2021-04-15 13:31:59 -05:00

1141 lines
51 KiB
Plaintext
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

Volume 8, Number 2 14 January 1991
+---------------------------------------------------------------+
| _ |
| / \ |
| /|oo \ |
| - FidoNews - (_| /_) |
| _`@/_ \ _ |
| FidoNet (r) | | \ \\ |
| International BBS Network | (*) | \ )) |
| Newsletter ______ |__U__| / \// |
| / FIDO \ _//|| _\ / |
| (________) (_/(_|(____/ |
| (jm) |
+---------------------------------------------------------------+
Editor in Chief: Vince Perriello
Editors Emeritii: Thom Henderson, Dale Lovell
Chief Procrastinator Emeritus: Tom Jennings
Copyright 1991, Fido Software. All rights reserved. Duplication
and/or distribution permitted for noncommercial purposes only.
For use in other circumstances, please contact Fido Software.
FidoNews is published weekly by and for the Members of the
FidoNet (r) International Amateur Electronic Mail System. It is
a compilation of individual articles contributed by their authors
or authorized agents of the authors. The contribution of articles
to this compilation does not diminish the rights of the authors.
You are encouraged to submit articles for publication in
FidoNews. Article submission standards are contained in the file
ARTSPEC.DOC, available from node 1:1/1. 1:1/1 is a Continuous
Mail system, available for network mail 24 hours a day.
Fido and FidoNet are registered trademarks of Tom Jennings of
Fido Software, Box 77731, San Francisco CA 94107, USA and are
used with permission.
Opinions expressed in FidoNews articles are those of the authors
and are not necessarily those of the Editor or of Fido Software.
Most articles are unsolicited. Our policy is to publish every
responsible submission received.
Table of Contents
1. EDITORIAL ................................................ 1
As we rush towards war ................................... 1
2. ARTICLES ................................................. 4
THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY ..... 4
Is there interest in a FORTRAN Echo? ..................... 15
3. LATEST VERSIONS .......................................... 16
Latest Software Versions ................................. 16
4. NOTICES .................................................. 21
SEEKING HEALTHCARE BBS/ECHO INFORMATION .................. 21
The Interrupt Stack ...................................... 21
FidoNews 8-02 Page 1 14 Jan 1991
=================================================================
EDITORIAL
=================================================================
Vince Perriello
1:132/491@fidonet or Vince_Perriello@f491.n132.z1.fidonet.org
[After I wrote this, I called a close friend and read it to him.
He suggested to me that printing this would most likely cause a
flood of articles that have nothing to do with FidoNet to appear
on my doorstep. Perhaps. But frankly, my dear, I don't give a
Saddam. I feel that something needs to be said. NOW.]
I was just barely young enough to avoid Vietnam. In fact, I was
part of the last crop of young men to even face a draft lottery
in the United States. My number was 361. Fairly lucky, by the
standards of the day.
Today, I am just barely too old to even enlist in the American
armed services. Not that I am in such a hurry to do so. I am
overweight, lazy and overpaid -- and in no mood for a 180 degree
change in my lifestyle.
Yup, I'm your prototypical worthless, self-centered American.
Many non-Americans seem to think that all Americans are just
like me. And that our excessive zeal to protect every individual
from harm and to go the extra mile to avoid bloodshed is proof
that Americans are too soft and weak to face tough decisions.
The problem with these characterizations is, as usual, a matter
of lack of understanding.
You see, I am a product of a culture that encourages people to do
whatever they do best because at the end of the day, everything
will get done --- and done better --- that way. This system has
made the United States a great power in this world, more so than
nations with greater landmass and/or population. So there. The
fact that I don't want to be a soldier, and that this is
considered an acceptable attitude, isn't a weakness in our
system, it represents its greatest strength.
Perhaps Americans are too careful to avoid bloodshed. But why
should anyone be careless with the lives of others? The cavalier
attitude of many people towards their own compatriots is not a
sign of strength, it is one of stupidity. Just as our attitude
is not a sign of weakness. There are more than sufficient cases
in the history of the United States, both recent and past, to
suggest otherwise.
All of that having been said -- I don't understand a few things.
FidoNews 8-02 Page 2 14 Jan 1991
I don't understand why the leadership of Israel is unable to walk
a mile in the shoes of Palestinians, recognize the parallels to
their own experience, and find a way to address their legitimate
security concerns while also finally putting that issue to rest.
I don't understand why the entire international community was so
willing to look the other way for so long while Saddam Hussein
was running his number against Iranians and Kurds. Why they sold
him everything he needed to build these awful weapons they now
decry. Why the United States ambassador in effect told him it
was OK with us if he violated the Kuwaiti borders. Why it
suddenly became a new Holocaust once Kuwait was conquered and
the Iraqis behaved in the same cruel and inhuman manner that had
characterized their handling of their internal Kurd rebellion
and the Iran-Iraq war.
I don't understand why Saddam Hussein wants to rule the entire
Arab world. Besides controlling the price of over half the
proven oil reserves worldwide, I can't think of a reason why.
Unless he likes big sandboxes and has an affinity for camels. (I
DO think I understand why he invaded Kuwait. What a neat way to
cancel your debts!)
I don't understand why the United States is committing so many
resources to stopping this man while many nations with much
better cash flow situations, and arguably a higher stake in
seeing him stopped, are sitting it out. Japan bought MCA with
the amount of money the United States is spending every six
weeks just protecting THEIR oil supply. But the amount of money
they have promised in support of the embargo is a very small
percentage of that figure, and almost none of THAT money has yet
to leave the coffers of our great ally. Germany has been real
forthcoming too. I think that "Fahrvergnugen" must mean
something like "let the other guy get knocked on the head, I'm
outta here." Will the U.S. ultimately sell Paramount to Japan in
order to be able to afford to protect Japanese interests? Will
we sell AT&T to Germany so we have the wherewithal to ensure
sufficient gasoline for their no-speed-limit Autobahns? Are we
out of our ever-loving MINDS?
I don't understand why President Bush decided to make war so
close to inevitable. I think his November 8 move to increase the
American presence in Saudi Arabia was exactly the wrong move.
That a policy of increasing the percentage of non American
personnel, particularly Arabs, while keeping the total strength
at a level sufficient to deter aggression against Saudi Arabia,
could have ultimately led to some kind of solution. There are
lots of little Arabs who have access to Saddam and could have
made themselves slightly bigger Arabs by leading us to a
solution. Now it's probably too late. I wish the American
soldiers all the best. I hope that they are able to accomplish
whatever mission they are finally given without too many losses
on either side.
FidoNews 8-02 Page 3 14 Jan 1991
I don't understand why Gorbachev is recreating Hungary '56 and
Czechoslovakia '68 in Lithuania. Is this the guy whose government
has been saying such bad things about Stalin and Brezhnev? The
winner of the Nobel Peace Prize? I shudder to think who might
have come in second (nahhh! Not Saddam!)
I don't understand Communist China. Period.
I don't understand why so many people must die to end war. Is
it possible that all people must die to end war? I sure hope not.
That way lies madness.
-----------------------------------------------------------------
FidoNews 8-02 Page 4 14 Jan 1991
=================================================================
ARTICLES
=================================================================
(submitted by Tom Jennings, fidonet 1:125/111
uucp ...hoptoad!kumr!anomaly!tom.jennings)
Pursuing Policies for the Information Age in the
Bicentennial Year of the Bill of Rights
Tutorials & Invitational Conference, Limited to 600 Participants
Monday-Thursday, March 25-28, 1991
Airport SFO Marriott Hotel, Burlingame, California (San Francisco
Peninsula)
Co-sponsors & cooperating organizations include
Institute of Electrical and Electronics Engineers-USA
Association for Computing Machinery
Electronic Networking Association
Electronic Frontier Foundation
Videotex Industry Association
Cato Institute
American Civil Liberties Union
ACM Special Interest Group on Software
IEEE-USA Intellectual Property Committee
ACM Special Interest Group on Computers and Society
ACM Committee on Scientific Freedom and Human Rights
IEEE-USA Committee on Communications and Information Policy
Autodesk, Inc.
The WELL
Portal Communications
Sponsored by the Computer Professionals for Social Responsibility
A nonprofit educational corporation
(415)322-3778, e-mail: cfp@well.sf.ca.us. fax: (415)851-2814
ABOUT COMPUTERS, FREEDOM & PRIVACY
----------------------------------
We are at a crossroads as individuals, organizations and
governments depend more and more on computers and computer
networks. Within ten years, most global information will be
collected and utilized electronically. The 1990's are the pivotal
decade in which statutes, policies and judicial precedents will
be developed for controlling access, use -- and abuse -- of
computerized information and electronic mail.
FidoNews 8-02 Page 5 14 Jan 1991
Current government and private-sector policies are an
uncoordinated jumble, created as each group evolves ways to
collect, manipulate, extract, share and protect computerized and
networked information and services.
Data on individuals and groups is being computerized by numerous
agencies, organizations and special interests, often without the
knowledge or approval of those it concerns, and with varying
degrees of accuracy.
Computers can greatly assist individuals, organizations and
government in making sound decisions based on efficient access to
adequate information -- for personal benefit, business
improvement and national well-being.
Or, inappropriate use and regulation can seriously threaten
fundamental freedoms, personal privacy, and the democratic
processes that are at the very foundation of this nation and of
any free society.
ABOUT THE CONFERENCE SESSIONS (Tuesday-Thursday, March 26th-28th)
-----------------------------------------------------------------
PLENARY SPEAKERS:
* Laurence H. Tribe, Professor of Constitutional Law, Harvard Law
School, offering major policy proposals in the opening Conference
session, "The Constitution in Cyberspace: Law & Liberty Beyond
the Electronic Frontier".
* Eli M. Noam, Director of the Center for Telecommunications and
Information Studies, Columbia University, and a recognized leader
in telecommunications regulation, international communications
policies and economics, will discuss, "Network Environments of
the Future: Reconciling Free Speech and Freedom of Association."
* William A. Bayse, Assistant Director, FBI Technical Services
Division, Washington DC, providing perspectives on "Balancing
Computer Security Capabilities with Privacy and Integrity" at the
Wednesday evening banquet.
THE CONFERENCE SESSIONS offer diverse speakers & panel
discussions:
Trends in Computers & Networks.
Overview and prognosis of computing capabilities and networking
as they impact personal privacy, confidentiality, security,
one-to-one & many-to-one communications, and access to
information about government, business and
society.
FidoNews 8-02 Page 6 14 Jan 1991
International Perspectives & Impacts.
Other nationsU models for protecting personal information and
communications, and granting access to government information;
existing and developing laws; requirements for trans-national
dataflow and their implications; impacts on personal expression;
accountability.
Personal Information & Privacy.
Government and private collection, sharing, marketing,
verification, use, protection of, access to and responsibility
for personal data, including buying patterns, viewing habits,
lifestyle, work, health, school, census, voter, tax, financial
and consumer information.
Law Enforcement Practices & Problems.
Issues relating to investigation, prosecution, due process and
deterring computer crimes, now and in the future; use of
computers to aid law enforcement.
Law Enforcement & Civil Liberties.
Interaction of computer crime, law enforcement and civil
liberties; issues of search, seizure and sanctions, especially as
applied to shared or networked information, software and
equipment.
Legislation & Regulation.
Legislative and regulatory roles in protecting privacy and
insuring access; legal problems posed by computing and computer
networks; approaches to improving related government processes.
Computer-based Surveillance of Individuals.
Monitoring electronic-mail, public & private teleconferences,
electronic bulletin boards, publications and subscribers;
monitoring individuals, work performance, buying habits and
lifestyles.
Electronic Speech, Press & Assembly.
Freedoms and responsibilities regarding electronic speech,
public and private electronic assembly, electronic publishing,
prior restraint and chilling effects of monitoring.
Access to Government Information.
Implementing individual and corporate access to federal, state &
local information about communities, corporations, legislation,
administration, the courts and public figures; allowing access
while protecting confidentiality.
Ethics & Education.
Ethical principles for individuals, system administrators,
organizations, corporations and government; copying of data,
copying of software, distributing confidential information;
relations to computer education and computer law.
FidoNews 8-02 Page 7 14 Jan 1991
Where Do We Go From Here? [closing session]
Perspectives, recommendations and commitments of participants
from the major interest groups, proposed next steps to protect
personal privacy, protect fundamental freedoms and encourage
responsible policies and action.
Also:
Tuesday and Wednesday will include structured opportunities for
attendees to identify groups with whom they want to establish
contact and, if they wish, announce topics they would like to
discuss, one on one.
ABOUT THIS PREMIER EVENT
------------------------
This is an intensive, multi-disciplinary survey Conference for
those concerned with computing, teleconferencing, electronic
mail, computerized personal information, direct marketing
information, government data, etc. -- and those concerned with
computer-related legislation, regulation, computer security, law
enforcement and national and international policies that impact
civil liberties, responsible exercise of freedom and equitable
protection of privacy in this global Information Age.
For the first time, this four-day invitational event will bring
together representatives from all of these groups and more, all
in one place, all at one time.
Many of the recognized leaders and strongest advocates
representing the various groups having an interest in the issues
of the conference will discuss their concerns and proposals.
A maximum of 600 applicants will be invited to attend. Balanced
representation from the diverse groups interested in these issues
is being encouraged. Please see the enclosed Invitation
Application for details.
To inform participants about topics beyond their specialties,
half-day seminars are scheduled for the first day (Monday, March
25th). These parallel tutorials will explore relevant issues in
computing, networking, civil liberties, regulation, the law and
law enforcement. Each tutorial is designed for those who are
experienced in one area, but are less knowledgeable in the
subject of that tutorial.
To explore the interactions and ramifications of the issues,
conference talks and panel discussions are scheduled for the
remaining three days (Tuesday-Thursday, March 26th-28th). These
will emphasize balanced representation of all major views,
especially including probing questions and discussion.
FidoNews 8-02 Page 8 14 Jan 1991
Explicit Conference events to foster communication across
disciplines are planned. Working luncheons, major breaks and two
evening banquets will further encourage individual and small
group discussions.
ABOUT JUST *SOME* OF THE SPEAKERS IN THE 3-DAY CONFERENCE
---------------------------------------------------------
Ken Allen, Senior Vice President for Governmental Relations,
Information Industries Association (IIA).
Sharon Beckman, civil rights and criminal defense attorney and
Electronic Frontier Foundation litigation counsel, Silverglate &
Good.
Jerry Berman, Director of the ACLU's Project on Information
Technology and Communications Policy Fellow, Benton Foundation.
Paul Bernstein, columnist, Trial magazine; Electronic Bar Assn.
Legal Info. Network administrator; LawMUG BBS sysop; edits on
line lawyers' newsletter.
Sally Bowman, promotes responsible computing practices through
school teaching units; Director, Computer Learning Foundation.
David Burnham, author, *Rise of the Computer State*; former *New
York Times* investigative reporter; specialist in IRS & Freedom
of Information Act.
Mary Culnan, co-authored major credit reporting policies
presented to Congress; School of Business Administration,
Georgetown University.
Peter Denning, Editor, 1990 *Computers Under Attack*; past Pres.,
ACM; founding Director, RIACS; editor, *Communications of the
ACM*.
Dorothy Denning, received Aerospace's 1990 Distinguished Lecturer
in Computer Security award; author, *Cryptography & Data
Security*.
Dave Farber, co-founder, CSNET; member, National Research
Council's Computer Science & Telecommunications Board; University
of Pennsylvania.
Cliff Figallo, Chief Executive Officer and Director of the WELL
(the Whole Earth 'Lectronic Link).
David Flaherty, Canadian surveillance expert, Professor of
History & Law at the University of Western Ontario.
FidoNews 8-02 Page 9 14 Jan 1991
John Ford, Public Relations Director for Equifax, one of the
nation's largest maintainers of information on individuals.
Bob Gellman, Chief Counsel, U.S. House of Representatives
Governmental Information Subcommittee.
Janlori Goldman, Director, ACLU Project on Privacy & Technology,
Washington, DC.
Harry Hammit, Editor, *Access Reports*, focusing on access to
information.
Martin Hellman, identified potential hazards in federal DES
national encryption standard; co-invented public-key encryption;
Stanford University.
Evan Hendricks, Editor & Publisher of *Privacy Times* newsletter.
Lance Hoffman, public policy researcher and Professor of
Electrical Engineering & Computer Science at George Washington
University.
Don Ingraham, wrote the first-ever search warrant for magnetic
media, computer crime prosecutor; Asst. District Attorney,
Alameda County.
Bob Jacobson, former Principal Consultant, Calif. State Assembly
Utilities and Commerce Committee; drafted landmark comp.
communications legislation.
Mitch Kapor, co-founder, Electronic Frontier Foundation; founder,
Lotus Corp.; received DPMA's 1990 Distinguished Information
Science Award.
Tom Mandel, Director of the Leading Edge Values & Lifestyles
Program at SRI International.
John McMullen, well-known on-line journalist; co-authors
"Newsbytes" column on GEnie and Online America.
Peter Neumann, member, National Research Council's 1990
*Computers at Risk* committee; Chair, ACM Comm.on Computers &
Public Policy; hosts RISKS Forum.
Donn Parker, perhaps the best-known international consultant and
author on information security and computer crime, SRI
International.
Ron Plesser, former majority party congressional committee
counsel; privacy expert; attorney, Piper & Marbury.
FidoNews 8-02 Page 10 14 Jan 1991
John Quarterman, author, Digital Press' definitive *The Matrix:
Computer Networks and Conferencing Systems Worldwide*; networking
consultant.
Jack Rickard, Editor of *Boardwatch* magazine, perhaps the best
news source about computer bulletin boards; Online Information
Service.
Tom Riley, Canadian specialist in international computing and
privacy issues; Riley & Associates.
Lance Rose, co-author of *Syslaw*, about the law applied to
on-line situations; attorney, Wallace & Rose.
Marc Rotenberg, expert in federal computer and privacy law;
Computer Professionals for Social Responsibility, Washington
office Director.
Noel Shipman, attorney for plaintiffs in electronic-mail privacy
landmark 1990 litigation against Epson America.
Harvey Silverglate, Electronic Frontier Foundation litigation
counsel, specialist in criminal defense and civil rights,
Silverglate & Good.
Gail Thackeray, computer crime prosecutor; involved in Secret
Service's 1990 "Operation Sun Devil", Arizona Asst. State
Attorney General.
Robert Veeder, Acting Chief, Information Policy Branch, Office of
Information Regulatory Affairs, OMB (Office of Management &
Budget).
Willis Ware, computer security expert; Fellow, RAND Corporation.
Sheldon Zenner, former federal prosecutor in Chicago; defended
*Phrack* electronic publisher, Craig Neidorf; Katten, Muchin &
Zavis.
ABOUT THE LOW-COST TUTORIALS (Monday, March 25th)
-------------------------------------------------
Seminars on the first day offer introductions to the different
disciplines that intersect in this conference. These are surveys
for individuals not already expert in the topics presented.
These half-day tutorials are scheduled in four parallel tracks:
Global Communications & the Worldwide Computer Matrix.
[morning*]
Survey of electronic-mail & teleconferencing services, global
information access, remote services and the matrix of networks.
FidoNews 8-02 Page 11 14 Jan 1991
Low-Cost Computer Networking & Computer Bulletin Board Systems.
[afternoon*]
Reviews e-mail, bulletin board and teleconferencing alternatives
on personal computers; outlines low-cost PC-based networks and
their gateways to the global matrix. -- Mark Graham*, co-founder
of Institute for Global Communications, PeaceNet and EcoNet;
Pandora Systems
Current & Proposed International Policies. [morning*]
Law and regulation that will or may impact trans-border
data-flow and computer communications, impacting U.S. information
practices and international business.
Federal Legislation Impacting Computer Use. [afternoon*]
Detailed review of landmark federal statutes impacting access to
information, privacy of information, computer security and
computer crime. -- Marc Rotenberg*, former congressional counsel
and expert on federal legislation, CPSR, Washington DC.
How Computer Crackers Crack! [morning*]
Suggested by a deputy district attorney specializing in
high-tech crime, this is for law enforcement officials,
prosecutors, systems administrators and Bulletin Board System
(BBS) sysops. -- Russell Brand*, computer security specialist;
programmer with Reasoning Systems, Palo Alto CA.
How Computer Crime is Investigated.
[afternoon*] This reviews investigation, search, seizure and
evidence requirements for pursuing computer crime. It is for
computer users, computer owners, BBS sysops and investigators
unfamiliar with computer crime practices.
Information Security. [afternoon*]
Survey for systems managers of internal and external threats,
security measures, alternatives and other computer and data
security issues. -- Donn Parker*, a leading consultant in
information security and computer crime, SRI International.
* - Lecturers, descriptions and times were confirmed as of
1/8/91, but may be subject to change.
CONFERENCE CHAIR
Jim Warren, Autodesk, Inc. & *MicroTimes*
415-851-7075, jwarren@well.sf.ca.us / e-mail
PROGRAM COMMITTEE
Dorothy Denning, Digital Equipment Corporation
Peter Denning, Research Institute for Advanced Computer Science
Les Earnest, SF Peninsula ACLU & Stanford University, ret.
Elliot Fabric, Attorney at Law
Mark Graham, Pandora Systems
Don Ingraham, Alameda County District AttorneyUs Office
Bruce Koball, Motion West
Marc Rotenberg, Computer Professionals for Social Responsibility
Glenn Tenney, Fantasia Systems & Hacker's Conference
FidoNews 8-02 Page 12 14 Jan 1991
ADVISORS
Ron Anderson, ACM SIGCAS & University of Minnesota
John Perry Barlow, Electronic Frontier Foundation
Jerry Berman, ACLU & Benton Foundation
Dave Caulkins, USSR GlasNet
Vint Cerf, Corporation for National Research Initiatives
Margaret Chambers, Electronic Networking Association
Steve Cisler, Apple Computer, Inc.
Whit Diffie, Northern Telecom
Mary Eisenhart, *MicroTimes*
Dave Farber, University of Pennsylvania
Cliff Figallo, The WELL
John Gilmore, Cygnus Support
Adele Goldberg, ParcPlace Systems
Terry Gross, Rabinowitz, Boudin, Standard, et al
Keith Henson, consultant & Alcor
Lance Hoffman, George Washington University
Dave Hughes, Chariot Communications
Bob Jacobson, Human Interface Technology Laboratory
Mitch Kapor, Electronic Frontier Foundation
Roger Karraker, Santa Rosa College
Tom Mandel, SRI International
John McMullen, NewsBytes
Peter Neumann, SRI International
Dave Redell, Digital Equipment Corporation
Ken Rosenblattt, Santa Clara County District Attorney's Office
Paul Saffo, Institute for the Future
Gail Thackeray, Arizona Attorney GeneralUs Office
Jay Thorwaldson, Palo Alto Medical Foundation
Terry Winograd, CPSR & Stanford University
Sheldon Zenner, Katten, Muchin, & Zavis
Affiliations listed only for identification
============================
= Request for Invitation =
============================
First Conference on Computers, Freedom & Privacy
March 25-28, 1991
Monday: Tutorials, Tuesday-Thursday: Conference Sessions
SFO Marriott Hotel, 1800 Old Bayshore Hwy., Burlingame CA 94010
For hotel reservations at Conference rates, call: (800)228-9290
#3
** Invitational Conference, limted to 600 participants. ** To
facilitate useful dialogue and balanced participation by
representatives from all of the diverse groups interested in
these issues, attendance is limited. (The capacity of the
Conference facility is similarly limited).
All interested individuals are encouraged to request an
invitation. Invitations will be primarily issued on a first-come,
first-served basis within each major interest group.
FidoNews 8-02 Page 13 14 Jan 1991
Fees if payment is received by: Jan.31 -Mar.15 after Mar.15
Tutorials (full day) $ 95 $ 145 $ 195
Conference (3 days) $ 295 $ 350 $ 400
Conference Registration fee includes three luncheons, two banquet
meetings and selected handouts. Please make checks payable to
"Computers, Freedom & Privacy/CPSR". Please don't send cash.
Invitations will be promptly issued, or the uncashed check will
be voided and promptly returned.
Please type or print. Thank ye, kindly.
name:
title:
organization:
mailing address:
city, state ZIP:
phone(s):
fax:
e-mail:
Comments to assist in evaluating this request:
To aid in balancing participation among groups,
please check all significantly applicable items.
[ ] user of computers or computer networking
[ ] user of electronic-mail services
[ ] user of teleconferencing services
[ ] user of direct marketing services
[ ] user of computerized personal information
[ ] user of government information
[ ] computer professional
[ ] BBS sysop (bulletin board system operator)
[ ] systems administrator / infosystems manager
[ ] network administrator
[ ] computer / communications security specialist
[ ] provider of data communications services
[ ] provider of electronic-mail services
[ ] provider of teleconferencing services
[ ] provider of direct marketing services
[ ] provider of computerized personal information
[ ] provider of government information
[ ] legislative official [ ] federal [ ] state
[ ] regulatory official or staff [ ] federal [ ] state
[ ] law enforcement offi [ ] federal [ ] state [ ] local
[ ] prosecutor [ ] federal [ ] state [ ] local
[ ] judicial representat [ ] federal [ ] state [ ] local
[ ] criminal defense attorney
[ ] corporate or litigation attorney
[ ] civil liberties specialist
[ ] journalist [ ] newspaper [ ] television [ ] radio [ ] other
[ ] other:
[ ] other:
<<1/7/91>>
FidoNews 8-02 Page 14 14 Jan 1991
Please mail form and payment to:
CFP Conference, 345 Swett Road, Woodside CA 94062
Privacy Notice: This information will not be sold, rented,
loaned, exchanged or used for any purpose other than official
CPSR activity. CPSR may elect to send information about other
activities, but such mailings will always originate with CPSR.
Sponsor: Computer Professionals for Social Responsibility,
(415)322-3778 A nonprofit, educational corporation [ Internal
Revenue Code 501(c)(3) ]
e-mail: cfp@well.sf.ca.us; fax: (415)851-2814
Chair: Jim Warren, (415)851-7075
Please copy, post & circulate!
-----------------------------------------------------------------
FidoNews 8-02 Page 15 14 Jan 1991
Fred Niemczenia
FidoNet 1:371/7
Is There Interest in a FORTRAN Echo?
For the past year I've browsing through the various Programming
Echos to learn the gimmicks of the various languages we use.
I've found echos for C, PASCAL, and BASIC, just to name a few.
What appears to be missing is the grandaddy of them all; I
haven't found a single echo for FORTRAN.
Consider this a sort of lonely hearts' club search. What I'm
asking you to do, is ask YOUR users if there is an interest in
starting a national FORTRAN echo.
Please don't think that I'm trying to sell you the Fortran
language. What I am pushing for is a echo for programmers to
communicate. In the late 1940's and early 1950's, a need arose
for a high level language which would allow scientists and
engineers to code mathematical procedures. Prior to this point,
one had to learn assembly to access that new-fangled contraption
(the electronic digital computer). What caught on was Fortran.
Current estimates indicate that some 60 percent of scientific
software is still in Fortran. I'm talking major mainframes. The
software has to maintained, and periodically ported over to new
machines. There are four major companies that produce compilers
for the PC family of computers right now. I think there is a
need for a meeting place.
Please ask your users if they're interested. I'd sure prefer
visiting my favorite BBS for a Fortran question, than paying $$$
to visit the Microsoft Forum on CompuServe.
Please address all replies to Fred Niemczenia at 1:371/7 via
Netmail, or EMAIL at CompuServe 76606,2060.
-----------------------------------------------------------------
FidoNews 8-02 Page 16 14 Jan 1991
=================================================================
LATEST VERSIONS
=================================================================
Latest Software Versions
MS-DOS Systems
--------------
Bulletin Board Software
Name Version Name Version Name Version
DMG 2.93 Phoenix 1.3 TAG 2.5g
Fido 12s+ QuickBBS 2.66 TBBS 2.1
GSBBS 3.01 RBBS 17.3A TComm/TCommNet 3.4
Lynx 1.30 RBBSmail 17.3B Telegard 2.5
Kitten 2.16 RemoteAccess 0.04a TPBoard 6.1
Maximus 1.02 SLBBS 1.77A Wildcat! 2.55
Opus 1.14+ Socrates 1.10 WWIV 4.12
PCBoard 14.5 XBBS 1.15
Network Node List Other
Mailers Version Utilities Version Utilities Version
BinkleyTerm 2.40 EditNL 4.00 ARC 7.0
D'Bridge 1.30 MakeNL 2.31 ARCAsim 2.30
Dutchie 2.90C ParseList 1.30 ARCmail 2.07
FrontDoor 1.99c Prune 1.40 ConfMail 4.00
PRENM 1.47 SysNL 3.14 Crossnet v1.5
SEAdog 4.51b XlatList 2.90 DOMAIN 1.42
TIMS 1.0(Mod8) XlaxDiff 2.35 EMM 2.02
XlaxNode 2.35 4Dog/4DMatrix 1.18
Gmail 2.05
GROUP 2.16
GUS 1.30
HeadEdit 1.15
InterPCB 1.31
LHARC 1.13
MSG 4.1
MSGED 2.06
MSGTOSS 1.3
Oliver 1.0a
PK[UN]ZIP 1.10
QM 1.0
QSORT 4.03
Sirius 1.0x
SLMAIL 1.36
StarLink 1.01
TagMail 2.41
TCOMMail 2.2
Telemail 1.27
FidoNews 8-02 Page 17 14 Jan 1991
TMail 1.15
TPBNetEd 3.2
TosScan 1.00
UFGATE 1.03
XRS 4.00*
XST 2.2
ZmailH 1.14
OS/2 Systems
------------
Bulletin Board Software Network Mailers Other Utilities
Name Version Name Version Name Version
Maximus-CBCS 1.02 BinkleyTerm 2.40 Parselst 1.32
ConfMail 4.00
EchoStat 6.0
oMMM 1.52
Omail 3.1
MsgEd 2.06
MsgLink 1.0C
MsgNum 4.14
LH2 0.50
PK[UN]ZIP 1.02
ARC2 6.00
PolyXARC 2.00
Qsort 2.1
Raid 1.0
Remapper 1.2
Tick 2.0
VPurge 2.07
Xenix/Unix
----------
BBS Software Mailers Other Utilities
Name Version Name Version Name Version
BinkleyTerm 2.30b Unzip 3.10
ARC 5.21
ParseLst 1.30b
ConfMail 3.31b
Ommm 1.40b
Msged 1.99b
Zoo 2.01
C-Lharc 1.00
Omail 1.00b
FidoNews 8-02 Page 18 14 Jan 1991
Apple CP/M
----------
Bulletin Board Software Network Mailers Other Utilities
Name Version Name Version Name Version
Daisy v2j Daisy Mailer 0.38 Nodecomp 0.37
MsgUtil 2.5
PackUser v4
Filer v2-D
UNARC.COM 1.20
Macintosh
---------
Bulletin Board Software Network Mailers Other Utilities
Name Version Name Version Name Version
Red Ryder Host 2.1 Tabby 2.2 MacArc 0.04
Mansion 7.15 Copernicus 1.0 ArcMac 1.3
WWIV (Mac) 3.0 LHArc 0.33
Hermes 1.01 StuffIt Classic 1.6
FBBS 0.91 Compactor 1.21
TImport 1.92
TExport 1.92
Timestamp 1.6
Tset 1.3
Import 3.2
Export 3.21
Sundial 3.2
PreStamp 3.2
OriginatorII 2.0
AreaFix 1.6
Mantissa 3.21
Zenith 1.5
Eventmeister 1.0
TSort 1.0
Mehitable 2.0
UNZIP 1.02c
Amiga
-----
Bulletin Board Software Network Mailers Other Utilities
Name Version Name Version Name Version
Paragon 2.082+ BinkleyTerm 1.00 AmigArc 0.23
TransAmiga 1.05 TrapDoor 1.50 AReceipt 1.5
FidoNews 8-02 Page 19 14 Jan 1991
WelMat 0.42 booz 1.01
ConfMail 1.10
ChameleonEdit 0.10
ElectricHerald1.66
Lharc 1.30
MessageFilter 1.52
oMMM 1.49b
ParseLst 1.30
PkAX 1.00
PK[UN]ZIP 1.01
PolyxAmy 2.02
RMB 1.30
RoboWriter 1.02
Skyparse 2.30
TrapList 1.12
Yuck! 1.61
Zippy (Unzip) 1.25
Zoo 2.01
Atari ST
--------
Bulletin Board Network Node List
Software Version Mailer Version Utilities Version
FIDOdoor/ST 2.10* BinkleyTerm 2.40jt* ParseList 1.30
QuickBBS/ST 1.02 The BOX 1.20 Xlist 1.12
Pandora BBS 2.41c EchoFix 1.20
GS Point 0.61
LED ST 1.00
MSGED 1.96S
Archiver Msg Format Other
Utilities Version Converters Version Utilities Version
LHARC 0.60 TB2BINK 1.00 ConfMail 4.02
ARC 6.02 BINK2TB 1.00 ComScan 1.02
PKUNZIP 1.10 FiFo 2.01b Import 1.14
OMMM 1.40
Pack 1.00
FastPack 1.20
FDsysgen 2.15*
FDrenum 2.10*
Trenum 0.10
Archimedes
----------
FidoNews 8-02 Page 20 14 Jan 1991
BBS Software Mailers Utilities
Name Version Name Version Name Version
ARCbbs 1.44 BinkleyTerm 2.03 Unzip 2.1TH
ARC 1.03
!Spark 2.00d
ParseLst 1.30
BatchPacker 1.00
+ Netmail capable (does not require additional mailer software)
* Recently changed
Utility authors: Please help keep this list up to date by
reporting new versions to 1:1/1. It is not our intent to list
all utilities here, only those which verge on necessity.
-----------------------------------------------------------------
FidoNews 8-02 Page 21 14 Jan 1991
=================================================================
NOTICES
=================================================================
asuvax.eas.asu.edu!CompuServe.COM!73230.3514 (Jerry McCarthy)
SEEKING HEALTHCARE BBS/ECHO INFORMATION
The PC Physician Medical Computing Resource Guide, a disk-based
electronic publication, is seeking information about healthcare-
oriented BBS, echos, news groups, discussion groups, and other
electronic publications for its second edition, scheduled for
release in March of this year. For more information, contact:
Jerry McCarthy
Editor
PC Physician MCRG
3300 Mitchell Lane
Suite 390
Boulder, CO 80303
303-443-8085 (voice)
303-443-7653 (FAX)
CIS: 73230,3514
BITNET: MCCARTHY_J@UCOLMCC
The MCRG is inexpensive commercial software ($15 postpaid) which
is not copy protected, but which is produced under a license to
a software company which does not currently allow distribution as
a BBS file. The information MCRG compiles about BBS/echos/news
groups/discussions/publications will, however, be distributed as
a text file as well as part of the MCRG second edition. Interested
individuals should contact Jerry McCarthy for a complementary copy
of MCRG.
-----------------------------------------------------------------
The Interrupt Stack
15 Jan 1991
Deadline for George Bush and Saddam Hussein to find some less
bloody way to assert their manhood. Please pray that Kuwait
may be liberated (and, for that matter, the Palestinian homeland
issue settled at last) without any additional loss of life.
16 Feb 1991
Fifth anniversary of the introduction of Echomail, by Jeff Rush.
30 Mar 1991
FidoNews 8-02 Page 22 14 Jan 1991
Jim Grubs (W8GRT) was issued his first ham radio license forty
years ago today. His first station was made from an ARC-5
"Command Set" removed from a B-17 bomber.
12 May 1991
Fourth anniversary of FidoNet operations in Latin America and
second anniversary of the creation of Zone-4.
8 Sep 1991
25th anniversary of first airing of Star Trek on NBC!
7 Oct 1991
Area code 415 fragments. Alameda and Contra Costa Counties
will begin using area code 510. This includes Oakland,
Concord, Berkeley and Hayward. San Francisco, San Mateo,
Marin, parts of Santa Clara County, and the San Francisco Bay
Islands will retain area code 415.
1 Feb 1992
Area code 213 fragments. Western, coastal, southern and
eastern portions of Los Angeles County will begin using area
code 310. This includes Los Angeles International Airport,
West Los Angeles, San Pedro and Whittier. Downtown Los
Angeles and surrounding communities (such as Hollywood and
Montebello) will retain area code 213.
1 Dec 1993
Tenth anniversary of Fido Version 1 release.
5 Jun 1997
David Dodell's 40th Birthday
If you have something which you would like to see on this
calendar, please send a message to FidoNet node 1:1/1.
-----------------------------------------------------------------