1790 lines
84 KiB
Plaintext
1790 lines
84 KiB
Plaintext
Volume 7, Number 41 8 October 1990
|
||
+---------------------------------------------------------------+
|
||
| _ |
|
||
| / \ |
|
||
| /|oo \ |
|
||
| - FidoNews - (_| /_) |
|
||
| _`@/_ \ _ |
|
||
| FidoNet (r) | | \ \\ |
|
||
| International BBS Network | (*) | \ )) |
|
||
| Newsletter ______ |__U__| / \// |
|
||
| / FIDO \ _//|| _\ / |
|
||
| (________) (_/(_|(____/ |
|
||
| (jm) |
|
||
+---------------------------------------------------------------+
|
||
Editor in Chief: Vince Perriello
|
||
Editors Emeritii: Thom Henderson, Dale Lovell
|
||
Chief Procrastinator Emeritus: Tom Jennings
|
||
|
||
Copyright 1990, Fido Software. All rights reserved. Duplication
|
||
and/or distribution permitted for noncommercial purposes only.
|
||
For use in other circumstances, please contact Fido Software.
|
||
|
||
FidoNews is published weekly by the System Operators of the
|
||
FidoNet (r) International BBS Network. It is a compilation of
|
||
individual articles contributed by their authors or authorized
|
||
agents of the authors. The contribution of articles to this
|
||
compilation does not diminish the rights of the authors.
|
||
|
||
You are encouraged to submit articles for publication in
|
||
FidoNews. Article submission standards are contained in the file
|
||
ARTSPEC.DOC, available from node 1:1/1. 1:1/1 is a Continuous
|
||
Mail system, available for network mail 24 hours a day.
|
||
|
||
Fido and FidoNet are registered trademarks of Tom Jennings of
|
||
Fido Software, Box 77731, San Francisco CA 94107, USA and are
|
||
used with permission.
|
||
|
||
Opinions expressed in FidoNews articles are those of the authors
|
||
and are not necessarily those of the Editor or of Fido Software.
|
||
Most articles are unsolicited. Our policy is to publish every
|
||
responsible submission received.
|
||
|
||
|
||
Table of Contents
|
||
1. ARTICLES ................................................. 1
|
||
EchoPol Revisited ........................................ 1
|
||
Conserve paper with 2 sided printing ..................... 14
|
||
Call New York Update #1 .................................. 16
|
||
General Elections in Zone 4 .............................. 17
|
||
Summary of FidoCon in Zone 5 ............................. 19
|
||
Home Schooling Echo on the Backbone ...................... 23
|
||
Loglan Language and Echo ................................. 24
|
||
MACINTOSH ALTERNATIVE CONNECTIONS LIST (MACLIST) - UPDA .. 26
|
||
OTHERNET NEWS ............................................ 29
|
||
2. LATEST VERSIONS .......................................... 30
|
||
And more!
|
||
FidoNews 7-41 Page 1 8 Oct 1990
|
||
|
||
|
||
=================================================================
|
||
ARTICLES
|
||
=================================================================
|
||
|
||
Introducing the Old Echomail Policy
|
||
George Peace
|
||
1:1/0
|
||
|
||
Many of us have seen the document. Many use it every day to help
|
||
us choreograph the flow of echomail. But until a real Echomail
|
||
Policy is enacted as a formal Zone 1 Policy, we're all simply
|
||
operating the backbone; moderating our conferences; and choosing
|
||
our Echomail Coordinators independently, inconsistently, and
|
||
without administrative support.
|
||
|
||
Echopol isn't perfection -- Policy never does seem to be. Some
|
||
parts of it give some of us heartburn while others evoke our
|
||
applause. What most of us do agree on is the need to enact an
|
||
Echomail Policy. The Zone 1 Region Echomail Coordinators have
|
||
banded together to offer the April 1989 Echopol to the Zone 1
|
||
Coordinator for adoption. I've joined them in this effort after
|
||
witnessing and even being part of situations that would have had
|
||
a much different outcome if we'd finished the job we started 18
|
||
months ago.
|
||
|
||
So what we've proposed is that the document be adopted as the
|
||
Zone 1 General Echomail Policy effective October 22, 1990. For
|
||
the first 60 days following its adoption, Zone 1 will operate
|
||
under that Policy. During that time, the Zone 1 RECs will accept
|
||
our constructive comments and requests for change. Comments and
|
||
RFCs will be accepted by any Zone 1 REC in a two part Situation /
|
||
Solution format that includes a proposed change to the Policy. At
|
||
the end of the 60 day period, the RECs will work with change
|
||
submitters, Conference Moderators, and NECs to determine which
|
||
solutions/changes will be implemented. A *C/*EC ratification
|
||
referendum for the revised EchoPol will be conducted between
|
||
January 15 and January 31. If that referendum fails, the Zone 1
|
||
Echomail Coordinator will coordinate efforts to submit another
|
||
document for ratification.
|
||
|
||
The document presented here is also available for file request
|
||
as ECHOPOL from 1:1/0, 1:157/200, 1:12/12, 1:13/13, 1:114/5,
|
||
1:322/1, 1:105/310+311+312, 1:151/1003, 1:382/1, and 1:396/1.
|
||
|
||
|
||
|
||
|
||
GENERAL ECHOMAIL POLICY 1.0
|
||
October 22nd, 1990
|
||
|
||
|
||
FidoNews 7-41 Page 2 8 Oct 1990
|
||
|
||
|
||
PROLOGUE
|
||
|
||
This document sets forth policy governing Echomail conferences
|
||
and their distribution.
|
||
|
||
If any item in this policy is in conflict with any existing or
|
||
subsequent General FidoNet Policy, then General FidoNet Policy
|
||
will be in effect.
|
||
|
||
This Policy applies to Zone One Backbone Echomail conferences and
|
||
to any other conferences for which the Moderator desires it to be
|
||
applicable.
|
||
|
||
Future changes to Echo Policy may be proposed by any FidoNet
|
||
Sysop by submitting the proposal to their REC. The REC will then
|
||
determine if the proposal should be brought before the rest of
|
||
the RECs. If an REC decides not to bring a proposed change
|
||
before the rest of the RECs, a message stating why must be sent.
|
||
If 10% or more of the NCs and NECs in a region request that a
|
||
proposal be brought before the RECs then that proposal must be
|
||
submitted to the RECs.
|
||
|
||
A majority vote of the Regional Echomail Coordinators is required
|
||
in order for a proposal to be formally voted on. If 10% or more
|
||
of the NCs and NECs in the Zone request that a proposal be
|
||
formally voted on, then that proposal must be formally voted on.
|
||
|
||
Those eligible to vote on any proposals made by the REC structure
|
||
will be the ZEC, RECs, NECs, NCs, RCs and ZC. Only one vote per
|
||
person is allowed. Adoption of changes will require a simple
|
||
majority of those voting to pass.
|
||
|
||
In this document, "a simple majority" means more than 50 percent
|
||
of those voting. A good faith attempt must be made to make all
|
||
potential voters aware that a vote is occurring and make
|
||
available all necessary information.
|
||
|
||
|
||
I. HISTORY
|
||
|
||
Echomail consists of the sharing of message bases or conferences
|
||
between various independent network addresses. The Echomail
|
||
concept started with a series of programs by Jeff Rush. Since
|
||
the original implementation, many authors have written programs
|
||
improving on the original idea. In spite of worries that the
|
||
flow of Echomail would increase Netmail traffic to the point that
|
||
the Network would collapse under its own weight, Echomail has
|
||
been a success. To simplify the distribution of Echomail, a
|
||
national Echomail Backbone formed whose primary purpose is the
|
||
distribution of Echomail at a national level. Of recent
|
||
introduction to the Backbone system has been the generous
|
||
contribution of the Echomail Stars. As a result of the growth of
|
||
Fidonet and the increase in the volume of Echomail, it has become
|
||
necessary to set forth a formal policy governing Echomail.
|
||
|
||
FidoNews 7-41 Page 3 8 Oct 1990
|
||
|
||
|
||
II. DEFINITIONS
|
||
|
||
1. ECHOMAIL: The process of sharing message bases between
|
||
independent systems with unique net/node addresses.
|
||
|
||
2. ECHOMAIL CONFERENCES: An Echomail conference is a message
|
||
base of forum design distributed under a specified conference
|
||
name dealing with a defined area of interest. Notable examples
|
||
include TECH, the National Technical Conference and COMM, the
|
||
National Telecommunications Conference.
|
||
|
||
3. MODERATED CONFERENCE: A moderated conference is an Echomail
|
||
conference for which a moderator has been appointed to supervise
|
||
the flow and content of the conference. All conferences carried
|
||
on the Backbone must be moderated.
|
||
|
||
4. SYSOP-ONLY CONFERENCE: A Sysop-Only Conference is one in
|
||
which the Moderator has decided that the conference will be made
|
||
available only to Sysops and not to users.
|
||
|
||
5. RESTRICTED DISTRIBUTION CONFERENCES: A restricted
|
||
distribution conference is one which is restricted only to
|
||
eligible recipients. Notable examples include REGCON, the
|
||
Regional Coordinators Conference, COORD, the National Echomail
|
||
Coordinators Conference, and MAGICK, a pre-register Echomail
|
||
Conference.
|
||
|
||
6. ZONE ECHOMAIL COORDINATOR (ZEC): This individual is
|
||
responsible for coordination of Echomail on a FidoNet Zone level.
|
||
|
||
7. REGIONAL ECHOMAIL COORDINATOR (REC): This individual is
|
||
responsible for coordination of Echomail within his region.
|
||
|
||
8. NET ECHOMAIL COORDINATOR (NEC): This individual is
|
||
responsible for coordination of Echomail at the Local Net level.
|
||
|
||
9. ECHOMAIL Backbone: The Echomail Backbone consists of
|
||
voluntary members who provide services to enhance the national
|
||
distribution of Echomail. The Backbone consists of nodes which
|
||
handle a high volume of Echomail traffic and are responsible for
|
||
distribution of Echomail down to the regional level.
|
||
|
||
10. NATIONAL ECHOMAIL LIST: The National Echomail List
|
||
identifies the available national conferences, the conference
|
||
moderator and requirements of the specified conference. The ZEC
|
||
will appoint the keeper of the National Echomail List.
|
||
|
||
11. AUTOMATED CENSORSHIP: The term Automated Censorship refers
|
||
to programs which cause messages to be removed from the intended
|
||
conference or have their content altered.
|
||
|
||
FidoNews 7-41 Page 4 8 Oct 1990
|
||
|
||
|
||
12. FIDONET POLICY: The document which governs Fidonet as
|
||
adopted by Fidonet. The document as of this writing is Policy4
|
||
and is subject to change. This policy is intended to become a
|
||
part of general Fidonet policy. Until it is incorporated into
|
||
General Fidonet policy, this document shall serve to define
|
||
policy violations occurring in Echomail.
|
||
|
||
13. OPEN ACCESS CONFERENCE: This is a non-restricted conference
|
||
open to all users who are willing to follow the posted conference
|
||
rules.
|
||
|
||
14. TERMINAL NODE: A system which does not process echomail for
|
||
pickup by another system.
|
||
|
||
|
||
III. DUTIES OF ECHOMAIL COORDINATORS
|
||
|
||
1. GENERAL: It is the duty of the *ECs to make available to any
|
||
Fidonet Sysop, any conference which the Sysop is not prohibited
|
||
from receiving by not meeting requirements as mandated by the
|
||
conference moderator. If for any reason the *EC does not have
|
||
access via recognized distribution channels to a specific
|
||
conference, they can not be expected to pass it on. If a *EC
|
||
fails to make available any conference to qualified lower
|
||
distribution levels, this shall be deemed to have violated the
|
||
outlined duties of the position held. Such violation is cause
|
||
for the removal as provided by this document. Nothing in this
|
||
provision requires that a *EC must import any conference to the
|
||
extent of adverse economic impact. It is recommended that cost
|
||
sharing arrangements be employed. Where financially feasible for
|
||
the supplier any conference on the Backbone must be made
|
||
available (other than restricted conferences) when requested.
|
||
|
||
An exception is when a *EC cuts a link to end unauthorized
|
||
distribution of a conference. In this case, some otherwise
|
||
authorized nodes may temporarily lose their link.
|
||
|
||
A *EC shall do everything in their power to insure that:
|
||
|
||
1. All downstream links are educated as to this policy.
|
||
|
||
2. Downstream links know how to properly link into
|
||
conferences.
|
||
|
||
3. Acceptable and unacceptable behavior in echomail
|
||
conferences is explained.
|
||
|
||
4. Downstream links are not engaging in topologies that
|
||
increase the risk of duplicate messages.
|
||
|
||
2. DUTIES OF ZONE ECHOMAIL COORDINATOR: It is the duty of the
|
||
ZEC to coordinate the connections between the Echomail Backbone
|
||
on both an inter-Zone and intra-Zone level as well as
|
||
coordination of inter-regional connections. The ZEC will
|
||
coordinate transmission of Echomail and to provide for routing in
|
||
a manner that will avoid the transmission of duplicate messages
|
||
FidoNews 7-41 Page 5 8 Oct 1990
|
||
|
||
|
||
within the same conference. It is also the duty of the ZEC to
|
||
monitor compliance with this policy on both a national and
|
||
international basis.
|
||
|
||
3. DUTIES OF REGIONAL ECHOMAIL COORDINATOR: It is the duty of
|
||
the REC to provide for regional Echomail distribution. In
|
||
addition, the REC will coordinate any inter-regional
|
||
cross-linking of conference feeds with the REC of the
|
||
participating region with the direct knowledge of the ZEC. The
|
||
REC will provide for transmission and routing of Echomail within
|
||
his/her region in a manner to avoid creation of duplicate
|
||
messages within the same conference. It is the duty of the REC
|
||
to monitor compliance with this policy at a regional level.
|
||
|
||
4. DUTIES OF NET ECHOMAIL COORDINATOR: It is the duty of the
|
||
NEC to coordinate the intra-net Echomail and to cooperate with
|
||
the REC and NECs of other nets to arrange for the inter-net
|
||
transmittal of echomail. The REC may require the NEC to provide
|
||
links for independent (regional) nodes. The NEC shall maintain a
|
||
list of available Echomail Conferences within the net as well as
|
||
the requirements of each Conference area as supplied by the
|
||
conference moderator (Echolist). The NEC shall also monitor
|
||
compliance with this policy at a net level.
|
||
|
||
5. DUTIES OF ECHOLIST COORDINATOR: It is the duty of the
|
||
Echolist Coordinator to compile and make available a listing of
|
||
national and international Echomail conferences and optionally,
|
||
conferences at various local levels. The content and format of
|
||
the Echomail listing shall be at the sole discretion of the
|
||
Echolist Coordinator, but shall include the conference name and
|
||
moderator for each conference. The Echolist Coordinator shall
|
||
also maintain a list of requirements applicable to each listed
|
||
conference.
|
||
|
||
6. DUTIES OF ECHOMAIL CONFERENCE MODERATOR: It shall be the
|
||
duty of the Echomail Conference Moderator to make in good faith
|
||
every reasonable effort to insure that the moderated conference
|
||
does not distribute or promote illegal activities or information
|
||
as defined below in Section V Paragraph 2. The Moderator shall
|
||
be responsible for insuring that messages contained in the
|
||
conference corresponds to the conference theme. The Moderator
|
||
shall report any violations of this policy to the proper Echomail
|
||
coordinators and lodge any appropriate policy complaints as
|
||
provided for in policy documents adopted by Fidonet. The
|
||
Moderator shall post the conference rules in the conference at
|
||
least once a month. The Moderator is to authorize the
|
||
disconnection of the conference feed. Any Sysop the moderator
|
||
believes is violating policy shall be reported to the offending
|
||
node's nearest local echomail coordinator (may be a NEC, REC or
|
||
in extreme situations a ZEC); and the moderator shall formally
|
||
authorize the feed to the offending node to be severed. The
|
||
conference moderator is the sole judge, subject to review only by
|
||
the ZEC (or his delegates), if a complaint is filed by the
|
||
banished party. The Moderator may request in direct written form
|
||
(netmail) that the *ECs disconnect a node from the conference
|
||
when that node refuses to follow the published conference rules
|
||
FidoNews 7-41 Page 6 8 Oct 1990
|
||
|
||
|
||
after at least 3 warnings. Knowingly feeding a conference to a
|
||
node that has been severed by the Moderator is considered a
|
||
violation of this echomail policy and is subject to suspension.
|
||
The length of this suspension will be determined by a joint
|
||
decision of the conference moderator and the nearest local echo
|
||
coordinator of the node illegally feeding the conference to the
|
||
original offending node or point.
|
||
|
||
Echo conference complaints from a Sysop should be filed at the
|
||
net level (NEC) or if the complaining party is an independent
|
||
node then with their REC. The NEC or REC receiving such a
|
||
complaint must take action in accordance with the provisions of
|
||
this echomail policy.
|
||
|
||
For severe or chronic infractions the NEC, REC or ZEC may file a
|
||
complaint under general Fidonet policy for excessively annoying
|
||
behaviour.
|
||
|
||
|
||
IV. APPOINTMENT AND ELECTION OF ECHOMAIL COORDINATORS AND
|
||
MODERATORS
|
||
|
||
1. GRANDFATHER CLAUSE: Those Zone, Regional, and Net Echomail
|
||
Coordinators and Echomail Coordinators currently holding these
|
||
positions as of the date of acceptance of this Echomail Policy
|
||
shall continue to serve in said capacity until resignation or
|
||
replacement under this policy.
|
||
|
||
2. ELECTION OF ZONE ECHOMAIL COORDINATOR: The ZEC shall be
|
||
elected as follows:
|
||
|
||
a) upon resignation or replacement of the existing ZEC,
|
||
the FidoNet Zone Coordinator (ZC) shall nominate at
|
||
least five individuals to be voted upon.
|
||
|
||
b) 10 days after the nominees are selected, an election
|
||
shall be held. The ZEC will be elected by a simple
|
||
majority of IC, ZC, RCs, NCs, RECs, and NECs in their
|
||
Fidonet zone. An individual holding more than one
|
||
position can only cast one vote. That is, if an
|
||
individual is both a NC and a NEC, they may cast only
|
||
one vote.
|
||
|
||
3. ELECTION OF REGIONAL ECHOMAIL COORDINATOR: The REC shall be
|
||
elected as follows:
|
||
|
||
a) upon resignation or replacement of an existing REC,
|
||
the ZEC shall nominate at least 3 individuals for
|
||
election.
|
||
|
||
b) 10 days after the nominees are selected, an election
|
||
FidoNews 7-41 Page 7 8 Oct 1990
|
||
|
||
|
||
shall be held. The REC will be elected by a simple
|
||
majority of the RC, NCs and NECs in their FidoNet
|
||
Region. An individual holding more than one position
|
||
may only cast one vote.
|
||
|
||
4. NET ECHOMAIL COORDINATOR: The NEC shall be appointed by the
|
||
FidoNet Net Coordinator (NC) or in such alternative manner as
|
||
determined by the NC. If a NEC is not appointed within 30 days,
|
||
the REC will appoint the NEC.
|
||
|
||
5. REMOVAL OF A *EC: A *EC may be removed from their position\
|
||
by a simple majority of those allowed to vote for their
|
||
successor. For a NEC, the members of the Net may vote by simple
|
||
majority to remove the NEC. The position directly above (in the
|
||
*EC structure) will oversee the recall election in the same
|
||
manner as prescribed for electing successors.
|
||
|
||
A *EC may only be subject to recall for failure to properly carry
|
||
out their duties described above, or if they are no longer a
|
||
member of Fidonet. A promise of 'free' echomail delivery from
|
||
another source is *not* considered an acceptable reason for
|
||
recall.
|
||
|
||
A *EC may be removed by the level above for continued violations
|
||
of policy or for gross misconduct.
|
||
|
||
6. RECOGNITION OF CONFERENCES: The *EC corresponding to the
|
||
appropriate level recognizes a conference at his level.
|
||
Examples: The NEC recognizes a conference as local. The REC
|
||
recognizes a conference to be regional. A ZEC recognizes a
|
||
conference to be zonal.
|
||
|
||
7. REMOVAL OF AN ECHOMAIL CONFERENCE MODERATOR: An Echomail
|
||
Conference Moderator may be removed from their position by a
|
||
three fourths (3/4) vote of the *EC structure voting. This vote
|
||
must be carried out in a fair and decent manner while giving at
|
||
least ten (10) days notice to the entire *EC structure of the
|
||
upcoming vote.
|
||
|
||
The ZEC shall notify the RECs who in turn shall notify the NECs
|
||
in their region of any upcoming vote. Notice must be given via
|
||
NetMail. Additional postings in such conferences as COORD and
|
||
regional conferences are encourgaged.
|
||
|
||
An Echomail Conference Moderator may only be subject to recall
|
||
for failure to properly carry out their duties described above or
|
||
continued pre-meditated violation of this documents section V.
|
||
Statement of Policies as seen below. Failing to perform the
|
||
above duties of a conference moderator for a period of 3 or more
|
||
months and/or failing to designate a proxy in his absence shall
|
||
be in violation of this policy and be subject to recall. A vote
|
||
may only be callable by the ZEC (or his delegate). This delegate
|
||
should not be from the region or net of the affected conference
|
||
moderator.
|
||
|
||
FidoNews 7-41 Page 8 8 Oct 1990
|
||
|
||
|
||
Membership in Fidonet need not be a paramount issue, but is
|
||
highly recommended.
|
||
|
||
|
||
V. STATEMENT OF POLICIES
|
||
|
||
1. BASIC ECHOMAIL POLICY: The basic policy of Echomail is to
|
||
promote communication in Echomail Conferences in a lawful,
|
||
friendly manner consistent with the general principles of
|
||
FidoNet.
|
||
|
||
2. PROHIBITION ON ILLEGAL ACTIVITIES: Any Node which knowingly
|
||
distributes or allows to be entered into echomail conferences any
|
||
messages containing or promoting illegal activities or
|
||
information shall be deemed to have violated general FidoNet
|
||
policy as being excessively annoying. As used in this paragraph,
|
||
"illegal activities" includes activities which are a violation of
|
||
civil law as well as activities which would result in criminal
|
||
prosecution.
|
||
|
||
3. AUTOMATED CENSORSHIP: The use of Automated Censorship in the
|
||
passing or distribution of echomail will be considered a
|
||
violation of this policy and will not be tolerated. Disciplinary
|
||
action will be as referred to in General Fidonet policy as being
|
||
excessively annoying.
|
||
|
||
An exception to this provision shall be the deletion and not
|
||
censorship of messages by any Sysop which may lead to legal
|
||
action against that Sysop.
|
||
|
||
No echomail shall be modified in any manner which could
|
||
potentially cause duplicates.
|
||
|
||
4. INTER-NETWORK CONFERENCES: Inter-Net conferences shall
|
||
conform to general Fidonet policy as well as the provisions of
|
||
this policy document in addition to any foreign network's
|
||
provisions. Conferences which originate outside of FidoNet must
|
||
be designated as such in the list of conferences kept by the
|
||
Echolist Coordinator.
|
||
|
||
5. CHARGING FOR DISTRIBUTION: Any entity which makes a profit
|
||
from the distribution (passing from system to system) of echomail
|
||
shall be deemed to be excessively annoying and in violation of
|
||
Fidonet policy subject to enforcement under existing Fidonet
|
||
policy. Profit as defined in this paragraph is the charging for
|
||
echomail distribution that exceeds actual cost to obtain and
|
||
distribute the Echomail over a sustained period. The cost of the
|
||
equipment used to obtain and distribute echomail may only be
|
||
recovered on a strictly voluntary basis. A Sysop that charges
|
||
users for access to their BBS shall NOT be in violation of this
|
||
paragraph.
|
||
|
||
FidoNews 7-41 Page 9 8 Oct 1990
|
||
|
||
|
||
Implementation of cost recovery plans may vary greatly. In
|
||
general cost recovery plans should not be overly restrictive.
|
||
|
||
6. RESTRICTED DISTRIBUTION CONFERENCES: Participating Nodes
|
||
shall honor and support the restrictions placed upon restricted
|
||
distribution conferences. Violation of this restriction by
|
||
individual nodes and points shall be a violation of this echomail
|
||
policy and result in suspension of the violated echo in
|
||
accordance with the above paragraph in Section III Duties of the
|
||
Echomail Conference Moderators.
|
||
|
||
A Sysop-only conference shall be made available only to the
|
||
Sysops or Co-Sysops of Fidonet or other nets with which inter-net
|
||
conferences exist.
|
||
|
||
A violation of the restrictions placed on a RESTRICTED
|
||
DISTRIBUTION CONFERENCE will be a violation of this policy if and
|
||
only if the moderator has posted and specified the restrictions
|
||
governing the conference.
|
||
|
||
7. PATHLINE OPTION: The PATHline (as defined in FTS-0004),
|
||
originally implemented by SEA in the MGM package, is recommended
|
||
for all nodes. If your current Echomail scanner supports the
|
||
pathline you should enable it. While the pathline does not
|
||
eliminate duplicate messages, it can be a very useful tool in
|
||
determining where a topology problem exists.
|
||
|
||
Systems operating as Echomail Stars, Backbone nodes, or Echomail
|
||
Hubs must implement the PATHline option (as defined in FTS-0004
|
||
within 30 days of adoption of this policy. Since these system
|
||
are operating beyond the scope of the typical FidoNet system,
|
||
they are required to implement features that are otherwise
|
||
optional.
|
||
|
||
8. SEEN-BY LINE: Under the current technology and topology (the
|
||
routing structure of echomail), SEEN-BY lines play an important
|
||
part in reducing duplicate messages. Tiny SEEN-BYs will not be
|
||
allowed until the respective ZECs feel topology will allow their
|
||
use. Nor will the stripping of SEEN-BYs (except Zone-Gates and
|
||
Inter-Network EchoGates) be allowed unless approved by the ZEC.
|
||
|
||
Violation of the above shall be excessively annoying behavior
|
||
enforceable under general Fidonet policy. Zone-Gates and Inter-
|
||
Network EchoGates SHOULD strip the SEEN-BYs of the exporting Zone
|
||
or Network to reduce addressing conflicts.
|
||
|
||
9. COUNTERFEIT MESSAGES: Entering or knowingly distributing
|
||
counterfeit messages shall be considered excessively annoying and
|
||
a violation of Fidonet policy enforceable under the terms of
|
||
Fidonet policy. As used in this paragraph, a counterfeit message
|
||
is defined as any message entered using another person's name,
|
||
handle or node address with the intent of deceiving others about
|
||
the true author of the message. No handles shall be used to
|
||
enter messages to knowingly provoke, inflame, or upset
|
||
participants in a conference with the purpose of deceiving others
|
||
about the true identity of the author.
|
||
FidoNews 7-41 Page 10 8 Oct 1990
|
||
|
||
|
||
10. SYSOP'S RESPONSIBILITY: It is the responsibility of each
|
||
Sysop to make every reasonable effort to assure that the users on
|
||
his board conform to the provisions of this policy document. A
|
||
Sysop may be held responsible for the acts of his users unless
|
||
the Sysop can show that a reasonable attempt was made to conform
|
||
to this policy document.
|
||
|
||
11. ECHOMAIL SOFTWARE: Echomail software which does not conform
|
||
to the minimum acceptable standards as defined by the Fidonet
|
||
Technical Standards Committee (FTSC) shall lead to disciplinary
|
||
action as described previously in this document.
|
||
|
||
12. HOST ROUTING OF ECHOMAIL: Host routing of Echomail without
|
||
the prior consent of both the Sending and Receiving Hosts shall
|
||
lead to disciplinary action as described previously in this
|
||
document. See Section III.
|
||
|
||
13. INTER-NETWORK CONFERENCES: It is the general policy of
|
||
Fidonet to encourage the development of INTER-NETWORK
|
||
CONFERENCES. It shall be the duty of those providing the
|
||
INTER-NETWORK CONFERENCE links to remove foreign net distribution
|
||
identifiers which will adversely effect the distribution of the
|
||
Echomail Conference while in Fidonet. The INTER-NETWORK
|
||
CONFERENCE links maintained in Fidonet shall be operated in a
|
||
manner not to interfere with the foreign network's distribution
|
||
of Echomail. INTER-NETWORK CONFERENCE links maintained in
|
||
FidoNet must also conform to General FidoNet Policy.
|
||
|
||
14. DEFAMATORY POSTING: The posting of any DEFAMATORY MESSAGE
|
||
other than in conferences dedicated to this purpose (i.e. FLAME)
|
||
shall lead to disciplinary action as described previously in this
|
||
document. See Section III. The posting of substantiated facts
|
||
shall not be considered a violation under this section.
|
||
|
||
15. ADDING OR REMOVING CONFERENCES FROM THE BACKBONE:
|
||
|
||
A conference may be added to the Backbone only at the request of
|
||
the RECOGNIZED Conference Moderator. A conference must be
|
||
registered with the Echolist Coordinator before it can be added
|
||
to the Backbone.
|
||
|
||
A conference may be removed from the Backbone by lack of traffic.
|
||
|
||
The recognized conference moderator may, at their discretion,
|
||
request removal from the backbone any conference that same
|
||
moderator initially placed in backbone distribution.
|
||
|
||
16. TOPOLOGY and DUPLICATE MESSAGES: Cross Regional links
|
||
should be avoided as they increase the risk of improper linking
|
||
and generation of duplicate messages. Cross Regional links may
|
||
only be established with the knowledge of the REC in both
|
||
regions. The REC must be notified prior to or at the time of the
|
||
link being established. If an REC determines that a cross
|
||
regional link is contributing to the creation of duplicate
|
||
messages, the REC may request that the link be terminated.
|
||
|
||
FidoNews 7-41 Page 11 8 Oct 1990
|
||
|
||
|
||
The use of the PATHline option is required for all out of region
|
||
links.
|
||
|
||
If a sysop has a prior history of creating duplicate messages
|
||
because of out of region links, the REC may require prior
|
||
notification and approval before an out of region link can be
|
||
established.
|
||
|
||
Cross Regional links are permitted without notifcation if one of
|
||
those systems is a dead-end. Should the status of this link
|
||
change, then notification is required.
|
||
|
||
Each REC will do their best to make available high speed hubs,
|
||
out of state hubs, PC Pursuit hubs, etc, to facilitate the low
|
||
cost, efficient movement of mail within their respective Region.
|
||
|
||
Any Sysop who willfully and knowingly establishes links that
|
||
either create duplicate loops (topology that creates circular
|
||
feeds) or who refuses to break such links upon request by their
|
||
NEC, REC or ZEC shall be subject to disciplinary action as
|
||
described previously in this document. See Section III.
|
||
|
||
17. MESSAGE STANDARDS: Until the adoption of a superceding
|
||
standard by the Fidonet Technical Standards Committee, the
|
||
following Echomail message standards are recommended:
|
||
|
||
a) Eight-bit characters (ASCII 128-255) and non-printing
|
||
low-order codes (ASCII 2-31) are prohibited, except the
|
||
use of 8Dh(soft <CR> character) per FTS-0004. This is
|
||
not intended to discourage participation of foreign
|
||
zones or networks, which may permit said characters.
|
||
Any echomail processor should pass information exactly
|
||
as it was received, without stripping any non-standard
|
||
characters.
|
||
|
||
b) Origin lines should be limited to 79 characters
|
||
including the required ending of a proper network
|
||
address (i.e. Zone:Net/Node.Point with zone and point
|
||
being optional).
|
||
|
||
c) Tear lines should be limited to 35 characters
|
||
including the required "--- " lead-in. These should
|
||
only contain packer or editor program identification.
|
||
Tear lines for message editors are discouraged. If an
|
||
editor adds a tear line, it should also add an origin
|
||
line to avoid multiple tear lines.
|
||
|
||
d) "Extra" origin lines (ZoneGating) are limited to
|
||
essential information only. This consists of the
|
||
required lead-in plus the network name "Gateway" and
|
||
optionally the software ID followed by a Zone:Net/Node
|
||
FidoNews 7-41 Page 12 8 Oct 1990
|
||
|
||
|
||
address. Example: " * Origin: FidoNet Gateway (TComm
|
||
88:372/666)"
|
||
|
||
e) SEEN-BY addresses should be in sorted order.
|
||
Multiple AKA's are not allowed in SEEN-BY lines unless
|
||
you have more than one address which processes mail. Or
|
||
for one month during change of an existing address (to
|
||
avoid duplicates to the previous address). Node 0
|
||
addresses should not be used for echomail distribution.
|
||
|
||
f) All current FTSC specifications must be followed.
|
||
|
||
|
||
VI. ENFORCEMENT
|
||
|
||
Enforcement of this policy document shall be under the provisions
|
||
of General FidoNet policy. Complaints concerning Echomail
|
||
violations defined under this policy may be filed by the
|
||
aggrieved individual, the conference moderator or by any level of
|
||
Echomail Coordinator to the appropriate *C level. All complaints
|
||
made pursuant to this policy must be made within 60 days of the
|
||
date of occurrence or discovery. Complaints shall be filed under
|
||
the provisions of General Fidonet Policy, with a copy to the
|
||
respective *EC.
|
||
|
||
Enforcement is immediate, with any currently existing software
|
||
allowed 60 days to conform (from the date EchoPol1 goes into
|
||
effect). A 30 day extension may be granted solely at the
|
||
discretion of the ZEC if efforts to bring about compliance are
|
||
clear. Continued use of aberrant software after this period
|
||
shall be deemed excessively annoying.
|
||
|
||
|
||
VII. ADOPTION OF POLICY
|
||
|
||
1. ADOPTION: This policy shall become effective upon
|
||
ratification by a simple majority of those voting. Those
|
||
eligible to vote shall be the IC, ZCs, RCs, NCs, ZECs, RECs, and
|
||
NECs. Those individuals holding more than one position can cast
|
||
only one vote.
|
||
|
||
2. GRANDFATHER CLAUSE: Within 60 days of adoption of this
|
||
policy, moderators shall be appointed for all existing Echomail
|
||
Conferences which do not now have a moderator. Moderators shall
|
||
be appointed by the ZEC from those volunteering as moderator or
|
||
if no volunteer is available then the ZEC shall request and
|
||
appoint a moderator for the conference. In the case where more
|
||
than one individual claims to be the conference moderator and no
|
||
agreement can be reached, the ZEC may order the conference
|
||
retired and ban the further use of the specific conference name.
|
||
Failure of the individuals to retire the conference name shall be
|
||
deemed excessively annoying behavior.
|
||
|
||
FidoNews 7-41 Page 13 8 Oct 1990
|
||
|
||
|
||
VI. BACKBONE STRUCTURE
|
||
|
||
This section is for information purposes only. It gives a plain
|
||
English description of the current structure and operation of the
|
||
Backbone. The ZEC may change this structure without amending
|
||
this document.
|
||
|
||
At the top of the Echomail distribution network, there are
|
||
systems commonly called Stars. These systems are usually
|
||
dedicated to passing Echomail. The stars operate at the
|
||
discretion and direction of the ZEC. At the time of this writing
|
||
there are 3 stars, each has a backup system/plan in the event of
|
||
a failure. In general, the Stars link to one another and feed the
|
||
RECs.
|
||
|
||
The RECs are then responsible for distribution of the echomail
|
||
within their Region. Normally, the REC will feed the NECs in
|
||
that region.
|
||
|
||
The NEC is responsible for distribution of Echomail to the
|
||
individual Sysops within a net.
|
||
|
||
Note that the RECs and NECs can appoint Hubs to help in the
|
||
distribution of Echomail. That is, they do not have to directly
|
||
feed the lower level.
|
||
|
||
This is the distribution GOAL. Because of less expensive phone
|
||
rates and other reasons, this distribution method is not followed
|
||
exactly. Any change to the above requires agreement of the *EC's
|
||
involved. All *ECs will use all the tools at their disposal,
|
||
such as hubs, high speed modems, ROA, Wide Area Calling plans, PC
|
||
Pursuit, corporate sponsorship, etc., to provide fast, efficient,
|
||
and cost effective movement of echomail.
|
||
|
||
|
||
Echopol Committee
|
||
|
||
Mike Ratledge
|
||
Norm Henke
|
||
Rick McWilliams
|
||
Barry Shatswell
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 14 8 Oct 1990
|
||
|
||
|
||
Dave "who likes to jump out of airplanes" Appel
|
||
Just a user on 1:231/30
|
||
|
||
[bych mode on]
|
||
Personally, I'm getting sick and tired of all the non-
|
||
computer-related articles appearing in FidoNews. Especially
|
||
the ones by the eco-freaks, the left-wing-commie-pinko-
|
||
conspiracy-theorists, either side of the abortion issue, and
|
||
30K .GIF files of some stranger's ugly mug. (However, an
|
||
occasional missing child announcement is fine by me.) If you
|
||
can't relate it to computers, or the network, find someplace
|
||
else to publish it, please. I even prefer bashing/defending
|
||
the editor about LHARC versus ARC than the completely off-topic
|
||
junk.
|
||
[bych mode off]
|
||
|
||
Well, here's how conservation CAN be applied by computer
|
||
users. Print on both sides of the paper.
|
||
|
||
As an arch-conservative anal-retentive capitalist pig I
|
||
see it as a way to save dollars on my paper costs. Bottom
|
||
line, you know. For you tree-hugging vegetarian
|
||
environmentally correct eco-geeks, you might even save a few
|
||
trees so you can continue your smug sense of moral superiority.
|
||
|
||
There are several utilities that are specific to certain
|
||
printers or to certain word processing packages. There are
|
||
even utilities to split text files into 2 files, one containing
|
||
odd-number pages, and the other containing even-number pages.
|
||
|
||
An example of such an "evironmentally conscious" (cost
|
||
conscious to me) utility is 4PRINT for the HP LaserJet. It
|
||
prints 4 66-line pages per sheet of paper, 2 each, front and
|
||
back. You have to run the paper through twice. It's shareware.
|
||
|
||
Some word processors such as XYWRITE have built-in macros
|
||
for printing odd and even pages.
|
||
|
||
The LaserJet IID prints on both sides of the paper, but
|
||
not many people have these printers. For the rest of us, we
|
||
need to print the odd pages, turn the paper around, feed it
|
||
back into the printer, then print the even pages.
|
||
|
||
The lazy way that I used to print documentation was to:
|
||
COPY myfile.DOC LPT1
|
||
|
||
Since I decided to do double sided printing, I always
|
||
bring the doc file into my word processor and print it from
|
||
there, where I have control over which pages to print.
|
||
|
||
MS-Word 5.0 doesn't have a built-in macro to do this so I
|
||
wrote my own. Here it is:
|
||
|
||
FidoNews 7-41 Page 15 8 Oct 1990
|
||
|
||
|
||
<Ctrl PgDn><up><up><Ctrl Esc>jp[SET lastpage = field]<Esc>
|
||
[ASK pageno=?Enter starting page]
|
||
[WHILE pageno <= lastpage]
|
||
<Ctrl Esc>po<down><down><down><down>p<right>[pageno]
|
||
<enter><enter>
|
||
[SET pageno=pageno+2]
|
||
[ENDWHILE]
|
||
|
||
You need to substitute the "[" and "]" symbols with the
|
||
chevrons by pressing Control-[ and Control-]. (The chevrons
|
||
are special characters, 174 and 175, that ARTSPEC.DOC says not
|
||
to include in FidoNews articles.) You can store this macro in
|
||
your macro glossary. Load your paper, run the macro, tell it
|
||
page "1", when the printing is done, reload the paper
|
||
backwards, run the macro, tell it page "2".
|
||
|
||
If you do everything right, and your printer doesn't jam,
|
||
you just cut your paper usage in half, with only about an extra
|
||
42.5 seconds of effort. If something goes wrong, like a
|
||
printer jam, or you re-edit the document in between printing
|
||
the two sides (thereby shifting the page breaks), you just
|
||
screwed up the whole thing, wasted even more time, and wasted
|
||
more paper than you were going to save in the first place.
|
||
|
||
Another benefit of two-sided printing is that when the
|
||
document becomes obsolete, you aren't tempted to keep it around
|
||
as clutter hoping to someday use the blank side as scrap paper.
|
||
You can chuck the whole thing with the satisfaction of knowing
|
||
that you squeezed every last use out of it, or you can even
|
||
(*gasp*) recycle it.
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 16 8 Oct 1990
|
||
|
||
|
||
Ronnie Toth
|
||
FidoNet 1:135/71
|
||
October 3, 1990
|
||
|
||
** CALLNY Update **
|
||
|
||
We've done it!
|
||
|
||
CALLNY is on the FidoNet backbone now and all you have to do is
|
||
pester your wonderful NEC to get it for you! He can then pester
|
||
his/her also wonderful REC and there you are! You can be in New
|
||
York too!
|
||
|
||
TAG: CALLNY
|
||
Topic: Anything New York
|
||
Moderator: Ronnie Toth FidoNet 1:135/71
|
||
|
||
We will be listed in ELIST011.
|
||
|
||
For those who called the two originating systems, thank you.
|
||
This should make it simple for all.
|
||
|
||
An official thank you goes to:
|
||
Ray Vaughan who started the whole ball rolling
|
||
|
||
Michele Hamilton who taught me how to go about echo-making and
|
||
assisted whenever needed. (Lots.)
|
||
Amnon Nissan who freely gave words of encouragement
|
||
John Cottrell More words of encouragement
|
||
Fabian Gordon More words of encouragement and the spreader
|
||
of the word up NY way
|
||
Roger Bonenfant Our first actual NY link, (even though he's
|
||
in NJ)
|
||
|
||
Thank you one and all. See ya in NY!
|
||
Ronnie
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 17 8 Oct 1990
|
||
|
||
|
||
Pablo Kleinman
|
||
FidoNet 4:4/0
|
||
General Elections in Zone 4
|
||
Elecciones Generales en la Zona 4
|
||
Eleicoes Gerais na Zona 4
|
||
|
||
As the result of an agreement reached by ZC4 and the rest of
|
||
Zone 4's coordinators, on November 9th 1990 the members of
|
||
FidoNet Zone 4 "Latin America" will be able to vote for the
|
||
renovation of the whole coordination structure of the zone, and
|
||
elect Network coordinators, Region coordinators and Zone
|
||
coordinator.
|
||
|
||
The procedures defined for the democratic election process are
|
||
the following:
|
||
|
||
- All the FidoNet members will be able to present themselves as
|
||
candidates to a single coordination position, by sending netmail
|
||
to Elecciones at node 4:4/444 until October 20th, stating the
|
||
position they intend to run for.
|
||
|
||
- On October 21st, the list of all candidates will be published
|
||
on the official echomail conference LATIN.SYSOP and on October
|
||
22nd, on FidoNews. From then until the voting closes on November
|
||
9th, the candidates will be able to debate ideas on the
|
||
LATIN.SYSOP echo, as well as on the other region and local
|
||
sysops' echomail conferences.
|
||
|
||
- From October 22nd until November 9th, all the members of
|
||
FidoNet Zone 4 will be able to vote for the different candidates
|
||
-voting for a someone that is not a candidate will void the
|
||
entire ballot- for the domain where the member is registered (for
|
||
example, a FidoNet member in Net 900 can vote for NC 900, RC 90
|
||
and ZC 4), and they will do so by sending a message to Elecciones
|
||
at node 4:4/444, whose subject will be a special "secret
|
||
password" and the text will indicate the different choices. THE
|
||
VOTE IS SECRET, AND ITS CONTAINTS WILL NEVER BE REVEALED. This is
|
||
an example of how a ballot must be issued:
|
||
|
||
secret password
|
||
From: Pedro Picapiedras (4:900/789) |
|
||
To: Elecciones (4:4/444) |
|
||
Subj: piedradura <----------------| text
|
||
|
|
||
NC: Johny Tolengo <---------------------|
|
||
RC: Isidoro Canones
|
||
ZC: Juancho Lagarto
|
||
|
||
- The results from the election will be published on November
|
||
11th on the official echomail conference LATIN.SYSOP and on
|
||
November 12th on FidoNews. A comprehensive list with every ballot
|
||
listed, to grant the accurateness of the results, will be posted
|
||
on November 11th on the echomail conference LATIN.SYSOP. This is
|
||
an example of how a ballot will be published in the comprehensive
|
||
list:
|
||
|
||
FidoNews 7-41 Page 18 8 Oct 1990
|
||
|
||
|
||
Password NC RC ZC Status
|
||
-----------------------------------------------------------------
|
||
piedradura J.Tolengo I.Canones J.Lagarto OK
|
||
|
|
||
will say "VOID" if the ballot is not correct-----------|
|
||
|
||
|
||
- The newly elected coordinators will take over their new
|
||
positions with the nodelist update of November 16th.
|
||
|
||
|
||
Pablo Kleinman
|
||
Latin American FidoNet Coordinator
|
||
Buenos Aires, October 3, 1990
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 19 8 Oct 1990
|
||
|
||
|
||
Niel Uys
|
||
FidoNet 5:5/200
|
||
|
||
FIDOCON 1990 - ZONE 5
|
||
|
||
Held on 7 September 1990 to 9 September 1990
|
||
|
||
It is with great pleasure, that I will try and give you a
|
||
summary of what actually happened at FidoCon 1990! Yes, you
|
||
would ask, what was the fuzz all about, but let me tell you, it
|
||
was a great thrill to meet and actually see the faces behind the
|
||
messages, that we so often take for granted.
|
||
|
||
First and foremost, I would like to thank Grahamstown, and
|
||
particularly the Rhodes people, for their hospitality, and all
|
||
the arrangements they made, to please all the delegates, that
|
||
attended the convention...the very first held on the African
|
||
continent!
|
||
|
||
At 08:00, we all got registered for the convention, and everybody
|
||
start to take there seats, while the camera-man puts up his video
|
||
equipment to record everything to be said and done.
|
||
|
||
First of all, we had Henk Wolsink, our Zone 5 Coordinator,
|
||
opening the very first convention, in Zone 5. He introduced
|
||
himself, and mentioned the fact that two speakers couldn't make
|
||
it. They were Anthony Walker and Stephan Davies. Fortunately,
|
||
Anthony knew beforehand, that he would probably not make it, and
|
||
made a video tape, for all to watch, during the convention. He
|
||
was also the chairman for the first session till tea time.
|
||
|
||
He then talked a bit about the history of FidoNet, and particular
|
||
, how it started in Southern Africa. He also mentioned how
|
||
FidoNet grew throughout the world, and how it affected sysops in
|
||
Zone 5.
|
||
|
||
Then he introduced the Grand Daddy of FidoNet Zone5, Bryan
|
||
Haefele, who gave a thorough speech about the history of FidoNet
|
||
in the now called Zone 5 area. It is just a pitty that this
|
||
speech was not recorded properly, as the sound of the video
|
||
camera, was not on for this and the next session...but never the
|
||
less, the people that were there, would hopefully not forget the
|
||
history lesson.
|
||
|
||
Pat Terry, better known to his students as Professor Terry, gave
|
||
us a very in depth insight on UFGATE, and how the interfaces
|
||
between UNIX boxes and FidoNet works. He also talked about the
|
||
specific connections between zone 1 and zone 5, where Randy Bush
|
||
was providing the porting of UNIX networks to the zone 1
|
||
zonegate, then sending it to Rhodes, using the normal FidoNet
|
||
dial-up links.
|
||
|
||
FidoNews 7-41 Page 20 8 Oct 1990
|
||
|
||
|
||
Then we had tea...and I got lost while trying to find the lecture
|
||
room again :-)
|
||
|
||
After tea, and discovering that the camera failed to record sound
|
||
of the previous session, Pat Terry, the chairman of the second
|
||
session, introduced Randy Bush, the main speaker of the
|
||
convention.
|
||
|
||
Pat mentioned about his relationship with Randy, and how he got
|
||
stuck into Modula-2, first with the Apple II computers, and
|
||
later the bigger buggers.
|
||
|
||
Randy started off with, a bit of history (again:-) on FidoNet,
|
||
but talked about Tom Jennings, the father of FidoNet, and how
|
||
FidoNet started, with his program called Fido (because it was
|
||
such a dog of a program <grin>). Randy mentioned when he got
|
||
involved, and mentioned Ben Baker, also one of the pioneers of
|
||
the olden days.
|
||
|
||
He talked about how regions, and later zones started all over the
|
||
world, to reduce cost mainly as well as to make distribution more
|
||
effective. Echomail was also mentioned and how the first echo's
|
||
came about.
|
||
|
||
IFNA was also mentioned, and what the reason was, why it was
|
||
started. Echomail wars also started, and IFNA eventually
|
||
collapsed.
|
||
|
||
He then mentioned the fact that many non-clone machines were used
|
||
to port FidoNet software, and those users writing their own
|
||
software, etc.
|
||
|
||
Politics power and policy, is probably one of the biggest
|
||
problems in FidoNet, Randy mentioned. Zone 5 will have to get
|
||
more countries connected, so as to change perspective of the rest
|
||
of the FidoNet world.
|
||
|
||
He talked about all the various zones, and how they operated.
|
||
Also the fact that zone 3 will split up in to zone 3 and 6 in a
|
||
friendly manner, also to concentrate the mail links, etc. Zone 4
|
||
has a big problem financially, while zone 2 seems the most
|
||
organised.
|
||
|
||
He then also talked about various other networks, and the fact
|
||
that FidoNet addressing, were not very intelligent, compared to
|
||
UUCP, etc. For instance, sending a message to
|
||
USA.ORIGON.PORTLAND.RANDY would make more sense, than sending
|
||
it to 1:105/42! This makes sense to me, but might not to others,
|
||
etc.
|
||
|
||
Bitnet, was for instance based on the IBM proprietary protocols,
|
||
using 7 bit data bytes, etc. USENET is not a network, and all
|
||
networks receiving USENET news files, actually belongs to USENET,
|
||
like FidoNet!
|
||
|
||
FidoNews 7-41 Page 21 8 Oct 1990
|
||
|
||
|
||
Internet was also discussed, and RFC's a bit explained, as well
|
||
as the current FTS documents, which are to become RFC's
|
||
eventually.
|
||
|
||
Vic Shaw, of the FRD, was then summoned to give his talk on
|
||
Uninet. He explained, that the relation between Uninet and
|
||
Fidonet was excellent. Uninet's mission is to, development,
|
||
implementation and promotion of an academic and research computer
|
||
network in Southern Africa. This means, that it's intended for
|
||
use by Universities, and higher education institutions, etc.
|
||
This network, is of course sponsored by the FRD (Federation for
|
||
Research and Development).
|
||
|
||
He then gave credit to FidoNet, which made UNINET into what it is
|
||
today, although, FidoNet (Zone 5) got quite a few benefits,
|
||
financially, from Uninet as well.
|
||
|
||
Anthony Walker's tape was then played, where he gave us a chat
|
||
about his COMNET system, and how it is interfaced with BELTEL,
|
||
the local prestel dailup system, operated by the P&T.
|
||
|
||
We all, then partook in a general discussion, about FidoNet in
|
||
general, and ways and means in expanding FidoNet, to the lower
|
||
levels, like schools, etc.
|
||
|
||
Lunch was then served at the 1820 Settlers Monument building.
|
||
|
||
The Chairman for the afternoon, was Dave Pedler, who is the
|
||
region 49 Coordinator. He introduced himself, and talked about
|
||
how zone 5's *C sysops were elected and appointed, when Zone 5
|
||
got off the ground in September 1989, etc.
|
||
|
||
Henk Wolsink, our Zone 5 Coordinator, was then called to give his
|
||
talk about Zone 5, and how it started, etc. The discussion then
|
||
also turned to why and when points and super users (users using
|
||
Silver Xpress or XRS) are used, the pros and cons thereof.
|
||
|
||
I then stepped in to give a chat on how echomail links are
|
||
connected throughout Zone 5 and the rest of the world. We also
|
||
discussed a bit of history on Zone 5, and what made echomail to
|
||
be 'magic'.
|
||
|
||
All Zone 5 *C sysops then gathered at the Hotel (Not to drink
|
||
:-), but to discuss various aspects of the network, mostly
|
||
difficult to sort out over the network itself.
|
||
|
||
1. We basically decided that Henk should keep on being the ZC
|
||
for Zone 5 for another year, unless someone has a complaint
|
||
about him:-)
|
||
|
||
2. We also decided, not to allow a Beltel gateway for FidoNet,
|
||
FidoNews 7-41 Page 22 8 Oct 1990
|
||
|
||
|
||
unless it is going to be READ-ONLY on the BELTEL side.
|
||
|
||
3. Changing of echo tags like ECHOMAIL, which was always
|
||
confusing to users.
|
||
|
||
4. We also decided to follow Randy Bush's advice in changing
|
||
pick-up and poll times for echomail, excluding the zonegate.
|
||
This will have a drastic effect on the turnaround time of
|
||
all echomail in Zone 5.
|
||
|
||
We then drank ourselves, under the table, while the other crowed
|
||
looked at the Rhodes computer equipment, until the dinner in the
|
||
same Hotel. No, not really, we just sat there waiting for them
|
||
:-)
|
||
|
||
And so the day came to a halt? No, we still had a very nice
|
||
dinner, and it carried on till very late. We had some photo
|
||
sessions, we even had food! Very nice too, although, I can't
|
||
remember what we ate, as it was more interesting to chat to each
|
||
other, about...PC's and computers and FidoNet and BBS's...what
|
||
else? :-)
|
||
|
||
Anyway, to rap it up, I personally think it was a great success,
|
||
and I would like to thank each and everyone, attending FidoCon
|
||
1990. I sure hope to see you all, and many more, with the next
|
||
FidoCon.
|
||
|
||
Also great thanks to Rhodes, for hosting the convention, and for
|
||
the FRD, who sponsored Randy's visit to our Zone. Also many
|
||
thanks to Randy to take the trouble in getting the FidoCon...
|
||
great to have had you here, Randy!
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 23 8 Oct 1990
|
||
|
||
|
||
C.Lee Duckert & Bruce A. Casner
|
||
FidoNet 1:139/600
|
||
|
||
HOMESCHOOL - WHO WOULD DO THAT!
|
||
|
||
A Home Schooling Echo Conference (HOMESCHL) is available on the
|
||
backbone. There are many reasons for educating children at home.
|
||
In fact, there are more reasons for educating children at home
|
||
than there are parents.
|
||
|
||
Who teaches their children at home? There are families who
|
||
travel or are living overseas. Some think there is too much or
|
||
too little religion in the public schools. Some live too far out
|
||
even for school buses to reach them. Still others think that
|
||
learning and education are two separate activities. Large
|
||
families, families with an only child, single parents, the rich,
|
||
the poor, professors and high school drop-outs, atheists and fun-
|
||
damentalists, capitalists and socialists --- the only things
|
||
homeschoolers seem to have in common is a particularly strong
|
||
(but varying) view of the importance of their families and a com-
|
||
mitment to that oldest form of education - learning at home.
|
||
|
||
The laws regarding home schooling vary from state to state and
|
||
are always changing. Basically, it is legal. Some localities
|
||
require curriculum plans filed with school boards and overseen by
|
||
certified teachers. Others only require an attendance sheet
|
||
(after all, only school attendance is mandated). Alaska provides
|
||
home schools with materials and California provides assistance
|
||
from the local school district; but in most states, you are on
|
||
your own. Some states require testing or external evaluations.
|
||
Children who re-enter traditional schools have been doing quite
|
||
well.
|
||
|
||
This echo is available for all who wish to share ideas, support
|
||
one another, ask questions and answer them, adults and
|
||
"students". Child development issues, curricula and methods of
|
||
dealing with the legal requirements from state to state have all
|
||
come up for discussion. (Arguments about religion, politics not
|
||
relating to homeschool issues or the role of public education
|
||
already have their own echoes and need not call in here.) If you
|
||
have a child, may some day have a child, know a child or were a
|
||
child and ever learned or wished to learn anything, homeschooling
|
||
might interest you.
|
||
|
||
There have been several local echoes across the country dealing
|
||
with home schools and we are trying to unite them. Voice mes-
|
||
sages can reach us in the evening (Central Time) at (414)722-
|
||
4046.
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 24 8 Oct 1990
|
||
|
||
|
||
Rob Duff
|
||
FidoNet 1:153/713
|
||
Loglan Language, Loglan Echo
|
||
|
||
I recently became involved with learning the Loglan language
|
||
and I decided to support the Loglan Institute by submitting an
|
||
article about the language in FIDONEWS. James Cooke Brown, the
|
||
creator of Loglan has given me permission to upload the
|
||
following article. I have also created a one node ECHO for "lo
|
||
logli" (loglan people) called as you probably guessed LOGLAN. It
|
||
is available at 1:153/713.
|
||
|
||
I first heard of Loglan in R.A.Heinlein's book "The Moon Is
|
||
A Harsh Mistress". When I saw their advertisement in Scientific
|
||
American magazine, I immediately called the Institute and asked
|
||
for a price list. When the list came I sent away for just about
|
||
everything. I am now in the process of learning the language.
|
||
|
||
If you are interested in Loglan, please contact me or the
|
||
Institute.
|
||
|
||
Rob Duff 1:153/713
|
||
|
||
What is Loglan?[1]
|
||
|
||
Loglan[2] is a speakable, human language originally designed
|
||
to serve as a test of the Sapir-Whorf hypothesis that the
|
||
structure of local human languages places local constraints on
|
||
the development of human thought, and hence, on human cultures.
|
||
If this hypothesis is correct, a language which "lifted" those
|
||
constraints--that is to say, which reduced them to some formal
|
||
minimum--should in a certain sense "release" the human mind from
|
||
these ancient linguistic bonds and, in any case, have notable
|
||
effects on both individual thinking and on the development of a
|
||
global human culture.
|
||
|
||
Since its original development in the late 1950's and 1960's
|
||
Loglan has acquired certain other properties that make it
|
||
interesting to computer science, principally (1) its total
|
||
freedom from syntactic ambiguity. This feature of the language,
|
||
together with with (2) its audio-visual "isomorphism" (which
|
||
means that the Loglan speechstream breaks up automatically into
|
||
fully punctuated strings of separate words) and (3) its
|
||
borrowing algorithm (by which the International Scientific
|
||
Vocabulary goes into Loglan virtually ad libitum) makes it an
|
||
ideal medium for three uses: (i) for international information
|
||
storage and retrieval, (ii) for machine-aided translation
|
||
between natural languages, and (iii) for spontaneous
|
||
interaction between computer-users and their machines. Finally,
|
||
Loglan is (4) culturally and politically neutral in the sense
|
||
that its basic predicate vocabulary has been engineered to be
|
||
maximally memorable to speakers of the eight most widely spoken
|
||
languages: English, Chinese, Hindi, Russian, Spanish, French,
|
||
Japanese and German.
|
||
|
||
FidoNews 7-41 Page 25 8 Oct 1990
|
||
|
||
|
||
All these features taken together have suggested to many
|
||
loglanists that their adopted language is ideally suited to
|
||
become a second language for the world. For others, conducting a
|
||
scientific test of the Whorf hypothesis with Loglan has the
|
||
highest priority. For still others, its use at the
|
||
human/machine interface is the most challenging role for Loglan
|
||
in the years ahead.
|
||
|
||
[1] Reprinted with permission
|
||
[2] Loglan is a registered trademark of
|
||
The Loglan Institute, Inc.
|
||
|
||
|
||
Books, software, tapes, membership in the institute,
|
||
and other items are available from:
|
||
|
||
The Loglan Institute, Inc.
|
||
A Non-Profit Research Corporation
|
||
1701 Northeast 75th Street
|
||
Gainesville FL 32601
|
||
U.S.A
|
||
(904) 371-9574
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 26 8 Oct 1990
|
||
|
||
|
||
Ralph Merritt
|
||
1:269/102
|
||
Tom Heffernan
|
||
1:107/554
|
||
|
||
On October 27, 1989, a new, MacIntosh oriented network was
|
||
formed. Named the 'MacIntosh Alternative Connection List',
|
||
MACLIST was established in the last remaining single-digit
|
||
Zone address, Zone 6.
|
||
|
||
The current MACLIST nodelist is available to all interested.
|
||
Just file request 'MACLIST.ARC' from 1:107/554 or 1:269/102.
|
||
|
||
Why was MACLIST formed? There are several reasons we decided
|
||
to form the MacIntosh Alternative Connection List. Here are
|
||
some that inspired us to form MACLIST:
|
||
|
||
o The MacIntosh is rapidly entering the world of computer
|
||
networking. MacIntoshes are located in many different
|
||
networks, but how to find them? The MACLIST nodelist
|
||
is a centralized source for you to communicate with
|
||
other MacIntoshes - simply compile the MACLIST nodelist!
|
||
|
||
o The MacIntosh community has many unique aspects. The
|
||
MACLIST is a network for Mac sysops, and their users,
|
||
to join together and address MacIntosh issues that
|
||
affect us all, examine the technology, discuss topics
|
||
and disseminate information of interest to the
|
||
MacIntosh community.
|
||
|
||
o Need a MacIntosh echo connection? Files? Looking for
|
||
'Mac compatibility' (SEAlink transfer protocols and
|
||
WaZOO FREQs)? Check MACLIST for a system near you ...
|
||
the MacIntosh Alternative Connection, an independent
|
||
network on the move.
|
||
|
||
If you are running a MacIntosh system, or a system dedicated
|
||
to MacIntosh users (the MACLIST is not necessarily composed
|
||
100% of systems that are physically running on MacIntoshes,
|
||
but a member must have a system dedicated/oriented to the
|
||
MacIntosh user), and are interested in joining the MACLIST,
|
||
please contact one of us at our addresses listed below!
|
||
|
||
If you are interested in MACLIST, you might want to get a
|
||
MACSYSOP feed to keep in touch with other Mac sysops. In
|
||
the summer of 1990, MACSYSOP was added to the "Fidonet
|
||
Backbone", so it should be available in your local network.
|
||
If it is not, please contact one of us below and we'll help
|
||
you locate a source. You do not have to carry MACSYSOP to
|
||
be a member in MACLIST.
|
||
|
||
FidoNews 7-41 Page 27 8 Oct 1990
|
||
|
||
|
||
Here are our answers to some of the questions we have been
|
||
receiving:
|
||
|
||
Q: Why did you chose Zone 6 for MACLIST?
|
||
A: The Tabby mailer for the MacIntosh does not have the
|
||
capability to use two-digit zone addresses. We therefore
|
||
do not have a choice in Zone selection. Zone 6 is the
|
||
last remaining unoccupied single-digit Zone address, and
|
||
we do not wish to intrude on another network's Zone or
|
||
encounter the technical problems associated with a
|
||
'shared Zone'. It is our hope that 'Other Nets' will
|
||
respect our position and recognize why MACLIST is
|
||
occupying Zone 6. After Tabby 3.0 is released September
|
||
30th, 1990 and is being generally used, we will move to
|
||
another Zone as Tabby 3.0 supports zones up to 32767.
|
||
|
||
Q: What do I have to do to become a member of MACLIST?
|
||
A: Run a BBS/system that caters to the MacIntosh community
|
||
and is accessable via some form of mailer that is FTSC
|
||
compatible. It does NOT matter what hardware or software
|
||
you use as long as you support the Mac. Just send a
|
||
message to one of us at the addresses listed below.
|
||
|
||
Q: Is membership in MACLIST free?
|
||
A: Yes.
|
||
|
||
Q: If I do not join MACLIST will it be hard for me to get
|
||
some Mac echoes?
|
||
A: MACLIST does not have any echoes based in it. In other
|
||
words NOT being a member of MACLIST will NEVER stop you
|
||
from getting an echo. We believe that the MACLIST will
|
||
actually ASSIST you in finding systems that carry any or
|
||
all of the MANY currently existing MacIntosh echos.
|
||
|
||
Q: Will I have to use my MACLIST node number?
|
||
A: MACLIST is NOT a 'replacement' for other networks. You
|
||
do not have to use your MACLIST node number as a primary
|
||
node address. It does not have to even appear in your
|
||
origin line. As a matter of fact, you must have a
|
||
"primary" address in some other network (such as Fidonet
|
||
or Alternet) before joining MACLIST. You might want to
|
||
make MACLIST an AKA on your system.
|
||
|
||
Q: Will joining this network cause problems for me in any
|
||
other networks?
|
||
A: It should not, as there have been software and hardware
|
||
specific Networks for a long time with no problem, with
|
||
participants in multiple networks. DOS-based boards
|
||
have been using nets like this all along (for example,
|
||
PNET, QNET, RBBS-Net). Each is means of communication
|
||
and support for a particular interest group, just as
|
||
FidoNews 7-41 Page 28 8 Oct 1990
|
||
|
||
|
||
MACLIST is oriented to the MacIntosh community.
|
||
|
||
Q: Why have you added the MACSYSOP echo to the "Fidonet
|
||
Backbone" after so many months of successful distribution
|
||
off the backbone?
|
||
A: At the time MACLIST was formed in October of 1989, we chose
|
||
the MACSYSOP Echo rather than some other echo because at
|
||
the time MACSYSOP was not a Fidonet, Alternet (or any other
|
||
net) echo. After many requests by various Mac sysops, we
|
||
placed it on the backbone to make it more available to those
|
||
that wanted a link.
|
||
|
||
Looking forward to bringing the MacIntosh community
|
||
together,
|
||
|
||
Tom Heffernan Ralph Merritt
|
||
1:107/554, 7:520/554 1:269/102, 7:520/952
|
||
Rock Pile BBS Dragon's Cave BBS
|
||
(201)987-9232 (201)228-4708
|
||
24 Hours/HST 24 Hours/HST
|
||
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 29 8 Oct 1990
|
||
|
||
|
||
Ralph Merritt
|
||
1:269/111
|
||
|
||
OtherNet News - 10/05/90
|
||
|
||
Welcome to the third edition of the OTHERNET nodelist. As you may
|
||
have noted in OTHERNET.271, the 69LIST (Adult Links, Zone 69) and
|
||
OPCNLIST (Official Public Computer Network, Zone 11 segment) node-
|
||
lists were deleted from the OTHERNET Nodelist. GhotiNet (Zones
|
||
60-61) will not be included due to a request for permission for
|
||
inclusion being denied.
|
||
|
||
OtherNets will be added to OTHERNET.xxx on an on-going basis only
|
||
if permission is formally granted. Permission to continue to
|
||
include those OtherNets included in OTHERNET.271 will be sought.
|
||
I'm happy to say that as of OTHERNET.278, inclusion of MetroNet
|
||
(Zone 200) has been formally obtained. Thanks and hats off to
|
||
Jason Steck (MetroNet ZC) for his support and participation! ;-)
|
||
|
||
If it turns out that the OTHERNET nodelist is more hassle than it
|
||
is worth, or if someone begins to politicize this nodelist, I'll
|
||
simple pull it out of the public domain and consider it a dead
|
||
project. Hopefully this will not happen, as my netmail area has
|
||
been full of comments and congrats from people who find OTHERNET
|
||
to be very useful. Thanks to all for their supportive comments.
|
||
|
||
The OTHERNETS echo is well under-way, with thirteen systems linked
|
||
into 269/111. Hopefully there will be more interest generated,
|
||
and we can begin to submit the echo to those networks that have
|
||
"backbones" for a wider and more convenient distribution.
|
||
|
||
Thanks to all of you who have been supportive of the OTHERNET
|
||
nodelist, OTHERNETS echo, and have provided me with information
|
||
and nodelists. I appreciate it! We'll all benefit from the info
|
||
that is being shared about OtherNets.
|
||
|
||
Ralph Merritt
|
||
|
||
AKA 6:6001/2
|
||
7:520/953
|
||
8:950/14
|
||
26:1201/103
|
||
50:5013/111
|
||
99:9220/202
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 30 8 Oct 1990
|
||
|
||
|
||
=================================================================
|
||
LATEST VERSIONS
|
||
=================================================================
|
||
|
||
Latest Software Versions
|
||
|
||
MS-DOS Systems
|
||
--------------
|
||
|
||
Bulletin Board Software
|
||
Name Version Name Version Name Version
|
||
|
||
DMG 2.93 Phoenix 1.3 TAG 2.5f*
|
||
Fido 12s+ QuickBBS 2.64 TBBS 2.1
|
||
Lynx 1.30 RBBS 17.3A TComm/TCommNet 3.4
|
||
Kitten 2.16 RBBSmail 17.3B* Telegard 2.5
|
||
Maximus 1.02* RemoteAccess 0.04a* TPBoard 6.1
|
||
Opus 1.13+ SLBBS 1.77* Wildcat! 2.15
|
||
PCBoard 14.5* Socrates 1.00 XBBS 1.13
|
||
|
||
Network Node List Other
|
||
Mailers Version Utilities Version Utilities Version
|
||
|
||
BinkleyTerm 2.40* EditNL 4.00 ARC 7.0*
|
||
D'Bridge 1.30 MakeNL 2.20 ARCAsim 2.30
|
||
Dutchie 2.90C ParseList 1.30 ARCmail 2.07
|
||
FrontDoor 1.99c* Prune 1.40 ConfMail 4.00
|
||
PRENM 1.47 SysNL 3.11 Crossnet v1.5
|
||
SEAdog 4.51b XlatList 2.90 EMM 2.02
|
||
TIMS 1.0(Mod8)* XlaxDiff 2.35* Gmail 2.05
|
||
XlaxNode 2.35* GROUP 2.16
|
||
GUS 1.30
|
||
InterPCB 1.31*
|
||
LHARC 1.13
|
||
MSG 4.1
|
||
MSGED 2.00*
|
||
MSGTOSS 1.3*
|
||
PK[UN]ZIP 1.10
|
||
QM 1.0
|
||
QSORT 4.03
|
||
Sirius 1.0x
|
||
SLMAIL 1.36*
|
||
StarLink 1.01
|
||
TagMail 2.20
|
||
TCOMMail 2.2
|
||
Telemail 1.27*
|
||
TMail 1.15
|
||
TPBNetEd 3.2
|
||
TosScan 1.00
|
||
UFGATE 1.03
|
||
XRS 3.40
|
||
FidoNews 7-41 Page 31 8 Oct 1990
|
||
|
||
|
||
ZmailQ 1.12*
|
||
|
||
|
||
OS/2 Systems
|
||
------------
|
||
|
||
Bulletin Board Software Network Mailers Other Utilities
|
||
|
||
Name Version Name Version Name Version
|
||
|
||
Maximus-CBCS 1.02* BinkleyTerm 2.40* Parselst 1.31
|
||
ConfMail 4.00
|
||
VP2 4.07*
|
||
oMMM 1.52
|
||
MsgEd 2.00*
|
||
LH2 0.50
|
||
PK[UN]ZIP 1.02
|
||
ARC2 6.00
|
||
|
||
|
||
Xenix/Unix
|
||
----------
|
||
|
||
BBS Software Mailers Other Utilities
|
||
Name Version Name Version Name Version
|
||
|
||
MaximusCBCS 1.02.Unix.B0 BinkleyTerm 2.30b* Unzip 3.10
|
||
ARC 5.21
|
||
ParseLst 1.30b
|
||
ConfMail 3.31b
|
||
Ommm 1.40b
|
||
Msged 1.99b
|
||
Zoo 2.01
|
||
C-Lharc 1.00
|
||
Omail 1.00b
|
||
|
||
|
||
|
||
Apple CP/M
|
||
----------
|
||
|
||
Bulletin Board Software Network Mailers Other Utilities
|
||
|
||
Name Version Name Version Name Version
|
||
|
||
Daisy v2j Daisy Mailer 0.38 Nodecomp 0.37
|
||
MsgUtil 2.5
|
||
PackUser v4
|
||
Filer v2-D
|
||
UNARC.COM 1.20
|
||
|
||
FidoNews 7-41 Page 32 8 Oct 1990
|
||
|
||
|
||
Macintosh
|
||
---------
|
||
|
||
Bulletin Board Software Network Mailers Other Utilities
|
||
|
||
Name Version Name Version Name Version
|
||
|
||
Red Ryder Host v2.1b10 Tabby 2.2 MacArc 0.04
|
||
Mansion 7.15 Copernicus 1.0d* ArcMac 1.3
|
||
WWIV (Mac) 3.0 StuffIt 1.6b1*
|
||
FBBS 0.91* TImport 1.331
|
||
Hermes 0.88* TExport 1.32
|
||
Timestamp 1.6
|
||
Tset 1.3
|
||
Import 3.2
|
||
Export 3.21
|
||
Sundial 3.2
|
||
PreStamp 3.2
|
||
OriginatorII 2.0
|
||
AreaFix 1.6
|
||
Mantissa 3.21
|
||
Zenith 1.5
|
||
UNZIP 1.02b
|
||
|
||
Amiga
|
||
-----
|
||
|
||
Bulletin Board Software Network Mailers Other Utilities
|
||
|
||
Name Version Name Version Name Version
|
||
|
||
Paragon 2.06+ BinkleyTerm 1.00 AmigArc 0.23
|
||
TrapDoor 1.50* AReceipt 1.5*
|
||
WelMat 0.42 booz 1.01
|
||
ConfMail 1.10
|
||
ChameleonEdit 0.10
|
||
ElectricHerald1.66*
|
||
Lharc 1.10
|
||
MessageFilter 1.52*
|
||
oMMM 1.49b
|
||
ParseLst 1.30
|
||
PkAX 1.00
|
||
PK[UN]ZIP 1.01
|
||
PolyxAmy 2.02*
|
||
RMB 1.30
|
||
TrapList 1.12*
|
||
UNzip 0.86
|
||
Yuck! 1.61*
|
||
Zoo 2.00
|
||
|
||
Atari ST
|
||
FidoNews 7-41 Page 33 8 Oct 1990
|
||
|
||
|
||
--------
|
||
|
||
Bulletin Board Software Network Mailer Other Utilities
|
||
|
||
Name Version Name Version Name Version
|
||
|
||
FIDOdoor/ST 1.5c* BinkleyTerm 2.40* ConfMail 1.00
|
||
Pandora BBS 2.41c The BOX 1.20 ParseList 1.30
|
||
QuickBBS/ST 0.40 ARC 6.02
|
||
GS Point 0.61 FiFo 2.0b*
|
||
LHARC 0.60
|
||
Lharc 1.13
|
||
LED ST 0.10*
|
||
BYE 0.25*
|
||
PKUNZIP 1.10
|
||
MSGED 1.96S
|
||
SRENUM 6.2
|
||
Trenum 0.10
|
||
OMMM 1.40
|
||
|
||
|
||
Archimedes
|
||
----------
|
||
|
||
BBS Software Mailers Utilities
|
||
Name Version Name Version Name Version
|
||
|
||
ARCbbs 1.44* BinkleyTerm 2.03* Unzip 2.1TH
|
||
ARC 1.03
|
||
!Spark 2.00d*
|
||
|
||
ParseLst 1.30
|
||
BatchPacker 1.00*
|
||
|
||
|
||
+ Netmail capable (does not require additional mailer software)
|
||
* Recently changed
|
||
|
||
Utility authors: Please help keep this list up to date by
|
||
reporting new versions to 1:1/1. It is not our intent to list
|
||
all utilities here, only those which verge on necessity.
|
||
|
||
-----------------------------------------------------------------
|
||
FidoNews 7-41 Page 34 8 Oct 1990
|
||
|
||
|
||
=================================================================
|
||
NOTICES
|
||
=================================================================
|
||
|
||
The Interrupt Stack
|
||
|
||
|
||
4 Nov 1990
|
||
Area Code 214 fragments. Part will become area code 903.
|
||
|
||
6 Nov 1990
|
||
First anniversary of Van Diepen Automatiseert, 2:500/28
|
||
|
||
13 Nov 1990
|
||
Third anniversary of Fidonet in Austria (zone 2, region 31).
|
||
|
||
14 Nov 1990
|
||
Marco Maccaferri's 21rd Birthday. Send greetings to him at
|
||
2:332/16.0
|
||
|
||
1 Jan 1991
|
||
Implementation of 7% Goods and Services Tax in Canada. Contact
|
||
Joe Lindstrom at 1:134/55 for a more colorful description.
|
||
|
||
16 Feb 1991
|
||
Fifth anniversary of the introduction of Echomail, by Jeff Rush.
|
||
|
||
8 Sep 1991
|
||
25th anniversary of first airing of Star Trek on NBC!
|
||
|
||
7 Oct 1991
|
||
Area code 415 fragments. Alameda and Contra Costa Counties
|
||
will begin using area code 510. This includes Oakland,
|
||
Concord, Berkeley and Hayward. San Francisco, San Mateo,
|
||
Marin, parts of Santa Clara County, and the San Francisco Bay
|
||
Islands will retain area code 415.
|
||
|
||
1 Feb 1992
|
||
Area code 213 fragments. Western, coastal, southern and
|
||
eastern portions of Los Angeles County will begin using area
|
||
code 310. This includes Los Angeles International Airport,
|
||
West Los Angeles, San Pedro and Whittier. Downtown Los
|
||
Angeles and surrounding communities (such as Hollywood and
|
||
Montebello) will retain area code 213.
|
||
|
||
1 Dec 1993
|
||
Tenth anniversary of Fido Version 1 release.
|
||
|
||
5 Jun 1997
|
||
David Dodell's 40th Birthday
|
||
|
||
FidoNews 7-41 Page 35 8 Oct 1990
|
||
|
||
|
||
If you have something which you would like to see on this
|
||
calendar, please send a message to FidoNet node 1:1/1.
|
||
|
||
-----------------------------------------------------------------
|
||
|
||
|