1927 lines
88 KiB
Plaintext
1927 lines
88 KiB
Plaintext
![]() |
Volume 4, Number 28 27 July 1987
|
|||
|
+---------------------------------------------------------------+
|
|||
|
| _ |
|
|||
|
| / \ |
|
|||
|
| /|oo \ |
|
|||
|
| - FidoNews - (_| /_) |
|
|||
|
| _`@/_ \ _ |
|
|||
|
| International | | \ \\ |
|
|||
|
| FidoNet Association | (*) | \ )) |
|
|||
|
| Newsletter ______ |__U__| / \// |
|
|||
|
| / FIDO \ _//|| _\ / |
|
|||
|
| (________) (_/(_|(____/ |
|
|||
|
| (jm) |
|
|||
|
+---------------------------------------------------------------+
|
|||
|
Editor in Chief: Thom Henderson
|
|||
|
Chief Procrastinator Emeritus: Tom Jennings
|
|||
|
|
|||
|
FidoNews is published weekly by the International FidoNet
|
|||
|
Association as its official newsletter. You are encouraged to
|
|||
|
submit articles for publication in FidoNews. Article submission
|
|||
|
standards are contained in the file ARTSPEC.DOC, available from
|
|||
|
node 1:1/1.
|
|||
|
|
|||
|
Copyright 1987 by the International FidoNet Association. All
|
|||
|
rights reserved. Duplication and/or distribution permitted for
|
|||
|
noncommercial purposes only. For use in other circumstances,
|
|||
|
please contact IFNA at (314) 576-4067.
|
|||
|
|
|||
|
|
|||
|
Three Weeks to FidoCon!
|
|||
|
|
|||
|
Table of Contents
|
|||
|
|
|||
|
1. EDITORIAL ................................................ 1
|
|||
|
Is Echomail Doomed? ...................................... 1
|
|||
|
2. ARTICLES ................................................. 2
|
|||
|
The Maxum Turbo XE - A Serious Computer .................. 2
|
|||
|
FidoNet in Japan ......................................... 6
|
|||
|
MegaList: A Cross-System File Listing .................... 10
|
|||
|
Public Key Encryption for FidoNet Mail ................... 11
|
|||
|
Sirius 0.50 - A Review ................................... 18
|
|||
|
Sports Net ECHO Conference ............................... 23
|
|||
|
3. COLUMNS .................................................. 24
|
|||
|
Broadcast Booth - In The Network ......................... 24
|
|||
|
The Regular Irregular Column ............................. 25
|
|||
|
4. NOTICES .................................................. 30
|
|||
|
The Interrupt Stack ...................................... 30
|
|||
|
Latest Software Versions ................................. 30
|
|||
|
International FidoNet Conference Registration Form ....... 31
|
|||
|
IFNA Board of Directors Ballot ........................... 32
|
|||
|
FidoNews 4-28 Page 1 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
EDITORIAL
|
|||
|
=================================================================
|
|||
|
|
|||
|
Is Echomail Doomed?
|
|||
|
|
|||
|
|
|||
|
For some time now, and even more so lately, we've been watching
|
|||
|
the consequences of our regrettable lack of security. FidoNet is
|
|||
|
reasonably secure about sending mail to the right people (if you
|
|||
|
don't look too closely at mail pickups), but it's wide open when
|
|||
|
it comes to receiving mail. In normal network mail this isn't
|
|||
|
all that much of a problem, but with echomail we find ourselves
|
|||
|
holding a kettle of fish of quite a different color. I have seen
|
|||
|
two major conferences whither and almost die under what amount to
|
|||
|
terrorist attacks.
|
|||
|
|
|||
|
Can we defend ourselves? Security measures can be developed,
|
|||
|
surely, but will they do the trick? I suspect not, for a few
|
|||
|
reasons.
|
|||
|
|
|||
|
1) Most of the measures proposed are for securing predefined
|
|||
|
conference links, which leaves normal network mail wide open.
|
|||
|
|
|||
|
2) For good reason. Securing normal netmail is not practical.
|
|||
|
How can you prearrange security measures with a new node
|
|||
|
across the country that you didn't even know existed?
|
|||
|
|
|||
|
3) Even if we secured all links between all systems everywhere,
|
|||
|
that still won't stop people from willingly linking in
|
|||
|
a known terrorist.
|
|||
|
|
|||
|
4) Besides, anyone could fabricate messages for propagation over
|
|||
|
a secure line that appear to originate anywhere at all.
|
|||
|
|
|||
|
It starts to look pretty hopeless. Is echomail doomed? Well,
|
|||
|
not quite. When one looks at which conferences were attacked, it
|
|||
|
becomes apparent that it is only the large national or
|
|||
|
international conferences that really present a good target.
|
|||
|
Terrorists thrive on attention and response, which they don't
|
|||
|
really get in the smaller conferences. Not to mention that in a
|
|||
|
smaller conference it is correspondingly easier to identify where
|
|||
|
the terrorist is linking in.
|
|||
|
|
|||
|
Echomail will thrive. People will continue to establish new
|
|||
|
conferences for every topic under the sun. Echomail is far too
|
|||
|
important a part of our subculture to die out now. But I suspect
|
|||
|
that the heydey of the large international conference may be
|
|||
|
drawing to a close.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 2 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
ARTICLES
|
|||
|
=================================================================
|
|||
|
|
|||
|
From 107/246
|
|||
|
|
|||
|
The Maxum Turbo XE - A Serious Computer
|
|||
|
|
|||
|
The following is an in-depth review of a fine clone that you
|
|||
|
should consider in your shopping list if you are looking for a
|
|||
|
new computer in the near future.
|
|||
|
|
|||
|
Data Sheet For MAXUM TURBO XE Personal Computer
|
|||
|
-----------------------------------------------
|
|||
|
|
|||
|
MAXUM TURBO XE COMPUTER
|
|||
|
Sold by 47th Street Photo.
|
|||
|
|
|||
|
The basic unit comes configured as follows:
|
|||
|
|
|||
|
Maxum Turbo XE system unit.
|
|||
|
Phoenix type fast Ram test BIOS.
|
|||
|
AT style keyboard with indicator lights built in.
|
|||
|
256k Ram (256k Chips)-(Expandable to 1024k).
|
|||
|
One full height 5 1/2 inch 360k floppy drive.
|
|||
|
One disk controller for up to 2 floppy drives.
|
|||
|
Built in game port.
|
|||
|
8 Expansion Slots (2 Half - 6 Full Size Slots)
|
|||
|
FCC approved slide type case.
|
|||
|
Approved as Class B computing device.
|
|||
|
180 Watt Power Supply.
|
|||
|
MS-DOS 3.2 And GW-BASIC are included.
|
|||
|
Dual speed (4.77/8 Mhz 8088-2) processor.
|
|||
|
Socket for 8087 co-processor chip.
|
|||
|
Built in (battery powered) clock/calendar card. Keyboard
|
|||
|
(key operated) lock-out switch.
|
|||
|
Power, Turbo, Hard Disk indicator lights.
|
|||
|
Built in reset switch in rear of machine.
|
|||
|
Internal speaker in front of system unit.
|
|||
|
4 power plugs coming out of power supply.
|
|||
|
|
|||
|
Price as configured above is $499.00 plus tax.
|
|||
|
|
|||
|
The unit comes securely packed in a double carton and each unit
|
|||
|
is tested before being released for sale.
|
|||
|
|
|||
|
There is a sticker attached to the rear of each unit with a
|
|||
|
number to call for service and/or advice (not toll free) you
|
|||
|
might need. We called twice and each time the phone was answered
|
|||
|
by a polite technician who had a thorough knowledge of the
|
|||
|
computer and was a great help in setting up the computer. Each
|
|||
|
unit comes with a 5 book set of documentation complete with
|
|||
|
excellent instructions for the novice as well as the experienced
|
|||
|
user.
|
|||
|
|
|||
|
I would judge that anyone could have this unit unpacked and fully
|
|||
|
FidoNews 4-28 Page 3 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
operational inside of 25 minutes from opening the carton for the
|
|||
|
first time.
|
|||
|
|
|||
|
The documentation is from Microsoft for the most part and is well
|
|||
|
written and should be a great help in setting up the system as
|
|||
|
well as utilizing the Ram from 640k to 1024k should you decide to
|
|||
|
install the extra Ram yourself at the time of purchase or at a
|
|||
|
later date.
|
|||
|
|
|||
|
The system as tested had some extra features that were user-
|
|||
|
installed at the time of purchase. They were:
|
|||
|
|
|||
|
Full 1024k Ram on the motherboard.
|
|||
|
IBM type RGB color card from Maxum.
|
|||
|
RS-232 card from Honeywell.
|
|||
|
One extra 5 1/2 inch floppy drive.
|
|||
|
One 22 Megabyte Miniscribe hard drive.
|
|||
|
Orchid Turbo 286E Card with 2 Megabytes Of Ram.
|
|||
|
Copy II Pc copy board.
|
|||
|
|
|||
|
Approximate cost of system as tested is: $ 2399.00
|
|||
|
|
|||
|
The system runs all the usual PC software such as Lotus,
|
|||
|
Wordstar, Flight Simulator, dBase III+, as well as Fido, Opus,
|
|||
|
SEAdog, Telix, PC-TALK, Qmodem and Crosstalk XVI.
|
|||
|
|
|||
|
Lattice C, Turbo Basic, Quick Basic, Microsoft Cobol, and the
|
|||
|
Microsoft Assembler were all tested and ran with no problems
|
|||
|
whatsoever.
|
|||
|
|
|||
|
The system appears to be 100% compatible, as we have not found
|
|||
|
any software that will not run on this system at the time this
|
|||
|
article was written.
|
|||
|
|
|||
|
Below you will find some data we compiled from the various tests
|
|||
|
we ran on the system. There are 3 results reported for each test.
|
|||
|
|
|||
|
1) Normal speed mode is the mode in which the computer boots up
|
|||
|
and according to Norton's Sysinfo is slightly faster than a
|
|||
|
normal PC.
|
|||
|
|
|||
|
2) Turbo speed is the user selectable speed increase gained by
|
|||
|
typing the Cntrl-Alt-2 combination of keys. This IS NOT the
|
|||
|
Orchid turbo speed which follows.
|
|||
|
|
|||
|
3) 286 Turbo speed is when the Orchid 286E card is activated and
|
|||
|
running. In this mode you are running for all intensive
|
|||
|
purposes an IBM AT clone at 8 Mhz with an Intel 80286 chip
|
|||
|
handling the processing. Please note that in this mode it is
|
|||
|
possible to access 704k for DOS to run in, as opposed to a
|
|||
|
maximum 640k for the other two modes we tested.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Maxum Turbo XE In Normal Speed Mode
|
|||
|
FidoNews 4-28 Page 4 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
-----------------------------------
|
|||
|
SI-System Information, Version 3.10, (C) 1984-86
|
|||
|
|
|||
|
IBM/PC
|
|||
|
Built-in BIOS programs dated Monday, September 15, 1986
|
|||
|
Operating under DOS 3.20
|
|||
|
5 logical disk drives, A: through E:
|
|||
|
DOS reports 640 K-bytes of memory:
|
|||
|
68 K-bytes used by DOS and resident programs
|
|||
|
572 K-bytes available for application programs
|
|||
|
A search for active memory finds:
|
|||
|
640 K-bytes main memory (at hex 0000-A000)
|
|||
|
32 K-bytes display memory (at hex B800-C000)
|
|||
|
BIOS signature found at hex paragraph C800
|
|||
|
|
|||
|
Computing performance index relative to IBM/PC: 1.7
|
|||
|
|
|||
|
Maxum Turbo XE In Turbo Speed Mode
|
|||
|
----------------------------------
|
|||
|
SI-System Information, Version 3.10, (C) 1984-86
|
|||
|
|
|||
|
IBM/PC
|
|||
|
Built-in BIOS programs dated Monday, September 15, 1986
|
|||
|
Operating under DOS 3.20
|
|||
|
5 logical disk drives, A: through E:
|
|||
|
DOS reports 640 K-bytes of memory:
|
|||
|
68 K-bytes used by DOS and resident programs
|
|||
|
572 K-bytes available for application programs
|
|||
|
A search for active memory finds:
|
|||
|
640 K-bytes main memory (at hex 0000-A000)
|
|||
|
32 K-bytes display memory (at hex B800-C000)
|
|||
|
BIOS signature found at hex paragraph C800
|
|||
|
|
|||
|
Computing performance index relative to IBM/PC: 3.0
|
|||
|
|
|||
|
Maxum Turbo XE With Orchid Turbo 286E Card Installed
|
|||
|
----------------------------------------------------
|
|||
|
SI-System Information, Version 3.10, (C) 1984-86
|
|||
|
|
|||
|
This computer might be identified by this:
|
|||
|
(C) Copyright 1986 More Computing. All Rights Reserved.
|
|||
|
Built-in BIOS programs dated Monday, November 8, 1982
|
|||
|
Operating under DOS 3.20
|
|||
|
5 logical disk drives, A: through E:
|
|||
|
DOS reports 704 K-bytes of memory:
|
|||
|
87 K-bytes used by DOS and resident programs
|
|||
|
617 K-bytes available for application programs
|
|||
|
A search for active memory finds:
|
|||
|
640 K-bytes main memory (at hex 0000-A000)
|
|||
|
127 K-bytes display memory (at hex A040-C000)
|
|||
|
|
|||
|
Computing performance index relative to IBM/PC: 9.2
|
|||
|
|
|||
|
|
|||
|
So as you can see from the test results above the stock machine
|
|||
|
in TURBO mode is much faster than a normal PC and of course when
|
|||
|
FidoNews 4-28 Page 5 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
the 286E co-processing board is added the speed jumps from 3.0 to
|
|||
|
9.2.
|
|||
|
|
|||
|
The Maxum XE in my Benchmark Test using PKARC to archive the
|
|||
|
following group of files used in my ARC tests.
|
|||
|
|
|||
|
Filename Length Method Size Ratio
|
|||
|
-------- ------ ------ ------ -----
|
|||
|
AUTOEXEC.BAT 33 Crunched 31 7%
|
|||
|
COMMAND.COM 17664 Crunched 14787 17%
|
|||
|
CORRSTAR.OVR 57344 Crunched 28768 50%
|
|||
|
INTERNAL.DCT 35584 Squeezed 33871 5%
|
|||
|
LF.COM 512 Crunched 382 26%
|
|||
|
MAILMRGE.OVR 11520 Crunched 7533 35%
|
|||
|
PROKEY.EXE 13824 Crunched 6360 54%
|
|||
|
WC.EXE 12288 Crunched 8315 33%
|
|||
|
WINSTALL.COM 1152 Crunched 746 36%
|
|||
|
WINSTALL.OVR 38528 Crunched 22784 41%
|
|||
|
WPE.COM 21376 Crunched 16622 23%
|
|||
|
WPEMSGS.OVR 29056 Crunched 16072 45%
|
|||
|
WPEOVLY1.OVR 41216 Crunched 33172 20%
|
|||
|
WS1.PRO 29 Stored 29 0%
|
|||
|
WSCOLOR.BAS 6656 Crunched 2967 56%
|
|||
|
---- ------ ------ -----
|
|||
|
0015 286782 192439 33%
|
|||
|
|
|||
|
The following results were recorded when PKARC was used to create
|
|||
|
an archive file from the above files.
|
|||
|
|
|||
|
Normal Speed Turbo Speed 286 Turbo Speed
|
|||
|
--------------------------------------------
|
|||
|
01:12:43 00:44:99 00:20:00
|
|||
|
--------------------------------------------
|
|||
|
|
|||
|
Using Wordstar and Nodelist.184 I performed a standard move
|
|||
|
cursor to end of file test. The length of the nodelist used was
|
|||
|
149436 bytes.
|
|||
|
|
|||
|
Normal Speed Turbo Speed 286 Turbo Speed
|
|||
|
--------------------------------------------
|
|||
|
00:33:33 00:16:12 00:14:75
|
|||
|
--------------------------------------------
|
|||
|
|
|||
|
Using PC Lab's Bench02 test which basically finds prime numbers
|
|||
|
the following results occurred.
|
|||
|
|
|||
|
Normal Speed Turbo Speed 286 Turbo Speed
|
|||
|
--------------------------------------------
|
|||
|
00:27:00 00:17:00 00:05:00
|
|||
|
--------------------------------------------
|
|||
|
|
|||
|
All in all, a fine computer.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 6 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
Yoshi Mikami, November 26, 1986
|
|||
|
|
|||
|
|
|||
|
FidoNet in Japan
|
|||
|
|
|||
|
|
|||
|
[Editor's note: Sorry for the unusually long delay on this
|
|||
|
article. It came to us via a very circuitous route.]
|
|||
|
|
|||
|
|
|||
|
*** DOMESTIC NEWS ***
|
|||
|
|
|||
|
FIDO/COLLIE SYSOPS' MEETING
|
|||
|
|
|||
|
The November Fido/Collie Sysops' meeting was attended by
|
|||
|
Tatsuyuki Arai, Yoshi Mikami, Maki Ohtoh and Junsei Yamada. It
|
|||
|
was held on 11/14/86 at 7:00, at Renoir coffee shop (phone 03-
|
|||
|
493-1454) near the east exit of Osaki Station in Tokyo. Arai,
|
|||
|
Jun Moriya, John Takiguchi and Yamada had started this meeting on
|
|||
|
every second Friday of the month from last August to discuss
|
|||
|
common FidoNet issues and concerns. For Mikami and Ohtoh, it was
|
|||
|
the first time to meet these people.
|
|||
|
|
|||
|
We jointly decided that we will write to International FidoNet
|
|||
|
Association, St. Louis, Missouri, to get the FidoNet region
|
|||
|
number for Japan. We do not want a host node under Pacific
|
|||
|
Region 12, out of Honolulu, Hawaii, as other Asia-Pacific
|
|||
|
countries such as Australia and New Zealand are operating.
|
|||
|
Mikami will write the letter.
|
|||
|
|
|||
|
Arai wants to use the POLL and PICKUP functions on the receive-
|
|||
|
only FIDO node in Tokyo from his FIDO at home. Those functions
|
|||
|
do not work properly for him. Tom Jenning's 8/85 documentation
|
|||
|
that he has does not explain in sufficient detail how to use
|
|||
|
these functions. We will get assistance from Fido operators in
|
|||
|
U.S.
|
|||
|
|
|||
|
We know that there is a Usenet gateway, run by Bob Hartman, on
|
|||
|
FidoNet 101/101, according to the 8/86 Fido documentation. Does
|
|||
|
anyone know how to contact a Usenet node in Japan?
|
|||
|
|
|||
|
Before switching to Fido, Arai ran Collie in October to find that
|
|||
|
Collie handles the Japanese Kanji characters nicely. (Ohtoh and
|
|||
|
Mikami have some Japanese messages in their systems.) However,
|
|||
|
Collie has a minor problem in handling Japanese characters, in
|
|||
|
the sense that some Japanese characters are interpreted as
|
|||
|
Collie's control characters. We will write to D. Plunkett when
|
|||
|
Jun Moriya returns from his trip to Australia to get the author's
|
|||
|
help (because he knows the technical details).
|
|||
|
|
|||
|
Arai wanted to confirm, and all the meeting attendees agreed,
|
|||
|
that FidoNet in Japan will be operated on a non-profit basis,
|
|||
|
without discrimination of any kind.
|
|||
|
|
|||
|
The name of FidoNet Japan was authorized to be used on
|
|||
|
Takiguchi's Fido BBS by Tom Jennings earlier this year, according
|
|||
|
FidoNews 4-28 Page 7 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
to Arai. (The Newsletter Editor doubt that this has any
|
|||
|
significance, but it is documented here as this was discussed at
|
|||
|
the meeting.)
|
|||
|
|
|||
|
Any would-be Fido/Collie sysops are welcome to attend this
|
|||
|
monthly meeting. The next meeting is on December 12, at the same
|
|||
|
time, at the same place. If English assistance is needed, help
|
|||
|
will be provided.
|
|||
|
|
|||
|
|
|||
|
COLLIE NET TEST IN KANSAI AREA
|
|||
|
|
|||
|
After some pioneering work in April and May 1986, the Fido/Collie
|
|||
|
activities picked up in the Kansai area recently. Geki Hagiwara
|
|||
|
provided the following experience report:
|
|||
|
|
|||
|
* * * * * * *
|
|||
|
|
|||
|
A BBS network FidoNet was formed and tested in Kansai area in
|
|||
|
Sep/Oct 1986. Actually the software was Collie (Colossus)
|
|||
|
which simulates FidoNet packet transfer protocol. One of the
|
|||
|
reasons we chose Collie, not Fido, was that Collie resets the
|
|||
|
modem every time the session is over. It is believed that
|
|||
|
some modems cannot detect 1200/300 and CCITT/BELL in
|
|||
|
particular sequences. In such case resetting the modem may
|
|||
|
be effective. Through our experience Hi-Modem 1200C looked
|
|||
|
working satisfactorily.
|
|||
|
|
|||
|
The members of TMCNET and their equipments are:
|
|||
|
|
|||
|
NET NODE Name Area Phone H/W
|
|||
|
--- ---- ------------- ----- ------------ --------
|
|||
|
001 001 Joe Takemura Osaka 06-674-1933 JX-5+HDD
|
|||
|
002 K. Sawaguchi Osaka 06-XXX-XXXX JX-4
|
|||
|
002 001 Geki Hagiwara Yasu 0775-86-0919 JX-4+HDD
|
|||
|
002 Ken Iwamoto Kyoto 075-XXX-XXXX JX-5
|
|||
|
003 Junji Tanaka Shiga 0778-XX-XXXX JX-5
|
|||
|
|
|||
|
First, each node operator entered messages to several members
|
|||
|
and the other sysops; then we set Net mail time and watched
|
|||
|
how Collie sends and receives packets. We had a hard time to
|
|||
|
find the best combination of modem initialization commands
|
|||
|
and DIP switch setting. (We were helped by Maki Ohtoh.)
|
|||
|
|
|||
|
We used the following MODMINIT.BBS file:
|
|||
|
|
|||
|
ATX1
|
|||
|
ATH1
|
|||
|
(one blank line - wait 2 seconds)
|
|||
|
ATS0=1
|
|||
|
ATV0
|
|||
|
ATH0
|
|||
|
|
|||
|
FidoNews 4-28 Page 8 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
The Collie startup command was:
|
|||
|
|
|||
|
A>COLLIE /2 /M2 /I1200 /C32
|
|||
|
| | | |____ Carrier mask bit
|
|||
|
| | |____ Modem init. baud rate
|
|||
|
| |____ Modem type
|
|||
|
|____ COM2 port
|
|||
|
|
|||
|
The modem DIP switch setting was:
|
|||
|
|
|||
|
SW1 DTR OFF
|
|||
|
SW2 Result no effective
|
|||
|
SW3 Return ON (should have no effect)
|
|||
|
SW4 Echo no effective
|
|||
|
SW5 Answer no effective
|
|||
|
SW6 CD OFF
|
|||
|
SW7 Tel.line OFF (depends on phone line)
|
|||
|
SW8 Command ON
|
|||
|
|
|||
|
Although the modem operation was unstable like trying to call
|
|||
|
while the modem is off hook, the test resulted in a great
|
|||
|
success. We just tested the network formed by JX systems,
|
|||
|
but this network would not be open to public until the mail
|
|||
|
charge system is established.
|
|||
|
|
|||
|
* * * * * * *
|
|||
|
|
|||
|
For other details, contact Hagiwara or Joe Takemura at the BBS
|
|||
|
sytem number (at night only) listed above.
|
|||
|
|
|||
|
|
|||
|
FIDO/COLLIE SYSTEMS IN OPERATION
|
|||
|
|
|||
|
To our knowledge, the following five Fido/Collie BBS systems are
|
|||
|
currently operating on regular basis:
|
|||
|
|
|||
|
017-653-5181 ext. 226-7408, Loki BBS (Fido), by Jon
|
|||
|
Spelbring, 24 hours, 1200/300 (CCITT & Bell)
|
|||
|
045-761-9406, SurfSide Net (Fido), by Tatsuyuki Arai,
|
|||
|
24 hours, 2400/1200/300 bps (CCITT & Bell)
|
|||
|
045-894-7656, Collie Yokohama, by Maki Ohtoh,
|
|||
|
24 hours, 1200/300 bps (CCITT & Bell)
|
|||
|
0466-27-2077, Big Blue BBS (Collie), by Yoshi Mikami,
|
|||
|
10:00-11:30 PM Japan Std Time, 1200/300 (C&B)
|
|||
|
082-842-6401, Strawberry Doughnut Net (Collie), by
|
|||
|
Hitoshi Sugimoto, 10:30-11:55 PM JST, 200/300 (C&B)
|
|||
|
|
|||
|
Fido Japan 03-432-0185 by John Takiguchi is temporarily closed.
|
|||
|
|
|||
|
Mikami, Ohtoh and Sugimoto have been exchanging net messages very
|
|||
|
successfully at 10:45-11:00 PM time slot, since early October,
|
|||
|
between Fujisawa/Yokohama and Hiroshima, a distance of 500 miles.
|
|||
|
After much experiment, Infotech's Hi-Modem 1200C among the
|
|||
|
several JATE-approved Hayes-compatible (AT-command compatible)
|
|||
|
modems was found to handle the Fido/Collie net message
|
|||
|
transmission. They would like to hear other people's experiences
|
|||
|
FidoNews 4-28 Page 9 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
on other modems, because there definitely is a need here for good
|
|||
|
modem competition.
|
|||
|
|
|||
|
Ken Sugimoto has translated most of the Collie .MNU files into
|
|||
|
Japanese for easier operator interface, and has been operating a
|
|||
|
Collie node since October, somewhere near the Fish Market in
|
|||
|
Tsukiji, Tokyo. We'll get his phone number shortly.
|
|||
|
|
|||
|
We do not claim to know everything happening in Japan regarding
|
|||
|
Fido or Collie. Please contact anyone of us to let others know
|
|||
|
what's going on.
|
|||
|
|
|||
|
|
|||
|
LETTER TO REQUEST JAPANESE REGION NUMBER SENT
|
|||
|
|
|||
|
A letter was sent 11/16/86 by Mikami to International FidoNet
|
|||
|
Association requesting a region number for Japan, with copies to
|
|||
|
Tom Jennings (author of Fido BBS software) and Dan Plunkett
|
|||
|
(author of Colossus BBS sofware). A fifty dollar check was
|
|||
|
enclosed as our donation. Copies were also sent to people
|
|||
|
mentioned in Item 1.a. above.
|
|||
|
|
|||
|
|
|||
|
*** INTERNATIONAL NEWS ***
|
|||
|
|
|||
|
|
|||
|
MESSAGE EXCHANGE WITH HONG KONG
|
|||
|
|
|||
|
Katsu Shintani called FIDO BBS in Hong Kong 00852-5-893-7856 in
|
|||
|
October. This is the nearest Fido/Collie BBS overseas that we
|
|||
|
know of. In return, Fido Japan and Collie Yokohama received a
|
|||
|
few messages from Hong Kong.
|
|||
|
|
|||
|
|
|||
|
ASSISTANCE TO OTHER ASIAN COUNTRIES
|
|||
|
|
|||
|
There are several FidoNet systems running in Australia and
|
|||
|
Indonesia according to the 3/86 nodelist. We would like to
|
|||
|
identify other Fido systems that may be operating in this region
|
|||
|
of the world. We also offer assistance if help is needed to set
|
|||
|
up Fido or Collie BBS in the Asia-Pacific countries.
|
|||
|
|
|||
|
For those who may not know, Colossus ("Collie") is Fido-
|
|||
|
compatible software that is beginning to be used this year.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 10 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
Chris Irwin
|
|||
|
Miami Shareware, 135/68
|
|||
|
|
|||
|
MegaList
|
|||
|
A Cross-System File Listing
|
|||
|
(YOU can easily join!)
|
|||
|
|
|||
|
|
|||
|
I was in one of my more creative moods the other day; I've
|
|||
|
finally written a system that I've wanted to for quite some time
|
|||
|
now: MegaList. The "MegaList" is an alphabetized file listing
|
|||
|
that combines the files from ALL PARTICIPATING Fido/Opus systems.
|
|||
|
If you've ever needed a file, but didn't know where to find it,
|
|||
|
the MegaList is a good place to look; scan down the list for the
|
|||
|
file you need, and listed next to it are the BBSs that have it
|
|||
|
online.
|
|||
|
|
|||
|
The MegaList is available for download or SEAdog file
|
|||
|
request from 135/68. The following files are online now:
|
|||
|
|
|||
|
MEGALIST.ARC/TXT The National (unfiltered) MegaList
|
|||
|
MEGA-ARC.ARC/TXT The National ARChive MegaList
|
|||
|
MEGA-TXT.ARC/TXT The National TXT/DOC MegaList
|
|||
|
ML-UPD.ARC MegaList Update Software
|
|||
|
|
|||
|
YOUR system can be added to the NATIONAL MegaList if you
|
|||
|
simply run the update program, ML-UPD. This program will create
|
|||
|
an update file based on YOUR system information and FILES.BBS
|
|||
|
contents. This data is then ARCed and Net-mailed to 135/68 for
|
|||
|
central collection. The NATIONAL MegaList is updated each day at
|
|||
|
6:15AM and posted for download or file request.
|
|||
|
|
|||
|
Placing your system in the MegaList will let the rest of the
|
|||
|
world know what's on your system without everyone having to call
|
|||
|
and look. The ML-UPD program is easy and only takes about 1-2
|
|||
|
minutes to run. All you must do is send a MegaList update to
|
|||
|
Miami at least once every 45 days, and you will be in the daily
|
|||
|
MegaList update.
|
|||
|
|
|||
|
As of this writing, I haven't released ML-COL, the "host"
|
|||
|
processing/collection program. I will be releasing this system
|
|||
|
in its entirety before the end of August. If you're interested
|
|||
|
in creating a LOCAL MegaList for YOUR area, please contact me for
|
|||
|
the list creation software.
|
|||
|
|
|||
|
|
|||
|
Chris Irwin, Miami Shareware, 135/68
|
|||
|
(305) 232-9365 (300/1200/2400/9600-HST)
|
|||
|
|
|||
|
Other Miami Shareware releases: (as of July 14th)
|
|||
|
|
|||
|
ARCMSG17.ARC ARC and Purge message bases (Fido/Opus)
|
|||
|
MS-AR25.ARC Accounts Receivable System
|
|||
|
MS-IC25.ARC Inventory Control System
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
FidoNews 4-28 Page 11 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
AUTHENTIC SECURE SECRET FIDO MAIL WITH PUBLIC KEY ENCRYPTION
|
|||
|
|
|||
|
INTRODUCTION
|
|||
|
============
|
|||
|
This article was written by Prodex Labs, for examination and
|
|||
|
comment by IFNA (International Fidonet Association) Sysops,
|
|||
|
members, Fidonet users, and others interested in electronic mail
|
|||
|
and security. Prodex Labs (Lee Rothstein, Phil Zimmermann &
|
|||
|
Steve Welch) is very much interested in your comments and
|
|||
|
suggestions.
|
|||
|
|
|||
|
PRODEX LABS, PUBLIC KEY ENCRYPTION & FIDO
|
|||
|
-----------------------------------------
|
|||
|
We are now about ready to deliver C-based modules that can carry
|
|||
|
out public key encryption.
|
|||
|
|
|||
|
We are writing this article because of the extreme relevance we
|
|||
|
see of public key cryptography to electronic mail. We assume
|
|||
|
electronic mail is near and dear to your hearts, and we think you
|
|||
|
might be interested in the application of public key encryption
|
|||
|
to Fidomail and Fidonet transfers. The discussion, we provide
|
|||
|
here, on public key cryptography aims specifically at electronic
|
|||
|
mail applications.
|
|||
|
|
|||
|
Public key encryption technology allows the convenient
|
|||
|
distribution of messages through an electronic mail system secure
|
|||
|
against other users, sysops ("superusers") and even systems
|
|||
|
programmers. It allows this security in the face of inherently
|
|||
|
insecure networks and hosts. This we think is a feature whose
|
|||
|
time has come. We think it lends itself well to the expansion of
|
|||
|
Fidonet services, as well as the opportunity for Fido sysops to
|
|||
|
unobtrusively draw revenue from a subset of Fido services--
|
|||
|
specifically those that have to do with private and commercial
|
|||
|
mail.
|
|||
|
|
|||
|
Specifically, we suspect the lack of privacy of messages (from
|
|||
|
Sysops and technotwits) has discouraged the use of Fido as a
|
|||
|
national distribution medium for personal mail, and business
|
|||
|
mail. Second, the lack of an authentication mechanism has
|
|||
|
discouraged commercial concerns from using Fidomail as a
|
|||
|
distribution mechanism for authentic marketing programs and
|
|||
|
documents such as ads, coupons and purchase orders. By adding
|
|||
|
these commercial services to Fido, the revenue produced could be
|
|||
|
used to subsidize other Fido services such as mass storage
|
|||
|
(downloads) and Techline distribution (long distance charges).
|
|||
|
|
|||
|
The authentication capability mentioned in the previous paragraph
|
|||
|
might also be of use directly to Fidonet as it grows.
|
|||
|
Authentication would allow nodes that are operating in a store
|
|||
|
and forward sub-net to prove their legitimacy prior to a relay
|
|||
|
operation. Since we are not familiar with the daily operational
|
|||
|
problems of Hosts, we do not know if we have proposed a solution
|
|||
|
to a non-existent problem.
|
|||
|
|
|||
|
Finally, we think that the recent introduction of "Dutchie" may
|
|||
|
be one of the key ingredients to the success of the introduction
|
|||
|
FidoNews 4-28 Page 12 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
and use of public key encryption in Fidonet. For those of you
|
|||
|
not yet familiar with it, Dutchie is the private delivery point
|
|||
|
implementation for Fidonet by Henk Wevers.
|
|||
|
|
|||
|
SINGLE KEY ENCRYPTION: WHY PUBLIC KEY ENCRYPTION IS REQUIRED!
|
|||
|
--------------------------------------------------------------
|
|||
|
Public key encryption technology differs from the more well-known
|
|||
|
single key technology in that each person has two keys associated
|
|||
|
with him/her--a public key, and a private key. (DES--Data
|
|||
|
Encryption Standard--is the most well-known example of single key
|
|||
|
encryption.)
|
|||
|
|
|||
|
In public key encryption, the public key is known by everyone and
|
|||
|
either can be looked up by the user from a table of keys versus
|
|||
|
user names or automatically looked up by the applications
|
|||
|
software (e.g., electronic mail software).
|
|||
|
|
|||
|
In single key encryption, Fred encrypts file 'nerd.msg' with the
|
|||
|
key "secret_potion". When Bill wants to decrypt the file, he
|
|||
|
must have been told by Fred what the key for decrypting (i.e.,
|
|||
|
encrypting) 'nerd.msg' is. Specifically, Bill must supply the
|
|||
|
key "secret_potion" to decrypt 'nerd.msg'. If "secret_potion" is
|
|||
|
always associated with Fred's files, then Bill knows the key for
|
|||
|
those files that Fred does not want him to see. More succinctly,
|
|||
|
the decryption and encryption functions are inverses of each
|
|||
|
other. Symbolically:
|
|||
|
|
|||
|
(1) encrypted_file <- sk_encrypt(file, key)
|
|||
|
(2) file <- sk_encrypt(encrypted_file, key) i.e., decryption
|
|||
|
is encryption
|
|||
|
and the key is
|
|||
|
the same going
|
|||
|
in both
|
|||
|
directions
|
|||
|
|
|||
|
The above notation assumes that objects with the same name
|
|||
|
and only objects with the same name are identical.
|
|||
|
|
|||
|
Let's look at the consequences of the logic of single key
|
|||
|
encryption within an electronic mail system. Anyone that wants
|
|||
|
to send secret messages to someone else must either know the
|
|||
|
recipient's one and only secret key, or relinquish their own
|
|||
|
secret key, or maintain a list of secret keys by recipient or
|
|||
|
file; not a very attractive alternative.
|
|||
|
|
|||
|
What's worse, if the key information is exchanged by users
|
|||
|
through the mail system, then the sysop has a crack at the key.
|
|||
|
This seems very likely when you consider that you probably want
|
|||
|
the mail system itself to automatically monitor, maintain and
|
|||
|
administer the keys because of the previously described problems.
|
|||
|
|
|||
|
PUBLIC KEY ENCRYPTION
|
|||
|
=====================
|
|||
|
|
|||
|
PUBLIC KEY ENCRYPTION EXPLAINED
|
|||
|
-------------------------------
|
|||
|
FidoNews 4-28 Page 13 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
These and other problems can be made to disappear with a public
|
|||
|
key encryption system. The public and private keys make a
|
|||
|
matched, idiosyncratic set. A file encrypted with the public key
|
|||
|
can only be decrypted by the private key. A file encrypted by
|
|||
|
the private key can only be decrypted by the public key. These
|
|||
|
properties can be used to significant advantage in an electronic
|
|||
|
mail system. The obvious advantage of the public key technology
|
|||
|
over the more normal single private key technology such as DES,
|
|||
|
is that a user does not have to give away his/her private key.
|
|||
|
|
|||
|
Secrecy
|
|||
|
-------
|
|||
|
If you want secrecy in a message that you send us, you encrypt
|
|||
|
the message with our public key and then we decrypt it with our
|
|||
|
private key.
|
|||
|
|
|||
|
Signature Function
|
|||
|
------------------
|
|||
|
If you want to authenticate a message as really coming from you,
|
|||
|
you encrypt it with your private key and then we decrypt it with
|
|||
|
your public key. If your public key does not make the message
|
|||
|
intelligible then it wasn't encrypted with your private key and
|
|||
|
therefore it didn't come from you--the one and only person who
|
|||
|
has access to your private key.
|
|||
|
|
|||
|
Secrecy & Authentication
|
|||
|
------------------------
|
|||
|
The secrecy and authentication encryptions outlined above can be
|
|||
|
combined sequentially to provide a complete framework of security
|
|||
|
for electronic mail.
|
|||
|
|
|||
|
Symbolically, we could describe these properties as:
|
|||
|
|
|||
|
If A were sending a message to B:
|
|||
|
|
|||
|
(1) encrypted_file <- pk_encrypt(file, public_key_B)
|
|||
|
(2) file <- pk_decrypt(encrypted_file,
|
|||
|
private_key_B)
|
|||
|
|
|||
|
(1) Would be used by the sender to achieve privacy.
|
|||
|
(2) Would be used by the receiver to achieve
|
|||
|
"legibility."
|
|||
|
|
|||
|
AND
|
|||
|
|
|||
|
(3) encrypted_file <- pk_encrypt(file, private_key_A)
|
|||
|
(4) file <- pk_decrypt(encrypted_file,
|
|||
|
public_key_A)
|
|||
|
|
|||
|
(3) Would be used by the sender to achieve
|
|||
|
authentication.
|
|||
|
(4) Would be used by the receiver to prove
|
|||
|
authentication and achieve "legibility."
|
|||
|
|
|||
|
If we wished privacy and authentication in a message from A to B:
|
|||
|
|
|||
|
FidoNews 4-28 Page 14 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
(5) double_encrypted_file <-
|
|||
|
pk_encrypt(pk_encrypt(file, public_key_B),
|
|||
|
private_key_A)
|
|||
|
(6) file <- pk_decrypt(pk_decrypt(double_encrypted_file,
|
|||
|
private_key_B), public_key_A)
|
|||
|
|
|||
|
(5) Would be used by the sender to achieve privacy and
|
|||
|
authentication.
|
|||
|
(6) Would be used by the receiver to achieve
|
|||
|
"legibility", and prove authentication.
|
|||
|
|
|||
|
In the above notation we again assume that objects with the
|
|||
|
same name and only objects with the same name are
|
|||
|
equivalent.
|
|||
|
|
|||
|
OTHER REQUIREMENTS & PROPERTIES
|
|||
|
-------------------------------
|
|||
|
Several other properties of public key encryption require
|
|||
|
explanation to fully understand how security can be maintained
|
|||
|
and how a mail system can work.
|
|||
|
|
|||
|
First, the program that generates the key pairs can be widely
|
|||
|
distributed so that it can be used by each user privately and
|
|||
|
securely.
|
|||
|
|
|||
|
Second, the algorithm that generates the public key from the
|
|||
|
private key is not reversible either by the generating program or
|
|||
|
by any other program a hacker would write.
|
|||
|
|
|||
|
Third, the kinds of keys generated and required by the encrypt /
|
|||
|
decrypt function(s) are on the order of a 1000 bits. This is
|
|||
|
what makes trial and error computation of the private key
|
|||
|
extremely unlikely to the point of impossibility, and also what
|
|||
|
makes users generating like public keys unlikely.
|
|||
|
|
|||
|
Fourth, the electronic mail nodes (for Fidonet, Fido nodes) would
|
|||
|
have to provide a key server function. Once a user had
|
|||
|
calculated his public key from a private key he would have to
|
|||
|
submit it to a node to be paired with his/her user ID. The
|
|||
|
server function would also have to supply the public key to
|
|||
|
private mail sent to the corresponding user ID. Another major
|
|||
|
function of the key server is an automatic certification process
|
|||
|
that is beyond the scope of a first release product or this
|
|||
|
paper.
|
|||
|
|
|||
|
Finally, for performance sake, any reasonable implementation of
|
|||
|
public key cryptography would transparently (unknown to users)
|
|||
|
invoke an internal method of single key encryption. However, all
|
|||
|
user and crackers would ever (or could ever) see is the public
|
|||
|
key mechanisms.
|
|||
|
|
|||
|
IMPLEMENTING PUBLIC KEY ENCRYPTION WITHIN THE FIDO ENVIRONMENT
|
|||
|
==============================================================
|
|||
|
|
|||
|
THE IMPOSSIBLE DREAM
|
|||
|
--------------------
|
|||
|
FidoNews 4-28 Page 15 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
If we were to directly implement an automatic, public key
|
|||
|
cryptography security system into Fido mail that would avoid
|
|||
|
sysops having any possibility of access to the private keys or
|
|||
|
the mail prior to encryption, we would have to accomplish the
|
|||
|
following:
|
|||
|
|
|||
|
(a) We would have to add a secure mail option to the terminal
|
|||
|
emulation program. We would further have to modify the
|
|||
|
user's terminal emulation program so that all mail text
|
|||
|
entered was encrypted before each line was sent by the user
|
|||
|
to the mail edit/entry function on the BBS.
|
|||
|
|
|||
|
There are some outs here, but they are pretty well
|
|||
|
invalidated by several properties of BBS software. First,
|
|||
|
mail entry is designed to be an online editing activity
|
|||
|
rather than via upload. Second, the mail entry function is
|
|||
|
designed to handle pure text and not the binary files that
|
|||
|
result from encryption. Third, most mail input software
|
|||
|
strongly limits the length and format (e.g., line length,
|
|||
|
blank lines, use of tabs) of input messages. If one uses
|
|||
|
"ASCII transfer" capability there is a possibility the file
|
|||
|
will fail the length test or be modified by the format
|
|||
|
assumptions, because it was not edited with the length and
|
|||
|
format tests operative. Fourth, the prompting feature of
|
|||
|
the mail editor very often interferes with ASCII upload.
|
|||
|
|
|||
|
(b) We would have to make modifications to the BBS mail
|
|||
|
edit/entry function so that some text was accepted in
|
|||
|
unencrypted format (i.e., 'To:' and 'From:' information) and
|
|||
|
the remainder was in encrypted format (i.e., 'Subject:' and
|
|||
|
body of message. ('From:' can be hidden if BBS Sysops do not
|
|||
|
object.)
|
|||
|
|
|||
|
(c) We would have to add a public key server function to the BBS
|
|||
|
that would maintain and service public keys. This would
|
|||
|
also have to allow for the distribution of keys from node to
|
|||
|
node.
|
|||
|
|
|||
|
(d) We would have to make sure that encryption did not interfere
|
|||
|
with Fidomail routing line additions to the text body.
|
|||
|
|
|||
|
This theory will not work or rather will not work without a
|
|||
|
ground swell of support for private mail. We cannot get control
|
|||
|
of all of the following simultaneously: (a) user terminal
|
|||
|
emulation software, (b) Fido mail entry software, (c) Fido
|
|||
|
general BBS software, (d) Fido networking and mail exchange
|
|||
|
software. How do we create the ground swell, then?
|
|||
|
|
|||
|
FIRST STEPS
|
|||
|
-----------
|
|||
|
|
|||
|
Step 1
|
|||
|
------
|
|||
|
We develop two program functions (they may or may not actually be
|
|||
|
separate programs) that can be distributed via Fido. Currently,
|
|||
|
we estimate we can have these two programs done within two
|
|||
|
FidoNews 4-28 Page 16 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
months.
|
|||
|
|
|||
|
The first program is a DOS (Unix style) filter. It has two
|
|||
|
functions. First, given one file that contains the private key
|
|||
|
and a second file that contains the text to be encrypted, this
|
|||
|
first program, which I will call 'pk_crypt', provides an output
|
|||
|
file that is encrypted and can be decrypted with the public key.
|
|||
|
This serves the authentication function. Second, 'pk_crypt' can
|
|||
|
encrypt a file with public key so that it can be decrypted with
|
|||
|
the private key. This provides the privacy function.
|
|||
|
|
|||
|
The second program generates unique key pairs.
|
|||
|
|
|||
|
Step 2
|
|||
|
------
|
|||
|
Sysops provide a message section and a coordinated file section.
|
|||
|
The message section allows users to notify each other that there
|
|||
|
are secure messages that have been uploaded to the respective
|
|||
|
users that have been notified via standard Fido text message.
|
|||
|
The file section is not only a safe (reliable, not secure) port
|
|||
|
for uploaded secure message files but also for a single text file
|
|||
|
that contains a list of the mapping of user IDs to public keys.
|
|||
|
Users upload their public keys as they generate them and the
|
|||
|
sysops collate these standard format subfiles into a single
|
|||
|
standard format public key-user ID list.
|
|||
|
|
|||
|
We will provide documentation not only for the use of the
|
|||
|
program, but also for how users can "certify" new users and new
|
|||
|
keys, since we will not at this stage be able to provide a key
|
|||
|
server automated certification process.
|
|||
|
|
|||
|
Step 3
|
|||
|
------
|
|||
|
Sysops provide a standard service that allows binary files to be
|
|||
|
"attached to" Fidomail messages. Nothing automatic is implied by
|
|||
|
the previous sentence.
|
|||
|
|
|||
|
Step 4
|
|||
|
------
|
|||
|
We would have to provide a mail function that from the same level
|
|||
|
of menu allowed the entry of a text tag message into the message
|
|||
|
system, followed by the immediate upload of an encrypted (perhaps
|
|||
|
archived) file to the secure message file section.
|
|||
|
|
|||
|
The inverse of these two processes would also have to be
|
|||
|
provided. Users would have to be able, from the same level of
|
|||
|
message menu, to first read a tag message, and, then,
|
|||
|
immediately, download the associated secure binary message file.
|
|||
|
|
|||
|
.
|
|||
|
.
|
|||
|
.
|
|||
|
|
|||
|
WHAT DO YOU THINK?
|
|||
|
==================
|
|||
|
This is a lot to lay on anyone in one swell foop. What do you
|
|||
|
FidoNews 4-28 Page 17 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
think about practically any of this? We are especially
|
|||
|
interested in your views and ideas as to how (or if) it can fit
|
|||
|
into Fidonet. We await your responses.
|
|||
|
|
|||
|
|
|||
|
Lee Rothstein, Phil Zimmermann, Steve Welch
|
|||
|
|
|||
|
|
|||
|
Prodex Laboratories
|
|||
|
------ ------------
|
|||
|
|
|||
|
COMPUTER AND COMMUNICATIONS SYSTEMS
|
|||
|
PRODUCT DEVELOPMENT CONSULTING
|
|||
|
|
|||
|
o Computer and communications system product development:
|
|||
|
Software, Hardware & Integration
|
|||
|
o Marketing requirements, product, business & strategic
|
|||
|
plans
|
|||
|
o Market research
|
|||
|
o New venture evaluation
|
|||
|
o Technical marketing, marketing programs, seminar
|
|||
|
development
|
|||
|
o Product definition, architecture development, systems
|
|||
|
engineering, human interface design
|
|||
|
o Strategic information systems & computerized marketing
|
|||
|
|
|||
|
Lee D. Rothstein
|
|||
|
Prodex Laboratories
|
|||
|
7723 Arlington Drive
|
|||
|
Boulder, CO 80303-3207
|
|||
|
(303) 499-8716 (Voice)
|
|||
|
|
|||
|
We can be contacted via any of these BBSes, or via FidoNet at one
|
|||
|
of these BBSes:
|
|||
|
|
|||
|
o Microlink B Fido. Fido 104/108. (303) 972-4181.
|
|||
|
o Eighth Sea Fido. Fido 104/610. (303) 252-9235.
|
|||
|
o Day's End Fido. Fido 104/ 20. (303) 650-5636.
|
|||
|
o Mile Hi Tech Fido. Fido 104/ 56. (303) 973-9338.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 18 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
Patrick McDonald, 109/657
|
|||
|
|
|||
|
Sirius v0.50 - The FOS-Compatible Message Base Manager
|
|||
|
|
|||
|
"... and all I ask is a tall ship and a star to steer her by"
|
|||
|
--- Masefield
|
|||
|
|
|||
|
Sirius, a star in Canis Major also known as the dog star,
|
|||
|
has been guiding mariners in the Northern hemisphere for
|
|||
|
centuries. Sirius, the message base manager by Bob Klahn of 150/1
|
|||
|
will now add a new twist to the common definition by helping
|
|||
|
solve your message base manipulation and navigation problems. No
|
|||
|
matter what software you currently use to interact with your
|
|||
|
Fido/Opus/SEAdog message base, Sirius has features that will help
|
|||
|
make it the message manager of choice on your system.
|
|||
|
|
|||
|
In particular, Sirius 0.50:
|
|||
|
|
|||
|
* Provides universal context-sensitive help via the "?" key.
|
|||
|
|
|||
|
* Adapts its prompting to your needs and level of expertise
|
|||
|
while keeping required keystrokes to a minimum.
|
|||
|
|
|||
|
* Supports one hundred message areas.
|
|||
|
|
|||
|
* Recognizes EchoMail and NetMail areas, and allows them to be
|
|||
|
addressed by name as well as by number.
|
|||
|
|
|||
|
* Edits new or existing messages with the configurable outside
|
|||
|
text editor of your choice, or with its own line-oriented
|
|||
|
editor.
|
|||
|
|
|||
|
* Quotes replied-to message text with prefixing that YOU choose,
|
|||
|
and with the option to prefix the quoted author's lines only.
|
|||
|
|
|||
|
* Moves and copies messages to flat files, to the printer, to
|
|||
|
other message areas, low or high, up or down, and with or
|
|||
|
without "stamping".
|
|||
|
|
|||
|
* Groups messages logically, in ways YOU define, using a library
|
|||
|
of over three dozen Boolean, integer, and string functions.
|
|||
|
Operations may be performed on a message group as a unit, or
|
|||
|
group definitions may be used to filter the retrieval of
|
|||
|
individual messages.
|
|||
|
|
|||
|
* Can record your interactive keystrokes in script form for
|
|||
|
later playback. Yes, Sirius will write your scripts for you!
|
|||
|
|
|||
|
* Allows its complete functionality to be accessed locally,
|
|||
|
remotely, or through its automated scripts.
|
|||
|
|
|||
|
* Provides access to DOS from within the Sirius environment.
|
|||
|
|
|||
|
The Basics
|
|||
|
~~~~~~~~~~
|
|||
|
|
|||
|
FidoNews 4-28 Page 19 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
The entire interactive interface of Sirius is designed to
|
|||
|
minimize the number of keystrokes entered. Many of the main menu
|
|||
|
commands have lower submenus, and commands may be stacked as
|
|||
|
appropriate, with white space needed only when ambiguity might
|
|||
|
otherwise result. In addition, the "?" character is available at
|
|||
|
all menus to provide context sensitive help to guide you along.
|
|||
|
|
|||
|
As a message base manager, Sirius provides you with all the
|
|||
|
usual functions, and then some. You may select a message area
|
|||
|
not only by the usual method of area number, but by the
|
|||
|
associated EchoMail area tag as well. If you have many message
|
|||
|
areas or are in the habit of occasionally reorganizing your
|
|||
|
message areas, this feature makes it easier to jump into an echo
|
|||
|
area. The entire area name need not be specified when utilizing
|
|||
|
this feature, but only enough to uniquely identify it.
|
|||
|
|
|||
|
Messages may be retrieved in a number of ways (forward,
|
|||
|
backward, and by links), and when retrieving messages it is not
|
|||
|
necessary to view the entire text. You may tell Sirius to only
|
|||
|
view message text until a given text string is encountered (such
|
|||
|
as 'SEEN-BY: '), and as indicated in the example, this is usually
|
|||
|
used to squelch the EchoMail routing information.
|
|||
|
|
|||
|
Shifting into 2nd Gear
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
You can do a lot more with messages than just retrieve them
|
|||
|
and display them to your screen. Sirius provides features for
|
|||
|
moving messages around to various locations. You may copy
|
|||
|
messages to a file (optionally either appending or overwriting
|
|||
|
the file), to your printer, or to other locations in the message
|
|||
|
system. These "other locations" encompass copying the message to
|
|||
|
another area as well as different spots within the same area.
|
|||
|
When moving a message, you may optionally ask Sirius to include a
|
|||
|
"stamp" line in the copied message (much like the Opus forwarding
|
|||
|
information but much more concise).
|
|||
|
|
|||
|
The Doctor's Office
|
|||
|
~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
So, you want to change something about a message? The Doctor
|
|||
|
function provides the means of changing virtually every aspect of
|
|||
|
a message IN PLACE, including message header fields, body text,
|
|||
|
flags, and attach filenames. The Body doctor is also a powerful
|
|||
|
tool all by itself, providing a full-featured line-oriented text
|
|||
|
editor for the message body. The line editor makes extensive use
|
|||
|
of PC editing keys while providing control key mapping for remote
|
|||
|
usage and local keyboards that don't have these keys. Selected
|
|||
|
portions of the message body may be re-wrapped at will and to any
|
|||
|
line width that you like. You may also import text from external
|
|||
|
files. As powerful as the editing features inherent to Sirius
|
|||
|
are, you may need to do something to a message body not provided
|
|||
|
by Sirius, or may simply have a preference for a full-screen
|
|||
|
editor. This is no problem since Sirius provides support for
|
|||
|
editing message bodies with the external text editor of your
|
|||
|
choice.
|
|||
|
FidoNews 4-28 Page 20 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
... And you may quote me on that!
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
When replying to an existing message, Sirius provides a
|
|||
|
quoting feature that is unsurpassed by any other message system.
|
|||
|
You are not locked into any particular reply prefix, but rather
|
|||
|
may specify your own "designer quote" to be used for prefixing
|
|||
|
selected portions of the text of the replied-to message. Sirius
|
|||
|
does not just blindly prefix the entire original message text
|
|||
|
when forming the reply-quoted message (although it can if you
|
|||
|
desire) but actually has the ability to prefix only those
|
|||
|
portions of the original message that ARE NOT ALREADY PREFIXED!
|
|||
|
This becomes especially useful when responding to a message that
|
|||
|
already has text reply-quoted from one or more authors.
|
|||
|
|
|||
|
Join the Group
|
|||
|
~~~~~~~~~~~~~~
|
|||
|
|
|||
|
Sirius provides a group definition facility that is perhaps
|
|||
|
the single most powerful capability in its arsenal. Using an
|
|||
|
extensive set of message-oriented functions and an expression
|
|||
|
formation language similar to many general programming languages,
|
|||
|
you may define up to twenty-six different message groups. A
|
|||
|
group definition may be used in one of two different ways.
|
|||
|
First, a message group may be used as a retrieval filter. That
|
|||
|
is, by virtue of a group definition being in force, the message
|
|||
|
area appears to only contain messages that match the group
|
|||
|
specification. This might be used for something as simple as
|
|||
|
only considering messages addressed specifically to you, for
|
|||
|
example.
|
|||
|
|
|||
|
The second use of a group definition is in conjunction with
|
|||
|
group operations. Group operations mirror, in some respects,
|
|||
|
those functions available for single messages (such as copying to
|
|||
|
a file, deleting, moving elsewhere) but act on the entire group
|
|||
|
of messages as a unit. Some of these group operations are
|
|||
|
unavailable in 0.50, but will be there in 0.51. The built-in
|
|||
|
functions for use in group definitions include the following:
|
|||
|
|
|||
|
Boolean (Message Flags):
|
|||
|
|
|||
|
@Private @Xpress @Received @Sent
|
|||
|
@FileAttach @InTransit @Orphan @KillSent
|
|||
|
@Local @Hold @FileReq @AuditReq
|
|||
|
@ReceiptReq @UpdateReq
|
|||
|
|
|||
|
Boolean (Other):
|
|||
|
|
|||
|
@FromYou @ToYou @NoBody @ReadOnly
|
|||
|
|
|||
|
Integer Functions:
|
|||
|
|
|||
|
@DaysHere @DaysOld @FileSize @Zenith
|
|||
|
@HighMsg# @LowMsg# @Msg# @MsgCount
|
|||
|
@NetFrom @NetTo @NodeFrom @NodeTo
|
|||
|
|
|||
|
FidoNews 4-28 Page 21 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
String Functions (case insensitive):
|
|||
|
|
|||
|
@From @To @Subject @Header
|
|||
|
@Body @Msg @Keyin
|
|||
|
|
|||
|
Sirius provides the usual conditional operators (EQ, NE, GT, LT,
|
|||
|
GE, LE, AND, OR), as well as some additional ones:
|
|||
|
|
|||
|
CO contains
|
|||
|
NC does not contain
|
|||
|
IN is contained in
|
|||
|
NI is not contained in
|
|||
|
|
|||
|
A few simple examples of Sirius expressions will make clear the
|
|||
|
power intrinsic in their usage:
|
|||
|
|
|||
|
1. @ToYou OR @FromYou
|
|||
|
|
|||
|
This expression will match only those messages that are to you or
|
|||
|
from you.
|
|||
|
|
|||
|
2. @ToYou AND @Private
|
|||
|
|
|||
|
This expressions will match those messages addressed to you which
|
|||
|
are private.
|
|||
|
|
|||
|
3. @From CO 'arcmail' AND NOT @Local
|
|||
|
|
|||
|
This expression would match your inbound ARCmail attach messages.
|
|||
|
|
|||
|
4. @DaysHere GT 7 AND @InTransit
|
|||
|
|
|||
|
Suppose you are a hub and want to identify those messages that
|
|||
|
have been sitting waiting for delivery for more than a week (a
|
|||
|
possible indication of trouble)? This will do it.
|
|||
|
|
|||
|
5. @Msg CO 'Heinlein'
|
|||
|
|
|||
|
A science fiction fanatic? This will find those messages related
|
|||
|
to your favorite author.
|
|||
|
|
|||
|
|
|||
|
As is the case elsewhere, the Sirius expression parser is
|
|||
|
built with the user in mind. When entering a Sirius group
|
|||
|
definition, you need only type enough to uniquely identify the
|
|||
|
token, and Sirius will fill in the rest automagically.
|
|||
|
|
|||
|
Shifting into High Gear
|
|||
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|||
|
|
|||
|
What has been mentioned before, but which might not have
|
|||
|
been truly appreciated until now, is the fact that Sirius
|
|||
|
provides a scripting language that allows you to do anything from
|
|||
|
a script that can be done online (including creating new
|
|||
|
messages, replying to old ones, etc...). The script language
|
|||
|
uses a Lisp-like syntax, and the verbs match exactly the menu
|
|||
|
FidoNews 4-28 Page 22 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
commands which you use online, including a conditional and a
|
|||
|
while loop construct driven by the same types of expressions
|
|||
|
listed above. Sirius scripts may call other Sirius scripts in a
|
|||
|
nestable fashion, and I/O commands allow you easily design menus
|
|||
|
and other forms of interaction with the user at the keyboard. In
|
|||
|
combination with DOS parameterized batch files, your Sirius-
|
|||
|
driven system can almost run itself in some respects. As a
|
|||
|
simple example, consider the following script:
|
|||
|
|
|||
|
(View (Xpertise (High))
|
|||
|
View (Continuous)
|
|||
|
Area (NetMail)
|
|||
|
Group (Define (@ToYou AND NOT @Received))
|
|||
|
0 Next
|
|||
|
! (While (@Msg# LE @HighMsg#))
|
|||
|
Copy (Flat file ('NEWTOME.TXT'))
|
|||
|
Next
|
|||
|
! (End)
|
|||
|
Quit (Bbs))
|
|||
|
|
|||
|
This simple script will append all of the new messages to
|
|||
|
you in your netmail area to the file NEWTOME.TXT in your current
|
|||
|
directory. For the new Sirius user who might want to dive right
|
|||
|
in writing Sirius scripts, there is a recording option that you
|
|||
|
may use to allow Sirius to write the script for you, simply by
|
|||
|
recording in the proper format operations that you enter
|
|||
|
interactively.
|
|||
|
|
|||
|
Winding Down
|
|||
|
~~~~~~~~~~~~
|
|||
|
|
|||
|
Sirius is still a growing project. Many enhancements are
|
|||
|
planned and there is an active national Sirius echo being
|
|||
|
coordinated by 150/1. The Sirius author, Bob Klahn, is quite
|
|||
|
receptive to user suggestions for Sirius enhancements. There are
|
|||
|
subtleties and details to Sirius that were not appropriate for
|
|||
|
inclusion in this brief introduction. At the time of this
|
|||
|
writing, there does not exist a single, comprehensive, set of
|
|||
|
documentation for Sirius. This problem is being addressed by the
|
|||
|
Beta Test Group and hopefully will be remedied shortly. In the
|
|||
|
interim, there does exist a complete set of release notes for
|
|||
|
Sirius that cover major features, and these combined with the
|
|||
|
online help and sample scripts shipped with Sirius serve to
|
|||
|
offset the lack of formal documentation. The best bet for a new
|
|||
|
Sirius user is simply to dive in and try it (and to join the
|
|||
|
Sirius echo where experienced users will be able to lend some
|
|||
|
help). Bob's practice in the past has been to release new
|
|||
|
versions of Sirius on a regular schedule. Due to the major
|
|||
|
enhancements in version 0.50 (most dealing with the group
|
|||
|
definition facility), this latest version has been almost four
|
|||
|
months in development and testing, and we are sure you will find
|
|||
|
it worth the wait.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 23 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
Mike Brisson
|
|||
|
The Augusta Forum 360/1
|
|||
|
|
|||
|
THE SPORTSNET ECHO CONFERENCE
|
|||
|
|
|||
|
The SportsNet Echo Conference was started by the Augusta Forum in
|
|||
|
February of this year to give FidoNet boards a chance to talk
|
|||
|
coast to coast about their favorite sports topics. Almost
|
|||
|
everyone has at least a little interest in sports of one type or
|
|||
|
another, either as a participant or a spectator ... if you do,
|
|||
|
this conference is for you.
|
|||
|
|
|||
|
SportsNet is NOT just a "my team's better than yours" conference!
|
|||
|
It is a place for discussions about WHY teams or players are
|
|||
|
better ... or worse. On SportsNet you have to be prepared to
|
|||
|
discuss your choices for the World Series, Super Bowl, or
|
|||
|
whatever ... someone's bound to differ with you.
|
|||
|
|
|||
|
You'll find a place for participants, spectators, and media. The
|
|||
|
net has had discussions among bicycling racers ... and also has
|
|||
|
heard from a TV station director.
|
|||
|
|
|||
|
Of course, the obvious sports (football, baseball, etc.) are
|
|||
|
discussed but there's also lively discussion about the lesser
|
|||
|
known ones (we've even gotten into snake handling and buffalo
|
|||
|
chip throwing)! What-ever the sport, we'll discuss it.
|
|||
|
|
|||
|
SportsNet can be a learning place, too. If you don't know what
|
|||
|
an ERA (base-ball) or a blue line (hockey) are, you can learn
|
|||
|
those things there. Also, the conference has a weekly trivia
|
|||
|
quiz, possibly the first of its kind among echo conferences.
|
|||
|
|
|||
|
Football fans will find a place, this fall, to test their
|
|||
|
prediction skills on NFL games, and possibly selected college
|
|||
|
games as well.
|
|||
|
|
|||
|
If you're not already a part of SportsNet, this is your
|
|||
|
invitation to give us a try. We aren't one of those 100-message-
|
|||
|
a-day conferences that sometimes can overwhelm a newcomer ...
|
|||
|
we're still small enough for anyone to fit right in. We do have
|
|||
|
boards in New York, Baltimore, Pittsburgh, Dallas, Indiana,
|
|||
|
Arkansas, and Oklahoma, as well as most of the Southeastern
|
|||
|
states. If you're interested in SportsNet, drop me a NetMail
|
|||
|
message. We'd like to have you join us!
|
|||
|
|
|||
|
SportsNet Host: Mike Brisson
|
|||
|
Host Sysop: Ed Meloan
|
|||
|
Host System: Augusta Forum (360/1), N. Augusta, SC
|
|||
|
Host System Numbers: (803) 279-4124 or 279-5392
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 24 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
COLUMNS
|
|||
|
=================================================================
|
|||
|
|
|||
|
Glen Jackson
|
|||
|
Broadcast Software
|
|||
|
SEAdog/Fido 100/517
|
|||
|
|
|||
|
Where are we at Now ?
|
|||
|
|
|||
|
We're still at it, going strong in the echos. We've added some
|
|||
|
more nodes. Colorado is a real busy state with the Broadcasters.
|
|||
|
|
|||
|
If you know of any BBS's (in the net or not) that address
|
|||
|
themselves to the broadcasting Industry, drop us a line at
|
|||
|
100/517.
|
|||
|
|
|||
|
If you are in the industry, we welcome your call and feedback.
|
|||
|
We'll point you to the closest node involved in our echos.
|
|||
|
|
|||
|
We're here to encourage communications among the industry. Here
|
|||
|
we are, a communuications group, and we rarely talk to each other
|
|||
|
across the country. Why would we want to?
|
|||
|
|
|||
|
To exchange information. Information on what we use our computers
|
|||
|
at work for. How we use them. Programs that benefit all of us.
|
|||
|
How about issues that will be or do affect us? In such a highly
|
|||
|
competetive market, are we so afraid we'll help someone else
|
|||
|
grow???
|
|||
|
|
|||
|
We want to invite you to become a part of our growing echos. One
|
|||
|
of the echos is not limited to broadcasters only. It is a place
|
|||
|
that the public can talk with the people in the industry. The
|
|||
|
decision makers. People with the answers.
|
|||
|
|
|||
|
If you'd like to become a part of our growing family in the
|
|||
|
Broadcast Echos, let us know. You don't need to run a broadcast-
|
|||
|
specific board to do so. We can be reached by routing a message
|
|||
|
to us at 100/517 - or calling direct at 314-928-2501.
|
|||
|
|
|||
|
Broadcast Software Industries
|
|||
|
> Home of the Broadcast Echos <
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 25 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
-- The Regular Irregular Column --
|
|||
|
Dale Lovell
|
|||
|
1:157/504.1
|
|||
|
|
|||
|
Things are going very well this past week. I've found some
|
|||
|
more programs that will run with SIMCGA (Ancient Art of War and a
|
|||
|
few others by Broderbund). In addition, I'm finally getting used
|
|||
|
to this new keyboard. My old XT had an original PC style layout,
|
|||
|
but with 10 function keys at the top and a cursor pad as well as
|
|||
|
a numeric keypad. The keyboard with the AT is one of the "new"
|
|||
|
101 key style keyboards, 12 function keys and such. I'm still not
|
|||
|
entirely used to it, but things are a lot easier after a few
|
|||
|
weeks of use (and some customizing with SuperKey). Just goes to
|
|||
|
show how flexible the human mind can be when it has to adjust.
|
|||
|
|
|||
|
-- Ventura Publisher Version 1.1 (Xerox, List $895.00) --
|
|||
|
|
|||
|
Some of you may recall how much I liked version 1.0 of
|
|||
|
Ventura Publisher when I got to try it out a few months back.
|
|||
|
Well Xerox has been busy working on an update, and it improves a
|
|||
|
product I wouldn't have thought could be improved. On the surface
|
|||
|
it still looks (and acts) the same, but once you get beyond the
|
|||
|
initial pull down screens it has a lot of new (yet familiar)
|
|||
|
functions and improvements. While it costs $100.00 to update to
|
|||
|
the new version of Ventura, it is money well spent (the list
|
|||
|
price is still the same, it didn't go up). Even the manual
|
|||
|
appears to be written better than the version 1.0 manual.
|
|||
|
|
|||
|
I still thinks it's amusing that Xerox's DeskTop Publishing
|
|||
|
program supports PostScript printers better than Xerox's own
|
|||
|
printers. PostScript users will greatly appreciate some of the
|
|||
|
new features in 1.1. The font names now match the names you're
|
|||
|
used to calling them, and Ventura lists all of the Adobe
|
|||
|
supported fonts. If you have something like the QMS PS800+ (or an
|
|||
|
Allied Linotronic typesetter), you won't have to do anything to
|
|||
|
make Ventura know about your additional fonts. Instead of the box
|
|||
|
selections of fonts and sizes in 1.0, you now see something that
|
|||
|
resembles the box you're used to using to select files (only they
|
|||
|
aren't files, they're several dozen fonts). You are also free to
|
|||
|
enter the point size of the font, no limitations under PostScript
|
|||
|
(other than those your printer has built into it). If you're
|
|||
|
using download fonts to your PostScript device, it's very easy to
|
|||
|
tell Ventura about them. Once told, it will download the fonts
|
|||
|
you're using automatically. While Ventura still doesn't take full
|
|||
|
advantage of PostScript's powerful capabilities, it brings it up
|
|||
|
a step from the previous version (and while I'm not sure, I think
|
|||
|
it beats PageMaker's PostScript support).
|
|||
|
|
|||
|
In version 1.0 there were some wonderful features when
|
|||
|
bringing in a short text file, or some form of art. Ventura 1.1
|
|||
|
increases it's list of generally useful features by being able to
|
|||
|
make these frames follow a specific part of the main text around.
|
|||
|
Xerox calls this "anchoring" a frame to text and may be reason
|
|||
|
enough for many people to spend the $100 on the upgrade. The
|
|||
|
reasoning behind anchoring a picture to text is that pictures are
|
|||
|
meant to go along with the text. An example would be a business
|
|||
|
FidoNews 4-28 Page 26 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
report with several graphs, each graph goes along with a specific
|
|||
|
part of the report. You certainly wouldn't want the employee
|
|||
|
attendance graph to be above the section of the report dealing
|
|||
|
with quarterly sales, would you? Yet this is exactly what could
|
|||
|
happen if you added a few paragraphs of text or added the company
|
|||
|
logo to the top of the report. Ventura 1.1 puts an end to having
|
|||
|
to manually readjust every graphics (or text) frame when you
|
|||
|
change an earlier part of the publication. The frame will follow
|
|||
|
the text around every time you make a change and Ventura allows
|
|||
|
you to anchor frames to text so that the frame will appear above,
|
|||
|
below or on the same page as the text it accompanies. I can see
|
|||
|
this having a large impact on the educational community as thesis
|
|||
|
papers (especially in the sciences, maybe even the arts as I
|
|||
|
think about it) won't have to be such monumental efforts.
|
|||
|
Including a relevant graph in the text of the paper becomes
|
|||
|
trivial, and it will always show up where it belongs.
|
|||
|
|
|||
|
One of the nicer additions to me personally is the support
|
|||
|
for Macintosh MacPaint and PICT files. The MacPaint file support
|
|||
|
is nice because I have several of these already on my system. You
|
|||
|
may know them better as READMAC pictures. All of these can be
|
|||
|
brought right into Ventura. I no longer need to find a program to
|
|||
|
convert them into PC Paintbrush or GEM Paint files. Sysops may
|
|||
|
see a renewed interest in their READMAC file area as people start
|
|||
|
looking around for digitized pictures to put into their work. I
|
|||
|
know I've spent quite a bit of time the past week looking around
|
|||
|
several of the local boards and downloading such files.
|
|||
|
|
|||
|
There are a few disappointments in Ventura 1.1. In the front
|
|||
|
of the manual there is an errata sheet. While support for
|
|||
|
Hewlett-Packard DDL printers and Windows clipboard line art were
|
|||
|
not able to be included in this release of Ventura. It seems HP
|
|||
|
still hasn't finalized the specification for DDL (not to mention
|
|||
|
not shipping any printers that use DDL) and until the
|
|||
|
specification in finished and the printers shipped, Ventura won't
|
|||
|
support it. The Windows clipboard line art is supposedly missing
|
|||
|
because Xerox has been unable to obtain the complete
|
|||
|
specifications on the metafile format. Support for both of these
|
|||
|
items is promised however, and Xerox gives you a number to call
|
|||
|
if you need support for DDL or Windows clipboard line art. As
|
|||
|
soon as it is ready, they'll send it out to you.
|
|||
|
|
|||
|
Overall I am still impressed with Ventura Publisher. Version
|
|||
|
1.1 includes enough new items (as opposed to bug fixes, which
|
|||
|
weren't to many from what I hear) to make it a solid improvement
|
|||
|
over version 1.0. The new features only add to an excellent
|
|||
|
product. I may be prejudiced, but I think this product is an easy
|
|||
|
winner over PageMaker. Most of the people in the LASERPUB
|
|||
|
echomail conference also seem to think the same way. The only
|
|||
|
complaint I can recall on Ventura was due to someone not knowing
|
|||
|
how to do something (as opposed to not being able to do
|
|||
|
something). If you're going to have to buy a page composition
|
|||
|
package in the near future, do yourself a favor and go find a
|
|||
|
dealer who really knows how to use Ventura and have him give you
|
|||
|
a demonstration.
|
|||
|
|
|||
|
FidoNews 4-28 Page 27 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
-- WordPerfect 4.2 (WordPerfect Corp., list price $495.00) --
|
|||
|
|
|||
|
I'll admit it, I've been using WordPerfect for the past few
|
|||
|
weeks and haven't admitted it until now. I conned my boss into
|
|||
|
buying it for me at work and have been getting used to it before
|
|||
|
I "reviewed" it. I didn't want to say anything right away because
|
|||
|
it takes me awhile to become accustomed to a new word processor.
|
|||
|
I didn't want to make the mistake of saying it's a poor product
|
|||
|
just because I hit control-K Q to exit (Wordstar style commands)
|
|||
|
when it wants F7 Y Y (WordPerfect). I must admit that I hated it
|
|||
|
when I was still becoming accustomed to it, but am now a
|
|||
|
WordPerfect convert and am seriously considering buying a copy
|
|||
|
for home as well. After getting used to how the function keys
|
|||
|
work (WordPerfect uses all 40 combinations on the function keys;
|
|||
|
alone, alt-key, ctrl-key, and shift-key) it is a remarkably easy
|
|||
|
word processor to use. My boss also purchased the WordPerfect
|
|||
|
Library, although I won't start going over it until next week.
|
|||
|
|
|||
|
One of the first things I noticed about WordPerfect is that
|
|||
|
it is fast. Supposedly this is because WordPerfect is written
|
|||
|
completely in assembler while many other word processors,
|
|||
|
Microsoft Word included, are written in a mix of C and assembler.
|
|||
|
I don't know if this is actually true, but I do know that it is a
|
|||
|
lot quicker than Word. While it doesn't do some of Word's nice
|
|||
|
displays, in many cases it's easier to use WordPerfect than
|
|||
|
Microsoft Word. In Word I could only spell check the entire
|
|||
|
document and that could take a long time (go to the library, tell
|
|||
|
it I want to do a spell check, etc.). WordPerfect let's me check
|
|||
|
either a word, page or entire document. I've become very
|
|||
|
accustomed to hitting Ctrl-F2 1 and checking the word I just
|
|||
|
entered.
|
|||
|
|
|||
|
While it doesn't have Word's style sheets, it does have
|
|||
|
built in macros; either the Alt-key variety or as an eight
|
|||
|
character name. The only thing it is sadly missing is an editor
|
|||
|
for the macros (they aren't stored in a straight ASCII format
|
|||
|
like Superkey's macros). In order to get a macro editor you must
|
|||
|
purchase the WordPerfect library. The macros aren't hard to
|
|||
|
learn, and in many cases are much more flexible than Word's style
|
|||
|
sheets. One of the first things I did when I started playing with
|
|||
|
it's macros was create one for the start of these columns and
|
|||
|
another with the complete signature. I used a variety of Superkey
|
|||
|
macros to do this in Word and while they were very similar, I
|
|||
|
decided to learn how to do it in WordPerfect. If you aren't
|
|||
|
familiar with keyboard macros, it's basically a way of turning
|
|||
|
several keystrokes into one (although that's a weak comparison,
|
|||
|
it's the best I can do for now).
|
|||
|
|
|||
|
Overall I've been very impressed with it. While I haven't
|
|||
|
really gone into it very deeply, bear with me over the next few
|
|||
|
weeks while I keep learning more about it. Right now I can tell
|
|||
|
that it's going to become my word processor of choice (at least
|
|||
|
until I come across something I like better). I just wish I been
|
|||
|
using it when all I had was a 4.77 mhz XT, the difference in
|
|||
|
speed would have been very nice. If you're looking around for a
|
|||
|
new word processor, I would definitely say try out WordPerfect.
|
|||
|
FidoNews 4-28 Page 28 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
It is fast, powerful, and fairly easy to use. My biggest advice
|
|||
|
is to give yourself a chance to get used to it before you decide
|
|||
|
against it. I'll still probably use Word when I'm looking for a
|
|||
|
variety of fonts (especially if I ever get a laser printer) since
|
|||
|
Word handles different fonts better than WordPerfect, but for all
|
|||
|
my other work I'll be using WordPerfect.
|
|||
|
|
|||
|
-- Winding Down... --
|
|||
|
|
|||
|
I've found a book that may help many of you as you break
|
|||
|
away from BASIC into Pascal or C. It's called "Puzzled
|
|||
|
Programmers" by Michael Wiesenberg (Microsoft Press $12.95). It's
|
|||
|
a little different as it has several short stories accompanying
|
|||
|
each problem (of which there's fifteen) and while the problem
|
|||
|
doesn't actually relate to the story, they make for cute reading.
|
|||
|
Also included are hints to every problem as well as the solution.
|
|||
|
The solutions are presented in BASIC, Pascal and C. One of the
|
|||
|
things Wiesenberg was trying to accomplish was to aid those
|
|||
|
learning a new language. All three solutions to each problem use
|
|||
|
the same basic algorithm, so you can examine the solution in the
|
|||
|
language you already know and compare it to the one you are
|
|||
|
trying to learn. This is supposed to help you see how they are
|
|||
|
similar, and how to take advantage of the special techniques or
|
|||
|
principles of the different languages (like being able to
|
|||
|
initialize several variables at the start of a loop in C). Since
|
|||
|
I already know all three of the languages used, I wasn't able to
|
|||
|
really learn anything with this book, but I can see how it might
|
|||
|
help someone learn about a new language. The problems are all
|
|||
|
mathematical problems, several of which could be solved without
|
|||
|
the aid of a computer. The hints rarely tell you how to write a
|
|||
|
program, they merely guide you along the way by helping you
|
|||
|
figure out how to solve a problem.
|
|||
|
|
|||
|
I really support this method of learning. I've seen too many
|
|||
|
Computer Science or MIS people graduate with honors and yet have
|
|||
|
no idea on how to solve problems. To many courses on computers
|
|||
|
only deal with syntax and modifying an existing program, often
|
|||
|
given to the students in a lecture or text, to do something
|
|||
|
slightly different. To much of programming is determining HOW to
|
|||
|
do something to ignore teaching the students how to solve
|
|||
|
problems (or as I call it, thinking...but I'm fairly sarcastic in
|
|||
|
my attitudes these days). Books like this can help out those of
|
|||
|
you trying to learn how to program more than many of the other
|
|||
|
books I've recommended in this column. Most of the books I
|
|||
|
recommend already assume you can determine the steps necessary to
|
|||
|
accomplish a task, I think "Puzzled Programmers" will help teach
|
|||
|
you this necessary skill. As I look over this paragraph I realize
|
|||
|
that I starting to climb up on my soapbox again, so I'm going to
|
|||
|
wind up by giving high marks to MIchael Wiesenberg on this
|
|||
|
excellent book.
|
|||
|
|
|||
|
As always down below you'll find my US mail address, uucp
|
|||
|
address and FidoNet address. If you're sending me mail through
|
|||
|
FidoNet, please have your sysop route it through 157/1 (or 157/0)
|
|||
|
as I am a private node. I'd like to thank any of you I missed
|
|||
|
answering. While I try to answer every message (electronic or
|
|||
|
FidoNews 4-28 Page 29 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
otherwise) I receive, I'm not the most organized person and I'm
|
|||
|
fairly certain I missed a few somewhere. I'm still waiting to
|
|||
|
hear from the person using the pseudonym "Ender Wiggin," unless
|
|||
|
you're worried about Jane eavesdropping? (for an understanding of
|
|||
|
this read "Ender's Game" and "Speaker for the Dead" by Orson
|
|||
|
Scott Card). I'd like to thank you for the package you sent,
|
|||
|
although I don't have much use for it now. Hope to see all of you
|
|||
|
at FidoCon.
|
|||
|
|
|||
|
|
|||
|
Dale Lovell
|
|||
|
3266 Vezber Drive
|
|||
|
Seven Hills, OH 44131
|
|||
|
|
|||
|
FidoNet 1:157/504.1
|
|||
|
uucp:
|
|||
|
|
|||
|
decvax\
|
|||
|
>!cwruecmp!hal\
|
|||
|
cbosgd/ \
|
|||
|
>!ncoast
|
|||
|
ames\ /
|
|||
|
talcott \ /
|
|||
|
>!necntc/
|
|||
|
harvard /
|
|||
|
sri-nic/
|
|||
|
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 30 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
=================================================================
|
|||
|
NOTICES
|
|||
|
=================================================================
|
|||
|
|
|||
|
The Interrupt Stack
|
|||
|
|
|||
|
|
|||
|
1 Aug 1987
|
|||
|
Third Annual BBS Picnic in Edison, NJ. Please register before
|
|||
|
July 10th. Admission is $7 for adults, $4 for 12 and under,
|
|||
|
free for 5 and under. Contact John Kelley at 107/331 for
|
|||
|
details.
|
|||
|
|
|||
|
20 Aug 1987
|
|||
|
Start of the Fourth International FidoNet Conference, to be
|
|||
|
held at the Radisson Mark Plaza Hotel in Alexandria, VA.
|
|||
|
Contact Brian Hughes at 109/634 for more information. This is
|
|||
|
FidoNet's big annual get-together, and is your chance to meet
|
|||
|
all the people you've been talking with all this time. We're
|
|||
|
hoping to see you there!
|
|||
|
|
|||
|
24 Aug 1989
|
|||
|
Voyager 2 passes Neptune.
|
|||
|
|
|||
|
|
|||
|
If you have something which you would like to see on this
|
|||
|
calendar, please send a message to FidoNet node 1:1/1.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
Latest Software Versions
|
|||
|
|
|||
|
BBS Systems Node List Other
|
|||
|
& Mailers Version Utilities Version Utilities Version
|
|||
|
|
|||
|
Dutchie 2.51 EDITNL 3.3 ARC 5.21
|
|||
|
Fido 11w LISTGEN 05.25.86 ARCmail 1.00*
|
|||
|
Opus 1.00* Prune 1.40 EchoMail 1.31
|
|||
|
SEAdog 4.00 TestList 8.3 FastEcho 2.00
|
|||
|
TBBS 2.0M XlatList 2.81 Renum 3.30
|
|||
|
|
|||
|
* Recently changed
|
|||
|
|
|||
|
Utility authors: Please help keep this list as current as
|
|||
|
possible by reporting new versions to 1:1/1. It is not our
|
|||
|
intent to list all utilities here, only those which verge on
|
|||
|
necessity.
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 31 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
OFFICIAL REGISTRATION FORM
|
|||
|
FOURTH INTERNATIONAL FIDONET CONFERENCE
|
|||
|
RADISSON MARK PLAZA HOTEL
|
|||
|
ALEXANDRIA, VA.
|
|||
|
AUGUST 20 - 23, 1987
|
|||
|
|
|||
|
Name _________________________________ Date _____________
|
|||
|
Address ______________________________
|
|||
|
City & State _________________________
|
|||
|
Phone (Voice) ________________________
|
|||
|
Net/Node Number ______________________
|
|||
|
Phone (Data) _________________________
|
|||
|
|
|||
|
Number in Your Party _________________
|
|||
|
Staying at the Radisson? _____________
|
|||
|
Number of Rooms? _____________________
|
|||
|
Arrival Date? ________________________
|
|||
|
Departure Date? ______________________
|
|||
|
|
|||
|
Registration Fees: How Many Total
|
|||
|
|
|||
|
Full Conference $60.00 each ________ $________
|
|||
|
Late registration $10.00 each ________ $________
|
|||
|
(after Aug. 1)
|
|||
|
|
|||
|
Friday Night Banquet $30.00 each ________ $________
|
|||
|
Saturday Luncheon $16.50 each ________ $________
|
|||
|
|
|||
|
Total Amount Included (Registration and Meals) $________
|
|||
|
|
|||
|
IFNA MEMBERS ONLY:
|
|||
|
How many in your party will
|
|||
|
be attending the Sunday morning
|
|||
|
Board of Directors meeting? ________
|
|||
|
|
|||
|
Send your registration form and a check or money order to:
|
|||
|
|
|||
|
Fourth International FidoNet Conference
|
|||
|
212 E. Capitol St., Washington, D.C. 20003
|
|||
|
Attn: Brian H. Hughes -- voice: (202) 543-4200
|
|||
|
|
|||
|
This registration form does not include hotel accomodations. If
|
|||
|
you wish to stay at the Radisson Mark Plaza Hotel, please contact
|
|||
|
them directly and mention you are with the FidoNet Conference.
|
|||
|
Conference room rates are $80/night for single or double
|
|||
|
occupancy, and $20/night for an extra cot.
|
|||
|
|
|||
|
Radisson Mark Plaza Hotel
|
|||
|
5000 Seminary Rd., Alexandria, Va. 22311
|
|||
|
1-800-228-9822
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
FidoNews 4-28 Page 32 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
Bob Morris 141/333
|
|||
|
Chairman, Elections and Nominations Committee
|
|||
|
|
|||
|
The next two pages are your Official ballot for the Election of
|
|||
|
the IFNA Board of Directors. The following are the few rules
|
|||
|
which must prevail in this election:
|
|||
|
|
|||
|
1. You must send a legible copy of this ballot to the address
|
|||
|
listed on the ballot. It must be signed and bear your
|
|||
|
net/node number.
|
|||
|
|
|||
|
2. You may vote for any one person in your region for the
|
|||
|
position of Regional Director. This vote is to be cast in the
|
|||
|
LEFT column of the ballot.
|
|||
|
|
|||
|
3. You may vote for any eleven people in any regions for the
|
|||
|
position of Director at Large. These votes are to be cast in
|
|||
|
the RIGHT column of the ballot.
|
|||
|
|
|||
|
4. Voting will continue until the end of registration at the
|
|||
|
Conference in August. The results will be read during the
|
|||
|
opening of the business meeting on the first day of the
|
|||
|
conference.
|
|||
|
|
|||
|
5. Write-in Votes will be accepted and are requested during this
|
|||
|
election.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
FidoNews 4-28 Page 33 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
IFNA Board Of Directors
|
|||
|
Ballot
|
|||
|
|
|||
|
Regional At Large
|
|||
|
Region 10:
|
|||
|
Steve Jordan _________ ________
|
|||
|
|
|||
|
|
|||
|
Region 11:
|
|||
|
Ryugen Fisher _________ ________
|
|||
|
Theodore Polczynski _________ ________
|
|||
|
|
|||
|
|
|||
|
Region 12:
|
|||
|
|
|||
|
|
|||
|
Region 13:
|
|||
|
Don Daniels _________ ________
|
|||
|
John Penberthy _________ ________
|
|||
|
Thom Henderson _________ ________
|
|||
|
Gee Wong _________ ________
|
|||
|
Brian Hughes _________ ________
|
|||
|
|
|||
|
|
|||
|
Region 14:
|
|||
|
Ben Baker _________ ________
|
|||
|
Ken Kaplan _________ ________
|
|||
|
Brad Hicks _________ ________
|
|||
|
|
|||
|
|
|||
|
Region 15:
|
|||
|
David Dodell _________ ________
|
|||
|
Larry Wall _________ ________
|
|||
|
|
|||
|
|
|||
|
Region 16:
|
|||
|
Bob Hartman _________ ________
|
|||
|
Hal Duprie _________ ________
|
|||
|
|
|||
|
|
|||
|
Region 17:
|
|||
|
Rob Barker _________ ________
|
|||
|
Bob Swift _________ ________
|
|||
|
|
|||
|
|
|||
|
Region 18:
|
|||
|
Wes Cowley _________ ________
|
|||
|
FidoNews 4-28 Page 34 27 Jul 1987
|
|||
|
|
|||
|
|
|||
|
Region 19:
|
|||
|
Mark Grennan _________ ________
|
|||
|
Wynn Wagner _________ ________
|
|||
|
|
|||
|
|
|||
|
Region 2:
|
|||
|
Henk Wevers _________ ________
|
|||
|
|
|||
|
|
|||
|
Write-in candidates:
|
|||
|
___________________ _________ ________
|
|||
|
___________________ _________ ________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Name ______________________________ Net/Node ___________
|
|||
|
|
|||
|
Signature______________________________ Date ___________
|
|||
|
|
|||
|
|
|||
|
Please complete this and mail it to:
|
|||
|
|
|||
|
Robert Morris
|
|||
|
IFNA Elections Committee
|
|||
|
210 Church Street
|
|||
|
West Haven, Ct. 06516
|
|||
|
|
|||
|
or bring it with you when you come to the conference in August.
|
|||
|
|
|||
|
|
|||
|
These ballots will be counted by myself since with 200 members
|
|||
|
the charges for a CPA would be very high. Hard copies will be
|
|||
|
made available to anyone wishing to insure that their vote was
|
|||
|
included.
|
|||
|
|
|||
|
Thank You
|
|||
|
|
|||
|
Bob Morris
|
|||
|
Elections and Nominations Committee
|
|||
|
|
|||
|
-----------------------------------------------------------------
|
|||
|
|
|||
|
|