1790 lines
84 KiB
Plaintext
1790 lines
84 KiB
Plaintext
![]() |
Volume 7, Number 41 8 October 1990
|
|||
|
+---------------------------------------------------------------+
|
|||
|
| _ |
|
|||
|
| / \ |
|
|||
|
| /|oo \ |
|
|||
|
| - FidoNews - (_| /_) |
|
|||
|
| _`@/_ \ _ |
|
|||
|
| FidoNet (r) | | \ \\ |
|
|||
|
| International BBS Network | (*) | \ )) |
|
|||
|
| Newsletter ______ |__U__| / \// |
|
|||
|
| / FIDO \ _//|| _\ / |
|
|||
|
| (________) (_/(_|(____/ |
|
|||
|
| (jm) |
|
|||
|
+---------------------------------------------------------------+
|
|||
|
Editor in Chief: Vince Perriello
|
|||
|
Editors Emeritii: Thom Henderson, Dale Lovell
|
|||
|
Chief Procrastinator Emeritus: Tom Jennings
|
|||
|
|
|||
|
Copyright 1990, Fido Software. All rights reserved. Duplication
|
|||
|
and/or distribution permitted for noncommercial purposes only.
|
|||
|
For use in other circumstances, please contact Fido Software.
|
|||
|
|
|||
|
FidoNews is published weekly by the System Operators of the
|
|||
|
FidoNet (r) International BBS Network. It is a compilation of
|
|||
|
individual articles contributed by their authors or authorized
|
|||
|
agents of the authors. The contribution of articles to this
|
|||
|
compilation does not diminish the rights of the authors.
|
|||
|
|
|||
|
You are encouraged to submit articles for publication in
|
|||
|
FidoNews. Article submission standards are contained in the file
|
|||
|
ARTSPEC.DOC, available from node 1:1/1. 1:1/1 is a Continuous
|
|||
|
Mail system, available for network mail 24 hours a day.
|
|||
|
|
|||
|
Fido and FidoNet are registered trademarks of Tom Jennings of
|
|||
|
Fido Software, Box 77731, San Francisco CA 94107, USA and are
|
|||
|
used with permission.
|
|||
|
|
|||
|
Opinions expressed in FidoNews articles are those of the authors
|
|||
|
and are not necessarily those of the Editor or of Fido Software.
|
|||
|
Most articles are unsolicited. Our policy is to publish every
|
|||
|
responsible submission received.
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
1. ARTICLES ................................................. 1
|
|||
|
EchoPol Revisited ........................................ 1
|
|||
|
Conserve paper with 2 sided printing ..................... 14
|
|||
|
Call New York Update #1 .................................. 16
|
|||
|
General Elections in Zone 4 .............................. 17
|
|||
|
Summary of FidoCon in Zone 5 ............................. 19
|
|||
|
Home Schooling Echo on the Backbone ...................... 23
|
|||
|
Loglan Language and Echo ................................. 24
|
|||
|
MACINTOSH ALTERNATIVE CONNECTIONS LIST (MACLIST) - UPDA .. 26
|
|||
|
OTHERNET NEWS ............................................ 29
|
|||
|
2. LATEST VERSIONS .......................................... 30
|
|||
|
And more!
|
|||
|
FidoNews 7-41 Page 1 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
ARTICLES
|
|||
|
=================================================================
|
|||
|
|
|||
|
Introducing the Old Echomail Policy
|
|||
|
George Peace
|
|||
|
1:1/0
|
|||
|
|
|||
|
Many of us have seen the document. Many use it every day to help
|
|||
|
us choreograph the flow of echomail. But until a real Echomail
|
|||
|
Policy is enacted as a formal Zone 1 Policy, we're all simply
|
|||
|
operating the backbone; moderating our conferences; and choosing
|
|||
|
our Echomail Coordinators independently, inconsistently, and
|
|||
|
without administrative support.
|
|||
|
|
|||
|
Echopol isn't perfection -- Policy never does seem to be. Some
|
|||
|
parts of it give some of us heartburn while others evoke our
|
|||
|
applause. What most of us do agree on is the need to enact an
|
|||
|
Echomail Policy. The Zone 1 Region Echomail Coordinators have
|
|||
|
banded together to offer the April 1989 Echopol to the Zone 1
|
|||
|
Coordinator for adoption. I've joined them in this effort after
|
|||
|
witnessing and even being part of situations that would have had
|
|||
|
a much different outcome if we'd finished the job we started 18
|
|||
|
months ago.
|
|||
|
|
|||
|
So what we've proposed is that the document be adopted as the
|
|||
|
Zone 1 General Echomail Policy effective October 22, 1990. For
|
|||
|
the first 60 days following its adoption, Zone 1 will operate
|
|||
|
under that Policy. During that time, the Zone 1 RECs will accept
|
|||
|
our constructive comments and requests for change. Comments and
|
|||
|
RFCs will be accepted by any Zone 1 REC in a two part Situation /
|
|||
|
Solution format that includes a proposed change to the Policy. At
|
|||
|
the end of the 60 day period, the RECs will work with change
|
|||
|
submitters, Conference Moderators, and NECs to determine which
|
|||
|
solutions/changes will be implemented. A *C/*EC ratification
|
|||
|
referendum for the revised EchoPol will be conducted between
|
|||
|
January 15 and January 31. If that referendum fails, the Zone 1
|
|||
|
Echomail Coordinator will coordinate efforts to submit another
|
|||
|
document for ratification.
|
|||
|
|
|||
|
The document presented here is also available for file request
|
|||
|
as ECHOPOL from 1:1/0, 1:157/200, 1:12/12, 1:13/13, 1:114/5,
|
|||
|
1:322/1, 1:105/310+311+312, 1:151/1003, 1:382/1, and 1:396/1.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
GENERAL ECHOMAIL POLICY 1.0
|
|||
|
October 22nd, 1990
|
|||
|
|
|||
|
|
|||
|
FidoNews 7-41 Page 2 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
PROLOGUE
|
|||
|
|
|||
|
This document sets forth policy governing Echomail conferences
|
|||
|
and their distribution.
|
|||
|
|
|||
|
If any item in this policy is in conflict with any existing or
|
|||
|
subsequent General FidoNet Policy, then General FidoNet Policy
|
|||
|
will be in effect.
|
|||
|
|
|||
|
This Policy applies to Zone One Backbone Echomail conferences and
|
|||
|
to any other conferences for which the Moderator desires it to be
|
|||
|
applicable.
|
|||
|
|
|||
|
Future changes to Echo Policy may be proposed by any FidoNet
|
|||
|
Sysop by submitting the proposal to their REC. The REC will then
|
|||
|
determine if the proposal should be brought before the rest of
|
|||
|
the RECs. If an REC decides not to bring a proposed change
|
|||
|
before the rest of the RECs, a message stating why must be sent.
|
|||
|
If 10% or more of the NCs and NECs in a region request that a
|
|||
|
proposal be brought before the RECs then that proposal must be
|
|||
|
submitted to the RECs.
|
|||
|
|
|||
|
A majority vote of the Regional Echomail Coordinators is required
|
|||
|
in order for a proposal to be formally voted on. If 10% or more
|
|||
|
of the NCs and NECs in the Zone request that a proposal be
|
|||
|
formally voted on, then that proposal must be formally voted on.
|
|||
|
|
|||
|
Those eligible to vote on any proposals made by the REC structure
|
|||
|
will be the ZEC, RECs, NECs, NCs, RCs and ZC. Only one vote per
|
|||
|
person is allowed. Adoption of changes will require a simple
|
|||
|
majority of those voting to pass.
|
|||
|
|
|||
|
In this document, "a simple majority" means more than 50 percent
|
|||
|
of those voting. A good faith attempt must be made to make all
|
|||
|
potential voters aware that a vote is occurring and make
|
|||
|
available all necessary information.
|
|||
|
|
|||
|
|
|||
|
I. HISTORY
|
|||
|
|
|||
|
Echomail consists of the sharing of message bases or conferences
|
|||
|
between various independent network addresses. The Echomail
|
|||
|
concept started with a series of programs by Jeff Rush. Since
|
|||
|
the original implementation, many authors have written programs
|
|||
|
improving on the original idea. In spite of worries that the
|
|||
|
flow of Echomail would increase Netmail traffic to the point that
|
|||
|
the Network would collapse under its own weight, Echomail has
|
|||
|
been a success. To simplify the distribution of Echomail, a
|
|||
|
national Echomail Backbone formed whose primary purpose is the
|
|||
|
distribution of Echomail at a national level. Of recent
|
|||
|
introduction to the Backbone system has been the generous
|
|||
|
contribution of the Echomail Stars. As a result of the growth of
|
|||
|
Fidonet and the increase in the volume of Echomail, it has become
|
|||
|
necessary to set forth a formal policy governing Echomail.
|
|||
|
|
|||
|
FidoNews 7-41 Page 3 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
II. DEFINITIONS
|
|||
|
|
|||
|
1. ECHOMAIL: The process of sharing message bases between
|
|||
|
independent systems with unique net/node addresses.
|
|||
|
|
|||
|
2. ECHOMAIL CONFERENCES: An Echomail conference is a message
|
|||
|
base of forum design distributed under a specified conference
|
|||
|
name dealing with a defined area of interest. Notable examples
|
|||
|
include TECH, the National Technical Conference and COMM, the
|
|||
|
National Telecommunications Conference.
|
|||
|
|
|||
|
3. MODERATED CONFERENCE: A moderated conference is an Echomail
|
|||
|
conference for which a moderator has been appointed to supervise
|
|||
|
the flow and content of the conference. All conferences carried
|
|||
|
on the Backbone must be moderated.
|
|||
|
|
|||
|
4. SYSOP-ONLY CONFERENCE: A Sysop-Only Conference is one in
|
|||
|
which the Moderator has decided that the conference will be made
|
|||
|
available only to Sysops and not to users.
|
|||
|
|
|||
|
5. RESTRICTED DISTRIBUTION CONFERENCES: A restricted
|
|||
|
distribution conference is one which is restricted only to
|
|||
|
eligible recipients. Notable examples include REGCON, the
|
|||
|
Regional Coordinators Conference, COORD, the National Echomail
|
|||
|
Coordinators Conference, and MAGICK, a pre-register Echomail
|
|||
|
Conference.
|
|||
|
|
|||
|
6. ZONE ECHOMAIL COORDINATOR (ZEC): This individual is
|
|||
|
responsible for coordination of Echomail on a FidoNet Zone level.
|
|||
|
|
|||
|
7. REGIONAL ECHOMAIL COORDINATOR (REC): This individual is
|
|||
|
responsible for coordination of Echomail within his region.
|
|||
|
|
|||
|
8. NET ECHOMAIL COORDINATOR (NEC): This individual is
|
|||
|
responsible for coordination of Echomail at the Local Net level.
|
|||
|
|
|||
|
9. ECHOMAIL Backbone: The Echomail Backbone consists of
|
|||
|
voluntary members who provide services to enhance the national
|
|||
|
distribution of Echomail. The Backbone consists of nodes which
|
|||
|
handle a high volume of Echomail traffic and are responsible for
|
|||
|
distribution of Echomail down to the regional level.
|
|||
|
|
|||
|
10. NATIONAL ECHOMAIL LIST: The National Echomail List
|
|||
|
identifies the available national conferences, the conference
|
|||
|
moderator and requirements of the specified conference. The ZEC
|
|||
|
will appoint the keeper of the National Echomail List.
|
|||
|
|
|||
|
11. AUTOMATED CENSORSHIP: The term Automated Censorship refers
|
|||
|
to programs which cause messages to be removed from the intended
|
|||
|
conference or have their content altered.
|
|||
|
|
|||
|
FidoNews 7-41 Page 4 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
12. FIDONET POLICY: The document which governs Fidonet as
|
|||
|
adopted by Fidonet. The document as of this writing is Policy4
|
|||
|
and is subject to change. This policy is intended to become a
|
|||
|
part of general Fidonet policy. Until it is incorporated into
|
|||
|
General Fidonet policy, this document shall serve to define
|
|||
|
policy violations occurring in Echomail.
|
|||
|
|
|||
|
13. OPEN ACCESS CONFERENCE: This is a non-restricted conference
|
|||
|
open to all users who are willing to follow the posted conference
|
|||
|
rules.
|
|||
|
|
|||
|
14. TERMINAL NODE: A system which does not process echomail for
|
|||
|
pickup by another system.
|
|||
|
|
|||
|
|
|||
|
III. DUTIES OF ECHOMAIL COORDINATORS
|
|||
|
|
|||
|
1. GENERAL: It is the duty of the *ECs to make available to any
|
|||
|
Fidonet Sysop, any conference which the Sysop is not prohibited
|
|||
|
from receiving by not meeting requirements as mandated by the
|
|||
|
conference moderator. If for any reason the *EC does not have
|
|||
|
access via recognized distribution channels to a specific
|
|||
|
conference, they can not be expected to pass it on. If a *EC
|
|||
|
fails to make available any conference to qualified lower
|
|||
|
distribution levels, this shall be deemed to have violated the
|
|||
|
outlined duties of the position held. Such violation is cause
|
|||
|
for the removal as provided by this document. Nothing in this
|
|||
|
provision requires that a *EC must import any conference to the
|
|||
|
extent of adverse economic impact. It is recommended that cost
|
|||
|
sharing arrangements be employed. Where financially feasible for
|
|||
|
the supplier any conference on the Backbone must be made
|
|||
|
available (other than restricted conferences) when requested.
|
|||
|
|
|||
|
An exception is when a *EC cuts a link to end unauthorized
|
|||
|
distribution of a conference. In this case, some otherwise
|
|||
|
authorized nodes may temporarily lose their link.
|
|||
|
|
|||
|
A *EC shall do everything in their power to insure that:
|
|||
|
|
|||
|
1. All downstream links are educated as to this policy.
|
|||
|
|
|||
|
2. Downstream links know how to properly link into
|
|||
|
conferences.
|
|||
|
|
|||
|
3. Acceptable and unacceptable behavior in echomail
|
|||
|
conferences is explained.
|
|||
|
|
|||
|
4. Downstream links are not engaging in topologies that
|
|||
|
increase the risk of duplicate messages.
|
|||
|
|
|||
|
2. DUTIES OF ZONE ECHOMAIL COORDINATOR: It is the duty of the
|
|||
|
ZEC to coordinate the connections between the Echomail Backbone
|
|||
|
on both an inter-Zone and intra-Zone level as well as
|
|||
|
coordination of inter-regional connections. The ZEC will
|
|||
|
coordinate transmission of Echomail and to provide for routing in
|
|||
|
a manner that will avoid the transmission of duplicate messages
|
|||
|
FidoNews 7-41 Page 5 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
within the same conference. It is also the duty of the ZEC to
|
|||
|
monitor compliance with this policy on both a national and
|
|||
|
international basis.
|
|||
|
|
|||
|
3. DUTIES OF REGIONAL ECHOMAIL COORDINATOR: It is the duty of
|
|||
|
the REC to provide for regional Echomail distribution. In
|
|||
|
addition, the REC will coordinate any inter-regional
|
|||
|
cross-linking of conference feeds with the REC of the
|
|||
|
participating region with the direct knowledge of the ZEC. The
|
|||
|
REC will provide for transmission and routing of Echomail within
|
|||
|
his/her region in a manner to avoid creation of duplicate
|
|||
|
messages within the same conference. It is the duty of the REC
|
|||
|
to monitor compliance with this policy at a regional level.
|
|||
|
|
|||
|
4. DUTIES OF NET ECHOMAIL COORDINATOR: It is the duty of the
|
|||
|
NEC to coordinate the intra-net Echomail and to cooperate with
|
|||
|
the REC and NECs of other nets to arrange for the inter-net
|
|||
|
transmittal of echomail. The REC may require the NEC to provide
|
|||
|
links for independent (regional) nodes. The NEC shall maintain a
|
|||
|
list of available Echomail Conferences within the net as well as
|
|||
|
the requirements of each Conference area as supplied by the
|
|||
|
conference moderator (Echolist). The NEC shall also monitor
|
|||
|
compliance with this policy at a net level.
|
|||
|
|
|||
|
5. DUTIES OF ECHOLIST COORDINATOR: It is the duty of the
|
|||
|
Echolist Coordinator to compile and make available a listing of
|
|||
|
national and international Echomail conferences and optionally,
|
|||
|
conferences at various local levels. The content and format of
|
|||
|
the Echomail listing shall be at the sole discretion of the
|
|||
|
Echolist Coordinator, but shall include the conference name and
|
|||
|
moderator for each conference. The Echolist Coordinator shall
|
|||
|
also maintain a list of requirements applicable to each listed
|
|||
|
conference.
|
|||
|
|
|||
|
6. DUTIES OF ECHOMAIL CONFERENCE MODERATOR: It shall be the
|
|||
|
duty of the Echomail Conference Moderator to make in good faith
|
|||
|
every reasonable effort to insure that the moderated conference
|
|||
|
does not distribute or promote illegal activities or information
|
|||
|
as defined below in Section V Paragraph 2. The Moderator shall
|
|||
|
be responsible for insuring that messages contained in the
|
|||
|
conference corresponds to the conference theme. The Moderator
|
|||
|
shall report any violations of this policy to the proper Echomail
|
|||
|
coordinators and lodge any appropriate policy complaints as
|
|||
|
provided for in policy documents adopted by Fidonet. The
|
|||
|
Moderator shall post the conference rules in the conference at
|
|||
|
least once a month. The Moderator is to authorize the
|
|||
|
disconnection of the conference feed. Any Sysop the moderator
|
|||
|
believes is violating policy shall be reported to the offending
|
|||
|
node's nearest local echomail coordinator (may be a NEC, REC or
|
|||
|
in extreme situations a ZEC); and the moderator shall formally
|
|||
|
authorize the feed to the offending node to be severed. The
|
|||
|
conference moderator is the sole judge, subject to review only by
|
|||
|
the ZEC (or his delegates), if a complaint is filed by the
|
|||
|
banished party. The Moderator may request in direct written form
|
|||
|
(netmail) that the *ECs disconnect a node from the conference
|
|||
|
when that node refuses to follow the published conference rules
|
|||
|
FidoNews 7-41 Page 6 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
after at least 3 warnings. Knowingly feeding a conference to a
|
|||
|
node that has been severed by the Moderator is considered a
|
|||
|
violation of this echomail policy and is subject to suspension.
|
|||
|
The length of this suspension will be determined by a joint
|
|||
|
decision of the conference moderator and the nearest local echo
|
|||
|
coordinator of the node illegally feeding the conference to the
|
|||
|
original offending node or point.
|
|||
|
|
|||
|
Echo conference complaints from a Sysop should be filed at the
|
|||
|
net level (NEC) or if the complaining party is an independent
|
|||
|
node then with their REC. The NEC or REC receiving such a
|
|||
|
complaint must take action in accordance with the provisions of
|
|||
|
this echomail policy.
|
|||
|
|
|||
|
For severe or chronic infractions the NEC, REC or ZEC may file a
|
|||
|
complaint under general Fidonet policy for excessively annoying
|
|||
|
behaviour.
|
|||
|
|
|||
|
|
|||
|
IV. APPOINTMENT AND ELECTION OF ECHOMAIL COORDINATORS AND
|
|||
|
MODERATORS
|
|||
|
|
|||
|
1. GRANDFATHER CLAUSE: Those Zone, Regional, and Net Echomail
|
|||
|
Coordinators and Echomail Coordinators currently holding these
|
|||
|
positions as of the date of acceptance of this Echomail Policy
|
|||
|
shall continue to serve in said capacity until resignation or
|
|||
|
replacement under this policy.
|
|||
|
|
|||
|
2. ELECTION OF ZONE ECHOMAIL COORDINATOR: The ZEC shall be
|
|||
|
elected as follows:
|
|||
|
|
|||
|
a) upon resignation or replacement of the existing ZEC,
|
|||
|
the FidoNet Zone Coordinator (ZC) shall nominate at
|
|||
|
least five individuals to be voted upon.
|
|||
|
|
|||
|
b) 10 days after the nominees are selected, an election
|
|||
|
shall be held. The ZEC will be elected by a simple
|
|||
|
majority of IC, ZC, RCs, NCs, RECs, and NECs in their
|
|||
|
Fidonet zone. An individual holding more than one
|
|||
|
position can only cast one vote. That is, if an
|
|||
|
individual is both a NC and a NEC, they may cast only
|
|||
|
one vote.
|
|||
|
|
|||
|
3. ELECTION OF REGIONAL ECHOMAIL COORDINATOR: The REC shall be
|
|||
|
elected as follows:
|
|||
|
|
|||
|
a) upon resignation or replacement of an existing REC,
|
|||
|
the ZEC shall nominate at least 3 individuals for
|
|||
|
election.
|
|||
|
|
|||
|
b) 10 days after the nominees are selected, an election
|
|||
|
FidoNews 7-41 Page 7 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
shall be held. The REC will be elected by a simple
|
|||
|
majority of the RC, NCs and NECs in their FidoNet
|
|||
|
Region. An individual holding more than one position
|
|||
|
may only cast one vote.
|
|||
|
|
|||
|
4. NET ECHOMAIL COORDINATOR: The NEC shall be appointed by the
|
|||
|
FidoNet Net Coordinator (NC) or in such alternative manner as
|
|||
|
determined by the NC. If a NEC is not appointed within 30 days,
|
|||
|
the REC will appoint the NEC.
|
|||
|
|
|||
|
5. REMOVAL OF A *EC: A *EC may be removed from their position\
|
|||
|
by a simple majority of those allowed to vote for their
|
|||
|
successor. For a NEC, the members of the Net may vote by simple
|
|||
|
majority to remove the NEC. The position directly above (in the
|
|||
|
*EC structure) will oversee the recall election in the same
|
|||
|
manner as prescribed for electing successors.
|
|||
|
|
|||
|
A *EC may only be subject to recall for failure to properly carry
|
|||
|
out their duties described above, or if they are no longer a
|
|||
|
member of Fidonet. A promise of 'free' echomail delivery from
|
|||
|
another source is *not* considered an acceptable reason for
|
|||
|
recall.
|
|||
|
|
|||
|
A *EC may be removed by the level above for continued violations
|
|||
|
of policy or for gross misconduct.
|
|||
|
|
|||
|
6. RECOGNITION OF CONFERENCES: The *EC corresponding to the
|
|||
|
appropriate level recognizes a conference at his level.
|
|||
|
Examples: The NEC recognizes a conference as local. The REC
|
|||
|
recognizes a conference to be regional. A ZEC recognizes a
|
|||
|
conference to be zonal.
|
|||
|
|
|||
|
7. REMOVAL OF AN ECHOMAIL CONFERENCE MODERATOR: An Echomail
|
|||
|
Conference Moderator may be removed from their position by a
|
|||
|
three fourths (3/4) vote of the *EC structure voting. This vote
|
|||
|
must be carried out in a fair and decent manner while giving at
|
|||
|
least ten (10) days notice to the entire *EC structure of the
|
|||
|
upcoming vote.
|
|||
|
|
|||
|
The ZEC shall notify the RECs who in turn shall notify the NECs
|
|||
|
in their region of any upcoming vote. Notice must be given via
|
|||
|
NetMail. Additional postings in such conferences as COORD and
|
|||
|
regional conferences are encourgaged.
|
|||
|
|
|||
|
An Echomail Conference Moderator may only be subject to recall
|
|||
|
for failure to properly carry out their duties described above or
|
|||
|
continued pre-meditated violation of this documents section V.
|
|||
|
Statement of Policies as seen below. Failing to perform the
|
|||
|
above duties of a conference moderator for a period of 3 or more
|
|||
|
months and/or failing to designate a proxy in his absence shall
|
|||
|
be in violation of this policy and be subject to recall. A vote
|
|||
|
may only be callable by the ZEC (or his delegate). This delegate
|
|||
|
should not be from the region or net of the affected conference
|
|||
|
moderator.
|
|||
|
|
|||
|
FidoNews 7-41 Page 8 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Membership in Fidonet need not be a paramount issue, but is
|
|||
|
highly recommended.
|
|||
|
|
|||
|
|
|||
|
V. STATEMENT OF POLICIES
|
|||
|
|
|||
|
1. BASIC ECHOMAIL POLICY: The basic policy of Echomail is to
|
|||
|
promote communication in Echomail Conferences in a lawful,
|
|||
|
friendly manner consistent with the general principles of
|
|||
|
FidoNet.
|
|||
|
|
|||
|
2. PROHIBITION ON ILLEGAL ACTIVITIES: Any Node which knowingly
|
|||
|
distributes or allows to be entered into echomail conferences any
|
|||
|
messages containing or promoting illegal activities or
|
|||
|
information shall be deemed to have violated general FidoNet
|
|||
|
policy as being excessively annoying. As used in this paragraph,
|
|||
|
"illegal activities" includes activities which are a violation of
|
|||
|
civil law as well as activities which would result in criminal
|
|||
|
prosecution.
|
|||
|
|
|||
|
3. AUTOMATED CENSORSHIP: The use of Automated Censorship in the
|
|||
|
passing or distribution of echomail will be considered a
|
|||
|
violation of this policy and will not be tolerated. Disciplinary
|
|||
|
action will be as referred to in General Fidonet policy as being
|
|||
|
excessively annoying.
|
|||
|
|
|||
|
An exception to this provision shall be the deletion and not
|
|||
|
censorship of messages by any Sysop which may lead to legal
|
|||
|
action against that Sysop.
|
|||
|
|
|||
|
No echomail shall be modified in any manner which could
|
|||
|
potentially cause duplicates.
|
|||
|
|
|||
|
4. INTER-NETWORK CONFERENCES: Inter-Net conferences shall
|
|||
|
conform to general Fidonet policy as well as the provisions of
|
|||
|
this policy document in addition to any foreign network's
|
|||
|
provisions. Conferences which originate outside of FidoNet must
|
|||
|
be designated as such in the list of conferences kept by the
|
|||
|
Echolist Coordinator.
|
|||
|
|
|||
|
5. CHARGING FOR DISTRIBUTION: Any entity which makes a profit
|
|||
|
from the distribution (passing from system to system) of echomail
|
|||
|
shall be deemed to be excessively annoying and in violation of
|
|||
|
Fidonet policy subject to enforcement under existing Fidonet
|
|||
|
policy. Profit as defined in this paragraph is the charging for
|
|||
|
echomail distribution that exceeds actual cost to obtain and
|
|||
|
distribute the Echomail over a sustained period. The cost of the
|
|||
|
equipment used to obtain and distribute echomail may only be
|
|||
|
recovered on a strictly voluntary basis. A Sysop that charges
|
|||
|
users for access to their BBS shall NOT be in violation of this
|
|||
|
paragraph.
|
|||
|
|
|||
|
FidoNews 7-41 Page 9 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Implementation of cost recovery plans may vary greatly. In
|
|||
|
general cost recovery plans should not be overly restrictive.
|
|||
|
|
|||
|
6. RESTRICTED DISTRIBUTION CONFERENCES: Participating Nodes
|
|||
|
shall honor and support the restrictions placed upon restricted
|
|||
|
distribution conferences. Violation of this restriction by
|
|||
|
individual nodes and points shall be a violation of this echomail
|
|||
|
policy and result in suspension of the violated echo in
|
|||
|
accordance with the above paragraph in Section III Duties of the
|
|||
|
Echomail Conference Moderators.
|
|||
|
|
|||
|
A Sysop-only conference shall be made available only to the
|
|||
|
Sysops or Co-Sysops of Fidonet or other nets with which inter-net
|
|||
|
conferences exist.
|
|||
|
|
|||
|
A violation of the restrictions placed on a RESTRICTED
|
|||
|
DISTRIBUTION CONFERENCE will be a violation of this policy if and
|
|||
|
only if the moderator has posted and specified the restrictions
|
|||
|
governing the conference.
|
|||
|
|
|||
|
7. PATHLINE OPTION: The PATHline (as defined in FTS-0004),
|
|||
|
originally implemented by SEA in the MGM package, is recommended
|
|||
|
for all nodes. If your current Echomail scanner supports the
|
|||
|
pathline you should enable it. While the pathline does not
|
|||
|
eliminate duplicate messages, it can be a very useful tool in
|
|||
|
determining where a topology problem exists.
|
|||
|
|
|||
|
Systems operating as Echomail Stars, Backbone nodes, or Echomail
|
|||
|
Hubs must implement the PATHline option (as defined in FTS-0004
|
|||
|
within 30 days of adoption of this policy. Since these system
|
|||
|
are operating beyond the scope of the typical FidoNet system,
|
|||
|
they are required to implement features that are otherwise
|
|||
|
optional.
|
|||
|
|
|||
|
8. SEEN-BY LINE: Under the current technology and topology (the
|
|||
|
routing structure of echomail), SEEN-BY lines play an important
|
|||
|
part in reducing duplicate messages. Tiny SEEN-BYs will not be
|
|||
|
allowed until the respective ZECs feel topology will allow their
|
|||
|
use. Nor will the stripping of SEEN-BYs (except Zone-Gates and
|
|||
|
Inter-Network EchoGates) be allowed unless approved by the ZEC.
|
|||
|
|
|||
|
Violation of the above shall be excessively annoying behavior
|
|||
|
enforceable under general Fidonet policy. Zone-Gates and Inter-
|
|||
|
Network EchoGates SHOULD strip the SEEN-BYs of the exporting Zone
|
|||
|
or Network to reduce addressing conflicts.
|
|||
|
|
|||
|
9. COUNTERFEIT MESSAGES: Entering or knowingly distributing
|
|||
|
counterfeit messages shall be considered excessively annoying and
|
|||
|
a violation of Fidonet policy enforceable under the terms of
|
|||
|
Fidonet policy. As used in this paragraph, a counterfeit message
|
|||
|
is defined as any message entered using another person's name,
|
|||
|
handle or node address with the intent of deceiving others about
|
|||
|
the true author of the message. No handles shall be used to
|
|||
|
enter messages to knowingly provoke, inflame, or upset
|
|||
|
participants in a conference with the purpose of deceiving others
|
|||
|
about the true identity of the author.
|
|||
|
FidoNews 7-41 Page 10 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
10. SYSOP'S RESPONSIBILITY: It is the responsibility of each
|
|||
|
Sysop to make every reasonable effort to assure that the users on
|
|||
|
his board conform to the provisions of this policy document. A
|
|||
|
Sysop may be held responsible for the acts of his users unless
|
|||
|
the Sysop can show that a reasonable attempt was made to conform
|
|||
|
to this policy document.
|
|||
|
|
|||
|
11. ECHOMAIL SOFTWARE: Echomail software which does not conform
|
|||
|
to the minimum acceptable standards as defined by the Fidonet
|
|||
|
Technical Standards Committee (FTSC) shall lead to disciplinary
|
|||
|
action as described previously in this document.
|
|||
|
|
|||
|
12. HOST ROUTING OF ECHOMAIL: Host routing of Echomail without
|
|||
|
the prior consent of both the Sending and Receiving Hosts shall
|
|||
|
lead to disciplinary action as described previously in this
|
|||
|
document. See Section III.
|
|||
|
|
|||
|
13. INTER-NETWORK CONFERENCES: It is the general policy of
|
|||
|
Fidonet to encourage the development of INTER-NETWORK
|
|||
|
CONFERENCES. It shall be the duty of those providing the
|
|||
|
INTER-NETWORK CONFERENCE links to remove foreign net distribution
|
|||
|
identifiers which will adversely effect the distribution of the
|
|||
|
Echomail Conference while in Fidonet. The INTER-NETWORK
|
|||
|
CONFERENCE links maintained in Fidonet shall be operated in a
|
|||
|
manner not to interfere with the foreign network's distribution
|
|||
|
of Echomail. INTER-NETWORK CONFERENCE links maintained in
|
|||
|
FidoNet must also conform to General FidoNet Policy.
|
|||
|
|
|||
|
14. DEFAMATORY POSTING: The posting of any DEFAMATORY MESSAGE
|
|||
|
other than in conferences dedicated to this purpose (i.e. FLAME)
|
|||
|
shall lead to disciplinary action as described previously in this
|
|||
|
document. See Section III. The posting of substantiated facts
|
|||
|
shall not be considered a violation under this section.
|
|||
|
|
|||
|
15. ADDING OR REMOVING CONFERENCES FROM THE BACKBONE:
|
|||
|
|
|||
|
A conference may be added to the Backbone only at the request of
|
|||
|
the RECOGNIZED Conference Moderator. A conference must be
|
|||
|
registered with the Echolist Coordinator before it can be added
|
|||
|
to the Backbone.
|
|||
|
|
|||
|
A conference may be removed from the Backbone by lack of traffic.
|
|||
|
|
|||
|
The recognized conference moderator may, at their discretion,
|
|||
|
request removal from the backbone any conference that same
|
|||
|
moderator initially placed in backbone distribution.
|
|||
|
|
|||
|
16. TOPOLOGY and DUPLICATE MESSAGES: Cross Regional links
|
|||
|
should be avoided as they increase the risk of improper linking
|
|||
|
and generation of duplicate messages. Cross Regional links may
|
|||
|
only be established with the knowledge of the REC in both
|
|||
|
regions. The REC must be notified prior to or at the time of the
|
|||
|
link being established. If an REC determines that a cross
|
|||
|
regional link is contributing to the creation of duplicate
|
|||
|
messages, the REC may request that the link be terminated.
|
|||
|
|
|||
|
FidoNews 7-41 Page 11 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
The use of the PATHline option is required for all out of region
|
|||
|
links.
|
|||
|
|
|||
|
If a sysop has a prior history of creating duplicate messages
|
|||
|
because of out of region links, the REC may require prior
|
|||
|
notification and approval before an out of region link can be
|
|||
|
established.
|
|||
|
|
|||
|
Cross Regional links are permitted without notifcation if one of
|
|||
|
those systems is a dead-end. Should the status of this link
|
|||
|
change, then notification is required.
|
|||
|
|
|||
|
Each REC will do their best to make available high speed hubs,
|
|||
|
out of state hubs, PC Pursuit hubs, etc, to facilitate the low
|
|||
|
cost, efficient movement of mail within their respective Region.
|
|||
|
|
|||
|
Any Sysop who willfully and knowingly establishes links that
|
|||
|
either create duplicate loops (topology that creates circular
|
|||
|
feeds) or who refuses to break such links upon request by their
|
|||
|
NEC, REC or ZEC shall be subject to disciplinary action as
|
|||
|
described previously in this document. See Section III.
|
|||
|
|
|||
|
17. MESSAGE STANDARDS: Until the adoption of a superceding
|
|||
|
standard by the Fidonet Technical Standards Committee, the
|
|||
|
following Echomail message standards are recommended:
|
|||
|
|
|||
|
a) Eight-bit characters (ASCII 128-255) and non-printing
|
|||
|
low-order codes (ASCII 2-31) are prohibited, except the
|
|||
|
use of 8Dh(soft <CR> character) per FTS-0004. This is
|
|||
|
not intended to discourage participation of foreign
|
|||
|
zones or networks, which may permit said characters.
|
|||
|
Any echomail processor should pass information exactly
|
|||
|
as it was received, without stripping any non-standard
|
|||
|
characters.
|
|||
|
|
|||
|
b) Origin lines should be limited to 79 characters
|
|||
|
including the required ending of a proper network
|
|||
|
address (i.e. Zone:Net/Node.Point with zone and point
|
|||
|
being optional).
|
|||
|
|
|||
|
c) Tear lines should be limited to 35 characters
|
|||
|
including the required "--- " lead-in. These should
|
|||
|
only contain packer or editor program identification.
|
|||
|
Tear lines for message editors are discouraged. If an
|
|||
|
editor adds a tear line, it should also add an origin
|
|||
|
line to avoid multiple tear lines.
|
|||
|
|
|||
|
d) "Extra" origin lines (ZoneGating) are limited to
|
|||
|
essential information only. This consists of the
|
|||
|
required lead-in plus the network name "Gateway" and
|
|||
|
optionally the software ID followed by a Zone:Net/Node
|
|||
|
FidoNews 7-41 Page 12 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
address. Example: " * Origin: FidoNet Gateway (TComm
|
|||
|
88:372/666)"
|
|||
|
|
|||
|
e) SEEN-BY addresses should be in sorted order.
|
|||
|
Multiple AKA's are not allowed in SEEN-BY lines unless
|
|||
|
you have more than one address which processes mail. Or
|
|||
|
for one month during change of an existing address (to
|
|||
|
avoid duplicates to the previous address). Node 0
|
|||
|
addresses should not be used for echomail distribution.
|
|||
|
|
|||
|
f) All current FTSC specifications must be followed.
|
|||
|
|
|||
|
|
|||
|
VI. ENFORCEMENT
|
|||
|
|
|||
|
Enforcement of this policy document shall be under the provisions
|
|||
|
of General FidoNet policy. Complaints concerning Echomail
|
|||
|
violations defined under this policy may be filed by the
|
|||
|
aggrieved individual, the conference moderator or by any level of
|
|||
|
Echomail Coordinator to the appropriate *C level. All complaints
|
|||
|
made pursuant to this policy must be made within 60 days of the
|
|||
|
date of occurrence or discovery. Complaints shall be filed under
|
|||
|
the provisions of General Fidonet Policy, with a copy to the
|
|||
|
respective *EC.
|
|||
|
|
|||
|
Enforcement is immediate, with any currently existing software
|
|||
|
allowed 60 days to conform (from the date EchoPol1 goes into
|
|||
|
effect). A 30 day extension may be granted solely at the
|
|||
|
discretion of the ZEC if efforts to bring about compliance are
|
|||
|
clear. Continued use of aberrant software after this period
|
|||
|
shall be deemed excessively annoying.
|
|||
|
|
|||
|
|
|||
|
VII. ADOPTION OF POLICY
|
|||
|
|
|||
|
1. ADOPTION: This policy shall become effective upon
|
|||
|
ratification by a simple majority of those voting. Those
|
|||
|
eligible to vote shall be the IC, ZCs, RCs, NCs, ZECs, RECs, and
|
|||
|
NECs. Those individuals holding more than one position can cast
|
|||
|
only one vote.
|
|||
|
|
|||
|
2. GRANDFATHER CLAUSE: Within 60 days of adoption of this
|
|||
|
policy, moderators shall be appointed for all existing Echomail
|
|||
|
Conferences which do not now have a moderator. Moderators shall
|
|||
|
be appointed by the ZEC from those volunteering as moderator or
|
|||
|
if no volunteer is available then the ZEC shall request and
|
|||
|
appoint a moderator for the conference. In the case where more
|
|||
|
than one individual claims to be the conference moderator and no
|
|||
|
agreement can be reached, the ZEC may order the conference
|
|||
|
retired and ban the further use of the specific conference name.
|
|||
|
Failure of the individuals to retire the conference name shall be
|
|||
|
deemed excessively annoying behavior.
|
|||
|
|
|||
|
FidoNews 7-41 Page 13 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
VI. BACKBONE STRUCTURE
|
|||
|
|
|||
|
This section is for information purposes only. It gives a plain
|
|||
|
English description of the current structure and operation of the
|
|||
|
Backbone. The ZEC may change this structure without amending
|
|||
|
this document.
|
|||
|
|
|||
|
At the top of the Echomail distribution network, there are
|
|||
|
systems commonly called Stars. These systems are usually
|
|||
|
dedicated to passing Echomail. The stars operate at the
|
|||
|
discretion and direction of the ZEC. At the time of this writing
|
|||
|
there are 3 stars, each has a backup system/plan in the event of
|
|||
|
a failure. In general, the Stars link to one another and feed the
|
|||
|
RECs.
|
|||
|
|
|||
|
The RECs are then responsible for distribution of the echomail
|
|||
|
within their Region. Normally, the REC will feed the NECs in
|
|||
|
that region.
|
|||
|
|
|||
|
The NEC is responsible for distribution of Echomail to the
|
|||
|
individual Sysops within a net.
|
|||
|
|
|||
|
Note that the RECs and NECs can appoint Hubs to help in the
|
|||
|
distribution of Echomail. That is, they do not have to directly
|
|||
|
feed the lower level.
|
|||
|
|
|||
|
This is the distribution GOAL. Because of less expensive phone
|
|||
|
rates and other reasons, this distribution method is not followed
|
|||
|
exactly. Any change to the above requires agreement of the *EC's
|
|||
|
involved. All *ECs will use all the tools at their disposal,
|
|||
|
such as hubs, high speed modems, ROA, Wide Area Calling plans, PC
|
|||
|
Pursuit, corporate sponsorship, etc., to provide fast, efficient,
|
|||
|
and cost effective movement of echomail.
|
|||
|
|
|||
|
|
|||
|
Echopol Committee
|
|||
|
|
|||
|
Mike Ratledge
|
|||
|
Norm Henke
|
|||
|
Rick McWilliams
|
|||
|
Barry Shatswell
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 14 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Dave "who likes to jump out of airplanes" Appel
|
|||
|
Just a user on 1:231/30
|
|||
|
|
|||
|
[bych mode on]
|
|||
|
Personally, I'm getting sick and tired of all the non-
|
|||
|
computer-related articles appearing in FidoNews. Especially
|
|||
|
the ones by the eco-freaks, the left-wing-commie-pinko-
|
|||
|
conspiracy-theorists, either side of the abortion issue, and
|
|||
|
30K .GIF files of some stranger's ugly mug. (However, an
|
|||
|
occasional missing child announcement is fine by me.) If you
|
|||
|
can't relate it to computers, or the network, find someplace
|
|||
|
else to publish it, please. I even prefer bashing/defending
|
|||
|
the editor about LHARC versus ARC than the completely off-topic
|
|||
|
junk.
|
|||
|
[bych mode off]
|
|||
|
|
|||
|
Well, here's how conservation CAN be applied by computer
|
|||
|
users. Print on both sides of the paper.
|
|||
|
|
|||
|
As an arch-conservative anal-retentive capitalist pig I
|
|||
|
see it as a way to save dollars on my paper costs. Bottom
|
|||
|
line, you know. For you tree-hugging vegetarian
|
|||
|
environmentally correct eco-geeks, you might even save a few
|
|||
|
trees so you can continue your smug sense of moral superiority.
|
|||
|
|
|||
|
There are several utilities that are specific to certain
|
|||
|
printers or to certain word processing packages. There are
|
|||
|
even utilities to split text files into 2 files, one containing
|
|||
|
odd-number pages, and the other containing even-number pages.
|
|||
|
|
|||
|
An example of such an "evironmentally conscious" (cost
|
|||
|
conscious to me) utility is 4PRINT for the HP LaserJet. It
|
|||
|
prints 4 66-line pages per sheet of paper, 2 each, front and
|
|||
|
back. You have to run the paper through twice. It's shareware.
|
|||
|
|
|||
|
Some word processors such as XYWRITE have built-in macros
|
|||
|
for printing odd and even pages.
|
|||
|
|
|||
|
The LaserJet IID prints on both sides of the paper, but
|
|||
|
not many people have these printers. For the rest of us, we
|
|||
|
need to print the odd pages, turn the paper around, feed it
|
|||
|
back into the printer, then print the even pages.
|
|||
|
|
|||
|
The lazy way that I used to print documentation was to:
|
|||
|
COPY myfile.DOC LPT1
|
|||
|
|
|||
|
Since I decided to do double sided printing, I always
|
|||
|
bring the doc file into my word processor and print it from
|
|||
|
there, where I have control over which pages to print.
|
|||
|
|
|||
|
MS-Word 5.0 doesn't have a built-in macro to do this so I
|
|||
|
wrote my own. Here it is:
|
|||
|
|
|||
|
FidoNews 7-41 Page 15 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
<Ctrl PgDn><up><up><Ctrl Esc>jp[SET lastpage = field]<Esc>
|
|||
|
[ASK pageno=?Enter starting page]
|
|||
|
[WHILE pageno <= lastpage]
|
|||
|
<Ctrl Esc>po<down><down><down><down>p<right>[pageno]
|
|||
|
<enter><enter>
|
|||
|
[SET pageno=pageno+2]
|
|||
|
[ENDWHILE]
|
|||
|
|
|||
|
You need to substitute the "[" and "]" symbols with the
|
|||
|
chevrons by pressing Control-[ and Control-]. (The chevrons
|
|||
|
are special characters, 174 and 175, that ARTSPEC.DOC says not
|
|||
|
to include in FidoNews articles.) You can store this macro in
|
|||
|
your macro glossary. Load your paper, run the macro, tell it
|
|||
|
page "1", when the printing is done, reload the paper
|
|||
|
backwards, run the macro, tell it page "2".
|
|||
|
|
|||
|
If you do everything right, and your printer doesn't jam,
|
|||
|
you just cut your paper usage in half, with only about an extra
|
|||
|
42.5 seconds of effort. If something goes wrong, like a
|
|||
|
printer jam, or you re-edit the document in between printing
|
|||
|
the two sides (thereby shifting the page breaks), you just
|
|||
|
screwed up the whole thing, wasted even more time, and wasted
|
|||
|
more paper than you were going to save in the first place.
|
|||
|
|
|||
|
Another benefit of two-sided printing is that when the
|
|||
|
document becomes obsolete, you aren't tempted to keep it around
|
|||
|
as clutter hoping to someday use the blank side as scrap paper.
|
|||
|
You can chuck the whole thing with the satisfaction of knowing
|
|||
|
that you squeezed every last use out of it, or you can even
|
|||
|
(*gasp*) recycle it.
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 16 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Ronnie Toth
|
|||
|
FidoNet 1:135/71
|
|||
|
October 3, 1990
|
|||
|
|
|||
|
** CALLNY Update **
|
|||
|
|
|||
|
We've done it!
|
|||
|
|
|||
|
CALLNY is on the FidoNet backbone now and all you have to do is
|
|||
|
pester your wonderful NEC to get it for you! He can then pester
|
|||
|
his/her also wonderful REC and there you are! You can be in New
|
|||
|
York too!
|
|||
|
|
|||
|
TAG: CALLNY
|
|||
|
Topic: Anything New York
|
|||
|
Moderator: Ronnie Toth FidoNet 1:135/71
|
|||
|
|
|||
|
We will be listed in ELIST011.
|
|||
|
|
|||
|
For those who called the two originating systems, thank you.
|
|||
|
This should make it simple for all.
|
|||
|
|
|||
|
An official thank you goes to:
|
|||
|
Ray Vaughan who started the whole ball rolling
|
|||
|
|
|||
|
Michele Hamilton who taught me how to go about echo-making and
|
|||
|
assisted whenever needed. (Lots.)
|
|||
|
Amnon Nissan who freely gave words of encouragement
|
|||
|
John Cottrell More words of encouragement
|
|||
|
Fabian Gordon More words of encouragement and the spreader
|
|||
|
of the word up NY way
|
|||
|
Roger Bonenfant Our first actual NY link, (even though he's
|
|||
|
in NJ)
|
|||
|
|
|||
|
Thank you one and all. See ya in NY!
|
|||
|
Ronnie
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 17 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Pablo Kleinman
|
|||
|
FidoNet 4:4/0
|
|||
|
General Elections in Zone 4
|
|||
|
Elecciones Generales en la Zona 4
|
|||
|
Eleicoes Gerais na Zona 4
|
|||
|
|
|||
|
As the result of an agreement reached by ZC4 and the rest of
|
|||
|
Zone 4's coordinators, on November 9th 1990 the members of
|
|||
|
FidoNet Zone 4 "Latin America" will be able to vote for the
|
|||
|
renovation of the whole coordination structure of the zone, and
|
|||
|
elect Network coordinators, Region coordinators and Zone
|
|||
|
coordinator.
|
|||
|
|
|||
|
The procedures defined for the democratic election process are
|
|||
|
the following:
|
|||
|
|
|||
|
- All the FidoNet members will be able to present themselves as
|
|||
|
candidates to a single coordination position, by sending netmail
|
|||
|
to Elecciones at node 4:4/444 until October 20th, stating the
|
|||
|
position they intend to run for.
|
|||
|
|
|||
|
- On October 21st, the list of all candidates will be published
|
|||
|
on the official echomail conference LATIN.SYSOP and on October
|
|||
|
22nd, on FidoNews. From then until the voting closes on November
|
|||
|
9th, the candidates will be able to debate ideas on the
|
|||
|
LATIN.SYSOP echo, as well as on the other region and local
|
|||
|
sysops' echomail conferences.
|
|||
|
|
|||
|
- From October 22nd until November 9th, all the members of
|
|||
|
FidoNet Zone 4 will be able to vote for the different candidates
|
|||
|
-voting for a someone that is not a candidate will void the
|
|||
|
entire ballot- for the domain where the member is registered (for
|
|||
|
example, a FidoNet member in Net 900 can vote for NC 900, RC 90
|
|||
|
and ZC 4), and they will do so by sending a message to Elecciones
|
|||
|
at node 4:4/444, whose subject will be a special "secret
|
|||
|
password" and the text will indicate the different choices. THE
|
|||
|
VOTE IS SECRET, AND ITS CONTAINTS WILL NEVER BE REVEALED. This is
|
|||
|
an example of how a ballot must be issued:
|
|||
|
|
|||
|
secret password
|
|||
|
From: Pedro Picapiedras (4:900/789) |
|
|||
|
To: Elecciones (4:4/444) |
|
|||
|
Subj: piedradura <----------------| text
|
|||
|
|
|
|||
|
NC: Johny Tolengo <---------------------|
|
|||
|
RC: Isidoro Canones
|
|||
|
ZC: Juancho Lagarto
|
|||
|
|
|||
|
- The results from the election will be published on November
|
|||
|
11th on the official echomail conference LATIN.SYSOP and on
|
|||
|
November 12th on FidoNews. A comprehensive list with every ballot
|
|||
|
listed, to grant the accurateness of the results, will be posted
|
|||
|
on November 11th on the echomail conference LATIN.SYSOP. This is
|
|||
|
an example of how a ballot will be published in the comprehensive
|
|||
|
list:
|
|||
|
|
|||
|
FidoNews 7-41 Page 18 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Password NC RC ZC Status
|
|||
|
-----------------------------------------------------------------
|
|||
|
piedradura J.Tolengo I.Canones J.Lagarto OK
|
|||
|
|
|
|||
|
will say "VOID" if the ballot is not correct-----------|
|
|||
|
|
|||
|
|
|||
|
- The newly elected coordinators will take over their new
|
|||
|
positions with the nodelist update of November 16th.
|
|||
|
|
|||
|
|
|||
|
Pablo Kleinman
|
|||
|
Latin American FidoNet Coordinator
|
|||
|
Buenos Aires, October 3, 1990
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 19 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Niel Uys
|
|||
|
FidoNet 5:5/200
|
|||
|
|
|||
|
FIDOCON 1990 - ZONE 5
|
|||
|
|
|||
|
Held on 7 September 1990 to 9 September 1990
|
|||
|
|
|||
|
It is with great pleasure, that I will try and give you a
|
|||
|
summary of what actually happened at FidoCon 1990! Yes, you
|
|||
|
would ask, what was the fuzz all about, but let me tell you, it
|
|||
|
was a great thrill to meet and actually see the faces behind the
|
|||
|
messages, that we so often take for granted.
|
|||
|
|
|||
|
First and foremost, I would like to thank Grahamstown, and
|
|||
|
particularly the Rhodes people, for their hospitality, and all
|
|||
|
the arrangements they made, to please all the delegates, that
|
|||
|
attended the convention...the very first held on the African
|
|||
|
continent!
|
|||
|
|
|||
|
At 08:00, we all got registered for the convention, and everybody
|
|||
|
start to take there seats, while the camera-man puts up his video
|
|||
|
equipment to record everything to be said and done.
|
|||
|
|
|||
|
First of all, we had Henk Wolsink, our Zone 5 Coordinator,
|
|||
|
opening the very first convention, in Zone 5. He introduced
|
|||
|
himself, and mentioned the fact that two speakers couldn't make
|
|||
|
it. They were Anthony Walker and Stephan Davies. Fortunately,
|
|||
|
Anthony knew beforehand, that he would probably not make it, and
|
|||
|
made a video tape, for all to watch, during the convention. He
|
|||
|
was also the chairman for the first session till tea time.
|
|||
|
|
|||
|
He then talked a bit about the history of FidoNet, and particular
|
|||
|
, how it started in Southern Africa. He also mentioned how
|
|||
|
FidoNet grew throughout the world, and how it affected sysops in
|
|||
|
Zone 5.
|
|||
|
|
|||
|
Then he introduced the Grand Daddy of FidoNet Zone5, Bryan
|
|||
|
Haefele, who gave a thorough speech about the history of FidoNet
|
|||
|
in the now called Zone 5 area. It is just a pitty that this
|
|||
|
speech was not recorded properly, as the sound of the video
|
|||
|
camera, was not on for this and the next session...but never the
|
|||
|
less, the people that were there, would hopefully not forget the
|
|||
|
history lesson.
|
|||
|
|
|||
|
Pat Terry, better known to his students as Professor Terry, gave
|
|||
|
us a very in depth insight on UFGATE, and how the interfaces
|
|||
|
between UNIX boxes and FidoNet works. He also talked about the
|
|||
|
specific connections between zone 1 and zone 5, where Randy Bush
|
|||
|
was providing the porting of UNIX networks to the zone 1
|
|||
|
zonegate, then sending it to Rhodes, using the normal FidoNet
|
|||
|
dial-up links.
|
|||
|
|
|||
|
FidoNews 7-41 Page 20 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Then we had tea...and I got lost while trying to find the lecture
|
|||
|
room again :-)
|
|||
|
|
|||
|
After tea, and discovering that the camera failed to record sound
|
|||
|
of the previous session, Pat Terry, the chairman of the second
|
|||
|
session, introduced Randy Bush, the main speaker of the
|
|||
|
convention.
|
|||
|
|
|||
|
Pat mentioned about his relationship with Randy, and how he got
|
|||
|
stuck into Modula-2, first with the Apple II computers, and
|
|||
|
later the bigger buggers.
|
|||
|
|
|||
|
Randy started off with, a bit of history (again:-) on FidoNet,
|
|||
|
but talked about Tom Jennings, the father of FidoNet, and how
|
|||
|
FidoNet started, with his program called Fido (because it was
|
|||
|
such a dog of a program <grin>). Randy mentioned when he got
|
|||
|
involved, and mentioned Ben Baker, also one of the pioneers of
|
|||
|
the olden days.
|
|||
|
|
|||
|
He talked about how regions, and later zones started all over the
|
|||
|
world, to reduce cost mainly as well as to make distribution more
|
|||
|
effective. Echomail was also mentioned and how the first echo's
|
|||
|
came about.
|
|||
|
|
|||
|
IFNA was also mentioned, and what the reason was, why it was
|
|||
|
started. Echomail wars also started, and IFNA eventually
|
|||
|
collapsed.
|
|||
|
|
|||
|
He then mentioned the fact that many non-clone machines were used
|
|||
|
to port FidoNet software, and those users writing their own
|
|||
|
software, etc.
|
|||
|
|
|||
|
Politics power and policy, is probably one of the biggest
|
|||
|
problems in FidoNet, Randy mentioned. Zone 5 will have to get
|
|||
|
more countries connected, so as to change perspective of the rest
|
|||
|
of the FidoNet world.
|
|||
|
|
|||
|
He talked about all the various zones, and how they operated.
|
|||
|
Also the fact that zone 3 will split up in to zone 3 and 6 in a
|
|||
|
friendly manner, also to concentrate the mail links, etc. Zone 4
|
|||
|
has a big problem financially, while zone 2 seems the most
|
|||
|
organised.
|
|||
|
|
|||
|
He then also talked about various other networks, and the fact
|
|||
|
that FidoNet addressing, were not very intelligent, compared to
|
|||
|
UUCP, etc. For instance, sending a message to
|
|||
|
USA.ORIGON.PORTLAND.RANDY would make more sense, than sending
|
|||
|
it to 1:105/42! This makes sense to me, but might not to others,
|
|||
|
etc.
|
|||
|
|
|||
|
Bitnet, was for instance based on the IBM proprietary protocols,
|
|||
|
using 7 bit data bytes, etc. USENET is not a network, and all
|
|||
|
networks receiving USENET news files, actually belongs to USENET,
|
|||
|
like FidoNet!
|
|||
|
|
|||
|
FidoNews 7-41 Page 21 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Internet was also discussed, and RFC's a bit explained, as well
|
|||
|
as the current FTS documents, which are to become RFC's
|
|||
|
eventually.
|
|||
|
|
|||
|
Vic Shaw, of the FRD, was then summoned to give his talk on
|
|||
|
Uninet. He explained, that the relation between Uninet and
|
|||
|
Fidonet was excellent. Uninet's mission is to, development,
|
|||
|
implementation and promotion of an academic and research computer
|
|||
|
network in Southern Africa. This means, that it's intended for
|
|||
|
use by Universities, and higher education institutions, etc.
|
|||
|
This network, is of course sponsored by the FRD (Federation for
|
|||
|
Research and Development).
|
|||
|
|
|||
|
He then gave credit to FidoNet, which made UNINET into what it is
|
|||
|
today, although, FidoNet (Zone 5) got quite a few benefits,
|
|||
|
financially, from Uninet as well.
|
|||
|
|
|||
|
Anthony Walker's tape was then played, where he gave us a chat
|
|||
|
about his COMNET system, and how it is interfaced with BELTEL,
|
|||
|
the local prestel dailup system, operated by the P&T.
|
|||
|
|
|||
|
We all, then partook in a general discussion, about FidoNet in
|
|||
|
general, and ways and means in expanding FidoNet, to the lower
|
|||
|
levels, like schools, etc.
|
|||
|
|
|||
|
Lunch was then served at the 1820 Settlers Monument building.
|
|||
|
|
|||
|
The Chairman for the afternoon, was Dave Pedler, who is the
|
|||
|
region 49 Coordinator. He introduced himself, and talked about
|
|||
|
how zone 5's *C sysops were elected and appointed, when Zone 5
|
|||
|
got off the ground in September 1989, etc.
|
|||
|
|
|||
|
Henk Wolsink, our Zone 5 Coordinator, was then called to give his
|
|||
|
talk about Zone 5, and how it started, etc. The discussion then
|
|||
|
also turned to why and when points and super users (users using
|
|||
|
Silver Xpress or XRS) are used, the pros and cons thereof.
|
|||
|
|
|||
|
I then stepped in to give a chat on how echomail links are
|
|||
|
connected throughout Zone 5 and the rest of the world. We also
|
|||
|
discussed a bit of history on Zone 5, and what made echomail to
|
|||
|
be 'magic'.
|
|||
|
|
|||
|
All Zone 5 *C sysops then gathered at the Hotel (Not to drink
|
|||
|
:-), but to discuss various aspects of the network, mostly
|
|||
|
difficult to sort out over the network itself.
|
|||
|
|
|||
|
1. We basically decided that Henk should keep on being the ZC
|
|||
|
for Zone 5 for another year, unless someone has a complaint
|
|||
|
about him:-)
|
|||
|
|
|||
|
2. We also decided, not to allow a Beltel gateway for FidoNet,
|
|||
|
FidoNews 7-41 Page 22 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
unless it is going to be READ-ONLY on the BELTEL side.
|
|||
|
|
|||
|
3. Changing of echo tags like ECHOMAIL, which was always
|
|||
|
confusing to users.
|
|||
|
|
|||
|
4. We also decided to follow Randy Bush's advice in changing
|
|||
|
pick-up and poll times for echomail, excluding the zonegate.
|
|||
|
This will have a drastic effect on the turnaround time of
|
|||
|
all echomail in Zone 5.
|
|||
|
|
|||
|
We then drank ourselves, under the table, while the other crowed
|
|||
|
looked at the Rhodes computer equipment, until the dinner in the
|
|||
|
same Hotel. No, not really, we just sat there waiting for them
|
|||
|
:-)
|
|||
|
|
|||
|
And so the day came to a halt? No, we still had a very nice
|
|||
|
dinner, and it carried on till very late. We had some photo
|
|||
|
sessions, we even had food! Very nice too, although, I can't
|
|||
|
remember what we ate, as it was more interesting to chat to each
|
|||
|
other, about...PC's and computers and FidoNet and BBS's...what
|
|||
|
else? :-)
|
|||
|
|
|||
|
Anyway, to rap it up, I personally think it was a great success,
|
|||
|
and I would like to thank each and everyone, attending FidoCon
|
|||
|
1990. I sure hope to see you all, and many more, with the next
|
|||
|
FidoCon.
|
|||
|
|
|||
|
Also great thanks to Rhodes, for hosting the convention, and for
|
|||
|
the FRD, who sponsored Randy's visit to our Zone. Also many
|
|||
|
thanks to Randy to take the trouble in getting the FidoCon...
|
|||
|
great to have had you here, Randy!
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 23 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
C.Lee Duckert & Bruce A. Casner
|
|||
|
FidoNet 1:139/600
|
|||
|
|
|||
|
HOMESCHOOL - WHO WOULD DO THAT!
|
|||
|
|
|||
|
A Home Schooling Echo Conference (HOMESCHL) is available on the
|
|||
|
backbone. There are many reasons for educating children at home.
|
|||
|
In fact, there are more reasons for educating children at home
|
|||
|
than there are parents.
|
|||
|
|
|||
|
Who teaches their children at home? There are families who
|
|||
|
travel or are living overseas. Some think there is too much or
|
|||
|
too little religion in the public schools. Some live too far out
|
|||
|
even for school buses to reach them. Still others think that
|
|||
|
learning and education are two separate activities. Large
|
|||
|
families, families with an only child, single parents, the rich,
|
|||
|
the poor, professors and high school drop-outs, atheists and fun-
|
|||
|
damentalists, capitalists and socialists --- the only things
|
|||
|
homeschoolers seem to have in common is a particularly strong
|
|||
|
(but varying) view of the importance of their families and a com-
|
|||
|
mitment to that oldest form of education - learning at home.
|
|||
|
|
|||
|
The laws regarding home schooling vary from state to state and
|
|||
|
are always changing. Basically, it is legal. Some localities
|
|||
|
require curriculum plans filed with school boards and overseen by
|
|||
|
certified teachers. Others only require an attendance sheet
|
|||
|
(after all, only school attendance is mandated). Alaska provides
|
|||
|
home schools with materials and California provides assistance
|
|||
|
from the local school district; but in most states, you are on
|
|||
|
your own. Some states require testing or external evaluations.
|
|||
|
Children who re-enter traditional schools have been doing quite
|
|||
|
well.
|
|||
|
|
|||
|
This echo is available for all who wish to share ideas, support
|
|||
|
one another, ask questions and answer them, adults and
|
|||
|
"students". Child development issues, curricula and methods of
|
|||
|
dealing with the legal requirements from state to state have all
|
|||
|
come up for discussion. (Arguments about religion, politics not
|
|||
|
relating to homeschool issues or the role of public education
|
|||
|
already have their own echoes and need not call in here.) If you
|
|||
|
have a child, may some day have a child, know a child or were a
|
|||
|
child and ever learned or wished to learn anything, homeschooling
|
|||
|
might interest you.
|
|||
|
|
|||
|
There have been several local echoes across the country dealing
|
|||
|
with home schools and we are trying to unite them. Voice mes-
|
|||
|
sages can reach us in the evening (Central Time) at (414)722-
|
|||
|
4046.
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 24 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Rob Duff
|
|||
|
FidoNet 1:153/713
|
|||
|
Loglan Language, Loglan Echo
|
|||
|
|
|||
|
I recently became involved with learning the Loglan language
|
|||
|
and I decided to support the Loglan Institute by submitting an
|
|||
|
article about the language in FIDONEWS. James Cooke Brown, the
|
|||
|
creator of Loglan has given me permission to upload the
|
|||
|
following article. I have also created a one node ECHO for "lo
|
|||
|
logli" (loglan people) called as you probably guessed LOGLAN. It
|
|||
|
is available at 1:153/713.
|
|||
|
|
|||
|
I first heard of Loglan in R.A.Heinlein's book "The Moon Is
|
|||
|
A Harsh Mistress". When I saw their advertisement in Scientific
|
|||
|
American magazine, I immediately called the Institute and asked
|
|||
|
for a price list. When the list came I sent away for just about
|
|||
|
everything. I am now in the process of learning the language.
|
|||
|
|
|||
|
If you are interested in Loglan, please contact me or the
|
|||
|
Institute.
|
|||
|
|
|||
|
Rob Duff 1:153/713
|
|||
|
|
|||
|
What is Loglan?[1]
|
|||
|
|
|||
|
Loglan[2] is a speakable, human language originally designed
|
|||
|
to serve as a test of the Sapir-Whorf hypothesis that the
|
|||
|
structure of local human languages places local constraints on
|
|||
|
the development of human thought, and hence, on human cultures.
|
|||
|
If this hypothesis is correct, a language which "lifted" those
|
|||
|
constraints--that is to say, which reduced them to some formal
|
|||
|
minimum--should in a certain sense "release" the human mind from
|
|||
|
these ancient linguistic bonds and, in any case, have notable
|
|||
|
effects on both individual thinking and on the development of a
|
|||
|
global human culture.
|
|||
|
|
|||
|
Since its original development in the late 1950's and 1960's
|
|||
|
Loglan has acquired certain other properties that make it
|
|||
|
interesting to computer science, principally (1) its total
|
|||
|
freedom from syntactic ambiguity. This feature of the language,
|
|||
|
together with with (2) its audio-visual "isomorphism" (which
|
|||
|
means that the Loglan speechstream breaks up automatically into
|
|||
|
fully punctuated strings of separate words) and (3) its
|
|||
|
borrowing algorithm (by which the International Scientific
|
|||
|
Vocabulary goes into Loglan virtually ad libitum) makes it an
|
|||
|
ideal medium for three uses: (i) for international information
|
|||
|
storage and retrieval, (ii) for machine-aided translation
|
|||
|
between natural languages, and (iii) for spontaneous
|
|||
|
interaction between computer-users and their machines. Finally,
|
|||
|
Loglan is (4) culturally and politically neutral in the sense
|
|||
|
that its basic predicate vocabulary has been engineered to be
|
|||
|
maximally memorable to speakers of the eight most widely spoken
|
|||
|
languages: English, Chinese, Hindi, Russian, Spanish, French,
|
|||
|
Japanese and German.
|
|||
|
|
|||
|
FidoNews 7-41 Page 25 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
All these features taken together have suggested to many
|
|||
|
loglanists that their adopted language is ideally suited to
|
|||
|
become a second language for the world. For others, conducting a
|
|||
|
scientific test of the Whorf hypothesis with Loglan has the
|
|||
|
highest priority. For still others, its use at the
|
|||
|
human/machine interface is the most challenging role for Loglan
|
|||
|
in the years ahead.
|
|||
|
|
|||
|
[1] Reprinted with permission
|
|||
|
[2] Loglan is a registered trademark of
|
|||
|
The Loglan Institute, Inc.
|
|||
|
|
|||
|
|
|||
|
Books, software, tapes, membership in the institute,
|
|||
|
and other items are available from:
|
|||
|
|
|||
|
The Loglan Institute, Inc.
|
|||
|
A Non-Profit Research Corporation
|
|||
|
1701 Northeast 75th Street
|
|||
|
Gainesville FL 32601
|
|||
|
U.S.A
|
|||
|
(904) 371-9574
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 26 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Ralph Merritt
|
|||
|
1:269/102
|
|||
|
Tom Heffernan
|
|||
|
1:107/554
|
|||
|
|
|||
|
On October 27, 1989, a new, MacIntosh oriented network was
|
|||
|
formed. Named the 'MacIntosh Alternative Connection List',
|
|||
|
MACLIST was established in the last remaining single-digit
|
|||
|
Zone address, Zone 6.
|
|||
|
|
|||
|
The current MACLIST nodelist is available to all interested.
|
|||
|
Just file request 'MACLIST.ARC' from 1:107/554 or 1:269/102.
|
|||
|
|
|||
|
Why was MACLIST formed? There are several reasons we decided
|
|||
|
to form the MacIntosh Alternative Connection List. Here are
|
|||
|
some that inspired us to form MACLIST:
|
|||
|
|
|||
|
o The MacIntosh is rapidly entering the world of computer
|
|||
|
networking. MacIntoshes are located in many different
|
|||
|
networks, but how to find them? The MACLIST nodelist
|
|||
|
is a centralized source for you to communicate with
|
|||
|
other MacIntoshes - simply compile the MACLIST nodelist!
|
|||
|
|
|||
|
o The MacIntosh community has many unique aspects. The
|
|||
|
MACLIST is a network for Mac sysops, and their users,
|
|||
|
to join together and address MacIntosh issues that
|
|||
|
affect us all, examine the technology, discuss topics
|
|||
|
and disseminate information of interest to the
|
|||
|
MacIntosh community.
|
|||
|
|
|||
|
o Need a MacIntosh echo connection? Files? Looking for
|
|||
|
'Mac compatibility' (SEAlink transfer protocols and
|
|||
|
WaZOO FREQs)? Check MACLIST for a system near you ...
|
|||
|
the MacIntosh Alternative Connection, an independent
|
|||
|
network on the move.
|
|||
|
|
|||
|
If you are running a MacIntosh system, or a system dedicated
|
|||
|
to MacIntosh users (the MACLIST is not necessarily composed
|
|||
|
100% of systems that are physically running on MacIntoshes,
|
|||
|
but a member must have a system dedicated/oriented to the
|
|||
|
MacIntosh user), and are interested in joining the MACLIST,
|
|||
|
please contact one of us at our addresses listed below!
|
|||
|
|
|||
|
If you are interested in MACLIST, you might want to get a
|
|||
|
MACSYSOP feed to keep in touch with other Mac sysops. In
|
|||
|
the summer of 1990, MACSYSOP was added to the "Fidonet
|
|||
|
Backbone", so it should be available in your local network.
|
|||
|
If it is not, please contact one of us below and we'll help
|
|||
|
you locate a source. You do not have to carry MACSYSOP to
|
|||
|
be a member in MACLIST.
|
|||
|
|
|||
|
FidoNews 7-41 Page 27 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Here are our answers to some of the questions we have been
|
|||
|
receiving:
|
|||
|
|
|||
|
Q: Why did you chose Zone 6 for MACLIST?
|
|||
|
A: The Tabby mailer for the MacIntosh does not have the
|
|||
|
capability to use two-digit zone addresses. We therefore
|
|||
|
do not have a choice in Zone selection. Zone 6 is the
|
|||
|
last remaining unoccupied single-digit Zone address, and
|
|||
|
we do not wish to intrude on another network's Zone or
|
|||
|
encounter the technical problems associated with a
|
|||
|
'shared Zone'. It is our hope that 'Other Nets' will
|
|||
|
respect our position and recognize why MACLIST is
|
|||
|
occupying Zone 6. After Tabby 3.0 is released September
|
|||
|
30th, 1990 and is being generally used, we will move to
|
|||
|
another Zone as Tabby 3.0 supports zones up to 32767.
|
|||
|
|
|||
|
Q: What do I have to do to become a member of MACLIST?
|
|||
|
A: Run a BBS/system that caters to the MacIntosh community
|
|||
|
and is accessable via some form of mailer that is FTSC
|
|||
|
compatible. It does NOT matter what hardware or software
|
|||
|
you use as long as you support the Mac. Just send a
|
|||
|
message to one of us at the addresses listed below.
|
|||
|
|
|||
|
Q: Is membership in MACLIST free?
|
|||
|
A: Yes.
|
|||
|
|
|||
|
Q: If I do not join MACLIST will it be hard for me to get
|
|||
|
some Mac echoes?
|
|||
|
A: MACLIST does not have any echoes based in it. In other
|
|||
|
words NOT being a member of MACLIST will NEVER stop you
|
|||
|
from getting an echo. We believe that the MACLIST will
|
|||
|
actually ASSIST you in finding systems that carry any or
|
|||
|
all of the MANY currently existing MacIntosh echos.
|
|||
|
|
|||
|
Q: Will I have to use my MACLIST node number?
|
|||
|
A: MACLIST is NOT a 'replacement' for other networks. You
|
|||
|
do not have to use your MACLIST node number as a primary
|
|||
|
node address. It does not have to even appear in your
|
|||
|
origin line. As a matter of fact, you must have a
|
|||
|
"primary" address in some other network (such as Fidonet
|
|||
|
or Alternet) before joining MACLIST. You might want to
|
|||
|
make MACLIST an AKA on your system.
|
|||
|
|
|||
|
Q: Will joining this network cause problems for me in any
|
|||
|
other networks?
|
|||
|
A: It should not, as there have been software and hardware
|
|||
|
specific Networks for a long time with no problem, with
|
|||
|
participants in multiple networks. DOS-based boards
|
|||
|
have been using nets like this all along (for example,
|
|||
|
PNET, QNET, RBBS-Net). Each is means of communication
|
|||
|
and support for a particular interest group, just as
|
|||
|
FidoNews 7-41 Page 28 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
MACLIST is oriented to the MacIntosh community.
|
|||
|
|
|||
|
Q: Why have you added the MACSYSOP echo to the "Fidonet
|
|||
|
Backbone" after so many months of successful distribution
|
|||
|
off the backbone?
|
|||
|
A: At the time MACLIST was formed in October of 1989, we chose
|
|||
|
the MACSYSOP Echo rather than some other echo because at
|
|||
|
the time MACSYSOP was not a Fidonet, Alternet (or any other
|
|||
|
net) echo. After many requests by various Mac sysops, we
|
|||
|
placed it on the backbone to make it more available to those
|
|||
|
that wanted a link.
|
|||
|
|
|||
|
Looking forward to bringing the MacIntosh community
|
|||
|
together,
|
|||
|
|
|||
|
Tom Heffernan Ralph Merritt
|
|||
|
1:107/554, 7:520/554 1:269/102, 7:520/952
|
|||
|
Rock Pile BBS Dragon's Cave BBS
|
|||
|
(201)987-9232 (201)228-4708
|
|||
|
24 Hours/HST 24 Hours/HST
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 29 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Ralph Merritt
|
|||
|
1:269/111
|
|||
|
|
|||
|
OtherNet News - 10/05/90
|
|||
|
|
|||
|
Welcome to the third edition of the OTHERNET nodelist. As you may
|
|||
|
have noted in OTHERNET.271, the 69LIST (Adult Links, Zone 69) and
|
|||
|
OPCNLIST (Official Public Computer Network, Zone 11 segment) node-
|
|||
|
lists were deleted from the OTHERNET Nodelist. GhotiNet (Zones
|
|||
|
60-61) will not be included due to a request for permission for
|
|||
|
inclusion being denied.
|
|||
|
|
|||
|
OtherNets will be added to OTHERNET.xxx on an on-going basis only
|
|||
|
if permission is formally granted. Permission to continue to
|
|||
|
include those OtherNets included in OTHERNET.271 will be sought.
|
|||
|
I'm happy to say that as of OTHERNET.278, inclusion of MetroNet
|
|||
|
(Zone 200) has been formally obtained. Thanks and hats off to
|
|||
|
Jason Steck (MetroNet ZC) for his support and participation! ;-)
|
|||
|
|
|||
|
If it turns out that the OTHERNET nodelist is more hassle than it
|
|||
|
is worth, or if someone begins to politicize this nodelist, I'll
|
|||
|
simple pull it out of the public domain and consider it a dead
|
|||
|
project. Hopefully this will not happen, as my netmail area has
|
|||
|
been full of comments and congrats from people who find OTHERNET
|
|||
|
to be very useful. Thanks to all for their supportive comments.
|
|||
|
|
|||
|
The OTHERNETS echo is well under-way, with thirteen systems linked
|
|||
|
into 269/111. Hopefully there will be more interest generated,
|
|||
|
and we can begin to submit the echo to those networks that have
|
|||
|
"backbones" for a wider and more convenient distribution.
|
|||
|
|
|||
|
Thanks to all of you who have been supportive of the OTHERNET
|
|||
|
nodelist, OTHERNETS echo, and have provided me with information
|
|||
|
and nodelists. I appreciate it! We'll all benefit from the info
|
|||
|
that is being shared about OtherNets.
|
|||
|
|
|||
|
Ralph Merritt
|
|||
|
|
|||
|
AKA 6:6001/2
|
|||
|
7:520/953
|
|||
|
8:950/14
|
|||
|
26:1201/103
|
|||
|
50:5013/111
|
|||
|
99:9220/202
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 30 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
LATEST VERSIONS
|
|||
|
=================================================================
|
|||
|
|
|||
|
Latest Software Versions
|
|||
|
|
|||
|
MS-DOS Systems
|
|||
|
--------------
|
|||
|
|
|||
|
Bulletin Board Software
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
DMG 2.93 Phoenix 1.3 TAG 2.5f*
|
|||
|
Fido 12s+ QuickBBS 2.64 TBBS 2.1
|
|||
|
Lynx 1.30 RBBS 17.3A TComm/TCommNet 3.4
|
|||
|
Kitten 2.16 RBBSmail 17.3B* Telegard 2.5
|
|||
|
Maximus 1.02* RemoteAccess 0.04a* TPBoard 6.1
|
|||
|
Opus 1.13+ SLBBS 1.77* Wildcat! 2.15
|
|||
|
PCBoard 14.5* Socrates 1.00 XBBS 1.13
|
|||
|
|
|||
|
Network Node List Other
|
|||
|
Mailers Version Utilities Version Utilities Version
|
|||
|
|
|||
|
BinkleyTerm 2.40* EditNL 4.00 ARC 7.0*
|
|||
|
D'Bridge 1.30 MakeNL 2.20 ARCAsim 2.30
|
|||
|
Dutchie 2.90C ParseList 1.30 ARCmail 2.07
|
|||
|
FrontDoor 1.99c* Prune 1.40 ConfMail 4.00
|
|||
|
PRENM 1.47 SysNL 3.11 Crossnet v1.5
|
|||
|
SEAdog 4.51b XlatList 2.90 EMM 2.02
|
|||
|
TIMS 1.0(Mod8)* XlaxDiff 2.35* Gmail 2.05
|
|||
|
XlaxNode 2.35* GROUP 2.16
|
|||
|
GUS 1.30
|
|||
|
InterPCB 1.31*
|
|||
|
LHARC 1.13
|
|||
|
MSG 4.1
|
|||
|
MSGED 2.00*
|
|||
|
MSGTOSS 1.3*
|
|||
|
PK[UN]ZIP 1.10
|
|||
|
QM 1.0
|
|||
|
QSORT 4.03
|
|||
|
Sirius 1.0x
|
|||
|
SLMAIL 1.36*
|
|||
|
StarLink 1.01
|
|||
|
TagMail 2.20
|
|||
|
TCOMMail 2.2
|
|||
|
Telemail 1.27*
|
|||
|
TMail 1.15
|
|||
|
TPBNetEd 3.2
|
|||
|
TosScan 1.00
|
|||
|
UFGATE 1.03
|
|||
|
XRS 3.40
|
|||
|
FidoNews 7-41 Page 31 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
ZmailQ 1.12*
|
|||
|
|
|||
|
|
|||
|
OS/2 Systems
|
|||
|
------------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Maximus-CBCS 1.02* BinkleyTerm 2.40* Parselst 1.31
|
|||
|
ConfMail 4.00
|
|||
|
VP2 4.07*
|
|||
|
oMMM 1.52
|
|||
|
MsgEd 2.00*
|
|||
|
LH2 0.50
|
|||
|
PK[UN]ZIP 1.02
|
|||
|
ARC2 6.00
|
|||
|
|
|||
|
|
|||
|
Xenix/Unix
|
|||
|
----------
|
|||
|
|
|||
|
BBS Software Mailers Other Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
MaximusCBCS 1.02.Unix.B0 BinkleyTerm 2.30b* Unzip 3.10
|
|||
|
ARC 5.21
|
|||
|
ParseLst 1.30b
|
|||
|
ConfMail 3.31b
|
|||
|
Ommm 1.40b
|
|||
|
Msged 1.99b
|
|||
|
Zoo 2.01
|
|||
|
C-Lharc 1.00
|
|||
|
Omail 1.00b
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Apple CP/M
|
|||
|
----------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Daisy v2j Daisy Mailer 0.38 Nodecomp 0.37
|
|||
|
MsgUtil 2.5
|
|||
|
PackUser v4
|
|||
|
Filer v2-D
|
|||
|
UNARC.COM 1.20
|
|||
|
|
|||
|
FidoNews 7-41 Page 32 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
Macintosh
|
|||
|
---------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Red Ryder Host v2.1b10 Tabby 2.2 MacArc 0.04
|
|||
|
Mansion 7.15 Copernicus 1.0d* ArcMac 1.3
|
|||
|
WWIV (Mac) 3.0 StuffIt 1.6b1*
|
|||
|
FBBS 0.91* TImport 1.331
|
|||
|
Hermes 0.88* TExport 1.32
|
|||
|
Timestamp 1.6
|
|||
|
Tset 1.3
|
|||
|
Import 3.2
|
|||
|
Export 3.21
|
|||
|
Sundial 3.2
|
|||
|
PreStamp 3.2
|
|||
|
OriginatorII 2.0
|
|||
|
AreaFix 1.6
|
|||
|
Mantissa 3.21
|
|||
|
Zenith 1.5
|
|||
|
UNZIP 1.02b
|
|||
|
|
|||
|
Amiga
|
|||
|
-----
|
|||
|
|
|||
|
Bulletin Board Software Network Mailers Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
Paragon 2.06+ BinkleyTerm 1.00 AmigArc 0.23
|
|||
|
TrapDoor 1.50* AReceipt 1.5*
|
|||
|
WelMat 0.42 booz 1.01
|
|||
|
ConfMail 1.10
|
|||
|
ChameleonEdit 0.10
|
|||
|
ElectricHerald1.66*
|
|||
|
Lharc 1.10
|
|||
|
MessageFilter 1.52*
|
|||
|
oMMM 1.49b
|
|||
|
ParseLst 1.30
|
|||
|
PkAX 1.00
|
|||
|
PK[UN]ZIP 1.01
|
|||
|
PolyxAmy 2.02*
|
|||
|
RMB 1.30
|
|||
|
TrapList 1.12*
|
|||
|
UNzip 0.86
|
|||
|
Yuck! 1.61*
|
|||
|
Zoo 2.00
|
|||
|
|
|||
|
Atari ST
|
|||
|
FidoNews 7-41 Page 33 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
--------
|
|||
|
|
|||
|
Bulletin Board Software Network Mailer Other Utilities
|
|||
|
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
FIDOdoor/ST 1.5c* BinkleyTerm 2.40* ConfMail 1.00
|
|||
|
Pandora BBS 2.41c The BOX 1.20 ParseList 1.30
|
|||
|
QuickBBS/ST 0.40 ARC 6.02
|
|||
|
GS Point 0.61 FiFo 2.0b*
|
|||
|
LHARC 0.60
|
|||
|
Lharc 1.13
|
|||
|
LED ST 0.10*
|
|||
|
BYE 0.25*
|
|||
|
PKUNZIP 1.10
|
|||
|
MSGED 1.96S
|
|||
|
SRENUM 6.2
|
|||
|
Trenum 0.10
|
|||
|
OMMM 1.40
|
|||
|
|
|||
|
|
|||
|
Archimedes
|
|||
|
----------
|
|||
|
|
|||
|
BBS Software Mailers Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
|
|||
|
ARCbbs 1.44* BinkleyTerm 2.03* Unzip 2.1TH
|
|||
|
ARC 1.03
|
|||
|
!Spark 2.00d*
|
|||
|
|
|||
|
ParseLst 1.30
|
|||
|
BatchPacker 1.00*
|
|||
|
|
|||
|
|
|||
|
+ Netmail capable (does not require additional mailer software)
|
|||
|
* Recently changed
|
|||
|
|
|||
|
Utility authors: Please help keep this list up to date by
|
|||
|
reporting new versions to 1:1/1. It is not our intent to list
|
|||
|
all utilities here, only those which verge on necessity.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 7-41 Page 34 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
NOTICES
|
|||
|
=================================================================
|
|||
|
|
|||
|
The Interrupt Stack
|
|||
|
|
|||
|
|
|||
|
4 Nov 1990
|
|||
|
Area Code 214 fragments. Part will become area code 903.
|
|||
|
|
|||
|
6 Nov 1990
|
|||
|
First anniversary of Van Diepen Automatiseert, 2:500/28
|
|||
|
|
|||
|
13 Nov 1990
|
|||
|
Third anniversary of Fidonet in Austria (zone 2, region 31).
|
|||
|
|
|||
|
14 Nov 1990
|
|||
|
Marco Maccaferri's 21rd Birthday. Send greetings to him at
|
|||
|
2:332/16.0
|
|||
|
|
|||
|
1 Jan 1991
|
|||
|
Implementation of 7% Goods and Services Tax in Canada. Contact
|
|||
|
Joe Lindstrom at 1:134/55 for a more colorful description.
|
|||
|
|
|||
|
16 Feb 1991
|
|||
|
Fifth anniversary of the introduction of Echomail, by Jeff Rush.
|
|||
|
|
|||
|
8 Sep 1991
|
|||
|
25th anniversary of first airing of Star Trek on NBC!
|
|||
|
|
|||
|
7 Oct 1991
|
|||
|
Area code 415 fragments. Alameda and Contra Costa Counties
|
|||
|
will begin using area code 510. This includes Oakland,
|
|||
|
Concord, Berkeley and Hayward. San Francisco, San Mateo,
|
|||
|
Marin, parts of Santa Clara County, and the San Francisco Bay
|
|||
|
Islands will retain area code 415.
|
|||
|
|
|||
|
1 Feb 1992
|
|||
|
Area code 213 fragments. Western, coastal, southern and
|
|||
|
eastern portions of Los Angeles County will begin using area
|
|||
|
code 310. This includes Los Angeles International Airport,
|
|||
|
West Los Angeles, San Pedro and Whittier. Downtown Los
|
|||
|
Angeles and surrounding communities (such as Hollywood and
|
|||
|
Montebello) will retain area code 213.
|
|||
|
|
|||
|
1 Dec 1993
|
|||
|
Tenth anniversary of Fido Version 1 release.
|
|||
|
|
|||
|
5 Jun 1997
|
|||
|
David Dodell's 40th Birthday
|
|||
|
|
|||
|
FidoNews 7-41 Page 35 8 Oct 1990
|
|||
|
|
|||
|
|
|||
|
If you have something which you would like to see on this
|
|||
|
calendar, please send a message to FidoNet node 1:1/1.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|