Help along the
|
|||
|
following lines is requested:
|
|||
|
|
|||
|
- Regional MegaList Coordinators needed; the IFNA nodelist
|
|||
|
is broken down into logical regions. If we could get one
|
|||
|
person from each region willing to act as a collection
|
|||
|
center, we could make the concept work much better. As
|
|||
|
I said earlier, the national list (in text format) is a
|
|||
|
little bit unreasonable in size; database inquiry is the
|
|||
|
only logical way for inquiry into this ever-growning list.
|
|||
|
|
|||
|
- Software authors for non-IBM machines; from the beginning,
|
|||
|
people have complained about ML-UPD not working on non-
|
|||
|
compatables. I must admit, that I did this on purpose to
|
|||
|
keep non-IBM software out of the list. If we can come up
|
|||
|
with a way to put a "tag" on each file-area defining the
|
|||
|
machine and software catagory, we could segment the list
|
|||
|
in a very logical way...
|
|||
|
|
|||
|
- General constructive criticism; sometimes being the author
|
|||
|
of a widely-used package causes one to be a bit "myopic"
|
|||
|
in one's views. I admit that this is the case here. It
|
|||
|
would really help if I got some feedback about this and
|
|||
|
some suggestions about how I can make the MegaList work
|
|||
|
more effectively. Over the last few months, interest has
|
|||
|
slacked off a bit in the national list. There are many
|
|||
|
local/regional lists, but people seem less interested in
|
|||
|
the national list. Right now, the MegaList is actually
|
|||
|
shrinking rather than growing; at one point, 70 systems
|
|||
|
FidoNews 5-13 Page 17 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
were listed!
|
|||
|
|
|||
|
Anyway, I can't believe that I could type so much; I didn't
|
|||
|
think that I had so much to say. Thanks for listening/reading
|
|||
|
and please JOIN THE MEGALIST if you're not already participating.
|
|||
|
Stay tuned for my article announcing the amazing, WaZOO-based,
|
|||
|
98% SEAdog-compatable Electonic Mail System, D'Bridge!
|
|||
|
|
|||
|
|
|||
|
Chris Irwin, D'Bridge Support, 1:135/68
|
|||
|
(305) 232-9365 (1200-9600/HST)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 18 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
David Garrett, 1:103/501
|
|||
|
Nominations and Elections Chairman
|
|||
|
|
|||
|
|
|||
|
The time has come for all those who desire to run for the postion
|
|||
|
of Director for their Division (Region) to place their names on
|
|||
|
the ballot.
|
|||
|
|
|||
|
|
|||
|
The following Divisions have their BoD Representatives Positions
|
|||
|
up for re-election:
|
|||
|
|
|||
|
Division 10
|
|||
|
Division 12
|
|||
|
Division 14
|
|||
|
Division 16
|
|||
|
Division 18
|
|||
|
Zone 2
|
|||
|
|
|||
|
At-Large 5 Members
|
|||
|
|
|||
|
In order to qualify to run for the position, it is necessary for
|
|||
|
to be a dues paying member of IFNA, if running for a Divisional
|
|||
|
position, to be a member of that Division (Region), and have the
|
|||
|
support of 10 members of IFNA from your Region. The procedure is
|
|||
|
as follows:
|
|||
|
|
|||
|
1. Send a Net Mail Message direct from your node to
|
|||
|
103/501 stating that you intend to run for the position
|
|||
|
on the BoD (please state as to whether it is Regional
|
|||
|
or At-Large).
|
|||
|
|
|||
|
2. Have ten IFNA members submit their statement of support
|
|||
|
for your running to 103/501 by Direct NetMail. The
|
|||
|
subject line of the message should contain your name.
|
|||
|
If you are running for a Divisional position then you
|
|||
|
must have 10 Members from your Region support you,
|
|||
|
otherwise you can obtain any 10 Members names,
|
|||
|
duplicates are allowed.
|
|||
|
|
|||
|
That's all that there is to it. Your Net Mail Message should
|
|||
|
reach me no later than May 21, 1988, names will be listed on the
|
|||
|
Ballot in alpha sequence by Region. At-Large directors will be
|
|||
|
listed in name sequence only.
|
|||
|
|
|||
|
Ballots will be send to FidoNews for Publication by May 28th in
|
|||
|
order to meet the needs of the By-Laws.
|
|||
|
|
|||
|
Remember that this is your organization and we need your support
|
|||
|
to make it match the needs of our membership.
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 19 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
A New Net in Massachusetts
|
|||
|
by David Kaufman (1:321/147)
|
|||
|
|
|||
|
Starting with NODELIST.078 (barring some unforeseen occurence) a
|
|||
|
new net, Net 322, will form in Massachusetts. The new net will
|
|||
|
be comprised of nodes from both of the existing nets (Net 321 and
|
|||
|
Net 101). If you do echomail or have regular correspondence with
|
|||
|
any Massachusetts node, make sure you know which net that node
|
|||
|
will be in. Here's a list of those which will be moving:
|
|||
|
|
|||
|
Net 322 (the new MassNet East)
|
|||
|
|
|||
|
Old # New # | Old # New # | Old # New #
|
|||
|
------- ------- | ------- ------- | ------- -------
|
|||
|
101/140 322/710 | 101/129 322/890 | 101/117 322/117
|
|||
|
101/168 322/110 | 101/172 322/130 | 101/139 322/180
|
|||
|
101/113 322/188 | 101/433 322/210 | 101/448 322/220
|
|||
|
101/162 322/230 | 101/188 322/240 | 101/166 322/310
|
|||
|
101/14 322/14 | 101/182 322/335 | 101/184 322/339
|
|||
|
101/132 322/340 | 101/146 322/360 | 101/186 322/380
|
|||
|
321/147 322/422 | 321/148 322/410 | 321/401 322/470
|
|||
|
101/27 322/27 | 101/885 322/530 | 101/124 322/559
|
|||
|
101/156 322/555 | 101/174 322/557 | 101/125 322/560
|
|||
|
101/126 322/561 | 101/164 322/566 | 101/366 322/590
|
|||
|
101/152 322/940 | 101/105 322/960 |
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 20 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
MY COMPUTER
|
|||
|
|
|||
|
You sit there on the table,
|
|||
|
With just a little RAM.
|
|||
|
I wish that you were able,
|
|||
|
To really give a Damn.
|
|||
|
|
|||
|
Your screen is brightly colored,
|
|||
|
An your drive goes round and round.
|
|||
|
The inner workings dullered,
|
|||
|
The data you have found.
|
|||
|
|
|||
|
Sometimes, you work just fine,
|
|||
|
An others you do not.
|
|||
|
I think you spend more time,
|
|||
|
Looking for what you've got.
|
|||
|
|
|||
|
I wonder what would happen,
|
|||
|
If you could only talk.
|
|||
|
But if that should ever happen,
|
|||
|
Think I'd go out for a walk.
|
|||
|
|
|||
|
So here's to my computer,
|
|||
|
You work so hard for me.
|
|||
|
You use to be my tutor.
|
|||
|
Now you've set me free.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Jake Hargrove (CTBBS)
|
|||
|
(C)1987
|
|||
|
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 21 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
Setting up NetMail with QuickBBS
|
|||
|
By Gene Coppola 1/114 (107/246)
|
|||
|
|
|||
|
By now you have downloaded a copy of Quick BBS and have
|
|||
|
decided that it is the BEST Shareware Bulletin Board system
|
|||
|
and have decided you would like to join the network.
|
|||
|
|
|||
|
Okay, great. The first thing you should do is get a copy of
|
|||
|
POLICY3.DOC and read it thoroughly from start to finish.
|
|||
|
This file explains all you need to know to get a Net/Node
|
|||
|
number and join the network. (Okay I was obligated to tell
|
|||
|
you that first, now let's continue.)
|
|||
|
|
|||
|
The world is divided into seperate Zones in the network.
|
|||
|
Each Zone is then divided into multiple Regions. Each Region
|
|||
|
is further divided into Nets. Each Net has a Coordinator and
|
|||
|
in most cases several Hubs that service the individual
|
|||
|
Sysops in each Net.
|
|||
|
|
|||
|
Each Sysop who joins the Net receives a unique Net/Node
|
|||
|
identification number to identify his system. The
|
|||
|
Coordinator's Net/Node number is easy to find in the
|
|||
|
Nodelist as it ends in a zero. For example a Sysop in the
|
|||
|
Net 107 area who would like to request a Net/Node number
|
|||
|
would send a message to 107/0 who would start the processing
|
|||
|
on it's way.
|
|||
|
|
|||
|
Current policy REQUIRES that all requests for Net/Node
|
|||
|
number assignments be sent via NETMAIL to the appropriate
|
|||
|
person. This might sound strange, but in fact is based on
|
|||
|
sound reasoning. If you have set up your system properly,
|
|||
|
then the message will get through, and in most cases this
|
|||
|
also means that you will be able to receive NETMAIL as well
|
|||
|
as send it. If your system is not set up properly then the
|
|||
|
message will not be sent, and you will have to do further
|
|||
|
work to get your system set up properly.
|
|||
|
|
|||
|
No matter what system you are running ie; Quick BBS, TBBS,
|
|||
|
RBBS, Fido or Opus, you NEED to get a copy of the Nodelist
|
|||
|
if you wish to join the public network. The Nodelist is
|
|||
|
updated once a week as is available on most systems. The
|
|||
|
first time, you will need to get the complete Nodelist. Each
|
|||
|
weeks list is numbered with a Julian day as the last 3
|
|||
|
digits of the file name. For example the Nodelist for March
|
|||
|
18, 1988 should be named NODELIST.078 or in the archived
|
|||
|
form it would be called NODELIST.A78. The last 3 digits
|
|||
|
increase as the year goes on. Once you get the first copy
|
|||
|
you can update it each week by obtaining that weeks NODEDIFF
|
|||
|
which contains the weekly updates.
|
|||
|
|
|||
|
The NODEDIFF files are also numbered the same way so the
|
|||
|
NODEDIFF for the above date would be NODEDIFF.A78. Way back
|
|||
|
when I first started, we updated the Nodelist by hand,
|
|||
|
adding and deleting nodes manually. However this soon got to
|
|||
|
be too much work, and utilities were written to automate
|
|||
|
this task for you.
|
|||
|
FidoNews 5-13 Page 22 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
The BEST utility to use for this is known as XLATLIST and is
|
|||
|
usually available on systems under the following names of
|
|||
|
XLATRGEN.ARC or XLATLIST.ARC. The current version of this
|
|||
|
utility is 2.86 as of the date of this article. XLATLIST was
|
|||
|
written and designed to make the weekly updates as painless
|
|||
|
as possible. Once set up, XLATLIST will take last weeks
|
|||
|
Nodelist, process the current Nodediff and produce a new,
|
|||
|
updated Nodelist for you. This utility was written by Thom
|
|||
|
Henderson of System Enhancement Associates, and we all owe
|
|||
|
Thom thanks for this fine utility.
|
|||
|
|
|||
|
Other people have written utilities but none perform up to
|
|||
|
the high standards of XLATLIST. XLATLIST was freely given to
|
|||
|
Sysops to use, while other utilities require payment for
|
|||
|
continued use, and in certain instances have even been know
|
|||
|
to send Netmail messages to their authors, notifying them
|
|||
|
that you are using their software. XLATLIST is great, and
|
|||
|
the author is a concerned Sysop, who deals with problems as
|
|||
|
they occur and provide updates as needed.
|
|||
|
|
|||
|
An important note is needed here. In order for XLATLIST to
|
|||
|
properly work, you MUST run it EACH and EVERY week without
|
|||
|
fail. This will assure you that your list is up to date and
|
|||
|
you will not be accidently calling a "little old lady" in
|
|||
|
the middle of the night, trying to send Netmail.
|
|||
|
|
|||
|
Okay, once you XLATLIST, you set up the control file for it,
|
|||
|
with the appropriate information. In the case of a new Sysop
|
|||
|
requesting a node number, use a -1 as your node number. For
|
|||
|
example, after reading the nodelist and determining you are
|
|||
|
in the Net 107 area, you would put 107/-1 as your node
|
|||
|
number UNTIL you receive your permanent number. This special
|
|||
|
number (-1) notifies the Coordinator this a request for a
|
|||
|
node number.
|
|||
|
|
|||
|
PLEASE, do not make up a node number. This is the "accepted"
|
|||
|
way of requesting a node number. Making up a node number
|
|||
|
will just confuse the entire process and result in a delay
|
|||
|
for you to receive your number.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Now copy the file that XLATLIST produces (nodelist.bbs) to
|
|||
|
your Quick BBS directory. Run Qconfig and set up the basic
|
|||
|
parameters, including a message board for Netmail (there can
|
|||
|
be only ONE such board in Quick BBS) and the basic
|
|||
|
information requested.
|
|||
|
|
|||
|
Now run Qnode which will process the information contained
|
|||
|
in nodelist.bbs and produce a file that Quick BBS uses to
|
|||
|
know where to send Netmail.
|
|||
|
|
|||
|
Now send a message to the Coordinator in the area that you
|
|||
|
are in requesting a Net/Node number. Please be sure to
|
|||
|
include the following information as a minimum.
|
|||
|
|
|||
|
FidoNews 5-13 Page 23 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
1) Sysops Name
|
|||
|
2) Bulletin Board Name
|
|||
|
3) Phone Number
|
|||
|
4) Full Address Of The System.
|
|||
|
5) Maximum Baud Rate
|
|||
|
6) Hours System Operates.
|
|||
|
7) Name Of Front End Software
|
|||
|
8) Protocols In Use.
|
|||
|
|
|||
|
This is the MINIMUM information required. If the Coordinator
|
|||
|
requires more information, you will be notified of this.
|
|||
|
|
|||
|
Quick BBS requires some type of external software to handle
|
|||
|
the Netmail functions. The following software (in no special
|
|||
|
order) works quite well with Quick BBS. Binkley, SEAdog,
|
|||
|
Dbridge, Front Door, and Dutchie. I prefer Binkley which is
|
|||
|
widely available and works quite well.
|
|||
|
|
|||
|
Once Quick BBS and your Front End are set up, it is time to
|
|||
|
send the message to your Coordinator. Remember that the
|
|||
|
Coordinator's number will end in a zero (107/0). Hopefully
|
|||
|
the Coordinator will send back information pertaining to any
|
|||
|
special routing your Net uses to process Netmail.
|
|||
|
|
|||
|
At this point in time you must make your system available to
|
|||
|
process mail during National Mail Hour (NMH). NMH has been
|
|||
|
carefully established to allow mail to flow between systems
|
|||
|
when the costs are the lowest. On the East Coast (EST) NMH
|
|||
|
is currently between 4 and 5 a.m. Your Coordinator can help
|
|||
|
you translate this into the proper time frame for your
|
|||
|
location.
|
|||
|
|
|||
|
So to recap, the following files are the minimum required to
|
|||
|
set up for Network mail.
|
|||
|
|
|||
|
1) Current Nodelist File.
|
|||
|
2) XLATLIST or XLATRGEN File.
|
|||
|
3) One Of The Various Front End Mail Programs.
|
|||
|
|
|||
|
If you cannot find these anywhere else, they are available
|
|||
|
from 1/114 at (516)-328-7064. We are open from 6:15 a.m.
|
|||
|
until 2:45 a.m. for bulletin board access. All files above
|
|||
|
and all the Quick BBS software and utilities are available
|
|||
|
to FIRST time callers.
|
|||
|
|
|||
|
Here is a current list of the Quick BBS software and
|
|||
|
utilities currently on-line.
|
|||
|
|
|||
|
QUICKBBS.ARC QuickBBS Standard Package (Main Program)
|
|||
|
QUICKDOC.ARC QuickBBS Sysop Documentation
|
|||
|
QUICKNET.ARC QuickBBS Net Mail Option
|
|||
|
QUICKECO.ARC QuickBBS EchoGen Mail Option
|
|||
|
QUICKPAK.ARC All Of The Above Files
|
|||
|
HELPFILE.ARC New Quick BBS Help Files
|
|||
|
SAMPMENU.ARC Menus Used On This System <-Updated
|
|||
|
SAMPQEST.ARC Sample New User Questionnaire
|
|||
|
FidoNews 5-13 Page 24 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
STRUCT.ARC File Structures For Quick BBS
|
|||
|
X00109.ARC Fossil Driver
|
|||
|
BULLMAKE.ARC News/Bulletin Generator (FREEWARE)
|
|||
|
CVTMSG.ARC Imports Messages From Opus To Quick BBS
|
|||
|
CVTUSER.ARC Converts Opus User File To Quick BBS
|
|||
|
DSZ0208.ARC External Zmodem Protocol (Latest Version)
|
|||
|
ECHOAREA.ARC Echo Mail Utility For Version 2.0 and up
|
|||
|
FILESCAN.ARC Creates List Of Available Files V 2.12 <-New
|
|||
|
MGMLINK.ARC Very Handy Echo Mail Utility
|
|||
|
PCB-QBBS.ARC Run Quick BBS As A Door On PcBoard
|
|||
|
QBBSEXAM.ARC Changes Caller Count In SYSINFO
|
|||
|
TODAY.ARC Highlights Each Day In History (Door)
|
|||
|
USERLOG.ARC Userlog/Message Base/Answerfile Utility <-New
|
|||
|
UPURGE.ARC Purge By Date, Security Level
|
|||
|
WXMODEM.ARC External Wxmodem Driver
|
|||
|
BINKBATS.ARC My Cfg And Bats To Run Binkley
|
|||
|
BEXE_140.ARC Latest Version Of Binkley
|
|||
|
BT_286.ARC Binkley 1.40 Compiled For 286 Machines
|
|||
|
BINKOMMM.ARC Using OMMM With Binkley
|
|||
|
FILESCAN.ARC Now Supports Binkley V 2.12 <--NEW
|
|||
|
OMMM_107.ARC Message Handler With COMPLETE Docs
|
|||
|
OMMMHELP.ARC More Help Using OMMM With Binkley
|
|||
|
ONODE146.ARC Nodelist Utility For Binkley
|
|||
|
REMAPPER.ARC Service Points With Binkley
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Here is a list of the Door software now available, please
|
|||
|
note that these are for Quick BBS 2.0 and up!
|
|||
|
|
|||
|
ADVE0288.ARC Adventure Yes it is the old Adventure game
|
|||
|
ALPH0288.ARC Alpha Word game in space
|
|||
|
ARAB0288.ARC Arab Word game on the Hot Sands
|
|||
|
AROU0288.ARC Around Word game make it around the world
|
|||
|
ATLA0288.ARC Atlantis Word game getting out of Atlantis
|
|||
|
BBSL0288.ARC BBS listing program
|
|||
|
CAST0288.ARC Castle Adventure Game
|
|||
|
CAVE0288.ARC Cave Multi-User takes place in a Cave
|
|||
|
CHAT0388.ARC Eliza Like 'Sysop' Chat Routine
|
|||
|
CHES0288.ARC Chess Users play chess Excellent!!
|
|||
|
CIA0288.ARC C.I.A. Word game Beat the bad people
|
|||
|
CRAZ0288.ARC Crazy Word game in a mental hospital
|
|||
|
KILL0288.ARC Killer Word game GET out of harlem
|
|||
|
KING0288.ARC King A Multi-User trivia game
|
|||
|
MARS0288.ARC Mars Word game on Mars
|
|||
|
MEGA0388.ARC Search/View The National Megalist
|
|||
|
MONI0288.ARC Monitor Good program to tie Doors together
|
|||
|
NETM0288.ARC NetMail puts you on the Fido Net (For RBBS)
|
|||
|
PIRA0388.ARC Pirate Multi-User Takes place on the ocean
|
|||
|
REVE0288.ARC Reverse Try to reverse numbers for points
|
|||
|
RIPP0288.ARC Ripper word game Jack the Ripper
|
|||
|
ROVE0288.ARC Rover Try to get Rover Robot across grid
|
|||
|
SWOR0288.ARC Sword Word game kill medusa if you can
|
|||
|
SYSU0388.ARC Remote Sysop Utility
|
|||
|
TIME0388.ARC Time word game about time travel
|
|||
|
FidoNews 5-13 Page 25 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
TW5A0388.ARC TradeWars 500 part 1 of 2
|
|||
|
TW5B0288.ARC TradeWars 500 part 2 of 2
|
|||
|
|
|||
|
As you can see, in the short time that Quick BBS has been in
|
|||
|
operation, it has developed into a full featured Bulletin
|
|||
|
Board program, which takes a back-seat to no other software.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 26 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
COLUMNS
|
|||
|
=================================================================
|
|||
|
|
|||
|
YACK
|
|||
|
Yet Another Complicated Komment
|
|||
|
|
|||
|
by Steven K. Hoskin
|
|||
|
( STEVE HOSKIN at 1:128/31 )
|
|||
|
|
|||
|
Episode 4: Electronic Voting
|
|||
|
|
|||
|
|
|||
|
|
|||
|
I don't know about y'all out there, but I want to see a
|
|||
|
democratic FidoNet. You know, where each FidoNode gets one vote
|
|||
|
on matters that concern the InterNational FidoNet.
|
|||
|
|
|||
|
I thought originally that was why the InterNational FidoNet
|
|||
|
Association went corporate; so there'd be rules to follow about
|
|||
|
collective voting.
|
|||
|
|
|||
|
As it turned out, for whatever reasons, IFNA did not turn
|
|||
|
out to be that voting tool, that graceful central coordinator of
|
|||
|
the collective will of all FidoNet SysOps. One of its problems
|
|||
|
is that members of FidoNet are NOT necessarily members of IFNA.
|
|||
|
Therefore, IFNA cannot do things to control FidoNet, as FidoNet
|
|||
|
SysOps don't get to vote on IFNA matters if they're not IFNA.
|
|||
|
|
|||
|
To join IFNA costs $25. You should NEVER have to pay to
|
|||
|
vote on something that affects the way you run your life.
|
|||
|
Period.
|
|||
|
|
|||
|
I joined IFNA because I thought it would help to insure the
|
|||
|
survival of FidoNet during hard times. That may still hold true,
|
|||
|
and I will probably be an IFNA member for life, but one thing has
|
|||
|
become clear to me: IFNA IS NOT ESTABLISHING NET-WIDE DEMOCRACY.
|
|||
|
|
|||
|
Don Daniels, president of IFNA, has requested ideas for ways
|
|||
|
to establish a fully democratic FidoNet, BE IT VIA IFNA OR SOME
|
|||
|
OTHER MECHANISM. Now there's a man who's interested in FidoNet.
|
|||
|
|
|||
|
Well, here we go again, folks, YET ANOTHER idea: Electronic
|
|||
|
Voting.
|
|||
|
|
|||
|
Reserve a FidoNode, just like 1:1/0 does the NodeList, and
|
|||
|
1:1/1 does the FidoNews, to handle strictly Electronic Voting.
|
|||
|
For sake of example, I'll use 1:1/9. I don't know if this Node
|
|||
|
number is being used for anything, but that's my example.
|
|||
|
|
|||
|
For starters, if IFNA is to be retained (as many of us would
|
|||
|
STILL like to see), we must adopt a by-law (if nothing stronger
|
|||
|
can be used) that states in whatever legal wording is needed that
|
|||
|
IFNA as an organization MUST ABIDE BY FIDONET SYSOP VOTE RESULTS.
|
|||
|
And that IFNA MUST ISSUE BALLOTS FOR VOTE ON ANY RESOLUTION
|
|||
|
REQUESTED BY ANY FIDONET SYSOP.
|
|||
|
FidoNews 5-13 Page 27 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
Then get 1/9 going. An automated system, disallowing human
|
|||
|
tampering, whereby ballots and resolutions are sent to the node,
|
|||
|
1/9 sends the ballot via Network mail AUTOMATICALLY to ALL Nodes
|
|||
|
in the NodeList DIRECTLY, and waits for some predetermined amount
|
|||
|
of time for a vote result.
|
|||
|
|
|||
|
If one month is the predetermined time, have 1/9 re-send
|
|||
|
ballots to any Node from which no vote has been received on a
|
|||
|
weekly basis until either a vote is received or the time limit
|
|||
|
has been reached.
|
|||
|
|
|||
|
As vote "ballot" messages come back to 1/9 via Network Mail,
|
|||
|
in some predetermined format such that a relatively
|
|||
|
unsophisticated program can determine the vote, 1/9 tallies the
|
|||
|
vote, stores the message, and sends a verification message via
|
|||
|
Network Mail DIRECTLY to the node that allegedly sent the ballot.
|
|||
|
|
|||
|
Duplicate Node votes would be cancelled and the ballot
|
|||
|
reissued to the Node in question with a note commenting on the
|
|||
|
duplication.
|
|||
|
|
|||
|
A password could be set up for each Node and placed
|
|||
|
somewhere in the Ballot return vote message. Improperly
|
|||
|
passworded ballots would cause 1/9 to send a message DIRECTLY to
|
|||
|
that Node informing him or her that a password failing had
|
|||
|
occurred. A place for changing of passwords could also be added
|
|||
|
to the ballot return message.
|
|||
|
|
|||
|
This should eliminate "bogus" node voting, as the SysOp of
|
|||
|
the REAL Node could then be aware that somebody is trying to
|
|||
|
break into his or her vote.
|
|||
|
|
|||
|
When all Nodes have responded OR the time limit is reached,
|
|||
|
1/9 forwards the vote results to anybody that wants it, either
|
|||
|
via Network Mail or as an Echo Area.
|
|||
|
|
|||
|
Have a preformed message format for requesting a ballot,
|
|||
|
which could be sent to 1/9 such that no human could interfere
|
|||
|
with the request for the vote. This eliminates interference with
|
|||
|
the vote request system if someone feels that their
|
|||
|
ballot/resolution has not been properly sent to 1/9 by IFNA.
|
|||
|
Improper resolutions thusly sent could be construed as being
|
|||
|
"excessively annoying" and multiple occurrences of such could
|
|||
|
then be voted on by the Network for possible EXCOMMUNICATION of
|
|||
|
the offending Node.
|
|||
|
|
|||
|
Choosing who runs Node 1/9 is a sensitive subject, since
|
|||
|
that person could theoretically tamper with things. There's
|
|||
|
simply going to have to be SOME kind of trust out there.
|
|||
|
|
|||
|
This is not a full overview, as I am trying to limit the
|
|||
|
size of this column. Replies, questions, comments, etc. contact
|
|||
|
me as STEVE HOSKIN at Node 1:128/31. I'd love to see this thing
|
|||
|
implemented. I'd even write the software. :-)
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 5-13 Page 28 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
NOTICES
|
|||
|
=================================================================
|
|||
|
|
|||
|
The Interrupt Stack
|
|||
|
|
|||
|
|
|||
|
16 May 1988
|
|||
|
Digital Equipment Corporations Users Society Spring Symposium.
|
|||
|
Will be held May 16-May 20 in Cincinnati, OH.
|
|||
|
|
|||
|
25 Jun 1988
|
|||
|
EuroCon II starts in Tiel, Holland. Sponsored by the Dutch
|
|||
|
Hobby Computer Club. Will run for 2 days. Contact Hans
|
|||
|
Lichthelm at 2:2/999 for information.
|
|||
|
|
|||
|
16 Jul 1988
|
|||
|
A new areacode, 508, will form in eastern Massachusetts and
|
|||
|
will be effective on this date. The new area code will be
|
|||
|
formed from the current areacode 617. Greater Boston will
|
|||
|
remain areacode 617 while the rest of eastern Massachusetts
|
|||
|
will form the new areacode 508.
|
|||
|
|
|||
|
25 Aug 1988
|
|||
|
Start of the Fifth International FidoNet Conference, to be
|
|||
|
held at the Drawbridge Inn in Cincinnati, OH. Contact Tim
|
|||
|
Sullivan at 108/62 for more information. This is FidoNet's big
|
|||
|
annual get-together, and is your chance to meet all the people
|
|||
|
you've been talking with all this time. We're hoping to see
|
|||
|
you there!
|
|||
|
|
|||
|
24 Aug 1989
|
|||
|
Voyager 2 passes Neptune.
|
|||
|
|
|||
|
|
|||
|
If you have something which you would like to see on this
|
|||
|
calendar, please send a message to FidoNet node 1:1/1.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
Christopher Baker
|
|||
|
MetroFire - 135/14 (18/0)
|
|||
|
|
|||
|
Effective 22 Mar 88, my working hours will be changed
|
|||
|
from day shift to afternoon shift. Those of you used to
|
|||
|
reaching me in the A.M. should make a note of my new
|
|||
|
schedule.
|
|||
|
|
|||
|
You may contact me from 1430-2230, Tuesday-Saturday, at
|
|||
|
305-596-8576.
|
|||
|
|
|||
|
Thanks.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
Latest Software Versions
|
|||
|
FidoNews 5-13 Page 29 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
BBS Systems Node List Other
|
|||
|
& Mailers Version Utilities Version Utilities Version
|
|||
|
|
|||
|
Dutchie 2.80 EditNL 3.3 ARC 5.21
|
|||
|
Fido 12g* MakeNL 2.03 ARCmail 1.1
|
|||
|
Opus 1.03b Prune 1.40 ConfMail 3.31
|
|||
|
SEAdog 4.10 XlatList 2.86* EchoMail 1.31
|
|||
|
TBBS 2.0M MGM 1.1
|
|||
|
BinkleyTerm 1.40*
|
|||
|
QuickBBS 1.02
|
|||
|
|
|||
|
* Recently changed
|
|||
|
|
|||
|
Utility authors: Please help keep this list up to date by
|
|||
|
reporting new versions to 1:1/1. It is not our intent to list
|
|||
|
all utilities here, only those which verge on necessity.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 30 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
__
|
|||
|
The World's First / \
|
|||
|
BBS Network /|oo \
|
|||
|
* FidoNet * (_| /_)
|
|||
|
_`@/_ \ _
|
|||
|
| | \ \\
|
|||
|
| (*) | \ ))
|
|||
|
______ |__U__| / \//
|
|||
|
/ Fido \ _//|| _\ /
|
|||
|
(________) (_/(_|(____/ (tm)
|
|||
|
|
|||
|
Membership for the International FidoNet Association
|
|||
|
|
|||
|
Membership in IFNA is open to any individual or organization that
|
|||
|
pays a specified annual membership fee. IFNA serves the
|
|||
|
international FidoNet-compatible electronic mail community to
|
|||
|
increase worldwide communications.
|
|||
|
|
|||
|
Member Name _______________________________ Date _______________
|
|||
|
Address _________________________________________________________
|
|||
|
City ____________________________________________________________
|
|||
|
State ________________________________ Zip _____________________
|
|||
|
Country _________________________________________________________
|
|||
|
Home Phone (Voice) ______________________________________________
|
|||
|
Work Phone (Voice) ______________________________________________
|
|||
|
Zone:Net/Node Number ____________________________________________
|
|||
|
BBS Name ________________________________________________________
|
|||
|
BBS Phone Number ________________________________________________
|
|||
|
Baud Rates Supported ____________________________________________
|
|||
|
Board Restrictions ______________________________________________
|
|||
|
Your Special Interests __________________________________________
|
|||
|
_________________________________________________________________
|
|||
|
_________________________________________________________________
|
|||
|
In what areas would you be willing to help in FidoNet? __________
|
|||
|
_________________________________________________________________
|
|||
|
_________________________________________________________________
|
|||
|
Send this membership form and a check or money order for $25 in
|
|||
|
US Funds to:
|
|||
|
International FidoNet Association
|
|||
|
c/o Leonard Mednick, MBA, CPA
|
|||
|
700 Bishop Street, #1014
|
|||
|
Honolulu, Hawaii 96813-4112
|
|||
|
USA
|
|||
|
|
|||
|
Thank you for your membership! Your participation will help to
|
|||
|
insure the future of FidoNet.
|
|||
|
|
|||
|
Please NOTE that IFNA is a general not-for-profit organization
|
|||
|
and Articles of Association and By-Laws were adopted by the
|
|||
|
membership in January 1987. The first elected Board of Directors
|
|||
|
was filled in August 1987. The IFNA Echomail Conference has been
|
|||
|
established on FidoNet to assist the Board. We welcome your
|
|||
|
input to this Conference.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 5-13 Page 31 28 Mar 1988
|
|||
|
|
|||
|
|
|||
|
INTERNATIONAL FIDONET ASSOCIATION
|
|||
|
ORDER FORM
|
|||
|
|
|||
|
Publications
|
|||
|
|
|||
|
The IFNA publications can be obtained by downloading from Fido
|
|||
|
1:1/10 or other FidoNet compatible systems, or by purchasing
|
|||
|
them directly from IFNA. We ask that all our IFNA Committee
|
|||
|
Chairmen provide us with the latest versions of each
|
|||
|
publication, but we can make no written guarantees.
|
|||
|
|
|||
|
Hardcopy prices as of October 1, 1986
|
|||
|
|
|||
|
IFNA Fido BBS listing $15.00 _____
|
|||
|
IFNA Administrative Policy DOCs $10.00 _____
|
|||
|
IFNA FidoNet Standards Committee DOCs $10.00 _____
|
|||
|
|
|||
|
SUBTOTAL _____
|
|||
|
|
|||
|
IFNA Member ONLY Special Offers
|
|||
|
|
|||
|
System Enhancement Associates SEAdog $60.00 _____
|
|||
|
SEAdog price as of March 1, 1987
|
|||
|
ONLY 1 copy SEAdog per IFNA Member
|
|||
|
|
|||
|
Fido Software's Fido/FidoNet $100.00 _____
|
|||
|
Fido/FidoNet price as of November 1, 1987
|
|||
|
ONLY 1 copy Fido/FidoNet per IFNA Member
|
|||
|
|
|||
|
International orders include $10.00 for
|
|||
|
surface shipping or $20.00 for air shipping _____
|
|||
|
|
|||
|
SUBTOTAL _____
|
|||
|
|
|||
|
HI. Residents add 4.0 % Sales tax _____
|
|||
|
|
|||
|
TOTAL _____
|
|||
|
|
|||
|
SEND CHECK OR MONEY ORDER IN US FUNDS:
|
|||
|
International FidoNet Association
|
|||
|
c/o Leonard Mednick, MBA, CPA
|
|||
|
700 Bishop Street, #1014
|
|||
|
Honolulu, HI. 96813-4112
|
|||
|
USA
|
|||
|
|
|||
|
Name________________________________
|
|||
|
Zone:Net/Node____:____/____
|
|||
|
Company_____________________________
|
|||
|
Address_____________________________
|
|||
|
City____________________ State____________ Zip_____
|
|||
|
Voice Phone_________________________
|
|||
|
|
|||
|
Signature___________________________
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|