2021-04-15 13:31:59 -05:00

1927 lines
88 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Volume 4, Number 28 27 July 1987
+---------------------------------------------------------------+
| _ |
| / \ |
| /|oo \ |
| - FidoNews - (_| /_) |
| _`@/_ \ _ |
| International | | \ \\ |
| FidoNet Association | (*) | \ )) |
| Newsletter ______ |__U__| / \// |
| / FIDO \ _//|| _\ / |
| (________) (_/(_|(____/ |
| (jm) |
+---------------------------------------------------------------+
Editor in Chief: Thom Henderson
Chief Procrastinator Emeritus: Tom Jennings
FidoNews is published weekly by the International FidoNet
Association as its official newsletter. You are encouraged to
submit articles for publication in FidoNews. Article submission
standards are contained in the file ARTSPEC.DOC, available from
node 1:1/1.
Copyright 1987 by the International FidoNet Association. All
rights reserved. Duplication and/or distribution permitted for
noncommercial purposes only. For use in other circumstances,
please contact IFNA at (314) 576-4067.
Three Weeks to FidoCon!
Table of Contents
1. EDITORIAL ................................................ 1
Is Echomail Doomed? ...................................... 1
2. ARTICLES ................................................. 2
The Maxum Turbo XE - A Serious Computer .................. 2
FidoNet in Japan ......................................... 6
MegaList: A Cross-System File Listing .................... 10
Public Key Encryption for FidoNet Mail ................... 11
Sirius 0.50 - A Review ................................... 18
Sports Net ECHO Conference ............................... 23
3. COLUMNS .................................................. 24
Broadcast Booth - In The Network ......................... 24
The Regular Irregular Column ............................. 25
4. NOTICES .................................................. 30
The Interrupt Stack ...................................... 30
Latest Software Versions ................................. 30
International FidoNet Conference Registration Form ....... 31
IFNA Board of Directors Ballot ........................... 32
FidoNews 4-28 Page 1 27 Jul 1987
=================================================================
EDITORIAL
=================================================================
Is Echomail Doomed?
For some time now, and even more so lately, we've been watching
the consequences of our regrettable lack of security. FidoNet is
reasonably secure about sending mail to the right people (if you
don't look too closely at mail pickups), but it's wide open when
it comes to receiving mail. In normal network mail this isn't
all that much of a problem, but with echomail we find ourselves
holding a kettle of fish of quite a different color. I have seen
two major conferences whither and almost die under what amount to
terrorist attacks.
Can we defend ourselves? Security measures can be developed,
surely, but will they do the trick? I suspect not, for a few
reasons.
1) Most of the measures proposed are for securing predefined
conference links, which leaves normal network mail wide open.
2) For good reason. Securing normal netmail is not practical.
How can you prearrange security measures with a new node
across the country that you didn't even know existed?
3) Even if we secured all links between all systems everywhere,
that still won't stop people from willingly linking in
a known terrorist.
4) Besides, anyone could fabricate messages for propagation over
a secure line that appear to originate anywhere at all.
It starts to look pretty hopeless. Is echomail doomed? Well,
not quite. When one looks at which conferences were attacked, it
becomes apparent that it is only the large national or
international conferences that really present a good target.
Terrorists thrive on attention and response, which they don't
really get in the smaller conferences. Not to mention that in a
smaller conference it is correspondingly easier to identify where
the terrorist is linking in.
Echomail will thrive. People will continue to establish new
conferences for every topic under the sun. Echomail is far too
important a part of our subculture to die out now. But I suspect
that the heydey of the large international conference may be
drawing to a close.
-----------------------------------------------------------------
FidoNews 4-28 Page 2 27 Jul 1987
=================================================================
ARTICLES
=================================================================
From 107/246
The Maxum Turbo XE - A Serious Computer
The following is an in-depth review of a fine clone that you
should consider in your shopping list if you are looking for a
new computer in the near future.
Data Sheet For MAXUM TURBO XE Personal Computer
-----------------------------------------------
MAXUM TURBO XE COMPUTER
Sold by 47th Street Photo.
The basic unit comes configured as follows:
Maxum Turbo XE system unit.
Phoenix type fast Ram test BIOS.
AT style keyboard with indicator lights built in.
256k Ram (256k Chips)-(Expandable to 1024k).
One full height 5 1/2 inch 360k floppy drive.
One disk controller for up to 2 floppy drives.
Built in game port.
8 Expansion Slots (2 Half - 6 Full Size Slots)
FCC approved slide type case.
Approved as Class B computing device.
180 Watt Power Supply.
MS-DOS 3.2 And GW-BASIC are included.
Dual speed (4.77/8 Mhz 8088-2) processor.
Socket for 8087 co-processor chip.
Built in (battery powered) clock/calendar card. Keyboard
(key operated) lock-out switch.
Power, Turbo, Hard Disk indicator lights.
Built in reset switch in rear of machine.
Internal speaker in front of system unit.
4 power plugs coming out of power supply.
Price as configured above is $499.00 plus tax.
The unit comes securely packed in a double carton and each unit
is tested before being released for sale.
There is a sticker attached to the rear of each unit with a
number to call for service and/or advice (not toll free) you
might need. We called twice and each time the phone was answered
by a polite technician who had a thorough knowledge of the
computer and was a great help in setting up the computer. Each
unit comes with a 5 book set of documentation complete with
excellent instructions for the novice as well as the experienced
user.
I would judge that anyone could have this unit unpacked and fully
FidoNews 4-28 Page 3 27 Jul 1987
operational inside of 25 minutes from opening the carton for the
first time.
The documentation is from Microsoft for the most part and is well
written and should be a great help in setting up the system as
well as utilizing the Ram from 640k to 1024k should you decide to
install the extra Ram yourself at the time of purchase or at a
later date.
The system as tested had some extra features that were user-
installed at the time of purchase. They were:
Full 1024k Ram on the motherboard.
IBM type RGB color card from Maxum.
RS-232 card from Honeywell.
One extra 5 1/2 inch floppy drive.
One 22 Megabyte Miniscribe hard drive.
Orchid Turbo 286E Card with 2 Megabytes Of Ram.
Copy II Pc copy board.
Approximate cost of system as tested is: $ 2399.00
The system runs all the usual PC software such as Lotus,
Wordstar, Flight Simulator, dBase III+, as well as Fido, Opus,
SEAdog, Telix, PC-TALK, Qmodem and Crosstalk XVI.
Lattice C, Turbo Basic, Quick Basic, Microsoft Cobol, and the
Microsoft Assembler were all tested and ran with no problems
whatsoever.
The system appears to be 100% compatible, as we have not found
any software that will not run on this system at the time this
article was written.
Below you will find some data we compiled from the various tests
we ran on the system. There are 3 results reported for each test.
1) Normal speed mode is the mode in which the computer boots up
and according to Norton's Sysinfo is slightly faster than a
normal PC.
2) Turbo speed is the user selectable speed increase gained by
typing the Cntrl-Alt-2 combination of keys. This IS NOT the
Orchid turbo speed which follows.
3) 286 Turbo speed is when the Orchid 286E card is activated and
running. In this mode you are running for all intensive
purposes an IBM AT clone at 8 Mhz with an Intel 80286 chip
handling the processing. Please note that in this mode it is
possible to access 704k for DOS to run in, as opposed to a
maximum 640k for the other two modes we tested.
Maxum Turbo XE In Normal Speed Mode
FidoNews 4-28 Page 4 27 Jul 1987
-----------------------------------
SI-System Information, Version 3.10, (C) 1984-86
IBM/PC
Built-in BIOS programs dated Monday, September 15, 1986
Operating under DOS 3.20
5 logical disk drives, A: through E:
DOS reports 640 K-bytes of memory:
68 K-bytes used by DOS and resident programs
572 K-bytes available for application programs
A search for active memory finds:
640 K-bytes main memory (at hex 0000-A000)
32 K-bytes display memory (at hex B800-C000)
BIOS signature found at hex paragraph C800
Computing performance index relative to IBM/PC: 1.7
Maxum Turbo XE In Turbo Speed Mode
----------------------------------
SI-System Information, Version 3.10, (C) 1984-86
IBM/PC
Built-in BIOS programs dated Monday, September 15, 1986
Operating under DOS 3.20
5 logical disk drives, A: through E:
DOS reports 640 K-bytes of memory:
68 K-bytes used by DOS and resident programs
572 K-bytes available for application programs
A search for active memory finds:
640 K-bytes main memory (at hex 0000-A000)
32 K-bytes display memory (at hex B800-C000)
BIOS signature found at hex paragraph C800
Computing performance index relative to IBM/PC: 3.0
Maxum Turbo XE With Orchid Turbo 286E Card Installed
----------------------------------------------------
SI-System Information, Version 3.10, (C) 1984-86
This computer might be identified by this:
(C) Copyright 1986 More Computing. All Rights Reserved.
Built-in BIOS programs dated Monday, November 8, 1982
Operating under DOS 3.20
5 logical disk drives, A: through E:
DOS reports 704 K-bytes of memory:
87 K-bytes used by DOS and resident programs
617 K-bytes available for application programs
A search for active memory finds:
640 K-bytes main memory (at hex 0000-A000)
127 K-bytes display memory (at hex A040-C000)
Computing performance index relative to IBM/PC: 9.2
So as you can see from the test results above the stock machine
in TURBO mode is much faster than a normal PC and of course when
FidoNews 4-28 Page 5 27 Jul 1987
the 286E co-processing board is added the speed jumps from 3.0 to
9.2.
The Maxum XE in my Benchmark Test using PKARC to archive the
following group of files used in my ARC tests.
Filename Length Method Size Ratio
-------- ------ ------ ------ -----
AUTOEXEC.BAT 33 Crunched 31 7%
COMMAND.COM 17664 Crunched 14787 17%
CORRSTAR.OVR 57344 Crunched 28768 50%
INTERNAL.DCT 35584 Squeezed 33871 5%
LF.COM 512 Crunched 382 26%
MAILMRGE.OVR 11520 Crunched 7533 35%
PROKEY.EXE 13824 Crunched 6360 54%
WC.EXE 12288 Crunched 8315 33%
WINSTALL.COM 1152 Crunched 746 36%
WINSTALL.OVR 38528 Crunched 22784 41%
WPE.COM 21376 Crunched 16622 23%
WPEMSGS.OVR 29056 Crunched 16072 45%
WPEOVLY1.OVR 41216 Crunched 33172 20%
WS1.PRO 29 Stored 29 0%
WSCOLOR.BAS 6656 Crunched 2967 56%
---- ------ ------ -----
0015 286782 192439 33%
The following results were recorded when PKARC was used to create
an archive file from the above files.
Normal Speed Turbo Speed 286 Turbo Speed
--------------------------------------------
01:12:43 00:44:99 00:20:00
--------------------------------------------
Using Wordstar and Nodelist.184 I performed a standard move
cursor to end of file test. The length of the nodelist used was
149436 bytes.
Normal Speed Turbo Speed 286 Turbo Speed
--------------------------------------------
00:33:33 00:16:12 00:14:75
--------------------------------------------
Using PC Lab's Bench02 test which basically finds prime numbers
the following results occurred.
Normal Speed Turbo Speed 286 Turbo Speed
--------------------------------------------
00:27:00 00:17:00 00:05:00
--------------------------------------------
All in all, a fine computer.
-----------------------------------------------------------------
FidoNews 4-28 Page 6 27 Jul 1987
Yoshi Mikami, November 26, 1986
FidoNet in Japan
[Editor's note: Sorry for the unusually long delay on this
article. It came to us via a very circuitous route.]
*** DOMESTIC NEWS ***
FIDO/COLLIE SYSOPS' MEETING
The November Fido/Collie Sysops' meeting was attended by
Tatsuyuki Arai, Yoshi Mikami, Maki Ohtoh and Junsei Yamada. It
was held on 11/14/86 at 7:00, at Renoir coffee shop (phone 03-
493-1454) near the east exit of Osaki Station in Tokyo. Arai,
Jun Moriya, John Takiguchi and Yamada had started this meeting on
every second Friday of the month from last August to discuss
common FidoNet issues and concerns. For Mikami and Ohtoh, it was
the first time to meet these people.
We jointly decided that we will write to International FidoNet
Association, St. Louis, Missouri, to get the FidoNet region
number for Japan. We do not want a host node under Pacific
Region 12, out of Honolulu, Hawaii, as other Asia-Pacific
countries such as Australia and New Zealand are operating.
Mikami will write the letter.
Arai wants to use the POLL and PICKUP functions on the receive-
only FIDO node in Tokyo from his FIDO at home. Those functions
do not work properly for him. Tom Jenning's 8/85 documentation
that he has does not explain in sufficient detail how to use
these functions. We will get assistance from Fido operators in
U.S.
We know that there is a Usenet gateway, run by Bob Hartman, on
FidoNet 101/101, according to the 8/86 Fido documentation. Does
anyone know how to contact a Usenet node in Japan?
Before switching to Fido, Arai ran Collie in October to find that
Collie handles the Japanese Kanji characters nicely. (Ohtoh and
Mikami have some Japanese messages in their systems.) However,
Collie has a minor problem in handling Japanese characters, in
the sense that some Japanese characters are interpreted as
Collie's control characters. We will write to D. Plunkett when
Jun Moriya returns from his trip to Australia to get the author's
help (because he knows the technical details).
Arai wanted to confirm, and all the meeting attendees agreed,
that FidoNet in Japan will be operated on a non-profit basis,
without discrimination of any kind.
The name of FidoNet Japan was authorized to be used on
Takiguchi's Fido BBS by Tom Jennings earlier this year, according
FidoNews 4-28 Page 7 27 Jul 1987
to Arai. (The Newsletter Editor doubt that this has any
significance, but it is documented here as this was discussed at
the meeting.)
Any would-be Fido/Collie sysops are welcome to attend this
monthly meeting. The next meeting is on December 12, at the same
time, at the same place. If English assistance is needed, help
will be provided.
COLLIE NET TEST IN KANSAI AREA
After some pioneering work in April and May 1986, the Fido/Collie
activities picked up in the Kansai area recently. Geki Hagiwara
provided the following experience report:
* * * * * * *
A BBS network FidoNet was formed and tested in Kansai area in
Sep/Oct 1986. Actually the software was Collie (Colossus)
which simulates FidoNet packet transfer protocol. One of the
reasons we chose Collie, not Fido, was that Collie resets the
modem every time the session is over. It is believed that
some modems cannot detect 1200/300 and CCITT/BELL in
particular sequences. In such case resetting the modem may
be effective. Through our experience Hi-Modem 1200C looked
working satisfactorily.
The members of TMCNET and their equipments are:
NET NODE Name Area Phone H/W
--- ---- ------------- ----- ------------ --------
001 001 Joe Takemura Osaka 06-674-1933 JX-5+HDD
002 K. Sawaguchi Osaka 06-XXX-XXXX JX-4
002 001 Geki Hagiwara Yasu 0775-86-0919 JX-4+HDD
002 Ken Iwamoto Kyoto 075-XXX-XXXX JX-5
003 Junji Tanaka Shiga 0778-XX-XXXX JX-5
First, each node operator entered messages to several members
and the other sysops; then we set Net mail time and watched
how Collie sends and receives packets. We had a hard time to
find the best combination of modem initialization commands
and DIP switch setting. (We were helped by Maki Ohtoh.)
We used the following MODMINIT.BBS file:
ATX1
ATH1
(one blank line - wait 2 seconds)
ATS0=1
ATV0
ATH0
FidoNews 4-28 Page 8 27 Jul 1987
The Collie startup command was:
A>COLLIE /2 /M2 /I1200 /C32
| | | |____ Carrier mask bit
| | |____ Modem init. baud rate
| |____ Modem type
|____ COM2 port
The modem DIP switch setting was:
SW1 DTR OFF
SW2 Result no effective
SW3 Return ON (should have no effect)
SW4 Echo no effective
SW5 Answer no effective
SW6 CD OFF
SW7 Tel.line OFF (depends on phone line)
SW8 Command ON
Although the modem operation was unstable like trying to call
while the modem is off hook, the test resulted in a great
success. We just tested the network formed by JX systems,
but this network would not be open to public until the mail
charge system is established.
* * * * * * *
For other details, contact Hagiwara or Joe Takemura at the BBS
sytem number (at night only) listed above.
FIDO/COLLIE SYSTEMS IN OPERATION
To our knowledge, the following five Fido/Collie BBS systems are
currently operating on regular basis:
017-653-5181 ext. 226-7408, Loki BBS (Fido), by Jon
Spelbring, 24 hours, 1200/300 (CCITT & Bell)
045-761-9406, SurfSide Net (Fido), by Tatsuyuki Arai,
24 hours, 2400/1200/300 bps (CCITT & Bell)
045-894-7656, Collie Yokohama, by Maki Ohtoh,
24 hours, 1200/300 bps (CCITT & Bell)
0466-27-2077, Big Blue BBS (Collie), by Yoshi Mikami,
10:00-11:30 PM Japan Std Time, 1200/300 (C&B)
082-842-6401, Strawberry Doughnut Net (Collie), by
Hitoshi Sugimoto, 10:30-11:55 PM JST, 200/300 (C&B)
Fido Japan 03-432-0185 by John Takiguchi is temporarily closed.
Mikami, Ohtoh and Sugimoto have been exchanging net messages very
successfully at 10:45-11:00 PM time slot, since early October,
between Fujisawa/Yokohama and Hiroshima, a distance of 500 miles.
After much experiment, Infotech's Hi-Modem 1200C among the
several JATE-approved Hayes-compatible (AT-command compatible)
modems was found to handle the Fido/Collie net message
transmission. They would like to hear other people's experiences
FidoNews 4-28 Page 9 27 Jul 1987
on other modems, because there definitely is a need here for good
modem competition.
Ken Sugimoto has translated most of the Collie .MNU files into
Japanese for easier operator interface, and has been operating a
Collie node since October, somewhere near the Fish Market in
Tsukiji, Tokyo. We'll get his phone number shortly.
We do not claim to know everything happening in Japan regarding
Fido or Collie. Please contact anyone of us to let others know
what's going on.
LETTER TO REQUEST JAPANESE REGION NUMBER SENT
A letter was sent 11/16/86 by Mikami to International FidoNet
Association requesting a region number for Japan, with copies to
Tom Jennings (author of Fido BBS software) and Dan Plunkett
(author of Colossus BBS sofware). A fifty dollar check was
enclosed as our donation. Copies were also sent to people
mentioned in Item 1.a. above.
*** INTERNATIONAL NEWS ***
MESSAGE EXCHANGE WITH HONG KONG
Katsu Shintani called FIDO BBS in Hong Kong 00852-5-893-7856 in
October. This is the nearest Fido/Collie BBS overseas that we
know of. In return, Fido Japan and Collie Yokohama received a
few messages from Hong Kong.
ASSISTANCE TO OTHER ASIAN COUNTRIES
There are several FidoNet systems running in Australia and
Indonesia according to the 3/86 nodelist. We would like to
identify other Fido systems that may be operating in this region
of the world. We also offer assistance if help is needed to set
up Fido or Collie BBS in the Asia-Pacific countries.
For those who may not know, Colossus ("Collie") is Fido-
compatible software that is beginning to be used this year.
-----------------------------------------------------------------
FidoNews 4-28 Page 10 27 Jul 1987
Chris Irwin
Miami Shareware, 135/68
MegaList
A Cross-System File Listing
(YOU can easily join!)
I was in one of my more creative moods the other day; I've
finally written a system that I've wanted to for quite some time
now: MegaList. The "MegaList" is an alphabetized file listing
that combines the files from ALL PARTICIPATING Fido/Opus systems.
If you've ever needed a file, but didn't know where to find it,
the MegaList is a good place to look; scan down the list for the
file you need, and listed next to it are the BBSs that have it
online.
The MegaList is available for download or SEAdog file
request from 135/68. The following files are online now:
MEGALIST.ARC/TXT The National (unfiltered) MegaList
MEGA-ARC.ARC/TXT The National ARChive MegaList
MEGA-TXT.ARC/TXT The National TXT/DOC MegaList
ML-UPD.ARC MegaList Update Software
YOUR system can be added to the NATIONAL MegaList if you
simply run the update program, ML-UPD. This program will create
an update file based on YOUR system information and FILES.BBS
contents. This data is then ARCed and Net-mailed to 135/68 for
central collection. The NATIONAL MegaList is updated each day at
6:15AM and posted for download or file request.
Placing your system in the MegaList will let the rest of the
world know what's on your system without everyone having to call
and look. The ML-UPD program is easy and only takes about 1-2
minutes to run. All you must do is send a MegaList update to
Miami at least once every 45 days, and you will be in the daily
MegaList update.
As of this writing, I haven't released ML-COL, the "host"
processing/collection program. I will be releasing this system
in its entirety before the end of August. If you're interested
in creating a LOCAL MegaList for YOUR area, please contact me for
the list creation software.
Chris Irwin, Miami Shareware, 135/68
(305) 232-9365 (300/1200/2400/9600-HST)
Other Miami Shareware releases: (as of July 14th)
ARCMSG17.ARC ARC and Purge message bases (Fido/Opus)
MS-AR25.ARC Accounts Receivable System
MS-IC25.ARC Inventory Control System
-----------------------------------------------------------------
FidoNews 4-28 Page 11 27 Jul 1987
AUTHENTIC SECURE SECRET FIDO MAIL WITH PUBLIC KEY ENCRYPTION
INTRODUCTION
============
This article was written by Prodex Labs, for examination and
comment by IFNA (International Fidonet Association) Sysops,
members, Fidonet users, and others interested in electronic mail
and security. Prodex Labs (Lee Rothstein, Phil Zimmermann &
Steve Welch) is very much interested in your comments and
suggestions.
PRODEX LABS, PUBLIC KEY ENCRYPTION & FIDO
-----------------------------------------
We are now about ready to deliver C-based modules that can carry
out public key encryption.
We are writing this article because of the extreme relevance we
see of public key cryptography to electronic mail. We assume
electronic mail is near and dear to your hearts, and we think you
might be interested in the application of public key encryption
to Fidomail and Fidonet transfers. The discussion, we provide
here, on public key cryptography aims specifically at electronic
mail applications.
Public key encryption technology allows the convenient
distribution of messages through an electronic mail system secure
against other users, sysops ("superusers") and even systems
programmers. It allows this security in the face of inherently
insecure networks and hosts. This we think is a feature whose
time has come. We think it lends itself well to the expansion of
Fidonet services, as well as the opportunity for Fido sysops to
unobtrusively draw revenue from a subset of Fido services--
specifically those that have to do with private and commercial
mail.
Specifically, we suspect the lack of privacy of messages (from
Sysops and technotwits) has discouraged the use of Fido as a
national distribution medium for personal mail, and business
mail. Second, the lack of an authentication mechanism has
discouraged commercial concerns from using Fidomail as a
distribution mechanism for authentic marketing programs and
documents such as ads, coupons and purchase orders. By adding
these commercial services to Fido, the revenue produced could be
used to subsidize other Fido services such as mass storage
(downloads) and Techline distribution (long distance charges).
The authentication capability mentioned in the previous paragraph
might also be of use directly to Fidonet as it grows.
Authentication would allow nodes that are operating in a store
and forward sub-net to prove their legitimacy prior to a relay
operation. Since we are not familiar with the daily operational
problems of Hosts, we do not know if we have proposed a solution
to a non-existent problem.
Finally, we think that the recent introduction of "Dutchie" may
be one of the key ingredients to the success of the introduction
FidoNews 4-28 Page 12 27 Jul 1987
and use of public key encryption in Fidonet. For those of you
not yet familiar with it, Dutchie is the private delivery point
implementation for Fidonet by Henk Wevers.
SINGLE KEY ENCRYPTION: WHY PUBLIC KEY ENCRYPTION IS REQUIRED!
--------------------------------------------------------------
Public key encryption technology differs from the more well-known
single key technology in that each person has two keys associated
with him/her--a public key, and a private key. (DES--Data
Encryption Standard--is the most well-known example of single key
encryption.)
In public key encryption, the public key is known by everyone and
either can be looked up by the user from a table of keys versus
user names or automatically looked up by the applications
software (e.g., electronic mail software).
In single key encryption, Fred encrypts file 'nerd.msg' with the
key "secret_potion". When Bill wants to decrypt the file, he
must have been told by Fred what the key for decrypting (i.e.,
encrypting) 'nerd.msg' is. Specifically, Bill must supply the
key "secret_potion" to decrypt 'nerd.msg'. If "secret_potion" is
always associated with Fred's files, then Bill knows the key for
those files that Fred does not want him to see. More succinctly,
the decryption and encryption functions are inverses of each
other. Symbolically:
(1) encrypted_file <- sk_encrypt(file, key)
(2) file <- sk_encrypt(encrypted_file, key) i.e., decryption
is encryption
and the key is
the same going
in both
directions
The above notation assumes that objects with the same name
and only objects with the same name are identical.
Let's look at the consequences of the logic of single key
encryption within an electronic mail system. Anyone that wants
to send secret messages to someone else must either know the
recipient's one and only secret key, or relinquish their own
secret key, or maintain a list of secret keys by recipient or
file; not a very attractive alternative.
What's worse, if the key information is exchanged by users
through the mail system, then the sysop has a crack at the key.
This seems very likely when you consider that you probably want
the mail system itself to automatically monitor, maintain and
administer the keys because of the previously described problems.
PUBLIC KEY ENCRYPTION
=====================
PUBLIC KEY ENCRYPTION EXPLAINED
-------------------------------
FidoNews 4-28 Page 13 27 Jul 1987
These and other problems can be made to disappear with a public
key encryption system. The public and private keys make a
matched, idiosyncratic set. A file encrypted with the public key
can only be decrypted by the private key. A file encrypted by
the private key can only be decrypted by the public key. These
properties can be used to significant advantage in an electronic
mail system. The obvious advantage of the public key technology
over the more normal single private key technology such as DES,
is that a user does not have to give away his/her private key.
Secrecy
-------
If you want secrecy in a message that you send us, you encrypt
the message with our public key and then we decrypt it with our
private key.
Signature Function
------------------
If you want to authenticate a message as really coming from you,
you encrypt it with your private key and then we decrypt it with
your public key. If your public key does not make the message
intelligible then it wasn't encrypted with your private key and
therefore it didn't come from you--the one and only person who
has access to your private key.
Secrecy & Authentication
------------------------
The secrecy and authentication encryptions outlined above can be
combined sequentially to provide a complete framework of security
for electronic mail.
Symbolically, we could describe these properties as:
If A were sending a message to B:
(1) encrypted_file <- pk_encrypt(file, public_key_B)
(2) file <- pk_decrypt(encrypted_file,
private_key_B)
(1) Would be used by the sender to achieve privacy.
(2) Would be used by the receiver to achieve
"legibility."
AND
(3) encrypted_file <- pk_encrypt(file, private_key_A)
(4) file <- pk_decrypt(encrypted_file,
public_key_A)
(3) Would be used by the sender to achieve
authentication.
(4) Would be used by the receiver to prove
authentication and achieve "legibility."
If we wished privacy and authentication in a message from A to B:
FidoNews 4-28 Page 14 27 Jul 1987
(5) double_encrypted_file <-
pk_encrypt(pk_encrypt(file, public_key_B),
private_key_A)
(6) file <- pk_decrypt(pk_decrypt(double_encrypted_file,
private_key_B), public_key_A)
(5) Would be used by the sender to achieve privacy and
authentication.
(6) Would be used by the receiver to achieve
"legibility", and prove authentication.
In the above notation we again assume that objects with the
same name and only objects with the same name are
equivalent.
OTHER REQUIREMENTS & PROPERTIES
-------------------------------
Several other properties of public key encryption require
explanation to fully understand how security can be maintained
and how a mail system can work.
First, the program that generates the key pairs can be widely
distributed so that it can be used by each user privately and
securely.
Second, the algorithm that generates the public key from the
private key is not reversible either by the generating program or
by any other program a hacker would write.
Third, the kinds of keys generated and required by the encrypt /
decrypt function(s) are on the order of a 1000 bits. This is
what makes trial and error computation of the private key
extremely unlikely to the point of impossibility, and also what
makes users generating like public keys unlikely.
Fourth, the electronic mail nodes (for Fidonet, Fido nodes) would
have to provide a key server function. Once a user had
calculated his public key from a private key he would have to
submit it to a node to be paired with his/her user ID. The
server function would also have to supply the public key to
private mail sent to the corresponding user ID. Another major
function of the key server is an automatic certification process
that is beyond the scope of a first release product or this
paper.
Finally, for performance sake, any reasonable implementation of
public key cryptography would transparently (unknown to users)
invoke an internal method of single key encryption. However, all
user and crackers would ever (or could ever) see is the public
key mechanisms.
IMPLEMENTING PUBLIC KEY ENCRYPTION WITHIN THE FIDO ENVIRONMENT
==============================================================
THE IMPOSSIBLE DREAM
--------------------
FidoNews 4-28 Page 15 27 Jul 1987
If we were to directly implement an automatic, public key
cryptography security system into Fido mail that would avoid
sysops having any possibility of access to the private keys or
the mail prior to encryption, we would have to accomplish the
following:
(a) We would have to add a secure mail option to the terminal
emulation program. We would further have to modify the
user's terminal emulation program so that all mail text
entered was encrypted before each line was sent by the user
to the mail edit/entry function on the BBS.
There are some outs here, but they are pretty well
invalidated by several properties of BBS software. First,
mail entry is designed to be an online editing activity
rather than via upload. Second, the mail entry function is
designed to handle pure text and not the binary files that
result from encryption. Third, most mail input software
strongly limits the length and format (e.g., line length,
blank lines, use of tabs) of input messages. If one uses
"ASCII transfer" capability there is a possibility the file
will fail the length test or be modified by the format
assumptions, because it was not edited with the length and
format tests operative. Fourth, the prompting feature of
the mail editor very often interferes with ASCII upload.
(b) We would have to make modifications to the BBS mail
edit/entry function so that some text was accepted in
unencrypted format (i.e., 'To:' and 'From:' information) and
the remainder was in encrypted format (i.e., 'Subject:' and
body of message. ('From:' can be hidden if BBS Sysops do not
object.)
(c) We would have to add a public key server function to the BBS
that would maintain and service public keys. This would
also have to allow for the distribution of keys from node to
node.
(d) We would have to make sure that encryption did not interfere
with Fidomail routing line additions to the text body.
This theory will not work or rather will not work without a
ground swell of support for private mail. We cannot get control
of all of the following simultaneously: (a) user terminal
emulation software, (b) Fido mail entry software, (c) Fido
general BBS software, (d) Fido networking and mail exchange
software. How do we create the ground swell, then?
FIRST STEPS
-----------
Step 1
------
We develop two program functions (they may or may not actually be
separate programs) that can be distributed via Fido. Currently,
we estimate we can have these two programs done within two
FidoNews 4-28 Page 16 27 Jul 1987
months.
The first program is a DOS (Unix style) filter. It has two
functions. First, given one file that contains the private key
and a second file that contains the text to be encrypted, this
first program, which I will call 'pk_crypt', provides an output
file that is encrypted and can be decrypted with the public key.
This serves the authentication function. Second, 'pk_crypt' can
encrypt a file with public key so that it can be decrypted with
the private key. This provides the privacy function.
The second program generates unique key pairs.
Step 2
------
Sysops provide a message section and a coordinated file section.
The message section allows users to notify each other that there
are secure messages that have been uploaded to the respective
users that have been notified via standard Fido text message.
The file section is not only a safe (reliable, not secure) port
for uploaded secure message files but also for a single text file
that contains a list of the mapping of user IDs to public keys.
Users upload their public keys as they generate them and the
sysops collate these standard format subfiles into a single
standard format public key-user ID list.
We will provide documentation not only for the use of the
program, but also for how users can "certify" new users and new
keys, since we will not at this stage be able to provide a key
server automated certification process.
Step 3
------
Sysops provide a standard service that allows binary files to be
"attached to" Fidomail messages. Nothing automatic is implied by
the previous sentence.
Step 4
------
We would have to provide a mail function that from the same level
of menu allowed the entry of a text tag message into the message
system, followed by the immediate upload of an encrypted (perhaps
archived) file to the secure message file section.
The inverse of these two processes would also have to be
provided. Users would have to be able, from the same level of
message menu, to first read a tag message, and, then,
immediately, download the associated secure binary message file.
.
.
.
WHAT DO YOU THINK?
==================
This is a lot to lay on anyone in one swell foop. What do you
FidoNews 4-28 Page 17 27 Jul 1987
think about practically any of this? We are especially
interested in your views and ideas as to how (or if) it can fit
into Fidonet. We await your responses.
Lee Rothstein, Phil Zimmermann, Steve Welch
Prodex Laboratories
------ ------------
COMPUTER AND COMMUNICATIONS SYSTEMS
PRODUCT DEVELOPMENT CONSULTING
o Computer and communications system product development:
Software, Hardware & Integration
o Marketing requirements, product, business & strategic
plans
o Market research
o New venture evaluation
o Technical marketing, marketing programs, seminar
development
o Product definition, architecture development, systems
engineering, human interface design
o Strategic information systems & computerized marketing
Lee D. Rothstein
Prodex Laboratories
7723 Arlington Drive
Boulder, CO 80303-3207
(303) 499-8716 (Voice)
We can be contacted via any of these BBSes, or via FidoNet at one
of these BBSes:
o Microlink B Fido. Fido 104/108. (303) 972-4181.
o Eighth Sea Fido. Fido 104/610. (303) 252-9235.
o Day's End Fido. Fido 104/ 20. (303) 650-5636.
o Mile Hi Tech Fido. Fido 104/ 56. (303) 973-9338.
-----------------------------------------------------------------
FidoNews 4-28 Page 18 27 Jul 1987
Patrick McDonald, 109/657
Sirius v0.50 - The FOS-Compatible Message Base Manager
"... and all I ask is a tall ship and a star to steer her by"
--- Masefield
Sirius, a star in Canis Major also known as the dog star,
has been guiding mariners in the Northern hemisphere for
centuries. Sirius, the message base manager by Bob Klahn of 150/1
will now add a new twist to the common definition by helping
solve your message base manipulation and navigation problems. No
matter what software you currently use to interact with your
Fido/Opus/SEAdog message base, Sirius has features that will help
make it the message manager of choice on your system.
In particular, Sirius 0.50:
* Provides universal context-sensitive help via the "?" key.
* Adapts its prompting to your needs and level of expertise
while keeping required keystrokes to a minimum.
* Supports one hundred message areas.
* Recognizes EchoMail and NetMail areas, and allows them to be
addressed by name as well as by number.
* Edits new or existing messages with the configurable outside
text editor of your choice, or with its own line-oriented
editor.
* Quotes replied-to message text with prefixing that YOU choose,
and with the option to prefix the quoted author's lines only.
* Moves and copies messages to flat files, to the printer, to
other message areas, low or high, up or down, and with or
without "stamping".
* Groups messages logically, in ways YOU define, using a library
of over three dozen Boolean, integer, and string functions.
Operations may be performed on a message group as a unit, or
group definitions may be used to filter the retrieval of
individual messages.
* Can record your interactive keystrokes in script form for
later playback. Yes, Sirius will write your scripts for you!
* Allows its complete functionality to be accessed locally,
remotely, or through its automated scripts.
* Provides access to DOS from within the Sirius environment.
The Basics
~~~~~~~~~~
FidoNews 4-28 Page 19 27 Jul 1987
The entire interactive interface of Sirius is designed to
minimize the number of keystrokes entered. Many of the main menu
commands have lower submenus, and commands may be stacked as
appropriate, with white space needed only when ambiguity might
otherwise result. In addition, the "?" character is available at
all menus to provide context sensitive help to guide you along.
As a message base manager, Sirius provides you with all the
usual functions, and then some. You may select a message area
not only by the usual method of area number, but by the
associated EchoMail area tag as well. If you have many message
areas or are in the habit of occasionally reorganizing your
message areas, this feature makes it easier to jump into an echo
area. The entire area name need not be specified when utilizing
this feature, but only enough to uniquely identify it.
Messages may be retrieved in a number of ways (forward,
backward, and by links), and when retrieving messages it is not
necessary to view the entire text. You may tell Sirius to only
view message text until a given text string is encountered (such
as 'SEEN-BY: '), and as indicated in the example, this is usually
used to squelch the EchoMail routing information.
Shifting into 2nd Gear
~~~~~~~~~~~~~~~~~~~~~~
You can do a lot more with messages than just retrieve them
and display them to your screen. Sirius provides features for
moving messages around to various locations. You may copy
messages to a file (optionally either appending or overwriting
the file), to your printer, or to other locations in the message
system. These "other locations" encompass copying the message to
another area as well as different spots within the same area.
When moving a message, you may optionally ask Sirius to include a
"stamp" line in the copied message (much like the Opus forwarding
information but much more concise).
The Doctor's Office
~~~~~~~~~~~~~~~~~~~
So, you want to change something about a message? The Doctor
function provides the means of changing virtually every aspect of
a message IN PLACE, including message header fields, body text,
flags, and attach filenames. The Body doctor is also a powerful
tool all by itself, providing a full-featured line-oriented text
editor for the message body. The line editor makes extensive use
of PC editing keys while providing control key mapping for remote
usage and local keyboards that don't have these keys. Selected
portions of the message body may be re-wrapped at will and to any
line width that you like. You may also import text from external
files. As powerful as the editing features inherent to Sirius
are, you may need to do something to a message body not provided
by Sirius, or may simply have a preference for a full-screen
editor. This is no problem since Sirius provides support for
editing message bodies with the external text editor of your
choice.
FidoNews 4-28 Page 20 27 Jul 1987
... And you may quote me on that!
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
When replying to an existing message, Sirius provides a
quoting feature that is unsurpassed by any other message system.
You are not locked into any particular reply prefix, but rather
may specify your own "designer quote" to be used for prefixing
selected portions of the text of the replied-to message. Sirius
does not just blindly prefix the entire original message text
when forming the reply-quoted message (although it can if you
desire) but actually has the ability to prefix only those
portions of the original message that ARE NOT ALREADY PREFIXED!
This becomes especially useful when responding to a message that
already has text reply-quoted from one or more authors.
Join the Group
~~~~~~~~~~~~~~
Sirius provides a group definition facility that is perhaps
the single most powerful capability in its arsenal. Using an
extensive set of message-oriented functions and an expression
formation language similar to many general programming languages,
you may define up to twenty-six different message groups. A
group definition may be used in one of two different ways.
First, a message group may be used as a retrieval filter. That
is, by virtue of a group definition being in force, the message
area appears to only contain messages that match the group
specification. This might be used for something as simple as
only considering messages addressed specifically to you, for
example.
The second use of a group definition is in conjunction with
group operations. Group operations mirror, in some respects,
those functions available for single messages (such as copying to
a file, deleting, moving elsewhere) but act on the entire group
of messages as a unit. Some of these group operations are
unavailable in 0.50, but will be there in 0.51. The built-in
functions for use in group definitions include the following:
Boolean (Message Flags):
@Private @Xpress @Received @Sent
@FileAttach @InTransit @Orphan @KillSent
@Local @Hold @FileReq @AuditReq
@ReceiptReq @UpdateReq
Boolean (Other):
@FromYou @ToYou @NoBody @ReadOnly
Integer Functions:
@DaysHere @DaysOld @FileSize @Zenith
@HighMsg# @LowMsg# @Msg# @MsgCount
@NetFrom @NetTo @NodeFrom @NodeTo
FidoNews 4-28 Page 21 27 Jul 1987
String Functions (case insensitive):
@From @To @Subject @Header
@Body @Msg @Keyin
Sirius provides the usual conditional operators (EQ, NE, GT, LT,
GE, LE, AND, OR), as well as some additional ones:
CO contains
NC does not contain
IN is contained in
NI is not contained in
A few simple examples of Sirius expressions will make clear the
power intrinsic in their usage:
1. @ToYou OR @FromYou
This expression will match only those messages that are to you or
from you.
2. @ToYou AND @Private
This expressions will match those messages addressed to you which
are private.
3. @From CO 'arcmail' AND NOT @Local
This expression would match your inbound ARCmail attach messages.
4. @DaysHere GT 7 AND @InTransit
Suppose you are a hub and want to identify those messages that
have been sitting waiting for delivery for more than a week (a
possible indication of trouble)? This will do it.
5. @Msg CO 'Heinlein'
A science fiction fanatic? This will find those messages related
to your favorite author.
As is the case elsewhere, the Sirius expression parser is
built with the user in mind. When entering a Sirius group
definition, you need only type enough to uniquely identify the
token, and Sirius will fill in the rest automagically.
Shifting into High Gear
~~~~~~~~~~~~~~~~~~~~~~~
What has been mentioned before, but which might not have
been truly appreciated until now, is the fact that Sirius
provides a scripting language that allows you to do anything from
a script that can be done online (including creating new
messages, replying to old ones, etc...). The script language
uses a Lisp-like syntax, and the verbs match exactly the menu
FidoNews 4-28 Page 22 27 Jul 1987
commands which you use online, including a conditional and a
while loop construct driven by the same types of expressions
listed above. Sirius scripts may call other Sirius scripts in a
nestable fashion, and I/O commands allow you easily design menus
and other forms of interaction with the user at the keyboard. In
combination with DOS parameterized batch files, your Sirius-
driven system can almost run itself in some respects. As a
simple example, consider the following script:
(View (Xpertise (High))
View (Continuous)
Area (NetMail)
Group (Define (@ToYou AND NOT @Received))
0 Next
! (While (@Msg# LE @HighMsg#))
Copy (Flat file ('NEWTOME.TXT'))
Next
! (End)
Quit (Bbs))
This simple script will append all of the new messages to
you in your netmail area to the file NEWTOME.TXT in your current
directory. For the new Sirius user who might want to dive right
in writing Sirius scripts, there is a recording option that you
may use to allow Sirius to write the script for you, simply by
recording in the proper format operations that you enter
interactively.
Winding Down
~~~~~~~~~~~~
Sirius is still a growing project. Many enhancements are
planned and there is an active national Sirius echo being
coordinated by 150/1. The Sirius author, Bob Klahn, is quite
receptive to user suggestions for Sirius enhancements. There are
subtleties and details to Sirius that were not appropriate for
inclusion in this brief introduction. At the time of this
writing, there does not exist a single, comprehensive, set of
documentation for Sirius. This problem is being addressed by the
Beta Test Group and hopefully will be remedied shortly. In the
interim, there does exist a complete set of release notes for
Sirius that cover major features, and these combined with the
online help and sample scripts shipped with Sirius serve to
offset the lack of formal documentation. The best bet for a new
Sirius user is simply to dive in and try it (and to join the
Sirius echo where experienced users will be able to lend some
help). Bob's practice in the past has been to release new
versions of Sirius on a regular schedule. Due to the major
enhancements in version 0.50 (most dealing with the group
definition facility), this latest version has been almost four
months in development and testing, and we are sure you will find
it worth the wait.
-----------------------------------------------------------------
FidoNews 4-28 Page 23 27 Jul 1987
Mike Brisson
The Augusta Forum 360/1
THE SPORTSNET ECHO CONFERENCE
The SportsNet Echo Conference was started by the Augusta Forum in
February of this year to give FidoNet boards a chance to talk
coast to coast about their favorite sports topics. Almost
everyone has at least a little interest in sports of one type or
another, either as a participant or a spectator ... if you do,
this conference is for you.
SportsNet is NOT just a "my team's better than yours" conference!
It is a place for discussions about WHY teams or players are
better ... or worse. On SportsNet you have to be prepared to
discuss your choices for the World Series, Super Bowl, or
whatever ... someone's bound to differ with you.
You'll find a place for participants, spectators, and media. The
net has had discussions among bicycling racers ... and also has
heard from a TV station director.
Of course, the obvious sports (football, baseball, etc.) are
discussed but there's also lively discussion about the lesser
known ones (we've even gotten into snake handling and buffalo
chip throwing)! What-ever the sport, we'll discuss it.
SportsNet can be a learning place, too. If you don't know what
an ERA (base-ball) or a blue line (hockey) are, you can learn
those things there. Also, the conference has a weekly trivia
quiz, possibly the first of its kind among echo conferences.
Football fans will find a place, this fall, to test their
prediction skills on NFL games, and possibly selected college
games as well.
If you're not already a part of SportsNet, this is your
invitation to give us a try. We aren't one of those 100-message-
a-day conferences that sometimes can overwhelm a newcomer ...
we're still small enough for anyone to fit right in. We do have
boards in New York, Baltimore, Pittsburgh, Dallas, Indiana,
Arkansas, and Oklahoma, as well as most of the Southeastern
states. If you're interested in SportsNet, drop me a NetMail
message. We'd like to have you join us!
SportsNet Host: Mike Brisson
Host Sysop: Ed Meloan
Host System: Augusta Forum (360/1), N. Augusta, SC
Host System Numbers: (803) 279-4124 or 279-5392
-----------------------------------------------------------------
FidoNews 4-28 Page 24 27 Jul 1987
=================================================================
COLUMNS
=================================================================
Glen Jackson
Broadcast Software
SEAdog/Fido 100/517
Where are we at Now ?
We're still at it, going strong in the echos. We've added some
more nodes. Colorado is a real busy state with the Broadcasters.
If you know of any BBS's (in the net or not) that address
themselves to the broadcasting Industry, drop us a line at
100/517.
If you are in the industry, we welcome your call and feedback.
We'll point you to the closest node involved in our echos.
We're here to encourage communications among the industry. Here
we are, a communuications group, and we rarely talk to each other
across the country. Why would we want to?
To exchange information. Information on what we use our computers
at work for. How we use them. Programs that benefit all of us.
How about issues that will be or do affect us? In such a highly
competetive market, are we so afraid we'll help someone else
grow???
We want to invite you to become a part of our growing echos. One
of the echos is not limited to broadcasters only. It is a place
that the public can talk with the people in the industry. The
decision makers. People with the answers.
If you'd like to become a part of our growing family in the
Broadcast Echos, let us know. You don't need to run a broadcast-
specific board to do so. We can be reached by routing a message
to us at 100/517 - or calling direct at 314-928-2501.
Broadcast Software Industries
> Home of the Broadcast Echos <
-----------------------------------------------------------------
FidoNews 4-28 Page 25 27 Jul 1987
-- The Regular Irregular Column --
Dale Lovell
1:157/504.1
Things are going very well this past week. I've found some
more programs that will run with SIMCGA (Ancient Art of War and a
few others by Broderbund). In addition, I'm finally getting used
to this new keyboard. My old XT had an original PC style layout,
but with 10 function keys at the top and a cursor pad as well as
a numeric keypad. The keyboard with the AT is one of the "new"
101 key style keyboards, 12 function keys and such. I'm still not
entirely used to it, but things are a lot easier after a few
weeks of use (and some customizing with SuperKey). Just goes to
show how flexible the human mind can be when it has to adjust.
-- Ventura Publisher Version 1.1 (Xerox, List $895.00) --
Some of you may recall how much I liked version 1.0 of
Ventura Publisher when I got to try it out a few months back.
Well Xerox has been busy working on an update, and it improves a
product I wouldn't have thought could be improved. On the surface
it still looks (and acts) the same, but once you get beyond the
initial pull down screens it has a lot of new (yet familiar)
functions and improvements. While it costs $100.00 to update to
the new version of Ventura, it is money well spent (the list
price is still the same, it didn't go up). Even the manual
appears to be written better than the version 1.0 manual.
I still thinks it's amusing that Xerox's DeskTop Publishing
program supports PostScript printers better than Xerox's own
printers. PostScript users will greatly appreciate some of the
new features in 1.1. The font names now match the names you're
used to calling them, and Ventura lists all of the Adobe
supported fonts. If you have something like the QMS PS800+ (or an
Allied Linotronic typesetter), you won't have to do anything to
make Ventura know about your additional fonts. Instead of the box
selections of fonts and sizes in 1.0, you now see something that
resembles the box you're used to using to select files (only they
aren't files, they're several dozen fonts). You are also free to
enter the point size of the font, no limitations under PostScript
(other than those your printer has built into it). If you're
using download fonts to your PostScript device, it's very easy to
tell Ventura about them. Once told, it will download the fonts
you're using automatically. While Ventura still doesn't take full
advantage of PostScript's powerful capabilities, it brings it up
a step from the previous version (and while I'm not sure, I think
it beats PageMaker's PostScript support).
In version 1.0 there were some wonderful features when
bringing in a short text file, or some form of art. Ventura 1.1
increases it's list of generally useful features by being able to
make these frames follow a specific part of the main text around.
Xerox calls this "anchoring" a frame to text and may be reason
enough for many people to spend the $100 on the upgrade. The
reasoning behind anchoring a picture to text is that pictures are
meant to go along with the text. An example would be a business
FidoNews 4-28 Page 26 27 Jul 1987
report with several graphs, each graph goes along with a specific
part of the report. You certainly wouldn't want the employee
attendance graph to be above the section of the report dealing
with quarterly sales, would you? Yet this is exactly what could
happen if you added a few paragraphs of text or added the company
logo to the top of the report. Ventura 1.1 puts an end to having
to manually readjust every graphics (or text) frame when you
change an earlier part of the publication. The frame will follow
the text around every time you make a change and Ventura allows
you to anchor frames to text so that the frame will appear above,
below or on the same page as the text it accompanies. I can see
this having a large impact on the educational community as thesis
papers (especially in the sciences, maybe even the arts as I
think about it) won't have to be such monumental efforts.
Including a relevant graph in the text of the paper becomes
trivial, and it will always show up where it belongs.
One of the nicer additions to me personally is the support
for Macintosh MacPaint and PICT files. The MacPaint file support
is nice because I have several of these already on my system. You
may know them better as READMAC pictures. All of these can be
brought right into Ventura. I no longer need to find a program to
convert them into PC Paintbrush or GEM Paint files. Sysops may
see a renewed interest in their READMAC file area as people start
looking around for digitized pictures to put into their work. I
know I've spent quite a bit of time the past week looking around
several of the local boards and downloading such files.
There are a few disappointments in Ventura 1.1. In the front
of the manual there is an errata sheet. While support for
Hewlett-Packard DDL printers and Windows clipboard line art were
not able to be included in this release of Ventura. It seems HP
still hasn't finalized the specification for DDL (not to mention
not shipping any printers that use DDL) and until the
specification in finished and the printers shipped, Ventura won't
support it. The Windows clipboard line art is supposedly missing
because Xerox has been unable to obtain the complete
specifications on the metafile format. Support for both of these
items is promised however, and Xerox gives you a number to call
if you need support for DDL or Windows clipboard line art. As
soon as it is ready, they'll send it out to you.
Overall I am still impressed with Ventura Publisher. Version
1.1 includes enough new items (as opposed to bug fixes, which
weren't to many from what I hear) to make it a solid improvement
over version 1.0. The new features only add to an excellent
product. I may be prejudiced, but I think this product is an easy
winner over PageMaker. Most of the people in the LASERPUB
echomail conference also seem to think the same way. The only
complaint I can recall on Ventura was due to someone not knowing
how to do something (as opposed to not being able to do
something). If you're going to have to buy a page composition
package in the near future, do yourself a favor and go find a
dealer who really knows how to use Ventura and have him give you
a demonstration.
FidoNews 4-28 Page 27 27 Jul 1987
-- WordPerfect 4.2 (WordPerfect Corp., list price $495.00) --
I'll admit it, I've been using WordPerfect for the past few
weeks and haven't admitted it until now. I conned my boss into
buying it for me at work and have been getting used to it before
I "reviewed" it. I didn't want to say anything right away because
it takes me awhile to become accustomed to a new word processor.
I didn't want to make the mistake of saying it's a poor product
just because I hit control-K Q to exit (Wordstar style commands)
when it wants F7 Y Y (WordPerfect). I must admit that I hated it
when I was still becoming accustomed to it, but am now a
WordPerfect convert and am seriously considering buying a copy
for home as well. After getting used to how the function keys
work (WordPerfect uses all 40 combinations on the function keys;
alone, alt-key, ctrl-key, and shift-key) it is a remarkably easy
word processor to use. My boss also purchased the WordPerfect
Library, although I won't start going over it until next week.
One of the first things I noticed about WordPerfect is that
it is fast. Supposedly this is because WordPerfect is written
completely in assembler while many other word processors,
Microsoft Word included, are written in a mix of C and assembler.
I don't know if this is actually true, but I do know that it is a
lot quicker than Word. While it doesn't do some of Word's nice
displays, in many cases it's easier to use WordPerfect than
Microsoft Word. In Word I could only spell check the entire
document and that could take a long time (go to the library, tell
it I want to do a spell check, etc.). WordPerfect let's me check
either a word, page or entire document. I've become very
accustomed to hitting Ctrl-F2 1 and checking the word I just
entered.
While it doesn't have Word's style sheets, it does have
built in macros; either the Alt-key variety or as an eight
character name. The only thing it is sadly missing is an editor
for the macros (they aren't stored in a straight ASCII format
like Superkey's macros). In order to get a macro editor you must
purchase the WordPerfect library. The macros aren't hard to
learn, and in many cases are much more flexible than Word's style
sheets. One of the first things I did when I started playing with
it's macros was create one for the start of these columns and
another with the complete signature. I used a variety of Superkey
macros to do this in Word and while they were very similar, I
decided to learn how to do it in WordPerfect. If you aren't
familiar with keyboard macros, it's basically a way of turning
several keystrokes into one (although that's a weak comparison,
it's the best I can do for now).
Overall I've been very impressed with it. While I haven't
really gone into it very deeply, bear with me over the next few
weeks while I keep learning more about it. Right now I can tell
that it's going to become my word processor of choice (at least
until I come across something I like better). I just wish I been
using it when all I had was a 4.77 mhz XT, the difference in
speed would have been very nice. If you're looking around for a
new word processor, I would definitely say try out WordPerfect.
FidoNews 4-28 Page 28 27 Jul 1987
It is fast, powerful, and fairly easy to use. My biggest advice
is to give yourself a chance to get used to it before you decide
against it. I'll still probably use Word when I'm looking for a
variety of fonts (especially if I ever get a laser printer) since
Word handles different fonts better than WordPerfect, but for all
my other work I'll be using WordPerfect.
-- Winding Down... --
I've found a book that may help many of you as you break
away from BASIC into Pascal or C. It's called "Puzzled
Programmers" by Michael Wiesenberg (Microsoft Press $12.95). It's
a little different as it has several short stories accompanying
each problem (of which there's fifteen) and while the problem
doesn't actually relate to the story, they make for cute reading.
Also included are hints to every problem as well as the solution.
The solutions are presented in BASIC, Pascal and C. One of the
things Wiesenberg was trying to accomplish was to aid those
learning a new language. All three solutions to each problem use
the same basic algorithm, so you can examine the solution in the
language you already know and compare it to the one you are
trying to learn. This is supposed to help you see how they are
similar, and how to take advantage of the special techniques or
principles of the different languages (like being able to
initialize several variables at the start of a loop in C). Since
I already know all three of the languages used, I wasn't able to
really learn anything with this book, but I can see how it might
help someone learn about a new language. The problems are all
mathematical problems, several of which could be solved without
the aid of a computer. The hints rarely tell you how to write a
program, they merely guide you along the way by helping you
figure out how to solve a problem.
I really support this method of learning. I've seen too many
Computer Science or MIS people graduate with honors and yet have
no idea on how to solve problems. To many courses on computers
only deal with syntax and modifying an existing program, often
given to the students in a lecture or text, to do something
slightly different. To much of programming is determining HOW to
do something to ignore teaching the students how to solve
problems (or as I call it, thinking...but I'm fairly sarcastic in
my attitudes these days). Books like this can help out those of
you trying to learn how to program more than many of the other
books I've recommended in this column. Most of the books I
recommend already assume you can determine the steps necessary to
accomplish a task, I think "Puzzled Programmers" will help teach
you this necessary skill. As I look over this paragraph I realize
that I starting to climb up on my soapbox again, so I'm going to
wind up by giving high marks to MIchael Wiesenberg on this
excellent book.
As always down below you'll find my US mail address, uucp
address and FidoNet address. If you're sending me mail through
FidoNet, please have your sysop route it through 157/1 (or 157/0)
as I am a private node. I'd like to thank any of you I missed
answering. While I try to answer every message (electronic or
FidoNews 4-28 Page 29 27 Jul 1987
otherwise) I receive, I'm not the most organized person and I'm
fairly certain I missed a few somewhere. I'm still waiting to
hear from the person using the pseudonym "Ender Wiggin," unless
you're worried about Jane eavesdropping? (for an understanding of
this read "Ender's Game" and "Speaker for the Dead" by Orson
Scott Card). I'd like to thank you for the package you sent,
although I don't have much use for it now. Hope to see all of you
at FidoCon.
Dale Lovell
3266 Vezber Drive
Seven Hills, OH 44131
FidoNet 1:157/504.1
uucp:
decvax\
>!cwruecmp!hal\
cbosgd/ \
>!ncoast
ames\ /
talcott \ /
>!necntc/
harvard /
sri-nic/
-----------------------------------------------------------------
FidoNews 4-28 Page 30 27 Jul 1987
=================================================================
NOTICES
=================================================================
The Interrupt Stack
1 Aug 1987
Third Annual BBS Picnic in Edison, NJ. Please register before
July 10th. Admission is $7 for adults, $4 for 12 and under,
free for 5 and under. Contact John Kelley at 107/331 for
details.
20 Aug 1987
Start of the Fourth International FidoNet Conference, to be
held at the Radisson Mark Plaza Hotel in Alexandria, VA.
Contact Brian Hughes at 109/634 for more information. This is
FidoNet's big annual get-together, and is your chance to meet
all the people you've been talking with all this time. We're
hoping to see you there!
24 Aug 1989
Voyager 2 passes Neptune.
If you have something which you would like to see on this
calendar, please send a message to FidoNet node 1:1/1.
-----------------------------------------------------------------
Latest Software Versions
BBS Systems Node List Other
& Mailers Version Utilities Version Utilities Version
Dutchie 2.51 EDITNL 3.3 ARC 5.21
Fido 11w LISTGEN 05.25.86 ARCmail 1.00*
Opus 1.00* Prune 1.40 EchoMail 1.31
SEAdog 4.00 TestList 8.3 FastEcho 2.00
TBBS 2.0M XlatList 2.81 Renum 3.30
* Recently changed
Utility authors: Please help keep this list as current as
possible by reporting new versions to 1:1/1. It is not our
intent to list all utilities here, only those which verge on
necessity.
-----------------------------------------------------------------
FidoNews 4-28 Page 31 27 Jul 1987
OFFICIAL REGISTRATION FORM
FOURTH INTERNATIONAL FIDONET CONFERENCE
RADISSON MARK PLAZA HOTEL
ALEXANDRIA, VA.
AUGUST 20 - 23, 1987
Name _________________________________ Date _____________
Address ______________________________
City & State _________________________
Phone (Voice) ________________________
Net/Node Number ______________________
Phone (Data) _________________________
Number in Your Party _________________
Staying at the Radisson? _____________
Number of Rooms? _____________________
Arrival Date? ________________________
Departure Date? ______________________
Registration Fees: How Many Total
Full Conference $60.00 each ________ $________
Late registration $10.00 each ________ $________
(after Aug. 1)
Friday Night Banquet $30.00 each ________ $________
Saturday Luncheon $16.50 each ________ $________
Total Amount Included (Registration and Meals) $________
IFNA MEMBERS ONLY:
How many in your party will
be attending the Sunday morning
Board of Directors meeting? ________
Send your registration form and a check or money order to:
Fourth International FidoNet Conference
212 E. Capitol St., Washington, D.C. 20003
Attn: Brian H. Hughes -- voice: (202) 543-4200
This registration form does not include hotel accomodations. If
you wish to stay at the Radisson Mark Plaza Hotel, please contact
them directly and mention you are with the FidoNet Conference.
Conference room rates are $80/night for single or double
occupancy, and $20/night for an extra cot.
Radisson Mark Plaza Hotel
5000 Seminary Rd., Alexandria, Va. 22311
1-800-228-9822
-----------------------------------------------------------------
FidoNews 4-28 Page 32 27 Jul 1987
Bob Morris 141/333
Chairman, Elections and Nominations Committee
The next two pages are your Official ballot for the Election of
the IFNA Board of Directors. The following are the few rules
which must prevail in this election:
1. You must send a legible copy of this ballot to the address
listed on the ballot. It must be signed and bear your
net/node number.
2. You may vote for any one person in your region for the
position of Regional Director. This vote is to be cast in the
LEFT column of the ballot.
3. You may vote for any eleven people in any regions for the
position of Director at Large. These votes are to be cast in
the RIGHT column of the ballot.
4. Voting will continue until the end of registration at the
Conference in August. The results will be read during the
opening of the business meeting on the first day of the
conference.
5. Write-in Votes will be accepted and are requested during this
election.
FidoNews 4-28 Page 33 27 Jul 1987
IFNA Board Of Directors
Ballot
Regional At Large
Region 10:
Steve Jordan _________ ________
Region 11:
Ryugen Fisher _________ ________
Theodore Polczynski _________ ________
Region 12:
Region 13:
Don Daniels _________ ________
John Penberthy _________ ________
Thom Henderson _________ ________
Gee Wong _________ ________
Brian Hughes _________ ________
Region 14:
Ben Baker _________ ________
Ken Kaplan _________ ________
Brad Hicks _________ ________
Region 15:
David Dodell _________ ________
Larry Wall _________ ________
Region 16:
Bob Hartman _________ ________
Hal Duprie _________ ________
Region 17:
Rob Barker _________ ________
Bob Swift _________ ________
Region 18:
Wes Cowley _________ ________
FidoNews 4-28 Page 34 27 Jul 1987
Region 19:
Mark Grennan _________ ________
Wynn Wagner _________ ________
Region 2:
Henk Wevers _________ ________
Write-in candidates:
___________________ _________ ________
___________________ _________ ________
Name ______________________________ Net/Node ___________
Signature______________________________ Date ___________
Please complete this and mail it to:
Robert Morris
IFNA Elections Committee
210 Church Street
West Haven, Ct. 06516
or bring it with you when you come to the conference in August.
These ballots will be counted by myself since with 200 members
the charges for a CPA would be very high. Hard copies will be
made available to anyone wishing to insure that their vote was
included.
Thank You
Bob Morris
Elections and Nominations Committee
-----------------------------------------------------------------