1608 lines
74 KiB
Plaintext
1608 lines
74 KiB
Plaintext
![]() |
F I D O N E W S -- | Vol. 9 No. 9 (2 March 1992)
|
|||
|
The newsletter of the |
|
|||
|
FidoNet BBS community | Published by:
|
|||
|
_ |
|
|||
|
/ \ | "FidoNews" BBS
|
|||
|
/|oo \ | (415)-863-2739
|
|||
|
(_| /_) | FidoNet 1:1/1
|
|||
|
_`@/_ \ _ | Internet:
|
|||
|
| | \ \\ | fidonews@fidonews.fidonet.org
|
|||
|
| (*) | \ )) |
|
|||
|
|__U__| / \// | Editors:
|
|||
|
_//|| _\ / | Tom Jennings
|
|||
|
(_/(_|(____/ | Tim Pozar
|
|||
|
(jm) |
|
|||
|
----------------------------+---------------------------------------
|
|||
|
Published weekly by and for the Members of the FidoNet international
|
|||
|
amateur network. Copyright 1992, Fido Software. All rights reserved.
|
|||
|
Duplication and/or distribution permitted for noncommercial purposes
|
|||
|
only. For use in other circumstances, please contact FidoNews.
|
|||
|
|
|||
|
Paper price: . . . . . . . . . . . . . . . . . . . . . . . $5.00US
|
|||
|
Electronic Price: . . . . . . . . . . . . . . . . . . . . . free!
|
|||
|
|
|||
|
For more information about FidoNews refer to the end of this file.
|
|||
|
--------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
Table of Contents
|
|||
|
1. EDITORIAL ..................................................... 1
|
|||
|
Editorial: None of the error(s) was found ..................... 1
|
|||
|
2. ARTICLES ...................................................... 2
|
|||
|
The Joy of Handles ............................................ 2
|
|||
|
Bashing the Beliefs of Others in FidoNews ..................... 15
|
|||
|
A Day in the Life of a Different Teenage SysOp ................ 19
|
|||
|
3. LATEST VERSIONS ............................................... 23
|
|||
|
Software List ................................................. 23
|
|||
|
4. FIDONEWS INFORMATION .......................................... 29
|
|||
|
FidoNews 9-09 Page 1 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
EDITORIAL
|
|||
|
======================================================================
|
|||
|
|
|||
|
Editorial: None of the error(s) was found.
|
|||
|
|
|||
|
by Tom Jennings (1:1/1)
|
|||
|
|
|||
|
Once again, this week's FidoSnooze is being automatically
|
|||
|
generated. Most likely, you'll get only one copy (I don't often
|
|||
|
repeat the same painful mistake. This time I'm certain that
|
|||
|
nothing will go wrong.
|
|||
|
repeat the same painful mistake. This time I'm certain that
|
|||
|
nothing will go wrong.
|
|||
|
repeat the same painful mistake. This time I'm certain that
|
|||
|
nothing will go wrong.
|
|||
|
repeat the same painful mistake. This time I'm certain that
|
|||
|
nothing will go wrong.
|
|||
|
repeat the same painful mistake. This time I'm certain that
|
|||
|
nothing will go wrong.
|
|||
|
repeat the same painful mistake. This time I'm certain that
|
|||
|
nothing will go wrong.
|
|||
|
repeat the same painful mistake. This time I'm certain that
|
|||
|
nothing will go wrong.
|
|||
|
repeat the same painful mistake. This time I'm certain that
|
|||
|
nothing will go wrong.
|
|||
|
repeat the same painful mistake. This time I'm certain that
|
|||
|
nothing will go wrong.
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 9-09 Page 2 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
ARTICLES
|
|||
|
======================================================================
|
|||
|
|
|||
|
|
|||
|
The Joy of Handles
|
|||
|
Mahatma Kane Jeeves
|
|||
|
101/138.8
|
|||
|
David Lescohier
|
|||
|
101/138.0
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
THE JOY OF HANDLES
|
|||
|
------------------
|
|||
|
or:
|
|||
|
EVERYTHING YOU ALWAYS WANTED TO KNOW ABOUT ME
|
|||
|
(but have no right to ask)
|
|||
|
--------------------------
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
|
|||
|
We should never so entirely avoid danger as to appear
|
|||
|
irresolute and cowardly. But, at the same time, we should
|
|||
|
avoid unnecessarily exposing ourselves to danger, than
|
|||
|
which nothing can be more foolish. [Cicero]
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Do you trust me?
|
|||
|
|
|||
|
If you participate in computer conferencing, and you use
|
|||
|
your real name, then you'd better.
|
|||
|
|
|||
|
"Why?", you ask. "What can you do with my name?" To start
|
|||
|
with, given that and your origin line, I can probably look
|
|||
|
you up in your local phone book, and find out where you
|
|||
|
live. Even if you are unlisted, there are ways to locate
|
|||
|
you based on your name. If you own any property, or pay any
|
|||
|
utility bills, your address is a matter of public record.
|
|||
|
Do you have children in the public schools? It would be
|
|||
|
easy to find out. But that's just the beginning.
|
|||
|
|
|||
|
Former Chairman of the U.S. Privacy Protection Commission
|
|||
|
David F. Linowes, in his book "Privacy in America" (1989),
|
|||
|
writes of New York private investigator Irwin Blye:
|
|||
|
|
|||
|
FidoNews 9-09 Page 3 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
"Challenged to prove his contention that, given a little
|
|||
|
time and his usual fee, he could learn all about an
|
|||
|
individual without even speaking with him, Blye was
|
|||
|
presented with a subject -- a New Jersey
|
|||
|
newspaperman.... The result was a five-page, single-
|
|||
|
spaced, typed report which documented, though not always
|
|||
|
accurately, a wide sweep of the journalist's past, and
|
|||
|
was detailed to the point of disclosing his father's
|
|||
|
income before his retirement."
|
|||
|
|
|||
|
Who am I? If I don't post, you might not even know I exist.
|
|||
|
I could be on your local Police Department, or an agent
|
|||
|
working with the IRS, or some federal law-enforcement
|
|||
|
agency. I could be a member of some fanatical hate group,
|
|||
|
or criminal organization. I might even be a former Nixon
|
|||
|
White-House staffer!
|
|||
|
|
|||
|
I could be that pyromaniacal teenager you flamed last
|
|||
|
weekend, for posting a step-by-step description of how he
|
|||
|
made plastic explosive in his high-school chem lab. He
|
|||
|
seemed kind of mad.
|
|||
|
|
|||
|
But you're an upstanding citizen; you have nothing to hide.
|
|||
|
So why not use your name on the nets? Trust me. There's
|
|||
|
nothing to worry about.
|
|||
|
|
|||
|
Is there?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
|
|||
|
|
|||
|
WHAT'S ALL THIS BROUHAHA?
|
|||
|
-------------------------
|
|||
|
|
|||
|
|
|||
|
Stupidity is evil waiting to happen. [Clay Bond]
|
|||
|
|
|||
|
|
|||
|
Not long ago in Fidonet's BCSNET echo (the Boston Computer
|
|||
|
Society's national conference), the following was posted by
|
|||
|
the conference moderator to a user calling himself "Captain
|
|||
|
Kirk":
|
|||
|
|
|||
|
"May we ask dear Captain Kirk that it would be very
|
|||
|
polite if you could use your real name in an echomail
|
|||
|
conference? This particular message area is shared
|
|||
|
with BBS's all across the country and everyone else is
|
|||
|
using their real name. It is only common courtesy to
|
|||
|
FidoNews 9-09 Page 4 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
do so in an echomail conference."
|
|||
|
|
|||
|
One of us (mkj) responded with a post questioning that
|
|||
|
policy. Soon the conference had erupted into a heated
|
|||
|
debate! Although mkj had worried that the subject might be
|
|||
|
dismissed as trivial, it apparently touched a nerve. It
|
|||
|
brought forth debate over issues and perceptions central to
|
|||
|
computer communications in general, and it revealed profound
|
|||
|
disparities in fundamental values and assumptions among
|
|||
|
participants.
|
|||
|
|
|||
|
This article is a response to that debate, and to the
|
|||
|
prevailing negative attitudes regarding the use of handles.
|
|||
|
Handles seem to have a bad reputation. Their use is
|
|||
|
strangely unpopular, and frequently forbidden by network
|
|||
|
authorities. Many people seem to feel that handles are rude
|
|||
|
or dishonest, or that anyone wishing to conceal his or her
|
|||
|
identity must be up to no good. It is the primary purpose
|
|||
|
of this article to dispel such prejudices.
|
|||
|
|
|||
|
Let us make one thing perfectly clear here at the outset: We
|
|||
|
do NOT challenge the need or the right of sysops to know the
|
|||
|
identities of their users! But we do believe that a sysop
|
|||
|
who collects user names has a serious responsibility to
|
|||
|
protect that information. This means making sure that no
|
|||
|
one has access to the data without a legal warrant, and it
|
|||
|
certainly means not pressuring users to broadcast their real
|
|||
|
names in widespread public forums such as conferences.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SO YOU WANT TO BE A STAR?
|
|||
|
-------------------------
|
|||
|
|
|||
|
|
|||
|
John Lennon died for our sins. [anonymous]
|
|||
|
|
|||
|
|
|||
|
Andy Warhol said that "In the future, everyone will be
|
|||
|
famous for fifteen minutes". The computer nets, more than
|
|||
|
any other medium, lend credibility to this prediction. A
|
|||
|
network conference may span the globe more completely than
|
|||
|
even satellite TV, yet be open to anyone who can afford the
|
|||
|
simplest computer and modem. Through our participation in
|
|||
|
conferencing, each of us becomes, if only briefly, a public
|
|||
|
figure of sorts -- often without realizing it, and without
|
|||
|
any contemplation of the implications and possible
|
|||
|
consequences.
|
|||
|
|
|||
|
FidoNews 9-09 Page 5 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
Brian Reid (reid@decwrl.DEC.COM) conducts and distributes
|
|||
|
periodic surveys of Usenet conference readership. His
|
|||
|
statistical results for the end of 1991 show that of the
|
|||
|
1,459 conferences which currently make up Usenet, more than
|
|||
|
fifty percent have over 20,000 readers apiece; the most
|
|||
|
popular conferences are each seen by about 200,000 readers!
|
|||
|
Mr. Reid's estimate of total Usenet readership is nearly TWO
|
|||
|
MILLION people.
|
|||
|
|
|||
|
Note that Mr. Reid's numbers are for Usenet only; they do
|
|||
|
not include any information on other large public nets such
|
|||
|
as RIME (PC-Relaynet), Fido, or dozens of others, nor do
|
|||
|
they take into account thousands of private networks which
|
|||
|
may have indirect public network connections. The total
|
|||
|
number of users with access to public networks is unknown,
|
|||
|
but informed estimates range to the tens of millions, and
|
|||
|
the number keeps growing at an amazing pace -- in fact, the
|
|||
|
rate of growth of this medium may be greater than any other
|
|||
|
communications medium in history.
|
|||
|
|
|||
|
The special problems and risks which arise when one deals
|
|||
|
with a large public audience are something about which most
|
|||
|
computer users have little or no experience or
|
|||
|
understanding. Until recently, those of us involved in
|
|||
|
computer conferencing have comprised a small and rather
|
|||
|
elite community. The explosion in network participation is
|
|||
|
catching us all a little unprepared.
|
|||
|
|
|||
|
Among media professionals and celebrities, on the other
|
|||
|
hand, the risks of conducting one's business in front of a
|
|||
|
public audience are all too familiar. If the size of one's
|
|||
|
audience becomes sufficiently large, one must assume that
|
|||
|
examples of virtually every personality type will be
|
|||
|
included: police and other agents of various governments,
|
|||
|
terrorists, murderers, rapists, religious fanatics, the
|
|||
|
mentally ill, robbers and con artists, et al ad infinitum.
|
|||
|
It must also be assumed that almost anything you do, no
|
|||
|
matter how innocuous, could inspire at least one person,
|
|||
|
somewhere, to harbor ill will toward you.
|
|||
|
|
|||
|
The near-fatal stabbing of actress Theresa Saldana is a case
|
|||
|
in point. As she was walking to her car one morning near her
|
|||
|
West Hollywood apartment, a voice behind her asked, "Are you
|
|||
|
Theresa Saldana?"; when she turned to answer, a man she had
|
|||
|
never seen before pulled out a kitchen knife and stabbed her
|
|||
|
repeatedly.
|
|||
|
|
|||
|
After her lengthy and painful recovery, she wrote a book on
|
|||
|
the experience ("Beyond Survival", 1986). In that book she
|
|||
|
wrote:
|
|||
|
|
|||
|
FidoNews 9-09 Page 6 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
[pg 12] "... Detective Kalas informed me that the
|
|||
|
assailant, whom he described as a Scottish drifter, had
|
|||
|
fixated upon me after seeing me in films."
|
|||
|
|
|||
|
[pg 28] "... it was through my work as an actress that
|
|||
|
the attacker had fixated on me. Naturally, this made
|
|||
|
me consider getting out of show business ..."
|
|||
|
|
|||
|
[pg 34] "For security, I adopted an alias and became
|
|||
|
'Alicia Michaels.' ... during the months that followed
|
|||
|
I grew so accustomed to it that, to this day, I still
|
|||
|
answer reflexively when someone calls the name Alicia!"
|
|||
|
|
|||
|
Or consider the fate of Denver radio talk show host Alan
|
|||
|
Berg, who in 1984 died outside his home in a hail of
|
|||
|
gunfire. Police believe he was the victim of a local neo-
|
|||
|
nazi group who didn't like his politics.
|
|||
|
|
|||
|
We are reminded of the murders of John Lennon and Rebecca
|
|||
|
Shaffer; the Reagan/Hinckley/Foster incident; and a long
|
|||
|
string of other "celebrity attacks" of all sorts, including
|
|||
|
such bizarre events as the occupation of David Letterman's
|
|||
|
home by a strange woman who claimed to be his wife! There is
|
|||
|
probably no one in public life who doesn't receive at least
|
|||
|
the occassional threatening letter.
|
|||
|
|
|||
|
Of course, ordinary participants in network conferencing may
|
|||
|
never attract quite the attention that other types of
|
|||
|
celebrities attract. But consider the following, rather less
|
|||
|
apocalyptic scenarios:
|
|||
|
|
|||
|
-- On Friday night you post a message to a public
|
|||
|
conference defending an unpopular or controversial
|
|||
|
viewpoint. On Monday morning your biggest client
|
|||
|
cancels a major contract. Or you are kept up all
|
|||
|
night by repeated telephone calls from someone
|
|||
|
demanding that you "stop killing babies"!
|
|||
|
|
|||
|
-- You buy your teenage son or daughter a computer and
|
|||
|
modem. Sometime later you find your lawn littered
|
|||
|
with beer bottles and dug up with tire marks, or
|
|||
|
your home vandalized or burglarized.
|
|||
|
|
|||
|
-- One day you are nominated to the Supreme Court. Who
|
|||
|
are all these strange people on TV claiming to be
|
|||
|
your friends? How did that fellow know your position
|
|||
|
on abortion? Your taste in GIFs?
|
|||
|
|
|||
|
Celebrities and other professional media personalities
|
|||
|
accept the risks and sacrifices of notoriety, along with the
|
|||
|
benefits, as part of their chosen careers. Should computer
|
|||
|
conference participants be expected to do the same? And who
|
|||
|
should be making these decisions?
|
|||
|
|
|||
|
FidoNews 9-09 Page 7 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
|
|||
|
|
|||
|
OTHER MEDIA
|
|||
|
-----------
|
|||
|
|
|||
|
|
|||
|
When thou art at Rome, do as they do at Rome [Cervantes]
|
|||
|
|
|||
|
|
|||
|
Older media seem to address the problems of privacy very
|
|||
|
differently than computer media, at least so far. We are
|
|||
|
not aware of ANY medium or publication, apart from computer
|
|||
|
conferencing, where amateur or even most professional
|
|||
|
participants are required to expose their true names against
|
|||
|
their will. Even celebrities frequently use "stage names",
|
|||
|
and protect their addresses and phone numbers as best they
|
|||
|
can.
|
|||
|
|
|||
|
When a medium caters specifically to the general public,
|
|||
|
participants are typically given even greater opportunities
|
|||
|
to protect their privacy. Television talk shows have been
|
|||
|
known to go so far as to employ silhouetting and electronic
|
|||
|
alteration of voices to protect the identities of guests,
|
|||
|
and audience members who participate are certainly not
|
|||
|
required to state their full names before speaking.
|
|||
|
|
|||
|
The traditional medium most analogous to computer
|
|||
|
conferencing may be talk radio. Like conferencing, talk
|
|||
|
radio is a group discussion and debate medium oriented
|
|||
|
toward controversy, where emotions can run high. Programs
|
|||
|
often center around a specific topic, and are always run by
|
|||
|
a "host" whose role seems analogous in many respects to that
|
|||
|
of a conference moderator. It is therefore worth noting
|
|||
|
that in talk radio generally, policy seems to be that
|
|||
|
callers are identified on the air only by their first names
|
|||
|
(unless of course they volunteer more).
|
|||
|
|
|||
|
Finally, of course, authors have published under "pen names"
|
|||
|
since the dawn of publishing, and newspapers and magazines
|
|||
|
frequently publish letters to the editor with "name and
|
|||
|
address withheld by request" as the signature line. Even
|
|||
|
founding fathers Alexander Hamilton, James Madison and John
|
|||
|
Jay, in authoring the seminal Federalist Papers in 1787 for
|
|||
|
publication in the Letters columns of various New York City
|
|||
|
newspapers, concealed their identities behind the now-famous
|
|||
|
psuedonym "Publius".
|
|||
|
|
|||
|
What would you think if someone called a radio talk show
|
|||
|
demanding to know the identity of a previous caller? Such a
|
|||
|
demand would undoubtedly be seen as menacing and
|
|||
|
inappropriate in that context. Yet that same demand seems
|
|||
|
to arise without much challenge each time a handle shows up
|
|||
|
in a computer conference. The authors of this article feel
|
|||
|
that such demands should always be looked upon as
|
|||
|
FidoNews 9-09 Page 8 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
suspicious, and that it would be beneficial for moderators
|
|||
|
to take upon themselves the responsibility of making sure
|
|||
|
that besieged handle-users are aware of their right to
|
|||
|
refuse such inappropriate demands.
|
|||
|
|
|||
|
It is reasonable to assume that privacy policies in
|
|||
|
traditional media are the result of hard-won wisdom gained
|
|||
|
from long experience. Are we so arrogant that we cannot
|
|||
|
learn from others? It is not hard to imagine the sorts of
|
|||
|
problems and experiences which shaped these policies in the
|
|||
|
old media. Will we have to wait for similar problems to
|
|||
|
occur on the computer networks before we learn?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PRIVACY AND SURVEILLANCE
|
|||
|
------------------------
|
|||
|
|
|||
|
|
|||
|
In an effort to identify people who fail to file tax
|
|||
|
returns, the Internal Revenue Service is matching
|
|||
|
its files against available lists of names and
|
|||
|
addresses of U.S. citizens who have purchased
|
|||
|
computers for home use. The IRS continues to seek
|
|||
|
out sources for such information. This information
|
|||
|
is matched against the IRS master file of taxpayers
|
|||
|
to see if those who have not filed can be
|
|||
|
identified.
|
|||
|
[COMPUTERWORLD, Sept. 1985]
|
|||
|
|
|||
|
Date: Thu, 23 May 91 11:58:07 PDT
|
|||
|
From: mmm@cup.portal.com
|
|||
|
Subject: The RISKS of Posting to the Net
|
|||
|
-
|
|||
|
I just had an interesting visit from the FBI. It
|
|||
|
seems that a posting I made to sci.space several
|
|||
|
months ago had filtered through channels, caused the
|
|||
|
FBI to open (or re-open) a file on me, and an agent
|
|||
|
wanted to interview me, which I did voluntarily...
|
|||
|
I then went on to tell him about the controversy
|
|||
|
over Uunet, and their role in supplying archives of
|
|||
|
Usenet traffic on tape to the FBI...
|
|||
|
[RISKS Digest]
|
|||
|
|
|||
|
Also frequent are instances where computers are
|
|||
|
seized incident to an unrelated arrest. For
|
|||
|
example, on February 28, 1991, following an arrest
|
|||
|
FidoNews 9-09 Page 9 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
on charges of rape and battery, the Massachusetts
|
|||
|
state and local police seized the suspect's computer
|
|||
|
equipment. The suspect reportedly operated a 650-
|
|||
|
subscriber bulletin board called "BEN," which is
|
|||
|
described as "geared largely to a gay/leather/S&M
|
|||
|
crowd." It is not clear what the board's seizure is
|
|||
|
supposed to have accomplished, but the board is now
|
|||
|
shut down, and the identities and messages of its
|
|||
|
users are in the hands of the police.
|
|||
|
[CONSTITUTIONAL, LEGAL, AND ETHICAL
|
|||
|
CONSIDERATIONS FOR DEALING WITH ELECTRONIC
|
|||
|
FILES IN THE AGE OF CYBERSPACE, Harvey A.
|
|||
|
Silverglate and Thomas C. Viles]
|
|||
|
|
|||
|
|
|||
|
Most of us have been brought up to be grateful for the fact
|
|||
|
that we live in a nation where freedom is sacred. In other
|
|||
|
countries, we are told as children, people are afraid to
|
|||
|
speak their minds for fear they are being watched. Thank
|
|||
|
God we live in America!
|
|||
|
|
|||
|
It would surprise most of us to learn that America is
|
|||
|
currently among the premiere surveillance nations in the
|
|||
|
world, but such, sadly, is indeed the case. Our leadership
|
|||
|
in technology has helped the U.S. government to amass as
|
|||
|
much information on its citizens as almost any other nation
|
|||
|
in history, totalitarian or otherwise. And to make matters
|
|||
|
worse, a consumer surveillance behemoth has sprung up
|
|||
|
consisting of huge private data-collection agencies which
|
|||
|
cater to business.
|
|||
|
|
|||
|
As Evan Hendricks, editor of "Privacy Times" (a Washington
|
|||
|
D.C.-based newsletter) has put it: "You go through life
|
|||
|
dropping bits and pieces of information about yourself
|
|||
|
everywhere. Most people don't realize there are big vacuum
|
|||
|
cleaners out there sucking it all up." [Wall Street
|
|||
|
Journal, March 14, 1991].
|
|||
|
|
|||
|
To get an idea of how much of your privacy has already been
|
|||
|
lost, consider the bits and pieces of information about
|
|||
|
yourself which are already available to investigators, and
|
|||
|
how thoroughly someone might come to know you by these clues
|
|||
|
alone.
|
|||
|
|
|||
|
A person's lifestyle and personality are largely described,
|
|||
|
for example, by his or her purchases and expenses; from your
|
|||
|
checking account records -- which banks are required by law
|
|||
|
to keep and make available to government investigators -- a
|
|||
|
substantial portrait of your life will emerge. Credit card
|
|||
|
records may reveal much of the same information, and can
|
|||
|
also be used to track your movements. (In a recent case,
|
|||
|
"missing" Massachusetts State Representative Timothy O'Leary
|
|||
|
was tracked by credit-card transactions as he fled across
|
|||
|
the country, and his movements were reported on the nightly
|
|||
|
news!)
|
|||
|
|
|||
|
FidoNews 9-09 Page 10 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
Then there are your school records, which include IQ and
|
|||
|
other test results, comments on your "socialization" by
|
|||
|
teachers and others, and may reveal family finances in great
|
|||
|
detail. Employment and tax records reveal your present
|
|||
|
income, as well as personal comments by employers and co-
|
|||
|
workers. Your properties are another public record of your
|
|||
|
income and lifestyle, and possibly your social status as
|
|||
|
well. Telephone billing records reveal your personal and
|
|||
|
business associations in more detail. Insurance records
|
|||
|
reveal personal and family health histories and treatments.
|
|||
|
|
|||
|
All of this information is commonly accessed by government
|
|||
|
and private or corporate investigators. And this list is
|
|||
|
far from exhaustive!
|
|||
|
|
|||
|
Now consider how easily the computer networks lend
|
|||
|
themselves to even further erosions of personal privacy. The
|
|||
|
actual contents of our mail and telephone traffic have up to
|
|||
|
now been subjected to deliberate scrutiny only under
|
|||
|
extraordinary conditions. This built-in safety is due
|
|||
|
primarily to the difficulty and expense of conducting
|
|||
|
surveillance in these media, which usually requires extended
|
|||
|
human intervention. But in the medium of computer
|
|||
|
communications, most surveillance can be conducted using
|
|||
|
automated monitoring techniques. Tools currently available
|
|||
|
make it possible and even cost-effective for government and
|
|||
|
other interests to monitor virtually everything which
|
|||
|
happens here.
|
|||
|
|
|||
|
Why would anyone want to monitor network users? It is well
|
|||
|
documented that, throughout the 1960s and 1970s, the FBI and
|
|||
|
other agencies of government, in operations such as the
|
|||
|
infamous COINTELPRO among others, spent a great deal of time
|
|||
|
and effort collecting vast lists of names. As Computer
|
|||
|
Underground Digest moderators Jim Thomas and Gordon Meyer
|
|||
|
recalled in a recent commentary (CuD #3.42):
|
|||
|
|
|||
|
"A 1977 class action suit against the Michigan State
|
|||
|
Police learned, through FOIA requests, that state and
|
|||
|
federal agents would peruse letters to the editor of
|
|||
|
newspapers and collect clippings of those whose politics
|
|||
|
they did not like. These news clippings became the basis
|
|||
|
of files on those persons that found there way into the
|
|||
|
hands of other agencies and employers."
|
|||
|
|
|||
|
To get onto one of these government "enemies" lists, you
|
|||
|
often needed to do nothing more than telephone an
|
|||
|
organization under surveillance, or subscribe to the "wrong"
|
|||
|
types of magazines and newspapers. Groups engaged in
|
|||
|
political activism, including environmental and women's
|
|||
|
rights organizations, were commonly infiltrated. The sort
|
|||
|
of investi-gative reporting which uncovered these lists and
|
|||
|
surveillances back in the '60s and '70s is now rare, but
|
|||
|
there is little reason to assume that such activities have
|
|||
|
ceased or even slowed. In fact, progressive computerization
|
|||
|
of local police LEIU activities (Law Enforcement
|
|||
|
FidoNews 9-09 Page 11 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
Intelligence Units, commonly known as "red squads") suggests
|
|||
|
that such activities may have greatly increased.
|
|||
|
|
|||
|
Within the realm of computer conferencing especially, there
|
|||
|
is ample reason to believe that systematic monitoring is
|
|||
|
being conducted by government and law-enforcement
|
|||
|
organizations, and perhaps by other hostile interests as
|
|||
|
well. In a recent issue of Telecom Digest
|
|||
|
(comp.dcom.telecom), Craig Neidorf (knight@EFF.ORG) reported
|
|||
|
on the results of a recent Freedom of Information Act
|
|||
|
request for documents from the Secret Service:
|
|||
|
|
|||
|
" ... The documents also show that the Secret Service
|
|||
|
established a computer database to keep track of
|
|||
|
suspected computer hackers. This database contains
|
|||
|
records of names, aliases, addresses, phone numbers,
|
|||
|
known associates, a list of activities, and various
|
|||
|
[conference postings] associated with each individual."
|
|||
|
|
|||
|
But the privacy issues which surround computer
|
|||
|
communications go far beyond the collection of user lists.
|
|||
|
Both government and industry have long pursued the elusive
|
|||
|
grail of personality profiling on citizens and consumers. Up
|
|||
|
to now, such ambitions have been restrained by the practical
|
|||
|
difficulty and expense of collecting and analyzing large
|
|||
|
amounts of information on large numbers of citizens. But
|
|||
|
computer communications, more than any other technology,
|
|||
|
seems to hold out the promise that this unholy grail may
|
|||
|
finally be in sight.
|
|||
|
|
|||
|
To coin a phrase, never has so much been known by so few
|
|||
|
about so many. The information commonly available to
|
|||
|
government and industry investi-gators today is sufficient
|
|||
|
to make reliable predictions about our personalities,
|
|||
|
health, politics, future behavior, our vulnerabilities,
|
|||
|
perhaps even about our innermost thoughts and feelings. The
|
|||
|
privacy we all take for granted is, in fact, largely an
|
|||
|
illusion; it no longer exists in most walks of life. If we
|
|||
|
wish to preserve even the most basic minimum of personal
|
|||
|
privacy, it seems clear that we need to take far better care
|
|||
|
on the networks than we have taken elsewhere.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FREEDOM
|
|||
|
-------
|
|||
|
|
|||
|
FidoNews 9-09 Page 12 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
Human beings are the only species with a history.
|
|||
|
Whether they also have a future is not so obvious.
|
|||
|
The answer will lie in the prospects for popular
|
|||
|
movements, with firm roots among all sectors of the
|
|||
|
population, dedicated to values that are suppressed
|
|||
|
or driven to the margins within the existing social
|
|||
|
and political order...
|
|||
|
[Noam Chomsky]
|
|||
|
|
|||
|
|
|||
|
In your day-to-day social interactions, as you deal with
|
|||
|
employers, clients, public officials, friends, acquaintances
|
|||
|
and total strangers, how often do you feel you can really
|
|||
|
speak freely? How comfortable are you discussing
|
|||
|
controversial issues such as religion, taxes, politics,
|
|||
|
racism, sexuality, abortion or AIDS, for example? Would you
|
|||
|
consider it appropriate or wise to express an honest opinion
|
|||
|
on such an issue to your boss, or a client? To your
|
|||
|
neighbors?
|
|||
|
|
|||
|
Most of us confine such candid discussions to certain
|
|||
|
"trusted" social contexts, such as when we are among our
|
|||
|
closest friends. But when you post to a network conference,
|
|||
|
your boss, your clients, and your neighbors may very well
|
|||
|
read what you post -- if they are not on the nets today,
|
|||
|
they probably will be soon, as will nearly everyone.
|
|||
|
|
|||
|
If we have to consider each post's possible impact on our
|
|||
|
social and professional reputations, on our job security and
|
|||
|
income, on our family's acceptance and safety in the
|
|||
|
community, it could be reckless indeed to express ourselves
|
|||
|
freely on the nets. Yet conferences are often geared to
|
|||
|
controversy, and inhibitions on the free expression of
|
|||
|
opinions can reduce traffic to a trickle, killing off an
|
|||
|
important conference topic or distorting a valuable sampling
|
|||
|
of public opinion.
|
|||
|
|
|||
|
More important still is the role computer networks are
|
|||
|
beginning to play in the free and open dissemination of news
|
|||
|
and information. Democracy is crippled if dissent and
|
|||
|
diversity in the media are compromised; yet even here in the
|
|||
|
U.S., where a "free press" is a cherished tradition, the
|
|||
|
bulk of all the media is owned by a small (and ever-
|
|||
|
shrinking) number of corporations, whose relatively narrow
|
|||
|
culture, interests and perspec-tives largely shape the
|
|||
|
public perception.
|
|||
|
|
|||
|
Computer communication, on the other hand, is by its nature
|
|||
|
very difficult to control or shape. Its resources are
|
|||
|
scattered; when one BBS goes bust (or is busted!), three
|
|||
|
others spring up in its place. The natural resiliency of
|
|||
|
computer communications (and other new, decentral-ized
|
|||
|
information technologies such as fax, consumer camcorders
|
|||
|
and cheap satellite links) is giving rise to a new brand of
|
|||
|
global "guerrilla journalism" which includes everyone, and
|
|||
|
defies efforts at suppression.
|
|||
|
FidoNews 9-09 Page 13 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
The power and value of this new journalistic freedom has
|
|||
|
recently shown itself during the Gulf War, and throughout
|
|||
|
Eastern Europe and the Soviet Union, as well as within the
|
|||
|
U.S. Just think of the depth and detail of information
|
|||
|
available on the nets regarding the Secret Service's recent
|
|||
|
"Operation Sundevil" and associated activities, compared to
|
|||
|
the grossly distorted, blatantly propagandistic coverage of
|
|||
|
those same activities given to the general public through
|
|||
|
the traditional media.
|
|||
|
|
|||
|
Historically, established power and wealth have seldom been
|
|||
|
disposed to tolerate uncontrolled media, and recent events
|
|||
|
in this country and elsewhere show that computer media are
|
|||
|
sometimes seen as threats to established interests as well.
|
|||
|
To understand the role of handles in this context, it is
|
|||
|
useful to note the flurries of anti-handle sentiment which
|
|||
|
have arisen in the wake of crackdowns such as Sundevil, or
|
|||
|
the Tom Tcimpidis raid in the early 1980s. Although few
|
|||
|
charges and fewer convictions have typically resulted from
|
|||
|
such operations, one might be tempted to speculate that the
|
|||
|
real purposes -- to terrorize the nets and chill freedoms of
|
|||
|
speech and assembly thereon -- have been achieved.
|
|||
|
|
|||
|
In this way, sysops and moderators become unwitting
|
|||
|
accomplices in the supression of freedom on the networks.
|
|||
|
When real name requirements are instituted, anyone who fears
|
|||
|
retaliation of any sort, by any group, will have to fear
|
|||
|
participation in the nets; hence content is effectively
|
|||
|
controlled. This consideration becomes especially important
|
|||
|
as the nets expand into even more violent and repressive
|
|||
|
countries outside the U.S.
|
|||
|
|
|||
|
We must decide whether freedom of information and open
|
|||
|
public discussion are in fact among the goals of network
|
|||
|
conferencing, and if so, whether handles have a role in
|
|||
|
achieving these goals. As access to the networks grows, we
|
|||
|
have a rare opportunity to frustrate the efforts of
|
|||
|
governments and corporations to control the public mind! In
|
|||
|
this way above all others, computers may have the potential
|
|||
|
to shape the future of all mankind for the better.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
* * * * *
|
|||
|
|
|||
|
|
|||
|
|
|||
|
A CALL TO ACTION
|
|||
|
----------------
|
|||
|
|
|||
|
|
|||
|
FidoNews 9-09 Page 14 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
The move to electronic communication may be a turning
|
|||
|
point that history will remember. Just as in
|
|||
|
seventeenth and eighteenth century Great Britain and
|
|||
|
America a few tracts and acts set precedents for
|
|||
|
print by which we live today, so what we think and do
|
|||
|
today may frame the information system for a
|
|||
|
substantial period in the future.
|
|||
|
[Ithiel de Sola Pool, "Technologies of Freedom", 1983]
|
|||
|
|
|||
|
|
|||
|
There was a time when anybody with some gear and a few
|
|||
|
batteries could become a radio broadcaster -- no license
|
|||
|
required. There was a time when anyone with a sense of
|
|||
|
adventure could buy a plane, and maybe get a contract to
|
|||
|
carry mail. Those early technological pioneers were
|
|||
|
probably unable to imagine the world as it is today, but
|
|||
|
their influence is strongly felt in current laws,
|
|||
|
regulations and policies with roots in the traditions and
|
|||
|
philosophies they founded and shaped.
|
|||
|
|
|||
|
Today the new pioneers are knitting the world together with
|
|||
|
computers, and the world is changing faster than ever. Law
|
|||
|
and ethics are scrambling to keep up. How far will this
|
|||
|
growth take us? No one can say for sure. But you don't
|
|||
|
need a crystal ball to see that computer communications has
|
|||
|
the potential to encompass and surpass all the functionality
|
|||
|
of prior media -- print, post, telegraph, telephone, radio
|
|||
|
and television -- and more. It seems reasonable to assume
|
|||
|
that computer communications will be at least as ubiquitous
|
|||
|
and important in the lives of our grandchildren as all the
|
|||
|
older media have been in ours.
|
|||
|
|
|||
|
It will be a world whose outlines we can now make out only
|
|||
|
dimly. But the foundations of that world are being built
|
|||
|
today by those of us exploring and homesteading on the
|
|||
|
electronic frontier. We need to look hard at what it will
|
|||
|
take to survive in the information age.
|
|||
|
|
|||
|
In this article we have attempted to show, for one very
|
|||
|
narrow issue, what some of the stakes may be in this future-
|
|||
|
building game. But the risks associated with exposing your
|
|||
|
name in a computer conference are not well defined, and
|
|||
|
various people will no doubt assess the importance of these
|
|||
|
risks differently. After all, most of us take risks every
|
|||
|
day which are probably greater than the risks associated
|
|||
|
with conferencing. We drive on the expressway. We eat
|
|||
|
sushi. To some people, the risks of conferencing may seem
|
|||
|
terrifying; to others, insignificant.
|
|||
|
|
|||
|
But let us not get side-tracked into unresolvable arguments
|
|||
|
on the matter. The real issue here is not how dangerous
|
|||
|
conferencing may or may not be; it is whether you and I will
|
|||
|
be able to make our own decisions, and protect ourselves (or
|
|||
|
not) as we see fit. The obvious answer is that users must
|
|||
|
exercise their collective power to advance their own
|
|||
|
interests, and to pressure sysops and moderators to become
|
|||
|
FidoNews 9-09 Page 15 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
more sensitive to user concerns.
|
|||
|
|
|||
|
To help in that effort, we would like to recommend the
|
|||
|
following guidelines for user action:
|
|||
|
|
|||
|
-- Bear in mind John Perry Barlow's observation that
|
|||
|
"Liberties are preserved by using them". Let your
|
|||
|
sysop know that you would prefer to be using a
|
|||
|
handle, and use one wherever you can.
|
|||
|
|
|||
|
-- Try to support boards and conferences which allow
|
|||
|
handles, and avoid those which don't.
|
|||
|
|
|||
|
-- When using a handle, BEHAVE RESPONSIBLY! There will
|
|||
|
always be irresponsible users on the nets, and they
|
|||
|
will always use handles. It is important for the
|
|||
|
rest of us to fight common anti-handle prejudices by
|
|||
|
showing that handles are NOT always the mark of an
|
|||
|
irresponsible user!
|
|||
|
|
|||
|
-- Educate others about the importance of handles (but
|
|||
|
NEVER argue or flame anyone about it).
|
|||
|
|
|||
|
To sysops and moderators: We ask you to bear in mind that
|
|||
|
authority is often used best where it is used least. Grant
|
|||
|
users the right to engage in any harmless and responsible
|
|||
|
behaviors they choose. Protect your interests in ways which
|
|||
|
tread as lightly as possible upon the interests of others.
|
|||
|
The liberties you preserve may be your own!
|
|||
|
|
|||
|
In building the computer forums of today, we are building
|
|||
|
the social fabric of tomorrow. If we wish to preserve the
|
|||
|
free and open atmosphere which has made computer networking
|
|||
|
a powerful force, while at the same time taking care against
|
|||
|
the risks inherent in such a force, handles seem to be a
|
|||
|
remarkably harmless, entertaining and effective tool to help
|
|||
|
us. Let's not throw that tool away.
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Jack Decker
|
|||
|
Fidonet 1:154/8
|
|||
|
|
|||
|
BASHING THE BELIEFS OF OTHERS IN FIDONEWS
|
|||
|
|
|||
|
Back in June of 1991 I sent an article to FidoNews rebutting one of
|
|||
|
Steve Winter's articles. However, due to various technical problems,
|
|||
|
it didn't get to Tom Jennings until much later, and because of that
|
|||
|
we agreed that it would be better if it was not published at that
|
|||
|
time.
|
|||
|
|
|||
|
FidoNews 9-09 Page 16 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
However, recently Steve Winter has taken to publishing near-weekly
|
|||
|
notices promoting his HOLY_BIBLE conference. He certainly has a
|
|||
|
right to do that (if the FidoNews editor doesn't object), and I would
|
|||
|
normally not object to that. But it seems that every week he gets a
|
|||
|
little bolder in stating his particular view that the vast majority
|
|||
|
of Christians are in fact cultists. For example, in FidoNews 9-07,
|
|||
|
he states (in regard to his PRIME network): "This should not be
|
|||
|
confused with the three god or other cult psudo (sic) christian
|
|||
|
networks. This is the only real Christian network that uses Fido or
|
|||
|
PCRelay style messaging software."
|
|||
|
|
|||
|
Now, I'm not insisting that Steve believe in the Holy Trinity if he
|
|||
|
doesn't want to, although it seems to me a real reach to believe that
|
|||
|
when the Bible talks about God the Father, Jesus, the Holy Spirit,
|
|||
|
Jesus praying to God the Father, etc. that these are really all one
|
|||
|
and the same person. It's a fringe viewpoint not shared by most of
|
|||
|
Christianity.
|
|||
|
|
|||
|
What bothers me about Steve's posts is that he doesn't seem to
|
|||
|
believe that a person could look at all those verses (rather than the
|
|||
|
obscure passages he takes out of context to "prove" his viewpoint)
|
|||
|
and still be a true Christian. And, he makes no bones about labeling
|
|||
|
all these other Christians as "cult psudo (sic) christian".
|
|||
|
|
|||
|
By doing this, not only is Steve violating the entire thrust of
|
|||
|
Romans chapter 14 (I'll leave it as an exercise for the reader to
|
|||
|
study this chapter of the Bible), but he is sitting in judgement of
|
|||
|
other Christians. In Matthew 7:1, the Bible states: "Do not judge,
|
|||
|
or you too will be judged. For in the same way that you judge
|
|||
|
others, you will be judged, and with the measure you use, it will be
|
|||
|
measured to you."
|
|||
|
|
|||
|
I am concerned that those who read Steve's posts and messages may
|
|||
|
become confused by his distortions of the scriptures. Therefore, I
|
|||
|
wish to offer two pieces of advice:
|
|||
|
|
|||
|
First: Whenever someone quotes a Bible verse to you to prove a
|
|||
|
point, you should STOP RIGHT THERE and LOOK IT UP (if they're at your
|
|||
|
front door, make them wait while you do it)! Then read the verse IN
|
|||
|
CONTEXT. See who it's addressed to, and what it's talking about.
|
|||
|
Read several verses above and below it to get the context. If people
|
|||
|
would just do this, they would often see that certain verses don't
|
|||
|
mean what some folks say they mean. Be especially careful when
|
|||
|
people start hopping all over the Bible, connecting otherwise
|
|||
|
unrelated scriptures to make a point.
|
|||
|
|
|||
|
Second: Be especially careful of those who add extra conditions to
|
|||
|
salvation. The Bible says "Believe in the Lord Jesus, and you will
|
|||
|
be saved!" (see Acts 16:30) Those who try to add other conditions
|
|||
|
are on shaky ground. In particular, be wary of those who point to
|
|||
|
one example of someone doing something in the New Testament after
|
|||
|
salvation, and using that as a "model" of something that all
|
|||
|
newly-saved Christians MUST do to be saved. The fact that Zacchaeus
|
|||
|
the tax collector gave half of his possessions to the poor and
|
|||
|
offered to make restitution (at the rate of four times the original
|
|||
|
amount!) to anyone he had cheated does not make that a requirement
|
|||
|
FidoNews 9-09 Page 17 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
for salvation, nor something that newly-saved Christians must do.
|
|||
|
Similarly, the fact that some Christians may have spoke in other
|
|||
|
languages ("tongues") or may have been baptized after salvation does
|
|||
|
NOT make those things conditions of salvation. They may be desirable
|
|||
|
things to do, and some may feel that they must do them to be obedient
|
|||
|
to God, but that is their personal conviction and it is wrong to try
|
|||
|
and force that personal conviction on others, or worse yet, to label
|
|||
|
those who don't share those convictions as unsaved or "false"
|
|||
|
Christians, especially in a public forum such as FidoNews (as Steve
|
|||
|
did in an article last summer, the one to which I originally wrote
|
|||
|
the rebuttal).
|
|||
|
|
|||
|
To those of you who may be reading Steve's posts and find that you
|
|||
|
are being thrown into confusion and doubt, I would suggest you read
|
|||
|
Paul's epistle to the Galatians, especially chapter 1, verses 6-9
|
|||
|
(but read the whole book, since Paul is really coming against this
|
|||
|
sort of legalism throughout the book). Also read Romans chapter 14
|
|||
|
and ask yourself if Steve's posts are consistent with the message of
|
|||
|
that chapter.
|
|||
|
|
|||
|
I hope that the FidoNews editor (and readers of FidoNews) will begin
|
|||
|
to look at Steve's articles a bit more carefully, and be aware that
|
|||
|
these are not just advertisements for Steve's echo, but that they
|
|||
|
also contain disparaging remarks about those who do not believe as he
|
|||
|
does, and about echoes that may permit or even support other
|
|||
|
theological viewpoints. I guess it's okay to promote your own echo
|
|||
|
(though I question whether we need to see such promotion nearly every
|
|||
|
week), but it's quite another thing to tear down other echoes or
|
|||
|
networks because they may not go along with your narrow theological
|
|||
|
viewpoint.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
|
|||
|
*I Didn't Know I Would Say That!
|
|||
|
|
|||
|
by Devin Ganger, 1:349/4.1
|
|||
|
1497 Poplar Drive #3, Medford, OR 97504 (USA)
|
|||
|
Co-SysOp, The Crypt, 1:349/4
|
|||
|
I Didn't Know I Would Say That! (or, I Say More Action Less Talk!)
|
|||
|
|
|||
|
Frankly, I love Fidonet.
|
|||
|
|
|||
|
Having said that, let me introduce myself. My name is Devin Ganger,
|
|||
|
and I run a point located in Medford, OR. One of these days, I will
|
|||
|
switch over to a full node, but first I must get a job to pay for my
|
|||
|
addiction to the world of Fidonet. Right now I can manage the somewhat
|
|||
|
dubious practice of sneaking netmail connects on my parents' phone
|
|||
|
bill, not to mention small file requests or transmissions (like, say,
|
|||
|
getting the Fidonews article specifications and submitting the
|
|||
|
resulting article to Fidonews.) Right now, I am an out-of-work 19
|
|||
|
year old computer science major, currently out of school due to recent
|
|||
|
problems with health and financial aid, but I'll get back to the work
|
|||
|
of learning things I already know in the fall.
|
|||
|
FidoNews 9-09 Page 18 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
I haven't been associated with Fidonet for a long time, but in my short
|
|||
|
acquaintance so far I have had fun. It all started when I set up as a
|
|||
|
point under a local system. Then, the BBS I was SysOp'ing for my
|
|||
|
college club decided, through the insistence of the club founder and
|
|||
|
the other club dignitaries (myself and my housemates <grin>), to join
|
|||
|
Fidonet. And for a brief shining moment I actually had a board listed
|
|||
|
in the almighty NODELIST. Then, I got sick and had to come home. It's
|
|||
|
only been in the last month or so that another SysOp in my area got
|
|||
|
into Fidonet, replacing my bossnode of the previous summer (who had
|
|||
|
decided to call it quits.) And now, I am once again a point.
|
|||
|
|
|||
|
It's interesting to see how my local area is changing. Medford and
|
|||
|
the surrounding towns in the Rogue Valley have been dominated by
|
|||
|
another network for as long as I have been here (I would mention names
|
|||
|
but I want to keep my language polite). Lately, though, shakeups in
|
|||
|
the structure of That Other Net have made a lot of SysOps and users
|
|||
|
take a long look at alternatives. As one of the louder voices in my
|
|||
|
area, I succeeded in getting people to look at Fidonet.
|
|||
|
|
|||
|
My concern, though, has been rising at some of the comments they make.
|
|||
|
One user, who also runs a point in Fido (from a different part of the
|
|||
|
country), has said that he generally uses Fido only as a mail drop,
|
|||
|
finding that intelligent and challenging posts are nowhere to be found
|
|||
|
on Fido. Others claim that the structure and hierarchy of Fidonet are,
|
|||
|
well, restrictive and inhibiting to the looseness they like to find in
|
|||
|
their modeming adventures.
|
|||
|
|
|||
|
Personally, I see their style of modeming as TOO loose. I enjoy a good
|
|||
|
flame as much as anyone, but to have flames carrying over out of the
|
|||
|
designated areas into the general chatter, and even into the SysOp
|
|||
|
administration areas (which, actually, doesn't surprise me so much as
|
|||
|
make me chuckle in remembrance of some of the really good fights I've
|
|||
|
seen), is something that I find annoying. And then to have someone
|
|||
|
claim it is their "right" to do so, since the only thing stopping them
|
|||
|
is common consensus (which they feel obligated to break at all costs)
|
|||
|
that such behavior is anappropriate, only rubs salt in the wound.
|
|||
|
|
|||
|
As much as I would like to totally refute their claims, though, I
|
|||
|
can't. I remember the energy wasted in debating controversial issues,
|
|||
|
calling names and slinging mud, instead of solving problems. I see
|
|||
|
contention raising up everywhere in the structure, some people claiming
|
|||
|
that policy isn't stringent enough while others say it's too stringent.
|
|||
|
And I feel just a little bit sad. This network, the pioneer in amateur
|
|||
|
BBS networks, has solved the problems of linking isolated systems from
|
|||
|
all over the world, of getting boards and computers representing varied
|
|||
|
operating systems to communicate on common terms, and of adapting new
|
|||
|
innovations to current standards. Yet I can also see that all that
|
|||
|
problem-solving might just go to waste, or be left behind, muddling in
|
|||
|
pure technical issues while other networks take Fido technology and
|
|||
|
apply it in exciting new ways.
|
|||
|
|
|||
|
FidoNews 9-09 Page 19 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
The culprit, as I see it? An unwillingness to compromise. In its
|
|||
|
early days when Fidonet was small and the members were all of like
|
|||
|
minds, solutions and growth were easy. Now, with a membership that
|
|||
|
requires 1.2 megs of nodelist to represent, some of the old attitudes
|
|||
|
HAVE to go. This is a hobby for myself and for (I believe) everyone
|
|||
|
else in Fidonet. Yet we tend to forget that it is other peoples'
|
|||
|
hobbies as well. Can we afford to keep tight grip on our attitudes of
|
|||
|
"The Way Things Should Be Done" when doing so only makes the system
|
|||
|
break down? That's not pleasant for anyone.
|
|||
|
|
|||
|
We have to be willing to compromise. For the old-timers, that means
|
|||
|
letting go of some of the old ways of operation, while for the
|
|||
|
newcomers (like myself), that means actually listening to the things
|
|||
|
those more experienced have to say. It means setting aside power
|
|||
|
games (for incumbents AND wanna-be's). It means actually starting to
|
|||
|
do something, instead of filling the network with rants, flames, and
|
|||
|
suggestions on how to correct it.
|
|||
|
|
|||
|
When I started writing this, it was only supposed to be a short article
|
|||
|
crowing over the fact that systems in my area are switching to Fidonet
|
|||
|
and abandoning another network. But my words, I guess, are something
|
|||
|
I needed to say. Hopefully, they're what you needed to hear. If I
|
|||
|
stepped on your toes, flames can be directed to my address -- I, to be
|
|||
|
honest, don't get much netmail and would love having a flood pour upon
|
|||
|
me, even if it is telling me I'm too general, or picking on this, or
|
|||
|
slamming on that, or telling me that my mother is the busiest gal in
|
|||
|
town (especially when the fleet comes in.)
|
|||
|
|
|||
|
Rest assured, however, I am going to do my best to act upon my words.
|
|||
|
After all, somebody has to do something. I haven't gotten into any
|
|||
|
bitter debates yet, nor have I seen any major disgruntlement other than
|
|||
|
through the articles in Fidonews; I don't want to. This IS still fun
|
|||
|
for me. I hope that other people -- the people who HAVE been in bitter
|
|||
|
debates -- will once again decide to make it fun for themselves and for
|
|||
|
others too.
|
|||
|
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Dave Blaser
|
|||
|
FidoNet: 1:221/401
|
|||
|
|
|||
|
I recently saw an article in FidoNews by Mitchell Harding about the
|
|||
|
average day of a 15 year old System Operator. I thought I might just
|
|||
|
compare how different my average day is from Mitchell's.. just for fun.
|
|||
|
|
|||
|
Don't get me wrong, I'm not trying to compete with any of the other
|
|||
|
SysOps out there, but just the contrary. I want them to understand how
|
|||
|
we teenage SysOps manage in the strange world that we live in, and let
|
|||
|
me tell you, it's great.
|
|||
|
|
|||
|
FidoNews 9-09 Page 20 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
Now, I don't go to a Private school or anything. Just a plain old
|
|||
|
Public School like all the other ordinary average kids that attend
|
|||
|
there. Only difference between myself and any of the other students
|
|||
|
that attend this particular school is that I own and operate a very
|
|||
|
small, and nearly free, Public Service.
|
|||
|
|
|||
|
Anyways, back to the point of this article. I don't get up at 6:00 in
|
|||
|
the AM, but have a hard enough time dragging myself out at 7:30AM.
|
|||
|
Quick shower, and dressing then to "Data".. yup, you guessed it, the
|
|||
|
BBS. Check out the mail I may or may not have recieved, and reply to
|
|||
|
it if it's important enough.. otherwise, unrecieve it until I get home.
|
|||
|
|
|||
|
Next, off to school.. great stuff living in Southern Ontario in the
|
|||
|
Winter. You freeze your tail off waiting to be picked up by an even
|
|||
|
colder School Bus, to get taken to sheer hell with teachers who are
|
|||
|
stimulating enough to put you to sleep ( I've fallen asleep in Math
|
|||
|
more than once ;D ). Getting to school on time is no problem, classes
|
|||
|
usually don't start until about 9:00, so I've got enough time to get a
|
|||
|
hot coffee, and catch up on the local gossip. Who's doing what with
|
|||
|
whom, and that kind of stuff.
|
|||
|
|
|||
|
First class: Technology Communications with Terry Golletz. A nice
|
|||
|
enough teacher, easy to get along with but... a great talker (sure
|
|||
|
hopes he doesn't get wind of this article, or else there goes my
|
|||
|
mark!). My friends and I usually sit in the class playing with the
|
|||
|
Amiga, or the Video Editing Equipment for the period accomplishing
|
|||
|
nothing. Next, off to Chemistry. This class is THE BEST! We have
|
|||
|
real fun doing the Labs, and the teacher is a really great guy. After
|
|||
|
Chem is English. We're watching "Mississippi Burning" in class right
|
|||
|
now, so that's cool.. not doing alot. Math.. ugh. Mr. Downes puts
|
|||
|
more people to sleep in that class than good ole Mr. Sandman on a busy
|
|||
|
night. Lucky me, I've got fifth period off as a lunch, so I starve to
|
|||
|
death waiting just to ingest a small bag of chips or something of the
|
|||
|
like since the Cafeteria Closed 5 minutes before I managed to get to
|
|||
|
it.
|
|||
|
|
|||
|
Okay, a pretty productive day so far wouldn't you say? That's not the
|
|||
|
end of it. I manage to somehow get home on the freezer we call a Bus
|
|||
|
by around 4:30PM and run into my room first to see if I recieved any
|
|||
|
letters.. most days I won't, but on the odd occasion, I'll recieve mail
|
|||
|
from Borland International trying to sell me something. Next, on to
|
|||
|
the BBS to check for any FeedBack and new files. On the average day,
|
|||
|
I'll get in one or two new files from my ever so generous clan of users
|
|||
|
(if they were REALLY generous, I'd be seeing alot more membership
|
|||
|
cheques coming in than I do right now.. HINT HINT!!). ReArj the file,
|
|||
|
scan for viruses with both McAffee's VirusScan and Central Point
|
|||
|
AntiVirus, then put the file into the proper area.
|
|||
|
|
|||
|
Homework comes sometime after this, and usually only lasts about ten
|
|||
|
minutes before I finish with everything, and begin doing things that
|
|||
|
the teacher didn't ask for. So I put the books away, and see if I can
|
|||
|
find something, ANYTHING to do.. something usually pops up, so I end up
|
|||
|
doing that until 10:00PM when I get off to bed.
|
|||
|
|
|||
|
FidoNews 9-09 Page 21 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
This has been the average day of a 17 Year old Canadian SysOp working
|
|||
|
towards his Engineering/Computer Science Degree at Acton District High
|
|||
|
School in Acton Ontario. Hope you enjoyed reading this almost as much
|
|||
|
as I enjoyed writing it.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Derek R. Cosby
|
|||
|
Fidonet Node 1:375/100
|
|||
|
|
|||
|
SUBJECT: Discrimination
|
|||
|
|
|||
|
Tom, I sent this once, but I don't know if you got it so I'm sending
|
|||
|
it again, but this time I sent it as a file for FIDONEWS. I think this
|
|||
|
issue should be addressed as soon as possible. I read this article a
|
|||
|
few weeks ago and I was very upset about what had happened to this
|
|||
|
individual. As you and everyone out there reads the below paragraph
|
|||
|
you'll see how one individual was pushed off her FIDO point and how
|
|||
|
cruel a group of individuals can be. Why are people so discriminatory
|
|||
|
when it comes to female SYSOPS. Their sex or anyones at that matter
|
|||
|
shouldn't be used to judge anyone on anything. I hope a lesson is
|
|||
|
learned from this article and I hope the individuals mentioned below
|
|||
|
learn that if they are going to be discriminative towards anyone that
|
|||
|
rebuttal is due to come out of it.
|
|||
|
|
|||
|
MESSAGE FROM MELODY
|
|||
|
SUBJECT: Need Information
|
|||
|
Hi everyone. I am a die-hard Wildcat! enthusiast and have run into some
|
|||
|
recent problems with the fellow sysops in my town regarding
|
|||
|
getting fido echos. There are about 6 sysops who carry Netmail/ Fido
|
|||
|
here, and none of them use Wildcat! Recently, I enlisted the aid of
|
|||
|
a couple of sysops to help get my system netmail compatible, and they
|
|||
|
were not knowledgeable enough to get the D'Bridge/Wildcat!3.0/Wildmail
|
|||
|
interface working. I finally had the capacity to send and receive
|
|||
|
netmail and echomail but it was not tossing to my board. I was getting
|
|||
|
some technical help from Wildmail (long distance) on this, but the
|
|||
|
discriminatory attitudes of the sysops in my town against Wildcat
|
|||
|
software were outrageous. They all called it "Wildkitty." I had my
|
|||
|
node number and started sending netmail to the area coordinator, Dennis
|
|||
|
Theime (1:213/213). I kept asking what the procedures were that I
|
|||
|
should follow in order to get an area fix, and he completely ignored my
|
|||
|
questions. I was then told by another sysop that the area coordinator
|
|||
|
said to him, "I am not going to tell her anything." Finally, I was able
|
|||
|
to find out the procedure from someone on getting an area fix, and I
|
|||
|
sent the request in to the coordinator three times. Each was ignored.
|
|||
|
I felt that if I was going to have to fight for every scrap of
|
|||
|
information from this group of prejudiced people, then I might as well
|
|||
|
throw in the towel (as much I wanted Fido echos on my board!!) I posted
|
|||
|
a letter in the local echo to please cancel me, because getting infor-
|
|||
|
mation was like pulling teeth. The die-hard RBBS sysops jumped on
|
|||
|
my case and attacked me like you wouldn't believe. They kept saying,
|
|||
|
"All you had to do was ask" but I asked, and I asked, and I asked!
|
|||
|
No one knew that the area coordinator was pulling this on me, and I,
|
|||
|
trying to be nice, did not publicly accuse him directly. When I
|
|||
|
said that I was not getting any response from the mail machine, the
|
|||
|
area coordinator never came forward to defend himself. What I need to
|
|||
|
FidoNews 9-09 Page 22 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
know is, is there a "head area coordinator" that I can complain to? I
|
|||
|
still want to carry fidonet echos and yet cannot get around the
|
|||
|
discrimination against "Wildkitty" and women sysops in my town. (BTW,
|
|||
|
they "kicked out" the only other 2 female sysops in the Net right before
|
|||
|
I came along.) Also, can I get fidoechos by bypassing these jerks? I
|
|||
|
would be glad to call long distance to pick up the echos I need. Any
|
|||
|
help and advice is greatly appreciated. Since I am no longer in my local
|
|||
|
Net, I call the Mustang headquarters BBS to pick up my mail.
|
|||
|
|
|||
|
Thanks so much
|
|||
|
Melody
|
|||
|
|
|||
|
Voice: (702)747-2607 Call collect if you are a Fidonet CEO who is
|
|||
|
interested in following up on the area coordinator's misconduct.
|
|||
|
|
|||
|
* Origin: The Data Connection! (Echonet 50:5205/6) (1:3625/465)
|
|||
|
--- OLX 2.1 TD Vangaard Keep, Sumter SC, (803)469-3814, 1:376/100
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 9-09 Page 23 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
LATEST VERSIONS
|
|||
|
======================================================================
|
|||
|
|
|||
|
Latest Greatest SoftWare Versions
|
|||
|
Latest Update: 01/27/92
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
MS-DOS Systems
|
|||
|
--------------
|
|||
|
|
|||
|
BBS Software NodeList Utilities Compression
|
|||
|
Name Version Name Version Utilities
|
|||
|
-------------------- -------------------- Name Version
|
|||
|
ADTBBS 1.50@ EditNL 4.00 --------------------
|
|||
|
Aurora 1.32b FDND 1.10 ARC 7.12
|
|||
|
DMG 2.93 MakeNL 2.31 ARJ 2.20
|
|||
|
DreamBBS 1.05 Parselst 1.33 LHA 2.13
|
|||
|
Fido/FidoNet 12.21 Prune 1.40 PAK 2.51
|
|||
|
Genesis Deluxe 3.2 SysNL 3.14 PKPak 3.61
|
|||
|
GSBBS 3.02 XlatList 2.90 PKZip 1.10
|
|||
|
Kitten 1.01 XlaxNode/Diff 2.53
|
|||
|
Lynx 1.30
|
|||
|
Maximus-CBCS 2.00
|
|||
|
Merlin 1.39n Other Utilities(A-M) Other Utilities(N-Z)
|
|||
|
Opus 1.73a* Name Version Name Version
|
|||
|
Oracomm 5.M.6P@ -------------------- --------------------
|
|||
|
Oracomm Plus 6.E@ 2DAPoint 1.50* Netsex 2.00b
|
|||
|
PCBoard 14.5a 4Dog/4DMatrix 1.18 OFFLINE 1.35
|
|||
|
Phoenix 1.07* ARCAsim 2.31 Oliver 1.0a
|
|||
|
ProBoard 1.20* ARCmail 3.00* OSIRIS CBIS 3.02
|
|||
|
QuickBBS 2.75 Areafix 1.20 PKInsert 7.10
|
|||
|
RBBS 17.3b ConfMail 4.00 PolyXarc 2.1a
|
|||
|
RemoteAccess 1.11* Crossnet 1.5 QM 1.00a
|
|||
|
SimplexBBS 1.05 DOMAIN 1.42 QSort 4.04
|
|||
|
SLBBS 2.15C* DEMM 1.06 RAD Plus 2.11
|
|||
|
Socrates 1.11 DGMM 1.06 Raid 1.00
|
|||
|
SuperBBS 1.12* DOMAIN 1.42 RBBSMail 18.0
|
|||
|
SuperComm 0.99 EEngine 0.32 ScanToss 1.28
|
|||
|
TAG 2.5g EMM 2.11* ScMail 1.00
|
|||
|
TBBS 2.1 EZPoint 2.1 ScEdit 1.12
|
|||
|
TComm/TCommNet 3.4 FGroup 1.00 Sirius 1.0x
|
|||
|
Telegard 2.7* FidoPCB 1.0s@ SLMail 2.15C
|
|||
|
TPBoard 6.1 FNPGate 2.70 SquishMail 1.00
|
|||
|
TriTel 2.0* GateWorks 3.06e StarLink 1.01
|
|||
|
WildCat! 3.02* GMail 2.05 TagMail 2.41
|
|||
|
WWIV 4.20 GMD 3.10 TCOMMail 2.2
|
|||
|
XBBS 1.77 GMM 1.21 Telemail 1.5*
|
|||
|
GoldEd 2.31p TGroup 1.13
|
|||
|
GROUP 2.23 TIRES 3.11
|
|||
|
Network Mailers GUS 1.40 TMail 1.21
|
|||
|
Name Version Harvey's Robot 4.10 TosScan 1.00
|
|||
|
-------------------- HeadEdit 1.18 UFGATE 1.03
|
|||
|
BinkleyTerm 2.50 HLIST 1.09 VPurge 4.09e
|
|||
|
D'Bridge 1.30 IMAIL 1.20 WEdit 2.0@
|
|||
|
Dreamer 1.06 InterPCB 1.31 WildMail 2.00
|
|||
|
FidoNews 9-09 Page 24 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
Dutchie 2.90c ISIS 5.12@ WMail 2.2
|
|||
|
FrontDoor 2.02 Lola 1.01d WNode 2.1
|
|||
|
InterMail 2.01 Mosaic 1.00b XRS 4.99
|
|||
|
Milqtoast 1.00 MailBase 4.11a@ XST 2.3e
|
|||
|
PreNM 1.48 MSG 4.5* YUPPIE! 2.00
|
|||
|
SEAdog 4.60 MSGED 2.06 ZmailH 1.25
|
|||
|
SEAmail 1.01 MsgLnk 1.0c ZSX 2.40
|
|||
|
TIMS 1.0(mod8) MsgMstr 2.03a
|
|||
|
MsgNum 4.16d
|
|||
|
MSGTOSS 1.3
|
|||
|
|
|||
|
|
|||
|
OS/2 Systems
|
|||
|
------------
|
|||
|
|
|||
|
BBS Software Other Utilities(A-M Other Utilities(N-Z)
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
Kitten 1.01 ARC 7.12 oMMM 1.52
|
|||
|
Maximus-CBCS 2.00 ARC2 6.01 Omail 3.1
|
|||
|
SimplexBBS 1.04.02+ ConfMail 4.00 Parselst 1.33
|
|||
|
EchoStat 6.0 PKZip 1.02
|
|||
|
EZPoint 2.1 PMSnoop 1.30
|
|||
|
Network Mailers FGroup 1.00 PolyXOS2 2.1a
|
|||
|
Name Version GROUP 2.23 QSort 2.1
|
|||
|
-------------------- LH2 2.11 Raid 1.0
|
|||
|
BinkleyTerm 2.50 MSG 4.2 Remapper 1.2
|
|||
|
BinkleyTerm(S) 2.50 MsgEd 2.06c SquishMail 1.00
|
|||
|
BinkleyTerm/2-MT MsgLink 1.0c Tick 2.0
|
|||
|
1.40.02 MsgNum 4.16d VPurge 4.09e
|
|||
|
SEAmail 1.01
|
|||
|
|
|||
|
|
|||
|
Xenix/Unix 386
|
|||
|
--------------
|
|||
|
|
|||
|
BBS Software Network Mailers Other Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
ARC 5.21
|
|||
|
C-LHARC 1.00
|
|||
|
MsgEd 2.06
|
|||
|
|Contact: Willy Paine 1:343/15,| MSGLINK 1.01
|
|||
|
|or Eddy van Loo 2:285/406 | oMMM 1.42
|
|||
|
Omail 1.00
|
|||
|
ParseLst 1.32
|
|||
|
Unzip 3.10
|
|||
|
VPurge 4.08
|
|||
|
Zoo 2.01
|
|||
|
|
|||
|
|
|||
|
FidoNews 9-09 Page 25 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
QNX
|
|||
|
---
|
|||
|
|
|||
|
BBS Software Network Mailers Other Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
QTach2 1.09 QMM 0.50s Kermit 2.03
|
|||
|
QCP 1.02
|
|||
|
NodeList Utilities Archive Utilities QSave 3.6
|
|||
|
Name Version Name Version QTTSysop 1.07.1
|
|||
|
-------------------- -------------------- SeaLink 1.05
|
|||
|
QNode 2.09 Arc 6.02 XModem 1.00
|
|||
|
LH 1.00.2 YModem 1.01
|
|||
|
Unzip 2.01 ZModem 0.02f
|
|||
|
Zoo 2.01
|
|||
|
|
|||
|
|
|||
|
Apple II
|
|||
|
--------
|
|||
|
|
|||
|
BBS Software Network Mailers Other Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
DDBBS + 8.0* Fruity Dog 2.0 deARC2e 2.1
|
|||
|
GBBS Pro 2.1 ProSel 8.70*
|
|||
|
ShrinkIt 3.30*
|
|||
|
|Contact: Dennis McClain-Furmanski 1:275/42| ShrinkIt GS 1.04
|
|||
|
|
|||
|
|
|||
|
Apple CP/M
|
|||
|
----------
|
|||
|
|
|||
|
BBS Software Network Mailers Other Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
Daisy 2j Daisy Mailer 0.38 Filer 2-D
|
|||
|
MsgUtil 2.5
|
|||
|
Nodecomp 0.37
|
|||
|
PackUser 4
|
|||
|
UNARC.Com 1.20
|
|||
|
|
|||
|
|
|||
|
Macintosh
|
|||
|
---------
|
|||
|
|
|||
|
BBS Software Network Mailers Other Software
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
FBBS 0.91 Copernicus 1.0 ArcMac 1.3
|
|||
|
Hermes 1.6.1 Tabby 2.2 AreaFix 1.6
|
|||
|
Mansion 7.15 Compact Pro 1.30
|
|||
|
Precision Sys. 0.95b EventMeister 1.0
|
|||
|
Red Ryder Host 2.1 Export 3.21
|
|||
|
Telefinder Host Import 3.2
|
|||
|
FidoNews 9-09 Page 26 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
2.12T10 LHARC 0.41
|
|||
|
MacArd 0.04
|
|||
|
Mantissa 3.21
|
|||
|
Point System Mehitable 2.0
|
|||
|
Software OriginatorII 2.0
|
|||
|
Name Version PreStamp 3.2
|
|||
|
-------------------- StuffIt Classic 1.6
|
|||
|
Copernicus 1.00 SunDial 3.2
|
|||
|
CounterPoint 1.09 TExport 1.92
|
|||
|
MacWoof 1.1 TimeStamp 1.6
|
|||
|
TImport 1.92
|
|||
|
Tset 1.3
|
|||
|
TSort 1.0
|
|||
|
UNZIP 1.02c
|
|||
|
Zenith 1.5
|
|||
|
Zip Extract 0.10
|
|||
|
|
|||
|
|
|||
|
Amiga
|
|||
|
-----
|
|||
|
|
|||
|
BBS Software Network Mailers Other Software
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
4D-BBS 1.65 BinkleyTerm 1.00 Areafix 1.48
|
|||
|
DLG Pro. 0.96b TrapDoor 1.80 AReceipt 1.5
|
|||
|
Falcon CBCS 1.00 WelMat 0.44 ChameleonEdit 0.11
|
|||
|
Starnet 1.0q@ ConfMail 1.12
|
|||
|
TransAmiga 1.07 ElectricHerald 1.66
|
|||
|
XenoLink 1.0 Compression FFRS 1.0@
|
|||
|
Utilities FileMgr 2.08
|
|||
|
Name Version Fozzle 1.0@
|
|||
|
NodeList Utilities -------------------- Login 0.18
|
|||
|
Name Version AmigArc 0.23 MessageFilter 1.52
|
|||
|
-------------------- booz 1.01 Message View 1.12
|
|||
|
ParseLst 1.66 LHARC 1.30 oMMM 1.50
|
|||
|
Skyparse 2.30 LhA 1.10 PolyXAmy 2.02
|
|||
|
TrapList 1.40 LZ 1.92 RMB 1.30
|
|||
|
PkAX 1.00 Roof 46.15
|
|||
|
UnZip 4.1 RoboWriter 1.02
|
|||
|
Zippy (Unzip) 1.25 Rsh 4.07a
|
|||
|
Zoo 2.01 Tick 0.75
|
|||
|
TrapToss 1.20
|
|||
|
|Contact: Maximilian Hantsch 2:310/6| Yuck! 2.02
|
|||
|
|
|||
|
Atari ST/TT
|
|||
|
-----------
|
|||
|
|
|||
|
BBS Software Network Mailers Other Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
FIDOdoor/ST 2.5.1 BinkleyTerm 2.40n9 ApplyList 1.00@
|
|||
|
FiFo 2.1v The Box 1.95* Burep 1.1
|
|||
|
LED ST 1.00 ComScan 1.04
|
|||
|
MSGED 1.99 ConfMail 4.10
|
|||
|
QuickBBS/ST 1.06* NodeList Utilities Echoscan 1.10
|
|||
|
FidoNews 9-09 Page 27 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
Name Version FDrenum 2.5.2
|
|||
|
-------------------- FastPack 1.20
|
|||
|
Compression ParseList 1.30 Import 1.14
|
|||
|
Utilities EchoFix 1.20 oMMM 1.40
|
|||
|
Name Version sTICK/Hatch 5.50 Pack 1.00
|
|||
|
-------------------- Trenum 0.10
|
|||
|
ARC 6.02
|
|||
|
LHARC 2.01i
|
|||
|
PackConvert
|
|||
|
STZip 1.1*
|
|||
|
UnJARST 2.00
|
|||
|
WhatArc 2.02
|
|||
|
|
|||
|
|
|||
|
Archimedes
|
|||
|
----------
|
|||
|
|
|||
|
BBS Software Network Mailers Other Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
ARCbbs 1.61 BinkleyTerm ARC 1.20
|
|||
|
Odyssey 0.37 2.06f-wimp !AskFor 1.01
|
|||
|
RiscBBS 0.9.85m BatchPacker 1.00
|
|||
|
DeLZ 0.01
|
|||
|
MailED 0.95
|
|||
|
NetFile 1.00
|
|||
|
ParseLst 1.30
|
|||
|
Raul 1.01
|
|||
|
!Spark 2.16
|
|||
|
!SparkMail 2.08
|
|||
|
!SparkPlug 2.14
|
|||
|
UnArj 2.21
|
|||
|
UnZip 3.00
|
|||
|
Zip 1.00
|
|||
|
|
|||
|
|
|||
|
Tandy Color Computer 3 (OS-9 Level II)
|
|||
|
--------------------------------------
|
|||
|
|
|||
|
BBS Software Compression Utility Other Utilities
|
|||
|
Name Version Name Version Name Version
|
|||
|
-------------------- -------------------- --------------------
|
|||
|
RiBBS 2.02+ Ar 1.3 Ascan 1.2
|
|||
|
DeArc 5.12 AutoFRL 2.0
|
|||
|
OS9Arc 1.0 Bundle 2.2
|
|||
|
UnZip 3.10 CKARC 1.1
|
|||
|
UnLZH 3.0 EchoCheck 1.01
|
|||
|
FReq 2.5a
|
|||
|
LookNode 2.00
|
|||
|
ParseLST
|
|||
|
PReq 2.2
|
|||
|
FidoNews 9-09 Page 28 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
RList 1.03
|
|||
|
RTick 2.00
|
|||
|
UnBundle 1.4
|
|||
|
UnSeen 1.1
|
|||
|
|
|||
|
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
|
|||
|
Key: + - Netmail Capable (Doesn't Require Additional Mailer Software)
|
|||
|
* - Recently Updated Version
|
|||
|
@ - New Addition
|
|||
|
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
|
|||
|
|
|||
|
The Complete List is Available For FReq as VERSIONS from 1:103/250
|
|||
|
|
|||
|
Utility Authors: Please help keep this list up to date by reporting
|
|||
|
all new versions to 1:103/250 in this format:
|
|||
|
|
|||
|
1) Software Name & Version 2) FileName.Ext
|
|||
|
3) Support Node Address 4) Support BBS Phone Number
|
|||
|
|
|||
|
|
|||
|
Note: It is not our intent to list all utilities here, only those
|
|||
|
which verge on necessity. If you want it updated in the next
|
|||
|
FidoNews, get it to me by Thursday evening.
|
|||
|
|
|||
|
--David French, 1:103/250
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 9-09 Page 29 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
======================================================================
|
|||
|
FIDONEWS INFORMATION
|
|||
|
======================================================================
|
|||
|
|
|||
|
------- FIDONEWS MASTHEAD AND CONTACT INFORMATION ----------------
|
|||
|
|
|||
|
Editors: Tom Jennings, Tim Pozar
|
|||
|
Editors Emeritii: Thom Henderson, Dale Lovell, Vince Periello
|
|||
|
|
|||
|
"FidoNews" BBS
|
|||
|
FidoNet 1:1/1
|
|||
|
Internet fidonews@fidonews.fidonet.org
|
|||
|
BBS (415)-863-2739 (9600 HST/V32)
|
|||
|
|
|||
|
(Postal Service mailing address)
|
|||
|
FidoNews
|
|||
|
Box 77731
|
|||
|
San Francisco
|
|||
|
CA 94107 USA
|
|||
|
|
|||
|
Published weekly by and for the Members of the FidoNet international
|
|||
|
amateur electronic mail system. It is a compilation of individual
|
|||
|
articles contributed by their authors or their authorized agents. The
|
|||
|
contribution of articles to this compilation does not diminish the
|
|||
|
rights of the authors. Opinions expressed in these articles are those
|
|||
|
of the authors and not necessarily those of FidoNews.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FidoNews is copyright 1992 Fido Software. All rights reserved.
|
|||
|
Duplication and/or distribution permitted for noncommercial purposes
|
|||
|
only. For use in other circumstances, please contact FidoNews (we're
|
|||
|
easy).
|
|||
|
|
|||
|
|
|||
|
|
|||
|
OBTAINING COPIES: FidoNews in electronic form may be obtained from
|
|||
|
the FidoNews BBS via manual download or Wazoo FileRequest, or from
|
|||
|
various sites in the FidoNet and via uucp. PRINTED COPIES mailed
|
|||
|
may be obtained from Fido Software for $5.00US each PostPaid First
|
|||
|
Class within North America, or $7.00US elsewhere, mailed Air Mail.
|
|||
|
(US funds drawn upon a US bank only.)
|
|||
|
|
|||
|
Periodic subscriptions are not available at this time; if enough
|
|||
|
people request it I will implement it.
|
|||
|
|
|||
|
|
|||
|
SUBMISSIONS: You are encouraged to submit articles for publication in
|
|||
|
FidoNews. Article submission requirements are contained in the file
|
|||
|
ARTSPEC.DOC, available from the FidoNews BBS, or Wazoo filerequestable
|
|||
|
from 1:1/1 as file "ARTSPEC.DOC".
|
|||
|
|
|||
|
FidoNews 9-09 Page 30 2 Mar 1992
|
|||
|
|
|||
|
|
|||
|
"Fido", "FidoNet" and the dog-with-diskette are U.S. registered
|
|||
|
trademarks of Tom Jennings of Fido Software, Box 77731, San Francisco
|
|||
|
CA 94107, USA and are used with permission.
|
|||
|
|
|||
|
-- END
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
|